{"id":2013,"date":"2025-08-13T12:11:42","date_gmt":"2025-08-13T12:11:42","guid":{"rendered":"https:\/\/hoppsolutions.fun\/services\/"},"modified":"2025-11-06T13:19:11","modified_gmt":"2025-11-06T13:19:11","slug":"services","status":"publish","type":"page","link":"https:\/\/hoppsolutions.fun\/fr\/services\/","title":{"rendered":"Services"},"content":{"rendered":"\n<div class=\"wp-block-custom-hero custom-hero\"><div style=\"font-weight:bold;background-color:#eee;padding:4px 8px;margin-bottom:8px;font-size:12px;color:#555;border-radius:3px;text-transform:uppercase\">Hero Section<\/div><h1><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Services<\/mark><\/h1><h3>Tirant parti de la d\u00e9tection des menaces aliment\u00e9e par l&rsquo;IA, de la protection contre les vuln\u00e9rabilit\u00e9s de type \u00a0\u00bb z\u00e9ro jour \u00a0\u00bb et de l&rsquo;intelligence s\u00e9curitaire en temps r\u00e9el pour se d\u00e9fendre contre les cybermenaces sophistiqu\u00e9es et les attaques APT.<\/h3><\/div>\n\n<div class=\"wp-block-custom-simple-text custom-simple-text\" style=\"display:flex;flex-direction:row-reverse;align-items:center;gap:16px\"><div style=\"width:60%\"><div style=\"font-weight:bold;background-color:#eee;padding:4px 8px;margin-bottom:8px;font-size:12px;color:#555;border-radius:3px;text-transform:uppercase\">Simple Text<\/div><h2>Prot\u00e9ger votre  <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Actifs num\u00e9riques<\/mark><br\/><\/h2><p>Nous proposons une gamme compl\u00e8te de services de cybers\u00e9curit\u00e9 con\u00e7us pour prot\u00e9ger votre organisation contre les menaces en constante \u00e9volution et assurer la continuit\u00e9 de vos activit\u00e9s.<\/p><\/div><\/div>\n\n<div class=\"wp-block-custom-feature-card-grid feature-card-grid\" style=\"background-color:#ffffff\">\n<div class=\"wp-block-custom-feature-card feature-card feature-card-lightestGray\"><img decoding=\"async\" src=\"\/icons\/lock_icon.svg\" alt=\"Zero-Day Threat Defense\" class=\"feature-icon\"\/><h3>Zero-Day Threat Defense<\/h3><span class=\"feature-flag\">Advanced<\/span><ul><li>AI-powered threat detection<\/li><li>Quantum-resistant encryption<\/li><li>APT protection system<\/li><\/ul><a href=\"\/\" class=\"feature-button\" style=\"display:inline-block;padding:8px 12px;background-color:#0073aa;color:#fff;text-decoration:none;border-radius:4px;margin-top:10px\">Explorer les solutions de d\u00e9fense<\/a><\/div>\n\n\n\n<div class=\"wp-block-custom-feature-card feature-card feature-card-lightestGray\"><img decoding=\"async\" src=\"\/icons\/strikeSheild_icon.svg\" alt=\"Incident Response\" class=\"feature-icon\"\/><h3>Incident Response<\/h3><span class=\"feature-flag\">Real-Time<\/span><ul><li>24\/7 threat monitoring<\/li><li>Automated containment<\/li><li>Forensic analysis<\/li><\/ul><a href=\"\/\" class=\"feature-button\" style=\"display:inline-block;padding:8px 12px;background-color:#0073aa;color:#fff;text-decoration:none;border-radius:4px;margin-top:10px\">Voir le cadre de r\u00e9ponse<\/a><\/div>\n\n\n\n<div class=\"wp-block-custom-feature-card feature-card feature-card-lightestGray\"><img decoding=\"async\" src=\"\/icons\/antenna_icon.svg\" alt=\"Threat Intelligence\" class=\"feature-icon\"\/><h3>Threat Intelligence<\/h3><span class=\"feature-flag\">Proactive<\/span><ul><li>Dark web monitoring<\/li><li>Vulnerability scanning<\/li><li>Security assessment<\/li><\/ul><a href=\"\/\" class=\"feature-button\" style=\"display:inline-block;padding:8px 12px;background-color:#0073aa;color:#fff;text-decoration:none;border-radius:4px;margin-top:10px\">D\u00e9couvrez les outils d&rsquo;intelligence<\/a><\/div>\n<\/div>\n\n<section class=\"wp-block-custom-security-section security-section digital-assets\" style=\"background-color:#f9fafb\"><div class=\"badge\"><img decoding=\"async\" class=\"badge-icon\" src=\"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/antenna_icon.svg\" alt=\"\"\/><span class=\"badge-text\">Zero-Day Threat Defense<\/span><\/div><h2 class=\"heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Surveillance<\/mark> proactive <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">de la<\/mark> s\u00e9curit\u00e9<\/h2><p class=\"description\">Nous proposons une gamme compl\u00e8te de services de cybers\u00e9curit\u00e9 con\u00e7us pour prot\u00e9ger votre organisation contre les menaces en constante \u00e9volution et assurer la continuit\u00e9 de vos activit\u00e9s.<\/p><img decoding=\"async\" src=\"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/IMG-178.webp\" alt=\"\"\/><h3 class=\"subheading\">Centre d&rsquo;op\u00e9rations de s\u00e9curit\u00e9 24\/7<\/h3><p class=\"content\">Notre \u00e9quipe d&rsquo;analystes de la s\u00e9curit\u00e9 surveille vos syst\u00e8mes 24 heures sur 24, ce qui garantit une d\u00e9tection et une r\u00e9ponse imm\u00e9diates aux menaces potentielles.<\/p><ul class=\"list-items\"><li class=\"list-item\"><p class=\"list-item-description\">Surveillance en temps r\u00e9el du r\u00e9seau et des terminaux<\/p><\/li><li class=\"list-item\"><p class=\"list-item-description\">D\u00e9tection d&rsquo;anomalies par l&rsquo;IA<\/p><\/li><li class=\"list-item\"><p class=\"list-item-description\">Analyse comportementale et renseignements sur les menaces<\/p><\/li><li class=\"list-item\"><p class=\"list-item-description\">Protocoles automatis\u00e9s de confinement des menaces<\/p><\/li><\/ul><a href=\"\/\" class=\"cta-button\">D\u00e9couvrez notre SOC<\/a><\/section>\n\n<div class=\"wp-block-custom-card-grid\"><div style=\"font-weight:bold;background-color:#eee;padding:4px 8px;margin-bottom:8px;font-size:12px;color:#555;border-radius:3px;text-transform:uppercase\">Card Grid<\/div>\n<div class=\"wp-block-custom-card custom-card\" style=\"background-color:#ffffff\"><div style=\"font-weight:bold;background-color:#eee;padding:4px 8px;margin-bottom:8px;font-size:12px;color:#555;border-radius:3px;text-transform:uppercase\">Card<\/div><img decoding=\"async\" src=\"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/lock_icon.svg\" alt=\"Zero Trust Security\"\/><h3>Zero Trust Security<\/h3><p>Next-gen endpoint protection with behavioral AI, sandboxing, and zero trust architecture to prevent sophisticated malware and APT attacks.<\/p><\/div>\n\n\n\n<div class=\"wp-block-custom-card custom-card\" style=\"background-color:#ffffff\"><div style=\"font-weight:bold;background-color:#eee;padding:4px 8px;margin-bottom:8px;font-size:12px;color:#555;border-radius:3px;text-transform:uppercase\">Card<\/div><img decoding=\"async\" src=\"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/paddlock_icon.svg\" alt=\"Network Security\"\/><h3>Network Security<\/h3><p>Comprehensive protection for your network infrastructure, including firewalls, intrusion detection, and traffic analysis.<\/p><\/div>\n\n\n\n<div class=\"wp-block-custom-card custom-card\" style=\"background-color:#ffffff\"><div style=\"font-weight:bold;background-color:#eee;padding:4px 8px;margin-bottom:8px;font-size:12px;color:#555;border-radius:3px;text-transform:uppercase\">Card<\/div><img decoding=\"async\" src=\"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/cloud_icon.svg\" alt=\"Cloud Security\"\/><h3>Cloud Security<\/h3><p>Specialized protection for cloud environments, ensuring data security across all your cloud services and applications.<\/p><\/div>\n<p>default<\/p><\/div>\n\n<section class=\"wp-block-custom-security-section security-section security-incidents\" style=\"background-color:transparent\"><div class=\"badge\"><img decoding=\"async\" class=\"badge-icon\" src=\"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/09\/siren_icon.svg\" alt=\"\"\/><span class=\"badge-text\">Incident Response<\/span><\/div><h2 class=\"heading\">R\u00e9ponse rapide aux incidents de <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">s\u00e9curit\u00e9<\/mark> <\/h2><p class=\"description\">Lorsque des incidents de s\u00e9curit\u00e9 se produisent, notre \u00e9quipe d&rsquo;experts met en \u0153uvre des protocoles \u00e9prouv\u00e9s pour contenir les menaces, enqu\u00eater sur elles et y rem\u00e9dier rapidement et efficacement.<\/p><img decoding=\"async\" src=\"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/IMG-181.webp\" alt=\"\"\/><h3 class=\"subheading\">Cadre de r\u00e9ponse aux incidents<\/h3><p class=\"content\">Notre approche structur\u00e9e garantit une r\u00e9ponse rapide et efficace aux incidents de s\u00e9curit\u00e9, minimisant ainsi les dommages et les temps d&rsquo;arr\u00eat.<\/p><ul class=\"list-items\"><li class=\"list-item\"><h4 class=\"list-item-title\">D\u00e9tection et analyse<\/h4><p class=\"list-item-description\">Identification et \u00e9valuation rapides des incidents de s\u00e9curit\u00e9 \u00e0 l&rsquo;aide d&rsquo;outils m\u00e9dico-l\u00e9gaux avanc\u00e9s.<\/p><\/li><li class=\"list-item\"><h4 class=\"list-item-title\">Confinement, \u00e9radication et r\u00e9cup\u00e9ration<\/h4><p class=\"list-item-description\">Actions imm\u00e9diates pour isoler les syst\u00e8mes affect\u00e9s et emp\u00eacher la propagation de la menace.<\/p><\/li><li class=\"list-item\"><h4 class=\"list-item-title\">Analyse post-incident<\/h4><p class=\"list-item-description\">\u00c9limination compl\u00e8te des acteurs de la menace et r\u00e9tablissement des syst\u00e8mes dans un \u00e9tat op\u00e9rationnel s\u00fbr.<\/p><\/li><\/ul><a href=\"\/\" class=\"cta-button\">Demande de plan de r\u00e9ponse aux incidents<\/a><div class=\"metrics\"><div class=\"metric\"><p class=\"metric-value\">&lt; 15 min<\/p><p class=\"metric-label\">Temps de r\u00e9ponse initial moyen<\/p><\/div><div class=\"metric\"><p class=\"metric-value\">24\/7\/365<\/p><p class=\"metric-label\">Disponibilit\u00e9<\/p><\/div><div class=\"metric\"><p class=\"metric-value\">98.7%<\/p><p class=\"metric-label\">Taux de confinement r\u00e9ussi<\/p><\/div><\/div><\/section>\n\n<section class=\"wp-block-custom-security-section security-section digital-assets\" style=\"background-color:#f9fafb\"><div class=\"badge\"><img decoding=\"async\" class=\"badge-icon\" src=\"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/09\/fileSearch_icon.svg\" alt=\"\"\/><span class=\"badge-text\">Threat Intelligence<\/span><\/div><h2 class=\"heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Conseils d&rsquo;<\/mark>experts en mati\u00e8re de s\u00e9curit\u00e9<\/h2><p class=\"description\">Notre \u00e9quipe d&rsquo;experts en s\u00e9curit\u00e9 fournit des conseils strat\u00e9giques pour vous aider \u00e0 mettre en place un programme de s\u00e9curit\u00e9 complet align\u00e9 sur les objectifs de votre entreprise.<\/p><img decoding=\"async\" src=\"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/IMG-179.webp\" alt=\"\"\/><h3 class=\"subheading\">Conseil strat\u00e9gique en mati\u00e8re de s\u00e9curit\u00e9<\/h3><p class=\"content\">Nos consultants travaillent avec votre \u00e9quipe de direction pour d\u00e9velopper et mettre en \u0153uvre des strat\u00e9gies de s\u00e9curit\u00e9 qui prot\u00e8gent vos actifs tout en favorisant la croissance de votre entreprise.<\/p><ul class=\"list-items\"><li class=\"list-item\"><p class=\"list-item-description\">D\u00e9veloppement du programme de s\u00e9curit\u00e9 et \u00e9valuation de la maturit\u00e9<\/p><\/li><li class=\"list-item\"><p class=\"list-item-description\">Cadres d&rsquo;\u00e9valuation et de gestion des risques<\/p><\/li><li class=\"list-item\"><p class=\"list-item-description\">Conception et examen de l&rsquo;architecture de s\u00e9curit\u00e9<\/p><\/li><li class=\"list-item\"><p class=\"list-item-description\">Conformit\u00e9 et orientations r\u00e9glementaires<\/p><\/li><\/ul><a href=\"\/\" class=\"cta-button\">Planifier une consultation<\/a><\/section>\n\n<div class=\"wp-block-custom-card-grid\"><div style=\"font-weight:bold;background-color:#eee;padding:4px 8px;margin-bottom:8px;font-size:12px;color:#555;border-radius:3px;text-transform:uppercase\">Card Grid<\/div>\n<div class=\"wp-block-custom-card custom-card\" style=\"background-color:#ffffff\"><div style=\"font-weight:bold;background-color:#eee;padding:4px 8px;margin-bottom:8px;font-size:12px;color:#555;border-radius:3px;text-transform:uppercase\">Card<\/div><img decoding=\"async\" src=\"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/search_icon.svg\" alt=\"Security Assessments\"\/><h3>Security Assessments<\/h3><p>Comprehensive evaluation of your security posture to identify vulnerabilities and recommend improvements.<\/p><\/div>\n\n\n\n<div class=\"wp-block-custom-card custom-card\" style=\"background-color:#ffffff\"><div style=\"font-weight:bold;background-color:#eee;padding:4px 8px;margin-bottom:8px;font-size:12px;color:#555;border-radius:3px;text-transform:uppercase\">Card<\/div><img decoding=\"async\" src=\"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/document_icon.svg\" alt=\"Compliance and Governance\"\/><h3>Compliance and Governance<\/h3><p>Expert guidance on meeting regulatory requirements and implementing effective security governance.<\/p><\/div>\n\n\n\n<div class=\"wp-block-custom-card custom-card\" style=\"background-color:#ffffff\"><div style=\"font-weight:bold;background-color:#eee;padding:4px 8px;margin-bottom:8px;font-size:12px;color:#555;border-radius:3px;text-transform:uppercase\">Card<\/div><img decoding=\"async\" src=\"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/profileSettings_icon.svg\" alt=\"Security Training\"\/><h3>Security Training<\/h3><p>Customized security awareness programs to educate your team and build a security-conscious culture.<\/p><\/div>\n<p>default<\/p><\/div>\n\n<div class=\"wp-block-custom-simple-text custom-simple-text\" style=\"display:flex;flex-direction:row-reverse;align-items:center;gap:16px\"><div style=\"width:60%\"><div style=\"font-weight:bold;background-color:#eee;padding:4px 8px;margin-bottom:8px;font-size:12px;color:#555;border-radius:3px;text-transform:uppercase\">Simple Text<\/div><h2><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">S\u00e9curit\u00e9<\/mark>  Des solutions pour tous les besoins<\/h2><p>Choisissez le niveau de protection qui convient \u00e0 votre organisation gr\u00e2ce \u00e0 nos formules de s\u00e9curit\u00e9 flexibles.<\/p><\/div><\/div>\n\n<div class=\"wp-block-custom-card-grid\"><div style=\"font-weight:bold;background-color:#eee;padding:4px 8px;margin-bottom:8px;font-size:12px;color:#555;border-radius:3px;text-transform:uppercase\">Card Grid<\/div>\n<div class=\"wp-block-custom-card custom-card\" style=\"background-color:#ffffff\"><div style=\"font-weight:bold;background-color:#eee;padding:4px 8px;margin-bottom:8px;font-size:12px;color:#555;border-radius:3px;text-transform:uppercase\">Card<\/div><img decoding=\"async\" src=\"http:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/starSheild_icon.svg\" alt=\"Essential (SME Global Security)\"\/><h3>Essential (SME Global Security)<\/h3><p>Core protection for small businesses and startups.<\/p><ul><li>\u2705 Endpoint and patch management<\/li><li>\u2705 Cloud backup (regional hosting)<\/li><li>\u2705 Phishing simulator<\/li><\/ul><p>29<\/p><a href=\"\/\" class=\"custom-card-button\" style=\"background-color:#0073aa;color:#fff;padding:8px 12px;display:inline-block;text-decoration:none\">En savoir plus<\/a><\/div>\n\n\n\n<div class=\"wp-block-custom-card custom-card\" style=\"background-color:#ffffff\"><div style=\"font-weight:bold;background-color:#eee;padding:4px 8px;margin-bottom:8px;font-size:12px;color:#555;border-radius:3px;text-transform:uppercase\">Card<\/div><img decoding=\"async\" src=\"http:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/lock_icon.svg\" alt=\"Professional (Compliance and Risk)\"\/><h3>Professional (Compliance and Risk)<\/h3><p>Comprehensive protection for growing businesses.<\/p><ul><li>\u2705 Essential +<\/li><li>\u2705 Compliance Hub (ISO\/GDPR\/HIPAA\/SOC2)<\/li><li>\u2705 IAM Suite (SSO + MFA)<\/li><li>\u2705 Vulnerability scanner<\/li><\/ul><p>59<\/p><a href=\"\/\" class=\"custom-card-button\" style=\"background-color:#0073aa;color:#fff;padding:8px 12px;display:inline-block;text-decoration:none\">Commencez<\/a><\/div>\n\n\n\n<div class=\"wp-block-custom-card custom-card\" style=\"background-color:#ffffff\"><div style=\"font-weight:bold;background-color:#eee;padding:4px 8px;margin-bottom:8px;font-size:12px;color:#555;border-radius:3px;text-transform:uppercase\">Card<\/div><img decoding=\"async\" src=\"http:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/strikeSheild_icon.svg\" alt=\"Enterprise (Full QUAICY Suite)\"\/><h3>Enterprise (Full QUAICY Suite)<\/h3><p>Maximum security for large organizations.<\/p><ul><li>\u2705 Professional +<\/li><li>\u2705 SOC + Threat Intel Platform<\/li><li>\u2705 API Security Gateway<\/li><li>\u2705 AI Security Toolkit<\/li><li>\u2705 Quantum-safe VPN pilot<\/li><li>\u2705 Global Incident Response Toolkit<\/li><\/ul><p>119<\/p><a href=\"\/\" class=\"custom-card-button\" style=\"background-color:#0073aa;color:#fff;padding:8px 12px;display:inline-block;text-decoration:none\">Contacter les ventes<\/a><\/div>\n<p>subscription<\/p><\/div>\n\n<div class=\"wp-block-custom-simple-text custom-simple-text\" style=\"display:flex;flex-direction:row-reverse;align-items:center;gap:16px\"><div style=\"width:60%\"><div style=\"font-weight:bold;background-color:#eee;padding:4px 8px;margin-bottom:8px;font-size:12px;color:#555;border-radius:3px;text-transform:uppercase\">Simple Text<\/div><h2>Communs  <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Questions<\/mark>  A propos de nos services<\/h2><p>Trouvez les r\u00e9ponses aux questions les plus fr\u00e9quentes sur nos solutions de cybers\u00e9curit\u00e9.<\/p><\/div><\/div>\n\n<div class=\"wp-block-custom-common-questions w-full px-6 sm:px-12 md:px-[6.5rem] pb-10 md:pb-20 bg-lightestGray\"><div class=\"flex flex-col gap-4 sm:gap-6 max-w-3xl mx-auto px-4 md:px-0\"><details class=\"collapse-card\" style=\"margin-bottom:1rem\"><summary style=\"cursor:pointer;font-weight:bold\">How quickly can you respond to a security incident?r<\/summary><div style=\"padding-top:0.5rem\">Our typical response time is within 24-48 hours on business days. We strive to get back to all inquiries as quickly as possible!<\/div><\/details><details class=\"collapse-card\" style=\"margin-bottom:1rem\"><summary style=\"cursor:pointer;font-weight:bold\">What industries do you specialize in?<\/summary><div style=\"padding-top:0.5rem\">Our typical response time is within 24-48 hours on business days. We strive to get back to all inquiries as quickly as possible!<\/div><\/details><details class=\"collapse-card\" style=\"margin-bottom:1rem\"><summary style=\"cursor:pointer;font-weight:bold\">Do you offer customized security solutions?<\/summary><div style=\"padding-top:0.5rem\">Our typical response time is within 24-48 hours on business days. We strive to get back to all inquiries as quickly as possible!<\/div><\/details><details class=\"collapse-card\" style=\"margin-bottom:1rem\"><summary style=\"cursor:pointer;font-weight:bold\">How do you handle compliance requirements?<\/summary><div style=\"padding-top:0.5rem\">Our typical response time is within 24-48 hours on business days. We strive to get back to all inquiries as quickly as possible!<\/div><\/details><details class=\"collapse-card\" style=\"margin-bottom:1rem\"><summary style=\"cursor:pointer;font-weight:bold\">What sets your security services apart from competitors?<\/summary><div style=\"padding-top:0.5rem\">Our typical response time is within 24-48 hours on business days. We strive to get back to all inquiries as quickly as possible!<\/div><\/details><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_crdt_document":"","footnotes":""},"class_list":["post-2013","page","type-page","status-publish","hentry"],"acf":[],"structured_blocks":[{"type":"hero","title":"","subtitle":"","text":"","image":"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/IMG-1001.webp","buttonText":"","buttonUrl":"","buttonIcon":""},{"type":"simple_text","title":"Protecting your\u00a0<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Digital Assets<\/mark><br>","description":"We offer a comprehensive suite of cybersecurity services designed to protect your organization from evolving threats and ensure business continuity.","image":"","backgroundColor":"#ffffff","orientation":"right","contentOrder":""},{"type":"feature_card_grid","cards":[{"title":"Zero-Day Threat Defense","flag":"Advanced","logo":"\/icons\/lock_icon.svg","items":["AI-powered threat detection","Quantum-resistant encryption","APT protection system"],"buttonText":"Explorer les solutions de d\u00e9fense","buttonUrl":"\/","background":"lightestGray"},{"title":"Incident Response","flag":"Real-Time","logo":"\/icons\/strikeSheild_icon.svg","items":["24\/7 threat monitoring","Automated containment","Forensic analysis"],"buttonText":"Voir le cadre de r\u00e9ponse","buttonUrl":"\/","background":"lightestGray"},{"title":"Threat Intelligence","flag":"Proactive","logo":"\/icons\/antenna_icon.svg","items":["Dark web monitoring","Vulnerability scanning","Security assessment"],"buttonText":"D\u00e9couvrez les outils d'intelligence","buttonUrl":"\/","background":"lightestGray"}]},{"type":"security_section","sectionType":"digital-assets","badge":{"text":"Zero-Day Threat Defense","icon":"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/antenna_icon.svg"},"heading":"Proactive Security <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Monitoring<\/mark>","description":"We offer a comprehensive suite of cybersecurity services designed to protect your organization from evolving threats and ensure business continuity.","image":{"url":"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/IMG-178.webp","alt":""},"subheading":"Centre d'op\u00e9rations de s\u00e9curit\u00e9 24\/7","content":"Notre \u00e9quipe d'analystes de la s\u00e9curit\u00e9 surveille vos syst\u00e8mes 24 heures sur 24, ce qui garantit une d\u00e9tection et une r\u00e9ponse imm\u00e9diates aux menaces potentielles.","backgroundColor":"#f9fafb","listItems":[{"title":"Surveillance en temps r\u00e9el du r\u00e9seau et des terminaux","description":""},{"title":"D\u00e9tection d'anomalies par l'IA","description":""},{"title":"Analyse comportementale et renseignements sur les menaces","description":""},{"title":"Protocoles automatis\u00e9s de confinement des menaces","description":""}],"cta":{"text":"Learn About Our SOC","url":"\/"},"metrics":[]},{"type":"card_grid","cards":[{"title":"","text":"","imageUrl":"","backgroundColor":"#ffffff","items":[],"afterListText":"","buttonText":"","buttonUrl":"","buttonColor":"#0073aa"},{"title":"","text":"","imageUrl":"","backgroundColor":"#ffffff","items":[],"afterListText":"","buttonText":"","buttonUrl":"","buttonColor":"#0073aa"},{"title":"","text":"","imageUrl":"","backgroundColor":"#ffffff","items":[],"afterListText":"","buttonText":"","buttonUrl":"","buttonColor":"#0073aa"}],"sections":[],"grid_type":"","grid_title":"","grid_title_image":"","backgroundColor":"#f9fafb","backgroundImage":""},{"type":"security_section","sectionType":"security-incidents","badge":{"text":"Incident Response","icon":"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/09\/siren_icon.svg"},"heading":"Rapid Response to <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Security<\/mark> Incidents","description":"When security incidents occur, our expert team implements proven protocols to contain, investigate, and remediate threats quickly and effectively.","image":{"url":"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/IMG-181.webp","alt":""},"subheading":"Cadre de r\u00e9ponse aux incidents","content":"Notre approche structur\u00e9e garantit une r\u00e9ponse rapide et efficace aux incidents de s\u00e9curit\u00e9, minimisant ainsi les dommages et les temps d'arr\u00eat.","backgroundColor":"","listItems":[{"title":"Identification et \u00e9valuation rapides des incidents de s\u00e9curit\u00e9 \u00e0 l'aide d'outils m\u00e9dico-l\u00e9gaux avanc\u00e9s.","description":""},{"title":"Actions imm\u00e9diates pour isoler les syst\u00e8mes affect\u00e9s et emp\u00eacher la propagation de la menace.","description":""},{"title":"\u00c9limination compl\u00e8te des acteurs de la menace et r\u00e9tablissement des syst\u00e8mes dans un \u00e9tat op\u00e9rationnel s\u00fbr.","description":""}],"cta":{"text":"Request Incident Response Plan","url":"\/"},"metrics":[]},{"type":"security_section","sectionType":"digital-assets","badge":{"text":"Threat Intelligence","icon":"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/09\/fileSearch_icon.svg"},"heading":"Expert Security <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Guidance<\/mark>","description":"Our team of security experts provides strategic guidance to help you build a comprehensive security program aligned with your business objectives.","image":{"url":"https:\/\/hoppsolutions.fun\/wp-content\/uploads\/2025\/08\/IMG-179.webp","alt":""},"subheading":"Conseil strat\u00e9gique en mati\u00e8re de s\u00e9curit\u00e9","content":"Nos consultants travaillent avec votre \u00e9quipe de direction pour d\u00e9velopper et mettre en \u0153uvre des strat\u00e9gies de s\u00e9curit\u00e9 qui prot\u00e8gent vos actifs tout en favorisant la croissance de votre entreprise.","backgroundColor":"#f9fafb","listItems":[{"title":"D\u00e9veloppement du programme de s\u00e9curit\u00e9 et \u00e9valuation de la maturit\u00e9","description":""},{"title":"Cadres d'\u00e9valuation et de gestion des risques","description":""},{"title":"Conception et examen de l'architecture de s\u00e9curit\u00e9","description":""},{"title":"Conformit\u00e9 et orientations r\u00e9glementaires","description":""}],"cta":{"text":"Schedule a Consultation","url":"\/"},"metrics":[]},{"type":"card_grid","cards":[{"title":"","text":"","imageUrl":"","backgroundColor":"#ffffff","items":[],"afterListText":"","buttonText":"","buttonUrl":"","buttonColor":"#0073aa"},{"title":"","text":"","imageUrl":"","backgroundColor":"#ffffff","items":[],"afterListText":"","buttonText":"","buttonUrl":"","buttonColor":"#0073aa"},{"title":"","text":"","imageUrl":"","backgroundColor":"#ffffff","items":[],"afterListText":"","buttonText":"","buttonUrl":"","buttonColor":"#0073aa"}],"sections":[],"grid_type":"","grid_title":"","grid_title_image":"","backgroundColor":"#f9fafb","backgroundImage":""},{"type":"simple_text","title":"<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Security<\/mark>\u00a0Solutions For Every Need","description":"Choose the right level of protection for your organization with our flexible security packages.","image":"","backgroundColor":"","orientation":"right","contentOrder":""},{"type":"card_grid","cards":[{"title":"","text":"","imageUrl":"","backgroundColor":"#ffffff","items":[],"afterListText":"","buttonText":"En savoir plus","buttonUrl":"\/","buttonColor":"#0073aa"},{"title":"","text":"","imageUrl":"","backgroundColor":"#ffffff","items":[],"afterListText":"","buttonText":"Commencez","buttonUrl":"\/","buttonColor":"#0073aa"},{"title":"","text":"","imageUrl":"","backgroundColor":"#ffffff","items":[],"afterListText":"","buttonText":"Contacter les ventes","buttonUrl":"\/","buttonColor":"#0073aa"}],"sections":[],"grid_type":"subscription","grid_title":"","grid_title_image":"","backgroundColor":"#f9fafb","backgroundImage":""},{"type":"feature_comparison","table":[{"Feature":"Endpoint Protection","Essential Shield":true,"Advanced Guard":true,"Enterprise Fortress":true},{"Feature":"Email Security","Essential Shield":true,"Advanced Guard":true,"Enterprise Fortress":true},{"Feature":"Firewall Protection","Essential Shield":"Basic","Advanced Guard":"Advanced","Enterprise Fortress":"Enterprise-grade"},{"Feature":"Cloud Security","Essential Shield":false,"Advanced Guard":true,"Enterprise Fortress":true},{"Feature":"Data Loss Prevention","Essential Shield":false,"Advanced Guard":true,"Enterprise Fortress":true},{"Feature":"24\/7 Monitoring","Essential Shield":false,"Advanced Guard":true,"Enterprise Fortress":true},{"Feature":"Dedicated CISO","Essential Shield":false,"Advanced Guard":false,"Enterprise Fortress":true},{"Feature":"Threat Hunting","Essential Shield":false,"Advanced Guard":"Basic","Enterprise Fortress":"Advanced"},{"Feature":"Response Time","Essential Shield":"24 Hours","Advanced Guard":"4 Hours","Enterprise Fortress":"15 Minutes"}],"backgroundColor":"#ffffff"},{"type":"simple_text","title":"Common\u00a0<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Questions<\/mark>\u00a0About Our Services","description":"Find answers to the most frequently asked questions about our cybersecurity solutions.","image":"","backgroundColor":"#f9fafb","orientation":"right","contentOrder":""},{"type":"common_questions","questions":[{"question":"How quickly can you respond to a security incident?r","answer":"Our typical response time is within 24-48 hours on business days. We strive to get back to all inquiries as quickly as possible!"},{"question":"What industries do you specialize in?","answer":"Our typical response time is within 24-48 hours on business days. We strive to get back to all inquiries as quickly as possible!"},{"question":"Do you offer customized security solutions?","answer":"Our typical response time is within 24-48 hours on business days. We strive to get back to all inquiries as quickly as possible!"},{"question":"How do you handle compliance requirements?","answer":"Our typical response time is within 24-48 hours on business days. We strive to get back to all inquiries as quickly as possible!"},{"question":"What sets your security services apart from competitors?","answer":"Our typical response time is within 24-48 hours on business days. We strive to get back to all inquiries as quickly as possible!"}]}],"_links":{"self":[{"href":"https:\/\/hoppsolutions.fun\/fr\/wp-json\/wp\/v2\/pages\/2013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hoppsolutions.fun\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hoppsolutions.fun\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hoppsolutions.fun\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/hoppsolutions.fun\/fr\/wp-json\/wp\/v2\/comments?post=2013"}],"version-history":[{"count":1,"href":"https:\/\/hoppsolutions.fun\/fr\/wp-json\/wp\/v2\/pages\/2013\/revisions"}],"predecessor-version":[{"id":2015,"href":"https:\/\/hoppsolutions.fun\/fr\/wp-json\/wp\/v2\/pages\/2013\/revisions\/2015"}],"wp:attachment":[{"href":"https:\/\/hoppsolutions.fun\/fr\/wp-json\/wp\/v2\/media?parent=2013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}