🌱 IT SYSTEMES is committed to CSR!
Cybersecurity
Infrastructure
License

"I'm afraid to install software"

In 1996, I took my first steps in computing on an Excel spreadsheet where I filed cheat codes for my favorite video games. 🕹️Le the beginning of a passion for office tools (to each his own 😅 ). There were 3,000 machines connected to the internet! 😶 But what happened next?

"I'm afraid to install software"

My computer adventures

Then the 56k and the noise of the memorable connection to make my first weapons on Counter Strike. 🎯
Weekend LANs with friends where you had to carry the pc and then the 10kg screen! 💪
An Alcatel OneTouch, then a 3310 to send sms without spaces 📱
CDs then Mp3 players, and then the only guy in Franche-Comté to have the Sony Minidisc (I wasn't always inspired 😅)
Hard disks to store 698MB movies in not crazy quality and crappy sound. (Generation emule 😇)
Already too much time on Caramail or Msn Messenger 😅

What about today?

Today smartphones more powerful than the computers that put men on the moon. 🧑‍🚀🌘
Video on demand from anywhere with Netflix, Prime Video & Amazon Studios, or BrutX 🔥
Music with Spotify or Deezer that follows us from bedroom to car to office without cutting. 🎶
Ultra-slim, life-changing screens. 🖥️

A job where you can free yourself from codes, 🙏
Simplified professional and private exchanges,
Robotics entering our lives, (Boston Dynamics I'm a fan if ever 🤖)
SpaceX rockets that are reusable 🚀
A telescope in space I'm waiting for the first pictures of! 📸

And tomorrow?

In February 2058 I don't know if we'll all be in the Metaverse, or Mesh, or whatever with crypto and NFTs. 🤔
But I'm convinced that trading will be even simpler, that we won't be wasting time on thankless tasks, that the 3-day week will be in place, and that I'll be in a fancy van with my cat 😺 in Ireland trading with my customers while doing what I like. 🥰

Or we'll be in Terminator, and that won't be as much fun. (All based on Boston Dynamics 😅)

Take a look at our article on work experience, to find out what can be implemented in your organization.

Author : Anthony

Our latest articles

Up arrow
Cybersecurity

Microsoft Sentinel: The Cloud SIEM that Costs a Fortune if You Don't Control Ingestion

Microsoft Sentinel is Microsoft's cloud-native SIEM (Security Information and Event Management), merged with SOAR (Security Orchestration, Automation and Response) and UEBA (User and Entity Behavior Analytics) capabilities. Launched in 2019 as Azure Sentinel, repositioned in 2024 within the Microsoft Defender portal, Sentinel collects, analyzes and correlates cloud-scale security logs to detect threats, intrusions and anomalous behavior. The sales pitch: "unlimited SIEM, cloud elasticity, integrated AI, simple per-GB pricing". The reality on the ground: unpredictable monthly bill that doubles in 3 months if ingestion is not mastered, steep KQL (Kusto Query Language) learning curve, and a pricing trap where verbose network logs can cost €15,000/month while their detection value is virtually nil. Between Splunk at 500k€/year (rigid licensing, cumbersome installation) and Sentinel sold as "flexible and economical", the choice seems obvious. But what Microsoft doesn't say: Sentinel becomes more expensive than Splunk beyond 500 GB/day of poorly optimized ingestion. This article exposes the true cost of Sentinel, compares it objectively with Splunk/QRadar, explains how to avoid the €50k/month bill, and above all calculates whether your organization really needs a SIEM or whether a centralized EDR + logs is enough (spoiler: 60% of SMBs don't need a SIEM).

Up arrow
Cybersecurity

Workstation Hardening: The Pragmatic Guide to Securing Windows Without Paralyzing Production

Endpoint hardening consists in reducing the attack surface of an operating system by disabling unnecessary services, reinforcing default configurations and applying strict security policies. On Windows 10/11, it's the difference between a machine compromised in 48 hours by opportunistic malware and an endpoint that resists targeted attacks for weeks, giving detection and response (EDR) time to do its job. The usual line: "Apply CIS Benchmarks Level 2 to all your endpoints, it's the norm". The reality on the ground: 847 parameters to configure manually, business applications that crash, users who scream because their printer no longer works, and an IT department that backs away from the scale of the task. Between the default Windows workstation (a security sieve) and the CIS Level 2 fortress (unusable without adaptations), there's an intelligent balance that nobody can explain to you. This article debunks the myths of hardening, exposes the real priorities (the 20% of configurations that eliminate 80% of risks), compares standards (CIS, ANSSI, Microsoft Security Baselines), presents tools that automate without breaking the bank (Intune, HardeningKitty, GPO), and above all calculates the real ROI. Because hardening 500 workstations manually costs 150 hours of system admin time, whereas an automated strategy takes 20 hours and lasts over time.

Up arrow
Cybersecurity

Azure Bastion: Secure RDP/SSH access without exposing your VMs (and without blowing your budget)

Azure Bastion is Microsoft's PaaS service that eliminates the need to expose your Azure virtual machines via public IPs for Remote Desktop (RDP) and Secure Shell (SSH) connections. Instead of leaving port 3389 or 22 open to the Internet - a favorite target of scan bots and bruteforce attacks - Bastion acts as a managed jump host that establishes TLS-encrypted sessions from the Azure portal or your native client. The marketing pitch: "Enhanced security without complexity, one-click connection". The reality: a service that costs €140/month in SKU Basic to protect VMs you use 2 hours a week, with frustrating limitations and cheaper but riskier alternatives. Between the classic self-hosted Bastion (complex, time-consuming), direct public IP (dangerous), and Azure Bastion (simple but expensive), the choice is never obvious. This article takes a look at Azure Bastion beyond the sales pitch: technical operation, real-life pricing with hidden pitfalls, objective comparison with alternatives (public IP, jump box, VPN), use cases where Bastion is a must-have vs. situations where it's a waste. Because securing access to your VMs shouldn't require a master's degree in network architecture, or drain your cloud budget.

Share :