{"id":262,"date":"2022-02-18T16:16:39","date_gmt":"2022-02-18T16:16:39","guid":{"rendered":"https:\/\/dev.ardecom.com\/?page_id=262"},"modified":"2022-02-18T18:38:53","modified_gmt":"2022-02-18T18:38:53","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/lb3.ca\/en\/cyber-security\/","title":{"rendered":"Cyber security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"262\" class=\"elementor elementor-262 elementor-200\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-49079c5d elementor-section-full_width elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle\" data-id=\"49079c5d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5ad7a8d5\" data-id=\"5ad7a8d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2cc69a03 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2cc69a03\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-69bbbad2\" data-id=\"69bbbad2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-17871c9c lb3-page-title elementor-widget elementor-widget-heading\" data-id=\"17871c9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyber security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46dc43ff elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"46dc43ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c43ac45 lb3-page-subtitle elementor-widget elementor-widget-text-editor\" data-id=\"2c43ac45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Applications, clouds, data, endpoint, identities, databases, mobile devices, internet we have the strategy to cover your entire company.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5aecef82 lb3-page-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5aecef82\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-282f41c5\" data-id=\"282f41c5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-18c5d04a elementor-widget elementor-widget-text-editor\" data-id=\"18c5d04a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Get a comprehensive strategy that meets the highest it security standards<\/h2><h3>Comprehensive protection, anywhere, for you, your employees, and your customers<\/h3><p>Cyber security is the least negligible element for companies today. With relentless threats in cyberspace, your IT security strategy is paramount. Applications, clouds, data, endpoint, identities, databases, mobile devices, internet we have the strategy to cover your entire company.<\/p><h2>A complete solution<\/h2><h3>Endpoint Protection<\/h3><p>Considered as the front line in the world of cyber security, endpoint security systems protect the entry points of your networks and\/or cloud. As soon as a mobile device is connected to your network, like a smart phone, smart watch, tablet, printer, etc. this device is considered an endpoint. With the range of mobile devices available today, endpoints are the preferred targets for potential threats. Our specialist technicians will be able to put in place an effective solution to protect all your entry points.<\/p><h3>Network Firewall Protection<\/h3><p>Essential to keeping your network safe, the firewall controls inbound and outbound network traffic according to a well-defined set of rules. \u00a0It is important to properly manage, monitor, maintain and update them 24 hours a day to minimize your vulnerability as much as possible.<\/p><h3>Patch Management<\/h3><p>Feeling overwhelmed by all the updates to bring to all your operating systems, platforms, and applications? This task is now ours! Our team ensures that all patches are always up to date to provide productivity and protection to your business.<\/p><h3>Industry Compliance<\/h3><p>Each industry has specific compliance requirements. Our team makes it its duty to ensure that you respect them by taking the necessary measures to ensure that your data is protected and confidential.<\/p><h2>Ensure your it security for good<\/h2><h3>Operate with confidence<\/h3><p>Your customers and employees will feel more confident and can focus on accomplishing their mission with peace of mind.<\/p><h3>Return on investment<\/h3><p>The various threats to your cyber security also represent significant monetary losses that disrupt the budget balance of your company. With a strategy tailored to your needs, we will be able to prevent potential attacks and you can focus on the important projects of your company with peace of mind.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Applications, clouds, data, endpoint, identities, databases, mobile devices, internet we have the strategy to cover your entire company. Get a comprehensive strategy that meets the highest it security standards Comprehensive protection, anywhere, for you, your employees, and your customers Cyber security is the least negligible element for companies today. With relentless threats in cyberspace, your [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-262","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/lb3.ca\/en\/wp-json\/wp\/v2\/pages\/262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lb3.ca\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lb3.ca\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lb3.ca\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lb3.ca\/en\/wp-json\/wp\/v2\/comments?post=262"}],"version-history":[{"count":4,"href":"https:\/\/lb3.ca\/en\/wp-json\/wp\/v2\/pages\/262\/revisions"}],"predecessor-version":[{"id":266,"href":"https:\/\/lb3.ca\/en\/wp-json\/wp\/v2\/pages\/262\/revisions\/266"}],"wp:attachment":[{"href":"https:\/\/lb3.ca\/en\/wp-json\/wp\/v2\/media?parent=262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}