{"id":2305,"date":"2022-03-23T18:35:21","date_gmt":"2022-03-23T17:35:21","guid":{"rendered":"https:\/\/kalweit-its.de\/approche-de-conseil\/"},"modified":"2024-09-10T22:55:59","modified_gmt":"2024-09-10T20:55:59","slug":"approche-de-conseil","status":"publish","type":"page","link":"https:\/\/kalweit-its.de\/fr\/approche-de-conseil\/","title":{"rendered":"Approche de conseil"},"content":{"rendered":"

[et_pb_section fb_built=\u00a0\u00bb1″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb0px|||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb||10px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/mountain1.jpg\u00a0\u00bb title_text=\u00a0\u00bbmountain1″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bb5556ca2a-c406-479f-b7c7-1a37901659d5″ global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb3_5,2_5″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb0px|||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb3_5″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n

Notre approche du conseil<\/strong><\/span><\/h2>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb2_5″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb2_5,3_5″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb2_5″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_css_main_element=\u00a0\u00bbz-index: 3;\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_margin=\u00a0\u00bb-90px|-200px|||false|false\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb0px|0px|||false|false\u00a0\u00bb custom_margin_phone=\u00a0\u00bb0px|0px|||false|false\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n

La s\u00e9curit\u00e9 informatique est un peu comme l’ascension d’une montagne. Constant, laborieux, mais toujours lib\u00e9rateur.<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n

En effet, si la s\u00e9curit\u00e9 informatique est utilis\u00e9e efficacement l\u00e0 o\u00f9 des risques informatiques r\u00e9els surviennent dans le cadre des op\u00e9rations informatiques r\u00e9guli\u00e8res, la s\u00e9curit\u00e9 informatique cr\u00e9e plus de libert\u00e9. Un peu comme dans le domaine de l’aviation : gr\u00e2ce \u00e0 des concepts et des mesures de s\u00e9curit\u00e9 \u00e9prouv\u00e9s, voler est \u00e0 la port\u00e9e de tous.<\/p>\n

En tant que cabinet de conseil ind\u00e9pendant, nous mettons votre entreprise \u00e0 l’abri des cyber-attaques. Nous les prot\u00e9geons d’une panne g\u00e9n\u00e9rale de leur entreprise, de la perte de donn\u00e9es, du chantage, de l’atteinte \u00e0 la r\u00e9putation. Nous testons, conseillons et bricolons avec passion pour que vos solutions informatiques, vos produits et le fonctionnement de votre entreprise restent durablement s\u00fbrs.<\/p>\n

KALWEIT ITS – un vent de fra\u00eecheur pour votre s\u00e9curit\u00e9 informatique.<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb3_5″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Rectangle-25.jpg\u00a0\u00bb title_text=\u00a0\u00bbRectangle 25″ module_class=\u00a0\u00bbcrop-img-3-2 animate-img\u00a0\u00bb _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding_phone=\u00a0\u00bb30px||0px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n

Notre m\u00e9thode de travail<\/h3>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n

\u00ab\u00a0Nous apportons un vent de fra\u00eecheur \u00e0 la s\u00e9curit\u00e9 informatique de votre entreprise\u00a0\u00bb.<\/h1>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb2_5,3_5″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb2_5″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_css_main_element=\u00a0\u00bbz-index: 3;\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_orientation=\u00a0\u00bbright\u00a0\u00bb custom_margin=\u00a0\u00bb40px|-90px|||false|false\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb0px|0px|||false|false\u00a0\u00bb custom_margin_phone=\u00a0\u00bb0px|0px|||false|false\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb text_orientation_tablet=\u00a0\u00bbleft\u00a0\u00bb text_orientation_phone=\u00a0\u00bbleft\u00a0\u00bb text_orientation_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n

Ind\u00e9pendant<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n

Nous ne recommandons pas des actions sur la base de partenariats, mais en fonction de vos besoins de protection, des conditions d\u00e9j\u00e0 existantes de votre infrastructure et d’autres crit\u00e8res objectivement mesurables. Les recommandations et les directives de l’Office f\u00e9d\u00e9ral de la s\u00e9curit\u00e9 des technologies de l’information ainsi que les cadres r\u00e9glementaires tels que BSI IT-Grundschutz, COBIT, MaRisk, ITIL, ISO27001 ou Vds10000 constituent des piliers de base \u00e9l\u00e9mentaires.<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb3_5″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/image-24.jpg\u00a0\u00bb title_text=\u00a0\u00bbimage (24)\u00a0\u00bb module_class=\u00a0\u00bbcrop-img-3-2 animate-img\u00a0\u00bb _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb3_5,2_5″ module_class=\u00a0\u00bbff-t-col-custom-order\u00a0\u00bb _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb3_5″ module_class=\u00a0\u00bbff-t-col-order-2″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/image-23.jpg\u00a0\u00bb title_text=\u00a0\u00bbimage (23)\u00a0\u00bb module_class=\u00a0\u00bbcrop-img-3-2 animate-img\u00a0\u00bb _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00a0\u00bb2_5″ module_class=\u00a0\u00bbff-t-col-order-1″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_css_main_element=\u00a0\u00bbz-index: 3;\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_margin=\u00a0\u00bb40px|||-90px|false|false\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb0px|||0px|false|false\u00a0\u00bb custom_margin_phone=\u00a0\u00bb0px|0px|||false|false\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n

Interdisciplinaire<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n

Nos consultants en s\u00e9curit\u00e9 informatique exp\u00e9riment\u00e9s disposent de sp\u00e9cialisations solides et approfondies dans le domaine de la s\u00e9curit\u00e9 informatique ainsi que de diverses qualifications secondaires, par exemple dans les domaines de la protection des donn\u00e9es, de la m\u00e9decine, de la criminalistique, de la m\u00e9decine l\u00e9gale ou de la gestion d’entreprise. Gr\u00e2ce \u00e0 un conseil interdisciplinaire, nous augmentons l’efficacit\u00e9, l’efficience et le pragmatisme des concepts de s\u00e9curit\u00e9 – Car chaque concept n’est efficace que dans la mesure o\u00f9 il est accept\u00e9 par ses semblables.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb2_5,3_5″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb2_5″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_css_main_element=\u00a0\u00bbz-index: 3;\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_orientation=\u00a0\u00bbright\u00a0\u00bb custom_margin=\u00a0\u00bb40px|-90px|||false|false\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb0px|0px|||false|false\u00a0\u00bb custom_margin_phone=\u00a0\u00bb0px|0px|||false|false\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb text_orientation_tablet=\u00a0\u00bbleft\u00a0\u00bb text_orientation_phone=\u00a0\u00bbleft\u00a0\u00bb text_orientation_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n

Durable<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n

Gr\u00e2ce \u00e0 la collaboration de pentesterns et de consultants, nous pouvons mettre en lumi\u00e8re le statu quo de mani\u00e8re globale et garantir sur cette base une s\u00e9curit\u00e9 durable et \u00e0 long terme. En effet, les tests d’intrusion r\u00e9v\u00e8lent certes des zones probl\u00e9matiques et des recommandations d’action, mais ne traitent pas durablement la cause profonde des zones probl\u00e9matiques.<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb3_5″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/image-20.jpg\u00a0\u00bb title_text=\u00a0\u00bbimage (20)\u00a0\u00bb module_class=\u00a0\u00bbcrop-img-3-2 animate-img\u00a0\u00bb _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_2,1_2″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4In19@\u00a0\u00bb button_text=\u00a0\u00bbContact\u00a0\u00bb button_alignment=\u00a0\u00bbright\u00a0\u00bb button_alignment_tablet=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_phone=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb _builder_version=\u00a0\u00bb4.16″ _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb _module_preset=\u00a0\u00bba224f92a-b498-4723-ae8f-50fe55cdb9e7″ global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE5In19@\u00a0\u00bb button_text=\u00a0\u00bb\u00c0 propos de nous\u00a0\u00bb button_alignment_tablet=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_phone=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb _builder_version=\u00a0\u00bb4.16″ _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb _module_preset=\u00a0\u00bba224f92a-b498-4723-ae8f-50fe55cdb9e7″ global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

Notre approche du conseilLa s\u00e9curit\u00e9 informatique est un peu comme l’ascension d’une montagne. Constant, laborieux, mais toujours lib\u00e9rateur.En effet, si la s\u00e9curit\u00e9 informatique est utilis\u00e9e efficacement l\u00e0 o\u00f9 des risques informatiques r\u00e9els surviennent dans le cadre des op\u00e9rations informatiques r\u00e9guli\u00e8res, la s\u00e9curit\u00e9 informatique cr\u00e9e plus de libert\u00e9. Un peu comme dans le domaine de l’aviation […]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2305","page","type-page","status-publish","hentry"],"yoast_head":"\nApproche de conseil - KALWEIT ITS GmbH<\/title>\n<meta name=\"description\" content=\"KALWEIT ITS - notre approche du conseil\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalweit-its.de\/fr\/approche-de-conseil\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Approche de conseil\" \/>\n<meta property=\"og:description\" content=\"KALWEIT ITS - notre approche du conseil\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalweit-its.de\/fr\/approche-de-conseil\/\" \/>\n<meta property=\"og:site_name\" content=\"KALWEIT ITS GmbH\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-10T20:55:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/591.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalweit-its.de\/fr\/approche-de-conseil\/\",\"url\":\"https:\/\/kalweit-its.de\/fr\/approche-de-conseil\/\",\"name\":\"Approche de conseil - KALWEIT ITS GmbH\",\"isPartOf\":{\"@id\":\"https:\/\/kalweit-its.de\/fr\/#website\"},\"datePublished\":\"2022-03-23T17:35:21+00:00\",\"dateModified\":\"2024-09-10T20:55:59+00:00\",\"description\":\"KALWEIT ITS - notre approche du conseil\",\"breadcrumb\":{\"@id\":\"https:\/\/kalweit-its.de\/fr\/approche-de-conseil\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalweit-its.de\/fr\/approche-de-conseil\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kalweit-its.de\/fr\/approche-de-conseil\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/kalweit-its.de\/fr\/accueil\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Approche de conseil\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalweit-its.de\/fr\/#website\",\"url\":\"https:\/\/kalweit-its.de\/fr\/\",\"name\":\"KALWEIT ITS GmbH\",\"description\":\"Unabh\u00e4ngige Unternehmensberatung f\u00fcr IT-Sicherheit\",\"publisher\":{\"@id\":\"https:\/\/kalweit-its.de\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalweit-its.de\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalweit-its.de\/fr\/#organization\",\"name\":\"KALWEIT ITS GmbH\",\"url\":\"https:\/\/kalweit-its.de\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/kalweit-its.de\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Kalweit-ITS-Logo.svg\",\"contentUrl\":\"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Kalweit-ITS-Logo.svg\",\"width\":701,\"height\":81,\"caption\":\"KALWEIT ITS GmbH\"},\"image\":{\"@id\":\"https:\/\/kalweit-its.de\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/kalweit-its\/\",\"https:\/\/www.instagram.com\/kalweit.its\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Approche de conseil - KALWEIT ITS GmbH","description":"KALWEIT ITS - notre approche du conseil","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalweit-its.de\/fr\/approche-de-conseil\/","og_locale":"fr_FR","og_type":"article","og_title":"Approche de conseil","og_description":"KALWEIT ITS - notre approche du conseil","og_url":"https:\/\/kalweit-its.de\/fr\/approche-de-conseil\/","og_site_name":"KALWEIT ITS GmbH","article_modified_time":"2024-09-10T20:55:59+00:00","og_image":[{"width":960,"height":640,"url":"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/591.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kalweit-its.de\/fr\/approche-de-conseil\/","url":"https:\/\/kalweit-its.de\/fr\/approche-de-conseil\/","name":"Approche de conseil - KALWEIT ITS GmbH","isPartOf":{"@id":"https:\/\/kalweit-its.de\/fr\/#website"},"datePublished":"2022-03-23T17:35:21+00:00","dateModified":"2024-09-10T20:55:59+00:00","description":"KALWEIT ITS - notre approche du conseil","breadcrumb":{"@id":"https:\/\/kalweit-its.de\/fr\/approche-de-conseil\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalweit-its.de\/fr\/approche-de-conseil\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kalweit-its.de\/fr\/approche-de-conseil\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/kalweit-its.de\/fr\/accueil\/"},{"@type":"ListItem","position":2,"name":"Approche de conseil"}]},{"@type":"WebSite","@id":"https:\/\/kalweit-its.de\/fr\/#website","url":"https:\/\/kalweit-its.de\/fr\/","name":"KALWEIT ITS GmbH","description":"Unabh\u00e4ngige Unternehmensberatung f\u00fcr IT-Sicherheit","publisher":{"@id":"https:\/\/kalweit-its.de\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalweit-its.de\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/kalweit-its.de\/fr\/#organization","name":"KALWEIT ITS GmbH","url":"https:\/\/kalweit-its.de\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/kalweit-its.de\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Kalweit-ITS-Logo.svg","contentUrl":"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Kalweit-ITS-Logo.svg","width":701,"height":81,"caption":"KALWEIT ITS GmbH"},"image":{"@id":"https:\/\/kalweit-its.de\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/kalweit-its\/","https:\/\/www.instagram.com\/kalweit.its\/"]}]}},"_links":{"self":[{"href":"https:\/\/kalweit-its.de\/fr\/wp-json\/wp\/v2\/pages\/2305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalweit-its.de\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kalweit-its.de\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kalweit-its.de\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kalweit-its.de\/fr\/wp-json\/wp\/v2\/comments?post=2305"}],"version-history":[{"count":20,"href":"https:\/\/kalweit-its.de\/fr\/wp-json\/wp\/v2\/pages\/2305\/revisions"}],"predecessor-version":[{"id":7329,"href":"https:\/\/kalweit-its.de\/fr\/wp-json\/wp\/v2\/pages\/2305\/revisions\/7329"}],"wp:attachment":[{"href":"https:\/\/kalweit-its.de\/fr\/wp-json\/wp\/v2\/media?parent=2305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}