{"id":2,"date":"2019-09-09T11:22:40","date_gmt":"2019-09-09T11:22:40","guid":{"rendered":"https:\/\/purcept.fr\/?page_id=2"},"modified":"2025-10-18T11:17:24","modified_gmt":"2025-10-18T09:17:24","slug":"services","status":"publish","type":"page","link":"https:\/\/purcept.fr\/fr\/services\/","title":{"rendered":"Services"},"content":{"rendered":"<h1>Services<\/h1>\n<h2>Cyber <br \/>\n<span class=\"uk-heading-divider uk-display-inline-block\">Governance &#038; Risk<\/span><\/h2>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/09\/un-membre-influent-du-conseil-d-administration-fournit-des-fonds-de-capital-aux-entreprises-scaled.jpg\" alt=\"\"><\/p>\n<div>\n<h3>Align strategy. Govern with clarity.<\/h3>\n<div>\n<div uk-grid=\"\">\n<div class=\"uk-width-2-3@m\">\n<p>Cybersecurity governance is not about endless frameworks or box-ticking exercises. It is about giving leadership the clarity and discipline to take decisions that protect both business ambition and reputation. We work alongside executive teams to design pragmatic governance models, align risk with business priorities, and ensure compliance is not just achieved but sustained.<\/p>\n<p><strong>Our commitment is to make risk management concrete, accountable, and built to withstand real-world pressures.<\/strong><\/p>\n<\/div>\n<div class=\"uk-width-1-3@m\">\n<ul class=\"uk-list uk-list-bullet \">\n<li>Cybersecurity Strategy &amp; Roadmap<\/li>\n<li>GRC Modernization<\/li>\n<li>Risk-Based Investment &amp; Budget Planning<\/li>\n<li>Executive &amp; Board Cyber Advisory<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<h2>Digital <br \/><span class=\"uk-heading-divider uk-display-inline-block\">Trust<\/span><\/h2>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/09\/fond-de-technologie-biometrique-avec-systeme-de-numerisation-d-empreintes-digitales-sur-remix-numerique-d-ecran-virtuel-scaled.jpg\" alt=\"\"><\/p>\n<div>\n<h3>Secure access. Enable confidence.<\/h3>\n<div>\n<div uk-grid=\"\">\n<div class=\"uk-width-2-3@m\">\n<p>Trust is earned through every interaction \u2014 and lost in an instant. In a world where identity is the new perimeter, securing access is no longer optional. Purcept helps organizations establish resilient identity and access foundations, implementing Zero Trust principles without compromising the user experience. Our approach is hands-on and uncompromising: seamless for users, precise in execution, and resilient under attack.<\/p>\n<p><strong>Digital trust is not a slogan for us, it is an outcome we deliver.<\/strong><\/p>\n<\/div>\n<div class=\"uk-width-1-3@m\">\n<ul class=\"uk-list uk-list-bullet\">\n<li>Identity &amp; Access Strategy<\/li>\n<li>Zero Trust Enablement<\/li>\n<li>Digital Trust Audit &amp; Roadmap<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<h2>Cyber <br \/><span class=\"uk-heading-divider uk-display-inline-block\">Operations<\/span><\/h2>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/09\/l-ingenieur-du-centre-de-donnees-implemente-des-cadres-de-virtualisation-de-l-ia-et-des-arbres-de-noeuds-scaled.jpg\" alt=\"\"><\/p>\n<div>\n<h3>Operationalize security. Strengthen resilience.<\/h3>\n<div>\n<div uk-grid=\"\">\n<div class=\"uk-width-2-3@m\">\n<p>Cybersecurity must live in daily operations. We help organizations move from strategy to impact \u2014 by strengthening detection, response, and resilience capabilities. Our teams work side by side with yours to build SOC processes, incident response playbooks, and continuous improvement practices that do not stop at theory. When a threat appears, we act with rigor. When a gap is identified, we close it.<\/p>\n<p><strong>Our promise is simple: operational security, delivered without shortcuts.<\/strong><\/p>\n<\/div>\n<div class=\"uk-width-1-3@m\">\n<ul class=\"uk-list uk-list-bullet\">\n<li>Vulnerability &amp; Exposure Management<\/li>\n<li>Detection &amp; Incident Response Readiness<\/li>\n<li>Cyber Operations Audit &amp; Optimization<\/li>\n<li>Operational Hardening &amp; Endpoint Protection<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/yootheme\/products-cta.svg\" alt=\"\"><\/p>\n<h2>True  <br \/><span class=\"uk-heading-divider uk-display-inline-block\">Partnership<\/span><\/h2>\n<div>\n<p>Every service we deliver is guided by the same principle: <strong>what we commit to, we deliver.<\/strong> At Purcept, partnership means sharing responsibility, holding ourselves accountable, and standing by your side until results are achieved.<\/p>\n<\/div>\n<p><p>\n        <a href=\"mailto:hello@purcept.fr\">Make an Inquiry<\/a>\n    <\/p>\n<\/p>\n<p><!--more--><br \/>\n<!-- {\"type\":\"layout\",\"children\":[{\"name\":\"Products\",\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"padding\":\"xlarge\",\"padding_remove_bottom\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"margin\":\"xlarge\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-1\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"parallax\",\"content\":\"Services\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,50\",\"text_align\":\"center\",\"title_element\":\"h1\",\"title_style\":\"heading-xlarge\"}}]}]},{\"type\":\"row\",\"props\":{\"id\":\"landtransport\",\"layout\":\"1-3,2-3\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_small\":\"1-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"parallax\",\"content\":\"Cyber <br \/>\\n<span class=\\\"uk-heading-divider uk-display-inline-block\\\">Governance & Risk<\\\/span>\",\"css\":\"@media (min-width: 960px){\\n\\t.el-element { margin-top: 40px; }\\n}\",\"id\":\"grc\",\"margin\":\"medium\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"100,0\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_small\":\"2-3\"},\"children\":[{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2025\\\/09\\\/un-membre-influent-du-conseil-d-administration-fournit-des-fonds-de-capital-aux-entreprises-scaled.jpg\",\"image_loading\":true,\"image_svg_color\":\"emphasis\",\"image_width\":\"780\",\"margin\":\"\",\"text_align\":\"right\",\"visibility\":\"m\"}}]}]},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\"@media (min-width: 960px) {\\n    .el-column { margin-top: -25%; }\\n}\",\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"animation\":\"parallax\",\"content\":\"\n\n<div uk-grid=\\\"\\\">\\n\n\n<div class=\\\"uk-width-2-3@m\\\">\\n\n\n<p>Cybersecurity governance is not about endless frameworks or box-ticking exercises. It is about giving leadership the clarity and discipline to take decisions that protect both business ambition and reputation. We work alongside executive teams to design pragmatic governance models, align risk with business priorities, and ensure compliance is not just achieved but sustained.<\\\/p>\\n\n\n<p><strong>Our commitment is to make risk management concrete, accountable, and built to withstand real-world pressures.<\\\/strong><\\\/p>\\n<\\\/div>\\n\n\n<div class=\\\"uk-width-1-3@m\\\">\\n\n\n<ul class=\\\"uk-list uk-list-bullet \\\">\\n\n\n<li>Cybersecurity Strategy &amp; Roadmap<\\\/li>\\n\n\n<li>GRC Modernization<\\\/li>\\n\n\n<li>Risk-Based Investment &amp; Budget Planning<\\\/li>\\n\n\n<li>Executive &amp; Board Cyber Advisory<\\\/li>\\n<\\\/ul>\\n<\\\/div>\\n<\\\/div>\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"medium\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link_margin\":\"medium\",\"link_style\":\"default\",\"link_text\":\"Show More\",\"margin\":\"\",\"maxwidth\":\"2xlarge\",\"maxwidth_breakpoint\":\"m\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"100,0\",\"title\":\"Align strategy. Govern with clarity.\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}}]}]},{\"type\":\"row\",\"props\":{\"id\":\"oceanfreight\",\"margin\":\"xlarge\",\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-1\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"1-3,2-3\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"parallax\",\"content\":\"Digital <br \/><span class=\\\"uk-heading-divider uk-display-inline-block\\\">Trust<\\\/span>\",\"css\":\"@media (min-width: 960px){\\n\\t.el-element { margin-top: 40px; }\\n}\",\"id\":\"trust\",\"margin\":\"medium\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"100,0\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"order_first\":\"m\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2025\\\/09\\\/fond-de-technologie-biometrique-avec-systeme-de-numerisation-d-empreintes-digitales-sur-remix-numerique-d-ecran-virtuel-scaled.jpg\",\"image_svg_color\":\"emphasis\",\"image_width\":\"780\",\"margin\":\"\",\"text_align\":\"left\",\"visibility\":\"m\"}}]}]},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\"@media (min-width: 960px) {\\n    .el-column { margin-top: -25%; }\\n}\",\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"animation\":\"parallax\",\"block_align\":\"right\",\"content\":\"\n\n<div uk-grid=\\\"\\\">\\n\n\n<div class=\\\"uk-width-2-3@m\\\">\\n\n\n<p>Trust is earned through every interaction \\u2014 and lost in an instant. In a world where identity is the new perimeter, securing access is no longer optional. Purcept helps organizations establish resilient identity and access foundations, implementing Zero Trust principles without compromising the user experience. Our approach is hands-on and uncompromising: seamless for users, precise in execution, and resilient under attack.<\\\/p>\\n\n\n<p><strong>Digital trust is not a slogan for us, it is an outcome we deliver.<\\\/strong><\\\/p>\\n<\\\/div>\\n\n\n<div class=\\\"uk-width-1-3@m\\\">\\n\n\n<ul class=\\\"uk-list uk-list-bullet\\\">\\n\n\n<li>Identity &amp; Access Strategy<\\\/li>\\n\n\n<li>Zero Trust Enablement<\\\/li>\\n\n\n<li>Digital Trust Audit &amp; Roadmap<\\\/li>\\n<\\\/ul>\\n<\\\/div>\\n<\\\/div>\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"medium\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link_margin\":\"medium\",\"link_style\":\"default\",\"link_text\":\"Show More\",\"margin\":\"\",\"maxwidth\":\"2xlarge\",\"maxwidth_breakpoint\":\"m\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"100,0\",\"title\":\"Secure access. Enable confidence.\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}}]}]},{\"type\":\"row\",\"props\":{\"id\":\"airfreight\",\"margin\":\"xlarge\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-1\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"1-3,2-3\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"parallax\",\"content\":\"Cyber <br \/><span class=\\\"uk-heading-divider uk-display-inline-block\\\">Operations<\\\/span>\",\"css\":\"@media (min-width: 960px){\\n\\t.el-element { margin-top: 40px; }\\n}\",\"id\":\"operations\",\"margin\":\"medium\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"100,0\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2025\\\/09\\\/l-ingenieur-du-centre-de-donnees-implemente-des-cadres-de-virtualisation-de-l-ia-et-des-arbres-de-noeuds-scaled.jpg\",\"image_svg_color\":\"emphasis\",\"image_width\":\"780\",\"margin\":\"\",\"text_align\":\"right\",\"visibility\":\"m\"}}]}]},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\"@media (min-width: 960px) {\\n    .el-column { margin-top: -25%; }\\n}\",\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"animation\":\"parallax\",\"content\":\"\n\n<div uk-grid=\\\"\\\">\\n\n\n<div class=\\\"uk-width-2-3@m\\\">\\n\n\n<p>Cybersecurity must live in daily operations. We help organizations move from strategy to impact \\u2014 by strengthening detection, response, and resilience capabilities. Our teams work side by side with yours to build SOC processes, incident response playbooks, and continuous improvement practices that do not stop at theory. When a threat appears, we act with rigor. When a gap is identified, we close it.<\\\/p>\\n\n\n<p><strong>Our promise is simple: operational security, delivered without shortcuts.<\\\/strong><\\\/p>\\n<\\\/div>\\n\n\n<div class=\\\"uk-width-1-3@m\\\">\\n\n\n<ul class=\\\"uk-list uk-list-bullet\\\">\\n\n\n<li>Vulnerability &amp; Exposure Management<\\\/li>\\n\n\n<li>Detection &amp; Incident Response Readiness<\\\/li>\\n\n\n<li>Cyber Operations Audit &amp; Optimization<\\\/li>\\n\n\n<li>Operational Hardening &amp; Endpoint Protection<\\\/li>\\n<\\\/ul>\\n<\\\/div>\\n<\\\/div>\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"medium\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link_margin\":\"medium\",\"link_style\":\"default\",\"link_text\":\"Show More\",\"margin\":\"\",\"maxwidth\":\"2xlarge\",\"maxwidth_breakpoint\":\"m\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"100,0\",\"title\":\"Operationalize security. Strengthen resilience.\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"}}]}]},{\"type\":\"row\",\"props\":{\"margin\":\"xlarge\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-1\"}}]}]},{\"name\":\"Services\",\"type\":\"section\",\"props\":{\"id\":\"services\",\"image_position\":\"center-center\",\"padding\":\"xlarge\",\"padding_remove_top\":false,\"status\":\"disabled\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-1\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"parallax\",\"block_align\":\"center\",\"content\":\"Special <br \/><span class=\\\"uk-heading-divider uk-display-inline-block\\\">Transports<\\\/span>\",\"margin\":\"large\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,-100\",\"text_align\":\"center\",\"title_element\":\"h2\",\"title_style\":\"heading-medium\"}},{\"type\":\"grid\",\"props\":{\"animation\":\"parallax\",\"content_column_breakpoint\":\"m\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"3\",\"grid_parallax\":\"80\",\"grid_small\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":false,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"item_animation\":true,\"lightbox_bg_close\":true,\"link_style\":\"text\",\"link_text\":\"Read more\",\"margin\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,-80\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h2\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"Donec quam felis ultricies nec, pretium vene natis vitae elementum quis consequat massa justo rhoncus vitae egestas justo felis sit vehicula sem internis pede mollis enim.\",\"image\":\"wp-content\\\/uploads\\\/yootheme\\\/products-services-01.svg\",\"link\":\"?page_id=3\",\"title\":\"Relocation <br \/>Services\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"Donec quam felis ultricies nec, pretium vene natis vitae elementum quis consequat massa justo rhoncus vitae egestas justo felis sit vehicula sem internis pede mollis enim.\",\"image\":\"wp-content\\\/uploads\\\/yootheme\\\/products-services-02.svg\",\"link\":\"?page_id=3\",\"title\":\"Sport <br \/>Logistics\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"Donec quam felis ultricies nec, pretium vene natis vitae elementum quis consequat massa justo rhoncus vitae egestas justo felis sit vehicula sem internis pede mollis enim.\",\"image\":\"wp-content\\\/uploads\\\/yootheme\\\/products-services-03.svg\",\"link\":\"?page_id=3\",\"title\":\"Art & Gallery <br \/>Logistics\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"Donec quam felis ultricies nec, pretium vene natis vitae elementum quis consequat massa justo rhoncus vitae egestas justo felis sit vehicula sem internis pede mollis enim.\",\"image\":\"wp-content\\\/uploads\\\/yootheme\\\/products-services-04.svg\",\"link\":\"?page_id=3\",\"title\":\"Fairs & <br \/>Exhibitions\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"Donec quam felis ultricies nec, pretium vene natis vitae elementum quis consequat massa justo rhoncus vitae egestas justo felis sit vehicula sem internis pede mollis enim.\",\"image\":\"wp-content\\\/uploads\\\/yootheme\\\/products-services-05.svg\",\"link\":\"?page_id=3\",\"title\":\"Festivals & <br \/>Events\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"Donec quam felis ultricies nec, pretium vene natis vitae elementum quis consequat massa justo rhoncus vitae egestas justo felis sit vehicula sem internis pede mollis enim.\",\"image\":\"wp-content\\\/uploads\\\/yootheme\\\/products-services-06.svg\",\"link\":\"?page_id=3\",\"title\":\"Food <br \/>Logistics\"}}]}]}]}]},{\"name\":\"Call to Action\",\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"padding\":\"xlarge\",\"style\":\"primary\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/yootheme\\\/products-cta.svg\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_width\":\"500\",\"margin\":\"\",\"text_align\":\"center\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"parallax\",\"content\":\"True  <br \/><span class=\\\"uk-heading-divider uk-display-inline-block\\\">Partnership<\\\/span>\",\"margin\":\"medium\",\"maxwidth_breakpoint\":\"m\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"50,0\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\",\"title_style\":\"heading-medium\"}},{\"type\":\"text\",\"props\":{\"animation\":\"parallax\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Every service we deliver is guided by the same principle: <strong>what we commit to, we deliver.<\\\/strong> At Purcept, partnership means sharing responsibility, holding ourselves accountable, and standing by your side until results are achieved.<\\\/p>\",\"margin\":\"\",\"maxwidth\":\"large\",\"maxwidth_breakpoint\":\"m\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"50,0\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\"}},{\"type\":\"button\",\"props\":{\"animation\":\"parallax\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"medium\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"50,0\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"default\",\"content\":\"Make an Inquiry\",\"dialog_layout\":\"modal\",\"dialog_offcanvas_flip\":true,\"icon_align\":\"left\",\"link\":\"mailto:hello@purcept.fr\"}}]}]}]}]}],\"version\":\"4.5.28\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Services Cyber Governance &#038; Risk Align strategy. Govern with clarity. Cybersecurity governance is not about endless frameworks or box-ticking exercises. It is about giving leadership the clarity and discipline to take decisions that protect both business ambition and reputation. We work alongside executive teams to design pragmatic governance models, align risk with business priorities, and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/purcept.fr\/fr\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/purcept.fr\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/purcept.fr\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/purcept.fr\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/purcept.fr\/fr\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":12,"href":"https:\/\/purcept.fr\/fr\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":2217,"href":"https:\/\/purcept.fr\/fr\/wp-json\/wp\/v2\/pages\/2\/revisions\/2217"}],"wp:attachment":[{"href":"https:\/\/purcept.fr\/fr\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}