{"id":14945,"date":"2025-02-20T15:43:51","date_gmt":"2025-02-20T15:43:51","guid":{"rendered":"https:\/\/merakytech.com\/?page_id=14945"},"modified":"2025-04-07T13:34:01","modified_gmt":"2025-04-07T13:34:01","slug":"cybersecurity-data-protection","status":"publish","type":"page","link":"https:\/\/merakytech.com\/en\/cybersecurity-data-protection\/","title":{"rendered":"Cybersecurity, data protection"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"14945\" class=\"elementor elementor-14945\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f2857a0 e-con-full e-flex e-con e-parent\" data-id=\"f2857a0\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-f7c1606 e-con-full e-flex e-con e-child\" data-id=\"f7c1606\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-95e732e exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"95e732e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Company experts in Cybersecurity<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf5a6ca exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"cf5a6ca\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our cybersecurity experts at the service of your infrastructure. Let's work together to secure your business and your data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-421ce68 e-con-full e-flex e-con e-child\" data-id=\"421ce68\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b18254 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-shortcode\" data-id=\"6b18254\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><script type=\"module\" src=\"https:\/\/unpkg.com\/@splinetool\/viewer@1.9.68\/build\/spline-viewer.js\"><\/script>\n<spline-viewer url=\"https:\/\/prod.spline.design\/4Uiggb2EFzpGivac\/scene.splinecode\"><\/spline-viewer><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7fdca2f elementor-hidden-tablet_extra elementor-hidden-tablet elementor-hidden-mobile_extra elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"7fdca2f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba21148 elementor-widget__width-auto exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"ba21148\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our certifications<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-620e62d exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-image-gallery\" data-id=\"620e62d\" data-element_type=\"widget\" data-widget_type=\"image-gallery.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-gallery\">\n\t\t\t<div id='gallery-1' class='gallery galleryid-14945 gallery-columns-4 gallery-size-thumbnail'><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"620e62d\" data-elementor-lightbox-title=\"images-1-150x150\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTUwMTYsInVybCI6Imh0dHBzOlwvXC9tZXJha3l0ZWNoLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDJcL2ltYWdlcy0xLTE1MHgxNTAtMS53ZWJwIiwic2xpZGVzaG93IjoiNjIwZTYyZCJ9\" href='https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/images-1-150x150-1.webp'><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/images-1-150x150-1.webp\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" srcset=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/images-1-150x150-1.webp 150w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/images-1-150x150-1-12x12.webp 12w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"620e62d\" data-elementor-lightbox-title=\"image-150x150\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTUwMTUsInVybCI6Imh0dHBzOlwvXC9tZXJha3l0ZWNoLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDJcL2ltYWdlLTE1MHgxNTAtMS53ZWJwIiwic2xpZGVzaG93IjoiNjIwZTYyZCJ9\" href='https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/image-150x150-1.webp'><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/image-150x150-1.webp\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" srcset=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/image-150x150-1.webp 150w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/image-150x150-1-12x12.webp 12w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"620e62d\" data-elementor-lightbox-title=\"PMP logo\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTUwMTIsInVybCI6Imh0dHBzOlwvXC9tZXJha3l0ZWNoLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDJcL1BNUC1sb2dvLndlYnAiLCJzbGlkZXNob3ciOiI2MjBlNjJkIn0%3D\" href='https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/PMP-logo.webp'><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/PMP-logo-150x150.webp\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" srcset=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/PMP-logo-150x150.webp 150w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/PMP-logo-300x300.webp 300w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/PMP-logo-12x12.webp 12w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/PMP-logo.webp 500w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"620e62d\" data-elementor-lightbox-title=\"blob-150x150\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTUwMjksInVybCI6Imh0dHBzOlwvXC9tZXJha3l0ZWNoLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDJcL2Jsb2ItMTUweDE1MC0xLndlYnAiLCJzbGlkZXNob3ciOiI2MjBlNjJkIn0%3D\" href='https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/blob-150x150-1.webp'><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/blob-150x150-1.webp\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" srcset=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/blob-150x150-1.webp 150w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/blob-150x150-1-12x12.webp 12w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a>\n\t\t\t<\/div><\/figure>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-545a52e elementor-hidden-widescreen elementor-hidden-desktop elementor-hidden-laptop e-flex e-con-boxed e-con e-parent\" data-id=\"545a52e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-38aaae9 elementor-widget__width-auto exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"38aaae9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our certifications<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e8a562 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-qi_addons_for_elementor_clients_list\" data-id=\"5e8a562\" data-element_type=\"widget\" data-widget_type=\"qi_addons_for_elementor_clients_list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m qodef-qi-clients-list qodef-border--no qodef-qi-grid qodef-layout--qi-columns qodef-col-num--3 qodef-responsive--custom qodef-col-num--1680--4 qodef-col-num--1440--4 qodef-col-num--1366--4 qodef-col-num--1024--4 qodef-col-num--768--4 qodef-col-num--680--4 qodef-col-num--480--2\">\n\t<div class=\"qodef-grid-inner\">\n\t\t<div class=\"qodef-e qodef-grid-item\">\n\t<div class=\"qodef-e-inner\">\n\t\t\t\t<div class=\"qodef-e-images-holder\">\n\t\t\t\t\t\t\t<div class=\"qodef-e-main-image\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/images-1-150x150-1.webp\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/images-1-150x150-1.webp 150w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/images-1-150x150-1-12x12.webp 12w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"qodef-e qodef-grid-item\">\n\t<div class=\"qodef-e-inner\">\n\t\t\t\t<div class=\"qodef-e-images-holder\">\n\t\t\t\t\t\t\t<div class=\"qodef-e-main-image\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/image-150x150-1.webp\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/image-150x150-1.webp 150w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/image-150x150-1-12x12.webp 12w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"qodef-e-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>\t\t\t<\/div>\n\t<\/div>\n<\/div>\n<div class=\"qodef-e qodef-grid-item\">\n\t<div class=\"qodef-e-inner\">\n\t\t\t\t<div class=\"qodef-e-images-holder\">\n\t\t\t\t\t\t\t<div class=\"qodef-e-main-image\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/blob-150x150-1.webp\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/blob-150x150-1.webp 150w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/blob-150x150-1-12x12.webp 12w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"qodef-e qodef-grid-item\">\n\t<div class=\"qodef-e-inner\">\n\t\t\t\t<div class=\"qodef-e-images-holder\">\n\t\t\t\t\t\t\t<div class=\"qodef-e-main-image\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/PMP-logo.webp\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/PMP-logo.webp 500w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/PMP-logo-300x300.webp 300w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/PMP-logo-150x150.webp 150w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/PMP-logo-12x12.webp 12w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n\t<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-14a206d e-con-full elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet_extra elementor-hidden-tablet elementor-hidden-mobile_extra elementor-hidden-mobile e-flex e-con e-parent\" data-id=\"14a206d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-51a67c5 e-flex e-con-boxed e-con e-child\" data-id=\"51a67c5\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5d6a6f elementor-widget__width-auto exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"b5d6a6f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">IT security, Penetration testing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86dba09 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"86dba09\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"764\" src=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Entreprise-de-cybersecurite-Meraky-Tech.webp\" class=\"attachment-full size-full wp-image-15045\" alt=\"\" srcset=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Entreprise-de-cybersecurite-Meraky-Tech.webp 2000w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Entreprise-de-cybersecurite-Meraky-Tech-300x115.webp 300w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Entreprise-de-cybersecurite-Meraky-Tech-1024x391.webp 1024w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Entreprise-de-cybersecurite-Meraky-Tech-768x293.webp 768w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Entreprise-de-cybersecurite-Meraky-Tech-1536x587.webp 1536w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Entreprise-de-cybersecurite-Meraky-Tech-18x7.webp 18w\" sizes=\"(max-width: 2000px) 100vw, 2000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c0f085a e-con-full elementor-hidden-widescreen e-flex e-con e-parent\" data-id=\"c0f085a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-2816061 e-flex e-con-boxed e-con e-child\" data-id=\"2816061\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6398b31 elementor-widget__width-auto exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"6398b31\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">IT security, Penetration testing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01188a9 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"01188a9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"293\" src=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Entreprise-de-cybersecurite-Meraky-Tech-768x293.webp\" class=\"attachment-medium_large size-medium_large wp-image-15045\" alt=\"\" srcset=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Entreprise-de-cybersecurite-Meraky-Tech-768x293.webp 768w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Entreprise-de-cybersecurite-Meraky-Tech-300x115.webp 300w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Entreprise-de-cybersecurite-Meraky-Tech-1024x391.webp 1024w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Entreprise-de-cybersecurite-Meraky-Tech-1536x587.webp 1536w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Entreprise-de-cybersecurite-Meraky-Tech-18x7.webp 18w, https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Entreprise-de-cybersecurite-Meraky-Tech.webp 2000w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fff1232 e-con-full e-flex e-con e-parent\" data-id=\"fff1232\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1fb5f9a exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"1fb5f9a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the digital age, infrastructure security and the protection of sensitive data are top priorities for every organization. Visit <strong>cyber threats<\/strong> are multiplying and constantly evolving, requiring robust defense strategies adapted to emerging risks. Our <strong>cyber security<\/strong> and data protection services draw on advanced technologies and proven expertise to anticipate, detect and counter any intrusion attempt. This service, designed for companies operating in an international environment, guarantees optimum protection and compliance with the most stringent security standards.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb7f414 e-con-full e-flex e-con e-parent\" data-id=\"eb7f414\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0251a12 elementor-widget__width-auto exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"0251a12\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our approach to cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc7f18a e-con-full e-flex e-con e-parent\" data-id=\"bc7f18a\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-740ddce e-con-full e-flex e-con e-child\" data-id=\"740ddce\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-172f393 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-spacer\" data-id=\"172f393\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93f4e67 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"93f4e67\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Safety assessment and audit<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f83bfc8 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"f83bfc8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Complete diagnosis of infrastructure vulnerabilities and weaknesses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-427a043 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-spacer\" data-id=\"427a043\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01d1396 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"01d1396\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Setting up defense strategies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0293e6 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"a0293e6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Development of security protocols, deployment of protection tools and configuration of monitoring solutions<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9f890ca e-con-full e-flex e-con e-child\" data-id=\"9f890ca\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c37381 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-video\" data-id=\"9c37381\" data-element_type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;hosted&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;mute&quot;:&quot;yes&quot;,&quot;loop&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-hosted-video elementor-wrapper elementor-open-inline\">\n\t\t\t\t\t<video class=\"elementor-video\" src=\"http:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Cybersecurite-Meraky-Tech1.mp4\" autoplay=\"\" loop=\"\" muted=\"muted\" controlslist=\"nodownload\"><\/video>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc9ef8a e-con-full e-flex e-con e-child\" data-id=\"bc9ef8a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d8a8eff exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-spacer\" data-id=\"d8a8eff\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25cb35d exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"25cb35d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Penetration tests and simulations<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52f4ca1 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"52f4ca1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Intrusion testing to identify potential vulnerabilities and strengthen defense against attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77b262e exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-spacer\" data-id=\"77b262e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bcb2b38 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"bcb2b38\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Training and awareness-raising<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d3c4aa exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"4d3c4aa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Training programs to reinforce team vigilance and instill a culture of cybersecurity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c8ad1f e-con-full e-flex e-con e-parent\" data-id=\"0c8ad1f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2937ab5 elementor-widget__width-auto exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"2937ab5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Implementation phases of our solutions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b24780b e-flex e-con-boxed e-con e-parent\" data-id=\"b24780b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-99efee5 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-ucaddon_stacking_cards\" data-id=\"99efee5\" data-element_type=\"widget\" data-widget_type=\"ucaddon_stacking_cards.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Stacking Cards -->\n\t\t<link id='font-awesome-css' href='https:\/\/merakytech.com\/modules14\/assets_libraries\/font-awesome6\/fontawesome-all.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='font-awesome-4-shim-css' href='https:\/\/merakytech.com\/modules14\/assets_libraries\/font-awesome6\/fontawesome-v4-shims.min.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Stacking Cards *\/\n\n#uc_stacking_cards_elementor_99efee5 {\n\twidth: 100%;\n\tmargin: 0 auto;\n\t--card-top-offset: 20px;\n    --card-height:600px;\n}\n\n@media (max-width: 1024px) {\n  #uc_stacking_cards_elementor_99efee5 {\n\t--card-top-offset:  20px;\n    --card-height:600px;\n  }\n}\n@media (max-width: 767px) {\n  #uc_stacking_cards_elementor_99efee5 {\n\t--card-top-offset:  20px;\n    --card-height: 600px;\n  }\n}\n\n\n#uc_stacking_cards_elementor_99efee5 .ue_cards_wrapper {\n    padding-bottom: calc(4 * var(--card-top-offset)); \/* Make place at bottom, as items will slide to that position*\/\n  \tdisplay: grid;\n    justify-items: center;\n\tgrid-template-columns: 1fr;\n    grid-template-rows: repeat(4, var(--card-height));\n    \/* margin-bottom: var(--card-margin);\n\tgap: var(--card-margin); *\/\n}\n\n#uc_stacking_cards_elementor_99efee5 .ue_stacking_card_item {\n\t\/*position: sticky;*\/\/* will be nabled in js to allow calc of start position of the cards *\/\n    padding-top: var(--card-top-offset);\n\ttransform-origin: 50 0;\n\twill-change: transform;\n}\n\n#uc_stacking_cards_elementor_99efee5 .ue_card_content {\n    height: var(--card-height);\n    min-height: var(--card-height);\n\toverflow: hidden;\n\tdisplay: flex;\n\talign-items: stretch;\n}\n\n#uc_stacking_cards_elementor_99efee5 .ue_content_left {\n\tplace-self: center;\n\tdisplay: grid;\n    align-content: center;\n    flex-shrink: 0;\n    }\n\n#uc_stacking_cards_elementor_99efee5 .ue_card_content > figure {\n\toverflow: hidden;\n    flex-grow: 1;\n}\n\n#uc_stacking_cards_elementor_99efee5 .ue_card_content > figure > .ue_sc_img {\n\twidth: 100%;\n\theight: 100%;\n}\n\n#uc_stacking_cards_elementor_99efee5 .ue_sc_button {\n\tdisplay: inline-block;\n    height: fit-content;\n    overflow:hidden;\n}\n\n\n\n\/* soft styles*\/\n.ue_sc_title {\n\tfont-weight: 300;\n\tfont-size: 2.4em;\n    line-height: 1.2;\n}\n\n.ue_sc_desc {\n\tfont-weight: 300;\n\tline-height: 1.42;\n}\n.ue_stacking_card_item {\n  width:100%;\n}\n.ue_card_content {\n\tbox-shadow: 0px 10px 40px 0px rgba(0, 0, 0, 0.30);\n}\n\/* *\/\n\n\/* start creative button hover styles *\/\n#uc_stacking_cards_elementor_99efee5 .uc_content{\n  display: flex;\n  flex-wrap: wrap;\n}\n\n\/* GENERAL BUTTON STYLING *\/\n#uc_stacking_cards_elementor_99efee5 .uc_button {\n  overflow:hidden;\n}\n\n#uc_stacking_cards_elementor_99efee5 .uc_button,\n#uc_stacking_cards_elementor_99efee5 .uc_button::after {\n\ttransition: all 0.3s;\n}\n\n#uc_stacking_cards_elementor_99efee5 .uc_button {\n  position: relative;\n}\n\n#uc_stacking_cards_elementor_99efee5 .uc_button span{\n  z-index: 2;\n  position: relative;\n  display: block;\n}\n\n#uc_stacking_cards_elementor_99efee5 .uc_button::before,\n#uc_stacking_cards_elementor_99efee5 .uc_button::after {\n  content: '';\n  position: absolute;\n  z-index: 1;\n}\n\n\/* BUTTON 1 *\/\n#uc_stacking_cards_elementor_99efee5 .uc_btn-1::after {\n  height: 0;\n  left: 0;\n  top: 0;\n  width: 100%;\n}\n\n#uc_stacking_cards_elementor_99efee5 .uc_btn-1:hover:after {\n  height: 100%;\n}\n\n\/* BUTTON 7 *\/\n#uc_stacking_cards_elementor_99efee5 .uc_btn-7::after {\n  height: 0;\n  left: 0;\n  bottom: 0;\n  width: 100%;\n}\n\n#uc_stacking_cards_elementor_99efee5 .uc_btn-7:hover:after {\n  height: 100%;\n}\n\n\/* BUTTON 2 *\/\n#uc_stacking_cards_elementor_99efee5 .uc_btn-2::after {\n  height: 100%;\n  left: 0;\n  top: 0;\n  width: 0;\n}\n\n#uc_stacking_cards_elementor_99efee5 .uc_btn-2:hover:after {\n  width: 100%;\n}\n\n\/* BUTTON 6 *\/\n#uc_stacking_cards_elementor_99efee5 .uc_btn-6::after {\n  height: 100%;\n  right: 0;\n  top: 0;\n  width: 0;\n}\n\n#uc_stacking_cards_elementor_99efee5 .uc_btn-6:hover:after {\n  width: 100%;\n}\n\n\/* BUTTON 3 *\/\n#uc_stacking_cards_elementor_99efee5 .uc_btn-3::after {\n  height: 0;\n  left: 50%;\n  top: 50%;\n  width: 0;\n}\n\n#uc_stacking_cards_elementor_99efee5 .uc_btn-3:hover:after {\n  height: 100%;\n  left: 0;\n  top: 0;\n  width: 100%;\n}\n\n\n\/* BUTTON 4 *\/\n#uc_stacking_cards_elementor_99efee5 .uc_btn-4::before {\n}\n\n#uc_stacking_cards_elementor_99efee5 .uc_btn-4::after {\n  height: 100%;\n  left: 0;\n  top: 0;\n  width: 100%;\n}\n\n#uc_stacking_cards_elementor_99efee5 .uc_btn-4:hover:after{\n  height: 0;\n  left: 50%;\n  top: 50%;\n  width: 0;\n}\n\n\n\/* BUTTON 5 *\/\n#uc_stacking_cards_elementor_99efee5 .uc_btn-5 {\n  overflow: hidden;\n}\n\n#uc_stacking_cards_elementor_99efee5 .uc_btn-5::after {\n  height: 100%;\n  left: -100%;\n  top: 0;\n  transform: skew(50deg);\n  transition-duration: 0.6s;\n  transform-origin: top left;\n  width: 0;\n}\n\n#uc_stacking_cards_elementor_99efee5 .uc_btn-5:hover:after {\n  height: 100%;\n  width: 200%;\n}\n\/* end styles *\/\n#uc_stacking_cards_elementor_99efee5 .ue_content_wrapper {\n  display: flex;\n  align-items: stretch;\n  position:relative;\n  height:100%;\n  width: 100%;\n}\n#uc_stacking_cards_elementor_99efee5 .ue_stacking_card_item.uc-item-error .ue_content_wrapper,\n#uc_stacking_cards_elementor_99efee5 .ue_stacking_card_item.uc-item-message .ue_content_wrapper{\n  justify-content: center;\n  align-items: center;\n}\n#uc_stacking_cards_elementor_99efee5 .uc-error{\n  color:red;\n  font-weight:500;\n}\n#uc_stacking_cards_elementor_99efee5 .uc-message{\n  font-weight:500;\n}\n.elementor-repeater-item-48e5739 {\n  padding-top: calc(1 * var(--card-top-offset))!important;\n}\n.elementor-repeater-item-787ffd4 {\n  padding-top: calc(2 * var(--card-top-offset))!important;\n}\n.elementor-repeater-item-bfe5671 {\n  padding-top: calc(3 * var(--card-top-offset))!important;\n}\n.elementor-repeater-item-37d0ffe {\n  padding-top: calc(4 * var(--card-top-offset))!important;\n}\n\n\n<\/style>\n\n<div id=\"uc_stacking_cards_elementor_99efee5\" data-editor=\"no\" data-errors=\"false\" data-show-section=\"false\" class=\"ue_stacking_cards_widget uc_creative_buttons\"   dir=\"ltr\">\n\t<div class=\"ue_cards_wrapper uc-items-wrapper\">\n      <div class=\"ue_stacking_card_item elementor-repeater-item-48e5739 ueitem-1\" data-source=\"normal\" data-id=\"\">\n  <div class=\"ue_card_content\" style=\"background-image: url();\">\n    \n          <div class=\"ue_content_left\">\n                <div class=\"ue_sc_title\">Safety audits and diagnostics<\/div>        <div class=\"ue_sc_desc\">- Complete audit of all IT systems and networks.<br> \n<br>\n- Identification of vulnerabilities through in-depth analysis and attack simulations.<br>\n<br> \n- Drawing up a detailed report with specific recommendations to enhance safety.<\/div>\t          <\/div>\n\t  <figure><img loading=\"lazy\" decoding=\"async\" class=\"ue_sc_img\" src=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Audit-et-diagnostic-de-securite.webp\" alt=\"Image description\"  width=\"1268\" height=\"1268\" title=\"Safety audits and diagnostics\"><\/figure>      \n      \n      \n  <\/div>\n<\/div>\n<div class=\"ue_stacking_card_item elementor-repeater-item-787ffd4 ueitem-2\" data-source=\"normal\" data-id=\"\">\n  <div class=\"ue_card_content\" style=\"background-image: url();\">\n    \n          <div class=\"ue_content_left\">\n                <div class=\"ue_sc_title\">Design and deployment of safety measures<\/div>        <div class=\"ue_sc_desc\">- Implementation of security solutions for networks, servers and cloud environments.<br>\n<br>\n- Configuration of state-of-the-art firewalls, intrusion detection systems and antivirus solutions.<br>\n<br>\n- Integration of encryption and strong authentication protocols to protect data exchanges.<\/div>\t          <\/div>\n\t  <figure><img loading=\"lazy\" decoding=\"async\" class=\"ue_sc_img\" src=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Conception-et-deploiement-des-mesures-de-securite-2-768x768.webp\" alt=\"Image description\"  width=\"768\" height=\"768\" title=\"Design and deployment of safety measures 2\"><\/figure>      \n      \n      \n  <\/div>\n<\/div>\n<div class=\"ue_stacking_card_item elementor-repeater-item-bfe5671 ueitem-3\" data-source=\"normal\" data-id=\"\">\n  <div class=\"ue_card_content\" style=\"background-image: url();\">\n    \n          <div class=\"ue_content_left\">\n                <div class=\"ue_sc_title\">Penetration testing and continuous assessment<\/div>        <div class=\"ue_sc_desc\">- Regular penetration tests to check system robustness.<br>\n<br>\n- Implementation of a real-time monitoring system to detect any suspicious activity.<br>\n<br>\n- Adjustment of safety measures based on test results and feedback.<\/div>\t          <\/div>\n\t  <figure><img loading=\"lazy\" decoding=\"async\" class=\"ue_sc_img\" src=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Tests-dintrusion-et-evaluation-continue-768x768.webp\" alt=\"Image description\"  width=\"768\" height=\"768\" title=\"Penetration testing and continuous assessment\"><\/figure>      \n      \n      \n  <\/div>\n<\/div>\n<div class=\"ue_stacking_card_item elementor-repeater-item-37d0ffe ueitem-4\" data-source=\"normal\" data-id=\"\">\n  <div class=\"ue_card_content\" style=\"background-image: url();\">\n    \n          <div class=\"ue_content_left\">\n                <div class=\"ue_sc_title\">Team training and awareness<\/div>        <div class=\"ue_sc_desc\">- Organization of training sessions for teams in cybersecurity best practices.<br> \n<br> \n- Deployment of awareness campaigns to reinforce vigilance and prevent human error.<br>\n<br>\n- Provision of resources and safety guides accessible to all employees.<\/div>\t          <\/div>\n\t  <figure><img loading=\"lazy\" decoding=\"async\" class=\"ue_sc_img\" src=\"https:\/\/merakytech.com\/php_assets\/uploads\/2025\/02\/Formation-et-sensibilisation-des-equipes-768x768.webp\" alt=\"Image description\"  width=\"768\" height=\"768\" title=\"Team training and awareness\"><\/figure>      \n      \n      \n  <\/div>\n<\/div>\n\n\t<\/div>\n<\/div>\n<!-- end Stacking Cards -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e915d4a e-con-full e-flex e-con e-parent\" data-id=\"e915d4a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a7f92b elementor-widget__width-auto exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"5a7f92b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Let's get started on your cybersecurity program<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a2199c3 e-flex e-con-boxed e-con e-parent\" data-id=\"a2199c3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-68a9a37 e-con-full e-flex e-con e-child\" data-id=\"68a9a37\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e2aed8 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"3e2aed8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">International approach and customization<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17404dc exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"17404dc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Thanks to our presence in strategic areas such as Washington D.C., Abidjan, Conakry and Montreal, we are able to adapt our solutions to local requirements, while respecting international standards. This personalized approach enables us to take into account the specific features of each market, and ensure global protection for all infrastructures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d8af362 e-con-full e-flex e-con e-child\" data-id=\"d8af362\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-277d67e exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"277d67e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Post-deployment support and follow-up<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf16672 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"cf16672\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our commitment to cybersecurity translates into long-term support. We provide ongoing monitoring with regular audits, security updates and training to ensure constant protection, adapted to the changing cyber threat landscape. Faced with an ever-increasing number of cyber-attacks, it is essential to adopt a global, proactive cybersecurity strategy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b284cf e-flex e-con-boxed e-con e-parent\" data-id=\"5b284cf\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7ccaf99 e-con-full e-flex e-con e-child\" data-id=\"7ccaf99\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-59329af e-con-full e-flex e-con e-child\" data-id=\"59329af\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a8be611 elementor-widget-widescreen__width-auto exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-ucaddon_underline_link_hover_effect\" data-id=\"a8be611\" data-element_type=\"widget\" data-widget_type=\"ucaddon_underline_link_hover_effect.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Underline Link Hover Effect -->\n\n<style>\/* widget: Underline Link Hover Effect *\/\n\n#uc_underline_link_hover_effect_elementor_a8be611{\n  display:flex;\n} \n\n#uc_underline_link_hover_effect_elementor_a8be611 a.ue-link{\n  display:flex;\n  position:relative;\n  align-items:center;\n  justify-content:center;\n  text-decoration:none;\n}\n\n#uc_underline_link_hover_effect_elementor_a8be611 a.ue-link:after{\n  content: \"\";\n    width:100%;\n    position:absolute;\n  bottom:0px;\n    left:0px;\n    display: block;\n  transition:1s;\n}\n\n#uc_underline_link_hover_effect_elementor_a8be611 a:hover:after{\n    width:0%;\n  }\n\n#uc_underline_link_hover_effect_elementor_a8be611 .ue-link-hover-effect-spacing{\n  transition:1s;\n}\n\n#uc_underline_link_hover_effect_elementor_a8be611 .ue-link-hover-effect-text{\n  padding:10px 0px;\n}\n\n#uc_underline_link_hover_effect_elementor_a8be611 .ue-link-hover-effect-icon{\n  line-height:1em;\n  transition:1s;\n}\n\n#uc_underline_link_hover_effect_elementor_a8be611 .ue-link-hover-effect-icon svg{\n  height:1em;\n  width:1em;\n}\n\n<\/style>\n\n<div id=\"uc_underline_link_hover_effect_elementor_a8be611\" class=\"ue-link-wrap\">\n  <a class=\"ue-link\" href=\"https:\/\/merakytech.com\/contact\/\" >\n    <div class=\"ue-link-hover-effect-text\">Start your project now<\/div>\n    <div class=\"ue-link-hover-effect-spacing\"><\/div>\n    <div class=\"ue-link-hover-effect-icon\"><i class='fas fa-arrow-right'><\/i><\/div>\n  <\/a>\n<\/div>\n<!-- end Underline Link Hover Effect -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c17e11 e-con-full e-flex e-con e-child\" data-id=\"7c17e11\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f870a39 e-con-full e-flex e-con e-parent\" data-id=\"f870a39\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-711911c elementor-widget__width-auto exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"711911c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">FAQ - Cybersecurity &amp; Data protection<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7bbff15 e-flex e-con-boxed e-con e-parent\" data-id=\"7bbff15\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4fb14b2 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-exad-exclusive-accordion\" data-id=\"4fb14b2\" data-element_type=\"widget\" data-widget_type=\"exad-exclusive-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t    \r\n        <div class=\"exad-accordion-items\">\r\n        \t\r\n                <div class=\"exad-accordion-single-item elementor-repeater-item-005dcd7\">\r\n                    <div class=\"exad-accordion-title active-default\">\r\n\r\n\t\t\t\t\t\t\r\n                        <h3 class=\"exad-accordion-heading\">\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t\tWhat are the key elements of a security audit?\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<\/h3>\r\n\r\n                                                    <div class=\"exad-active-inactive-icon\">\r\n                                                                    <span class=\"exad-active-icon\">\r\n                                        <svg class=\"e-font-icon-svg e-fas-angle-up\" viewbox=\"0 0 320 512\"><path d=\"M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z\"><\/path><\/svg>                                    <\/span>                            \r\n                                                                                                    <span class=\"exad-inactive-icon\">\r\n                                        <svg class=\"e-font-icon-svg e-fas-angle-down\" viewbox=\"0 0 320 512\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg>                                    <\/span>\r\n                                                            <\/div>\r\n                                            <\/div>\r\n\r\n                    <div class=\"exad-accordion-content\">\r\n                        <div class=\"exad-accordion-content-wrapper has-image-no image-position-right\">\r\n                            <div class=\"exad-accordion-text\">\r\n                                <div> <p>A comprehensive audit includes infrastructure analysis, vulnerability identification, penetration testing and recommendations for strengthening security.<\/p><\/div>\r\n                                                            <\/div>\r\n\r\n                            \r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                            \r\n                <div class=\"exad-accordion-single-item elementor-repeater-item-fd78422\">\r\n                    <div class=\"exad-accordion-title\">\r\n\r\n\t\t\t\t\t\t\r\n                        <h3 class=\"exad-accordion-heading\">\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t\tHow does an intrusion test work?\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<\/h3>\r\n\r\n                                                    <div class=\"exad-active-inactive-icon\">\r\n                                                                    <span class=\"exad-active-icon\">\r\n                                        <svg class=\"e-font-icon-svg e-fas-angle-up\" viewbox=\"0 0 320 512\"><path d=\"M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z\"><\/path><\/svg>                                    <\/span>                            \r\n                                                                                                    <span class=\"exad-inactive-icon\">\r\n                                        <svg class=\"e-font-icon-svg e-fas-angle-down\" viewbox=\"0 0 320 512\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg>                                    <\/span>\r\n                                                            <\/div>\r\n                                            <\/div>\r\n\r\n                    <div class=\"exad-accordion-content\">\r\n                        <div class=\"exad-accordion-content-wrapper has-image-no image-position-right\">\r\n                            <div class=\"exad-accordion-text\">\r\n                                <div> <p>We simulate real attacks to identify security vulnerabilities, then propose corrective measures to remedy them.<\/p><\/div>\r\n                                                            <\/div>\r\n\r\n                            \r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                            \r\n                <div class=\"exad-accordion-single-item elementor-repeater-item-810606f\">\r\n                    <div class=\"exad-accordion-title\">\r\n\r\n\t\t\t\t\t\t\r\n                        <h3 class=\"exad-accordion-heading\">\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t\tWhat technologies do you use to secure data?\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<\/h3>\r\n\r\n                                                    <div class=\"exad-active-inactive-icon\">\r\n                                                                    <span class=\"exad-active-icon\">\r\n                                        <svg class=\"e-font-icon-svg e-fas-angle-up\" viewbox=\"0 0 320 512\"><path d=\"M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z\"><\/path><\/svg>                                    <\/span>                            \r\n                                                                                                    <span class=\"exad-inactive-icon\">\r\n                                        <svg class=\"e-font-icon-svg e-fas-angle-down\" viewbox=\"0 0 320 512\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg>                                    <\/span>\r\n                                                            <\/div>\r\n                                            <\/div>\r\n\r\n                    <div class=\"exad-accordion-content\">\r\n                        <div class=\"exad-accordion-content-wrapper has-image-no image-position-right\">\r\n                            <div class=\"exad-accordion-text\">\r\n                                <div> <p>We use firewalls, intrusion detection systems, antivirus solutions, encryption and strong authentication protocols.<\/p><\/div>\r\n                                                            <\/div>\r\n\r\n                            \r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                            \r\n                <div class=\"exad-accordion-single-item elementor-repeater-item-8037bb4\">\r\n                    <div class=\"exad-accordion-title\">\r\n\r\n\t\t\t\t\t\t\r\n                        <h3 class=\"exad-accordion-heading\">\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t\tDo you offer training to raise staff awareness of cybersecurity?\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<\/h3>\r\n\r\n                                                    <div class=\"exad-active-inactive-icon\">\r\n                                                                    <span class=\"exad-active-icon\">\r\n                                        <svg class=\"e-font-icon-svg e-fas-angle-up\" viewbox=\"0 0 320 512\"><path d=\"M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z\"><\/path><\/svg>                                    <\/span>                            \r\n                                                                                                    <span class=\"exad-inactive-icon\">\r\n                                        <svg class=\"e-font-icon-svg e-fas-angle-down\" viewbox=\"0 0 320 512\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg>                                    <\/span>\r\n                                                            <\/div>\r\n                                            <\/div>\r\n\r\n                    <div class=\"exad-accordion-content\">\r\n                        <div class=\"exad-accordion-content-wrapper has-image-no image-position-right\">\r\n                            <div class=\"exad-accordion-text\">\r\n                                <div> <p>Yes, we organize training sessions and awareness campaigns to reinforce employee vigilance.<\/p><\/div>\r\n                                                            <\/div>\r\n\r\n                            \r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                            \r\n                <div class=\"exad-accordion-single-item elementor-repeater-item-2256ef6\">\r\n                    <div class=\"exad-accordion-title\">\r\n\r\n\t\t\t\t\t\t\r\n                        <h3 class=\"exad-accordion-heading\">\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t\tHow do you ensure continuous security updates?\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<\/h3>\r\n\r\n                                                    <div class=\"exad-active-inactive-icon\">\r\n                                                                    <span class=\"exad-active-icon\">\r\n                                        <svg class=\"e-font-icon-svg e-fas-angle-up\" viewbox=\"0 0 320 512\"><path d=\"M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z\"><\/path><\/svg>                                    <\/span>                            \r\n                                                                                                    <span class=\"exad-inactive-icon\">\r\n                                        <svg class=\"e-font-icon-svg e-fas-angle-down\" viewbox=\"0 0 320 512\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg>                                    <\/span>\r\n                                                            <\/div>\r\n                                            <\/div>\r\n\r\n                    <div class=\"exad-accordion-content\">\r\n                        <div class=\"exad-accordion-content-wrapper has-image-no image-position-right\">\r\n                            <div class=\"exad-accordion-text\">\r\n                                <div> <p data-start=\"44255\" data-end=\"44522\">We provide regular monitoring, periodic audits and security system updates to keep pace with changing cyber threats.<\/p><\/div>\r\n                                                            <\/div>\r\n\r\n                            \r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                                                <\/div>\r\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Entreprise experts en Cybers\u00e9curit\u00e9 Nos experts en cybers\u00e9curit\u00e9 au service de vos infrastructures. S\u00e9curisons ensemble votre entreprise et vos donn\u00e9es. Nos certifications Nos certifications S\u00e9curisation IT, Tests d\u2019intrusion S\u00e9curisation IT, Tests d\u2019intrusion \u00c0 l\u2019\u00e8re du num\u00e9rique, la s\u00e9curit\u00e9 des infrastructures et la protection des donn\u00e9es sensibles sont des priorit\u00e9s absolues pour toute organisation. Les cybermenaces [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-14945","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/merakytech.com\/en\/wp-json\/wp\/v2\/pages\/14945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/merakytech.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/merakytech.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/merakytech.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/merakytech.com\/en\/wp-json\/wp\/v2\/comments?post=14945"}],"version-history":[{"count":388,"href":"https:\/\/merakytech.com\/en\/wp-json\/wp\/v2\/pages\/14945\/revisions"}],"predecessor-version":[{"id":17332,"href":"https:\/\/merakytech.com\/en\/wp-json\/wp\/v2\/pages\/14945\/revisions\/17332"}],"wp:attachment":[{"href":"https:\/\/merakytech.com\/en\/wp-json\/wp\/v2\/media?parent=14945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}