Latest news from our blog

Stay connected and don’t miss our news with our dedicated blog.

Tranquil IT is referenced to the UGAP

Tranquil IT is now referenced to the UGAP through the multi-publisher contract carried by SCC. Behind all these somewhat bureaucratic terms is very good news for those who want to buy the innovative products and services offered by Tranquil IT. What does that mean? In...

read more

Supervise, audit, react #CyberSecMonth

This is already the end of the 2018 edition of CyberSecMonth, we hope that you will continue to raise awareness and remain vigilant about the challenges of digital security. On our side, we would like to conclude our CyberAdvice by sharing with you a latest graphic...

read more

Active Directory for your IAM

At Tranquil IT, we are Samba Active Directory experts and systematically advise our clients on the implementation of an AD. Why is Active Directory your ally in everyday life? We will try to explain it to you. Managing the authentication of its users on its network is...

read more

Keep the information system up to date #CyberSecMonth

Although we are only a few days away from the end of the 2018 edition of CyberSecMonth, there is still time to learn and share best practices on digital security. This is our ambition with this new computer graphics on the maintenance of the information system. The...

read more

Manage nomandism #CyberSecMonth

CyberSecurity Month continues and we continue to share our computer graphics with you. Today our CyberAdvice will highlight the importance of managing nomadism, especially at the level of mobile terminals.Reduce the risks of nomadism through data protection The...

read more

Securing administration #CyberSecMonth

CyberSecMonth is coming to an end, we hope you have read a lot of relevant articles and interesting computer graphics. On our side, we still have a few CyberAdvice to share with you and we are counting on the most greedy of you to be present at our meetings (every...

read more

Securing the network (part 2) #CyberSecMonth

We conclude this third week of CyberSecMonth with the second and last part of our cyber advice on network security. Although we have already gone through half of the ANSSI hygiene guide, we still have many aspects of cybersecurity to discuss! First of all, let's...

read more

Securing the network (part 1) #CyberSecMonth

A week dedicated to network security We continue to distribute our #CyberConseils with a new topic: Network security. The ANSSI hygiene guide recommends 8 measures to secure its network, so it is a dense and complex subject. So, we preferred to cut it in two parts for...

read more

Securing workstations #CyberSecMonth

The news of this third week of CyberSecMonth will focus on the risks and good practices in cybersecurity, it is for us the opportunity to present you our fourth #CyberAdvice on the importance of securing an organization's computer workstations. Protect your computer...

read more

Authenticate and control access #CyberSecMonth

As the second thematic week of CyberSecMonth gradually ends, we continue to provide you with our CyberAdvice. We conclude this week, focused on the discovery of digital professions, with a computer graphics on the importance of authenticating and controlling access to...

read more