{"id":73,"date":"2023-11-04T23:14:39","date_gmt":"2023-11-04T22:14:39","guid":{"rendered":"https:\/\/be-pro.fr\/?page_id=73"},"modified":"2024-03-13T16:36:03","modified_gmt":"2024-03-13T15:36:03","slug":"page-accueil-2","status":"publish","type":"page","link":"https:\/\/be-pro.fr\/","title":{"rendered":"Page accueil 2"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#13131e\u00a0\u00bb min_height=\u00a0\u00bb750px\u00a0\u00bb custom_margin=\u00a0\u00bb||-38px|||\u00a0\u00bb custom_padding=\u00a0\u00bb||0px|||\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb3_4,1_4&Prime; _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb min_height=\u00a0\u00bb596.5px\u00a0\u00bb custom_margin=\u00a0\u00bb||0px|auto|false|false\u00a0\u00bb custom_padding=\u00a0\u00bb||0px||false|false\u00a0\u00bb collapsed=\u00a0\u00bboff\u00a0\u00bb][et_pb_column type=\u00a0\u00bb3_4&Prime; _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_slider _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bbrgba(119,119,119,0)\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb custom_padding=\u00a0\u00bb||151px|||\u00a0\u00bb][et_pb_slide heading=\u00a0\u00bbSecurity Audit\u00a0\u00bb button_text=\u00a0\u00bbSee more\u00a0\u00bb _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb sticky_transition=\u00a0\u00bbon\u00a0\u00bb]&nbsp;<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" src=\"https:\/\/be-pro.fr\/wp-content\/uploads\/2021\/01\/cyber-security-icon-2.png\" alt=\"\" class=\"wp-image-22 alignnone size-full\" width=\"100\" height=\"100\" \/><\/p>\n<p>[\/et_pb_slide][et_pb_slide heading=\u00a0\u00bbVulnerability Prevention\u00a0\u00bb button_text=\u00a0\u00bbSee more\u00a0\u00bb _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb sticky_transition=\u00a0\u00bbon\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" src=\"https:\/\/be-pro.fr\/wp-content\/uploads\/2021\/01\/cyber-security-icon-18.png\" alt=\"\" class=\"wp-image-19 alignnone size-full\" width=\"100\" height=\"100\" \/><\/p>\n<p>[\/et_pb_slide][et_pb_slide heading=\u00a0\u00bbSecurity Analysis\u00a0\u00bb button_text=\u00a0\u00bbSee more\u00a0\u00bb _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb sticky_transition=\u00a0\u00bbon\u00a0\u00bb]<\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/be-pro.fr\/wp-content\/uploads\/2021\/01\/cyber-security-icon-7.png\" alt=\"\" class=\"wp-image-23 alignnone size-full\" width=\"100\" height=\"100\" \/><\/p>\n<p>[\/et_pb_slide][\/et_pb_slider][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb96%\u00a0\u00bb min_height=\u00a0\u00bb584.8px\u00a0\u00bb custom_margin=\u00a0\u00bb-3px|-5px||||\u00a0\u00bb animation_style=\u00a0\u00bbslide\u00a0\u00bb animation_direction=\u00a0\u00bbright\u00a0\u00bb animation_duration=\u00a0\u00bb1250ms\u00a0\u00bb animation_delay=\u00a0\u00bb350ms\u00a0\u00bb]<\/p>\n<h1 style=\"text-align: center;\"><strong>Who We Are<\/strong><\/h1>\n<h2>Be-Pro<\/h2>\n<div class=\"flex flex-grow flex-col max-w-full gap-3 gizmo:gap-0\">\n<div data-message-author-role=\"assistant\" data-message-id=\"43633d8d-1347-4e1a-b844-0d013d53062e\" class=\"min-h-[20px] text-message peer flex flex-col items-start gap-3 whitespace-pre-wrap break-words peer-[.text-message]:mt-5 overflow-x-auto\">\n<div class=\"markdown prose w-full break-words dark:prose-invert dark\">\n<hr \/>\n<p style=\"text-align: center;\"><img loading=\"lazy\" src=\"https:\/\/be-pro.fr\/wp-content\/uploads\/2021\/01\/cyber-security-13-3-275x300.png\" alt=\"\" class=\"wp-image-21 alignnone size-medium\" style=\"float: left;\" width=\"149\" height=\"163\" \/><\/p>\n<p>We are a leading cybersecurity firm committed to safeguarding digital landscapes. Our mission is clear: to provide unparalleled expertise to fellow experts in the field.<\/p>\n<p>With a relentless dedication to fortifying digital infrastructures, we empower businesses and professionals with cutting-edge solutions. Our team comprises seasoned specialists devoted to staying ahead of evolving threats, ensuring comprehensive protection in an ever-changing technological landscape.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#13131e\u00a0\u00bb min_height=\u00a0\u00bb750px\u00a0\u00bb custom_margin=\u00a0\u00bb||-38px|||\u00a0\u00bb custom_padding=\u00a0\u00bb||0px|||\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb3_4,1_4&Prime; _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb min_height=\u00a0\u00bb596.5px\u00a0\u00bb custom_margin=\u00a0\u00bb||0px|auto|false|false\u00a0\u00bb custom_padding=\u00a0\u00bb||0px||false|false\u00a0\u00bb collapsed=\u00a0\u00bboff\u00a0\u00bb][et_pb_column type=\u00a0\u00bb3_4&Prime; _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_slider _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bbrgba(119,119,119,0)\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb custom_padding=\u00a0\u00bb||151px|||\u00a0\u00bb][et_pb_slide heading=\u00a0\u00bbSecurity Audit\u00a0\u00bb button_text=\u00a0\u00bbSee more\u00a0\u00bb _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb sticky_transition=\u00a0\u00bbon\u00a0\u00bb]&nbsp; [\/et_pb_slide][et_pb_slide heading=\u00a0\u00bbVulnerability Prevention\u00a0\u00bb button_text=\u00a0\u00bbSee more\u00a0\u00bb _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb sticky_transition=\u00a0\u00bbon\u00a0\u00bb] [\/et_pb_slide][et_pb_slide heading=\u00a0\u00bbSecurity Analysis\u00a0\u00bb button_text=\u00a0\u00bbSee more\u00a0\u00bb _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb sticky_transition=\u00a0\u00bbon\u00a0\u00bb] [\/et_pb_slide][\/et_pb_slider][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.8.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb96%\u00a0\u00bb min_height=\u00a0\u00bb584.8px\u00a0\u00bb custom_margin=\u00a0\u00bb-3px|-5px||||\u00a0\u00bb [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"_links":{"self":[{"href":"https:\/\/be-pro.fr\/index.php\/wp-json\/wp\/v2\/pages\/73"}],"collection":[{"href":"https:\/\/be-pro.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/be-pro.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/be-pro.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/be-pro.fr\/index.php\/wp-json\/wp\/v2\/comments?post=73"}],"version-history":[{"count":26,"href":"https:\/\/be-pro.fr\/index.php\/wp-json\/wp\/v2\/pages\/73\/revisions"}],"predecessor-version":[{"id":161,"href":"https:\/\/be-pro.fr\/index.php\/wp-json\/wp\/v2\/pages\/73\/revisions\/161"}],"wp:attachment":[{"href":"https:\/\/be-pro.fr\/index.php\/wp-json\/wp\/v2\/media?parent=73"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}