{"id":9710,"date":"2025-04-04T12:58:52","date_gmt":"2025-04-04T10:58:52","guid":{"rendered":"https:\/\/netsystem.fr\/security-operation-center-soc-consulting-support\/"},"modified":"2025-07-07T10:31:39","modified_gmt":"2025-07-07T08:31:39","slug":"security-operation-center-soc-consulting-support","status":"publish","type":"page","link":"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/","title":{"rendered":"Security Operation Center (SOC) consulting &#038; support"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"9710\" class=\"elementor elementor-9710 elementor-9650\" data-elementor-post-type=\"page\">\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" data-dce-background-color=\"#000000\" data-dce-background-overlay-color=\"#16293699\" data-dce-background-overlay-image-url=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/12\/default-header-bg.jpg\" class=\"elementor-element elementor-element-7bacf6c e-flex e-con-boxed e-con e-parent\" data-id=\"7bacf6c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b21c025 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"b21c025\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">AMOA SOC internal, external or hybrid<br><span style=\"color:#a0a0a0\">Advice &amp; support<\/span><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-c55d8e1 e-con-full e-flex e-con e-child\" data-id=\"c55d8e1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-81dbee2 elementor-widget elementor-widget-button\" data-id=\"81dbee2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#offre\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-business-time\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M496 224c-79.59 0-144 64.41-144 144s64.41 144 144 144 144-64.41 144-144-64.41-144-144-144zm64 150.29c0 5.34-4.37 9.71-9.71 9.71h-60.57c-5.34 0-9.71-4.37-9.71-9.71v-76.57c0-5.34 4.37-9.71 9.71-9.71h12.57c5.34 0 9.71 4.37 9.71 9.71V352h38.29c5.34 0 9.71 4.37 9.71 9.71v12.58zM496 192c5.4 0 10.72.33 16 .81V144c0-25.6-22.4-48-48-48h-80V48c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h395.12c28.6-20.09 63.35-32 100.88-32zM320 96H192V64h128v32zm6.82 224H208c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h291.43C327.1 423.96 320 396.82 320 368c0-16.66 2.48-32.72 6.82-48z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Our offer<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-87b188e e-flex e-con-boxed e-con e-parent\" data-id=\"87b188e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-70911c2 elementor-widget elementor-widget-breadcrumbs\" data-id=\"70911c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/netsystem.fr\/en\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-ffb0341 e-con-full e-flex e-con e-child\" data-id=\"ffb0341\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17ab993 elementor-widget elementor-widget-text-editor\" data-id=\"17ab993\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>AMOA SOC: building an SOC to meet your cybersecurity challenges<\/h2>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-10620df e-flex e-con-boxed e-con e-child\" data-id=\"10620df\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-52867ca e-flex e-con-boxed e-con e-child\" data-id=\"52867ca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e9b57b7 elementor-widget elementor-widget-heading\" data-id=\"e9b57b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The SOC, your organization's cybersecurity control tower<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-786338c elementor-widget elementor-widget-text-editor\" data-id=\"786338c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The SOC is a dedicated team (in-house, outsourced or hybrid) that continuously monitors your information system to :<\/p>\n<ul>\n<li><strong>Detect threats<\/strong> (intrusions, attacks, abnormal behavior&#8230;),<\/li>\n<li><strong>Analyze security incidents<\/strong>,<\/li>\n<li><strong>React quickly to limit impacts<\/strong> (or even counter attacks in real time),<\/li>\n<li><strong>Prevent future attacks<\/strong> through continuous improvement.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14417e9 elementor-widget elementor-widget-heading\" data-id=\"14417e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Would you like to structure or strengthen your detection system?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58a37fc elementor-widget elementor-widget-text-editor\" data-id=\"58a37fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Let&#8217;s talk about your SOC project!<\/p>\n<p>We&#8217;re here to help you secure your organisation and turn cybersecurity challenges into real growth opportunities.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-f778fc0 e-flex e-con-boxed e-con e-child\" data-id=\"f778fc0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8eaeb98 elementor-widget elementor-widget-heading\" data-id=\"8eaeb98\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Your personalised SOC quote<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5658e53 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"5658e53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-alt\" viewBox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288 248v28c0 6.6-5.4 12-12 12H108c-6.6 0-12-5.4-12-12v-28c0-6.6 5.4-12 12-12h168c6.6 0 12 5.4 12 12zm-12 72H108c-6.6 0-12 5.4-12 12v28c0 6.6 5.4 12 12 12h168c6.6 0 12-5.4 12-12v-28c0-6.6-5.4-12-12-12zm108-188.1V464c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V48C0 21.5 21.5 0 48 0h204.1C264.8 0 277 5.1 286 14.1L369.9 98c9 8.9 14.1 21.2 14.1 33.9zm-128-80V128h76.1L256 51.9zM336 464V176H232c-13.3 0-24-10.7-24-24V48H48v416h288z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-798df69 elementor-widget elementor-widget-text-editor\" data-id=\"798df69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<form id=\"foss-66cf82d7d59cbc5c777a8eb6\"><\/form>\n<p><script async src='https:\/\/api.plezi.co\/api\/v1\/web_forms\/scripts?tenant_id=63b2e27754067a2e9841f03e&#038;form_id=66cf7d44d59cbc5c6b7a83dd&#038;form_version=3&#038;content_web_form_id=66cf82d7d59cbc5c777a8eb6&#038;plz_lang=fr'><\/script><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-ee002ec e-flex e-con-boxed e-con e-parent\" data-id=\"ee002ec\" data-element_type=\"container\" data-e-type=\"container\" id=\"offre\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee400ef elementor-widget elementor-widget-heading\" data-id=\"ee400ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our internal, external or hybrid SOC project management offer: consulting, structuring and management.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac40b6f elementor-widget elementor-widget-heading\" data-id=\"ac40b6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">A pragmatic, tailor-made approach.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79c65b8 elementor-widget elementor-widget-text-editor\" data-id=\"79c65b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our cyber and SOC experts will support you in defining, scoping, choosing the tools, the service provider (in the case of outsourcing) and deploying your security operations center.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b7fb1c elementor-widget elementor-widget-eael-content-timeline\" data-id=\"6b7fb1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-content-timeline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div id=\"eael-content-timeline-6b7fb1c\" class=\"content-timeline-layout-right date-position-outside horizontal-timeline-wrapper\" data-slide_to_scroll=\"{&quot;desktop&quot;:1,&quot;mobile&quot;:1,&quot;tablet&quot;:1,&quot;laptop&quot;:1,&quot;widescreen&quot;:1}\">\n\t\t\t<div class=\"eael-content-timeline-container\">\n\t\t\t\t<div class=\"eael-content-timeline-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-content-timeline-block\">\n    <div class=\"eael-content-timeline-line\">\n        <div class=\"eael-content-timeline-inner\"><\/div>\n    <\/div>\n    <div class=\"eael-content-timeline-img eael-picture \"><svg class=\"e-font-icon-svg e-fas-power-off\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M400 54.1c63 45 104 118.6 104 201.9 0 136.8-110.8 247.7-247.5 248C120 504.3 8.2 393 8 256.4 7.9 173.1 48.9 99.3 111.8 54.2c11.7-8.3 28-4.8 35 7.7L162.6 90c5.9 10.5 3.1 23.8-6.6 31-41.5 30.8-68 79.6-68 134.9-.1 92.3 74.5 168.1 168 168.1 91.6 0 168.6-74.2 168-169.1-.3-51.8-24.7-101.8-68.1-134-9.7-7.2-12.4-20.5-6.5-30.9l15.8-28.1c7-12.4 23.2-16.1 34.8-7.8zM296 264V24c0-13.3-10.7-24-24-24h-32c-13.3 0-24 10.7-24 24v240c0 13.3 10.7 24 24 24h32c13.3 0 24-10.7 24-24z\"><\/path><\/svg><\/div><div class=\"eael-content-timeline-content\"><span class=\"eael-date\">01<\/span><h4 class=\"eael-timeline-title\">Strategic framing and expression of needs<\/h4><div class=\"eael-timeline-excerpt\"><ul style=\"color: #ffffff\">\n<li>Analysis of the cyber context (IS, threats, regulatory obligations, maturity...)<\/li>\n<li>Clarification of SOC objectives (24\/7 detection? Compliance? Anticipation? Response? )<\/li>\n<li>Identification of the use cases to be covered (IT-oriented SOC? OT? cloud?)<\/li>\n<li>Definition of the functional scope (logs, SIEM, EDR, CMDB, tickets...)<\/li>\n<li>Collection of stakeholder expectations (CIO, CISO, production, business, COMEX)<\/li>\n<\/ul>\n<\/div><\/div><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-content-timeline-block\">\n    <div class=\"eael-content-timeline-line\">\n        <div class=\"eael-content-timeline-inner\"><\/div>\n    <\/div>\n    <div class=\"eael-content-timeline-img eael-picture \"><svg class=\"e-font-icon-svg e-fas-bullseye\" viewBox=\"0 0 496 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M248 8C111.03 8 0 119.03 0 256s111.03 248 248 248 248-111.03 248-248S384.97 8 248 8zm0 432c-101.69 0-184-82.29-184-184 0-101.69 82.29-184 184-184 101.69 0 184 82.29 184 184 0 101.69-82.29 184-184 184zm0-312c-70.69 0-128 57.31-128 128s57.31 128 128 128 128-57.31 128-128-57.31-128-128-128zm0 192c-35.29 0-64-28.71-64-64s28.71-64 64-64 64 28.71 64 64-28.71 64-64 64z\"><\/path><\/svg><\/div><div class=\"eael-content-timeline-content\"><span class=\"eael-date\">02<\/span><h4 class=\"eael-timeline-title\">Target model design<\/h4><div class=\"eael-timeline-excerpt\"><ul style=\"color: #ffffff\">\n<li>Choosing the model: in-house SOC, outsourced SOC, hybrid SOC<\/li>\n<li>Defining service levels (SLAs), coverage schedules, roles and responsibilities (RACI)<\/li>\n<li>Target architecture: log collection, SIEM, playbooks, supervision, ITSM interfacing<\/li>\n<li>Governance: steering committee, alert management, reporting, crisis management<\/li>\n<\/ul>\n<\/div><\/div><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-content-timeline-block\">\n    <div class=\"eael-content-timeline-line\">\n        <div class=\"eael-content-timeline-inner\"><\/div>\n    <\/div>\n    <div class=\"eael-content-timeline-img eael-picture \"><svg class=\"e-font-icon-svg e-far-compass\" viewBox=\"0 0 496 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M347.94 129.86L203.6 195.83a31.938 31.938 0 0 0-15.77 15.77l-65.97 144.34c-7.61 16.65 9.54 33.81 26.2 26.2l144.34-65.97a31.938 31.938 0 0 0 15.77-15.77l65.97-144.34c7.61-16.66-9.54-33.81-26.2-26.2zm-77.36 148.72c-12.47 12.47-32.69 12.47-45.16 0-12.47-12.47-12.47-32.69 0-45.16 12.47-12.47 32.69-12.47 45.16 0 12.47 12.47 12.47 32.69 0 45.16zM248 8C111.03 8 0 119.03 0 256s111.03 248 248 248 248-111.03 248-248S384.97 8 248 8zm0 448c-110.28 0-200-89.72-200-200S137.72 56 248 56s200 89.72 200 200-89.72 200-200 200z\"><\/path><\/svg><\/div><div class=\"eael-content-timeline-content\"><span class=\"eael-date\">03<\/span><h4 class=\"eael-timeline-title\">Help in choosing solutions or service providers<\/h4><div class=\"eael-timeline-excerpt\"><ul style=\"color: #ffffff\">\n<li>Drafting functional and technical specifications<\/li>\n<li>Benchmarking and analyzing offers (SIEM, SOC-as-a-Service...)<\/li>\n<li>Helping select MSSP provider if outsourcing<\/li>\n<li>Negotiating and contracting<\/li>\n<\/ul>\n<\/div><\/div><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-content-timeline-block\">\n    <div class=\"eael-content-timeline-line\">\n        <div class=\"eael-content-timeline-inner\"><\/div>\n    <\/div>\n    <div class=\"eael-content-timeline-img eael-picture \"><svg class=\"e-font-icon-svg e-fas-user-clock\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M496 224c-79.6 0-144 64.4-144 144s64.4 144 144 144 144-64.4 144-144-64.4-144-144-144zm64 150.3c0 5.3-4.4 9.7-9.7 9.7h-60.6c-5.3 0-9.7-4.4-9.7-9.7v-76.6c0-5.3 4.4-9.7 9.7-9.7h12.6c5.3 0 9.7 4.4 9.7 9.7V352h38.3c5.3 0 9.7 4.4 9.7 9.7v12.6zM320 368c0-27.8 6.7-54.1 18.2-77.5-8-1.5-16.2-2.5-24.6-2.5h-16.7c-22.2 10.2-46.9 16-72.9 16s-50.6-5.8-72.9-16h-16.7C60.2 288 0 348.2 0 422.4V464c0 26.5 21.5 48 48 48h347.1c-45.3-31.9-75.1-84.5-75.1-144zm-96-112c70.7 0 128-57.3 128-128S294.7 0 224 0 96 57.3 96 128s57.3 128 128 128z\"><\/path><\/svg><\/div><div class=\"eael-content-timeline-content\"><span class=\"eael-date\">04<\/span><h4 class=\"eael-timeline-title\">Steering the implementation project<\/h4><div class=\"eael-timeline-excerpt\"><ul style=\"color: #ffffff\">\n<li>Detailed planning, milestones, checkpoints<\/li>\n<li>Monitoring the deployment of technical building blocks (collection, SIEM, alerting, tooling...)<\/li>\n<li>Coordination of internal teams, integrator and\/or MSSP (Managed Security Service Provider =&gt; provider of managed security services)<\/li>\n<li>Change management (organization, tools, processes)<\/li>\n<\/ul>\n<\/div><\/div><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-content-timeline-block\">\n    <div class=\"eael-content-timeline-line\">\n        <div class=\"eael-content-timeline-inner\"><\/div>\n    <\/div>\n    <div class=\"eael-content-timeline-img eael-picture \"><svg class=\"e-font-icon-svg e-fas-users-cog\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M610.5 341.3c2.6-14.1 2.6-28.5 0-42.6l25.8-14.9c3-1.7 4.3-5.2 3.3-8.5-6.7-21.6-18.2-41.2-33.2-57.4-2.3-2.5-6-3.1-9-1.4l-25.8 14.9c-10.9-9.3-23.4-16.5-36.9-21.3v-29.8c0-3.4-2.4-6.4-5.7-7.1-22.3-5-45-4.8-66.2 0-3.3.7-5.7 3.7-5.7 7.1v29.8c-13.5 4.8-26 12-36.9 21.3l-25.8-14.9c-2.9-1.7-6.7-1.1-9 1.4-15 16.2-26.5 35.8-33.2 57.4-1 3.3.4 6.8 3.3 8.5l25.8 14.9c-2.6 14.1-2.6 28.5 0 42.6l-25.8 14.9c-3 1.7-4.3 5.2-3.3 8.5 6.7 21.6 18.2 41.1 33.2 57.4 2.3 2.5 6 3.1 9 1.4l25.8-14.9c10.9 9.3 23.4 16.5 36.9 21.3v29.8c0 3.4 2.4 6.4 5.7 7.1 22.3 5 45 4.8 66.2 0 3.3-.7 5.7-3.7 5.7-7.1v-29.8c13.5-4.8 26-12 36.9-21.3l25.8 14.9c2.9 1.7 6.7 1.1 9-1.4 15-16.2 26.5-35.8 33.2-57.4 1-3.3-.4-6.8-3.3-8.5l-25.8-14.9zM496 368.5c-26.8 0-48.5-21.8-48.5-48.5s21.8-48.5 48.5-48.5 48.5 21.8 48.5 48.5-21.7 48.5-48.5 48.5zM96 224c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm224 32c1.9 0 3.7-.5 5.6-.6 8.3-21.7 20.5-42.1 36.3-59.2 7.4-8 17.9-12.6 28.9-12.6 6.9 0 13.7 1.8 19.6 5.3l7.9 4.6c.8-.5 1.6-.9 2.4-1.4 7-14.6 11.2-30.8 11.2-48 0-61.9-50.1-112-112-112S208 82.1 208 144c0 61.9 50.1 112 112 112zm105.2 194.5c-2.3-1.2-4.6-2.6-6.8-3.9-8.2 4.8-15.3 9.8-27.5 9.8-10.9 0-21.4-4.6-28.9-12.6-18.3-19.8-32.3-43.9-40.2-69.6-10.7-34.5 24.9-49.7 25.8-50.3-.1-2.6-.1-5.2 0-7.8l-7.9-4.6c-3.8-2.2-7-5-9.8-8.1-3.3.2-6.5.6-9.8.6-24.6 0-47.6-6-68.5-16h-8.3C179.6 288 128 339.6 128 403.2V432c0 26.5 21.5 48 48 48h255.4c-3.7-6-6.2-12.8-6.2-20.3v-9.2zM173.1 274.6C161.5 263.1 145.6 256 128 256H64c-35.3 0-64 28.7-64 64v32c0 17.7 14.3 32 32 32h65.9c6.3-47.4 34.9-87.3 75.2-109.4z\"><\/path><\/svg><\/div><div class=\"eael-content-timeline-content\"><span class=\"eael-date\">05<\/span><h4 class=\"eael-timeline-title\">Production support<\/h4><div class=\"eael-timeline-excerpt\"><ul style=\"color: #ffffff\">\n<li>Implementation of alert handling procedures<\/li>\n<li>Development of response playbooks<\/li>\n<li>Support for internal teams (internal SOC or internal relays for MSSPs)<\/li>\n<li>Monitoring of start-up in real conditions (run)<\/li>\n<\/ul>\n<\/div><\/div><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-content-timeline-block\">\n    <div class=\"eael-content-timeline-line\">\n        <div class=\"eael-content-timeline-inner\"><\/div>\n    <\/div>\n    <div class=\"eael-content-timeline-img eael-picture \"><svg class=\"e-font-icon-svg e-fas-chart-line\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M496 384H64V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-32c0-8.84-7.16-16-16-16zM464 96H345.94c-21.38 0-32.09 25.85-16.97 40.97l32.4 32.4L288 242.75l-73.37-73.37c-12.5-12.5-32.76-12.5-45.25 0l-68.69 68.69c-6.25 6.25-6.25 16.38 0 22.63l22.62 22.62c6.25 6.25 16.38 6.25 22.63 0L192 237.25l73.37 73.37c12.5 12.5 32.76 12.5 45.25 0l96-96 32.4 32.4c15.12 15.12 40.97 4.41 40.97-16.97V112c.01-8.84-7.15-16-15.99-16z\"><\/path><\/svg><\/div><div class=\"eael-content-timeline-content\"><span class=\"eael-date\">06<\/span><h4 class=\"eael-timeline-title\">Structuring governance and continuous improvement<\/h4><div class=\"eael-timeline-excerpt\"><ul style=\"color: #ffffff\">\n<li>Definition of KPIs and reporting (number of alerts, response time, incidents avoided...)<\/li>\n<li>Organization of steering committees (weekly, monthly)<\/li>\n<li>Review of use case mapping<\/li>\n<li>Progressive ramp-up of the SOC (prioritization by risks or critical assets)<\/li>\n<\/ul>\n<\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38df0a5 elementor-share-buttons--view-icon elementor-share-buttons--skin-framed elementor-share-buttons--shape-circle elementor-share-buttons--color-custom elementor-grid-0 elementor-widget elementor-widget-share-buttons\" data-id=\"38df0a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_email\" role=\"button\" tabindex=\"0\" aria-label=\"Share on email\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-envelope\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Share on whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-whatsapp\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M380.9 97.1C339 55.1 283.2 32 223.9 32c-122.4 0-222 99.6-222 222 0 39.1 10.2 77.3 29.6 111L0 480l117.7-30.9c32.4 17.7 68.9 27 106.1 27h.1c122.3 0 224.1-99.6 224.1-222 0-59.3-25.2-115-67.1-157zm-157 341.6c-33.2 0-65.7-8.9-94-25.7l-6.7-4-69.8 18.3L72 359.2l-4.4-7c-18.5-29.4-28.2-63.3-28.2-98.2 0-101.7 82.8-184.5 184.6-184.5 49.3 0 95.6 19.2 130.4 54.1 34.8 34.9 56.2 81.2 56.1 130.5 0 101.8-84.9 184.6-186.6 184.6zm101.2-138.2c-5.5-2.8-32.8-16.2-37.9-18-5.1-1.9-8.8-2.8-12.5 2.8-3.7 5.6-14.3 18-17.6 21.8-3.2 3.7-6.5 4.2-12 1.4-32.6-16.3-54-29.1-75.5-66-5.7-9.8 5.7-9.1 16.3-30.3 1.8-3.7.9-6.9-.5-9.7-1.4-2.8-12.5-30.1-17.1-41.2-4.5-10.8-9.1-9.3-12.5-9.5-3.2-.2-6.9-.2-10.6-.2-3.7 0-9.7 1.4-14.8 6.9-5.1 5.6-19.4 19-19.4 46.3 0 27.3 19.9 53.7 22.6 57.4 2.8 3.7 39.1 59.7 94.8 83.8 35.2 15.2 49 16.5 66.6 13.9 10.7-1.6 32.8-13.4 37.4-26.4 4.6-13 4.6-24.1 3.2-26.4-1.3-2.5-5-3.9-10.5-6.6z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Share on linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-linkedin\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Share on twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-twitter\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M459.37 151.716c.325 4.548.325 9.097.325 13.645 0 138.72-105.583 298.558-298.558 298.558-59.452 0-114.68-17.219-161.137-47.106 8.447.974 16.568 1.299 25.34 1.299 49.055 0 94.213-16.568 130.274-44.832-46.132-.975-84.792-31.188-98.112-72.772 6.498.974 12.995 1.624 19.818 1.624 9.421 0 18.843-1.3 27.614-3.573-48.081-9.747-84.143-51.98-84.143-102.985v-1.299c13.969 7.797 30.214 12.67 47.431 13.319-28.264-18.843-46.781-51.005-46.781-87.391 0-19.492 5.197-37.36 14.294-52.954 51.655 63.675 129.3 105.258 216.365 109.807-1.624-7.797-2.599-15.918-2.599-24.04 0-57.828 46.782-104.934 104.934-104.934 30.213 0 57.502 12.67 76.67 33.137 23.715-4.548 46.456-13.32 66.599-25.34-7.798 24.366-24.366 44.833-46.132 57.827 21.117-2.273 41.584-8.122 60.426-16.243-14.292 20.791-32.161 39.308-52.628 54.253z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-0cc328a e-flex e-con-boxed e-con e-parent\" data-id=\"0cc328a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f036307 elementor-widget elementor-widget-heading\" data-id=\"f036307\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Netsystem helped KERIALIS comply with DORA and implement its SOC<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c1c44c elementor-widget elementor-widget-image\" data-id=\"4c1c44c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_translateX_effect&quot;:&quot;yes&quot;,&quot;motion_fx_devices&quot;:[&quot;widescreen&quot;,&quot;desktop&quot;],&quot;motion_fx_translateX_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;motion_fx_translateX_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/netsystem.fr\/en\/cas-client\/kerialis-rssi-as-a-service-dora-gap-analysis\/\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"851\" height=\"315\" src=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/12\/Kerialis_RSSI.jpg\" class=\"attachment-full size-full wp-image-8330\" alt=\"\" srcset=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/12\/Kerialis_RSSI.jpg 851w, https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/12\/Kerialis_RSSI-300x111.jpg 300w, https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/12\/Kerialis_RSSI-768x284.jpg 768w\" sizes=\"(max-width: 851px) 100vw, 851px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-231d65b e-con-full e-flex e-con e-child\" data-id=\"231d65b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-36a845c e-con-full e-flex e-con e-child\" data-id=\"36a845c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b0b705 elementor-widget elementor-widget-text-editor\" data-id=\"3b0b705\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>KERIALIS, a social protection institution dedicated to the legal and accounting professions, offers supplementary health, provident, long-term care, end-of-career and retirement benefits, as well as a range of services to support its policyholders on a day-to-day basis.<\/p>\n<p>The organization wanted to improve its operational resilience by complying with DORA regulations, specific to its business sector and more generally to financial services companies.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-293e885 elementor-widget elementor-widget-button\" data-id=\"293e885\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/kerialis-rssi-as-a-service-dora-gap-analysis\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-bullhorn\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M576 240c0-23.63-12.95-44.04-32-55.12V32.01C544 23.26 537.02 0 512 0c-7.12 0-14.19 2.38-19.98 7.02l-85.03 68.03C364.28 109.19 310.66 128 256 128H64c-35.35 0-64 28.65-64 64v96c0 35.35 28.65 64 64 64h33.7c-1.39 10.48-2.18 21.14-2.18 32 0 39.77 9.26 77.35 25.56 110.94 5.19 10.69 16.52 17.06 28.4 17.06h74.28c26.05 0 41.69-29.84 25.9-50.56-16.4-21.52-26.15-48.36-26.15-77.44 0-11.11 1.62-21.79 4.41-32H256c54.66 0 108.28 18.81 150.98 52.95l85.03 68.03a32.023 32.023 0 0 0 19.98 7.02c24.92 0 32-22.78 32-32V295.13C563.05 284.04 576 263.63 576 240zm-96 141.42l-33.05-26.44C392.95 311.78 325.12 288 256 288v-96c69.12 0 136.95-23.78 190.95-66.98L480 98.58v282.84z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Find out how Netsystem supported KERIALIS<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-9e32df1 e-con-full e-flex e-con e-child\" data-id=\"9e32df1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a17ec6 elementor-blockquote--skin-border elementor-widget elementor-widget-blockquote\" data-id=\"3a17ec6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\t\"KERIALIS was looking for a service provider to help us comply with the DORA regulation.<br>We chose Netsystem for their speed in getting in touch with us, the quality of their exchanges and the speed of their response.<br>NETSYSTEM is an agile structure with a strong capacity to adapt, and experienced CISOs, particularly on the cybersecurity aspects linked to DORA.\"\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-blockquote__author\">Marie LEAO, Fonction cl\u00e9 conformit\u00e9 et Responsable du contr\u00f4le permanent chez KERIALIS<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-afb114b e-flex e-con-boxed e-con e-parent\" data-id=\"afb114b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d4ba2bf elementor-widget elementor-widget-heading\" data-id=\"d4ba2bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Netsystem is PASSI qualified<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-2d0628a e-con-full e-flex e-con e-child\" data-id=\"2d0628a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-1da767c e-con-full e-flex e-con e-child\" data-id=\"1da767c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a13f052 elementor-widget elementor-widget-text-editor\" data-id=\"a13f052\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>PASSI qualification is issued by the French Information Systems Security Agency (ANSSI).<\/p>\n<p>It is aimed at trusted service providers who carry out organizational and physical security audits, as well as audits of technical scopes, on their own behalf or on behalf of their customers.<\/p>\n<p>It is a real guarantee of quality and expertise for organizations looking for a cybersecurity consultancy firm to carry out an audit of their structure.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b9c450 elementor-widget elementor-widget-button\" data-id=\"4b9c450\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/netsystem.fr\/netsystem-obtient-la-qualification-passi\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-bullhorn\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M576 240c0-23.63-12.95-44.04-32-55.12V32.01C544 23.26 537.02 0 512 0c-7.12 0-14.19 2.38-19.98 7.02l-85.03 68.03C364.28 109.19 310.66 128 256 128H64c-35.35 0-64 28.65-64 64v96c0 35.35 28.65 64 64 64h33.7c-1.39 10.48-2.18 21.14-2.18 32 0 39.77 9.26 77.35 25.56 110.94 5.19 10.69 16.52 17.06 28.4 17.06h74.28c26.05 0 41.69-29.84 25.9-50.56-16.4-21.52-26.15-48.36-26.15-77.44 0-11.11 1.62-21.79 4.41-32H256c54.66 0 108.28 18.81 150.98 52.95l85.03 68.03a32.023 32.023 0 0 0 19.98 7.02c24.92 0 32-22.78 32-32V295.13C563.05 284.04 576 263.63 576 240zm-96 141.42l-33.05-26.44C392.95 311.78 325.12 288 256 288v-96c69.12 0 136.95-23.78 190.95-66.98L480 98.58v282.84z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Find out more about certification<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-75e3daa e-con-full e-flex e-con e-child\" data-id=\"75e3daa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9703d4d elementor-widget elementor-widget-image\" data-id=\"9703d4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"648\" src=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/09\/PASSI.png\" class=\"attachment-large size-large wp-image-7215\" alt=\"\" srcset=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/09\/PASSI.png 800w, https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/09\/PASSI-300x243.png 300w, https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/09\/PASSI-768x622.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-2ef2d76 e-flex e-con-boxed e-con e-parent\" data-id=\"2ef2d76\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-f182c0f e-con-full e-flex e-con e-child\" data-id=\"f182c0f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-ce43242 e-con-full e-flex e-con e-child\" data-id=\"ce43242\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9ebfa74 elementor-widget elementor-widget-heading\" data-id=\"9ebfa74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why choose Netsystem?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1988ea9 elementor-widget elementor-widget-text-editor\" data-id=\"1988ea9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li><strong>Independence<\/strong> from suppliers &amp; MSSP<\/li>\n<li><strong>Experience in the field<\/strong>: SOC projects in sensitive contexts (OT, cloud, multisites&#8230;)<\/li>\n<li><strong>Integrated CISO expertise<\/strong> (steering cockpit, compliance, crisis management)<\/li>\n<li><strong>Long-term vision<\/strong> : an SOC aligned with your IS strategy and your business risks<\/li>\n<\/ul>\n<p>As an independent firm, Netsystem can intervene:<\/p>\n<ul>\n<li>Upstream to define the SOC strategy,<\/li>\n<li>in project management to steer the project from A to Z,<\/li>\n<li>in ongoing governance with an RSSI cockpit,<\/li>\n<li>In one-off technical support (cloud, OT, IAM experts, etc.). ).<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec29a2e elementor-blockquote--skin-border elementor-widget elementor-widget-blockquote\" data-id=\"ec29a2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tImplementing an effective SOC is not just about choosing a technical solution: it's above all about building a resilient organization, aligned with business risks and adapted to the reality on the ground.<br><br>At Netsystem, we support our customers with a pragmatic, independent and results-oriented approach. We don't sell technological dreams; we work with them to build a detection and response system that is operational, sustainable and scalable.<br><br>Each assignment is an opportunity for us to forge a strong bond with in-house teams: we co-construct the SOC with CISOs, CIOs and business managers, always keeping in mind a simple but demanding objective: to reinforce security, without burdening the organization.<br><br>Our strength lies in the fact that we speak the language of the business, the regulators and the cyber operation. And that's what makes the difference when it comes to moving from strategy to action.\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-blockquote__author\">Vincent FERRARA, Head of Digital Trust practice<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-cc3ad47 e-con-full e-flex e-con e-child\" data-id=\"cc3ad47\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6717b68 elementor-widget elementor-widget-image\" data-id=\"6717b68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"855\" src=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/03\/VFE25-768x855.png\" class=\"attachment-medium_large size-medium_large wp-image-9495\" alt=\"\" srcset=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/03\/VFE25-768x855.png 768w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/03\/VFE25-270x300.png 270w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/03\/VFE25-920x1024.png 920w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/03\/VFE25.png 1000w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-9361f5a e-flex e-con-boxed e-con e-parent\" data-id=\"9361f5a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-81d005b elementor-widget elementor-widget-heading\" data-id=\"81d005b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Some clients<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-298ae8e elementor-pagination-type-bullets elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-loop-carousel\" data-id=\"298ae8e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:4681,&quot;slides_to_show&quot;:&quot;6&quot;,&quot;_skin&quot;:&quot;post&quot;,&quot;slides_to_show_widescreen&quot;:&quot;3&quot;,&quot;slides_to_show_laptop&quot;:&quot;3&quot;,&quot;slides_to_show_tablet&quot;:&quot;2&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;.elementor-loop-container&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;offset_sides&quot;:&quot;none&quot;,&quot;arrows&quot;:&quot;yes&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_widescreen&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-carousel.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-loop-nothing-found-message\">\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-7dd1d52 e-con-full e-flex e-con e-child\" data-id=\"7dd1d52\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9a40a59 elementor-widget elementor-widget-heading\" data-id=\"9a40a59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Examples of projects carried out<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b33e14a elementor-widget elementor-widget-eael-post-carousel\" data-id=\"b33e14a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;items&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:3,&quot;sizes&quot;:[]},&quot;items_widescreen&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;items_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;items_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:2,&quot;sizes&quot;:[]},&quot;items_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]}}\" data-widget_type=\"eael-post-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"swiper-container-wrap eael-post-grid-container eael-post-carousel-wrap eael-post-carousel-style-one swiper-container-wrap-dots-outside\" id=\"eael-post-grid-b33e14a\">\n\t\t\t            <div class=\"swiper swiper-8 eael-post-carousel eael-post-grid swiper-container-b33e14a eael-post-appender-b33e14a\" data-pagination=\".swiper-pagination-b33e14a\" data-arrow-next=\".swiper-button-next-b33e14a\" data-arrow-prev=\".swiper-button-prev-b33e14a\" data-items-mobile=\"1\" data-items-tablet=\"2\" data-items=\"3\" data-margin=\"10\" data-effect=\"slide\" data-speed=\"400\" data-autoplay=\"3000\" data-pause-on-hover=\"true\" data-loop=\"1\" data-dots=\"1\">\n                <div class=\"swiper-wrapper\">\n\t\t\t\t\t<div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/solimut-ebcp-update-and-crisis-exercise\/\" title=\"Solimut: EBCP update and crisis exercise\"><h4 class=\"eael-entry-title\">Solimut: EBCP update and crisis exercise<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/delfingen-tisax-certification-rssi-as-a-service\/\" title=\"Delfingen: TISAX certification &#038; RSSI as a service\"><h4 class=\"eael-entry-title\">Delfingen: TISAX certification &#038; RSSI as a service<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/sepur-gap-analysis-and-nis2-compliance\/\" title=\"SEPUR: Gap analysis and NIS2 compliance\"><h4 class=\"eael-entry-title\">SEPUR: Gap analysis and NIS2 compliance<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/irts-passi-audit-cybersecurity-diagnosis\/\" title=\"IRTS: PASSI Audit &#8211; Cybersecurity Diagnosis\"><h4 class=\"eael-entry-title\">IRTS: PASSI Audit &#8211; Cybersecurity Diagnosis<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/emera-group-nis2-compliance-ciso-as-a-service\/\" title=\"EMERA Group: NIS2 compliance &#038; CISO as a Service\"><h4 class=\"eael-entry-title\">EMERA Group: NIS2 compliance &#038; CISO as a Service<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/carambar-ciso-as-a-service-and-global-cybersecurity-programme\/\" title=\"Carambar: CISO as a Service and global cybersecurity programme\"><h4 class=\"eael-entry-title\">Carambar: CISO as a Service and global cybersecurity programme<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/kerialis-rssi-as-a-service-dora-gap-analysis\/\" title=\"Kerialis: RSSI as a service &#038; DORA Gap analysis\"><h4 class=\"eael-entry-title\">Kerialis: RSSI as a service &#038; DORA Gap analysis<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/neovacom\/\" title=\"Docoon.immo (formerly Neovacom) : ISO 27001 certification\"><h4 class=\"eael-entry-title\">Docoon.immo (formerly Neovacom) : ISO 27001 certification<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/valorem\/\" title=\"Valorem : IT risk management\"><h4 class=\"eael-entry-title\">Valorem : IT risk management<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/grand-narbonne\/\" title=\"Grand Narbonne: Data Security Enhancement\"><h4 class=\"eael-entry-title\">Grand Narbonne: Data Security Enhancement<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div>                <\/div>\n            <\/div>\n            <div class=\"clearfix\"><\/div>\n\t\t\t            <!-- Add Pagination -->\n            <div class=\"swiper-pagination swiper-pagination-b33e14a\"><\/div>\n\t\t        <\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-7f73040 e-flex e-con-boxed e-con e-parent\" data-id=\"7f73040\" data-element_type=\"container\" data-e-type=\"container\" id=\"base\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-689a16b elementor-widget elementor-widget-heading\" data-id=\"689a16b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Find out more about SOCs (Security Operation Centers)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-4210aea e-con-full e-flex e-con e-child\" data-id=\"4210aea\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-afa1aeb e-grid e-con-full e-con e-child\" data-id=\"afa1aeb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c04039b elementor-widget-laptop__width-initial elementor-widget__width-auto elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"c04039b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-c04039b\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"c04039b\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"the-main-missions-of-a-soc\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-2011\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">The main missions of a SOC<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-2011\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"the-main-missions-of-a-soc\"><ul>\n<li> 24\/7 monitoring of logs, networks, terminals, servers&#8230;<\/li>\n<li>Anomaly detection via tools such as SIEM (Security Information and Event Management).<\/li>\n<li>Alert processing and incident management.<\/li>\n<li>Forensic analysis in the event of an incident (research into causes and impacts).<\/li>\n<li>Continuous security improvement (feedback, reinforcement of defenses&#8230;).<\/li>\n<\/ul>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"what-are-the-different-levels-of-intervention\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-2012\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">What are the different levels of intervention?<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-2012\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"what-are-the-different-levels-of-intervention\"><p>Most SOCs adopt a hierarchical approach, comparable to the levels at which an incident is examined.<\/p>\n<p>Three levels are often present within the SOC team:<\/p>\n<ul>\n<li><strong>Level 1<\/strong>: detection and qualification of alerts.<\/li>\n<li><strong>Level 2<\/strong>: advanced investigation, event correlation.<\/li>\n<li><strong>Level 3<\/strong>: incident response, advanced expertise, escalation to CISOs.<\/li>\n<\/ul>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"why-is-an-soc-important\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-2013\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Why is an SOC important?<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-2013\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"why-is-an-soc-important\"><p>An SOC is essential to reduce the time needed to detect and respond to cyber-attacks. It allows us to centralize skills, improve responsiveness and ensure continuous monitoring in a context of constantly evolving threats.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"what-is-a-hybrid-soc\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-2014\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">What is a hybrid SOC?<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-2014\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"what-is-a-hybrid-soc\"><p>A hybrid SOC is a mixed security center model, combining the strengths of an in-house SOC and an outsourced SOC (or one operated by an MSSP &#8211; Managed Security Service Provider). It&#8217;s an intelligent compromise for many organizations.<\/p>\n<p><strong>Principle of the hybrid SOC:<\/strong><\/p>\n<p>The idea is to keep governance and critical decisions in-house (steering, prioritization, crisis management&#8230;), while outsourcing technical building blocks such as 24\/7 supervision, log collection, or certain analyses.<\/p>\n<p><strong>Why opt for a hybrid model?<\/strong><\/p>\n<ul>\n<li>Flexibility: resources tailored to needs (hours, volume, expertise&#8230;).<\/li>\n<li>Control: the organization retains control over priorities and sensitive data.<\/li>\n<li>Cost optimization: no need to internalize everything (very costly), or delegate everything (risk of loss of control).<\/li>\n<li>Access to expertise: service providers bring experienced analysts and powerful tools.<\/li>\n<li>Coverage 24\/7: easier to guarantee with a partner.<\/li>\n<\/ul>\n<p><strong><br \/>\nExample of operation:<\/strong><\/p>\n<ul>\n<li><strong>Level 1 (24\/7 detection)<\/strong>: provided by an MSSP provider.<\/li>\n<li><strong>Level 2 (analysis and correlation)<\/strong>: shared between the partner and internal teams.<\/li>\n<li><strong>Level 3 (response, crisis, strategic decisions)<\/strong>: managed in-house with the support of the CISO.<\/li>\n<\/ul>\n<p>At Netsystem, this type of hybrid model can be offered to accompany the CISO cockpit: we structure governance and set up a detection\/reaction ecosystem tailored to the challenges of each customer.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f810f72 elementor-widget elementor-widget-image\" data-id=\"f810f72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1588\" height=\"1766\" src=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/02\/Orchestre3.png\" class=\"attachment-full size-full wp-image-9139\" alt=\"\" srcset=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/02\/Orchestre3.png 1588w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/02\/Orchestre3-270x300.png 270w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/02\/Orchestre3-921x1024.png 921w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/02\/Orchestre3-768x854.png 768w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/02\/Orchestre3-1381x1536.png 1381w\" sizes=\"(max-width: 1588px) 100vw, 1588px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-0bd09ad e-flex e-con-boxed e-con e-parent\" data-id=\"0bd09ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-649026d elementor-widget elementor-widget-heading\" data-id=\"649026d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">To find out more about cyber security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99b489e elementor-widget elementor-widget-eael-post-timeline\" data-id=\"99b489e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-post-timeline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"eael-post-timeline-99b489e\" class=\"eael-post-timeline timeline-layout-default eael-post-timeline-arrow-\">\n            <div class=\"eael-post-timeline eael-post-appender eael-post-appender-99b489e\"><p class=\"no-posts-found\">No posts found!<\/p><\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>AMOA SOC internal, external or hybridAdvice &#038; support Our offer AMOA SOC: building an SOC to meet your cybersecurity challenges The SOC, your organization&#8217;s cybersecurity control tower The SOC is a dedicated team (in-house, outsourced or hybrid) that continuously monitors your information system to : Detect threats (intrusions, attacks, abnormal behavior&#8230;), Analyze security incidents, React [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-9710","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Operation Center (SOC) consulting &amp; support<\/title>\n<meta name=\"description\" content=\"SOC project management: Netsystem supports you in implementing your internal, external or hybrid SOC (Security Operation Center).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Operation Center (SOC) consulting &amp; support\" \/>\n<meta property=\"og:description\" content=\"SOC project management: Netsystem supports you in implementing your internal, external or hybrid SOC (Security Operation Center).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/\" \/>\n<meta property=\"og:site_name\" content=\"Netsystem\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-07T08:31:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/12\/Kerialis_RSSI.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/\",\"url\":\"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/\",\"name\":\"Security Operation Center (SOC) consulting & support\",\"isPartOf\":{\"@id\":\"https:\/\/netsystem.fr\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/12\/Kerialis_RSSI.jpg\",\"datePublished\":\"2025-04-04T10:58:52+00:00\",\"dateModified\":\"2025-07-07T08:31:39+00:00\",\"description\":\"SOC project management: Netsystem supports you in implementing your internal, external or hybrid SOC (Security Operation Center).\",\"breadcrumb\":{\"@id\":\"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/#primaryimage\",\"url\":\"https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/12\/Kerialis_RSSI.jpg\",\"contentUrl\":\"https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/12\/Kerialis_RSSI.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/netsystem.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Operation Center (SOC) consulting &#038; support\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/netsystem.fr\/en\/#website\",\"url\":\"https:\/\/netsystem.fr\/en\/\",\"name\":\"Netsystem\",\"description\":\"Soci\u00e9t\u00e9 de conseil en Syst\u00e8mes d\u2019Informations et en transformation digitale.\",\"publisher\":{\"@id\":\"https:\/\/netsystem.fr\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/netsystem.fr\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/netsystem.fr\/en\/#organization\",\"name\":\"Netsystem\",\"url\":\"https:\/\/netsystem.fr\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/netsystem.fr\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/11\/netsystem-logo-v3.png\",\"contentUrl\":\"https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/11\/netsystem-logo-v3.png\",\"width\":600,\"height\":186,\"caption\":\"Netsystem\"},\"image\":{\"@id\":\"https:\/\/netsystem.fr\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Operation Center (SOC) consulting & support","description":"SOC project management: Netsystem supports you in implementing your internal, external or hybrid SOC (Security Operation Center).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/","og_locale":"en_US","og_type":"article","og_title":"Security Operation Center (SOC) consulting & support","og_description":"SOC project management: Netsystem supports you in implementing your internal, external or hybrid SOC (Security Operation Center).","og_url":"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/","og_site_name":"Netsystem","article_modified_time":"2025-07-07T08:31:39+00:00","og_image":[{"url":"https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/12\/Kerialis_RSSI.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/","url":"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/","name":"Security Operation Center (SOC) consulting & support","isPartOf":{"@id":"https:\/\/netsystem.fr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/#primaryimage"},"image":{"@id":"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/#primaryimage"},"thumbnailUrl":"https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/12\/Kerialis_RSSI.jpg","datePublished":"2025-04-04T10:58:52+00:00","dateModified":"2025-07-07T08:31:39+00:00","description":"SOC project management: Netsystem supports you in implementing your internal, external or hybrid SOC (Security Operation Center).","breadcrumb":{"@id":"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/#primaryimage","url":"https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/12\/Kerialis_RSSI.jpg","contentUrl":"https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/12\/Kerialis_RSSI.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netsystem.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Security Operation Center (SOC) consulting &#038; support"}]},{"@type":"WebSite","@id":"https:\/\/netsystem.fr\/en\/#website","url":"https:\/\/netsystem.fr\/en\/","name":"Netsystem","description":"Soci\u00e9t\u00e9 de conseil en Syst\u00e8mes d\u2019Informations et en transformation digitale.","publisher":{"@id":"https:\/\/netsystem.fr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netsystem.fr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netsystem.fr\/en\/#organization","name":"Netsystem","url":"https:\/\/netsystem.fr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netsystem.fr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/11\/netsystem-logo-v3.png","contentUrl":"https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/11\/netsystem-logo-v3.png","width":600,"height":186,"caption":"Netsystem"},"image":{"@id":"https:\/\/netsystem.fr\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/pages\/9710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/comments?post=9710"}],"version-history":[{"count":2,"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/pages\/9710\/revisions"}],"predecessor-version":[{"id":11263,"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/pages\/9710\/revisions\/11263"}],"wp:attachment":[{"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/media?parent=9710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}