{"id":1178,"date":"2026-02-03T08:12:55","date_gmt":"2026-02-03T07:12:55","guid":{"rendered":"https:\/\/soft-iam.ma\/service\/wazuh-siem-security-monitoring\/"},"modified":"2026-03-24T14:11:55","modified_gmt":"2026-03-24T13:11:55","slug":"wazuh-siem-security-monitoring","status":"publish","type":"service","link":"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/","title":{"rendered":"Wazuh \/ SIEM (Security &amp; Monitoring)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1178\" class=\"elementor elementor-1178 elementor-223\" data-elementor-post-type=\"service\">\n\t\t\t\t<div class=\"elementor-element elementor-element-936eb80 e-flex e-con-boxed e-con e-parent\" data-id=\"936eb80\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e1aff9c e-con-full e-flex e-con e-child\" data-id=\"e1aff9c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-54e0c7e e-con-full e-flex e-con e-child\" data-id=\"54e0c7e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a29720 elementor-widget elementor-widget-image\" data-id=\"3a29720\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/deco.svg\" title=\"deco\" alt=\"deco\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8be727a elementor-widget elementor-widget-heading\" data-id=\"8be727a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SIEM &amp; XDR with Wazuh<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75a9282 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"75a9282\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Advanced cybersecurity, with Wazuh<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d541d3d elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"d541d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Our company supports its clients in setting up and operating a SIEM &amp; XDR platform based on Wazuh, enabling them to take control of their security, anticipate risks and sustainably secure their IT environment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d4c479 elementor-widget elementor-widget-button\" data-id=\"2d4c479\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/soft-iam.ma\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Request a quote<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e075c43 e-con-full e-flex e-con e-parent\" data-id=\"e075c43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4471156 e-con-full e-flex e-con e-child\" data-id=\"4471156\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a99f33 e-con e-atomic-element e-div-block-base e-4a99f33-871f0c6\" data-id=\"4a99f33\" data-element_type=\"e-div-block\" data-e-type=\"e-div-block\" data-e-type=\"e-div-block\" data-id=\"4a99f33\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3029b37 e-con e-atomic-element e-div-block-base e-3029b37-8587e3f\" data-id=\"3029b37\" data-element_type=\"e-div-block\" data-e-type=\"e-div-block\" data-e-type=\"e-div-block\" data-id=\"3029b37\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a795687 elementor-widget-tablet__width-inherit elementor-widget elementor-widget-heading\" data-id=\"a795687\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Transform threat detection into a lever for performance and trust<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36783e8 elementor-widget elementor-widget-text-editor\" data-id=\"36783e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Today, cyberattacks are no longer limited to isolated incidents. They directly impact business continuity, brand image, and overall company performance. Faced with this reality, it is essential to have a cybersecurity solution capable of detecting, analyzing, and prioritizing threats in real time, while providing clear and actionable visibility.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0e4c24f e-flex e-con-boxed e-con e-parent\" data-id=\"0e4c24f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-faa2059 e-con-full e-flex e-con e-child\" data-id=\"faa2059\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0cd8344 e-con-full e-flex e-con e-child\" data-id=\"0cd8344\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd0ba8a elementor-widget-tablet__width-inherit elementor-widget elementor-widget-heading\" data-id=\"cd0ba8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A modern approach to cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96a53f6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"96a53f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-793de46 elementor-widget elementor-widget-text-editor\" data-id=\"793de46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Wazuh allows you to centralize all security events within a single platform, offering a complete and consistent view of the company&#8217;s security posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab02735 elementor-widget elementor-widget-image\" data-id=\"ab02735\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"500\" src=\"https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/cybersecurity-dashboard.jpg\" class=\"attachment-large size-large wp-image-1188\" alt=\"\" srcset=\"https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/cybersecurity-dashboard.jpg 1024w, https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/cybersecurity-dashboard-300x188.jpg 300w, https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/cybersecurity-dashboard-768x480.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f984c7d e-con-full e-flex e-con e-child\" data-id=\"f984c7d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a67a0b elementor-widget elementor-widget-heading\" data-id=\"1a67a0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What the platform actually provides<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54b20d7 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"54b20d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What the platform actually provides<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Real-time detection of attacks, intrusions, and abnormal behavior<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Intelligent correlation of events for a better understanding of incidents<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Prioritizing alerts for a quick and effective response<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Clear dashboards for managing safety on a daily basis<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a7f5d9 e-con-full e-flex e-con e-child\" data-id=\"2a7f5d9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25ec2f9 elementor-widget elementor-widget-heading\" data-id=\"25ec2f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Objective: to reduce uncertainty, accelerate decision-making and limit the impact of incidents.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6d616fc e-flex e-con-boxed e-con e-parent\" data-id=\"6d616fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e0c3f21 e-con-full e-flex e-con e-child\" data-id=\"e0c3f21\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9ae5ecb elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"9ae5ecb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Wazuh?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14135b8 elementor-widget elementor-widget-heading\" data-id=\"14135b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why companies choose us with Wazuh<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a3277c e-con-full e-flex e-con e-child\" data-id=\"5a3277c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-38003cd e-con-full e-flex e-con e-child\" data-id=\"38003cd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-648d9de elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"648d9de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\"><path d=\"M1.57617 16C2.83019 9.17301 8.81148 4 16.0011 4C23.1905 4 29.1719 9.17301 30.4258 16C29.1719 22.8269 23.1905 28 16.0011 28C8.81148 28 2.83019 22.8269 1.57617 16ZM16.0011 22.6667C19.6829 22.6667 22.6677 19.6819 22.6677 16C22.6677 12.3181 19.6829 9.33333 16.0011 9.33333C12.3191 9.33333 9.33433 12.3181 9.33433 16C9.33433 19.6819 12.3191 22.6667 16.0011 22.6667ZM16.0011 20C13.7919 20 12.001 18.2092 12.001 16C12.001 13.7908 13.7919 12 16.0011 12C18.2101 12 20.0011 13.7908 20.0011 16C20.0011 18.2092 18.2101 20 16.0011 20Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15d9638 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"15d9638\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Total and centralized visibility<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96dedb0 elementor-widget elementor-widget-text-editor\" data-id=\"96dedb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>You no longer manage isolated alerts, but a comprehensive and structured view of your security. Each event is analyzed within its context to provide actionable information, not just a simple technical alert. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d6e8a2e e-con-full e-flex e-con e-child\" data-id=\"d6e8a2e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ad1e9c elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"1ad1e9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"36\" height=\"36\" viewBox=\"0 0 36 36\" fill=\"none\"><path d=\"M18 30C24.6275 30 30 24.6275 30 18C30 11.3726 24.6275 6 18 6C11.3726 6 6 11.3726 6 18C6 24.6275 11.3726 30 18 30ZM18 33C9.71572 33 3 26.2842 3 18C3 9.71572 9.71572 3 18 3C26.2842 3 33 9.71572 33 18C33 26.2842 26.2842 33 18 33ZM18 24C21.3137 24 24 21.3137 24 18C24 14.6863 21.3137 12 18 12C14.6863 12 12 14.6863 12 18C12 21.3137 14.6863 24 18 24ZM18 27C13.0294 27 9 22.9706 9 18C9 13.0294 13.0294 9 18 9C22.9706 9 27 13.0294 27 18C27 22.9706 22.9706 27 18 27ZM18 21C16.3431 21 15 19.6569 15 18C15 16.3431 16.3431 15 18 15C19.6569 15 21 16.3431 21 18C21 19.6569 19.6569 21 18 21Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d83819 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"3d83819\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Advanced detection geared towards real-world risks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f45d44 elementor-widget elementor-widget-text-editor\" data-id=\"7f45d44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Thanks to in-depth analysis and correlation of events: critical threats are detected earlier, false positives are greatly reduced, and teams can focus on what really matters.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1c358b6 e-con-full e-flex e-con e-child\" data-id=\"1c358b6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-43ffe0c elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"43ffe0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"30\" height=\"30\" viewBox=\"0 0 30 30\" fill=\"none\"><path d=\"M7.5 27.5V5C7.5 4.33696 7.76339 3.70107 8.23223 3.23223C8.70107 2.76339 9.33696 2.5 10 2.5H20C20.663 2.5 21.2989 2.76339 21.7678 3.23223C22.2366 3.70107 22.5 4.33696 22.5 5V27.5H7.5Z\" stroke=\"#017AC6\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M7.5 15H5C4.33696 15 3.70107 15.2634 3.23223 15.7322C2.76339 16.2011 2.5 16.837 2.5 17.5V25C2.5 25.663 2.76339 26.2989 3.23223 26.7678C3.70107 27.2366 4.33696 27.5 5 27.5H7.5\" stroke=\"#017AC6\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M22.5 11.25H25C25.663 11.25 26.2989 11.5134 26.7678 11.9822C27.2366 12.4511 27.5 13.087 27.5 13.75V25C27.5 25.663 27.2366 26.2989 26.7678 26.7678C26.2989 27.2366 25.663 27.5 25 27.5H22.5\" stroke=\"#017AC6\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M12.5 7.5H17.5\" stroke=\"#017AC6\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M12.5 12.5H17.5\" stroke=\"#017AC6\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M12.5 17.5H17.5\" stroke=\"#017AC6\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M12.5 22.5H17.5\" stroke=\"#017AC6\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-628fd26 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"628fd26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security aligned with your business objectives<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d45a498 elementor-widget elementor-widget-text-editor\" data-id=\"d45a498\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The platform is configured according to your business processes, operational priorities, and organizational constraints. Cybersecurity becomes a management tool, not a constraint. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-08c4ed8 e-con-full e-flex e-con e-child\" data-id=\"08c4ed8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-337ab85 elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"337ab85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"36\" height=\"36\" viewBox=\"0 0 36 36\" fill=\"none\"><path d=\"M33 10.5L20.25 23.25L12.75 15.75L3 25.5\" stroke=\"white\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M24 10.5H33V19.5\" stroke=\"white\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc478ad elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"dc478ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Une solution qui \u00e9volue avec votre organisation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ee79ba elementor-widget elementor-widget-text-editor\" data-id=\"8ee79ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Whether your environment is simple or complex, the solution adapts and evolves seamlessly, keeping pace with growth and technological changes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9715c7c e-flex e-con-boxed e-con e-parent\" data-id=\"9715c7c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5fa63c1 e-con-full e-flex e-con e-child\" data-id=\"5fa63c1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d2ef67f e-con-full e-flex e-con e-child\" data-id=\"d2ef67f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1292cdb elementor-widget-tablet__width-inherit elementor-widget elementor-widget-heading\" data-id=\"1292cdb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Une architecture pens\u00e9e pour la performance et la fiabilit\u00e9<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c802011 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c802011\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d908dbd elementor-widget elementor-widget-text-editor\" data-id=\"d908dbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The platform is based on a robust and proven architecture, designed to offer high availability and rapid event analysis.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0f73aa elementor-widget elementor-widget-image\" data-id=\"e0f73aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"465\" src=\"https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/cybersecurite-wazuh-1-1-1024x595.jpg\" class=\"attachment-large size-large wp-image-1191\" alt=\"\" srcset=\"https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/cybersecurite-wazuh-1-1-1024x595.jpg 1024w, https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/cybersecurite-wazuh-1-1-300x174.jpg 300w, https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/cybersecurite-wazuh-1-1-768x446.jpg 768w, https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/cybersecurite-wazuh-1-1.jpg 1163w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-66051eb e-con-full e-flex e-con e-child\" data-id=\"66051eb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-89006b3 e-con-full e-flex e-con e-child\" data-id=\"89006b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e857e90 e-con-full e-flex e-con e-child\" data-id=\"e857e90\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-295a3c0 elementor-view-stacked elementor-shape-rounded elementor-widget elementor-widget-icon\" data-id=\"295a3c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"27\" viewBox=\"0 0 27 27\" fill=\"none\"><path d=\"M22.5 2.25H4.5C3.25736 2.25 2.25 3.25736 2.25 4.5V9C2.25 10.2426 3.25736 11.25 4.5 11.25H22.5C23.7426 11.25 24.75 10.2426 24.75 9V4.5C24.75 3.25736 23.7426 2.25 22.5 2.25Z\" stroke=\"white\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M22.5 15.75H4.5C3.25736 15.75 2.25 16.7574 2.25 18V22.5C2.25 23.7426 3.25736 24.75 4.5 24.75H22.5C23.7426 24.75 24.75 23.7426 24.75 22.5V18C24.75 16.7574 23.7426 15.75 22.5 15.75Z\" stroke=\"white\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M6.75 6.75H6.76125\" stroke=\"white\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M6.75 20.25H6.76125\" stroke=\"white\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7cfef1 elementor-widget elementor-widget-text-editor\" data-id=\"e7cfef1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>You no longer manage isolated alerts, but a comprehensive and structured view of your security. Each event is analyzed within its context to provide actionable information, not just a simple technical alert. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-08dea45 e-con-full e-flex e-con e-child\" data-id=\"08dea45\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb14fe6 elementor-view-stacked elementor-shape-rounded elementor-widget elementor-widget-icon\" data-id=\"cb14fe6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"30\" height=\"30\" viewBox=\"0 0 30 30\" fill=\"none\"><path d=\"M7.5 12.5V25H23.75V12.5H7.5ZM22.5 10H25C25.6904 10 26.25 10.5597 26.25 11.25V26.25C26.25 26.9404 25.6904 27.5 25 27.5H5C4.30965 27.5 3.75 26.9404 3.75 26.25V11.25C3.75 10.5597 4.30965 10 5 10H7.5V8.75C7.5 4.60786 10.8579 1.25 15 1.25C19.1421 1.25 22.5 4.60786 22.5 8.75V10ZM20 10V8.75C20 5.98857 17.7614 3.75 15 3.75C12.2386 3.75 10 5.98857 10 8.75V10H20ZM8.75 13.75H11.25V16.25H8.75V13.75ZM8.75 17.5H11.25V20H8.75V17.5ZM8.75 21.25H11.25V23.75H8.75V21.25Z\" fill=\"#30ABE8\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7caa31e elementor-widget elementor-widget-text-editor\" data-id=\"7caa31e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Thanks to in-depth analysis and correlation of events: critical threats are detected earlier, false positives are greatly reduced, and teams can focus on what really matters.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cbdfdca e-con-full e-flex e-con e-child\" data-id=\"cbdfdca\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4dfe140 elementor-view-stacked elementor-shape-rounded elementor-widget elementor-widget-icon\" data-id=\"4dfe140\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"30\" height=\"30\" viewBox=\"0 0 30 30\" fill=\"none\"><path d=\"M27.5 15H24.4C23.8537 14.9988 23.3221 15.1766 22.8864 15.5062C22.4507 15.8358 22.135 16.299 21.9875 16.825L19.05 27.275C19.0311 27.3399 18.9916 27.3969 18.9375 27.4375C18.8834 27.4781 18.8176 27.5 18.75 27.5C18.6824 27.5 18.6166 27.4781 18.5625 27.4375C18.5084 27.3969 18.4689 27.3399 18.45 27.275L11.55 2.725C11.5311 2.66009 11.4916 2.60307 11.4375 2.5625C11.3834 2.52193 11.3176 2.5 11.25 2.5C11.1824 2.5 11.1166 2.52193 11.0625 2.5625C11.0084 2.60307 10.9689 2.66009 10.95 2.725L8.0125 13.175C7.86558 13.6989 7.55173 14.1606 7.11858 14.49C6.68543 14.8194 6.15665 14.9984 5.6125 15H2.5\" stroke=\"#30ABE8\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d3071c elementor-widget elementor-widget-text-editor\" data-id=\"7d3071c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The platform is configured according to your business processes, operational priorities, and organizational constraints. Cybersecurity becomes a management tool, not a constraint. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ff02d2 e-con-full e-flex e-con e-child\" data-id=\"7ff02d2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48d51e3 elementor-view-stacked elementor-shape-rounded elementor-widget elementor-widget-icon\" data-id=\"48d51e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"30\" height=\"30\" viewBox=\"0 0 30 30\" fill=\"none\"><path d=\"M3.75 3.75V23.75C3.75 24.413 4.01339 25.0489 4.48223 25.5178C4.95107 25.9866 5.58696 26.25 6.25 26.25H26.25\" stroke=\"#30ABE8\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M22.5 21.25V11.25\" stroke=\"#30ABE8\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M16.25 21.25V6.25\" stroke=\"#30ABE8\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M10 21.25V17.5\" stroke=\"#30ABE8\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e0d603 elementor-widget elementor-widget-text-editor\" data-id=\"5e0d603\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Whether your environment is simple or complex, the solution adapts and evolves seamlessly, keeping pace with growth and technological changes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bf76400 e-con-full e-flex e-con e-child\" data-id=\"bf76400\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e3b774 elementor-widget elementor-widget-heading\" data-id=\"7e3b774\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">The result: centralized, reliable, and immediately usable monitoring.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c540213 e-flex e-con-boxed e-con e-parent\" data-id=\"c540213\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5a4a58d e-con-full e-flex e-con e-child\" data-id=\"5a4a58d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0472680 elementor-widget elementor-widget-heading\" data-id=\"0472680\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our support: the real differentiating factor<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4b44a3 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"e4b44a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The success of a SIEM project relies primarily on human expertise and operational implementation. We offer comprehensive, structured, and results-oriented support. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53d172a e-con-full e-flex e-con e-child\" data-id=\"53d172a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4ba589f e-con-full e-flex e-con e-child\" data-id=\"4ba589f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a09ede3 elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"a09ede3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"36\" height=\"36\" viewBox=\"0 0 36 36\" fill=\"none\"><path d=\"M18 30C24.6275 30 30 24.6275 30 18C30 11.3726 24.6275 6 18 6C11.3726 6 6 11.3726 6 18C6 24.6275 11.3726 30 18 30ZM18 33C9.71572 33 3 26.2842 3 18C3 9.71572 9.71572 3 18 3C26.2842 3 33 9.71572 33 18C33 26.2842 26.2842 33 18 33ZM18 24C21.3137 24 24 21.3137 24 18C24 14.6863 21.3137 12 18 12C14.6863 12 12 14.6863 12 18C12 21.3137 14.6863 24 18 24ZM18 27C13.0294 27 9 22.9706 9 18C9 13.0294 13.0294 9 18 9C22.9706 9 27 13.0294 27 18C27 22.9706 22.9706 27 18 27ZM18 21C16.3431 21 15 19.6569 15 18C15 16.3431 16.3431 15 18 15C19.6569 15 21 16.3431 21 18C21 19.6569 19.6569 21 18 21Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6ebf11 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"c6ebf11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Audit and strategic planning<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38b540e elementor-widget elementor-widget-text-editor\" data-id=\"38b540e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity maturity assessment<br>Risk and threat scenario analysis<br>Definition of clear and measurable objectives<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8ac6bc3 e-con-full e-flex e-con e-child\" data-id=\"8ac6bc3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4412c43 elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"4412c43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\"><path d=\"M2.94911 18.7467C2.55839 16.9006 2.57422 15.0323 2.95023 13.2538C4.43012 13.4281 5.72184 12.9379 6.14422 11.9182C6.5666 10.8985 5.99978 9.63853 4.83011 8.71532C5.82188 7.19178 7.13176 5.85953 8.7134 4.83044C9.63668 6.0007 10.897 6.56793 11.917 6.14544C12.9369 5.72294 13.4271 4.43069 13.2524 2.95033C15.0984 2.55961 16.9667 2.57544 18.7453 2.95144C18.5711 4.43133 19.0612 5.72305 20.0809 6.14544C21.1005 6.56782 22.3605 6.00098 23.2838 4.83133C24.8074 5.8231 26.1396 7.13298 27.1687 8.71461C25.9984 9.6379 25.4312 10.8982 25.8536 11.9182C26.2761 12.9382 27.5684 13.4283 29.0488 13.2536C29.4395 15.0997 29.4236 16.9679 29.0476 18.7466C27.5677 18.5723 26.276 19.0625 25.8536 20.0821C25.4312 21.1018 25.9981 22.3618 27.1678 23.285C26.176 24.8085 24.8661 26.1407 23.2844 27.1699C22.3612 25.9997 21.1008 25.4323 20.0809 25.8548C19.0609 26.2774 18.5708 27.5697 18.7455 29.0499C16.8993 29.4407 15.0311 29.4248 13.2525 29.0488C13.4268 27.569 12.9367 26.2773 11.917 25.8548C10.8973 25.4324 9.63732 25.9993 8.7141 27.169C7.19056 26.1773 5.85831 24.8674 4.82923 23.2857C5.99948 22.3625 6.56671 21.1021 6.14422 20.0821C5.72174 19.0622 4.42947 18.5721 2.94911 18.7467ZM5.33235 16.2805C6.79876 16.6863 8.00892 17.6155 8.6079 19.0617C9.20687 20.5077 9.00824 22.0205 8.2583 23.3443C8.38704 23.4799 8.51932 23.6122 8.65499 23.7407C9.97882 22.9909 11.4915 22.7923 12.9375 23.3913C14.3835 23.9902 15.3127 25.2002 15.7185 26.6665C15.9053 26.6715 16.0923 26.6716 16.2792 26.6667C16.6851 25.2003 17.6143 23.9902 19.0604 23.3913C20.5064 22.7922 22.0192 22.9909 23.3431 23.7409C23.4788 23.6121 23.6109 23.4798 23.7395 23.3441C22.9896 22.0203 22.7911 20.5075 23.39 19.0617C23.9889 17.6157 25.1989 16.6865 26.6652 16.2806C26.6703 16.0938 26.6704 15.9067 26.6655 15.7198C25.1991 15.3141 23.9889 14.3847 23.39 12.9387C22.7909 11.4926 22.9896 9.97984 23.7396 8.65597C23.6108 8.52033 23.4785 8.38819 23.3428 8.25964C22.0191 9.00948 20.5064 9.20805 19.0604 8.60912C17.6144 8.01019 16.6852 6.80013 16.2793 5.33384C16.0925 5.3288 15.9056 5.3287 15.7185 5.33357C15.3128 6.79998 14.3835 8.01015 12.9375 8.60912C11.4914 9.20809 9.97863 9.00945 8.65475 8.25952C8.51911 8.38826 8.38696 8.52055 8.25843 8.65621C9.00826 9.98004 9.20683 11.4927 8.6079 12.9387C8.00896 14.3846 6.79891 15.3139 5.33262 15.7198C5.32758 15.9066 5.32748 16.0935 5.33235 16.2805ZM15.9989 20.0002C13.7897 20.0002 11.9989 18.2093 11.9989 16.0002C11.9989 13.791 13.7897 12.0002 15.9989 12.0002C18.208 12.0002 19.9989 13.791 19.9989 16.0002C19.9989 18.2093 18.208 20.0002 15.9989 20.0002ZM15.9989 17.3335C16.7353 17.3335 17.3323 16.7366 17.3323 16.0002C17.3323 15.2638 16.7353 14.6669 15.9989 14.6669C15.2625 14.6669 14.6656 15.2638 14.6656 16.0002C14.6656 16.7366 15.2625 17.3335 15.9989 17.3335Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be438c0 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"be438c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">D\u00e9ploiement et configuration avanc\u00e9e<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b919848 elementor-widget elementor-widget-text-editor\" data-id=\"b919848\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Mise en place s\u00e9curis\u00e9e de la plateforme<br>Param\u00e9trage pr\u00e9cis des r\u00e8gles de d\u00e9tection<br>Adaptation aux sp\u00e9cificit\u00e9s de votre infrastructure<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0470d2e e-con-full e-flex e-con e-child\" data-id=\"0470d2e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c93d330 elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"c93d330\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"34\" height=\"34\" viewBox=\"0 0 34 34\" fill=\"none\"><path d=\"M31.1673 24.0866C31.1659 28.1537 28.3079 31.553 24.4909 32.3874L23.587 29.6759C25.2927 29.3976 26.7424 28.3577 27.5759 26.9168H24.084C22.5191 26.9168 21.2507 25.6483 21.2507 24.0835V18.4168C21.2507 16.852 22.5191 15.5835 24.084 15.5835H28.2463C27.5492 9.99289 22.7801 5.66683 17.0007 5.66683C11.2212 5.66683 6.45214 9.99289 5.755 15.5835H9.91732C11.4821 15.5835 12.7507 16.852 12.7507 18.4168V24.0835C12.7507 25.6483 11.4821 26.9168 9.91732 26.9168H5.66732C4.10251 26.9168 2.83398 25.6483 2.83398 24.0835V17.0002C2.83398 9.17613 9.17661 2.8335 17.0007 2.8335C24.8246 2.8335 31.1673 9.17613 31.1673 17.0002V18.415V18.4168V24.0835V24.0866ZM28.334 24.0835V18.4168H24.084V24.0835H28.334ZM5.66732 18.4168V24.0835H9.91732V18.4168H5.66732Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-998bb1c elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"998bb1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Monitoring and incident management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f7a8a7 elementor-widget elementor-widget-text-editor\" data-id=\"0f7a8a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Continuous alert monitoring<br>Incident analysis and classification<br>Decision-making support<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-137edcc e-con-full e-flex e-con e-child\" data-id=\"137edcc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ffcb93f elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"ffcb93f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\"><path d=\"M26.6667 2.6665C27.4031 2.6665 28 3.26346 28 3.99984V9.00917L16.0016 21.0081L15.9933 26.6598L21.6552 26.6681L28 20.3225V27.9998C28 28.7362 27.4031 29.3332 26.6667 29.3332H5.33333C4.59696 29.3332 4 28.7362 4 27.9998V3.99984C4 3.26346 4.59696 2.6665 5.33333 2.6665H26.6667ZM29.0376 11.7433L30.9232 13.6289L20.5523 23.9998L18.6639 23.997L18.6667 22.1142L29.0376 11.7433ZM16 15.9998H9.33333V18.6665H16V15.9998ZM20 10.6665H9.33333V13.3332H20V10.6665Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f38255 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"3f38255\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Optimization and continuous improvement<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee4977a elementor-widget elementor-widget-text-editor\" data-id=\"ee4977a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Ajustement des r\u00e8gles selon l&#8217;\u00e9volution des menaces<br>Extension du p\u00e9rim\u00e8tre de supervision<br>Am\u00e9lioration constante de la qualit\u00e9 de d\u00e9tection<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bfc7b24 e-con-full e-flex e-con e-child\" data-id=\"bfc7b24\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea66853 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"ea66853\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Notre promesse : une solution efficace, mesurable et durable.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8c8067f e-flex e-con-boxed e-con e-parent\" data-id=\"8c8067f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ba62821 e-con-full e-flex e-con e-child\" data-id=\"ba62821\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-ed265b4 e-con-full e-flex e-con e-child\" data-id=\"ed265b4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec03e8b elementor-widget elementor-widget-heading\" data-id=\"ec03e8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Faites de la cybers\u00e9curit\u00e9 un avantage concurrentiel<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74c4a53 elementor-widget elementor-widget-text-editor\" data-id=\"74c4a53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>With Wazuh and our expert support, cybersecurity becomes a lever for performance, trust, and business continuity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-700b923 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"700b923\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Request a quote<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Deploy Wazuh to detect and monitor your infrastructure in real time.<br \/>An open-source solution supported by millions of users.<\/p>\n","protected":false},"featured_media":1188,"template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"class_list":["post-1178","service","type-service","status-publish","has-post-thumbnail","hentry","category-afficher-carrousel"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deploy Wazuh to detect and monitor your infrastructure<\/title>\n<meta name=\"description\" content=\"An open-source solution supported by millions of users: Real-time threat detection, Centralized logs...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deploy Wazuh to detect and monitor your infrastructure\" \/>\n<meta property=\"og:description\" content=\"An open-source solution supported by millions of users: Real-time threat detection, Centralized logs...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/\" \/>\n<meta property=\"og:site_name\" content=\"SOFTIAM MAROC\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-24T13:11:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/cybersecurity-dashboard.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/\",\"url\":\"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/\",\"name\":\"Deploy Wazuh to detect and monitor your infrastructure\",\"isPartOf\":{\"@id\":\"https:\/\/soft-iam.ma\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/cybersecurity-dashboard.jpg\",\"datePublished\":\"2026-02-03T07:12:55+00:00\",\"dateModified\":\"2026-03-24T13:11:55+00:00\",\"description\":\"An open-source solution supported by millions of users: Real-time threat detection, Centralized logs...\",\"breadcrumb\":{\"@id\":\"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/#primaryimage\",\"url\":\"https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/cybersecurity-dashboard.jpg\",\"contentUrl\":\"https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/cybersecurity-dashboard.jpg\",\"width\":1024,\"height\":640},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/soft-iam.ma\/en\/softiam-homepage\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wazuh \/ SIEM (Security &amp; Monitoring)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/soft-iam.ma\/en\/#website\",\"url\":\"https:\/\/soft-iam.ma\/en\/\",\"name\":\"SOFTIAM\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/soft-iam.ma\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/soft-iam.ma\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/soft-iam.ma\/en\/#organization\",\"name\":\"SOFTIAM\",\"url\":\"https:\/\/soft-iam.ma\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/soft-iam.ma\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/logo-3.webp\",\"contentUrl\":\"https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/logo-3.webp\",\"width\":187,\"height\":56,\"caption\":\"SOFTIAM\"},\"image\":{\"@id\":\"https:\/\/soft-iam.ma\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deploy Wazuh to detect and monitor your infrastructure","description":"An open-source solution supported by millions of users: Real-time threat detection, Centralized logs...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/","og_locale":"en_US","og_type":"article","og_title":"Deploy Wazuh to detect and monitor your infrastructure","og_description":"An open-source solution supported by millions of users: Real-time threat detection, Centralized logs...","og_url":"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/","og_site_name":"SOFTIAM MAROC","article_modified_time":"2026-03-24T13:11:55+00:00","og_image":[{"width":1024,"height":640,"url":"https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/cybersecurity-dashboard.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/","url":"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/","name":"Deploy Wazuh to detect and monitor your infrastructure","isPartOf":{"@id":"https:\/\/soft-iam.ma\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/#primaryimage"},"image":{"@id":"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/cybersecurity-dashboard.jpg","datePublished":"2026-02-03T07:12:55+00:00","dateModified":"2026-03-24T13:11:55+00:00","description":"An open-source solution supported by millions of users: Real-time threat detection, Centralized logs...","breadcrumb":{"@id":"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/#primaryimage","url":"https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/cybersecurity-dashboard.jpg","contentUrl":"https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/cybersecurity-dashboard.jpg","width":1024,"height":640},{"@type":"BreadcrumbList","@id":"https:\/\/soft-iam.ma\/en\/service\/wazuh-siem-security-monitoring\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/soft-iam.ma\/en\/softiam-homepage\/"},{"@type":"ListItem","position":2,"name":"Wazuh \/ SIEM (Security &amp; Monitoring)"}]},{"@type":"WebSite","@id":"https:\/\/soft-iam.ma\/en\/#website","url":"https:\/\/soft-iam.ma\/en\/","name":"SOFTIAM","description":"","publisher":{"@id":"https:\/\/soft-iam.ma\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/soft-iam.ma\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/soft-iam.ma\/en\/#organization","name":"SOFTIAM","url":"https:\/\/soft-iam.ma\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/soft-iam.ma\/en\/#\/schema\/logo\/image\/","url":"https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/logo-3.webp","contentUrl":"https:\/\/soft-iam.ma\/wp-content\/uploads\/2026\/02\/logo-3.webp","width":187,"height":56,"caption":"SOFTIAM"},"image":{"@id":"https:\/\/soft-iam.ma\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/soft-iam.ma\/en\/wp-json\/wp\/v2\/service\/1178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/soft-iam.ma\/en\/wp-json\/wp\/v2\/service"}],"about":[{"href":"https:\/\/soft-iam.ma\/en\/wp-json\/wp\/v2\/types\/service"}],"version-history":[{"count":0,"href":"https:\/\/soft-iam.ma\/en\/wp-json\/wp\/v2\/service\/1178\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/soft-iam.ma\/en\/wp-json\/wp\/v2\/media\/1188"}],"wp:attachment":[{"href":"https:\/\/soft-iam.ma\/en\/wp-json\/wp\/v2\/media?parent=1178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/soft-iam.ma\/en\/wp-json\/wp\/v2\/categories?post=1178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}