{"id":1933,"date":"2020-06-09T11:16:56","date_gmt":"2020-06-09T15:16:56","guid":{"rendered":"http:\/\/www.isc-telecom.com\/gestion-securite-et-infrastructures\/"},"modified":"2024-09-06T13:57:11","modified_gmt":"2024-09-06T17:57:11","slug":"security-and-infrastructure-management","status":"publish","type":"page","link":"https:\/\/www.isc-telecom.com\/en\/security-and-infrastructure-management\/","title":{"rendered":"Security and Infrastructure Management"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row css=&#8221;.vc_custom_1591819245660{padding-top: 80px !important;}&#8221;][vc_column][vc_column_text el_id=&#8221;protection&#8221;]\n<h1 style=\"text-align: center;\">Protection of your network<\/h1>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;list_no_style&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1591732021478{padding-left: 150px !important;}&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1653 size-full gestion_secu_img\" src=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/06\/activite_nuagique_securitaire.png\" alt=\"\" width=\"167\" height=\"158\" \/>Safe Cloud Activity[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1591730795046{padding-left: 50px !important;}&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1651 size-full gestion_secu_img\" src=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/06\/Unified_Threat_Management-.png\" alt=\"\" width=\"77\" height=\"77\" srcset=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/06\/Unified_Threat_Management-.png 77w, https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/06\/Unified_Threat_Management--50x50.png 50w\" sizes=\"(max-width: 77px) 100vw, 77px\" \/>Unified Threat Management[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;list_no_style&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1591732021478{padding-left: 150px !important;}&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1657 size-full gestion_secu_img\" src=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/06\/Client_securitaire.png\" alt=\"\" width=\"57\" height=\"39\" \/>Secure Client[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1591730795046{padding-left: 50px !important;}&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1655 size-full gestion_secu_img\" src=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/06\/Applications_securitaires.png\" alt=\"\" width=\"47\" height=\"47\" \/>Secure Apps[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;list_no_style&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1591732021478{padding-left: 150px !important;}&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1659 size-full gestion_secu_img\" src=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/06\/Communications_securitaires-.png\" alt=\"\" width=\"65\" height=\"43\" \/>Secure Communications[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1591730795046{padding-left: 50px !important;}&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1639 size-full gestion_secu_img\" src=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/06\/IPS_Intrusion_Prevention.png\" alt=\"\" width=\"84\" height=\"84\" srcset=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/06\/IPS_Intrusion_Prevention.png 84w, https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/06\/IPS_Intrusion_Prevention-50x50.png 50w\" sizes=\"(max-width: 84px) 100vw, 84px\" \/>Intrusion prevention system[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;list_no_style&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1591732021478{padding-left: 150px !important;}&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1643 size-full gestion_secu_img\" src=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/06\/Reseau_interne_LAN_securitaire.png\" alt=\"\" width=\"51\" height=\"39\" \/>Secure LAN internal network[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1591730795046{padding-left: 50px !important;}&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1647 size-full gestion_secu_img\" src=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/06\/Securite_reseau.png\" alt=\"\" width=\"51\" height=\"39\" \/>Network Security[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;list_no_style&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1591732021478{padding-left: 150px !important;}&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1649 size-full gestion_secu_img\" src=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/06\/SSL_VPN_Firewall.png\" alt=\"\" width=\"68\" height=\"36\" \/>SSL VPN Firewall[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1591730795046{padding-left: 50px !important;}&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1591819284984{padding-top: 30px !important;}&#8221;][vc_column][vc_column_text el_id=&#8221;gestion&#8221;]\n<h1 style=\"text-align: center;\">Managing your Network Infrastructure<\/h1>\n[\/vc_column_text][vc_column_text]<a href=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/07\/FortiGate.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1685 aligncenter\" src=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/07\/FortiGate.jpg\" alt=\"\" width=\"486\" height=\"104\" srcset=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/07\/FortiGate.jpg 486w, https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/07\/FortiGate-300x64.jpg 300w, https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/07\/FortiGate-220x47.jpg 220w\" sizes=\"(max-width: 486px) 100vw, 486px\" \/><\/a>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;list_no_style&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1594310563153{padding-left: 150px !important;}&#8221;][vc_column_text]\n<ul>\n<li>Deployment<\/li>\n<li>Local and Cloud Integration<\/li>\n<li>Technical Support and Consulting Services<\/li>\n<li>Centralized Security Management<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1594310569681{padding-left: 50px !important;}&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1641 size-full gestion_secu_img\" src=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/06\/Next_Generation_Firewall.png\" alt=\"\" width=\"60\" height=\"71\" \/>Next Generation Firewall<br \/>\n[\/vc_column_text][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1637 size-full gestion_secu_img\" src=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/06\/FortiGuard_Bundle.png\" alt=\"\" width=\"59\" height=\"44\" \/>FortiGuard Bundle<br \/>\n[\/vc_column_text][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1661 size-full gestion_secu_img\" src=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/06\/FortiClient.png\" alt=\"\" width=\"48\" height=\"48\" \/>FortiClient[\/vc_column_text][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1645 size-full gestion_secu_img\" src=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2020\/06\/SD-WAN_Gestion.png\" alt=\"\" width=\"61\" height=\"48\" \/>SD-WAN Gestion[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<img decoding=\"async\" class=\"alignnone wp-image-1645 size-full forticloud\" src=\"https:\/\/www.isc-telecom.com\/wp-content\/uploads\/2024\/09\/FortiCloud-logov2.png\" alt=\"FortiCloud\" \/>[\/vc_column_text][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1591819245660{padding-top: 80px !important;}&#8221;][vc_column][vc_column_text el_id=&#8221;protection&#8221;] Protection of your network [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;list_no_style&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1591732021478{padding-left: 150px !important;}&#8221;][vc_column_text]Safe Cloud Activity[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1591730795046{padding-left: 50px !important;}&#8221;][vc_column_text]Unified Threat Management[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;list_no_style&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1591732021478{padding-left: 150px !important;}&#8221;][vc_column_text]Secure Client[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1591730795046{padding-left: 50px !important;}&#8221;][vc_column_text]Secure Apps[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;list_no_style&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1591732021478{padding-left: 150px !important;}&#8221;][vc_column_text]Secure Communications[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1591730795046{padding-left: 50px !important;}&#8221;][vc_column_text]Intrusion prevention system[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;list_no_style&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1591732021478{padding-left: 150px !important;}&#8221;][vc_column_text]Secure LAN internal network[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1933","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.isc-telecom.com\/en\/wp-json\/wp\/v2\/pages\/1933"}],"collection":[{"href":"https:\/\/www.isc-telecom.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.isc-telecom.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.isc-telecom.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.isc-telecom.com\/en\/wp-json\/wp\/v2\/comments?post=1933"}],"version-history":[{"count":5,"href":"https:\/\/www.isc-telecom.com\/en\/wp-json\/wp\/v2\/pages\/1933\/revisions"}],"predecessor-version":[{"id":2147,"href":"https:\/\/www.isc-telecom.com\/en\/wp-json\/wp\/v2\/pages\/1933\/revisions\/2147"}],"wp:attachment":[{"href":"https:\/\/www.isc-telecom.com\/en\/wp-json\/wp\/v2\/media?parent=1933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}