{"id":3316,"date":"2021-02-03T13:48:50","date_gmt":"2021-02-03T18:48:50","guid":{"rendered":"https:\/\/new.b2b2c.ca\/b2bcybersecure\/technologie-de-securisation-ti\/"},"modified":"2021-05-04T17:26:25","modified_gmt":"2021-05-04T21:26:25","slug":"cyber-security-technologies","status":"publish","type":"page","link":"https:\/\/b2bcybersecure.com\/en\/cyber-security-technologies\/","title":{"rendered":"Security Technologies"},"content":{"rendered":"\n  <div class=\"banner has-hover is-full-height has-parallax\" id=\"banner-448737047\">\n          <div class=\"banner-inner fill\">\n        <div class=\"banner-bg fill\" data-parallax=\"-6\" data-parallax-container=\".banner\" data-parallax-background>\n            <div class=\"bg fill bg-fill bg-loaded\"><\/div>\n                        <div class=\"overlay\"><\/div>            \n                    <\/div>\n        <div class=\"banner-layers container\">\n            <div class=\"fill banner-link\"><\/div>            \n   <div id=\"text-box-1816266135\" class=\"text-box banner-layer x50 md-x50 lg-x50 y50 md-y50 lg-y50 res-text\">\n              <div data-parallax=\"1\" data-parallax-fade=\"true\">       <div data-animate=\"none\">           <div class=\"text dark text-shadow-5\">\n              \n              <div class=\"text-inner text-center\">\n                  \n\t<div id=\"gap-1016292083\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1016292083 {\n  padding-top: 7px;\n}\n<\/style>\n\t<\/div>\n\t\n<h2><span style=\"font-size: 140%;\"><strong>Cyber Security Technologies<\/strong><\/span><\/h2>\n\t<div id=\"gap-688528184\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-688528184 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n<h3><span style=\"font-size: 120%;\"><strong>The right equipment, professionally installed<\/strong><\/span><\/h3>\n<h1><span style=\"font-size: 40%;\">Equip yourself with the cybersecurity technologies your business needs. Our catalog is complete and our installations are professional grade.<\/span><\/h1>\n<a href=\"#PretADiscuter\" target=\"_self\" class=\"button white is-outline\"  >\n    <span>book your free consultation<\/span>\n  <\/a>\n\n\t<div id=\"gap-1647431316\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1647431316 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n              <\/div>\n           <\/div>\n       <\/div>       <\/div>              \n<style scope=\"scope\">\n\n#text-box-1816266135 {\n  width: 74%;\n}\n#text-box-1816266135 .text {\n  font-size: 100%;\n}\n\n\n@media (min-width:550px) {\n\n  #text-box-1816266135 {\n    width: 70%;\n  }\n\n}\n<\/style>\n    <\/div>\n \n        <\/div>\n      <\/div>\n\n            \n<style scope=\"scope\">\n\n#banner-448737047 {\n  padding-top: 100%;\n}\n#banner-448737047 .bg.bg-loaded {\n  background-image: url(https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/Technologie-B2B-Cyber-Secure-1200x800.jpeg);\n}\n#banner-448737047 .overlay {\n  background-color: rgba(0, 107, 255, 0.35);\n}\n#banner-448737047 .bg {\n  background-position: 47% 46%;\n}\n<\/style>\n  <\/div>\n\n\n\t<section class=\"section\" id=\"section_1871426977\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\t<div id=\"gap-1104169108\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1104169108 {\n  padding-top: 50px;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row align-center\"  id=\"row-2047460332\">\n\n\t<div class=\"col small-10 large-12\"  >\n\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n<h2><span style=\"font-size: 130%;\">Don&#8217;t fall victim to the next storm.<\/span><\/h2>\n<p class=\"lead\">Keep your protection arsenal up to date with our catalog of cyber security technologies divided between Analysis, Prevention and Continuity products lines. Each is offered with optional installation and technical support from our <a href=\"https:\/\/b2bcybersecure.com\/en\/expertise\/\"> experts<\/a>.<\/p>\n<a href=\"#OutilsAnalyse\" target=\"_self\" class=\"button primary is-outline\"  >\n    <span>Analysis Tools<\/span>\n  <\/a>\n\n<a href=\"#SysPrevention\" target=\"_self\" class=\"button primary is-outline\"  >\n    <span>Prevention Systems<\/span>\n  <\/a>\n\n<a href=\"#TechContinuite\" target=\"_self\" class=\"button primary is-outline\"  >\n    <span>Continuity Technologies<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n\t<div id=\"gap-274336871\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-274336871 {\n  padding-top: 15px;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_1871426977 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n<\/style>\n\t<\/section>\n\t\n<span class=\"scroll-to\" data-label=\"Scroll to: #OutilsAnalyse\" data-bullet=\"false\" data-link=\"#OutilsAnalyse\" data-title=\"#OutilsAnalyse\"><a name=\"OutilsAnalyse\"><\/a><\/span>\n\t<section class=\"section\" id=\"section_1136502532\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n<div class=\"row align-center\"  id=\"row-379555460\">\n\n\t<div class=\"col medium-5 small-12 large-5\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"gap-391568059\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-391568059 {\n  padding-top: 16px;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row align-center\"  id=\"row-1449298579\">\n\n\t<div class=\"col small-10 large-12\"  >\n\t\t<div class=\"col-inner text-center\" style=\"padding:0px 0px 0px 0px;margin:0px 0px -37px 0px;\" >\n\t\t\t\n\t\t\t\n<h3><span style=\"font-size: 160%;\">Analysis Tools<\/span><\/h3>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n<div class=\"row align-middle align-center\"  id=\"row-1860064981\">\n\n\t<div class=\"col medium-4 small-10 large-4\"  data-animate=\"fadeInLeft\">\n\t\t<div class=\"col-inner text-right\"  >\n\t\t\t\n\t\t\t\n\n\t\t<div class=\"icon-box featured-box icon-box-right text-right\"  >\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t\t\t\t\t\t\t\n\t<div id=\"gap-294638273\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-294638273 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<h2><span style=\"font-size: 80%;\"><span style=\"font-size: 100%;\">Computer Inventory Software<\/span><\/h2>\n<div class=\"accordion\" rel=\"1\">\n<div class=\"accordion-item\"><a href=\"#\" class=\"accordion-title plain\"><button class=\"toggle\"><i class=\"icon-angle-down\"><\/i><\/button><span>More<\/span><\/a><div class=\"accordion-inner\">\n\t<div id=\"gap-1931021373\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1931021373 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<p>Software that allows you to probe your network and maintain a complete map of it, including needed\u00a0updates to key software and operating systems (OS).<\/p>\n<\/div><\/div>\n<\/div>\n\t<div id=\"gap-974728487\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-974728487 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-4 small-10 large-4\"  data-animate=\"fadeInUp\">\n\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"gap-513127621\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-513127621 {\n  padding-top: 36px;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_118770395\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Analyse-2.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Analyse-2.png 500w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Analyse-2-400x400.png 400w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Analyse-2-280x280.png 280w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style scope=\"scope\">\n\n#image_118770395 {\n  width: 84%;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-4 small-10 large-4\"  data-animate=\"fadeInRight\">\n\t\t<div class=\"col-inner text-right\"  >\n\t\t\t\n\t\t\t\n\n\t\t<div class=\"icon-box featured-box icon-box-left text-left\"  >\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t\t\t\t\t\t\t\n\t<div id=\"gap-947792236\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-947792236 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<h2><span style=\"font-size: 80%;\">Physical network probes<\/span><\/h2>\n<div class=\"accordion\" rel=\"1\">\n<div class=\"accordion-item\"><a href=\"#\" class=\"accordion-title plain\"><button class=\"toggle\"><i class=\"icon-angle-down\"><\/i><\/button><span>More<\/span><\/a><div class=\"accordion-inner\">\n\t<div id=\"gap-1113743969\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1113743969 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<p style=\"text-align: left;\">Capture the meta data of the traffic circulating on your networks with &#8220;appliances&#8221; specialized in cyber detection. With them, you can visualize the beginnings of an infection or detect the insidious behavior of the <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Advanced_Persistent_Threat\">APTs<\/a> operating there. <\/p>\n<\/div><\/div>\n<\/div>\n\t<div id=\"gap-444386524\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-444386524 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_1136502532 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n<\/style>\n\t<\/section>\n\t\n<span class=\"scroll-to\" data-label=\"Scroll to: #SysPrevention\" data-bullet=\"false\" data-link=\"#SysPrevention\" data-title=\"#SysPrevention\"><a name=\"SysPrevention\"><\/a><\/span>\n\t<section class=\"section\" id=\"section_450056438\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n<div class=\"row align-center\"  id=\"row-879229005\">\n\n\t<div class=\"col medium-5 small-12 large-5\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"gap-48494782\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-48494782 {\n  padding-top: 14px;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row align-center\"  id=\"row-2033764308\">\n\n\t<div class=\"col small-10 large-12\"  >\n\t\t<div class=\"col-inner text-center\" style=\"padding:0px 0px 0px 0px;margin:0px 0px -37px 0px;\" >\n\t\t\t\n\t\t\t\n<h3><span style=\"font-size: 160%;\">Prevention Systems<\/span><\/h3>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n<div class=\"row align-middle align-center\"  id=\"row-142633576\">\n\n\t<div class=\"col medium-4 small-10 large-4\"  data-animate=\"fadeInLeft\">\n\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n\n\t\t<div class=\"icon-box featured-box icon-box-right text-right\"  >\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t\t\t\t\t\t\t\n\t<div id=\"gap-497089447\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-497089447 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<h2><span style=\"font-size: 80%;\">Fire protection, Secure mobile access and Internet portal<\/span><\/h2>\n<div class=\"accordion\" rel=\"\">\n<div class=\"accordion-item rightPlusAccordion\"><a href=\"#\" class=\"accordion-title plain\"><button class=\"toggle\"><i class=\"icon-angle-down\"><\/i><\/button><span>More<\/span><\/a><div class=\"accordion-inner\">\n\t<div id=\"gap-1491184557\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1491184557 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<p>We have a full range of the latest technologies in terms of protection of the entry and exit points of your network. Available in software or appliance form, each is from a recognized manufacturer with an offer specially adapted to SMEs.<\/p>\n<\/div><\/div>\n<\/div>\n\t<div id=\"gap-1478294635\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1478294635 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\n\t\t<div class=\"icon-box featured-box icon-box-right text-right\"  >\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t\t\t\t\t\t\t\n\t<div id=\"gap-539166229\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-539166229 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<h2><span style=\"font-size: 80%;\">Anti-malware protection software<\/span><\/h3>\n<div class=\"accordion\" rel=\"\">\n<div class=\"accordion-item rightPlusAccordion\"><a href=\"#\" class=\"accordion-title plain\"><button class=\"toggle\"><i class=\"icon-angle-down\"><\/i><\/button><span>More<\/span><\/a><div class=\"accordion-inner\">\n\t<div id=\"gap-476564543\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-476564543 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<p>Email is the number one vector used by cybercriminals to penetrate and attack corporate computer systems.<\/p>\n<p>We offer multiple malware protection applications, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Ransomware\">ransomware<\/a>, spam, phishing and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Business_email_compromise\">BEC<\/a>\u00a0attacks. \u00a0\u00a0<\/p>\n<p>We have options for whatever email server you use, including for the latest versions of Microsoft Exchange and for Linux based servers.<\/p>\n<\/div><\/div>\n<\/div>\n\t<div id=\"gap-1739413366\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1739413366 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\n\t\t<div class=\"icon-box featured-box icon-box-right text-right\"  >\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t\t\t\t\t\t\t\n\t<div id=\"gap-1609529293\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1609529293 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<h2><span style=\"font-size: 80%;\">Security Software for AWS, AZURE, and the Cloud<\/span><\/h2>\n<div class=\"accordion\" rel=\"\">\n<div class=\"accordion-item\"><a href=\"#\" class=\"accordion-title plain\"><button class=\"toggle\"><i class=\"icon-angle-down\"><\/i><\/button><span>More<\/span><\/a><div class=\"accordion-inner\">\n\t<div id=\"gap-1727020953\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1727020953 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<p>The digital transformation that moves workloads to the cloud is underway. Cyber security technology has followed.<\/p>\n<p>These offer native integration with a wide range of virtualization platforms, such as AWS, Microsoft AZURE, Google Cloud or other container provider.<\/p>\n<p>With our security software for cloud service, maintain the level of your protection even if your infrastructure includes one or more virtual environment providers.<\/p>\n<\/div><\/div>\n<\/div>\n\t<div id=\"gap-508103854\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-508103854 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-4 small-10 large-4\"  data-animate=\"fadeInUp\">\n\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"gap-730497911\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-730497911 {\n  padding-top: 36px;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1529201378\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Prevention-1.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Prevention-1.png 500w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Prevention-1-400x400.png 400w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Prevention-1-280x280.png 280w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style scope=\"scope\">\n\n#image_1529201378 {\n  width: 84%;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-4 small-10 large-4\"  data-animate=\"fadeInRight\">\n\t\t<div class=\"col-inner text-right\"  >\n\t\t\t\n\t\t\t\n\n\t\t<div class=\"icon-box featured-box icon-box-left text-left\"  >\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t\t\t\t\t\t\t\n\t<div id=\"gap-1723628199\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1723628199 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<h2><span style=\"font-size: 80%;\">Detection and Response Software (EDR &amp; SIEM)<\/span><\/h2>\n<div class=\"accordion\" rel=\"\">\n<div class=\"accordion-item\"><a href=\"#\" class=\"accordion-title plain\"><button class=\"toggle\"><i class=\"icon-angle-down\"><\/i><\/button><span>More<\/span><\/a><div class=\"accordion-inner\">\n\t<div id=\"gap-1720124787\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1720124787 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<p>The majority of cyber attacks against businesses start at the end of the line.<\/p>\n<p>Endpoint Detection and Response (<a href=\"https:\/\/fr.wikipedia.org\/wiki\/Endpoint_detection_and_response\">EDR<\/a>) or Security Information and Event Management (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Security_information_and_event_management\">SIEM<\/a>) software harden endpoints and provides the data and tools for professionals to eliminate threats.<\/p>\n<p>Our partners in this space offer many configurations to meet the needs of your business.<\/p>\n<\/div><\/div>\n<\/div>\n\t<div id=\"gap-254930313\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-254930313 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\n\t\t<div class=\"icon-box featured-box icon-box-left text-left\"  >\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t\t\t\t\t\t\t\n<h2><span style=\"font-size: 80%;\">Software Definition Networks (SDN) and Fortified WiFi Networks<\/span><\/h3>\n<div class=\"accordion\" rel=\"\">\n<div class=\"accordion-item\"><a href=\"#\" class=\"accordion-title plain\"><button class=\"toggle\"><i class=\"icon-angle-down\"><\/i><\/button><span>More<\/span><\/a><div class=\"accordion-inner\">\n\t<div id=\"gap-610222067\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-610222067 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<p>Maintaining uniform security policies applied on a heterogeneous network, wired or wireless, is a particular challenge.<\/p>\n<p>Set up either a <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Software-defined_networking\">Software Defined Network<\/a>\u00a0 or a fortified WiFi network can be the solution. Do it with the latest technologies from our partners.<\/p>\n<\/div><\/div>\n<\/div>\n\t<div id=\"gap-1574086555\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1574086555 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\n\t\t<div class=\"icon-box featured-box icon-box-left text-left\"  >\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t\t\t\t\t\t\t\n\t<div id=\"gap-1268172151\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1268172151 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<h2><span style=\"font-size: 80%;\">Cyber protection products for industry and IOT<\/span><\/h2>\n<div class=\"accordion\" rel=\"\">\n<div class=\"accordion-item\"><a href=\"#\" class=\"accordion-title plain\"><button class=\"toggle\"><i class=\"icon-angle-down\"><\/i><\/button><span>More<\/span><\/a><div class=\"accordion-inner\">\n\t<div id=\"gap-358312700\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-358312700 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<p>Cyber threats targeting industrial infrastructures are increasingly numerous. On the floor, every mistake or minute of downtime counts. In the factory, it is also an environment rich in <a href=\"https:\/\/en.wikipedia.org\/wiki\/Internet_of_things\">IOT<\/a> and protection technologies against cyber attacks must be adapted to it and target business continuity.<\/p>\n<p>If you don&#8217;t want to leave your robots and machine tools exposed, one or more of the industrial systems and IOT technologies might help.<\/p>\n<\/div><\/div>\n<\/div>\n\t<div id=\"gap-586315461\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-586315461 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_450056438 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n<\/style>\n\t<\/section>\n\t\n<span class=\"scroll-to\" data-label=\"Scroll to: #TechContinuite\" data-bullet=\"false\" data-link=\"#TechContinuite\" data-title=\"#TechContinuite\"><a name=\"TechContinuite\"><\/a><\/span>\n\t<section class=\"section\" id=\"section_1933394055\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n<div class=\"row align-center\"  id=\"row-87715495\">\n\n\t<div class=\"col medium-5 small-12 large-5\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"gap-322450467\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-322450467 {\n  padding-top: 14px;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row align-center\"  id=\"row-887122976\">\n\n\t<div class=\"col small-10 large-12\"  >\n\t\t<div class=\"col-inner text-center\" style=\"padding:0px 0px 0px 0px;margin:0px 0px -37px 0px;\" >\n\t\t\t\n\t\t\t\n<h3><span style=\"font-size: 160%;\">Continuity Technologies<\/span><\/h3>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n<div class=\"row align-middle align-center\"  id=\"row-1982053567\">\n\n\t<div class=\"col medium-4 small-10 large-4\"  data-animate=\"fadeInLeft\">\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t\t<div class=\"icon-box featured-box icon-box-right text-right\"  >\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t\t\t\t\t\t\t\n\t<div id=\"gap-1859487934\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1859487934 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<h2><span style=\"font-size: 80%;\">Hyper-Converged Computer Centers<\/span><\/h2>\n<div class=\"accordion\" rel=\"\">\n<div class=\"accordion-item\"><a href=\"#\" class=\"accordion-title plain\"><button class=\"toggle\"><i class=\"icon-angle-down\"><\/i><\/button><span>More<\/span><\/a><div class=\"accordion-inner\">\n\t<div id=\"gap-1460213271\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1460213271 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<p>Easier to protect and better suited for cloud recovery than other architectures, hyperconverged infrastructure is the modern approach to keeping your IT infrastructure on its own.<\/p>\n<p>Depending on your current infrastructure and the goals of the migration, the hyperconverged technologies in our catalog will allow you to make the switch in complete safety.<\/p>\n<\/div><\/div>\n<\/div>\n\t<div id=\"gap-1204676632\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1204676632 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-4 small-10 large-4\"  >\n\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"gap-1639702489\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1639702489 {\n  padding-top: 36px;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1767147466\">\n\t\t\t\t\t\t<div data-animate=\"fadeInUp\">\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"386\" height=\"800\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Continuite-386x800.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Continuite-386x800.png 386w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Continuite-193x400.png 193w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Continuite.png 429w\" sizes=\"auto, (max-width: 386px) 100vw, 386px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t<\/div>\t\t\t\t\t\t\n<style scope=\"scope\">\n\n#image_1767147466 {\n  width: 63%;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-4 small-10 large-4\"  data-animate=\"fadeInRight\">\n\t\t<div class=\"col-inner text-right\"  >\n\t\t\t\n\t\t\t\n\n\t\t<div class=\"icon-box featured-box icon-box-left text-left\"  >\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t\t\t\t\t\t\t\n\t<div id=\"gap-73768699\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-73768699 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<h2><span style=\"font-size: 80%;\">Backup and Virtualization Systems<\/span><\/h2>\n<div class=\"accordion\" rel=\"\">\n<div class=\"accordion-item\"><a href=\"#\" class=\"accordion-title plain\"><button class=\"toggle\"><i class=\"icon-angle-down\"><\/i><\/button><span>More<\/span><\/a><div class=\"accordion-inner\">\n\t<div id=\"gap-1374672745\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1374672745 {\n  padding-top: 10px;\n}\n<\/style>\n\t<\/div>\n\t\n<p>The virtualization of your systems offers in addition to a gain in agility and performance, one of the best protection against ransomware. Along with logging and anti-encryption barriers, these technologies can increase the speed with which your business recovers from a cyber attack or disaster.<\/p>\n<p>Several virtualization approaches exist. Depending on the systems to be converted and the goals of the conversion, our consulting service could recommend a suitable technology and additional software to maintain this cybersecurity.<\/p>\n<\/div><\/div>\n<\/div>\n\t<div id=\"gap-805405463\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-805405463 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_1933394055 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n<\/style>\n\t<\/section>\n\t\n<span class=\"scroll-to\" data-label=\"Scroll to: #PretADiscuter\" data-bullet=\"false\" data-link=\"#PretADiscuter\" data-title=\"PretADiscuter\"><a name=\"PretADiscuter\"><\/a><\/span>\n\t<section class=\"section\" id=\"section_2067415406\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\t<section class=\"section\" id=\"section_375454938\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\r\n\r\n\t<div id=\"gap-639813499\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-639813499 {\n  padding-top: 50px;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n<div class=\"row\"  id=\"row-158802784\">\r\n\r\n\n\t<div class=\"col small-12 large-12\"  >\n\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\r\n\r\n<h5 class=\"uppercase\"><span style=\"font-size:160%;\">Ready to discuss your needs?<\/span><\/h5>\r\n<h2><span style=\"font-size:90%;\">Contact us today for a no-obligation consultation.<\/span><\/h2>\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\r\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\r\n<div class=\"row align-center\"  id=\"row-348991079\">\r\n\r\n\n\t<div class=\"col medium-2 small-12 large-2\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\n\t<div class=\"col medium-4 small-12 large-4\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1378473074\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"425\" height=\"250\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2020\/09\/Parlez-avec-SecureBIZ-2.png\" class=\"attachment-large size-large\" alt=\"Parlez avec SecureBIZ\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style scope=\"scope\">\n\n#image_1378473074 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\n\t<div class=\"col medium-4 small-12 large-4\"  >\n\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\r\n\r\n<div class=\"row align-center\"  id=\"row-281318532\">\r\n\r\n\n\t<div class=\"col small-12 large-12\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n<a href=\"tel:+15145095080\" target=\"_self\" class=\"button secondary is-shade is-xlarge box-shadow-4 box-shadow-5-hover\"  style=\"border-radius:10px;padding:0px 40px 0px 40px;\">\n  <i class=\"icon-phone\" ><\/i>  <span>514 509-5080<\/span>\n  <\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\n\t<div class=\"col small-12 large-12\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n<a href=\"https:\/\/form.jotform.com\/211126360666047?language=en\" target=\"_self\" class=\"button success is-link box-shadow-4 box-shadow-5-hover\"  style=\"border-radius:10px;padding:0px 30px 0px 20px;\">\n  <i class=\"icon-clock\" ><\/i>  <span>Let's make an appointment<\/span>\n  <\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\r\n\n<style scope=\"scope\">\n\n#row-281318532 > .col > .col-inner {\n  padding: 40px 0px 0px 0px;\n}\n<\/style>\n<\/div>\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\n\t<div class=\"col medium-2 small-12 large-2\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\r\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\r\n\r\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_375454938 {\n  padding-top: 0px;\n  padding-bottom: 0px;\n  min-height: 0px;\n  background-color: rgb(255,255,255);\n}\n<\/style>\n\t<\/section>\n\t\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_2067415406 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n<\/style>\n\t<\/section>\n\t\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3316","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.9 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security Technologies - B2B Cyber Secure<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2bcybersecure.com\/en\/cyber-security-technologies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Technologies - B2B Cyber Secure\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2bcybersecure.com\/en\/cyber-security-technologies\/\" \/>\n<meta property=\"og:site_name\" content=\"B2B Cyber Secure\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-04T21:26:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/cyber-security-technologies\\\/\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/cyber-security-technologies\\\/\",\"name\":\"Security Technologies - B2B Cyber Secure\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#website\"},\"datePublished\":\"2021-02-03T18:48:50+00:00\",\"dateModified\":\"2021-05-04T21:26:25+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/cyber-security-technologies\\\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/\",\"name\":\"B2B Cyber Secure\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#organization\",\"name\":\"B2B Cyber Secure\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Logo-B2B-Cyber-secure.png\",\"contentUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Logo-B2B-Cyber-secure.png\",\"width\":67,\"height\":67,\"caption\":\"B2B Cyber Secure\"},\"image\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/b2bcybersecure\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Technologies - B2B Cyber Secure","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2bcybersecure.com\/en\/cyber-security-technologies\/","og_locale":"en_US","og_type":"article","og_title":"Security Technologies - B2B Cyber Secure","og_url":"https:\/\/b2bcybersecure.com\/en\/cyber-security-technologies\/","og_site_name":"B2B Cyber Secure","article_modified_time":"2021-05-04T21:26:25+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2bcybersecure.com\/en\/cyber-security-technologies\/","url":"https:\/\/b2bcybersecure.com\/en\/cyber-security-technologies\/","name":"Security Technologies - B2B Cyber Secure","isPartOf":{"@id":"https:\/\/b2bcybersecure.com\/en\/#website"},"datePublished":"2021-02-03T18:48:50+00:00","dateModified":"2021-05-04T21:26:25+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2bcybersecure.com\/en\/cyber-security-technologies\/"]}]},{"@type":"WebSite","@id":"https:\/\/b2bcybersecure.com\/en\/#website","url":"https:\/\/b2bcybersecure.com\/en\/","name":"B2B Cyber Secure","description":"","publisher":{"@id":"https:\/\/b2bcybersecure.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2bcybersecure.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/b2bcybersecure.com\/en\/#organization","name":"B2B Cyber Secure","url":"https:\/\/b2bcybersecure.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/b2bcybersecure.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/01\/Logo-B2B-Cyber-secure.png","contentUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/01\/Logo-B2B-Cyber-secure.png","width":67,"height":67,"caption":"B2B Cyber Secure"},"image":{"@id":"https:\/\/b2bcybersecure.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/b2bcybersecure\/"]}]}},"_links":{"self":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/pages\/3316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/comments?post=3316"}],"version-history":[{"count":5,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/pages\/3316\/revisions"}],"predecessor-version":[{"id":3790,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/pages\/3316\/revisions\/3790"}],"wp:attachment":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/media?parent=3316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}