{"id":16530,"date":"2017-06-15T11:52:39","date_gmt":"2017-06-15T09:52:39","guid":{"rendered":"https:\/\/www.pexys.ch\/it-solutions\/reseau-securite\/"},"modified":"2025-08-06T11:59:56","modified_gmt":"2025-08-06T09:59:56","slug":"network-security","status":"publish","type":"page","link":"https:\/\/www.pexys.ch\/en\/it-solutions\/network-security\/","title":{"rendered":"Network &#038; security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row type=&#8221;vc_default&#8221; css=&#8221;.vc_custom_1506676744429{padding-bottom: 70px !important;}&#8221;][vc_column][vc_column_text]<\/p>\n<h2>IT Security is a key issue.<\/h2>\n<p>Our expertise ensures <strong>greater reliability and optimal security for your computer network, protection of your data interchange on the Internet,<\/strong> on you companies&#8217; sites and for mobile users. We inspect data streams on the basis of content retrieved on the web to filter out threats, and we install tools to control outbound data transfers, according to information sharing settings defined by you.<\/p>\n<p>Our <strong>know-how encompasses the entire spectrum of computer network security<\/strong> internally and externally:[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;16784&#8243; img_size=&#8221;full&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div class=\"standard-arrow bullet-top\"><ul>\n<li><strong>Firewall configuration<\/strong>, monitoring, reporting and maintenance.<\/li>\n<li>Private networks, VPNs, multiple sites and <strong>VPN SSL<\/strong> for mobile users.<\/li>\n<li><strong>Strong user authentication<\/strong>, <strong>1X access control<\/strong><\/li>\n<li><strong>VPN-SSL<\/strong> solutions with two-factor authentication (for instance with Token)<\/li>\n<li><strong>Prevention of data leakage<\/strong> to prevent disclosure of sensitive information outside the company.<\/li>\n<li><strong>WAN optimization<\/strong> \u2013 accelerates applications and file transfers on WAN connections.<\/li>\n<li><strong>SSL Inspection (Https)<\/strong> \u2013 increases the security and control of rules for encrypted traffic data streams<\/li>\n<\/ul>\n<\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon {\n  width: 50px;\n  height: 50px;\n  line-height: 50px;\n  font-size: 24px;\n  border-radius: 200px;\n  margin: 0px 0px 20px 0px;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon .icon-inner {\n  min-width: 50px;\n  min-height: 50px;\n  border-radius: 200px;\n}\n@media all and (-ms-high-contrast: none) {\n  .icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon .icon-inner {\n    height: 50px;\n  }\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon .dt-hover-icon {\n  line-height: 50px;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon:before,\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon:after,\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon .icon-inner:before,\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon .icon-inner:after {\n  min-width: 100%;\n  min-height: 100%;\n  padding: inherit;\n  border-radius: inherit;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-border-on:before {\n  border-width: 2px;\n  border-style: solid;\n}\n.dt-icon-border-dashed.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-border-on:before {\n  border-style: dashed;\n}\n.dt-icon-border-dotted.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-border-on:before {\n  border-style: dotted;\n}\n.dt-icon-border-double.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-border-on:before {\n  border-style: double;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-border-dashed.dt-icon-border-on:before {\n  border-style: dashed;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-border-dotted.dt-icon-border-on:before {\n  border-style: dotted;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-border-double.dt-icon-border-on:before {\n  border-style: double;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-hover-border-on:after {\n  border-width: 2px;\n  border-style: solid;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-border-dashed.dt-icon-hover-border-on:after {\n  border-style: dashed;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-border-dotted.dt-icon-hover-border-on:after {\n  border-style: dotted;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-border-double.dt-icon-hover-border-on:after {\n  border-style: double;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-hover-on:hover {\n  font-size: 24px;\n}\n#page .icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-hover-on:hover .soc-font-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-hover-on:hover .soc-font-icon,\n#page .icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-hover-on:hover .soc-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-hover-on:hover .soc-icon {\n  color: #fff;\n  background: none;\n}\n#page .icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-hover-on:not(:hover) .soc-font-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-hover-on:not(:hover) .soc-font-icon,\n#page .icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-hover-on:not(:hover) .soc-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-hover-on:not(:hover) .soc-icon,\n#page .icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-hover-off .soc-font-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-hover-off .soc-font-icon,\n#page .icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-hover-off .soc-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .text-icon.dt-icon-hover-off .soc-icon {\n  color: #ffffff;\n  background: none;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715.layout-1 {\n  grid-template-columns: 50px minmax(0,1fr);\n  grid-column-gap: 0px;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715.layout-2 {\n  grid-template-columns: minmax(0,1fr) 50px;\n  grid-column-gap: 0px;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715.layout-2 .text-icon {\n  margin-left: 0;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715.layout-3 {\n  grid-template-columns: 50px minmax(0,1fr);\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715.layout-3 .dt-text-title {\n  margin-left: 0px;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .dt-text-title,\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .dt-text-title a {\n  font-weight: bold;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .dt-text-title {\n  margin-bottom: 0px;\n}\n.icon-with-text-shortcode.icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 .dt-text-desc {\n  margin-bottom: 0px;\n}<\/style><div class=\"icon-with-text-shortcode  icon-text-id-c7038cf7ac2928b8bde23f2ae6b60715 layout-4  \" ><span   class=\"text-icon dt-icon-bg-on dt-icon-hover-off\" ><span class=\"icon-inner\"><i class=\"dt-regular-icon soc-icon Defaults-joomla\"><\/i><i class=\"dt-hover-icon soc-icon Defaults-joomla\"><\/i><\/span><\/span><h4 class=\"dt-text-title\"  >Incident Response &amp; Remediation<\/h4><div class=\"dt-text-desc\">In the event of a security incident (ransomware, intrusion, phishing, etc.), a rapid intervention\u2014either on-site or via secure remote access\u2014is carried out following these key steps:<\/div><\/div>[vc_empty_space height=&#8221;30px&#8221;]<div class=\"standard-arrow list-divider bullet-top\"><ul>\n<li>Diagnosis and identification of the incident,<\/li>\n<li>Isolation of the compromised system to prevent further spread,<\/li>\n<li>Removal of malware, ransomware, or malicious scripts,<\/li>\n<li>Restoration from backup or full system rebuild,<\/li>\n<li>Post-incident hardening: patching, network segmentation, and system security reinforcement,<\/li>\n<li>A detailed technical report is delivered to the client with specific recommendations.<\/li>\n<\/ul>\n<\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon {\n  width: 50px;\n  height: 50px;\n  line-height: 50px;\n  font-size: 24px;\n  border-radius: 200px;\n  margin: 0px 0px 20px 0px;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon .icon-inner {\n  min-width: 50px;\n  min-height: 50px;\n  border-radius: 200px;\n}\n@media all and (-ms-high-contrast: none) {\n  .icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon .icon-inner {\n    height: 50px;\n  }\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon .dt-hover-icon {\n  line-height: 50px;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon:before,\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon:after,\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon .icon-inner:before,\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon .icon-inner:after {\n  min-width: 100%;\n  min-height: 100%;\n  padding: inherit;\n  border-radius: inherit;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-border-on:before {\n  border-width: 2px;\n  border-style: solid;\n}\n.dt-icon-border-dashed.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-border-on:before {\n  border-style: dashed;\n}\n.dt-icon-border-dotted.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-border-on:before {\n  border-style: dotted;\n}\n.dt-icon-border-double.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-border-on:before {\n  border-style: double;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-border-dashed.dt-icon-border-on:before {\n  border-style: dashed;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-border-dotted.dt-icon-border-on:before {\n  border-style: dotted;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-border-double.dt-icon-border-on:before {\n  border-style: double;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-hover-border-on:after {\n  border-width: 2px;\n  border-style: solid;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-border-dashed.dt-icon-hover-border-on:after {\n  border-style: dashed;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-border-dotted.dt-icon-hover-border-on:after {\n  border-style: dotted;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-border-double.dt-icon-hover-border-on:after {\n  border-style: double;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-hover-on:hover {\n  font-size: 24px;\n}\n#page .icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-hover-on:hover .soc-font-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-hover-on:hover .soc-font-icon,\n#page .icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-hover-on:hover .soc-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-hover-on:hover .soc-icon {\n  color: #fff;\n  background: none;\n}\n#page .icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-hover-on:not(:hover) .soc-font-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-hover-on:not(:hover) .soc-font-icon,\n#page .icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-hover-on:not(:hover) .soc-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-hover-on:not(:hover) .soc-icon,\n#page .icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-hover-off .soc-font-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-hover-off .soc-font-icon,\n#page .icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-hover-off .soc-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .text-icon.dt-icon-hover-off .soc-icon {\n  color: #ffffff;\n  background: none;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a.layout-1 {\n  grid-template-columns: 50px minmax(0,1fr);\n  grid-column-gap: 0px;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a.layout-2 {\n  grid-template-columns: minmax(0,1fr) 50px;\n  grid-column-gap: 0px;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a.layout-2 .text-icon {\n  margin-left: 0;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a.layout-3 {\n  grid-template-columns: 50px minmax(0,1fr);\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a.layout-3 .dt-text-title {\n  margin-left: 0px;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .dt-text-title,\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .dt-text-title a {\n  font-weight: bold;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .dt-text-title {\n  margin-bottom: 0px;\n}\n.icon-with-text-shortcode.icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a .dt-text-desc {\n  margin-bottom: 0px;\n}<\/style><div class=\"icon-with-text-shortcode  icon-text-id-123bf3562a02b21f7ef6cf12e5788d4a layout-4  \" ><span   class=\"text-icon dt-icon-bg-on dt-icon-hover-off\" ><span class=\"icon-inner\"><i class=\"dt-regular-icon soc-icon Defaults-list-ul\"><\/i><i class=\"dt-hover-icon soc-icon Defaults-list-ul\"><\/i><\/span><\/span><h4 class=\"dt-text-title\"  >Recommendations &amp; Best Practices<\/h4><div class=\"dt-text-desc\">Following a contextual analysis of the information system (mapping, criticality, usage), several measures are systematically recommended:<\/div><\/div>[vc_empty_space height=&#8221;30px&#8221;]<div class=\"standard-arrow list-divider bullet-top\"><ul>\n<li>Implement an incident response plan (BCP\/DRP),<\/li>\n<li>Raise employee awareness of major threats (phishing, passwords, USB devices, VPN use&#8230;) through regular training and a strong cybersecurity culture,<\/li>\n<li>Deploy multi-factor authentication (MFA) and apply the principle of least privilege to limit access strictly to what is necessary,<\/li>\n<li>Automate updates (systems, applications), perform regular audits, and remove obsolete versions,<\/li>\n<li>Implement robust backups following the 3-2-1 rule: three copies on two types of media, with at least one immutable off-site, encrypted and regularly tested,<\/li>\n<li>Segment networks and enforce filtering rules,<\/li>\n<li>Enable monitoring and logging, and deploy an EDR\/xDR solution,<\/li>\n<li>Conduct post-incident audits and lessons learned: analyze root causes, improve processes and procedures, and equip your system to prevent recurrence.<\/li>\n<li><\/li>\n<\/ul>\n<\/div>[\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;60px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3><strong>Why This Approach?<\/strong><\/h3>\n<p>[\/vc_column_text]<div class=\"standard-arrow list-divider bullet-top\"><ul>\n<li>It combines <strong>reactive intervention<\/strong> (diagnosis, cleanup, restoration) with <strong>proactive prevention<\/strong> (awareness, security, resilience),<\/li>\n<li>It relies on <strong>proven, adaptable practices<\/strong>: simplicity, efficiency, and continuity,<\/li>\n<li>It ensures a structured response to each incident while strengthening the <strong>overall resilience<\/strong> of your IT system.<\/li>\n<\/ul>\n<\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; full_width=&#8221;stretch_row_content&#8221; bg_type=&#8221;bg_color&#8221; bg_override=&#8221;ex-full&#8221; css=&#8221;.vc_custom_1754474249944{padding-top: 70px !important;}&#8221; bg_color_value=&#8221;#f8f8f9&#8243;][vc_column offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;15606&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h3>Antivirus security<\/h3>\n<ul>\n<li>An antivirus specially designed for SMEs<\/li>\n<li>Damage cleanup function<\/li>\n<li>Transparent and automatic updates<\/li>\n<li>Reliable and integral protection<\/li>\n<li>Surveillance of viral epidemics<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_btn title=&#8221;MORE&#8221; style=&#8221;custom&#8221; custom_background=&#8221;#ED1C24&#8243; custom_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fwww.eset.com%2Ffr%2F||target:%20_blank|&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;15607&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h3>Wireless enterprise network<\/h3>\n<ul>\n<li>Simpler planning<\/li>\n<li>Simpler deployment<\/li>\n<li>Simpler management of Wi-Fi companies<\/li>\n<li>Network performance monitoring<\/li>\n<li>Coverage detection<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_btn title=&#8221;MORE&#8221; style=&#8221;custom&#8221; custom_background=&#8221;#ED1C24&#8243; custom_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fwww.zyxel.fr%2F||target:%20_blank|&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;15608&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h3>LAN network implementation<\/h3>\n<ul>\n<li>Better mobility and collaboration<\/li>\n<li>Better response capacity<\/li>\n<li>Better access to information<\/li>\n<li>Easier network expansion<\/li>\n<li>Better guest access<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_btn title=&#8221;MORE&#8221; style=&#8221;custom&#8221; custom_background=&#8221;#ED1C24&#8243; custom_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fwww.cisco.com%2Fc%2Ffr_fr%2Findex.html||target:%20_blank|&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;15609&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h3>Firewall installation and management<\/h3>\n<ul>\n<li>New generation firewall<\/li>\n<li>WAN acceleration<\/li>\n<li>Wireless network security<\/li>\n<li>Management and reports<\/li>\n<li>Security services<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_btn title=&#8221;MORE&#8221; style=&#8221;custom&#8221; custom_background=&#8221;#ED1C24&#8243; custom_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fwww.sonicwall.com%2Ffr-fr%2Fhome||target:%20_blank|&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; bg_type=&#8221;bg_color&#8221; bg_override=&#8221;ex-full&#8221; css=&#8221;.vc_custom_1506676839156{padding-top: 70px !important;padding-bottom: 90px !important;}&#8221; bg_color_value=&#8221;#f8f8f9&#8243;][vc_column offset=&#8221;vc_hidden-lg vc_hidden-md&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;15606&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h3>Antivirus security<\/h3>\n<ul>\n<li>An antivirus specially designed for SMEs<\/li>\n<li>Damage cleanup function<\/li>\n<li>Transparent and automatic updates<\/li>\n<li>Reliable and integral protection<\/li>\n<li>Surveillance of viral epidemics<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_btn title=&#8221;MORE&#8221; style=&#8221;custom&#8221; custom_background=&#8221;#ED1C24&#8243; custom_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fwww.eset.com%2Ffr%2F||target:%20_blank|&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;15607&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h3>Wireless enterprise network<\/h3>\n<ul>\n<li>Simpler planning<\/li>\n<li>Simpler deployment<\/li>\n<li>Simpler management of Wi-Fi companies<\/li>\n<li>Network performance monitoring<\/li>\n<li>Coverage detection<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_btn title=&#8221;MORE&#8221; style=&#8221;custom&#8221; custom_background=&#8221;#ED1C24&#8243; custom_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fwww.zyxel.fr%2F||target:%20_blank|&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;100px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;15608&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h3>LAN network implementation<\/h3>\n<ul>\n<li>Better mobility and collaboration<\/li>\n<li>Better response capacity<\/li>\n<li>Better access to information<\/li>\n<li>Easier network expansion<\/li>\n<li>Better guest access<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_btn title=&#8221;MORE&#8221; style=&#8221;custom&#8221; custom_background=&#8221;#ED1C24&#8243; custom_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fwww.cisco.com%2Fc%2Ffr_fr%2Findex.html||target:%20_blank|&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;15609&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h3>Firewall installation and management<\/h3>\n<ul>\n<li>New generation firewall<\/li>\n<li>WAN acceleration<\/li>\n<li>Wireless network security<\/li>\n<li>Management and reports<\/li>\n<li>Security services<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_btn title=&#8221;MORE&#8221; style=&#8221;custom&#8221; custom_background=&#8221;#ED1C24&#8243; custom_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fwww.sonicwall.com%2Ffr-fr%2Fhome||target:%20_blank|&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; bg_type=&#8221;bg_color&#8221; bg_override=&#8221;full&#8221; bg_color_value=&#8221;#ED1C24&#8243;][vc_column][vc_empty_space height=&#8221;20px&#8221;][vc_custom_heading text=&#8221;Do you want more information on security?&#8221; font_container=&#8221;tag:h2|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_btn title=&#8221;Contact us&#8221; style=&#8221;classic&#8221; color=&#8221;black&#8221; align=&#8221;center&#8221; i_icon_fontawesome=&#8221;fa fa-envelope-o&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Fwww.pexys.ch%2Fen%2Fcontact%2F|||&#8221;][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;vc_default&#8221; css=&#8221;.vc_custom_1506676744429{padding-bottom: 70px !important;}&#8221;][vc_column][vc_column_text] IT Security is a key issue. Our expertise ensures greater reliability and optimal security for your computer network, protection of your data interchange on the Internet, on you companies&#8217; sites and for mobile users. We inspect data streams on the basis of content retrieved on the web to filter out&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":16507,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-16530","page","type-page","status-publish","hentry","description-off"],"_links":{"self":[{"href":"https:\/\/www.pexys.ch\/en\/wp-json\/wp\/v2\/pages\/16530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pexys.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.pexys.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.pexys.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pexys.ch\/en\/wp-json\/wp\/v2\/comments?post=16530"}],"version-history":[{"count":3,"href":"https:\/\/www.pexys.ch\/en\/wp-json\/wp\/v2\/pages\/16530\/revisions"}],"predecessor-version":[{"id":17293,"href":"https:\/\/www.pexys.ch\/en\/wp-json\/wp\/v2\/pages\/16530\/revisions\/17293"}],"up":[{"embeddable":true,"href":"https:\/\/www.pexys.ch\/en\/wp-json\/wp\/v2\/pages\/16507"}],"wp:attachment":[{"href":"https:\/\/www.pexys.ch\/en\/wp-json\/wp\/v2\/media?parent=16530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}