{"id":16298,"date":"2014-11-04T14:00:09","date_gmt":"2014-11-04T13:00:09","guid":{"rendered":"http:\/\/visionarymarketing.fr\/blog?p=16298&#038;preview_id=16298"},"modified":"2023-02-01T15:03:39","modified_gmt":"2023-02-01T14:03:39","slug":"securite-informatique-cloud-computing-il-menace-opportunite","status":"publish","type":"post","link":"https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/","title":{"rendered":"S\u00e9curit\u00e9 : le cloud computing, menace ou une opportunit\u00e9 ?"},"content":{"rendered":"<p><em><a title=\"Orange Business Services\" href=\"http:\/\/www.orange-business.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Orange Business Services<\/a> poursuit sa s\u00e9rie de Webinaires, avec cette s\u00e9ance particuli\u00e8rement int\u00e9ressante (qui aura lieu sur le\u00a0site Webikeo\u00a0le 12 novembre de 14 heures \u00e0 15 heures) sur le sujet de la s\u00e9curit\u00e9 informatique dans le <a title=\"Cloud Computing\" href=\"https:\/\/web.archive.org\/web\/20181014061844\/http:\/\/www.wikinvest.com:80\/concept\/Cloud_Computing\" target=\"_blank\" rel=\"wikinvest noopener noreferrer\">Cloud Computing<\/a>. La s\u00e9curit\u00e9 dans le Cloud Computing fait l&rsquo;objet de tous les fantasmes : vol de donn\u00e9es, phishing, r\u00e9cup\u00e9ration de fichiers entiers de carte bleue\u2026<\/em><\/p>\n<h2>La s\u00e9curit\u00e9 dans le cloud : mythes et r\u00e9alit\u00e9<\/h2>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-73790\" src=\"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/11\/ygourven-a-thief-with-a-black-balaclava-walks-on-tiptoe-across-93c14549-f940-46dc-9203-c770e4aa35f1.png\" alt=\"\" width=\"768\" height=\"512\" \/><\/p>\n<p><span style=\"font-size: 16px;\">Les scandales ne manquent pas sur Internet,\u00a0relay\u00e9s avec force par les m\u00e9dias.<\/span>Il y a un bruit \u00e9norme existe sur les r\u00e9seaux quant \u00e0 perte de confidentialit\u00e9 des donn\u00e9es et la soi-disant fragilit\u00e9 du cloud computing.<!--more--><\/p>\n<p>En m\u00eame temps, les usages des utilisateurs s&rsquo;orientent de plus en plus vers l&rsquo;ouverture et le partage. Alors qui croire ?<\/p>\n<p>Et surtout, peut-on confier ses donn\u00e9es \u00e0 nuage public ou priv\u00e9, sans risquer de perdre ses pr\u00e9cieuses informations, surtout lorsqu&rsquo;on est DSI et \u00a0responsable des donn\u00e9es de l\u2019entreprise.<\/p>\n<p>Enfin et surtout, soyons un peu provocateurs,\u00a0et\u00a0si le cloud computing au lieu d\u2019une menace pour les entreprises\u00a0\u00e9tait la solution \u00e0 la cybercriminalit\u00e9 ?<\/p>\n<figure style=\"width: 575px\" class=\"wp-caption alignright\"><img decoding=\"async\" src=\"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/10\/Screenshot_180.png\" alt=\"s\u00e9curit\u00e9 informatique\" width=\"575\" height=\"292\" data-cke-saved-src=\"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/10\/Screenshot_180.png\" \/><figcaption class=\"wp-caption-text\">image Balboa Capital via <a href=\"http:\/\/gestionpaiegrhquichoisir.com\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/gestionpaiegrhquichoisir.com<\/a> :\u00a0le cloud computing est souvent cit\u00e9 non pas comme un risque, mais comme une solution aux probl\u00e8mes de s\u00e9curit\u00e9<\/figcaption><\/figure>\n<p>Au d\u00e9part il y a la\u00a0menace, et aussi la peur qui est dans tous les esprits, attis\u00e9e par les m\u00e9dias et les incidents de s\u00e9curit\u00e9 qui jalonnent notre quotidien :\u00a0vols de donn\u00e9es sur les sites e-commerce, explosion du\u00a0\u201cphishing\u201d, augmentation exponentielle des\u00a0d\u00e9nis de service, et m\u00eame un nouveau concept,\u00a0le \u00ab\u00a0ransomware\u00a0\u00bb.<\/p>\n<p>Tout ceci ne touche plus seulement\u00a0les particuliers mais aussi les entreprises.<\/p>\n<p>Or, cette acc\u00e9l\u00e9ration de la cyber ins\u00e9curit\u00e9 est concomitante de l&rsquo;utilisation accrue du cloud par\u00a0les entreprises, que ce soit au travers du\u00a0<a class=\"zem_slink\" title=\"Software as a Service\" href=\"https:\/\/web.archive.org\/web\/20181013033137\/http:\/\/www.wikinvest.com:80\/concept\/Software_as_a_Service\" target=\"_blank\" rel=\"wikinvest noopener noreferrer\">SaaS<\/a> ou des projets d&rsquo;externalisation dans le cloud (IaaS\/PaaS).<\/p>\n<p>Doit-on en conclure que recourir au\u00a0cloud signifie que vos donn\u00e9es sont plus en danger ? La r\u00e9alit\u00e9 est contre-intuitive : <a class=\"zem_slink\" title=\"Externalization\" href=\"https:\/\/en.wikipedia.org\/wiki\/Externalization\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">externaliser<\/a> dans le cloud c&rsquo;est au contraire faire confiance \u00e0 des professionnels pour obtenir, en retour, plus de s\u00e9curit\u00e9.<\/p>\n<p>Comme dans cet exemple d\u2019une entreprise bretonne qui a br\u00fbl\u00e9 et qui, dans son incendie, a perdu l\u2019ensemble de ses donn\u00e9es ; au point finalement de dispara\u00eetre. L\u2019externalisation de son informatique lui aurait permis de d\u00e9clencher un plan de reprise d\u2019activit\u00e9 et de se relancer ailleurs.<\/p>\n<p>Mais pour en arriver l\u00e0, il faut avant tout s\u00e9curiser le cloud : nous verrons donc ici avec des professionnels de ce m\u00e9tier pourquoi et comment le cloud peut \u00eatre s\u00e9curis\u00e9 et pourquoi vous pouvez faire leur confiance pour h\u00e9berger votre informatique.<\/p>\n<h4>A qui s&rsquo;adresse ce webinaire ?<\/h4>\n<p>A tous les responsables d&rsquo;infrastructure, les DSI, <a class=\"zem_slink\" title=\"Received signal strength indication\" href=\"https:\/\/en.wikipedia.org\/wiki\/Received_signal_strength_indication\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">RSSI<\/a>,\u00a0responsables des syst\u00e8mes d&rsquo;informations, ou responsables informatiques des petites, moyennes ou grandes entreprises fran\u00e7aises. Ce webinaire peut \u00e9galement int\u00e9resser tous les professionnels qui sont concern\u00e9s par les probl\u00e9matiques de s\u00e9curit\u00e9 des donn\u00e9es et des traitements,\u00a0dans l&rsquo;entreprise et dans le cloud, qu&rsquo;ils soient informaticiens ou utilisateurs.<\/p>\n<p><strong>Programme du Webinaire sur la s\u00e9curit\u00e9 informatique dans le cloud computing par Orange Business Services\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/09\/yann-gourvennec-015-netb.png\"><img decoding=\"async\" class=\"alignleft wp-image-15874\" src=\"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/09\/yann-gourvennec-015-netb.png\" alt=\"yann-gourvennec-015-netb\" width=\"50\" height=\"50\" srcset=\"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/09\/yann-gourvennec-015-netb.png 150w, https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/09\/yann-gourvennec-015-netb-50x50.png 50w, https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/09\/yann-gourvennec-015-netb-125x125.png 125w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/><\/a>&gt;\u00a0<strong>Introduction : la s\u00e9curit\u00e9 des donn\u00e9es \u00e0 l&rsquo;\u00e8re du cloud computing<\/strong><br \/>\npar Yann Gourvennec, Visionary Marketing<\/p>\n<p><a href=\"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/10\/olivier-perrault-orange-cloud-for-business.jpg\"><img decoding=\"async\" class=\"alignleft wp-image-16141\" src=\"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/10\/olivier-perrault-orange-cloud-for-business-150x150.jpg\" alt=\"olivier-perrault-orange-cloud-for-business\" width=\"50\" height=\"50\" srcset=\"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/10\/olivier-perrault-orange-cloud-for-business-150x150.jpg 150w, https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/10\/olivier-perrault-orange-cloud-for-business-300x300.jpg 300w, https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/10\/olivier-perrault-orange-cloud-for-business-50x50.jpg 50w, https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/10\/olivier-perrault-orange-cloud-for-business-125x125.jpg 125w, https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/10\/olivier-perrault-orange-cloud-for-business.jpg 392w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/><\/a>&gt;\u00a0<strong>Les enjeux de s\u00e9curit\u00e9 des donn\u00e9es dans le cloud pour les entreprises <\/strong><strong>: comment prot\u00e9ger ses donn\u00e9es et celles de son entreprise sur le cloud computing<\/strong><br \/>\npar Olivier Perrault,\u00a0<a class=\"zem_slink\" title=\"Chief security officer\" href=\"https:\/\/en.wikipedia.org\/wiki\/Chief_security_officer\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Chief Security Officer<\/a> (<a class=\"zem_slink\" title=\"Czech Space Office\" href=\"https:\/\/en.wikipedia.org\/wiki\/Czech_Space_Office\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">CSO<\/a>) pour Orange Cloud for Business<\/p>\n<p><a href=\"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/09\/marc-balleydier-openbee.png\"><img decoding=\"async\" class=\"alignleft wp-image-15881\" src=\"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/09\/marc-balleydier-openbee.png\" alt=\"marc-balleydier-openbee\" width=\"50\" height=\"45\" \/><\/a>&gt;\u00a0<strong>Comment s\u00e9curiser ses logiciels SaaS\u00a0dans le cloud computing<\/strong><br \/>\npar Marc Balleydier, PDG Open Bee,\u00a0\u00e9diteur de logiciel dans le cloud, leader fran\u00e7ais de la <a class=\"zem_slink\" title=\"General Educational Development\" href=\"https:\/\/en.wikipedia.org\/wiki\/General_Educational_Development\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">GED<\/a> et de la d\u00e9mat\u00e9rialisation de documents<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Orange Business Services poursuit sa s\u00e9rie de Webinaires, avec cette s\u00e9ance particuli\u00e8rement int\u00e9ressante (qui aura lieu sur le\u00a0site Webikeo\u00a0le 12 novembre de 14 heures \u00e0 15 heures) sur le sujet de la s\u00e9curit\u00e9 informatique dans le Cloud Computing. La s\u00e9curit\u00e9 dans le Cloud Computing fait l&rsquo;objet de tous les fantasmes : vol de donn\u00e9es, phishing, &hellip;<\/p>\n","protected":false},"author":2,"featured_media":73790,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[134],"tags":[],"class_list":["post-16298","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-economie"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curit\u00e9 cloud : le cloud computing, menace ou une opportunit\u00e9 ?<\/title>\n<meta name=\"description\" content=\"Le cloud computing est souvent pr\u00e9sent\u00e9 comme une menace pour la s\u00e9curit\u00e9 informatique. Qu&#039;en est-il vraiment ? Et si c&#039;\u00e9tait l&#039;inverse ... ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 cloud : le cloud computing, menace ou une opportunit\u00e9 ?\" \/>\n<meta property=\"og:description\" content=\"Le cloud computing est souvent pr\u00e9sent\u00e9 comme une menace pour la s\u00e9curit\u00e9 informatique. Qu&#039;en est-il vraiment ? Et si c&#039;\u00e9tait l&#039;inverse ... ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/\" \/>\n<meta property=\"og:site_name\" content=\"Marketing and Innovation\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/vismktg\" \/>\n<meta property=\"article:author\" content=\"http:\/\/facebook.com\/ygourven\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-04T13:00:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-01T14:03:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/11\/ygourven-a-thief-with-a-black-balaclava-walks-on-tiptoe-across-93c14549-f940-46dc-9203-c770e4aa35f1-e1675260258434.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"347\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Yann Gourvennec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ygourven\" \/>\n<meta name=\"twitter:site\" content=\"@ygourven\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yann Gourvennec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/2014\\\/11\\\/04\\\/securite-informatique-cloud-computing-il-menace-opportunite\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/2014\\\/11\\\/04\\\/securite-informatique-cloud-computing-il-menace-opportunite\\\/\"},\"author\":{\"name\":\"Yann Gourvennec\",\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/#\\\/schema\\\/person\\\/3754fee1e558f47b8deb46f53c37423e\"},\"headline\":\"S\u00e9curit\u00e9 : le cloud computing, menace ou une opportunit\u00e9 ?\",\"datePublished\":\"2014-11-04T13:00:09+00:00\",\"dateModified\":\"2023-02-01T14:03:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/2014\\\/11\\\/04\\\/securite-informatique-cloud-computing-il-menace-opportunite\\\/\"},\"wordCount\":675,\"commentCount\":11,\"image\":{\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/2014\\\/11\\\/04\\\/securite-informatique-cloud-computing-il-menace-opportunite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/visionarymarketing.com\\\/wp-content\\\/uploads\\\/2014\\\/11\\\/ygourven-a-thief-with-a-black-balaclava-walks-on-tiptoe-across-93c14549-f940-46dc-9203-c770e4aa35f1-e1675260258434.jpg\",\"articleSection\":[\"\u00e9conomie et num\u00e9rique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/2014\\\/11\\\/04\\\/securite-informatique-cloud-computing-il-menace-opportunite\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/2014\\\/11\\\/04\\\/securite-informatique-cloud-computing-il-menace-opportunite\\\/\",\"url\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/2014\\\/11\\\/04\\\/securite-informatique-cloud-computing-il-menace-opportunite\\\/\",\"name\":\"S\u00e9curit\u00e9 cloud : le cloud computing, menace ou une opportunit\u00e9 ?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/2014\\\/11\\\/04\\\/securite-informatique-cloud-computing-il-menace-opportunite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/2014\\\/11\\\/04\\\/securite-informatique-cloud-computing-il-menace-opportunite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/visionarymarketing.com\\\/wp-content\\\/uploads\\\/2014\\\/11\\\/ygourven-a-thief-with-a-black-balaclava-walks-on-tiptoe-across-93c14549-f940-46dc-9203-c770e4aa35f1-e1675260258434.jpg\",\"datePublished\":\"2014-11-04T13:00:09+00:00\",\"dateModified\":\"2023-02-01T14:03:39+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/#\\\/schema\\\/person\\\/3754fee1e558f47b8deb46f53c37423e\"},\"description\":\"Le cloud computing est souvent pr\u00e9sent\u00e9 comme une menace pour la s\u00e9curit\u00e9 informatique. Qu'en est-il vraiment ? Et si c'\u00e9tait l'inverse ... ?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/2014\\\/11\\\/04\\\/securite-informatique-cloud-computing-il-menace-opportunite\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/2014\\\/11\\\/04\\\/securite-informatique-cloud-computing-il-menace-opportunite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/2014\\\/11\\\/04\\\/securite-informatique-cloud-computing-il-menace-opportunite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/visionarymarketing.com\\\/wp-content\\\/uploads\\\/2014\\\/11\\\/ygourven-a-thief-with-a-black-balaclava-walks-on-tiptoe-across-93c14549-f940-46dc-9203-c770e4aa35f1-e1675260258434.jpg\",\"contentUrl\":\"https:\\\/\\\/visionarymarketing.com\\\/wp-content\\\/uploads\\\/2014\\\/11\\\/ygourven-a-thief-with-a-black-balaclava-walks-on-tiptoe-across-93c14549-f940-46dc-9203-c770e4aa35f1-e1675260258434.jpg\",\"width\":521,\"height\":347},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/2014\\\/11\\\/04\\\/securite-informatique-cloud-computing-il-menace-opportunite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 : le cloud computing, menace ou une opportunit\u00e9 ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/\",\"name\":\"Marketing and Innovation\",\"description\":\"Site d&#039;infos ind\u00e9pendant, depuis 1996\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/#\\\/schema\\\/person\\\/3754fee1e558f47b8deb46f53c37423e\",\"name\":\"Yann Gourvennec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5972001801e8de5692a3e31224e85769f50a55fb8b679749f9c8d1868cceff14?s=96&d=initials&r=g&initials=yg\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5972001801e8de5692a3e31224e85769f50a55fb8b679749f9c8d1868cceff14?s=96&d=initials&r=g&initials=yg\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5972001801e8de5692a3e31224e85769f50a55fb8b679749f9c8d1868cceff14?s=96&d=initials&r=g&initials=yg\",\"caption\":\"Yann Gourvennec\"},\"description\":\"Yann Gourvennec created visionarymarketing.com in 1996. He is a speaker and author of many books. In 2014 he went from intrapreneur to entrepreneur, when he created his digital marketing agency. Yann Gourvennec a cr\u00e9\u00e9 visionarymarketing.com en 1996. Il est conf\u00e9rencier et auteur de plusieurs livres. En 2014, il est pass\u00e9 d'intrapreneur \u00e0 entrepreneur en cr\u00e9ant son agence de marketing num\u00e9rique.\",\"sameAs\":[\"https:\\\/\\\/visionarymarketing.com\",\"http:\\\/\\\/facebook.com\\\/ygourven\",\"http:\\\/\\\/linkedin.com\\\/in\\\/ygourven\",\"https:\\\/\\\/x.com\\\/ygourven\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/visionarymarketingagency\"],\"url\":\"https:\\\/\\\/visionarymarketing.com\\\/fr\\\/author\\\/yann-gourvennec\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 cloud : le cloud computing, menace ou une opportunit\u00e9 ?","description":"Le cloud computing est souvent pr\u00e9sent\u00e9 comme une menace pour la s\u00e9curit\u00e9 informatique. Qu'en est-il vraiment ? Et si c'\u00e9tait l'inverse ... ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 cloud : le cloud computing, menace ou une opportunit\u00e9 ?","og_description":"Le cloud computing est souvent pr\u00e9sent\u00e9 comme une menace pour la s\u00e9curit\u00e9 informatique. Qu'en est-il vraiment ? Et si c'\u00e9tait l'inverse ... ?","og_url":"https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/","og_site_name":"Marketing and Innovation","article_publisher":"https:\/\/www.facebook.com\/vismktg","article_author":"http:\/\/facebook.com\/ygourven","article_published_time":"2014-11-04T13:00:09+00:00","article_modified_time":"2023-02-01T14:03:39+00:00","og_image":[{"width":521,"height":347,"url":"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/11\/ygourven-a-thief-with-a-black-balaclava-walks-on-tiptoe-across-93c14549-f940-46dc-9203-c770e4aa35f1-e1675260258434.jpg","type":"image\/jpeg"}],"author":"Yann Gourvennec","twitter_card":"summary_large_image","twitter_creator":"@ygourven","twitter_site":"@ygourven","twitter_misc":{"\u00c9crit par":"Yann Gourvennec","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/#article","isPartOf":{"@id":"https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/"},"author":{"name":"Yann Gourvennec","@id":"https:\/\/visionarymarketing.com\/fr\/#\/schema\/person\/3754fee1e558f47b8deb46f53c37423e"},"headline":"S\u00e9curit\u00e9 : le cloud computing, menace ou une opportunit\u00e9 ?","datePublished":"2014-11-04T13:00:09+00:00","dateModified":"2023-02-01T14:03:39+00:00","mainEntityOfPage":{"@id":"https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/"},"wordCount":675,"commentCount":11,"image":{"@id":"https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/#primaryimage"},"thumbnailUrl":"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/11\/ygourven-a-thief-with-a-black-balaclava-walks-on-tiptoe-across-93c14549-f940-46dc-9203-c770e4aa35f1-e1675260258434.jpg","articleSection":["\u00e9conomie et num\u00e9rique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/","url":"https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/","name":"S\u00e9curit\u00e9 cloud : le cloud computing, menace ou une opportunit\u00e9 ?","isPartOf":{"@id":"https:\/\/visionarymarketing.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/#primaryimage"},"image":{"@id":"https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/#primaryimage"},"thumbnailUrl":"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/11\/ygourven-a-thief-with-a-black-balaclava-walks-on-tiptoe-across-93c14549-f940-46dc-9203-c770e4aa35f1-e1675260258434.jpg","datePublished":"2014-11-04T13:00:09+00:00","dateModified":"2023-02-01T14:03:39+00:00","author":{"@id":"https:\/\/visionarymarketing.com\/fr\/#\/schema\/person\/3754fee1e558f47b8deb46f53c37423e"},"description":"Le cloud computing est souvent pr\u00e9sent\u00e9 comme une menace pour la s\u00e9curit\u00e9 informatique. Qu'en est-il vraiment ? Et si c'\u00e9tait l'inverse ... ?","breadcrumb":{"@id":"https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/#primaryimage","url":"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/11\/ygourven-a-thief-with-a-black-balaclava-walks-on-tiptoe-across-93c14549-f940-46dc-9203-c770e4aa35f1-e1675260258434.jpg","contentUrl":"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2014\/11\/ygourven-a-thief-with-a-black-balaclava-walks-on-tiptoe-across-93c14549-f940-46dc-9203-c770e4aa35f1-e1675260258434.jpg","width":521,"height":347},{"@type":"BreadcrumbList","@id":"https:\/\/visionarymarketing.com\/fr\/2014\/11\/04\/securite-informatique-cloud-computing-il-menace-opportunite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/visionarymarketing.com\/fr\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 : le cloud computing, menace ou une opportunit\u00e9 ?"}]},{"@type":"WebSite","@id":"https:\/\/visionarymarketing.com\/fr\/#website","url":"https:\/\/visionarymarketing.com\/fr\/","name":"Marketing and Innovation","description":"Site d&#039;infos ind\u00e9pendant, depuis 1996","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/visionarymarketing.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/visionarymarketing.com\/fr\/#\/schema\/person\/3754fee1e558f47b8deb46f53c37423e","name":"Yann Gourvennec","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/5972001801e8de5692a3e31224e85769f50a55fb8b679749f9c8d1868cceff14?s=96&d=initials&r=g&initials=yg","url":"https:\/\/secure.gravatar.com\/avatar\/5972001801e8de5692a3e31224e85769f50a55fb8b679749f9c8d1868cceff14?s=96&d=initials&r=g&initials=yg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5972001801e8de5692a3e31224e85769f50a55fb8b679749f9c8d1868cceff14?s=96&d=initials&r=g&initials=yg","caption":"Yann Gourvennec"},"description":"Yann Gourvennec created visionarymarketing.com in 1996. He is a speaker and author of many books. In 2014 he went from intrapreneur to entrepreneur, when he created his digital marketing agency. Yann Gourvennec a cr\u00e9\u00e9 visionarymarketing.com en 1996. Il est conf\u00e9rencier et auteur de plusieurs livres. En 2014, il est pass\u00e9 d'intrapreneur \u00e0 entrepreneur en cr\u00e9ant son agence de marketing num\u00e9rique.","sameAs":["https:\/\/visionarymarketing.com","http:\/\/facebook.com\/ygourven","http:\/\/linkedin.com\/in\/ygourven","https:\/\/x.com\/ygourven","https:\/\/www.youtube.com\/c\/visionarymarketingagency"],"url":"https:\/\/visionarymarketing.com\/fr\/author\/yann-gourvennec\/"}]}},"_links":{"self":[{"href":"https:\/\/visionarymarketing.com\/fr\/wp-json\/wp\/v2\/posts\/16298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/visionarymarketing.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/visionarymarketing.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/visionarymarketing.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/visionarymarketing.com\/fr\/wp-json\/wp\/v2\/comments?post=16298"}],"version-history":[{"count":0,"href":"https:\/\/visionarymarketing.com\/fr\/wp-json\/wp\/v2\/posts\/16298\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/visionarymarketing.com\/fr\/wp-json\/wp\/v2\/media\/73790"}],"wp:attachment":[{"href":"https:\/\/visionarymarketing.com\/fr\/wp-json\/wp\/v2\/media?parent=16298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/visionarymarketing.com\/fr\/wp-json\/wp\/v2\/categories?post=16298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/visionarymarketing.com\/fr\/wp-json\/wp\/v2\/tags?post=16298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}