{"id":804,"date":"2022-02-17T18:48:06","date_gmt":"2022-02-17T17:48:06","guid":{"rendered":"https:\/\/solutech.true-emotions.studio\/?page_id=804"},"modified":"2022-02-27T21:23:06","modified_gmt":"2022-02-27T20:23:06","slug":"about-us","status":"publish","type":"page","link":"https:\/\/www.acstunisia.com\/index.php\/about-us\/","title":{"rendered":"About Us"},"content":{"rendered":"[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb pix_padding_top=\u00a0\u00bbpadding No\u00a0\u00bb overflow=\u00a0\u00bbon\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb pix_padding=\u00a0\u00bbpix-padding-both\u00a0\u00bb][vc_column][common_title title=\u00a0\u00bbCyber Services Offered:\u00a0\u00bb position=\u00a0\u00bbtext-left\u00a0\u00bb show_decor=\u00a0\u00bboff\u00a0\u00bb]We provide the next generation security of tomorrow. With ACS Teams we shift your focus through the eyes of a hacker. We give you the scoop on all the public information, our platform gathers and uses those to rate on how many vulnerabilities you have and provide you with solutions to fix them. Our platform helps give you that competitive edge of having another perspective.[\/common_title][vc_row_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime;][vc_column_text]\n<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-eafbd02\" data-id=\"eafbd02\" data-element_type=\"column\">\n<div class=\"elementor-widget-wrap elementor-element-populated\">\n<div class=\"elementor-element elementor-element-6afa33d elementor-widget elementor-widget-text-editor\" data-id=\"6afa33d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Strategy and Governance<\/b><\/p>\n<ul>\n<li>Cyber maturity Audit (Pre)<\/li>\n<li>Compliance Audit<\/li>\n<li>Cyber security strategy\/target operating model development<\/li>\n<li>CISO metrics and reporting<\/li>\n<li>Information governance and privacy<\/li>\n<li>Third-party security risk management<\/li>\n<li>Business resilience<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime;][vc_column_text]\n<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-ece6e58\" data-id=\"ece6e58\" data-element_type=\"column\">\n<div class=\"elementor-widget-wrap elementor-element-populated\">\n<div class=\"elementor-element elementor-element-14f4b49 elementor-widget elementor-widget-text-editor\" data-id=\"14f4b49\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Cyber Defense<\/b><\/p>\n<ul>\n<li>Technical Audit<\/li>\n<li>Application security<\/li>\n<li>Security operations and monitoring (SEIM+SOC)<\/li>\n<li>Security analytics<\/li>\n<li>Insider threats<\/li>\n<li>Penetration tests<\/li>\n<li>Red\/Blue Teams<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime;][vc_column_text]\n<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-10a8326\" data-id=\"10a8326\" data-element_type=\"column\">\n<div class=\"elementor-widget-wrap elementor-element-populated\">\n<div class=\"elementor-element elementor-element-50eceae elementor-widget elementor-widget-text-editor\" data-id=\"50eceae\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Cyber response<\/b><\/p>\n<ul>\n<li>Incident response readiness and planning<\/li>\n<li>Digital investigations and remediation<\/li>\n<li>Threat intelligence &amp; forensics<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime;][vc_column_text]\n<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-c348532\" data-id=\"c348532\" data-element_type=\"column\">\n<div class=\"elementor-widget-wrap elementor-element-populated\">\n<div class=\"elementor-element elementor-element-379a229 elementor-widget elementor-widget-text-editor\" data-id=\"379a229\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Transformation<\/b><\/p>\n<ul>\n<li>IAM<\/li>\n<li>Security governance, risk management and compliance (GRC)<\/li>\n<li>Technology integration<\/li>\n<li>Training &amp; Education<\/li>\n<li>Workshops<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb gap=\u00a0\u00bb30&Prime; content_placement=\u00a0\u00bbmiddle\u00a0\u00bb css_animation=\u00a0\u00bbfadeInUp\u00a0\u00bb pix_padding_top=\u00a0\u00bbpadding S\u00a0\u00bb pix_padding_bottom=\u00a0\u00bbpadding S\u00a0\u00bb ptextcolor=\u00a0\u00bbBlack\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb pix_padding=\u00a0\u00bbpix-padding-both\u00a0\u00bb pix_padding_size=\u00a0\u00bbpix-padding-s\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1565779991695{background-color: #f6f6f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/6&Prime; ptextcolor=\u00a0\u00bbBlack\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb offset=\u00a0\u00bbvc_col-xs-7 vc_hidden-xs\u00a0\u00bb][common_title title=\u00a0\u00bbClients\u00a0\u00bb position=\u00a0\u00bbtext-left\u00a0\u00bb show_decor=\u00a0\u00bboff\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1565779984272{padding-top: 60px !important;}\u00a0\u00bb]Leo faucibus, egestas[\/common_title][\/vc_column][vc_column width=\u00a0\u00bb5\/6&Prime; gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1545232444697{margin-top: -35px !important;}\u00a0\u00bb offset=\u00a0\u00bbvc_col-xs-5 vc_hidden-xs\u00a0\u00bb][common_brands greyscale=\u00a0\u00bbon\u00a0\u00bb carousel_items=\u00a0\u00bb8&Prime; carousel_dots=\u00a0\u00bboff\u00a0\u00bb carousel_loop=\u00a0\u00bbon\u00a0\u00bb carousel_margin=\u00a0\u00bb50&Prime; carousel_autoplay=\u00a0\u00bbon\u00a0\u00bb items=\u00a0\u00bb6&Prime; autoplay=\u00a0\u00bb3000&Prime; tab_id=\u00a0\u00bb1520849732448-5&Prime; brands=\u00a0\u00bb%5B%7B%22image%22%3A%222309%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222304%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222310%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222300%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222305%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222299%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222298%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222303%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222297%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222302%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%5D\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb gap=\u00a0\u00bb30&Prime; ptextcolor=\u00a0\u00bbBlack\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1565779811663{background-color: #f6f6f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/6&Prime; gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb][common_amount_box icon_size=\u00a0\u00bbpix-icon-xl\u00a0\u00bb border=\u00a0\u00bbon\u00a0\u00bb title=\u00a0\u00bbOffices Protection\u00a0\u00bb amount=\u00a0\u00bb204+\u00a0\u00bb image=\u00a0\u00bb2044&Prime;][\/common_amount_box][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb][common_amount_box icon_size=\u00a0\u00bbpix-icon-xl\u00a0\u00bb title=\u00a0\u00bbSmart Home\u00a0\u00bb amount=\u00a0\u00bb200+\u00a0\u00bb image=\u00a0\u00bb2043&Prime;][\/common_amount_box][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb][common_amount_box icon_size=\u00a0\u00bbpix-icon-xl\u00a0\u00bb title=\u00a0\u00bbWebsite Protection\u00a0\u00bb amount=\u00a0\u00bb800+\u00a0\u00bb image=\u00a0\u00bb2045&Prime;][\/common_amount_box][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb][common_amount_box icon_size=\u00a0\u00bbpix-icon-xl\u00a0\u00bb title=\u00a0\u00bbOur team\u00a0\u00bb amount=\u00a0\u00bb45+\u00a0\u00bb image=\u00a0\u00bb2032&Prime;][\/common_amount_box][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime;][common_amount_box icon_size=\u00a0\u00bbpix-icon-xl\u00a0\u00bb title=\u00a0\u00bbSupport 24\/7&Prime; amount=\u00a0\u00bb24+\u00a0\u00bb image=\u00a0\u00bb2040&Prime;][\/common_amount_box][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime;][common_amount_box icon_size=\u00a0\u00bbpix-icon-xl\u00a0\u00bb title=\u00a0\u00bbYears works\u00a0\u00bb amount=\u00a0\u00bb18&Prime; image=\u00a0\u00bb2033&Prime;][\/common_amount_box][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb pix_padding_top=\u00a0\u00bbpadding XL\u00a0\u00bb pix_padding_bottom=\u00a0\u00bbpadding No\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1565778539413{background-color: #ffffff !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1545064568742{padding-right: 25px !important;}\u00a0\u00bb][common_title title=\u00a0\u00bbOur Teams\u00a0\u00bb position=\u00a0\u00bbtext-left\u00a0\u00bb show_decor=\u00a0\u00bboff\u00a0\u00bb]ACS Cyber Security Team\u2019s services allow you to shift the burden of protecting your network from these criminals on us &#8211; we worry about your information security whilst you drive forward your core business.[\/common_title][common_progress values=\u00a0\u00bb%5B%7B%22label%22%3A%22Hosting%20providers%22%2C%22value%22%3A%2270%22%7D%2C%7B%22label%22%3A%22Security%20companies%22%2C%22value%22%3A%2280%22%7D%2C%7B%22label%22%3A%22Private%20companies%20and%20clients%22%2C%22value%22%3A%2260%22%7D%2C%7B%22label%22%3A%22Software%20development%20companies%22%2C%22value%22%3A%2290%22%7D%5D\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1545064561746{padding-left: 25px !important;}\u00a0\u00bb][common_tab_acc toggle_type=\u00a0\u00bbaccordion\u00a0\u00bb accordion=\u00a0\u00bb%5B%7B%22label_a%22%3A%22Continuous%20Vulnerability%20Assessment%22%2C%22content_a%22%3A%22Verifying%20the%20security%20of%20your%20Internet-facing%20web%20applications%20is%20an%20ever-more%20crucial%20aspect%20of%20information%20security.%20It%20is%20often%20required%20for%20regulatory%20compliance%20and%20most%20importantly%2C%20to%20provide%20the%20reassurance%20that%20your%20organisation%20is%20doing%20everything%20it%20can%20to%20protect%20its%20data%20and%20that%20of%20its%20customers.%22%2C%22tab_id_a%22%3A%221728902031%22%7D%2C%7B%22label_a%22%3A%22Confidence%22%2C%22content_a%22%3A%22The%20starting%20point%20of%20an%20effective%20penetration%20test%20is%20understanding%20the%20infrastructure%20to%20be%20scanned%20and%20tailoring%20the%20techniques%20used%20to%20match.%20As%20part%20of%20our%20service%20we%20can%20provide%20a%20trained%2C%20certified%20penetration%20tester%20to%20augment%20the%20automatic%20scanning.%22%2C%22tab_id_a%22%3A%221720174618%22%7D%2C%7B%22label_a%22%3A%22Reassurance%22%2C%22content_a%22%3A%22Automated%20Vulnerability%20Scanning%20throughout%20the%20year%20probes%20your%20infrastructure%20and%20web%20applications%20using%20knowledge%20gained%20in%20the%20initial%20scans%20on%20a%20scheduled%2C%20monthly%20basis.After%20each%20scan%2C%20you%20will%20receive%20a%20report%20in%20which%20any%20newly%20detected%20vulnerabilities%20are%20explained.%22%2C%22tab_id_a%22%3A%22491228797%22%7D%2C%7B%22label_a%22%3A%22Web%20Advance%22%2C%22content_a%22%3A%22%20pricing%20is%20simple%20at%201800%20TND%20per%20year%20for%20the%20first%20web%20application%20(infrastructure%20scanning%20included)%20and%201200%20TND%20per%20year%20for%20each%20additional%20web%20app.%20Optional%20manual%20testing%20is%20based%20on%20a%20flat%20rate%20per%20day.%22%2C%22tab_id_a%22%3A%22183026561%22%7D%5D\u00a0\u00bb][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb pix_padding_top=\u00a0\u00bbpadding No\u00a0\u00bb overflow=\u00a0\u00bbon\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb pix_padding=\u00a0\u00bbpix-padding-both\u00a0\u00bb][vc_column][common_title title=\u00a0\u00bbCyber Services Offered:\u00a0\u00bb position=\u00a0\u00bbtext-left\u00a0\u00bb show_decor=\u00a0\u00bboff\u00a0\u00bb]We provide the next generation security of tomorrow. With ACS Teams we shift your focus through the eyes of a hacker. We give you the scoop on all the public information, our platform gathers and uses those to rate on how many vulnerabilities [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-804","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.acstunisia.com\/index.php\/wp-json\/wp\/v2\/pages\/804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.acstunisia.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.acstunisia.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.acstunisia.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.acstunisia.com\/index.php\/wp-json\/wp\/v2\/comments?post=804"}],"version-history":[{"count":3,"href":"https:\/\/www.acstunisia.com\/index.php\/wp-json\/wp\/v2\/pages\/804\/revisions"}],"predecessor-version":[{"id":4055,"href":"https:\/\/www.acstunisia.com\/index.php\/wp-json\/wp\/v2\/pages\/804\/revisions\/4055"}],"wp:attachment":[{"href":"https:\/\/www.acstunisia.com\/index.php\/wp-json\/wp\/v2\/media?parent=804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}