{"id":3914,"date":"2020-08-21T02:12:15","date_gmt":"2020-08-21T06:12:15","guid":{"rendered":"https:\/\/fibrenoire.ca\/geek-corner\/connectes-securite-et-evolution-numerique\/"},"modified":"2021-08-06T09:59:09","modified_gmt":"2021-08-06T13:59:09","slug":"digital-security-and-evolution","status":"publish","type":"article","link":"https:\/\/fibrenoire.ca\/en\/geek-corner\/digital-security-and-evolution\/","title":{"rendered":"Digital security and evolution: the top 7 most frequently asked questions (webinar)"},"content":{"rendered":"<section class=\"block block__wysiwyg\">\r\n    <div class=\"container\">\r\n        <div class=\"row justify-content-center\">\r\n            <div class=\"col-md-10\">\r\n                <div class=\"text-content\">\r\n                  <div class=\" \">\n<div class=\"text-dark3\">\n<div class=\"rich-text\">\n<p>Published on August 21, 2020<\/p>\n<h3><\/h3>\n<h3><b><span class=\"TextRun SCXW261843657 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW261843657 BCX0\">The most frequently asked question:<\/span><\/span><span class=\"EOP SCXW261843657 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/b><\/h3>\n<h3><span class=\"NormalTextRun BCX0 SCXW181487697\">\u201cWhat are the pros and cons of Security as a service (<\/span><span class=\"NormalTextRun SpellingErrorV2 BCX0 DefaultHighlightTransition SCXW181487697\">SECass<\/span><span class=\"NormalTextRun BCX0 SCXW181487697\">) versus buying my own firewall solution?\u201d<\/span><\/h3>\n<\/div>\n<\/div>\n<\/div>\n<div class=\" \">\n<div class=\"text-dark3\">\n<div class=\"rich-text\">\n<p><span data-contrast=\"auto\">As its name implies, Security as a service involves a third-party provider overseeing the protection of your IT infrastructure, thus keeping you safe from virtual threats.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">More and more businesses are choosing managed security services. And with good reason:\u00a0\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h4><span class=\"TextRun SCXW250440666 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW250440666 BCX0\">1-\u00a0<\/span><span class=\"NormalTextRun SCXW250440666 BCX0\">You no longer have to manage your equipment<\/span><\/span><span class=\"EOP SCXW250440666 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<p><span class=\"NormalTextRun SCXW195793526 BCX0\">The installation, configuration, and maintenance of equipment can be costly, both in term<\/span><span class=\"NormalTextRun SCXW195793526 BCX0\">s<\/span><span class=\"NormalTextRun SCXW195793526 BCX0\">\u00a0of time and resources (updates, damages, licenses, compatibility issues, etc.). And because a company\u2019s needs are constantly evolving (bandwidth, new technologies, teleworking, etc.), saving time and resources is essential. A managed service means your IT teams can focus their time and energy on value-added projects.\u00a0\u00a0<\/span><\/p>\n<h4><span class=\"TextRun SCXW18017123 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW18017123 BCX0\">2- Your provider oversees your specific security needs, according to your company\u2019s evolution<\/span><\/span><span class=\"EOP SCXW18017123 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<p><span class=\"TextRun SCXW51639949 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW51639949 BCX0\">Planning on opening a new store or office?\u00a0<\/span><span class=\"NormalTextRun SCXW51639949 BCX0\">Are your bandwidth<\/span><span class=\"NormalTextRun SCXW51639949 BCX0\">\u00a0needs changing? On the cusp of implementing a new<\/span><span class=\"NormalTextRun SCXW51639949 BCX0\">\u00a0telework solution? Managed s<\/span><span class=\"NormalTextRun SCXW51639949 BCX0\">ecurity service providers typically ensure a service that takes your company and its growth into account.\u00a0<\/span><\/span><span class=\"EOP SCXW51639949 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h4><span class=\"TextRun SCXW191601648 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW191601648 BCX0\">3- You benefit from industry best practices<\/span><\/span><span class=\"EOP SCXW191601648 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<p><span class=\"TextRun SCXW172091253 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW172091253 BCX0\">Managed security service providers ensure the real-time deployment and use of your solution, all while respecting industry best practices suited to your needs.<\/span><\/span><span class=\"EOP SCXW172091253 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h4><span class=\"TextRun SCXW244832832 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW244832832 BCX0\">4- Standardization and uniformity (multi-sites)<\/span><\/span><span class=\"EOP SCXW244832832 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<p><span class=\"NormalTextRun BCX0 SCXW207067084\">Do y<\/span><span class=\"NormalTextRun BCX0 SCXW207067084\">ou have several stores or offices? A customized security service ensures uniformity of rules and policies across all your locations, allowing your employees to focus on what really matters (rather than spend their time trying to connect to your various networks, for example).\u00a0\u00a0<\/span><\/p>\n<h4><span class=\"TextRun SCXW216458618 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW216458618 BCX0\">5- OPEX vs. CAPEX (renting vs. buying)<\/span><\/span><span class=\"EOP SCXW216458618 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<p><span class=\"TextRun SCXW243877323 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW243877323 BCX0\">Rather than investing in a technological solution that could quickly become out-dated (ah, technology!), companies that adopt managed security services don\u2019t have to worry about investing and profiting from the technology they\u2019ve chosen (example: buying a firewall). Instead, this technology is rented from their managed security service provider. Obviously, depending on your business strategy, this could be an inconvenience.\u00a0\u00a0\u00a0<\/span><\/span><\/p>\n<p><strong>To discover:<\/strong> our<a href=\"https:\/\/fibrenoire.ca\/en\/services\/security\/\"> security solutions<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"TextRun SCXW190638864 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW190638864 BCX0\">To view the webinar in full and see the li<\/span><\/span><span class=\"TextRun SCXW190638864 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW190638864 BCX0\">st of questions asked (in French only \u2013 aired<\/span><span class=\"NormalTextRun SCXW190638864 BCX0\">\u00a0May 6, 2020):<\/span><\/span><span class=\"EOP SCXW190638864 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<\/div>\n<\/div>\n<\/div>\n\r\n                <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n<\/section>\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"S\u00e9curit\u00e9 et \u00e9volution num\u00e9rique : les 7 questions les plus pos\u00e9es\" src=\"https:\/\/player.vimeo.com\/video\/415635524?dnt=1&amp;app_id=122963\" width=\"500\" height=\"281\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture; clipboard-write\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>With new technological solutions constantly evolving, it can be difficult to manage your IT infrastructure, especially when it comes to its security. Guillaume Chabot explains why in the second of a series of webinars, entitled CONNECTED. <\/p>\n","protected":false},"template":"","class_list":["post-3914","article","type-article","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Digital security and evolution: the top 7 most frequently asked questions (webinar) - Fibrenoire<\/title>\n<meta name=\"description\" content=\"Discover why choosing a security service is essential when it comes to monitoring your business practices during a digital evolution.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fibrenoire.ca\/en\/geek-corner\/digital-security-and-evolution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital security and evolution: the top 7 most frequently asked questions (webinar)\" \/>\n<meta property=\"og:description\" content=\"Discover why choosing a security service is essential when it comes to monitoring your business practices during a digital evolution.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fibrenoire.ca\/en\/geek-corner\/digital-security-and-evolution\/\" \/>\n<meta property=\"og:site_name\" content=\"Fibrenoire\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-06T13:59:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fibrenoire.ca\/wp-content\/uploads\/2020\/08\/2-en-2.png?fit=2560%2C1440&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fibrenoire.ca\\\/en\\\/geek-corner\\\/digital-security-and-evolution\\\/\",\"url\":\"https:\\\/\\\/fibrenoire.ca\\\/en\\\/geek-corner\\\/digital-security-and-evolution\\\/\",\"name\":\"Digital security and evolution: the top 7 most frequently asked questions (webinar) - Fibrenoire\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fibrenoire.ca\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fibrenoire.ca\\\/en\\\/geek-corner\\\/digital-security-and-evolution\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fibrenoire.ca\\\/en\\\/geek-corner\\\/digital-security-and-evolution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fibrenoire.ca\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/2-en-2.png?fit=2560%2C1440&ssl=1\",\"datePublished\":\"2020-08-21T06:12:15+00:00\",\"dateModified\":\"2021-08-06T13:59:09+00:00\",\"description\":\"Discover why choosing a security service is essential when it comes to monitoring your business practices during a digital evolution.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fibrenoire.ca\\\/en\\\/geek-corner\\\/digital-security-and-evolution\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fibrenoire.ca\\\/en\\\/geek-corner\\\/digital-security-and-evolution\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/fibrenoire.ca\\\/en\\\/geek-corner\\\/digital-security-and-evolution\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fibrenoire.ca\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/2-en-2.png?fit=2560%2C1440&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fibrenoire.ca\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/2-en-2.png?fit=2560%2C1440&ssl=1\",\"width\":2560,\"height\":1440,\"caption\":\"connected 2\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fibrenoire.ca\\\/en\\\/geek-corner\\\/digital-security-and-evolution\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fibrenoire.ca\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital security and evolution: the top 7 most frequently asked questions (webinar)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fibrenoire.ca\\\/#website\",\"url\":\"https:\\\/\\\/fibrenoire.ca\\\/\",\"name\":\"Fibrenoire\",\"description\":\"Fibrenoire\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fibrenoire.ca\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Digital security and evolution: the top 7 most frequently asked questions (webinar) - Fibrenoire","description":"Discover why choosing a security service is essential when it comes to monitoring your business practices during a digital evolution.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fibrenoire.ca\/en\/geek-corner\/digital-security-and-evolution\/","og_locale":"en_US","og_type":"article","og_title":"Digital security and evolution: the top 7 most frequently asked questions (webinar)","og_description":"Discover why choosing a security service is essential when it comes to monitoring your business practices during a digital evolution.","og_url":"https:\/\/fibrenoire.ca\/en\/geek-corner\/digital-security-and-evolution\/","og_site_name":"Fibrenoire","article_modified_time":"2021-08-06T13:59:09+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/i0.wp.com\/fibrenoire.ca\/wp-content\/uploads\/2020\/08\/2-en-2.png?fit=2560%2C1440&ssl=1","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fibrenoire.ca\/en\/geek-corner\/digital-security-and-evolution\/","url":"https:\/\/fibrenoire.ca\/en\/geek-corner\/digital-security-and-evolution\/","name":"Digital security and evolution: the top 7 most frequently asked questions (webinar) - Fibrenoire","isPartOf":{"@id":"https:\/\/fibrenoire.ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fibrenoire.ca\/en\/geek-corner\/digital-security-and-evolution\/#primaryimage"},"image":{"@id":"https:\/\/fibrenoire.ca\/en\/geek-corner\/digital-security-and-evolution\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fibrenoire.ca\/wp-content\/uploads\/2020\/08\/2-en-2.png?fit=2560%2C1440&ssl=1","datePublished":"2020-08-21T06:12:15+00:00","dateModified":"2021-08-06T13:59:09+00:00","description":"Discover why choosing a security service is essential when it comes to monitoring your business practices during a digital evolution.","breadcrumb":{"@id":"https:\/\/fibrenoire.ca\/en\/geek-corner\/digital-security-and-evolution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fibrenoire.ca\/en\/geek-corner\/digital-security-and-evolution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/fibrenoire.ca\/en\/geek-corner\/digital-security-and-evolution\/#primaryimage","url":"https:\/\/i0.wp.com\/fibrenoire.ca\/wp-content\/uploads\/2020\/08\/2-en-2.png?fit=2560%2C1440&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fibrenoire.ca\/wp-content\/uploads\/2020\/08\/2-en-2.png?fit=2560%2C1440&ssl=1","width":2560,"height":1440,"caption":"connected 2"},{"@type":"BreadcrumbList","@id":"https:\/\/fibrenoire.ca\/en\/geek-corner\/digital-security-and-evolution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fibrenoire.ca\/en\/"},{"@type":"ListItem","position":2,"name":"Digital security and evolution: the top 7 most frequently asked questions (webinar)"}]},{"@type":"WebSite","@id":"https:\/\/fibrenoire.ca\/#website","url":"https:\/\/fibrenoire.ca\/","name":"Fibrenoire","description":"Fibrenoire","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fibrenoire.ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/fibrenoire.ca\/en\/wp-json\/wp\/v2\/article\/3914","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fibrenoire.ca\/en\/wp-json\/wp\/v2\/article"}],"about":[{"href":"https:\/\/fibrenoire.ca\/en\/wp-json\/wp\/v2\/types\/article"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fibrenoire.ca\/en\/wp-json\/wp\/v2\/media\/5393"}],"wp:attachment":[{"href":"https:\/\/fibrenoire.ca\/en\/wp-json\/wp\/v2\/media?parent=3914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}