{"id":43,"date":"2018-08-14T13:53:05","date_gmt":"2018-08-14T13:53:05","guid":{"rendered":"https:\/\/datact.qc.ca\/en\/?page_id=43"},"modified":"2018-08-27T15:44:08","modified_gmt":"2018-08-27T15:44:08","slug":"it-security","status":"publish","type":"page","link":"https:\/\/datact.qc.ca\/en\/services\/it-security\/","title":{"rendered":"IT Security"},"content":{"rendered":"<p>In a virtual world, we need real security. \u00a0To protect your infrastructures from the Internet and to prevent unauthorized access of your confidential data or for a disaster recovery plan, <em><strong>Consultations Datact<\/strong><\/em> has solutions<\/p>\n<ul>\n<li>Data Encryption<\/li>\n<li>Secure Remote Access<\/li>\n<li>Antivirus<\/li>\n<li>Antispyware<\/li>\n<li>Web filter<\/li>\n<li>Two factors Authentification<\/li>\n<li>Email Security<\/li>\n<li>Antispam<\/li>\n<li>Disaster Recovery Plan<\/li>\n<\/ul>\n<div class=\"tcls-wrap\"><div id=\"tc-logo\" class=\"owl-carousel owl-theme\"><div class=\"item\"><img src=\"https:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/cisco.jpg\" alt=\"\" \/><\/div><div class=\"item\"><img src=\"https:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/fortinet.jpg\" alt=\"\" \/><\/div><div class=\"item\"><img src=\"https:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/safenet.jpg\" alt=\"\" \/><\/div><div class=\"item\"><img src=\"https:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/crypto-200x150.jpg\" alt=\"\" \/><\/div><div class=\"item\"><img src=\"https:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/rsa.jpg\" alt=\"\" \/><\/div><div class=\"item\"><img src=\"https:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/ironkey.jpg\" alt=\"\" \/><\/div><div class=\"item\"><img src=\"https:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/bitlocker.jpg\" alt=\"\" \/><\/div><div class=\"item\"><img src=\"https:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/symantec.jpg\" alt=\"\" \/><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In a virtual world, we need real security. \u00a0To protect your infrastructures from the Internet and to prevent unauthorized access of your confidential data or for a disaster recovery plan, Consultations Datact has solutions Data Encryption Secure Remote Access Antivirus Antispyware Web filter Two factors Authentification Email Security Antispam Disaster [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":63,"parent":35,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT Security - CONSULTATIONS DATACT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/datact.qc.ca\/en\/services\/it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Security - CONSULTATIONS DATACT\" \/>\n<meta property=\"og:description\" content=\"In a virtual world, we need real security. \u00a0To protect your infrastructures from the Internet and to prevent unauthorized access of your confidential data or for a disaster recovery plan, Consultations Datact has solutions Data Encryption Secure Remote Access Antivirus Antispyware Web filter Two factors Authentification Email Security Antispam Disaster [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/datact.qc.ca\/en\/services\/it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"CONSULTATIONS DATACT\" \/>\n<meta property=\"article:modified_time\" content=\"2018-08-27T15:44:08+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/shutterstock_1074732014-edit.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1617\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/datact.qc.ca\/en\/#organization\",\"name\":\"Consultations Datact\",\"url\":\"https:\/\/datact.qc.ca\/en\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/datact.qc.ca\/en\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/DATAC_logo_entete.jpg\",\"contentUrl\":\"https:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/DATAC_logo_entete.jpg\",\"width\":1180,\"height\":344,\"caption\":\"Consultations Datact\"},\"image\":{\"@id\":\"https:\/\/datact.qc.ca\/en\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/datact.qc.ca\/en\/#website\",\"url\":\"https:\/\/datact.qc.ca\/en\/\",\"name\":\"Consultations Datact\",\"description\":\"IT Specialists\",\"publisher\":{\"@id\":\"https:\/\/datact.qc.ca\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/datact.qc.ca\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/datact.qc.ca\/en\/services\/it-security\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/shutterstock_1074732014-edit.jpg\",\"contentUrl\":\"https:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/shutterstock_1074732014-edit.jpg\",\"width\":2500,\"height\":1617},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/datact.qc.ca\/en\/services\/it-security\/#webpage\",\"url\":\"https:\/\/datact.qc.ca\/en\/services\/it-security\/\",\"name\":\"IT Security - CONSULTATIONS DATACT\",\"isPartOf\":{\"@id\":\"https:\/\/datact.qc.ca\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/datact.qc.ca\/en\/services\/it-security\/#primaryimage\"},\"datePublished\":\"2018-08-14T13:53:05+00:00\",\"dateModified\":\"2018-08-27T15:44:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/datact.qc.ca\/en\/services\/it-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/datact.qc.ca\/en\/services\/it-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/datact.qc.ca\/en\/services\/it-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/datact.qc.ca\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our Services\",\"item\":\"https:\/\/datact.qc.ca\/en\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT Security\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Security - CONSULTATIONS DATACT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/datact.qc.ca\/en\/services\/it-security\/","og_locale":"en_US","og_type":"article","og_title":"IT Security - CONSULTATIONS DATACT","og_description":"In a virtual world, we need real security. \u00a0To protect your infrastructures from the Internet and to prevent unauthorized access of your confidential data or for a disaster recovery plan, Consultations Datact has solutions Data Encryption Secure Remote Access Antivirus Antispyware Web filter Two factors Authentification Email Security Antispam Disaster [&hellip;]","og_url":"https:\/\/datact.qc.ca\/en\/services\/it-security\/","og_site_name":"CONSULTATIONS DATACT","article_modified_time":"2018-08-27T15:44:08+00:00","og_image":[{"width":2500,"height":1617,"url":"http:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/shutterstock_1074732014-edit.jpg","path":"\/var\/www\/vhosts\/datact.qc.ca\/httpdocs\/en\/wp-content\/uploads\/2018\/08\/shutterstock_1074732014-edit.jpg","size":"full","id":63,"alt":"","pixels":4042500,"type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/datact.qc.ca\/en\/#organization","name":"Consultations Datact","url":"https:\/\/datact.qc.ca\/en\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/datact.qc.ca\/en\/#logo","inLanguage":"en-US","url":"https:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/DATAC_logo_entete.jpg","contentUrl":"https:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/DATAC_logo_entete.jpg","width":1180,"height":344,"caption":"Consultations Datact"},"image":{"@id":"https:\/\/datact.qc.ca\/en\/#logo"}},{"@type":"WebSite","@id":"https:\/\/datact.qc.ca\/en\/#website","url":"https:\/\/datact.qc.ca\/en\/","name":"Consultations Datact","description":"IT Specialists","publisher":{"@id":"https:\/\/datact.qc.ca\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/datact.qc.ca\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/datact.qc.ca\/en\/services\/it-security\/#primaryimage","inLanguage":"en-US","url":"https:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/shutterstock_1074732014-edit.jpg","contentUrl":"https:\/\/datact.qc.ca\/en\/wp-content\/uploads\/2018\/08\/shutterstock_1074732014-edit.jpg","width":2500,"height":1617},{"@type":"WebPage","@id":"https:\/\/datact.qc.ca\/en\/services\/it-security\/#webpage","url":"https:\/\/datact.qc.ca\/en\/services\/it-security\/","name":"IT Security - CONSULTATIONS DATACT","isPartOf":{"@id":"https:\/\/datact.qc.ca\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/datact.qc.ca\/en\/services\/it-security\/#primaryimage"},"datePublished":"2018-08-14T13:53:05+00:00","dateModified":"2018-08-27T15:44:08+00:00","breadcrumb":{"@id":"https:\/\/datact.qc.ca\/en\/services\/it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/datact.qc.ca\/en\/services\/it-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/datact.qc.ca\/en\/services\/it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/datact.qc.ca\/en\/"},{"@type":"ListItem","position":2,"name":"Our Services","item":"https:\/\/datact.qc.ca\/en\/services\/"},{"@type":"ListItem","position":3,"name":"IT Security"}]}]}},"_links":{"self":[{"href":"https:\/\/datact.qc.ca\/en\/wp-json\/wp\/v2\/pages\/43"}],"collection":[{"href":"https:\/\/datact.qc.ca\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datact.qc.ca\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datact.qc.ca\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datact.qc.ca\/en\/wp-json\/wp\/v2\/comments?post=43"}],"version-history":[{"count":7,"href":"https:\/\/datact.qc.ca\/en\/wp-json\/wp\/v2\/pages\/43\/revisions"}],"predecessor-version":[{"id":224,"href":"https:\/\/datact.qc.ca\/en\/wp-json\/wp\/v2\/pages\/43\/revisions\/224"}],"up":[{"embeddable":true,"href":"https:\/\/datact.qc.ca\/en\/wp-json\/wp\/v2\/pages\/35"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/datact.qc.ca\/en\/wp-json\/wp\/v2\/media\/63"}],"wp:attachment":[{"href":"https:\/\/datact.qc.ca\/en\/wp-json\/wp\/v2\/media?parent=43"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}