{"id":10780,"date":"2023-10-04T15:25:41","date_gmt":"2023-10-04T15:25:41","guid":{"rendered":"https:\/\/btrust.ma\/wp\/?page_id=10780"},"modified":"2023-11-20T13:44:27","modified_gmt":"2023-11-20T13:44:27","slug":"information-security-technologies","status":"publish","type":"page","link":"https:\/\/btrust.ma\/en\/information-security-technologies\/","title":{"rendered":"Information security technologies"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"10780\" class=\"elementor elementor-10780\">\n\t\t\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-2bb6b1c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-section-line-left-no pxl-section-line-right-no pxl-section-static-pos-no pxl-section-overflow-hidden-no\" data-id=\"2bb6b1c1\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-11522f4c pxl-column-element-default pxl-column-overflow-hidden-no\" data-id=\"11522f4c\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-3b73168c pxl-wg-bd-anm-no elementor-widget elementor-widget-pxl_text_editor\" data-id=\"3b73168c\" data-element_type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"pxl_text_editor-3b73168c-9187\" class=\"pxl-text-editor-wrap d-flex\" >\n\t<div class=\"pxl-text-editor elementor-clearfix\">\n\t\t\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12adfdb8 pxl-wg-bd-anm-no elementor-widget elementor-widget-pxl_heading\" data-id=\"12adfdb8\" data-element_type=\"widget\" data-widget_type=\"pxl_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-heading-wrap d-flex\">\n    <div class=\"pxl-heading-inner\">\n                <div class=\"heading-title\">\n            Deployment of security solutions:        <\/div>\n            <\/div>\n<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39376f7 pxl-wg-bd-anm-no elementor-widget elementor-widget-pxl_text_editor\" data-id=\"39376f7\" data-element_type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"pxl_text_editor-39376f7-1767\" class=\"pxl-text-editor-wrap d-flex\" >\n\t<div class=\"pxl-text-editor elementor-clearfix\">\n\t\t<p>In partnership with leading solution providers, our team of experts helps you deploy and configure state-of-the-art security solutions to protect your digital assets. We ensure effective implementation and monitoring of your IT security.<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dc51ecf overflow-hidden pxl-wg-bd-anm-no elementor-widget elementor-widget-pxl_image\" data-id=\"1dc51ecf\" data-element_type=\"widget\" data-widget_type=\"pxl_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"pxl_image-1dc51ecf-7231\" class=\"pxl-image-wg bg-halp\">\r\n\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/btrust.ma\/wp-content\/uploads\/2023\/11\/d-s3-min.jpg\" class=\"elementor-animation-grow attachment-full size-full wp-image-11432\" alt=\"\" srcset=\"https:\/\/btrust.ma\/wp-content\/uploads\/2023\/11\/d-s3-min.jpg 800w, https:\/\/btrust.ma\/wp-content\/uploads\/2023\/11\/d-s3-min-768x576.jpg 768w, https:\/\/btrust.ma\/wp-content\/uploads\/2023\/11\/d-s3-min-16x12.jpg 16w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t<\/div>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-153f941c pxl-wg-bd-anm-no elementor-widget elementor-widget-pxl_heading\" data-id=\"153f941c\" data-element_type=\"widget\" data-widget_type=\"pxl_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-heading-wrap d-flex\">\n    <div class=\"pxl-heading-inner\">\n                <div class=\"heading-title\">\n            <br \/>\nDeployment of vulnerability scanning tools:        <\/div>\n            <\/div>\n<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f5a65c0 pxl-wg-bd-anm-no elementor-widget elementor-widget-pxl_text_editor\" data-id=\"7f5a65c0\" data-element_type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"pxl_text_editor-7f5a65c0-4279\" class=\"pxl-text-editor-wrap d-flex\" >\n\t<div class=\"pxl-text-editor elementor-clearfix\">\n\t\t<p>We offer you the opportunity to acquire and implement the best vulnerability scanning solutions on the market to monitor your system in real time and quickly identify potential new threats.<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-294fa669 pxl-wg-bd-anm-no elementor-widget elementor-widget-pxl_text_editor\" data-id=\"294fa669\" data-element_type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"pxl_text_editor-294fa669-8603\" class=\"pxl-text-editor-wrap d-flex\" >\n\t<div class=\"pxl-text-editor elementor-clearfix\">\n\t\t\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n                <div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6b1e53b5 pxl-column-element-default pxl-column-overflow-hidden-no\" data-id=\"6b1e53b5\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-16977a79 pxl-wg-bd-anm-no elementor-widget elementor-widget-pxl_heading\" data-id=\"16977a79\" data-element_type=\"widget\" data-widget_type=\"pxl_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-heading-wrap d-flex\">\n    <div class=\"pxl-heading-inner\">\n                <div class=\"heading-title\">\n            NOS SERVICES        <\/div>\n            <\/div>\n<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b784d7d pxl-links-layout-2 pxl-wg-bd-anm-yes elementor-widget elementor-widget-pxl_links\" data-id=\"4b784d7d\" data-element_type=\"widget\" data-widget_type=\"pxl_links.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-border-animated num-4\">\r\n        <div class=\"pxl-border-anm bt w-100  bw-yes\" style=\"--bd-width: 1px 0 0 0; border-style: solid; border-color: #F4F5F5;\"><\/div>\r\n        <div class=\"pxl-border-anm br h-100  bw-yes\" style=\"--bd-width: 0 1px 0 0; border-style: solid; border-color: #F4F5F5;\"><\/div>\r\n        <div class=\"pxl-border-anm bb w-100  bw-yes\" style=\"--bd-width: 0 0 1px 0; border-style: solid; border-color: #F4F5F5;\"><\/div>\r\n        <div class=\"pxl-border-anm bl h-100  bw-yes\" style=\"--bd-width: 0 0 0 1px; border-style: solid; border-color: #F4F5F5;\"><\/div>\r\n        <\/div>    <ul class=\"pxl-links d-flex flex-column layout-2 list-unstyled\">\r\n                            <li class=\"link-item\">\r\n                        <a href=\"\/en\/grc\/\">\r\n                            <span>Consulting in Governance, Risk and Compliance (GRC)<\/span>\r\n                        <\/a>\r\n                    <\/li>\r\n                                \r\n                            <li class=\"link-item\">\r\n                        <a href=\"\/en\/cybersecurity-Services\/\">\r\n                            <span>Cybersecurity Services<\/span>\r\n                        <\/a>\r\n                    <\/li>\r\n                                \r\n                            <li class=\"link-item\">\r\n                        <a href=\"\/en\/information-security-technologies\/\">\r\n                            <span>Information security technologies<\/span>\r\n                        <\/a>\r\n                    <\/li>\r\n                                \r\n                            <li class=\"link-item\">\r\n                        <a href=\"\/en\/training-awareness\/\">\r\n                            <span>Training and awareness-raising<\/span>\r\n                        <\/a>\r\n                    <\/li>\r\n                                \r\n            <\/ul>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77715c6a pxl-banner-layout-2 pxl-wg-bd-anm-no elementor-invisible pxl-elementor-animate elementor-widget elementor-widget-pxl_banner\" data-id=\"77715c6a\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"pxl_banner.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-banner layout-2\">\r\n    <div class=\"banner-inner relative overflow-hidden pxl-parallax-background\">\r\n                    <div class=\"img-box parallax-inner\" style=\"background-image: url('http:\/\/btrust.ma\/wp\/wp-content\/uploads\/2022\/12\/service-detail-img4s.jpg');\" ><\/div>\r\n                <div class=\"pxl-overlay\"><\/div>\r\n        <div class=\"bn-content text-center absolute\">\r\n                            <a href=\"#\">\r\n                                        <div class=\"bn-title\" data-parallax='{\"y\": -30}'>Best Architecture Consulting Services<\/div>\r\n             \r\n                            <\/a>\r\n                    <\/div>\r\n    <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>D\u00e9ploiement de solutions de s\u00e9curit\u00e9 : En partenariat avec des grands \u00e9diteurs de solutions, notre \u00e9quipe d&#8217;experts vous aide \u00e0 d\u00e9ployer et \u00e0 configurer des solutions de s\u00e9curit\u00e9 de pointe pour prot\u00e9ger vos actifs num\u00e9riques. Nous vous assurons une mise en \u0153uvre efficace et un suivi de votre s\u00e9curit\u00e9 informatique. D\u00e9ploiement des outils de scan [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-10780","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/btrust.ma\/en\/wp-json\/wp\/v2\/pages\/10780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/btrust.ma\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/btrust.ma\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/btrust.ma\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/btrust.ma\/en\/wp-json\/wp\/v2\/comments?post=10780"}],"version-history":[{"count":28,"href":"https:\/\/btrust.ma\/en\/wp-json\/wp\/v2\/pages\/10780\/revisions"}],"predecessor-version":[{"id":11435,"href":"https:\/\/btrust.ma\/en\/wp-json\/wp\/v2\/pages\/10780\/revisions\/11435"}],"wp:attachment":[{"href":"https:\/\/btrust.ma\/en\/wp-json\/wp\/v2\/media?parent=10780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}