Our expertise

Our offer can align the performance of your information system with your business requirements, allowing you to provide your products and services to your internal and external customers with an increased quality of service, in a reduced time (Time To Market). Our offer goes hand in hand with our mission to improve IT performance and includes innovative solutions and services for infrastructures (networks, datacenter, cloud), users, security and the monitoring of the company’s assets.

Nous proposons une approche cohérente de la gestion des menaces avec des solutions novatrices pour sécuriser les infrastructures et les données des entreprises.

.solutions integration

IT Infrastructure

A company's expansion, transformation and competitiveness cannot take place without an adequate, robust and scalable basic infrastructure.

Networks

In addition to our specialized skills in setting up networks for companies of all sizes, we have built our reputation by developing unique, differentiating expertise in the design of next-generation networks in compliance with the latest data center planning standards. Talentys is therefore the only company in its market capable of building and deploying an end-to-end Fabric IP architecture.

Servers and storage

In this digital era, data plays a key role in companies’ market strategy. Technology must evolve exponentially so as not to hinder digital transformation and respond quickly and efficiently to business demands.
Talentys allows companies to equip themselves with hyperconverged storage and backup environments whose efficiency and robustness are widely proven. We also integrate perfectly flexible virtualization systems into these environments, promoting the rapid deployment of applications.

Traffic management

Infrastructure availability and optimal management of data access are a major pillar of information system reliability and agility. To keep their businesses running smoothly, Talentys offers its customers advanced solutions for high availability (classic, geographic, application), optimized application access links and data flow control/monitoring. 

ZERO TRUST ACCESS

  • Secure Access (VPN, Multi Factor Authentication, NAC Secures SDWAN, Secure Web Gateway )
  • Internal Segmentation (ISFW, NCFW,NCPS)
  • Data Encryption/Decryption (SSL inspection)
  • Secure and 96G (Security Gateway)
  • Access Management (PAM, IAM) Secure IoT (IOT Gateway, secured access)

DATACENTER & CLOUD

  •  DC security (DCFW, DDOS)
  • Container Security (ISFW, Workload protection)
  • Application Security & API (AWAF,NGIPS)
  • Cloud visibility and control (Cloud
    Access Security Broker )
  •  SaaS (Security Subscription)
  • Email protection (Secured mail
    Gateway)

THREAT INTELLIGENCE

  • Secure Access (VPN, Multi Factor Authentication, NAC Secures SDWAN, Secure Web Gateway )
  • Internal Segmentation (ISFW, NCFW,NCPS)
  • Data Encryption/Decryption (SSL inspection)
  • Secure and 96G (Security Gateway)
  • Access Management (PAM, IAM) Secure IoT (IOT Gateway, secured access)

AUTOMATION & ORCHESTRATION

  •  DC security (DCFW, DDOS)
  • Container Security (ISFW, Workload protection)
  • Application Security & API (AWAF,NGIPS)
  • Cloud visibility and control (Cloud Access Security Broker )
  •  SaaS (Security Subscription)
  • Email protection (Secured mail Gateway)

ZERO TRUST ACCESS

  • Secure Access (VPN, Multi Factor Authentication, NAC Secures SDWAN, Secure Web Gateway )
  • Internal Segmentation (ISFW, NCFW,NCPS)
  • Data Encryption/Decryption (SSL inspection)
  • Secure and 96G (Security Gateway)
  • Access Management (PAM, IAM) Secure IoT (IOT Gateway, secured access)

DATACENTER & CLOUD

  •  DC security (DCFW, DDOS)
  • Container Security (ISFW, Workload protection)
  • Application Security & API (AWAF,NGIPS)
  • Cloud visibility and control (Cloud Access Security Broker )
  •  SaaS (Security Subscription)
  • Email protection (Secured mail Gateway)

THREAT INTELLIGENCE

  •  DC security (DCFW, DDOS)
  • Container Security (ISFW, Workload protection)
  • Application Security & API (AWAF,NGIPS)
  • Cloud visibility and control (Cloud Access Security Broker )
  •  SaaS (Security Subscription)
  • Email protection (Secured mail Gateway)

AUTOMATION & ORCHESTRATION

  •  DC security (DCFW, DDOS)
  • Container Security (ISFW, Workload protection)
  • Application Security & API (AWAF,NGIPS)
  • Cloud visibility and control (Cloud Access Security Broker )
  •  SaaS (Security Subscription)
  • Email protection (Secured mail Gateway)

.cybersecurity

The major risk inherent in the digital explosion is the multiplication of cyber-attacks due to the exponential increase in the number of entry points connected to corporate networks. In addition, new ways of working, such as remote work, mobile workers and IOTs, mean that more advanced control and protection tools are needed to secure companies. Talentys Cybersecurity's security services are a perfect response to these challenges.

SOC - security operation

Based in Côte d'Ivoire, our SOC brings together a set of complementary, modular and scalable solutions, designed to give companies the ability to anticipate, detect and respond to advanced threats and effectively manage IS vulnerabilities. The platform combines "Threat Intelligence", a centralized management portal, ITSM (Information Technology Service management) and a knowledge base via an international SOC network (Europe, America, Middle East and Africa) to offer the following services:

  • Complete visibility of security assets
  • Collecting information via secure channels
  • Customized customer portals with service level agreements (SLAs)
  • Defining KPIs for reporting
  • Forensic analysis and ethical hacking
  • Aggregation, correlation and analysis of security events
  • Access to our Cybersecurity Incident Response Center (CSIRT), staffed by experienced, multidisciplinary specialists

E-Banking protection

The E-Banking Protection service is designed for entities (banks, merchant sites, etc.) allowing their customers to carry out online transactions. This tool ensures your protection against recurring cyber threats to which users of this service could be exposed (phishing, malware, data theft, etc.).
Alerts are generated by specific platforms, then analyzed by specialists from our SOC using rigorous processes to highlight the risks linked to the events detected. The remediation phase occurs subsequently depending on each type of incident. The scope of action extends to the following families of threats: 

Deep WEB
Eradication of information leaks from the company ending up on the dark web.
Compromised accreditations
Remediation of compromised endpoints & corporate access.
Fraudulent domains

dentification and removal of fraudulent domains used in attacks against companies. 

Data theft
Detection of confidential company documents published on the Internet, in the dark web, or via P2P applications and protocols.
Hacktivism
Detection and remediation of DDoS and intrusion attacks against the company.
Phishing
Identify and block fake websites and impersonations that steal personal information.
Fraudulent applications
Identify and remove fake apps using the company's name that could harm its reputation
Compromised servers

Detection and remediation of compromised IT devices. 

CASB - Cloud Access Security Service Broker

With the era of Cloud solutions and their attractive advantages for businesses, comes the need to guarantee traceability and the same level of control as on-premise applications and protection systems, for real-time monitoring, information control and corrective action. Talentys Cybersecurity's CASB service provides the control and security required for access to Cloud applications, to meet legal and operational requirements across the board:

  • Discovering cloud applications (Shadow IT)
  • Full visibility of CLOUD usage: users, data, access and activities.
  • Create data access and sharing policies.
  • Prevent data leakage (DLP)
  • Get a quick, detailed view of specific actions in the cloud environment.
  • Automatic detection of risky activities and uses, as well as cyber threats

Pentest

Dedicated to detecting the level of vulnerability and assessing the mitigation capacity of a company's information system against potential attacks, our intrusion testing service allows us to assess the level of risk to which our customers are exposed and to determine the real possibilities of accessing their data, intercepting and/or modifying it. Using the same methods as hackers during cyber attacks, our specialists carry out intrusion attempts into the information system of the target company in order to assess its level of vulnerability. Among the direct benefits provided by penetration testing, we can highlight:

  • Identifying new vulnerabilities caused by changes and configurations.
  • Identifying problems with system, application, and configuration upgrades.
  • Identifying problems with system, application, and configuration upgrades.
  • Highlighting the level of protection compared to the company's security policy.

Hacker’s view

The purpose of the "Hacker's view" service is to provide an entity with an overview of its level of exposure to cybercrime on the Internet, as well as the information available to potential hackers who would like to target it.

In this context, our team of cybersecurity experts puts on the hacker hat to conduct research on the different layers of the internet: surface web, deep web, and dark web in order to identify criminal activity (data leaks, IP reputation, vulnerabilities, etc.) related to your company. The information collected will be correlated, analyzed, and put into perspective with potential threats (cybercrime; malware, targeting trends) in order to produce relevant recommendations.

At the end of this study, the Talentys cybersecurity team will provide you with two macro and micro reports, respectively containing measures at the strategic and operational levels. Recommendations are formulated to enable the implementation of these corrective measures within the framework of your cybersecurity strategy or to update your security infrastructure. They are based on best practices and cybersecurity standards, in line with the profile and activity of your company.

Audit de sécurité

Effective management of your network requires regular assessment of all threats and associated risks, to give you in-depth visibility of your environment. Our security audit service uses specific tools, forms and questionnaires tailored to the information security field, to identify your assets at risk of attack and map the associated risks.

The result will be an objective assessment of the maturity of the existing system (risks, gaps, deficiencies, etc...), together with appropriate recommendations in the form of a roadmap with short- and long-term milestones. Our support will enable you to:

  • Visualize your network's applications, threats and vulnerabilities, as well as your security management maturity level
  • State-of-the-art security assessments and strategies
  • Obtain clear indications of the security practices used in relation to the measures expected by the ISO27001 and ISO27002 standards
  • Effectively manage the priorities and resources required to address these risks
  • Improve your security posture and prevent attacks and business interruptions

Cyber-responsibility

Human beings remain the greatest vulnerability in an organization's cybersecurity strategy. That's why we place so much emphasis on raising awareness among corporate users. Talentys' global approach to security management offers an effective assessment, training and awareness program for your employees, through its cyber-responsibility initiation service.

This program is based on digital tools and innovative learning techniques adapted to the different professions in the company, combining games, learning by doing, group dynamics and reinforcement to establish new cyber-responsible behavioral models. This approach makes it possible to:

  • Achieve and maintain the skill levels of each employee in line with their risk profile
  • Involve employees in training through playful learning and emulation.
  • Monitor staff progress with actionable reports and analysis
  • Avoid information overload
  • Ensure that training is relevant to the day-to-day work of employees

SOC - security operation

Based in Côte d'Ivoire, our SOC brings together a set of complementary, modular and scalable solutions, designed to give companies the ability to anticipate, detect and respond to advanced threats and effectively manage IS vulnerabilities. The platform combines "Threat Intelligence", a centralized management portal, ITSM (Information Technology Service management) and a knowledge base via an international SOC network (Europe, America, Middle East and Africa) to offer the following services:

  • Complete visibility of security assets
  • Collecting information via secure channels
  • Customized customer portals with service level agreements (SLAs)
  • Defining KPIs for reporting
  • Forensic analysis and ethical hacking
  • Aggregation, correlation and analysis of security events
  • Access to our Cybersecurity Incident Response Center (CSIRT), staffed by experienced, multidisciplinary specialists

E-Banking protection

The E-Banking Protection service is designed for entities (banks, merchant sites, etc.) allowing their customers to carry out online transactions. This tool ensures your protection against recurring cyber threats to which users of this service could be exposed (phishing, malware, data theft, etc.).
Alerts are generated by specific platforms, then analyzed by specialists from our SOC using rigorous processes to highlight the risks linked to the events detected. The remediation phase occurs subsequently depending on each type of incident. The scope of action extends to the following families of threats: 

Deep WEB
Eradication of information leaks from the company ending up on the dark web.
Compromised accreditations
Remediation of compromised endpoints & corporate access.
Fraudulent domains

dentification and removal of fraudulent domains used in attacks against companies. 

Data theft
Detection of confidential company documents published on the Internet, in the dark web, or via P2P applications and protocols.
Hacktivism
Detection and remediation of DDoS and intrusion attacks against the company.
Phishing
Identify and block fake websites and impersonations that steal personal information.
Fraudulent applications
Identify and remove fake apps using the company's name that could harm its reputation
Compromised servers

Detection and remediation of compromised IT devices. 

CASB - Cloud Access Security Service Broker

With the era of Cloud solutions and their attractive advantages for businesses, comes the need to guarantee traceability and the same level of control as on-premise applications and protection systems, for real-time monitoring, information control and corrective action. Talentys Cybersecurity's CASB service provides the control and security required for access to Cloud applications, to meet legal and operational requirements across the board:

  • Discovering cloud applications (Shadow IT)
  • Full visibility of CLOUD usage: users, data, access and activities.
  • Create data access and sharing policies.
  • Prevent data leakage (DLP)
  • Get a quick, detailed view of specific actions in the cloud environment.
  • Automatic detection of risky activities and uses, as well as cyber threats

Pentest

Dedicated to detecting the level of vulnerability and assessing the mitigation capacity of a company's information system against potential attacks, our intrusion testing service allows us to assess the level of risk to which our customers are exposed and to determine the real possibilities of accessing their data, intercepting and/or modifying it. Using the same methods as hackers during cyber attacks, our specialists carry out intrusion attempts into the information system of the target company in order to assess its level of vulnerability. Among the direct benefits provided by penetration testing, we can highlight:

  • Identifying new vulnerabilities caused by changes and configurations.
  • Identifying problems with system, application, and configuration upgrades.
  • Identifying problems with system, application, and configuration upgrades.
  • Highlighting the level of protection compared to the company's security policy.

Hacker’s view

The purpose of the "Hacker's view" service is to provide an entity with an overview of its level of exposure to cybercrime on the Internet, as well as the information available to potential hackers who would like to target it.

In this context, our team of cybersecurity experts puts on the hacker hat to conduct research on the different layers of the internet: surface web, deep web, and dark web in order to identify criminal activity (data leaks, IP reputation, vulnerabilities, etc.) related to your company. The information collected will be correlated, analyzed, and put into perspective with potential threats (cybercrime; malware, targeting trends) in order to produce relevant recommendations.

At the end of this study, the Talentys cybersecurity team will provide you with two macro and micro reports, respectively containing measures at the strategic and operational levels. Recommendations are formulated to enable the implementation of these corrective measures within the framework of your cybersecurity strategy or to update your security infrastructure. They are based on best practices and cybersecurity standards, in line with the profile and activity of your company.

Audit de sécurité

Effective management of your network requires regular assessment of all threats and associated risks, to give you in-depth visibility of your environment. Our security audit service uses specific tools, forms and questionnaires tailored to the information security field, to identify your assets at risk of attack and map the associated risks.

The result will be an objective assessment of the maturity of the existing system (risks, gaps, deficiencies, etc...), together with appropriate recommendations in the form of a roadmap with short- and long-term milestones. Our support will enable you to:

  • Visualize your network's applications, threats and vulnerabilities, as well as your security management maturity level
  • State-of-the-art security assessments and strategies
  • Obtain clear indications of the security practices used in relation to the measures expected by the ISO27001 and ISO27002 standards
  • Effectively manage the priorities and resources required to address these risks
  • Improve your security posture and prevent attacks and business interruptions

Cyber-responsibility

Human beings remain the greatest vulnerability in an organization's cybersecurity strategy. That's why we place so much emphasis on raising awareness among corporate users. Talentys' global approach to security management offers an effective assessment, training and awareness program for your employees, through its cyber-responsibility initiation service.

This program is based on digital tools and innovative learning techniques adapted to the different professions in the company, combining games, learning by doing, group dynamics and reinforcement to establish new cyber-responsible behavioral models. This approach makes it possible to:

  • Achieve and maintain the skill levels of each employee in line with their risk profile
  • Involve employees in training through playful learning and emulation.
  • Monitor staff progress with actionable reports and analysis
  • Avoid information overload
  • Ensure that training is relevant to the day-to-day work of employees

Schedule a demo

Would you like to learn more about our cybersecurity services or make an appointment with our cybersecurity teams to schedule a demo?

.our partners

EN

    .planifier une démo SOC