Operate your installations safely, protect your sensitive data, secure your installations and fulfil your legal obligations
The accelerated growth of digital technology significantly increases the attack surface and amplifies the risk of cyberattacks, regardless of the size of the company and the sector of activity. The impact on your systems can be irreversible, causing bodily, physical, environmental or financial harm in addition to digital damage.
Clemessy helps you to protect your industrial or technical assets by strengthening the security of your systems. Our experts put their expertise at your service to integrate cybersecurity into the entire life cycle of your installations.
-crop1200x1200.jpg)
A 360°, tailor-made and turnkey service offer
Secure all system components:
- Networks
- Equipment, automatons, subsystems
- Physical or virtual server infrastructure
- User workstations
- Business, security or video-surveillance software
- Data and storage
and benefit from:
- A guarantee of compliance with existing standards or references
- The optimisation of your investments while limiting risks considerably
Audit, diagnosis and advice
As each system is different and requires a personalised diagnosis of the conditions of the premises and of the vulnerability, our teams accompany you from the beginning of your project:
- Physical, logic, technical and functional inventory and mapping
- Assessment of the level of security/references
- EBIOS risk analysis
- Analysis of cybersecurity measures to reduce risks
- Report and presentation
- Proposal of an action plan
As cybersecurity is essential throughout the life cycle of installations and must take references into account, we offer support for the protection of your systems up to certification.
Securing systems
To protect your systems from the risk of cyberattack, our experts focus on the security of architectures, networks, data, software, workstations and equipment:
- Integration of hardware and software solutions (detection and protection)
- Remedial and improvement measures
- Residual risk assessment
Security maintenance
To maintain an acceptable level of security, benefit from the controlled and sustainable management of risks linked to software vulnerabilities, enabling your systems to provide continuity of service:
- Vulnerability watch and detection/qualification of new threats
- Awareness training, continuous improvement
- Simulation of attacks
- Incident response
Maintenance
- Team training
- Risk analysis
- Vulnerability watch
- Technology watch
- Operational support
- Awareness raising / Training
Preventive
- On-site inspection, inventory
- Checking of software updates
- Internal technical diagnosis
- Security audit & test
- Updating of systems
Corrective
- Management of security breaches
- Application of patches
- Validation of patches
Ameliorative
- Testing of security-related operational procedures
- Security testing during functional developments
Clemessy complies with numerous specific or standard-based references (Military Programming Law - LPM, PIMSEC, ANSSI, IEC62443, APSAD D32) in demanding situations and on the premises of operators of essential services.
Experience & expertise
- Methodology & reference: EBIOS, EBIOS RM, PIMSEC
- Regulatory expertise: ANSSI, NIS, LPM (class 1, 2, 3)
- Technical expertise: Syslog, Wallix, Nagios, Radius, Sentryo, Cybelius, Pki, LDAP, Cisco, Hirschmann, Genetec, Stormshield
- Governance and integration expertise for projects containing cybersecurity
- Member of CLUSIF: French Club for Information Security

Consult all our job offers
Available to apprentices, to people looking for an internship or a job, and also to Eiffage employees, the Taléo search engine is the best way of finding out about openings available within the Group. “Area of employment”, “Location”, “Organisation”, “Fixed-term contract”, “Open-ended contract”, “Internship”, “Apprenticeship”: just fill in a few criteria to have real-time access to all the professional development opportunities.