{"id":1879,"date":"2026-02-20T10:13:32","date_gmt":"2026-02-20T09:13:32","guid":{"rendered":"http:\/\/asvxadw.cluster100.hosting.ovh.net\/?page_id=1879"},"modified":"2026-03-10T12:01:30","modified_gmt":"2026-03-10T11:01:30","slug":"technologies","status":"publish","type":"page","link":"https:\/\/www.komanche.fr\/eu\/technologies\/","title":{"rendered":"Technologies"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1879\" class=\"elementor elementor-1879\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f07e91f e-con-full e-flex e-con e-parent\" data-id=\"f07e91f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e02a5fd elementor-fixed elementor-widget elementor-widget-image\" data-id=\"e02a5fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;fixed&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"990\" height=\"1024\" src=\"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/02\/Droite-1-990x1024.png\" class=\"attachment-large size-large wp-image-1239\" alt=\"\" srcset=\"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/02\/Droite-1-990x1024.png 990w, https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/02\/Droite-1-290x300.png 290w, https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/02\/Droite-1-768x794.png 768w, https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/02\/Droite-1.png 1044w\" sizes=\"(max-width: 990px) 100vw, 990px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-de79ebc e-flex e-con-boxed e-con e-parent\" data-id=\"de79ebc\" data-element_type=\"container\" data-e-type=\"container\" id=\"technologie\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fee104f animated-slow elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"fee104f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">The Strength of a Powerful and Proven Technological Foundation<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b536633 animated-slow elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"b536633\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">The systems designed by Komanche are built on mastered technologies, structured around a <strong>proprietary software core<\/strong> and deployed through a <strong>chain of complementary expertise.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c8d20cb e-flex e-con-boxed e-con e-parent\" data-id=\"c8d20cb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7fd8b3d e-con-full e-flex e-con e-child\" data-id=\"7fd8b3d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d125fa7 elementor-widget elementor-widget-image\" data-id=\"d125fa7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/01\/logo-ksafe-1.png\" class=\"attachment-full size-full wp-image-382\" alt=\"\" srcset=\"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/01\/logo-ksafe-1.png 800w, https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/01\/logo-ksafe-1-300x225.png 300w, https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/01\/logo-ksafe-1-768x576.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2aecccf animated-slow elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"2aecccf\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">An <strong>intelligent<\/strong> surveillance platform<br \/>A <strong>dynamic<\/strong> VMS that informs and provides concrete guidance<br \/>A <strong>natively ultra-secure<\/strong> VMS that guarantees your protection<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d532ceb elementor-invisible elementor-widget elementor-widget-raven-icon\" data-id=\"d532ceb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"raven-icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"raven-icon-wrapper\">\n\t\t\t<div class=\"raven-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-caret-down\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eaa7fa1 elementor-widget elementor-widget-raven-advanced-accordion\" data-id=\"eaa7fa1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;scroll_to_content&quot;:&quot;false&quot;}\" data-widget_type=\"raven-advanced-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div id=\"jupiterx-advanced-accordion-wrapper\" class=\"jupiterx-advanced-accordion-wrapper\">\n\t\t\t\t<div class=\"jupiterx-advanced-accordion-inner-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-first  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">A Platform Designed as a Critical IT Application Layer<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p>K-Safe is designed to integrate fully into a critical information system architecture:<\/p><ul><li>Integration with existing server, network and IT policy infrastructure,<\/li><li>governance aligned with CIO\/CISO practices,<\/li><li>operations and maintenance aligned with IT application standards.<\/li><\/ul><p><em>Where conventional VMS solutions often operate in silos, K-Safe is designed to be administered, supervised and audited as a critical application within the information system.<\/em><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">Software Architecture and Deployment Oriented Towards Stability and Security<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><div><p><strong>K-Safe is built on a software architecture designed to meet high requirements for availability, resilience and security:<\/strong><\/p><\/div><div><ul><li>services deployed in Docker containers,<\/li><li>running on Windows Server Core,<\/li><li>physical or virtualised environments depending on the target architecture.<\/li><\/ul><p data-start=\"1950\" data-end=\"1973\">This approach enables:<\/p><ul><li>service isolation and dependency control,<\/li><li>reduced attack surface,<\/li><li>greater controllability of execution environments,<\/li><li>operations consistent with industrial IT practices.<\/li><\/ul><p data-start=\"2203\" data-end=\"2353\"><em>Where many VMS solutions remain dependent on heavy or poorly controlled environments, K-Safe adopts a modern, compartmentalised software approach.<\/em><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">Cybersecurity Integrated at the Application and Architectural Level<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p data-start=\"2426\" data-end=\"2492\"><strong>Cybersecurity is natively integrated into K-Safe at the application, architectural and operational levels. <\/strong><\/p><p data-start=\"2426\" data-end=\"2492\"><strong>The software notably includes:<\/strong><\/p><ul><li data-start=\"2573\" data-end=\"2623\">secured communications and video streams,<\/li><li data-start=\"2626\" data-end=\"2650\">data encryption,<\/li><li data-start=\"2653\" data-end=\"2708\">authentication and access control mechanisms,<\/li><li data-start=\"2711\" data-end=\"2738\">service compartmentalisation,<\/li><li data-start=\"2741\" data-end=\"2786\">event logging and traceability.<\/li><\/ul><p data-start=\"2788\" data-end=\"2992\"><em>K-Safe is designed to operate in environments subject to high security constraints, where traditional VMS solutions often rely on peripheral protections added after the fact.<\/em><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">VisioMind<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">K-Safe integrates VisioMind, an Intelligent Automatic Detection (IAD) module built directly into the core of the platform.<\/p><p data-start=\"3194\" data-end=\"3212\">VisioMind enables:<\/p><ul><li data-start=\"3215\" data-end=\"3254\">real-time video stream analysis,<\/li><li data-start=\"3257\" data-end=\"3329\">detection of predefined situations, events or behaviours,<\/li><li data-start=\"3332\" data-end=\"3385\">generation of actionable events and alerts,<\/li><li data-start=\"3388\" data-end=\"3432\">post-event search and traceability.<\/li><\/ul><p data-start=\"3434\" data-end=\"3613\"><em>This intelligence is designed as an operational function, aimed at transforming video streams into qualified information, not merely as an analytical overlay.<\/em><\/p><p data-start=\"3615\" data-end=\"3725\"><em>Where traditional VMS solutions are limited to \"showing\", K-Safe enables detection, qualification and exploitation.<\/em><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">Controlled Intelligence, at the Service of Operations<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p data-start=\"3794\" data-end=\"3900\"><strong>The intelligence integrated into K-Safe is designed as a support tool for operations and human decision-making:<\/strong><\/p><ul><li data-start=\"3904\" data-end=\"3938\">reduction of information noise,<\/li><li data-start=\"3941\" data-end=\"3969\">event prioritisation,<\/li><li class=\"whitespace-normal break-words pl-2\">improved operational responsiveness,<\/li><li data-start=\"4020\" data-end=\"4059\">facilitated post-event analysis.<\/li><\/ul><p data-start=\"4061\" data-end=\"4220\"><em>K-Safe does not aim for blind automation, but for operational control in complex environments where human responsibility remains central.<\/em><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-last  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">Interoperability, Integration and Scalability<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p data-start=\"4277\" data-end=\"4505\"><strong>K-Safe is designed to operate in heterogeneous, multi-vendor environments.<\/strong><\/p><p data-start=\"4277\" data-end=\"4505\">The architecture prepares the conditions for controlled integration by partners, while preserving system scalability.<\/p><p data-start=\"4507\" data-end=\"4530\">This approach enables:<\/p><ul><li data-start=\"4533\" data-end=\"4587\">avoidance of vendor lock-in,<\/li><li data-start=\"4590\" data-end=\"4644\">architectural evolution without full redesign,<\/li><li data-start=\"4647\" data-end=\"4697\">long-term investment sustainability.<\/li><\/ul><p data-start=\"4699\" data-end=\"4800\"><em>Where some VMS solutions impose their own ecosystem, K-Safe prioritises controlled interoperability.<\/em><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5709067 elementor-widget elementor-widget-text-editor\" data-id=\"5709067\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Komanche publishes the K-Safe VMS, designed as a centralised supervisor structuring the unified and scalable management of security systems. The software natively integrates VisioMind AI (Intelligent Automatic Detection), designed to qualify, analyse and leverage video and event streams.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54618c3 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"54618c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\"><strong>The Power of Assisted Monitoring<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bfe0b9f elementor-widget elementor-widget-image\" data-id=\"bfe0b9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"588\" src=\"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-29-a-13.59.07-scaled-1-1024x588.png\" class=\"attachment-large size-large wp-image-840\" alt=\"\" srcset=\"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-29-a-13.59.07-scaled-1-1024x588.png 1024w, https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-29-a-13.59.07-scaled-1-300x172.png 300w, https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-29-a-13.59.07-scaled-1-768x441.png 768w, https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-29-a-13.59.07-scaled-1-1536x881.png 1536w, https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-29-a-13.59.07-scaled-1-2048x1175.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68cfbb2 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"68cfbb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\"><strong>Natively cyber-secured architectures for operational control centres<\/strong><\/p><p data-pm-slice=\"1 1 []\">Supervision natively compliant with NIS2 and ANSSI frameworks<\/p><p data-pm-slice=\"1 1 []\"><strong>Solutions designed to perform where failure is not an option<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e1bb5e elementor-align-center elementor-widget elementor-widget-button\" data-id=\"8e1bb5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Demo? Trial? Contact us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4dc8c0a e-flex e-con-boxed e-con e-parent\" data-id=\"4dc8c0a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f3e741a elementor-widget elementor-widget-text-editor\" data-id=\"f3e741a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Publisher, systems and integration architect, digital security expert, technical reference \u2014 <strong>Komanche commands the entire value chain and ensures the conditions for coherent, secure and sustainable security systems.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e92d4d4 e-grid e-con-boxed e-con e-parent\" data-id=\"e92d4d4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;tilt&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M0,6V0h1000v100L0,6z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-98eb996 e-con-full e-flex e-con e-child\" data-id=\"98eb996\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b9582fb elementor-widget elementor-widget-text-editor\" data-id=\"b9582fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Publisher<br \/><em>VMS<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7a6676 elementor-widget elementor-widget-image\" data-id=\"c7a6676\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/01\/logo-ksafe-1.png\" class=\"attachment-full size-full wp-image-382\" alt=\"\" srcset=\"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/01\/logo-ksafe-1.png 800w, https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/01\/logo-ksafe-1-300x225.png 300w, https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/01\/logo-ksafe-1-768x576.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba21858 elementor-widget elementor-widget-text-editor\" data-id=\"ba21858\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>An intelligent and cyber-secured surveillance platform (ISMS)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0b4bea elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c0b4bea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cbb434 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"5cbb434\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>K-Safe forms the core software foundation of the security systems developed by Komanche.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aa0f8f0 e-con-full e-flex e-con e-child\" data-id=\"aa0f8f0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-82a97d4 elementor-widget elementor-widget-text-editor\" data-id=\"82a97d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Architect<br \/><em>Integrator<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebc310b elementor-widget elementor-widget-raven-icon\" data-id=\"ebc310b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"raven-icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"raven-icon-wrapper\">\n\t\t\t<div class=\"raven-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-archway\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M560 448h-16V96H32v352H16.02c-8.84 0-16 7.16-16 16v32c0 8.84 7.16 16 16 16H176c8.84 0 16-7.16 16-16V320c0-53.02 42.98-96 96-96s96 42.98 96 96l.02 160v16c0 8.84 7.16 16 16 16H560c8.84 0 16-7.16 16-16v-32c0-8.84-7.16-16-16-16zm0-448H16C7.16 0 0 7.16 0 16v32c0 8.84 7.16 16 16 16h544c8.84 0 16-7.16 16-16V16c0-8.84-7.16-16-16-16z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-220c595 elementor-widget elementor-widget-text-editor\" data-id=\"220c595\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1678\" data-end=\"1774\">Security architectures designed as critical information systems<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6934bfe elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6934bfe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8bd00c7 elementor-widget elementor-widget-text-editor\" data-id=\"8bd00c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2273\" data-end=\"2339\">Architecture and integration quality guarantee the system&rsquo;s coherence, resilience and longevity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b73298d e-con-full e-flex e-con e-child\" data-id=\"b73298d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f84f3a elementor-widget elementor-widget-text-editor\" data-id=\"5f84f3a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2381\" data-end=\"2395\">Cybersecurity<em><br \/><\/em><em>Expert<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e8c233 elementor-widget elementor-widget-raven-icon\" data-id=\"4e8c233\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"raven-icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"raven-icon-wrapper\">\n\t\t\t<div class=\"raven-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-lock\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M400 224h-24v-72C376 68.2 307.8 0 224 0S72 68.2 72 152v72H48c-26.5 0-48 21.5-48 48v192c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V272c0-26.5-21.5-48-48-48zm-104 0H152v-72c0-39.7 32.3-72 72-72s72 32.3 72 72v72z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-907da9c elementor-widget elementor-widget-text-editor\" data-id=\"907da9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2103\" data-end=\"2175\">Cybersecurity natively integrated into software and architecture<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-395f63b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"395f63b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23f46d9 elementor-widget elementor-widget-text-editor\" data-id=\"23f46d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2883\" data-end=\"2950\">High-level digital security is an intrinsic property of the system.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bf2c4d3 e-con-full e-flex e-con e-child\" data-id=\"bf2c4d3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e9b71ba elementor-widget elementor-widget-text-editor\" data-id=\"e9b71ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2381\" data-end=\"2395\">Integrator<br \/><em>Installer<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-689f2d7 elementor-widget elementor-widget-raven-icon\" data-id=\"689f2d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"raven-icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"raven-icon-wrapper\">\n\t\t\t<div class=\"raven-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-network-wired\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M640 264v-16c0-8.84-7.16-16-16-16H344v-40h72c17.67 0 32-14.33 32-32V32c0-17.67-14.33-32-32-32H224c-17.67 0-32 14.33-32 32v128c0 17.67 14.33 32 32 32h72v40H16c-8.84 0-16 7.16-16 16v16c0 8.84 7.16 16 16 16h104v40H64c-17.67 0-32 14.33-32 32v128c0 17.67 14.33 32 32 32h160c17.67 0 32-14.33 32-32V352c0-17.67-14.33-32-32-32h-56v-40h304v40h-56c-17.67 0-32 14.33-32 32v128c0 17.67 14.33 32 32 32h160c17.67 0 32-14.33 32-32V352c0-17.67-14.33-32-32-32h-56v-40h104c8.84 0 16-7.16 16-16zM256 128V64h128v64H256zm-64 320H96v-64h96v64zm352 0h-96v-64h96v64z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f25300 elementor-widget elementor-widget-text-editor\" data-id=\"7f25300\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3031\" data-end=\"3109\">Systems designed for controlled and sustainable integration<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9bf97d9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"9bf97d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cea167d elementor-widget elementor-widget-text-editor\" data-id=\"cea167d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2883\" data-end=\"2950\">Installation is designed upstream, then carried out by recognised, certified partners.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b83fc7c e-con-full e-flex e-con e-child\" data-id=\"b83fc7c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7fb0d9 elementor-widget elementor-widget-text-editor\" data-id=\"c7fb0d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3728\" data-end=\"3750\">Technical<br \/>Reference<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a70584 elementor-widget elementor-widget-raven-icon\" data-id=\"7a70584\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"raven-icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"raven-icon-wrapper\">\n\t\t\t<div class=\"raven-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-signature\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M218.17 424.14c-2.95-5.92-8.09-6.52-10.17-6.52s-7.22.59-10.02 6.19l-7.67 15.34c-6.37 12.78-25.03 11.37-29.48-2.09L144 386.59l-10.61 31.88c-5.89 17.66-22.38 29.53-41 29.53H80c-8.84 0-16-7.16-16-16s7.16-16 16-16h12.39c4.83 0 9.11-3.08 10.64-7.66l18.19-54.64c3.3-9.81 12.44-16.41 22.78-16.41s19.48 6.59 22.77 16.41l13.88 41.64c19.75-16.19 54.06-9.7 66 14.16 1.89 3.78 5.49 5.95 9.36 6.26v-82.12l128-127.09V160H248c-13.2 0-24-10.8-24-24V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24v-40l-128-.11c-16.12-.31-30.58-9.28-37.83-23.75zM384 121.9c0-6.3-2.5-12.4-7-16.9L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1zm-96 225.06V416h68.99l161.68-162.78-67.88-67.88L288 346.96zm280.54-179.63l-31.87-31.87c-9.94-9.94-26.07-9.94-36.01 0l-27.25 27.25 67.88 67.88 27.25-27.25c9.95-9.94 9.95-26.07 0-36.01z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-122642c elementor-widget elementor-widget-text-editor\" data-id=\"122642c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3031\" data-end=\"3109\">Systems embedded within demanding technical and institutional frameworks<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-584c2ea elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"584c2ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7ee0ae elementor-widget elementor-widget-text-editor\" data-id=\"f7ee0ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"4284\" data-end=\"4357\">Technical and institutional frameworks form the trust and legitimacy foundation of Komanche systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fae6c71 e-flex e-con-boxed e-con e-parent\" data-id=\"fae6c71\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-09c58ed elementor-widget elementor-widget-text-editor\" data-id=\"09c58ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>You are guaranteed an integrated and reliable system<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60c776e elementor-align-center elementor-widget elementor-widget-button\" data-id=\"60c776e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.komanche.fr\/eu\/\/eu\/\/showroom\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Discover our showroom<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Strength of a Powerful and Proven Technological Foundation The systems designed by Komanche are built on mastered technologies, structured around a proprietary software core and deployed through a chain of complementary expertise. An intelligent surveillance platformA dynamic VMS that informs and provides concrete guidanceA natively ultra-secure VMS that guarantees your protection A Platform Designed [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1879","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Technologies - Komanche<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.komanche.fr\/eu\/technologies\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Technologies - Komanche\" \/>\n<meta property=\"og:description\" content=\"The Strength of a Powerful and Proven Technological Foundation The systems designed by Komanche are built on mastered technologies, structured around a proprietary software core and deployed through a chain of complementary expertise. An intelligent surveillance platformA dynamic VMS that informs and provides concrete guidanceA natively ultra-secure VMS that guarantees your protection A Platform Designed [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.komanche.fr\/eu\/technologies\/\" \/>\n<meta property=\"og:site_name\" content=\"Komanche\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-10T11:01:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/02\/Droite-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1044\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.komanche.fr\/eu\/technologies\/\",\"url\":\"https:\/\/www.komanche.fr\/eu\/technologies\/\",\"name\":\"Technologies - Komanche\",\"isPartOf\":{\"@id\":\"https:\/\/www.komanche.fr\/eu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.komanche.fr\/eu\/technologies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.komanche.fr\/eu\/technologies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/02\/Droite-1-990x1024.png\",\"datePublished\":\"2026-02-20T09:13:32+00:00\",\"dateModified\":\"2026-03-10T11:01:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.komanche.fr\/eu\/technologies\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.komanche.fr\/eu\/technologies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.komanche.fr\/eu\/technologies\/#primaryimage\",\"url\":\"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/02\/Droite-1.png\",\"contentUrl\":\"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/02\/Droite-1.png\",\"width\":1044,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.komanche.fr\/eu\/technologies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.komanche.fr\/eu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Technologies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.komanche.fr\/eu\/#website\",\"url\":\"https:\/\/www.komanche.fr\/eu\/\",\"name\":\"Komanche\",\"description\":\"Concepteur de syst\u00e8mes de s\u00fbret\u00e9 complexes, Souverains, intelligents et r\u00e9silients, con\u00e7us pour des environnements contraints.\",\"publisher\":{\"@id\":\"https:\/\/www.komanche.fr\/eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.komanche.fr\/eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.komanche.fr\/eu\/#organization\",\"name\":\"Komanche\",\"url\":\"https:\/\/www.komanche.fr\/eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.komanche.fr\/eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/03\/Komanche-logo-1300-1.png\",\"contentUrl\":\"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/03\/Komanche-logo-1300-1.png\",\"width\":1300,\"height\":774,\"caption\":\"Komanche\"},\"image\":{\"@id\":\"https:\/\/www.komanche.fr\/eu\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Technologies - Komanche","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.komanche.fr\/eu\/technologies\/","og_locale":"fr_FR","og_type":"article","og_title":"Technologies - Komanche","og_description":"The Strength of a Powerful and Proven Technological Foundation The systems designed by Komanche are built on mastered technologies, structured around a proprietary software core and deployed through a chain of complementary expertise. An intelligent surveillance platformA dynamic VMS that informs and provides concrete guidanceA natively ultra-secure VMS that guarantees your protection A Platform Designed [&hellip;]","og_url":"https:\/\/www.komanche.fr\/eu\/technologies\/","og_site_name":"Komanche","article_modified_time":"2026-03-10T11:01:30+00:00","og_image":[{"width":1044,"height":1080,"url":"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/02\/Droite-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.komanche.fr\/eu\/technologies\/","url":"https:\/\/www.komanche.fr\/eu\/technologies\/","name":"Technologies - Komanche","isPartOf":{"@id":"https:\/\/www.komanche.fr\/eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.komanche.fr\/eu\/technologies\/#primaryimage"},"image":{"@id":"https:\/\/www.komanche.fr\/eu\/technologies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/02\/Droite-1-990x1024.png","datePublished":"2026-02-20T09:13:32+00:00","dateModified":"2026-03-10T11:01:30+00:00","breadcrumb":{"@id":"https:\/\/www.komanche.fr\/eu\/technologies\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.komanche.fr\/eu\/technologies\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.komanche.fr\/eu\/technologies\/#primaryimage","url":"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/02\/Droite-1.png","contentUrl":"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/02\/Droite-1.png","width":1044,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.komanche.fr\/eu\/technologies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.komanche.fr\/eu\/"},{"@type":"ListItem","position":2,"name":"Technologies"}]},{"@type":"WebSite","@id":"https:\/\/www.komanche.fr\/eu\/#website","url":"https:\/\/www.komanche.fr\/eu\/","name":"Komanche","description":"Concepteur de syst\u00e8mes de s\u00fbret\u00e9 complexes, Souverains, intelligents et r\u00e9silients, con\u00e7us pour des environnements contraints.","publisher":{"@id":"https:\/\/www.komanche.fr\/eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.komanche.fr\/eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.komanche.fr\/eu\/#organization","name":"Komanche","url":"https:\/\/www.komanche.fr\/eu\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.komanche.fr\/eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/03\/Komanche-logo-1300-1.png","contentUrl":"https:\/\/www.komanche.fr\/eu\/wp-content\/uploads\/2026\/03\/Komanche-logo-1300-1.png","width":1300,"height":774,"caption":"Komanche"},"image":{"@id":"https:\/\/www.komanche.fr\/eu\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.komanche.fr\/eu\/wp-json\/wp\/v2\/pages\/1879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.komanche.fr\/eu\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.komanche.fr\/eu\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.komanche.fr\/eu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.komanche.fr\/eu\/wp-json\/wp\/v2\/comments?post=1879"}],"version-history":[{"count":10,"href":"https:\/\/www.komanche.fr\/eu\/wp-json\/wp\/v2\/pages\/1879\/revisions"}],"predecessor-version":[{"id":3019,"href":"https:\/\/www.komanche.fr\/eu\/wp-json\/wp\/v2\/pages\/1879\/revisions\/3019"}],"wp:attachment":[{"href":"https:\/\/www.komanche.fr\/eu\/wp-json\/wp\/v2\/media?parent=1879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}