top of page

THE ESSENTIALS
News, analysis and advice to support your digital transformation


🚫 Do not confuse IT service providers with IT management: outsourcing IT is not the same as managing IT...
Andiris transforms complexity into clarity, technology into performance, and data into value. Unlike an IT service provider, an IT department like ours is part of your team and acts in the exclusive interest of your company. We guide your most sensitive digital choices with an approach based on three pillars: security, confidentiality and operational efficiency. Every action is aimed at protecting your data, ensuring the reliability of your systems and freeing your organisati
1 day ago1 min read


Outsourcing is often misunderstood.
It is associated with cost reduction, when it is primarily a matter of managerial clarity. In this intervention of Frédéric Barbier on BSMART 4Change , one point seems central to me: 👉 outsourcing is not delegating blindly, it is giving yourself the means to act faster and better, with immediately operational skills. In the field of very small and small businesses, I see it every week as an outsourced CIO at 🟣 DSIACTIVE : The leader rarely lacks vision. It mai
Jan 271 min read


Yesterday, I had the honor of being invited by François DELASSUS to his swearing-in ceremony as a notary.
This invitation is a testament to the trust shown, for which I sincerely thank you. Partner and client through At Quantor Avocats - Notaires , François embodies values of rigor and high standards that I particularly appreciate in our professional exchanges. I wish him every success in this new chapter.
Jan 271 min read


GLPI11: Open-source ITSM that's shaking up the market 🚀
Three months after its release, GLPI 11 confirms its rise to power against proprietary solutions like ServiceNow or Jira Service Management, by focusing on flexibility, integration and transparency. What really changes: Custom assets: model all types of assets, not just IT Redesigned self-service portal + integrated forms to improve user experience Webhooks & OAuth2 API to automate and connect GLPI to other tools Enhanced security with two-factor authentication 💡 Why does th
Jan 221 min read


The generalization of the MFA to the Ministry of the Interior is essential. But at this scale, this type of project inevitably takes a long time.
And that is precisely where the subject becomes strategic. When an MFA deployment takes months, or even longer, the real question is no longer just how to secure it today, but what that security will be worth at the end of the project. Attackers, however, don't wait. MFA fatigue, targeted phishing, session hijacking: MFA is no longer an end in itself. In such a critical ministry, the approach must be visionary: to think now about the post-MFA era — authentication without pass
Jan 201 min read


Faced with increasingly demanding buyers, IT transparency has become a key factor in building trust during a sale. 🤝
During due diligence, cybersecurity vulnerabilities are no longer mere technical details: they are significant and immediate bargaining chips. For an executive, a "black box" infrastructure represents a major financial risk in negotiations. To address this, Andiris is strengthening its 360° Sale Audit by leveraging the expertise of Iparcus , penetration testing specialists. 🛡️ 🎯 Objectives: 🔍 Secure critical points before the buyer's audit 🏗️ Provide concrete eviden
Jan 131 min read


🛒 Sales & online sites: stay vigilant
Yesterday, my daughter wanted to buy something from a .eu website, which was very well rated… and very similar to a well-known .nl website. Digging a little deeper (verified external reviews), the reality was less flattering: complicated returns, non-existent customer service. Result: purchase avoided. Cybersecurity starts here: learning to step back from desire and emotion, especially among younger people. Check, compare, doubt… before clicking. Cybermalveillance.gouv.fr
Jan 131 min read
bottom of page