Infrastructure Security
*We Have A 6th Sense For The Safest Infrastructures. As experts in IT infrastructure, our 6th Sense enables us to assist our clients on a day-to-day basis so that they can meet the strategic challenges posed by changes in their information systems.

Our Professions & Services
Our CAPFI 6th Sense experts can intervene on all of your projects: Counselling, Conception, Integration, Administration and IT Governance
We have expertise at the cutting edge of innovation:
- Cloud
- Virtualisation
- DevOps
- Big Data
- Connected Objects

INNOVATION, ROBUSTNESS, RELIABILITY AND PERFORMANCE GUIDED BY MULTIPLE OBJECTIVES OF INNOVATION, ROBUSTNESS, RELIABILITY AND PERFORMANCE, WE OPERATE WITHIN THE THREE KEY STEPS: THINK>BUILD>RUN
Our fields of operation:
- Expertise in Redhat 6&7 /Solaris/Cluster Veritas systems
- Definition, Optimization and migration of VmWare infrastructures
- Expertise in Windows Server 2008/2012/2016
- Deployment of your applications in the Cloud environment (Private / Public / Hybrid)
- Agility and ease of deployment in a production environment (DevOps)
- Automation of the delivery of infrastructures (DevOps)
- Administration of Docker platforms
Insertion of Sun (Slide 7 of the 6ST PPT) exclusively with the logos Centos, Redhat, Suse, Ubuntu, Sun, Microsoft, VmWare, Docker, Citrix, Infoblox
PSH – 6TH SENSE WORKS ON ALL THE DIFFERENT PHASES OF THINK/BUILD/RUN WITHIN THE NETWORK INFRASTRUCTURES LAN, MAN, WAN AND WLAN.
Our speciality: intervening within sensitive infrastructures while accepting the limitations of availability, security, resilience and performance.
- Design/Integration/Support with Cisco network equipment
- DWDM optical multiplexing
- Definition of LAN/WAN/MAN network architecture – BGP, OSPF, EIGRP routing
- Broadcasting of multicast flow (PIM)
- Definition of MPLS service high-quality architecture
- Integration, administration of critical network probes with very high availability
- Coordination, enhancement and definition of processes, capacity planning
Insertion of Sun (Slide 7 in the 6ST PPT) with the following Logos: CISCO, ALCATEL, HP, Juniper, F5
CONCEIVING, IMPLEMENTING AND SUPERVISING OUR CLIENTS’ SECURITY INFRASTRUCTURES IN ACCORDANCE WITH THEIR NEEDS IN TERMS OF CYBERSECURITY.
Our Expertise
- Design, integration & support for Firewall, Proxy, Reverse Proxy, IPS, DMZ Antivirus, etc.
- Expertise in Firewalling Checkpoint, Fortinet, Palo Alto, Juniper
- Analysis and integration of Anti-DDoS solutions
- Consolidation of Internet access infrastructures (expertise in WAF, virtualization and convergence of IAP)
- Protection and prévention de la perte de données – DLP
- Cyberark centralized management solution
- Technological monitoring and benchmarking of different solutions within our Lab
Insertion of Sun Lab (Slide 7 in 6ST PPT) with Logos: Checkpoint, Juniper, Fortinet, Symantec, MacAfee, F5, Bluecoat, Deny All, CyberArk
A UNIQUE EXPERTISE IN SERVICE MANAGEMENT AND GOVERNANCE:
Our consultants combine a strong technical background acquired in demanding environments, team spirit and a sense of communication that are ideal tools for dealing with the transformation of information systems. Their ITIL, PMP and ISO certifications and experience with incident, change, problem and service delivery are assets that contribute to the success of our clients’ projects.
Management of strategic IT projects (Implementation of control tools, management of load, budget, reporting, communication, assistance for project coordinators, etc.). Operational and contractual supervision of facility management (monitoring of contractual commitments, creation and updating of SLA, KPI, etc.). Implementation of ITIL processes (Incident, Problem, Change, etc.).
Our Achievement
Here are some examples:
- Conducting of POC, Windows Server 2016
- Conception and integration of a Systems/Networks and Applications supervision tool in a critical and highly sensitive context
- Analysis and integration of the Satellite 6 platform
- Docker expertise
- Consolidation of Internet infrastructures for a major international banking group
- Creation of a proxy to ensure the security of sensitive data proceeding from network probes for conformity with PCI-DSS
- Study, participation in expressions of needs and definition of worldwide deployment strategy for an ITSM (Service Now) tool

139
Amount of Workshops
47
Number of actives VMs