{"id":508,"date":"2024-02-02T15:12:25","date_gmt":"2024-02-02T15:12:25","guid":{"rendered":"https:\/\/cybervision247.com\/accueil\/"},"modified":"2024-02-20T18:23:24","modified_gmt":"2024-02-20T18:23:24","slug":"home","status":"publish","type":"page","link":"https:\/\/cybervision247.com\/en\/","title":{"rendered":"Home"},"content":{"rendered":"<div id='revolutionslider_1'  class='avia-layerslider avia-revolutionslider main_color avia-shadow  avia-builder-el-0  el_before_av_section  avia-builder-el-first   container_wrap fullsize'  >\n\t\t\t<!-- START accueil REVOLUTION SLIDER 6.6.20 --><p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t<rs-module-wrap id=\"rev_slider_3_1_wrapper\" data-source=\"gallery\" style=\"visibility:hidden;background:transparent;padding:0;margin:0px auto;margin-top:0;margin-bottom:0;\">\n\t\t\t\t<rs-module id=\"rev_slider_3_1\" style=\"\" data-version=\"6.6.20\">\n\t\t\t\t\t<rs-slides style=\"overflow: hidden; position: absolute;\">\n\t\t\t\t\t\t<rs-slide style=\"position: absolute;\" data-key=\"rs-9\" data-title=\"Slide\" data-in=\"o:0;\" data-out=\"a:false;\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"\/\/cybervision247.com\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" title=\"apropos_banner2_cv247\" width=\"1920\" height=\"930\" class=\"rev-slidebg tp-rs-img rs-lazyload\" data-lazyload=\"\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/apropos_banner2_cv247.jpg\" data-parallax=\"off\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-3-slide-9-layer-1\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"xo:131px,131px,131px,32px;y:m;yo:-130px,-130px,-130px,-48px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:51,51,51,20;l:62,62,62,24;fw:700;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:750px,750px,750px,261px;h:200px,200px,200px,68px;\"\n\t\t\t\t\t\t\t\tdata-frame_0=\"x:0,0,0,0px;y:0,0,0,0px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"x:0,0,0,0px;y:0,0,0,0px;st:640;sR:640;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:8060;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:7;font-family:'Poppins';\"\n\t\t\t\t\t\t\t>Trust our cybersecurity<br \/>\nexperts for <br \/>\n24\/7 protection \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-3-slide-9-layer-2\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-color=\"#cdeeff\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"xo:132px,132px,132px,32px;y:m;yo:100px,100px,100px,55px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:25,25,25,17;l:30,30,30,21;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:546px,546px,546px,267px;h:200px,200px,200px,auto;\"\n\t\t\t\t\t\t\t\tdata-frame_0=\"x:0,0,0,0px;y:0,0,0,0px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"x:0,0,0,0px;y:0,0,0,0px;st:640;sR:640;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:8060;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:6;font-family:'Poppins';\"\n\t\t\t\t\t\t\t>A secure IT environment<br \/>\nto ensure your business runs<br \/>\nwithout a hitch. \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-3-slide-9-layer-3\" \n\t\t\t\t\t\t\t\tclass=\"rs-pxl-6\"\n\t\t\t\t\t\t\t\tdata-type=\"image\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"xo:595px,595px,595px,231px;yo:178px,178px,178px,123px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:20,20,20,4;l:0,0,0,6;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:763px,763px,763px,190px;h:704px,704px,704px,175px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"e:power4.inOut;st:200;sp:1500;sR:200;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:7300;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;\"\n\t\t\t\t\t\t\t><img decoding=\"async\" src=\"\/\/cybervision247.com\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" class=\"tp-rs-img rs-lazyload\" width=\"763\" height=\"704\" data-lazyload=\"\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/apropos_banner2-2_cv247.png\" data-no-retina> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t<\/rs-module>\n\t\t\t\t<script>\n\t\t\t\t\tsetREVStartSize({c: 'rev_slider_3_1',rl:[1240,1240,1240,480],el:[900,900,900,320],gw:[1920,1920,1920,480],gh:[900,900,900,320],type:'standard',justify:'',layout:'fullwidth',mh:\"0\"});if (window.RS_MODULES!==undefined && window.RS_MODULES.modules!==undefined && window.RS_MODULES.modules[\"revslider31\"]!==undefined) {window.RS_MODULES.modules[\"revslider31\"].once = false;window.revapi3 = undefined;if (window.RS_MODULES.checkMinimal!==undefined) window.RS_MODULES.checkMinimal()}\n\t\t\t\t<\/script>\n\t\t\t<\/rs-module-wrap>\n\t\t\t<!-- END REVOLUTION SLIDER -->\n<\/div>\n<div id='av_section_1'  class='avia-section av-g1i7i-e98e1f2a465ef5e7e8bc79dd823a67bb main_color avia-section-large avia-no-border-styling  avia-builder-el-1  el_after_av_revolutionslider  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-508'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-whjha-91e4f2fa12ff999f3047527f6dab591b av_one_fourth  avia-builder-el-2  el_before_av_one_half  avia-builder-el-first  first flex_column_div  '     ><\/div><div  class='flex_column av-2vtqm-9ea37e0d72dc7278056fade83b2d7f10 av_one_half  avia-builder-el-3  el_after_av_one_fourth  el_before_av_one_fourth  flex_column_div  '     ><section  class='av_textblock_section av-aok7y-379220bffc9badb1cf4803deb6c85d92 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2 style=\"text-align: center;\">Why should your company invest in a cybersecurity department?<\/h2>\n<\/div><\/section><\/div><div  class='flex_column av-gkcg6-a05bad1f654bfe7fcbf0de6f09b616e9 av_one_fourth  avia-builder-el-5  el_after_av_one_half  el_before_av_one_fifth  flex_column_div  '     ><\/div><div  class='flex_column av-ikwby-810ac2c9e625b23d2392390e5915630c av_one_fifth  avia-builder-el-6  el_after_av_one_fourth  el_before_av_three_fifth  first flex_column_div  column-top-margin'     ><\/div><div  class='flex_column av-d9y3q-af27ae338e6fddc87ee6cc1ea5f69f6b av_three_fifth  avia-builder-el-7  el_after_av_one_fifth  el_before_av_one_fifth  flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-pbaeu-95361409aecfe1716a81e68ddab72fe0\">\n#top .hr.hr-invisible.av-pbaeu-95361409aecfe1716a81e68ddab72fe0{\nmargin-top:-30px;\nheight:1px;\n}\n<\/style>\n<div  class='hr av-pbaeu-95361409aecfe1716a81e68ddab72fe0 hr-invisible  avia-builder-el-8  el_before_av_textblock  avia-builder-el-first  av-small-hide av-mini-hide'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-s7a8m-0720314590de26cf89fc88f8cd9b8dce '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: center;\">Cyber attacks are increasingly becoming a business risk. By investing in a robust cybersecurity service, your company is armed with a proactive, tailor-made defense against hacking, an essential asset in ensuring its long-term survival and growth.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-9fw72-0db4f1af1e08779c4b40ed02485b6fc4\">\n#top .hr.hr-invisible.av-9fw72-0db4f1af1e08779c4b40ed02485b6fc4{\nmargin-top:-30px;\nheight:1px;\n}\n<\/style>\n<div  class='hr av-9fw72-0db4f1af1e08779c4b40ed02485b6fc4 hr-invisible  avia-builder-el-10  el_after_av_textblock  avia-builder-el-last  av-desktop-hide av-medium-hide'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div><div  class='flex_column av-beuza-1502c222e2e2f6ace02191f495540095 av_one_fifth  avia-builder-el-11  el_after_av_three_fifth  avia-builder-el-last  flex_column_div  column-top-margin'     ><\/div><\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='av_section_2'  class='avia-section av-lsbzxk8z-64aba35aec4caafe94b281474a5b5053 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-12  el_after_av_section  el_before_av_section  section-icones avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-508'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-bqk9y-49c03b00565afbd0936e0a8c5276cb53 av_one_third  avia-builder-el-13  el_before_av_one_third  avia-builder-el-first  first flex_column_div av-animated-generic pop-up  '     ><section  class='av_textblock_section av-lsawahax-1e26e9506c8096ad940fe640fc74aac2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><div class=\"container5\" style=\"text-align: left;\">\n<div class=\"image2\"><img decoding=\"async\" class=\"alignnone wp-image-723 size-full\" role=\"img\" src=\"https:\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/crochet.svg\" alt=\"\" width=\"20\" height=\"\" \/><\/div>\n<div class=\"text2\"><span style=\"font-size: 90%;\"><strong> Personal data protection<\/strong><\/span><\/div>\n<\/div>\n<\/div><\/section><\/div><div  class='flex_column av-e11eu-94a394f24807488d7a0f35c324715600 av_one_third  avia-builder-el-15  el_after_av_one_third  el_before_av_one_third  flex_column_div av-animated-generic pop-up  '     ><section  class='av_textblock_section av-lsawpdyh-71201eb6d972fe6a2bf11e44d775ae30 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><div class=\"container5\">\n<div class=\"image2\"><img decoding=\"async\" class=\"alignnone wp-image-723 size-full\" role=\"img\" src=\"https:\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/crochet.svg\" alt=\"\" width=\"20\" height=\"\" \/><\/div>\n<div class=\"text2\"><span style=\"font-size: 90%;\"><strong> Cyber attack prevention <\/strong><\/span><\/div>\n<\/div>\n<\/div><\/section><\/div><div  class='flex_column av-7sya6-62735b68c9ff45b3280b3474fbb61ff7 av_one_third  avia-builder-el-17  el_after_av_one_third  el_before_av_one_third  flex_column_div av-animated-generic pop-up  '     ><section  class='av_textblock_section av-lsawpmzf-231d970c96f5346832eec2ec4fd11be7 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><div class=\"container5\">\n<div class=\"image2\"><img decoding=\"async\" class=\"alignnone wp-image-723 size-full\" role=\"img\" src=\"https:\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/crochet.svg\" alt=\"\" width=\"20\" height=\"\" \/><\/div>\n<div class=\"text2\"><span style=\"font-size: 90%;\"><strong> Regulatory compliance <\/strong><\/span><\/div>\n<\/div>\n<\/div><\/section><\/div><div  class='flex_column av-fifha-b4b67d40554be042b639b0259a0e4bdf av_one_third  avia-builder-el-19  el_after_av_one_third  el_before_av_one_third  first flex_column_div av-animated-generic pop-up  column-top-margin'     ><section  class='av_textblock_section av-lsc04iw1-4fad6c6ba5bbe9e0b1802a53f3e7fded '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><div class=\"container5\">\n<div class=\"image2\"><img decoding=\"async\" class=\"alignnone wp-image-723 size-full\" role=\"img\" src=\"https:\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/crochet.svg\" alt=\"\" width=\"20\" height=\"\" \/><\/div>\n<div class=\"text2\"><span style=\"font-size: 90%;\"><strong> Maintain brand reputation <\/strong><\/span><\/div>\n<\/div>\n<\/div><\/section><\/div><div  class='flex_column av-9jqba-36463519dec85fe0bc45de0cd3f10ffc av_one_third  avia-builder-el-21  el_after_av_one_third  el_before_av_hr  flex_column_div av-animated-generic pop-up  column-top-margin'     ><section  class='av_textblock_section av-lsc04yw6-9938160d6de6a02afe688df98b430621 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><div class=\"container5\">\n<div class=\"image2\"><img decoding=\"async\" class=\"alignnone wp-image-723 size-full\" role=\"img\" src=\"https:\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/crochet.svg\" alt=\"\" width=\"20\" height=\"\" \/><\/div>\n<div class=\"text2\"><span style=\"font-size: 90%;\"><strong> Reduce business disruption <\/strong><\/span><\/div>\n<\/div>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lsc08xhp-8c742f2bc2f74ec4814c3234da5c31ee\">\n#top .hr.hr-invisible.av-lsc08xhp-8c742f2bc2f74ec4814c3234da5c31ee{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-lsc08xhp-8c742f2bc2f74ec4814c3234da5c31ee hr-invisible  avia-builder-el-23  el_after_av_one_third  avia-builder-el-last '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-8pt5i-5fe57b6430c9a638c975011e58faf9ac\">\n.avia-section.av-8pt5i-5fe57b6430c9a638c975011e58faf9ac .av-parallax .av-parallax-inner{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/apropos_banner3_cv247.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-8pt5i-5fe57b6430c9a638c975011e58faf9ac footer_color avia-section-large avia-no-border-styling  avia-builder-el-24  el_after_av_section  el_before_av_section  av-parallax-section avia-bg-style-parallax container_wrap fullsize'  data-section-bg-repeat='no-repeat'><div class='av-parallax' data-avia-parallax-ratio='0.3' ><div class='av-parallax-inner footer_color avia-full-stretch'><\/div><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-508'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-b9tni-d60292d5f2707830e62c9471e6a46d7f av_one_full  avia-builder-el-25  el_before_av_one_half  avia-builder-el-first  first flex_column_div  '     ><section  class='av_textblock_section av-lsc0fhsp-d4d36be130e33c717a4b39461d3661ef '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-217 size-full\" src=\"https:\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/logo_3_cv274.svg\" alt=\"\" width=\"300\" height=\"70\" \/><\/p>\n<\/div><\/section><\/div><div class='flex_column_table av-lsc0h4yz-41e0b9683b4d472fe5adbf9aae0c6d4c sc-av_one_half av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lsc0h4yz-41e0b9683b4d472fe5adbf9aae0c6d4c\">\n.flex_column.av-lsc0h4yz-41e0b9683b4d472fe5adbf9aae0c6d4c{\nborder-radius:30px 30px 30px 30px;\npadding:50px 50px 50px 50px;\nbackground-color:#122f4e;\n}\n\n@media only screen and (max-width: 479px){ \n.flex_column.av-lsc0h4yz-41e0b9683b4d472fe5adbf9aae0c6d4c{\npadding:20px 20px 20px 20px;\n}\n}\n<\/style>\n<div  class='flex_column av-lsc0h4yz-41e0b9683b4d472fe5adbf9aae0c6d4c av_one_half  avia-builder-el-27  el_after_av_one_full  el_before_av_one_half  first flex_column_table_cell av-equal-height-column av-align-middle av-animated-generic left-to-right  column-top-margin'     ><section  class='av_textblock_section av-iiouu-5837bcff0560748c96944b870999b57f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: center;\"><strong> PENETRATION TESTING <\/strong><br \/>\nDetect and neutralize threats before they infiltrate your system.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-n58zy-6a05ac6edfd957a50c0e5a1896dcf0d2\">\n#top .hr.hr-invisible.av-n58zy-6a05ac6edfd957a50c0e5a1896dcf0d2{\nheight:10px;\n}\n<\/style>\n<div  class='hr av-n58zy-6a05ac6edfd957a50c0e5a1896dcf0d2 hr-invisible  avia-builder-el-29  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-lsc0jiwg-1d6a835a38521bfa5738f517e4001fb2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: center;\"><strong> VULNERABILITY IDENTIFICATION AND REMEDIATION <\/strong><br \/>\nAnticipate security flaws to ensure an unwavering defense.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kp6h2-5a2bf00c50d2291ce43d92693f24b25a\">\n#top .hr.hr-invisible.av-kp6h2-5a2bf00c50d2291ce43d92693f24b25a{\nheight:10px;\n}\n<\/style>\n<div  class='hr av-kp6h2-5a2bf00c50d2291ce43d92693f24b25a hr-invisible  avia-builder-el-31  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-lsc0jqga-3febc4e40c246e20ecf640dd9a90c0e0 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: center;\"><strong> CYBERSECURITY TRAINING <\/strong><br \/>\nEmpower your team members with cutting-edge cybersecurity knowledge.<\/p>\n<\/div><\/section><\/p><\/div><div class='av-flex-placeholder'><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-tj6ry-363b09508d045f2447b678ab2d424bbb\">\n.flex_column.av-tj6ry-363b09508d045f2447b678ab2d424bbb{\nborder-radius:30px 30px 30px 30px;\npadding:50px 50px 50px 50px;\nbackground-color:#122f4e;\n}\n\n@media only screen and (max-width: 479px){ \n.flex_column.av-tj6ry-363b09508d045f2447b678ab2d424bbb{\npadding:20px 20px 20px 20px;\n}\n}\n<\/style>\n<div  class='flex_column av-tj6ry-363b09508d045f2447b678ab2d424bbb av_one_half  avia-builder-el-33  el_after_av_one_half  el_before_av_one_full  flex_column_table_cell av-equal-height-column av-align-middle av-animated-generic right-to-left  column-top-margin'     ><section  class='av_textblock_section av-ivog6-6206ff18e77e47aa5621a2518942c4d5 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: center;\"><strong> 24\/7 MONITORING <\/strong><br \/>\nDetect and neutralize threats before they infiltrate your system.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1m3wm-4db9cfedf81e72dffa925f0dc7611621\">\n#top .hr.hr-invisible.av-1m3wm-4db9cfedf81e72dffa925f0dc7611621{\nheight:10px;\n}\n<\/style>\n<div  class='hr av-1m3wm-4db9cfedf81e72dffa925f0dc7611621 hr-invisible  avia-builder-el-35  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-1bqg6-eeb5618642658a1586ef72bb782860b7 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: center;\"><strong>MICROSOFT 365 SECURITY AUDIT <\/strong><br \/>\nOptimize your Microsoft 365 environment and benefit from optimum security.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-aod9y-88c7f5a80692ab800735c9c8e3a573ee\">\n#top .hr.hr-invisible.av-aod9y-88c7f5a80692ab800735c9c8e3a573ee{\nheight:10px;\n}\n<\/style>\n<div  class='hr av-aod9y-88c7f5a80692ab800735c9c8e3a573ee hr-invisible  avia-builder-el-37  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-aod9y-4-c2514e579e0668b6a477e7356c587a40 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: center;\"><strong>CUSTOMIZED REPORT \/ COMPLIANCE AUDIT<\/strong><br \/>\nReceive tailored assessments for seamless compliance and security.<\/p>\n<\/div><\/section><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><div  class='flex_column av-auiq6-5f95280900bdab8563dfc37eccfb1a88 av_one_full  avia-builder-el-39  el_after_av_one_half  avia-builder-el-last  first flex_column_div  column-top-margin'     ><div  class='avia-button-wrap av-lsc0oagm-93b9f74c660269668eaff3700416625b-wrap avia_animated_button av-animated-when-visible-95 pop-up avia-button-center  avia-builder-el-40  avia-builder-el-no-sibling '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lsc0oagm-93b9f74c660269668eaff3700416625b\">\n#top #wrap_all .avia-button.av-lsc0oagm-93b9f74c660269668eaff3700416625b{\nbackground-color:#e42d1b;\nborder-color:#e42d1b;\ncolor:#ffffff;\nborder-radius:10px 10px 10px 10px;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-lsc0oagm-93b9f74c660269668eaff3700416625b:hover{\nbackground-color:#000a1d;\ncolor:white;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all.avia-button.av-lsc0oagm-93b9f74c660269668eaff3700416625b:hover .avia_button_background{\nborder-radius:10px 10px 10px 10px;\n}\n<\/style>\n<a href='https:\/\/cybervision247.com\/en\/'  class='avia-button av-lsc0oagm-93b9f74c660269668eaff3700416625b avia-icon_select-no avia-size-medium avia-position-center'  ><span class='avia_iconbox_title' >Learn more about our services<\/span><\/a><\/div><\/div><\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m0p4e-b56e1c194b294a5f795f2a02641262fa\">\n.avia-section.av-m0p4e-b56e1c194b294a5f795f2a02641262fa{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/apropos_banner4_cv247.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n<\/style>\n<div id='av_section_4'  class='avia-section av-m0p4e-b56e1c194b294a5f795f2a02641262fa footer_color avia-section-huge avia-no-border-styling  avia-builder-el-41  el_after_av_section  avia-builder-el-last  avia-bg-style-scroll av-minimum-height av-minimum-height-50 av-height-50  container_wrap fullsize'  data-section-bg-repeat='no-repeat' data-av_minimum_height_pc='50' data-av_min_height_opt='50'><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-508'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-g3jie-b2ff29d7735d9cd49b5542d61a81d564\">\n\n@media only screen and (min-width: 990px){ \n.flex_column.av-g3jie-b2ff29d7735d9cd49b5542d61a81d564{\npadding:0 0 0 50px;\n}\n}\n<\/style>\n<div  class='flex_column av-g3jie-b2ff29d7735d9cd49b5542d61a81d564 av_one_half  avia-builder-el-42  el_before_av_one_half  avia-builder-el-first  first flex_column_div  '     ><section  class='av_textblock_section av-1a9za-8dfc46a7cffb1ea3272e77fdbf509adb '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h4 style=\"text-align: left;\">Intrusion surveillance and security<\/h4>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lsc0v72f-743a97a365041ec0ddcfa1947ce1454a\">\n#top .hr.hr-invisible.av-lsc0v72f-743a97a365041ec0ddcfa1947ce1454a{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-lsc0v72f-743a97a365041ec0ddcfa1947ce1454a hr-invisible  avia-builder-el-44  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-lsc0wxc4-df7ef49004c5a1641a49b95f5951814b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: left;\">We also offer solutions and services to protect physical spaces against unauthorized activity and intrusion. Surveillance cameras, intruder alarms, access control: choose reliable surveillance for your commercial spaces.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-7t586-878fbb1eda38610389d382477187d4e3\">\n#top .hr.hr-invisible.av-7t586-878fbb1eda38610389d382477187d4e3{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-7t586-878fbb1eda38610389d382477187d4e3 hr-invisible  avia-builder-el-46  el_after_av_textblock  el_before_av_button '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  class='avia-button-wrap av-lsc0rw60-6a203b6fb6a85a4e8d6be702d9a8bd85-wrap avia_animated_button av-animated-when-visible-95 pop-up avia-button-left  avia-builder-el-47  el_after_av_hr  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lsc0rw60-6a203b6fb6a85a4e8d6be702d9a8bd85\">\n#top #wrap_all .avia-button.av-lsc0rw60-6a203b6fb6a85a4e8d6be702d9a8bd85{\nbackground-color:#e42d1b;\nborder-color:#e42d1b;\ncolor:#ffffff;\nborder-radius:10px 10px 10px 10px;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-lsc0rw60-6a203b6fb6a85a4e8d6be702d9a8bd85:hover{\nbackground-color:#000a1d;\ncolor:white;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all.avia-button.av-lsc0rw60-6a203b6fb6a85a4e8d6be702d9a8bd85:hover .avia_button_background{\nborder-radius:10px 10px 10px 10px;\n}\n<\/style>\n<a href='https:\/\/cybervision247.com\/en\/'  class='avia-button av-lsc0rw60-6a203b6fb6a85a4e8d6be702d9a8bd85 avia-icon_select-no avia-size-medium avia-position-left'  ><span class='avia_iconbox_title' >Learn more<\/span><\/a><\/div><\/p><\/div><div  class='flex_column av-aqhny-336d2a06c306a7ef7cd63f010b5659a8 av_one_half  avia-builder-el-48  el_after_av_one_half  avia-builder-el-last  flex_column_div  '     ><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":30,"featured_media":396,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybervision 24\/7 - Cybersecurity experts<\/title>\n<meta name=\"description\" content=\"CyberVision 24\/7 offers cybersecurity services that grow along with your business, guaranteeing proactive, long-term security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybervision247.com\/en\/home\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybervision 24\/7 - Cybersecurity experts\" \/>\n<meta property=\"og:description\" content=\"CyberVision 24\/7 offers cybersecurity services that grow along with your business, guaranteeing proactive, long-term security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybervision247.com\/en\/home\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybervision 24\/7\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-20T18:23:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/apropos_banner2_cv247.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"930\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cybervision247.com\/en\/home\/\",\"url\":\"https:\/\/cybervision247.com\/en\/home\/\",\"name\":\"Cybervision 24\/7 - Cybersecurity experts\",\"isPartOf\":{\"@id\":\"https:\/\/cybervision247.com\/#website\"},\"datePublished\":\"2024-02-02T15:12:25+00:00\",\"dateModified\":\"2024-02-20T18:23:24+00:00\",\"description\":\"CyberVision 24\/7 offers cybersecurity services that grow along with your business, guaranteeing proactive, long-term security.\",\"breadcrumb\":{\"@id\":\"https:\/\/cybervision247.com\/en\/home\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cybervision247.com\/en\/home\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cybervision247.com\/en\/home\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/cybervision247.com\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cybervision247.com\/#website\",\"url\":\"https:\/\/cybervision247.com\/\",\"name\":\"Cybervision 24\/7\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cybervision247.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybervision 24\/7 - Cybersecurity experts","description":"CyberVision 24\/7 offers cybersecurity services that grow along with your business, guaranteeing proactive, long-term security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybervision247.com\/en\/home\/","og_locale":"en_US","og_type":"article","og_title":"Cybervision 24\/7 - Cybersecurity experts","og_description":"CyberVision 24\/7 offers cybersecurity services that grow along with your business, guaranteeing proactive, long-term security.","og_url":"https:\/\/cybervision247.com\/en\/home\/","og_site_name":"Cybervision 24\/7","article_modified_time":"2024-02-20T18:23:24+00:00","og_image":[{"width":1920,"height":930,"url":"https:\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/apropos_banner2_cv247.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cybervision247.com\/en\/home\/","url":"https:\/\/cybervision247.com\/en\/home\/","name":"Cybervision 24\/7 - Cybersecurity experts","isPartOf":{"@id":"https:\/\/cybervision247.com\/#website"},"datePublished":"2024-02-02T15:12:25+00:00","dateModified":"2024-02-20T18:23:24+00:00","description":"CyberVision 24\/7 offers cybersecurity services that grow along with your business, guaranteeing proactive, long-term security.","breadcrumb":{"@id":"https:\/\/cybervision247.com\/en\/home\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybervision247.com\/en\/home\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cybervision247.com\/en\/home\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/cybervision247.com\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Home"}]},{"@type":"WebSite","@id":"https:\/\/cybervision247.com\/#website","url":"https:\/\/cybervision247.com\/","name":"Cybervision 24\/7","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybervision247.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/pages\/508"}],"collection":[{"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/comments?post=508"}],"version-history":[{"count":2,"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/pages\/508\/revisions"}],"predecessor-version":[{"id":589,"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/pages\/508\/revisions\/589"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/media\/396"}],"wp:attachment":[{"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/media?parent=508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}