Bertin IT designs and provides a full range of solutions for the defense in-depth
of sensitive information systems & critical infrastructures.

Cybersecurity 2017-04-27T10:55:55+00:00

Our cybersecurty solutions are based on a certified government technology – CC EAL 5+ and proven for high defense needs,as part of more than ten years of experimentation and development on issues of classified information partitioning and secure exchange of sensitive data.

They protect the integrity of your system and information assets by:

Filtering the content imported into your system via any type of removable media

Ensuring the confidentiality and safety of exchanges between networks or systems

Preventing data leakage, whether intentional or accidental



MediaCentric® can detect the early signs of cyber attacks and the leak of sensitive information generating vulnerabilities for the IS.

MediaCentric®, with capacities for collecting and analyzing the surface and deep web, provides activity monitoring on all sources (social networks, forums, pastes, IRCs, etc.) and alerts

more information


Trusted Gateway

CrossinG® makes it possible to manage data flows and to ensure the confidentiality and integrity of exchanges between two information systems.

High-level network partitioning and advanced processing of incoming and outgoing data flows prevents the risk of an attack spreading from one network to another and also provides protection against harmful content injection and data leaks.

more information


Breaking the kill chain of a cyber attack

Growing in number, more diversified and more precisely targeted, computer attacks have become commonplace and are becoming more and more sophisticated, to the point that they can now be considered as genuine strategic offensives. Advanced Persistent Threats, or APTs, are characteristic of this new generation of threats, methodically combining several intrusion tools and vectors in order to strike slowly, but surely…

more information

Secure exchanges between SOCs

In ECOSSIAN project, the critical infrastructures and the Security Operations Centers (SOCs) are interconnected across UE and converge towards a pan-European SOC. The aim is to enable real-time exchange of information on vulnerabilities, threats and incidents. The extreme sensitivity of the data thus transmitted calls for maximum security of interconnections…

more information

Contact Cyber Security Team

Contact us