top of page
SECURITY
![Image de Markus Spiske](https://static.wixstatic.com/media/nsplsh_4262446233494d525f7273~mv2_d_5760_3840_s_4_2.jpg/v1/fill/w_102,h_68,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/Image%20de%20Markus%20Spiske.jpg)
SECURITY AUDIT OF YOUR INFORMATION:
​
Study and implementation of strategies aimed at securing corporate information
Preventive IT security advice
![Image de Philipp Katzenberger](https://static.wixstatic.com/media/nsplsh_69494a72556f65526f4351~mv2_d_6000_4000_s_4_2.jpg/v1/fill/w_102,h_68,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/Image%20de%20Philipp%20Katzenberger.jpg)
COMPUTER SECURITY AUDIT:
Study and realization of IT security audit in professional environment
Realization of safety reports
![Image de GuerrillaBuzz](https://static.wixstatic.com/media/nsplsh_f356946f666e4ddeb7f0c536c3aaec5b~mv2.jpg/v1/fill/w_102,h_58,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/Image%20de%20GuerrillaBuzz.jpg)
COMPUTER SECURITY AUDIT:
Study and realization of IT security audit in professional environment
Realization of safety reports
bottom of page