{"id":15,"date":"2023-03-28T12:50:35","date_gmt":"2023-03-28T10:50:35","guid":{"rendered":"http:\/\/192.168.20.3\/?page_id=15"},"modified":"2025-07-16T11:11:41","modified_gmt":"2025-07-16T09:11:41","slug":"accueil","status":"publish","type":"page","link":"https:\/\/cyberclm.fr\/","title":{"rendered":"Accueil"},"content":{"rendered":"\n<div class=\"wp-block-cover alignfull is-light\" style=\"min-height:561px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim has-background-gradient\" style=\"background:linear-gradient(135deg,rgb(173,225,236) 0%,rgb(0,128,129) 100%)\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"inherit-container-width wp-block-group alignwide is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile is-vertically-aligned-center\" style=\"grid-template-columns:auto 40%\"><div class=\"wp-block-media-text__content\">\n<h1 class=\"wp-block-heading has-text-align-left has-white-color has-text-color has-x-large-font-size\">Notre M\u00e9tier, Votre S\u00e9r\u00e9nit\u00e9<\/h1>\n\n\n\n<p>Nous nous occupons de la s\u00e9curisation de votre informatique,<br>Vous pouvez sereinement vous concentrer sur votre coeur de m\u00e9tier !<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/cyberclm.fr\/wp-content\/themes\/astra\/inc\/assets\/images\/starter-content\/hero-img.svg\" alt=\"\" class=\"wp-image-118 size-full\"\/><\/figure><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-ast-global-color-5-background-color has-background is-layout-constrained wp-container-core-group-is-layout-9cedb757 wp-block-group-is-layout-constrained\" style=\"padding-bottom:0px\">\n<div class=\"inherit-container-width wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-medium-font-size\">L&rsquo;informatique est omnipr\u00e9sente et omnipotente.<br>Assurer sa suret\u00e9 est fondatmental pour le dirigeant s&rsquo;il veut garantir la p\u00e9r\u00e9nit\u00e9 de son entit\u00e9.<br>Le m\u00e9tier de CyberCLM est d&rsquo;assumer cette r\u00e9silience pour et avec ses clients.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Sur le plan op\u00e9rationnel, cela signifie :<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-6b73ce23 wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" src=\"https:\/\/cyberclm.fr\/wp-content\/uploads\/2023\/04\/icons8-refer-to-manual-961.png\" alt=\"\" class=\"wp-image-41\" style=\"width:64px;height:64px\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left\" style=\"margin-top:16px\">Pr\u00e9vention<\/h3>\n\n\n\n<p>Construire avec vous les diff\u00e9rents plan de reprise d&rsquo;activit\u00e9 en cas d&rsquo;attaque cyber.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-6b73ce23 wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" src=\"https:\/\/cyberclm.fr\/wp-content\/uploads\/2023\/04\/icons8-securite-verifiee-961.png\" alt=\"\" class=\"wp-image-38\" style=\"width:64px;height:64px\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left\" style=\"margin-top:16px\">Protection<\/h3>\n\n\n\n<p>Prot\u00e9ger votre informatique avec des outils performants tout en limitant les efforts \u00e0 demander \u00e0 vos collaborateurs<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-6b73ce23 wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/cyberclm.fr\/wp-content\/uploads\/2023\/04\/icons8-radar-801.png\" alt=\"\" class=\"wp-image-40\" style=\"width:64px;height:64px\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left\" style=\"margin-top:16px\">Supervision<\/h3>\n\n\n\n<p>Suivre en temps r\u00e9els les actions sur votre syst\u00e8me d&rsquo;information et d\u00e9tecter les menaces<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-6b73ce23 wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/cyberclm.fr\/wp-content\/uploads\/2023\/04\/icons8-ambulance-1001.png\" alt=\"\" class=\"wp-image-39\" style=\"width:64px;height:64px\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left\" style=\"margin-top:16px\">R\u00e9action<\/h3>\n\n\n\n<p>Vous accompagner lors d&rsquo;un incident cyber afin de revenir le plus rapidement possible en production avec le minimum de d\u00e9g\u00e2ts<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-container-core-group-is-layout-45b0ac4f wp-block-group-is-layout-constrained\" id=\"services\" style=\"padding-top:144px;padding-bottom:0px\">\n<h2 class=\"wp-block-heading\">Notre offre<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-60cbf9bb wp-block-columns-is-layout-flex\" style=\"margin-top:50px\">\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-6b73ce23 wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/cyberclm.fr\/wp-content\/uploads\/2023\/04\/laptop.png\" alt=\"\" class=\"wp-image-53\" style=\"width:192px;height:192px\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"margin-top:64px\">\u00ab\u00a0Tout-en-Un\u00a0\u00bb<\/h3>\n\n\n\n<p>Lorsque l&rsquo;informatique n&rsquo;est pas le coeur de l&rsquo;activit\u00e9 mais uniquement un outil, standardiser la mise en oeuvre permet de r\u00e9duire drastiquement les co\u00fbts.<br>L&rsquo;ensemble du syst\u00e8me d&rsquo;information est pris en charge, de l&rsquo;acc\u00e8s r\u00e9seau \u00e0 la sauvegarde en passant par la connexion et la protection de tous les appareils.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-6b73ce23 wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/cyberclm.fr\/wp-content\/uploads\/2023\/04\/puzzle.png\" alt=\"\" class=\"wp-image-52\" style=\"width:192px;height:192px\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"margin-top:64px\">Adapt\u00e9e<\/h3>\n\n\n\n<p>Lorsque l&rsquo;offre tout-en-un ne permet plus de suivre l&rsquo;\u00e9volution de vos besoins et de votre syst\u00e8me d&rsquo;information, allez plus loin avec notre offre adapt\u00e9e, qui \u00e9tends les capacit\u00e9s de l&rsquo;offre tout-en-un.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-6b73ce23 wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/cyberclm.fr\/wp-content\/uploads\/2023\/04\/design.png\" alt=\"\" class=\"wp-image-51\" style=\"width:192px;height:192px\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"margin-top:64px\">Sur Mesure<\/h3>\n\n\n\n<p>A chaque besoin sp\u00e9cifique, une offre adapt\u00e9e doit \u00eatre mise en oeuvre. CyberCLM a d\u00e9velopp\u00e9 une expertise pointue sur un catalogue de solutions afin de r\u00e9pondre \u00e0 des probl\u00e9matiques pr\u00e9cises.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-container-core-group-is-layout-3fee123f wp-block-group-is-layout-constrained\" id=\"whyus\" style=\"padding-top:144px;padding-bottom:144px\">\n<h2 class=\"wp-block-heading\">Nos engagements<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-29aadeec wp-block-columns-is-layout-flex\" style=\"margin-top:60px\">\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-6b73ce23 wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/cyberclm.fr\/wp-content\/themes\/astra\/inc\/assets\/images\/starter-content\/professional.svg\" alt=\"\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"margin-top:16px\">Des profils distincts<\/h3>\n\n\n\n<p>Une seule personne peut difficilement comprendre et couvrir tous les besoin d&rsquo;une entreprise et de son dirigeant. Notre \u00e9quipe est compos\u00e9e de plusieurs profils distincts, tant sur le plan humain que technique, dans le but de fournir un service de qualit\u00e9 et r\u00e9pondant au mieux aux besoins des entreprises. <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-6b73ce23 wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/cyberclm.fr\/wp-content\/themes\/astra\/inc\/assets\/images\/starter-content\/passionate.svg\" alt=\"\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"margin-top:16px\">Notre \u00e9thique<\/h3>\n\n\n\n<p>Notre \u00e9quipe est compos\u00e9e de profils avec une exp\u00e9rience de plus de 20 ans dans le m\u00e9tier de la cybers\u00e9curit\u00e9. Nous sommes en mesure de comprendre au mieux vos besoins, et de proposer des solutions techniques s\u00e9lectionn\u00e9es de qualit\u00e9 pour y r\u00e9pondre.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-6b73ce23 wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/cyberclm.fr\/wp-content\/themes\/astra\/inc\/assets\/images\/starter-content\/support.svg\" alt=\"\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"margin-top:16px\">L&rsquo;implication<\/h3>\n\n\n\n<p>Vous aurez toujours un contact humain proche de vous pour r\u00e9pondre \u00e0 toutes vos questions et demandes.<br>En cas d&rsquo;incident cyber, nos \u00e9quipes sauront \u00eatre r\u00e9actives pour vous accompagner et ne pas vous laisser seul face \u00e0 la menace.<br>Notre support est en France et intervient partout en France m\u00e9tropolitaine.<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;informatique est omnipr\u00e9sente et omnipotente.Assurer sa suret\u00e9 est fondatmental pour le dirigeant s&rsquo;il veut garantir la p\u00e9r\u00e9nit\u00e9 de son entit\u00e9.Le m\u00e9tier de CyberCLM est d&rsquo;assumer cette r\u00e9silience pour et avec ses clients. Sur le plan op\u00e9rationnel, cela signifie : Pr\u00e9vention Construire avec vous les diff\u00e9rents plan de reprise d&rsquo;activit\u00e9 en cas d&rsquo;attaque cyber. Protection Prot\u00e9ger &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/cyberclm.fr\/\"> <span class=\"screen-reader-text\">Accueil<\/span> Lire la suite\u00a0\u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"plain-container","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"class_list":["post-15","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberclm.fr\/index.php\/wp-json\/wp\/v2\/pages\/15","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberclm.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberclm.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberclm.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberclm.fr\/index.php\/wp-json\/wp\/v2\/comments?post=15"}],"version-history":[{"count":7,"href":"https:\/\/cyberclm.fr\/index.php\/wp-json\/wp\/v2\/pages\/15\/revisions"}],"predecessor-version":[{"id":60,"href":"https:\/\/cyberclm.fr\/index.php\/wp-json\/wp\/v2\/pages\/15\/revisions\/60"}],"wp:attachment":[{"href":"https:\/\/cyberclm.fr\/index.php\/wp-json\/wp\/v2\/media?parent=15"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}