{"id":3030,"date":"2019-02-25T14:45:44","date_gmt":"2019-02-25T14:45:44","guid":{"rendered":"https:\/\/www.spg.com.tn\/?page_id=3030"},"modified":"2022-01-19T14:45:52","modified_gmt":"2022-01-19T14:45:52","slug":"cybersecurite","status":"publish","type":"page","link":"https:\/\/www.spg.com.tn\/en\/categories\/cybersecurite\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<section class=\"cover height-60 imagebg text-center\" data-overlay=\"0\" >\n\t\t\t    <div class=\"background-image-holder\">\n\t\t\t        <img loading=\"lazy\" decoding=\"async\" width=\"1351\" height=\"556\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/cybersecurite.jpg?fit=1351%2C556&amp;ssl=1\" class=\"attachment-full size-full\" alt=\"Cyber s\u00e9curit\u00e9\" srcset=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/cybersecurite.jpg?w=1351&amp;ssl=1 1351w, https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/cybersecurite.jpg?resize=300%2C123&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/cybersecurite.jpg?resize=768%2C316&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/cybersecurite.jpg?resize=1024%2C421&amp;ssl=1 1024w\" sizes=\"auto, (max-width: 1170px) 100vw, 1170px\" \/>\n\t\t\t    <\/div>\n\t\t\t    <div class=\"container pos-vertical-center\">\n\t\t\t        <div class=\"row\">\n\t\t\t            <div class=\"col-sm-12\"><h1 style=\"font-size: 40px;color: #ffffff;line-height: 40px;text-align: center;font-family:Lato;font-weight:700;font-style:normal\" class=\"vc_custom_heading\" >CYBERSECURITY<\/h1><\/div>\n\t\t\t        <\/div><!--end of row-->\n\t\t\t    <\/div><!--end of container-->\n\t\t\t    \n\t\t\t<\/section>\n\t\t<div class=\"vc_row-full-width vc_clearfix\"><\/div><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container col-sm-12 vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t\t\t<section class=\"imageblock switchable switchable--switch regular-background feature-large space--sm\">\n\t\t\t    <div class=\"imageblock__content col-md-6 col-sm-4 pos-right\">\n\t\t\t        <div class=\"background-image-holder\">\n\t\t\t            <img loading=\"lazy\" decoding=\"async\" width=\"966\" height=\"966\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/securite-reseau.jpg?fit=966%2C966&amp;ssl=1\" class=\"attachment-full size-full\" alt=\"S\u00e9curit\u00e9 r\u00e9seau\" srcset=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/securite-reseau.jpg?w=966&amp;ssl=1 966w, https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/securite-reseau.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/securite-reseau.jpg?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/securite-reseau.jpg?resize=768%2C768&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/securite-reseau.jpg?resize=60%2C60&amp;ssl=1 60w\" sizes=\"auto, (max-width: 966px) 100vw, 966px\" \/>\n\t\t\t        <\/div>\n\t\t\t    <\/div>\n\t\t\t    <div class=\"container\">\n\t\t\t        <div class=\"row\">\n\t\t\t            <div class=\"col-md-5 col-sm-7\">\n\t\t\t                <h2 style=\"text-align: left\" class=\"vc_custom_heading\" >Network security<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: justify;\">Nowadays, no company can ignore the need to communicate and exchange with its ecosystem to accomplish its mission. The enterprise network, whether single or segmented, requires network security solutions that provide a degree of freedom, ease of use for end users and management tools for system administrators with the highest levels of security.<\/p>\n<p style=\"text-align: justify;\">Our world-class vendor partners offer various types of integrated, intelligent technologies that provide real-time security for the enterprise network against the most advanced threats<\/p>\n<table style=\"height: 70px;\" width=\"777\">\n<tbody>\n<tr>\n<td width=\"500\"><span class='pum-trigger  popmake-3299' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2022\/01\/FORCEPOINT-NGFW-01-01-01.jpg?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<td width=\"500\"><span class='pum-trigger  popmake-3301' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2022\/01\/FORCEPOINT-UEBA-01.jpg?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 100px;\" width=\"772\">\n<tbody>\n<tr>\n<td width=\"500\"><span class='pum-trigger  popmake-48535' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2022\/01\/Sophoslogo-01-01.jpg?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<td width=\"500\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\t\t<\/div>\n\t<\/div>\n\n\t\t\t            <\/div>\n\t\t\t        <\/div><!--end of row-->\n\t\t\t    <\/div><!--end of container-->\n\t\t\t<\/section>\n\t\t\n\t\t\t<section class=\"imageblock switchable feature-large regular-background space--sm\">\n\t\t\t    <div class=\"imageblock__content col-md-6 col-sm-4 pos-right\">\n\t\t\t        <div class=\"background-image-holder\">\n\t\t\t            <img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/S%C3%A9curit%C3%A9-dans-le-Cloud.jpg?fit=800%2C800&amp;ssl=1\" class=\"attachment-full size-full\" alt=\"S\u00e9curit\u00e9 Cloud\" \/>\n\t\t\t        <\/div>\n\t\t\t    <\/div>\n\t\t\t    <div class=\"container\">\n\t\t\t        <div class=\"row\">\n\t\t\t            <div class=\"col-md-5 col-sm-7\">\n\t\t\t                <h2 style=\"text-align: left\" class=\"vc_custom_heading\" >Cloud Security<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: justify;\">Cloud computing is totally disrupting IT security. Properly implemented, data security in cloud computing can equal or surpass data security in the enterprise.<\/p>\n<p style=\"text-align: justify;\">The increasing migration of corporate workloads to the cloud is causing some sensitive data to be stored outside the corporate network. Multi-layered end-to-end security from cloud to device and back is becoming more than essential.<\/p>\n<p style=\"text-align: justify;\">Different technologies are available. Each acts at its own level as a bulwark between the perimeter of the company's network, its devices and its data on the one hand and the multiple cloud services it uses on the other.<\/p>\n<table style=\"height: 71px;\" width=\"769\">\n<tbody>\n<tr>\n<td width=\"500\"><span class='pum-trigger  popmake-3307' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2022\/01\/Microsoft-Sc-01-01.jpg?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<td width=\"500\"><span class='pum-trigger  popmake-3309' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2022\/01\/broadcom-01.jpg?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table>\n<tbody>\n<tr>\n<td width=\"500\"><\/td>\n<td width=\"500\"><span class='pum-trigger  popmake-3314' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2022\/01\/forcepoint-CASB-01.jpg?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\t\t<\/div>\n\t<\/div>\n\n\t\t\t            <\/div>\n\t\t\t        <\/div><!--end of row-->\n\t\t\t    <\/div><!--end of container-->\n\t\t\t<\/section>\n\t\t\n\t\t\t<section class=\"imageblock switchable switchable--switch regular-background feature-large space--sm\">\n\t\t\t    <div class=\"imageblock__content col-md-6 col-sm-4 pos-right\">\n\t\t\t        <div class=\"background-image-holder\">\n\t\t\t            <img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/Mail-security.jpg?fit=800%2C800&amp;ssl=1\" class=\"attachment-full size-full\" alt=\"S\u00e9curit\u00e9 Mail &amp; web\" srcset=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/Mail-security.jpg?w=800&amp;ssl=1 800w, https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/Mail-security.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/Mail-security.jpg?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/Mail-security.jpg?resize=768%2C768&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/08\/Mail-security.jpg?resize=60%2C60&amp;ssl=1 60w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/>\n\t\t\t        <\/div>\n\t\t\t    <\/div>\n\t\t\t    <div class=\"container\">\n\t\t\t        <div class=\"row\">\n\t\t\t            <div class=\"col-md-5 col-sm-7\">\n\t\t\t                <h2 style=\"text-align: left\" class=\"vc_custom_heading\" >Mail &amp; web security<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: justify;\">Today's threat landscape is changing very quickly. Cleverly disguised attacks manifest themselves during web and email access.<\/p>\n<p style=\"text-align: justify;\">It is therefore important to choose a security solution capable of offering real-time classification in order to detect threats as soon as they appear in real time and in an intelligent and proactive manner<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"500\"><span class='pum-trigger  popmake-3316' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2022\/01\/broadcom-webcloud-01.jpg?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<td width=\"500\"><span class='pum-trigger  popmake-3318' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2022\/01\/forcepoint-Email-01.jpg?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table>\n<tbody>\n<tr>\n<td width=\"500\"><span class='pum-trigger  popmake-3320' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2022\/01\/forcepoint-web-security-01.jpg?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<td width=\"500\"><span class='pum-trigger  popmake-3322' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2022\/01\/forcepoint-URL-01.jpg?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\t\t<\/div>\n\t<\/div>\n\n\t\t\t            <\/div>\n\t\t\t        <\/div><!--end of row-->\n\t\t\t    <\/div><!--end of container-->\n\t\t\t<\/section>\n\t\t<\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container col-sm-12 vc_hidden-lg vc_hidden-md\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"row vc_row wpb_row vc_inner vc_row-fluid vc_row-o-equal-height vc_row-o-content-middle vc_row-flex\"><div class=\"wpb_column vc_column_container col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: left\" class=\"vc_custom_heading vc_custom_1554892760627\" >Network security<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element  vc_custom_1554892767292\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: justify;\">Nowadays, no company can ignore the need to communicate and exchange with its ecosystem to accomplish its mission. The enterprise network, whether single or segmented, requires network security solutions that provide a degree of freedom, ease of use for end users and management tools for system administrators with the highest levels of security.<\/p>\n<p style=\"text-align: justify;\">Our world-class vendor partners offer various types of integrated, intelligent technologies that provide real-time security for the enterprise network against the most advanced threats<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"500\"><span class='pum-trigger  popmake-3299' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/02\/NGFW-2.png?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<td width=\"500\"><span class='pum-trigger  popmake-3301' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/02\/UEBA.png?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table>\n<tbody>\n<tr>\n<td width=\"500\"><span class='pum-trigger  popmake-3303' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/02\/clavister-Next-Generation.png?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<td width=\"500\"><span class='pum-trigger  popmake-3305' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/02\/clavister-Identity-and-Access.png?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><h2 style=\"text-align: left\" class=\"vc_custom_heading vc_custom_1554892773453\" >Cloud Security<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element  vc_custom_1554892778835\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: justify;\">Cloud computing is totally disrupting IT security. Properly implemented, data security in cloud computing can equal or surpass data security in the enterprise.<\/p>\n<p style=\"text-align: justify;\">The increasing migration of corporate workloads to the cloud is causing some sensitive data to be stored outside the corporate network. Multi-layered end-to-end security from cloud to device and back is becoming more than essential.<\/p>\n<p style=\"text-align: justify;\">Different technologies are available. Each acts at its own level as a bulwark between the perimeter of the company's network, its devices and its data on the one hand and the multiple cloud services it uses on the other.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"500\"><span class='pum-trigger  popmake-3307' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/02\/microsofthh.jpg?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<td width=\"500\"><span class='pum-trigger  popmake-3309' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/02\/symantec.jpg?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table>\n<tbody>\n<tr>\n<td width=\"500\"><span class='pum-trigger  popmake-3312' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/02\/symantec2.jpg?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<td width=\"500\"><span class='pum-trigger  popmake-3314' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/02\/Forcpoint.jpg?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\t\t<\/div>\n\t<\/div>\n<h2 style=\"text-align: left\" class=\"vc_custom_heading vc_custom_1554892785013\" >Mail &amp; web security<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element  vc_custom_1554892790704\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: justify;\">Today's threat landscape is changing very quickly. Cleverly disguised attacks manifest themselves during web and email access.<\/p>\n<p style=\"text-align: justify;\">It is therefore important to choose a security solution capable of offering real-time classification in order to detect threats as soon as they appear in real time and in an intelligent and proactive manner<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"500\"><span class='pum-trigger  popmake-3316' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/02\/symantec3-1.jpg?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<td width=\"500\"><span class='pum-trigger  popmake-3318' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/02\/forcepoint-Email-Security-cloud.png?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table>\n<tbody>\n<tr>\n<td width=\"500\"><span class='pum-trigger  popmake-3320' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/02\/FORCEPOINT-WEB-SECURITY.png?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<td width=\"500\"><span class='pum-trigger  popmake-3322' data-do-default=''><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2019\/02\/Focepoint-URL.png?resize=300%2C150&#038;ssl=1\" alt=\"\" class=\"alignleft size-full wp-image-25921\" width=\"300\" height=\"150\"\/><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div>","protected":false},"excerpt":{"rendered":"CYBERS\u00c9CURIT\u00c9 S\u00e9curit\u00e9 r\u00e9seau De nos jours aucune entreprise ne peut ignorer la n\u00e9cessit\u00e9 de communiquer et d\u2019\u00e9changer avec son \u00e9cosyst\u00e8me pour l\u2019accomplissement...","protected":false},"author":29,"featured_media":0,"parent":3028,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-3030","page","type-page","status-publish","hentry"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybers\u00e9curit\u00e9 - SPG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spg.com.tn\/en\/categories\/cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 - SPG\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spg.com.tn\/en\/categories\/cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"SPG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SPG.Software.Productivity.Group\/\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-19T14:45:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spg.com.tn\/wp-content\/uploads\/2022\/01\/FORCEPOINT-NGFW-01-01-01.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.spg.com.tn\\\/categories\\\/cybersecurite\\\/\",\"url\":\"https:\\\/\\\/www.spg.com.tn\\\/categories\\\/cybersecurite\\\/\",\"name\":\"Cybers\u00e9curit\u00e9 - SPG\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spg.com.tn\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.spg.com.tn\\\/categories\\\/cybersecurite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spg.com.tn\\\/categories\\\/cybersecurite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spg.com.tn\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/FORCEPOINT-NGFW-01-01-01.jpg\",\"datePublished\":\"2019-02-25T14:45:44+00:00\",\"dateModified\":\"2022-01-19T14:45:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.spg.com.tn\\\/categories\\\/cybersecurite\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.spg.com.tn\\\/categories\\\/cybersecurite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spg.com.tn\\\/categories\\\/cybersecurite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.spg.com.tn\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/FORCEPOINT-NGFW-01-01-01.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spg.com.tn\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/FORCEPOINT-NGFW-01-01-01.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.spg.com.tn\\\/categories\\\/cybersecurite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.spg.com.tn\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cat\u00e9gories\",\"item\":\"https:\\\/\\\/www.spg.com.tn\\\/categories\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.spg.com.tn\\\/#website\",\"url\":\"https:\\\/\\\/www.spg.com.tn\\\/\",\"name\":\"SPG\",\"description\":\"Grossiste Informatique \u00e0 Valeur ajout\u00e9e\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.spg.com.tn\\\/#organization\"},\"alternateName\":\"SPG distributeur des solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.spg.com.tn\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.spg.com.tn\\\/#organization\",\"name\":\"SPG\",\"url\":\"https:\\\/\\\/www.spg.com.tn\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spg.com.tn\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.spg.com.tn\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Logo-SPG-new.png?fit=300%2C133&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.spg.com.tn\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Logo-SPG-new.png?fit=300%2C133&ssl=1\",\"width\":300,\"height\":133,\"caption\":\"SPG\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spg.com.tn\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/SPG.Software.Productivity.Group\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/software-productivity-group-spg\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 - SPG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spg.com.tn\/en\/categories\/cybersecurite\/","og_locale":"en_US","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 - SPG","og_url":"https:\/\/www.spg.com.tn\/en\/categories\/cybersecurite\/","og_site_name":"SPG","article_publisher":"https:\/\/www.facebook.com\/SPG.Software.Productivity.Group\/","article_modified_time":"2022-01-19T14:45:52+00:00","og_image":[{"url":"https:\/\/www.spg.com.tn\/wp-content\/uploads\/2022\/01\/FORCEPOINT-NGFW-01-01-01.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.spg.com.tn\/categories\/cybersecurite\/","url":"https:\/\/www.spg.com.tn\/categories\/cybersecurite\/","name":"Cybers\u00e9curit\u00e9 - SPG","isPartOf":{"@id":"https:\/\/www.spg.com.tn\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spg.com.tn\/categories\/cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/www.spg.com.tn\/categories\/cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spg.com.tn\/wp-content\/uploads\/2022\/01\/FORCEPOINT-NGFW-01-01-01.jpg","datePublished":"2019-02-25T14:45:44+00:00","dateModified":"2022-01-19T14:45:52+00:00","breadcrumb":{"@id":"https:\/\/www.spg.com.tn\/categories\/cybersecurite\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spg.com.tn\/categories\/cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spg.com.tn\/categories\/cybersecurite\/#primaryimage","url":"https:\/\/www.spg.com.tn\/wp-content\/uploads\/2022\/01\/FORCEPOINT-NGFW-01-01-01.jpg","contentUrl":"https:\/\/www.spg.com.tn\/wp-content\/uploads\/2022\/01\/FORCEPOINT-NGFW-01-01-01.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.spg.com.tn\/categories\/cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.spg.com.tn\/"},{"@type":"ListItem","position":2,"name":"Cat\u00e9gories","item":"https:\/\/www.spg.com.tn\/categories\/"},{"@type":"ListItem","position":3,"name":"Cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.spg.com.tn\/#website","url":"https:\/\/www.spg.com.tn\/","name":"SPG","description":"Grossiste Informatique \u00e0 Valeur ajout\u00e9e","publisher":{"@id":"https:\/\/www.spg.com.tn\/#organization"},"alternateName":"SPG distributeur des solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spg.com.tn\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.spg.com.tn\/#organization","name":"SPG","url":"https:\/\/www.spg.com.tn\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spg.com.tn\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2023\/07\/Logo-SPG-new.png?fit=300%2C133&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.spg.com.tn\/wp-content\/uploads\/2023\/07\/Logo-SPG-new.png?fit=300%2C133&ssl=1","width":300,"height":133,"caption":"SPG"},"image":{"@id":"https:\/\/www.spg.com.tn\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SPG.Software.Productivity.Group\/","https:\/\/www.linkedin.com\/company\/software-productivity-group-spg\/"]}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/PaWB6B-MS","jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/www.spg.com.tn\/en\/wp-json\/wp\/v2\/pages\/3030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spg.com.tn\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.spg.com.tn\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.spg.com.tn\/en\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spg.com.tn\/en\/wp-json\/wp\/v2\/comments?post=3030"}],"version-history":[{"count":8,"href":"https:\/\/www.spg.com.tn\/en\/wp-json\/wp\/v2\/pages\/3030\/revisions"}],"predecessor-version":[{"id":48687,"href":"https:\/\/www.spg.com.tn\/en\/wp-json\/wp\/v2\/pages\/3030\/revisions\/48687"}],"up":[{"embeddable":true,"href":"https:\/\/www.spg.com.tn\/en\/wp-json\/wp\/v2\/pages\/3028"}],"wp:attachment":[{"href":"https:\/\/www.spg.com.tn\/en\/wp-json\/wp\/v2\/media?parent=3030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}