Shadow IA

Shadow AI is a specific form of shadow IT applied to the field of artificial intelligence.

Shadow AI refers to the use and deployment of artificial intelligence technologies within an organisation without the knowledge, approval or oversight of IT departments or formal management bodies.

Shadow IT

Shadow IT refers to all IT systems, software solutions, applications and processes used within an organisation without the approval, control or authorisation of the IT department or...

SIEM 🟢 Protection

A SIEM (Security Information and Event Management) is a cybersecurity software solution that acts as an organisation's security brain.

It collects, standardises and analyses security data from various sources (event logs, security alerts, network data streams, etc.) to detect threats and security incidents in real time.

ISMS (Information Security Management System) 🟩

The ISMS, or Information Security Management System, is a structured framework of policies, processes, tools and strategies designed to guarantee the confidentiality, integrity and availability of data within an organisation.

In accordance with ISO 27001, the ISMS provides a systematic approach to preventing cyber threats and mitigating the risks associated with information security.t mitigating the risks associated with information security.

SOAR (Security Orchestration, Automation, and Response) 🟢 Protection

SOAR (Security Orchestration, Automation, and Response) is a category of platforms and tools designed to improve the management of cybersecurity operations.

Orchestration: integration and coordination of heterogeneous security tools, systems and processes (e.g. SIEM, EDR, threat intelligence) to centralise their operation.

Automation: Automated execution of repetitive or complex tasks (e.g. analysing alerts, blocking malicious IP addresses) via playbooks (predefined scenarios).

Response: Accelerated management of security incidents, from detection to resolution, using standardised procedures.