{"id":359,"date":"2024-03-14T09:06:20","date_gmt":"2024-03-14T09:06:20","guid":{"rendered":"https:\/\/www.geci.wip-studiovitamine.com\/?page_id=359"},"modified":"2024-06-17T06:20:46","modified_gmt":"2024-06-17T06:20:46","slug":"consulting-cybersecurity","status":"publish","type":"page","link":"https:\/\/www.geci.net\/en\/activites\/consulting-cybersecurity\/","title":{"rendered":"Consulting &#038; Cybersecurity"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row content_placement=&#8221;bottom&#8221; el_class=&#8221;btns-activites&#8221;][vc_column width=&#8221;8\/12&#8243;][vc_btn title=&#8221;Services&#8221; css=&#8221;&#8221; link=&#8221;url:%23as&#8221;][vc_btn title=&#8221;Anti-cybercrime solutions&#8221; css=&#8221;&#8221; link=&#8221;url:%23ia&#8221;][vc_btn title=&#8221;Employee development&#8221; css=&#8221;&#8221; link=&#8221;url:%23devcol&#8221;][\/vc_column][vc_column width=&#8221;4\/12&#8243;][vc_single_image image=&#8221;1247&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2>Optimizing your digital transition<\/h2>\n<p>To remain <strong>competitive<\/strong>, it is essential for businesses to incorporate digital into their operations, no matter which field they operate in. New technologies offer opportunities to improve<strong> operational efficiency<\/strong> and open up <strong>new commercial possibilities<\/strong>. So, it is essential for all organizations to take these stakes on board and put adapted solutions in place.<\/p>\n<p><strong>Eolen Group<\/strong> stands out through its ability to provide <strong>bespoke solutions<\/strong> aligned with its clients\u2019 <strong>specific technological challenges<\/strong> and digital transformation requirements. <strong>Eolen Group\u2019s<\/strong> teams cover all project stages, from preliminary studies through to the end-to-end management of solutions. Their ability to analyze the stages required for this transition, combined with their capabilities for deploying solutions, enables them to be tailored to each client\u2019s specific needs with a view to i<strong>mproving their competitiveness<\/strong>.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2>Improving your performance, your productivity and your security<\/h2>\n<p>Optimize your <strong>performance<\/strong>, <strong>productivity<\/strong> and <strong>security<\/strong> with <strong>Eolen Group<\/strong>, your strategic partner throughout your <strong>digital transformation<\/strong> and industrial projects, while ensuring the protection of your digital assets. We offer you bespoke advice and innovative solutions tailored to your specific needs.<\/p>\n<p>Eolen Group\u2019s expertise is built around three pillars:<\/p>\n<ul>\n<li><strong>Digital transformation<\/strong>: design and deployment of business solutions, IT infrastructure management and functional expertise.<\/li>\n<li><strong>Industrial engineering<\/strong>: carrying out major projects to design and build industrial or energy production units, as well as large-scale infrastructure projects.<\/li>\n<li><strong>Cybersecurity consulting<\/strong>: sophisticated threat detection, continuous monitoring with real-time alerts, protection of critical infrastructures and workflow automation for security operations centers (SOC).<\/li>\n<\/ul>\n<p>With <strong>Eolen Group<\/strong> by your side, you benefit from comprehensive, personalized support to make you more <strong>competitive<\/strong> and ensure your success in a constantly changing digital world.[\/vc_column_text][vc_btn title=&#8221;Contact Us&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fwww.geci.net%2Fen%2Fcontact%2F|title:Contact&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1711374672391{background-color: #f6f6f6 !important;}&#8221; el_id=&#8221;as&#8221; el_class=&#8221;decouvrir-activites&#8221;][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Discover Eolen Group&#8217;s services<\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner css=&#8221;.vc_custom_1715696690571{background-image: url(https:\/\/www.geci.net\/wp-content\/uploads\/2024\/03\/homme-sous-les-etoiles.png?id=337) !important;}&#8221; el_class=&#8221;cards-couleurs&#8221;][vc_column_inner el_class=&#8221;gauche&#8221; width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;331&#8243;][vc_separator][vc_column_text css=&#8221;&#8221;]<strong>Web<\/strong> and <strong>application development<\/strong>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<ul>\n<li>Portals.<\/li>\n<li>Information systems.<\/li>\n<li>PLM and technical data management.<\/li>\n<li>Mobile apps<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;milieu&#8221; width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;333&#8243;][vc_separator][vc_column_text css=&#8221;&#8221;]<strong>Embedded systems<\/strong><\/p>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<ul>\n<li>Real-time software.<\/li>\n<li>Middleware.<\/li>\n<li>Low-level software.<\/li>\n<li>Drivers.<\/li>\n<li>Electronics.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;droite&#8221; width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;335&#8243;][vc_separator][vc_column_text css=&#8221;&#8221;]<strong>Systems<\/strong> and <strong>networks<\/strong><\/p>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<ul>\n<li>Workstations.<\/li>\n<li>Security.<\/li>\n<li>Messaging.<\/li>\n<li>Servers, storage.<\/li>\n<li>LAN\/WAN.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner css=&#8221;.vc_custom_1712755982670{background-image: url(https:\/\/www.geci.net\/wp-content\/uploads\/2024\/03\/molecules.png?id=185) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cards-couleurs&#8221;][vc_column_inner el_class=&#8221;gauche&#8221; width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;331&#8243;][vc_separator][vc_column_text css=&#8221;&#8221;]<strong>Industrial engineering<\/strong> and <strong>systems design<\/strong>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<ul>\n<li>Mechanical design and studies.<\/li>\n<li>Civil engineering and structures.<\/li>\n<li>Electricity &#8211; low \/ high voltage<\/li>\n<li>Instrumentation and control systems.<\/li>\n<li>Piping and general installation.<\/li>\n<li>Heating, ventilation, and air conditioning (HVAC).<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;milieu&#8221; width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;333&#8243;][vc_separator][vc_column_text css=&#8221;&#8221;]<strong>IT Outsourcing<\/strong><\/p>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Managing all or part of activities, in a service center at our client sites.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;droite&#8221; width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;335&#8243;][vc_separator][vc_column_text css=&#8221;&#8221;]<strong>Systems<\/strong> and <strong>networks<\/strong>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<ul>\n<li>Security audit.<\/li>\n<li>Vulnerability audit.<\/li>\n<li>Internal and external penetration testing.<\/li>\n<li>Threat and risk management.<\/li>\n<li>Cybersecurity systems management.<\/li>\n<li>Business continuity<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;bg-linear-bleu&#8221; el_id=&#8221;ia&#8221;][vc_column width=&#8221;2\/12&#8243;][\/vc_column][vc_column width=&#8221;8\/12&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;214&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2>Implementing<br \/>\nanti-cybercrime solutions<\/h2>\n<p>With the digital transformation of businesses, a new reality is emerging, with increased risks, on both an individual and an industrial level, linked to the constantly evolving cybercrime landscape. Faced with these increasingly sophisticated threats, impacting data security, Groupe Eolen and its partners are positioned to offer outstanding IT\/OT cybersecurity solutions. These solutions, adapted for all industrial environments, cover all the services required to protect your digital assets. They also incorporate the most advanced technologies, from machine learning to artificial intelligence and behavioral analysis.<\/p>\n<p>Our main goal is to establish your cybersecurity strategy at the heart of your company\u2019s digital transformation. We therefore enable you to not only meet your current security challenges, but also position yourself proactively in relation to future threats.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;egalit\u00e9pro&#8221;][vc_column width=&#8221;1\/3&#8243; el_id=&#8221;devcol&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2><strong><br \/>\nEmployee development:<\/strong><\/h2>\n<p>When they join Groupe Eolen, our staff are immersed in a range of technical projects, offering them opportunities to develop and evolve in various sectors and activities. Each member of our team benefits from individual follow-up and support to plan their career path, working closely with their manager. Our in-house program brings together our technical experts and support teams (sales \/ recruitment) for the hiring and selection of candidates, in addition to commercial development and promoting the Group\u2019s areas of expertise.[\/vc_column_text][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2><strong><br \/>\nWorkplace equality:<\/strong><\/h2>\n<p>In accordance with the French Law of September 5, 2018 concerning the freedom to choose your professional future and its implementing decree of January 8, 2019 aimed at eliminating pay disparities between women and men, Groupe Eolen publishes its gender equality index rating. This index assesses four aspects:<\/p>\n<ul>\n<li>Pay gap between women and men.<\/li>\n<li>Differentiated distribution of individual pay rises between women and men.<\/li>\n<li>Pay rises awarded following maternity leave.<\/li>\n<li>Parity among the Company\u2019s 10 highest earners.<\/li>\n<\/ul>\n<p>As of February 28, 2023, Groupe Eolen had an index rating of 79 points, which highlights our commitment to promoting equal opportunities and fair treatment for all staff, regardless of their gender.<\/p>\n<p>As of February 23, 2024, Groupe Eolen\u2019s index rating was not able to be calculated, as one of the four aspects mentioned above could not be analyzed due to the criteria set by the public authorities. Nevertheless, our Company is still firmly committed to ensuring equal pay for women and men for equivalent work and similar skills, not only on recruitment, but throughout their careers within the Company.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row content_placement=&#8221;bottom&#8221; el_class=&#8221;btns-activites&#8221;][vc_column width=&#8221;8\/12&#8243;][vc_btn title=&#8221;Services&#8221; css=&#8221;&#8221; link=&#8221;url:%23as&#8221;][vc_btn title=&#8221;Anti-cybercrime solutions&#8221; css=&#8221;&#8221; link=&#8221;url:%23ia&#8221;][vc_btn title=&#8221;Employee development&#8221; css=&#8221;&#8221; link=&#8221;url:%23devcol&#8221;][\/vc_column][vc_column width=&#8221;4\/12&#8243;][vc_single_image image=&#8221;1247&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;] Optimizing your digital transition To remain competitive, it is essential for businesses to incorporate digital into their operations, no matter which field they operate in. New technologies offer opportunities to improve operational efficiency [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":349,"parent":567,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-359","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Consulting &amp; Cybersecurity - Geci<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.geci.net\/en\/activites\/consulting-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Consulting &amp; Cybersecurity - Geci\" \/>\n<meta property=\"og:description\" content=\"[vc_row content_placement=&#8221;bottom&#8221; el_class=&#8221;btns-activites&#8221;][vc_column width=&#8221;8\/12&#8243;][vc_btn title=&#8221;Services&#8221; css=&#8221;&#8221; link=&#8221;url:%23as&#8221;][vc_btn title=&#8221;Anti-cybercrime solutions&#8221; css=&#8221;&#8221; link=&#8221;url:%23ia&#8221;][vc_btn title=&#8221;Employee development&#8221; css=&#8221;&#8221; link=&#8221;url:%23devcol&#8221;][\/vc_column][vc_column width=&#8221;4\/12&#8243;][vc_single_image image=&#8221;1247&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;] Optimizing your digital transition To remain competitive, it is essential for businesses to incorporate digital into their operations, no matter which field they operate in. New technologies offer opportunities to improve operational efficiency [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.geci.net\/en\/activites\/consulting-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Geci\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-17T06:20:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.geci.net\/wp-content\/uploads\/2024\/03\/montagne02.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2160\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.geci.net\\\/en\\\/activites\\\/consulting-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.geci.net\\\/en\\\/activites\\\/consulting-cybersecurity\\\/\",\"name\":\"Consulting & Cybersecurity - Geci\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.geci.net\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.geci.net\\\/en\\\/activites\\\/consulting-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.geci.net\\\/en\\\/activites\\\/consulting-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.geci.net\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/montagne02.png\",\"datePublished\":\"2024-03-14T09:06:20+00:00\",\"dateModified\":\"2024-06-17T06:20:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.geci.net\\\/en\\\/activites\\\/consulting-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.geci.net\\\/en\\\/activites\\\/consulting-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.geci.net\\\/en\\\/activites\\\/consulting-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.geci.net\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/montagne02.png\",\"contentUrl\":\"https:\\\/\\\/www.geci.net\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/montagne02.png\",\"width\":2160,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.geci.net\\\/en\\\/activites\\\/consulting-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.geci.net\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Activities\",\"item\":\"https:\\\/\\\/www.geci.net\\\/en\\\/activites\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Consulting &#038; Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.geci.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.geci.net\\\/en\\\/\",\"name\":\"Geci\",\"description\":\"Smart solutions for a smart world\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.geci.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Consulting & Cybersecurity - Geci","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.geci.net\/en\/activites\/consulting-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Consulting & Cybersecurity - Geci","og_description":"[vc_row content_placement=&#8221;bottom&#8221; el_class=&#8221;btns-activites&#8221;][vc_column width=&#8221;8\/12&#8243;][vc_btn title=&#8221;Services&#8221; css=&#8221;&#8221; link=&#8221;url:%23as&#8221;][vc_btn title=&#8221;Anti-cybercrime solutions&#8221; css=&#8221;&#8221; link=&#8221;url:%23ia&#8221;][vc_btn title=&#8221;Employee development&#8221; css=&#8221;&#8221; link=&#8221;url:%23devcol&#8221;][\/vc_column][vc_column width=&#8221;4\/12&#8243;][vc_single_image image=&#8221;1247&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;] Optimizing your digital transition To remain competitive, it is essential for businesses to incorporate digital into their operations, no matter which field they operate in. New technologies offer opportunities to improve operational efficiency [&hellip;]","og_url":"https:\/\/www.geci.net\/en\/activites\/consulting-cybersecurity\/","og_site_name":"Geci","article_modified_time":"2024-06-17T06:20:46+00:00","og_image":[{"width":2160,"height":600,"url":"https:\/\/www.geci.net\/wp-content\/uploads\/2024\/03\/montagne02.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.geci.net\/en\/activites\/consulting-cybersecurity\/","url":"https:\/\/www.geci.net\/en\/activites\/consulting-cybersecurity\/","name":"Consulting & Cybersecurity - Geci","isPartOf":{"@id":"https:\/\/www.geci.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.geci.net\/en\/activites\/consulting-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.geci.net\/en\/activites\/consulting-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.geci.net\/wp-content\/uploads\/2024\/03\/montagne02.png","datePublished":"2024-03-14T09:06:20+00:00","dateModified":"2024-06-17T06:20:46+00:00","breadcrumb":{"@id":"https:\/\/www.geci.net\/en\/activites\/consulting-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.geci.net\/en\/activites\/consulting-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.geci.net\/en\/activites\/consulting-cybersecurity\/#primaryimage","url":"https:\/\/www.geci.net\/wp-content\/uploads\/2024\/03\/montagne02.png","contentUrl":"https:\/\/www.geci.net\/wp-content\/uploads\/2024\/03\/montagne02.png","width":2160,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.geci.net\/en\/activites\/consulting-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.geci.net\/en\/"},{"@type":"ListItem","position":2,"name":"Activities","item":"https:\/\/www.geci.net\/en\/activites\/"},{"@type":"ListItem","position":3,"name":"Consulting &#038; Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.geci.net\/en\/#website","url":"https:\/\/www.geci.net\/en\/","name":"Geci","description":"Smart solutions for a smart world","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.geci.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.geci.net\/en\/wp-json\/wp\/v2\/pages\/359","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.geci.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.geci.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.geci.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.geci.net\/en\/wp-json\/wp\/v2\/comments?post=359"}],"version-history":[{"count":15,"href":"https:\/\/www.geci.net\/en\/wp-json\/wp\/v2\/pages\/359\/revisions"}],"predecessor-version":[{"id":2152,"href":"https:\/\/www.geci.net\/en\/wp-json\/wp\/v2\/pages\/359\/revisions\/2152"}],"up":[{"embeddable":true,"href":"https:\/\/www.geci.net\/en\/wp-json\/wp\/v2\/pages\/567"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.geci.net\/en\/wp-json\/wp\/v2\/media\/349"}],"wp:attachment":[{"href":"https:\/\/www.geci.net\/en\/wp-json\/wp\/v2\/media?parent=359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}