{"id":106463,"date":"2018-10-01T07:50:45","date_gmt":"2018-10-01T06:50:45","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=106463"},"modified":"2024-06-20T13:34:48","modified_gmt":"2024-06-20T12:34:48","slug":"chiffrement-des-donnees-en-entreprise-mode-demploi","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/chiffrement-des-donnees-en-entreprise-mode-demploi\/","title":{"rendered":"Chiffrement des donn\u00e9es en entreprise : mode d\u2019emploi"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-106464\" title=\"Image utilis\u00e9e sous licence de Shutterstock.com\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_526680238.jpg\" alt=\"Chiffrement des donn\u00e9es en entreprise : mode d\u2019emploi | Stormshield\" width=\"800\" height=\"534\" \/><\/p>\n<p><strong>Face aux risques de fuites ou de vols de donn\u00e9es, une parade efficace et simple existe pour prot\u00e9ger votre entreprise : le chiffrement. Une technique qui n\u00e9cessite n\u00e9anmoins de respecter quelques r\u00e8gles simples.<\/strong><\/p>\n<p>Toute entreprise poss\u00e8de des donn\u00e9es sensibles ou traite des donn\u00e9es \u00e0 caract\u00e8re personnel. Or les fuites et cyberattaques ne cessent de se multiplier, provoquant des pertes de donn\u00e9es de plus en plus co\u00fbteuses. En 2017, le co\u00fbt financier pour les entreprises fran\u00e7aises s\u2019est ainsi accru de 50% en un an, atteignant un montant moyen de 2,25 millions d\u2019euros (\u00e9tude \u00ab <a href=\"https:\/\/www.pwc.fr\/fr\/publications\/systemes-d-information\/cybersecurity-and-privacy.html\" target=\"_blank\" rel=\"noopener noreferrer\">The Global State of Information Security Survey 2018<\/a> \u00bb de PwC).<\/p>\n<p>Face \u00e0 cette menace, le chiffrement des donn\u00e9es est un outil de protection essentiel. Cette technique permet de transformer un message \u00ab classique \u00bb en un message \u00ab chiffr\u00e9 \u00bb, inintelligible pour un tiers, afin d\u2019en assurer la confidentialit\u00e9. Dans les faits, le recours \u00e0 ce proc\u00e9d\u00e9 est tr\u00e8s simple, via une cl\u00e9 \u2013 appel\u00e9e cl\u00e9 de chiffrement.<\/p>\n<p>&nbsp;<\/p>\n<h2>Analyser ses besoins<\/h2>\n<p>La premi\u00e8re chose \u00e0 faire est d\u2019identifier les besoins r\u00e9els de l\u2019entreprise. Certains services (comit\u00e9 ex\u00e9cutif, R&amp;D, comptabilit\u00e9\u2026) sont plus concern\u00e9s que d\u2019autres par la protection de donn\u00e9es sensibles. \u00ab <em>Le travail consiste d\u2019abord \u00e0 questionner l\u2019entreprise sur son m\u00e9tier, sa valeur ajout\u00e9e, son savoir-faire, afin de cibler ce qui doit \u00eatre vraiment prot\u00e9g\u00e9<\/em> \u00bb, note Jocelyn Krystlik, Product Marketing Manager chez Stormshield.<\/p>\n<p>&nbsp;<\/p>\n<h2>Concilier simplicit\u00e9 et efficacit\u00e9<\/h2>\n<blockquote><p><em>Il ne faut pas oublier que le chiffrement est d\u2019abord per\u00e7u par l\u2019utilisateur comme une contrainte<\/em><\/p>\n<pre><strong>Jocelyn Krystlik,<\/strong> Product Marketing Manager chez Stormshield<\/pre>\n<\/blockquote>\n<p>La solution de chiffrement adopt\u00e9e doit \u00eatre simple \u00e0 manipuler et donc con\u00e7ue en fonction de l\u2019exp\u00e9rience utilisateur. La technologie ne doit pas trop alourdir les processus m\u00e9tier. \u00ab <em>Il ne faut pas oublier que le chiffrement est d\u2019abord per\u00e7u par l\u2019utilisateur comme une contrainte<\/em> \u00bb, rappelle Jocelyn Krystlik qui souligne \u00e9galement la n\u00e9cessit\u00e9 de \u00ab <em>garantir la r\u00e9versibilit\u00e9 et le recouvrement des donn\u00e9es, autrement dit l\u2019efficacit\u00e9 de la solution de chiffrement<\/em> \u00bb.<\/p>\n<p>&nbsp;<\/p>\n<h2>Former et sensibiliser<\/h2>\n<p>Toute nouvelle solution ou proc\u00e9dure ne vaut que si elle est comprise, adopt\u00e9e et ma\u00eetris\u00e9e. Il est donc imp\u00e9ratif de former et de sensibiliser les utilisateurs au caract\u00e8re sensible des donn\u00e9es et \u00e0 leur chiffrement. \u00ab <em>Sans formation pr\u00e9alable, tout utilisateur lambda n\u2019a g\u00e9n\u00e9ralement aucune connaissance en mati\u00e8re de chiffrement<\/em> \u00bb, constate Jocelyn Krystlik qui conseille, entre autres outils de sensibilisation, l\u2019e-learning, particuli\u00e8rement adapt\u00e9 en entreprise.<\/p>\n<p>&nbsp;<\/p>\n<h2>G\u00e9rer avec rigueur<\/h2>\n<p>L\u2019adoption d\u2019une solution de chiffrement des donn\u00e9es n\u00e9cessite de se poser quelques questions essentielles. \u00c0 savoir : qui a la cl\u00e9 de chiffrement ? Qui va r\u00e9aliser le recouvrement des donn\u00e9es ? Qui va faire le <em>help desk<\/em> (d\u00e9blocage de compte) ? La priorit\u00e9 est de limiter les acc\u00e8s aux personnes concern\u00e9es et de savoir \u00e0 qui l\u2019on confie ces cl\u00e9s de chiffrement.<\/p>\n<p>&nbsp;<\/p>\n<h2>Penser aussi aux externes<\/h2>\n<p>Car chiffrer ses donn\u00e9es ne doit pas devenir un handicap pour communiquer avec ses partenaires (fournisseurs, clients\u2026). Il faut donc prendre en compte leurs propres besoins et usages, quitte \u00e0 utiliser a minima des syst\u00e8mes moins robustes. \u00ab <em>Il existe des solutions de chiffrement gratuites avec <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/serons-nous-bientot-liberes-des-mots-de-passe\/\">mot de passe<\/a><\/em> \u00bb, avance Jocelyn Krystlik qui \u00e9voque aussi \u00ab <em>les solutions d\u2019infrastructures gratuites dans le Cloud pour \u00e9changer occasionnellement avec un client ou un fournisseur<\/em> \u00bb. L\u00e0 encore, la p\u00e9dagogie est essentielle, notamment pour faire comprendre \u00e0 un partenaire que le chiffrement est aussi dans son int\u00e9r\u00eat.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Face aux risques de fuites ou de vols de donn\u00e9es, une parade efficace et simple existe pour prot\u00e9ger votre entreprise : le chiffrement. Une technique qui n\u00e9cessite n\u00e9anmoins de respecter quelques r\u00e8gles simples. Toute entreprise poss\u00e8de des donn\u00e9es sensibles ou traite des donn\u00e9es \u00e0 caract\u00e8re&#8230;<\/p>\n","protected":false},"author":25,"featured_media":106464,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1608],"tags":[4363],"business_size":[682,681],"industry":[695,689,703,699,697],"help_mefind":[],"features":[],"type_security":[1853,754],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1572,1570],"class_list":["post-106463","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-paroles-experts","tag-la-cybersecurite-premiers-pas","business_size-eti","business_size-pme","industry-administrations-publiques","industry-banque-et-finance","industry-commerce-et-e-commerce","industry-industrie-fr","industry-sante-et-etablissements-de-soin","type_security-cloud-fr","type_security-donnees","listing_product-sds-enterprise-fr","listing_product-sds-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Chiffrement des donn\u00e9es : mode d\u2019emploi | Stormshield<\/title>\n<meta name=\"description\" content=\"Face aux risques de fuites ou de vols de donn\u00e9es en entreprise, une parade efficace existe : le chiffrement des donn\u00e9es. Voici quelques r\u00e8gles \u00e0 respecter.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/chiffrement-des-donnees-en-entreprise-mode-demploi\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Chiffrement des donn\u00e9es : mode d\u2019emploi | Stormshield\" \/>\n<meta property=\"og:description\" content=\"Face aux risques de fuites ou de vols de donn\u00e9es en entreprise, une parade efficace existe : le chiffrement des donn\u00e9es. Voici quelques r\u00e8gles \u00e0 respecter.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/chiffrement-des-donnees-en-entreprise-mode-demploi\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-01T06:50:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-20T12:34:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_526680238.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jocelyn Krystlik\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@j_krystlik\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jocelyn Krystlik\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/chiffrement-des-donnees-en-entreprise-mode-demploi\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/chiffrement-des-donnees-en-entreprise-mode-demploi\\\/\"},\"author\":{\"name\":\"Jocelyn Krystlik\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/f4bc6e60b84be0ff5246c60a485d48c7\"},\"headline\":\"Chiffrement des donn\u00e9es en entreprise : mode d\u2019emploi\",\"datePublished\":\"2018-10-01T06:50:45+00:00\",\"dateModified\":\"2024-06-20T12:34:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/chiffrement-des-donnees-en-entreprise-mode-demploi\\\/\"},\"wordCount\":612,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/chiffrement-des-donnees-en-entreprise-mode-demploi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_526680238.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - premiers pas\"],\"articleSection\":[\"Paroles d'experts\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/chiffrement-des-donnees-en-entreprise-mode-demploi\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/chiffrement-des-donnees-en-entreprise-mode-demploi\\\/\",\"name\":\"Chiffrement des donn\u00e9es : mode d\u2019emploi | Stormshield\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/chiffrement-des-donnees-en-entreprise-mode-demploi\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/chiffrement-des-donnees-en-entreprise-mode-demploi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_526680238.jpg\",\"datePublished\":\"2018-10-01T06:50:45+00:00\",\"dateModified\":\"2024-06-20T12:34:48+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/f4bc6e60b84be0ff5246c60a485d48c7\"},\"description\":\"Face aux risques de fuites ou de vols de donn\u00e9es en entreprise, une parade efficace existe : le chiffrement des donn\u00e9es. Voici quelques r\u00e8gles \u00e0 respecter.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/chiffrement-des-donnees-en-entreprise-mode-demploi\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/chiffrement-des-donnees-en-entreprise-mode-demploi\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/chiffrement-des-donnees-en-entreprise-mode-demploi\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_526680238.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_526680238.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/chiffrement-des-donnees-en-entreprise-mode-demploi\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Chiffrement des donn\u00e9es en entreprise : mode d\u2019emploi\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/f4bc6e60b84be0ff5246c60a485d48c7\",\"name\":\"Jocelyn Krystlik\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7798dd2615e081fa5c43f7673135396e3570eac84b1149ace12edae1a5a1a4e5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7798dd2615e081fa5c43f7673135396e3570eac84b1149ace12edae1a5a1a4e5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7798dd2615e081fa5c43f7673135396e3570eac84b1149ace12edae1a5a1a4e5?s=96&d=mm&r=g\",\"caption\":\"Jocelyn Krystlik\"},\"description\":\"Jocelyn has varied experience in security: he spent eight years in consulting and product management for Arkoon until it was bought out by Stormshield\u2019s parent company, Airbus. Since 2014, he has been helping Stormshield's clients reduce their exposure to threats by providing expertise, advice, and training in data security, especially in the cloud. He played a key role in bringing Security Box, a corporate data security product, to market. He is currently Head of the Data Security Business Unit and Head of Business Development for the Defence sector.\",\"sameAs\":[\"http:\\\/\\\/#\",\"https:\\\/\\\/x.com\\\/j_krystlik\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Chiffrement des donn\u00e9es : mode d\u2019emploi | Stormshield","description":"Face aux risques de fuites ou de vols de donn\u00e9es en entreprise, une parade efficace existe : le chiffrement des donn\u00e9es. Voici quelques r\u00e8gles \u00e0 respecter.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/chiffrement-des-donnees-en-entreprise-mode-demploi\/","og_locale":"fr_FR","og_type":"article","og_title":"Chiffrement des donn\u00e9es : mode d\u2019emploi | Stormshield","og_description":"Face aux risques de fuites ou de vols de donn\u00e9es en entreprise, une parade efficace existe : le chiffrement des donn\u00e9es. Voici quelques r\u00e8gles \u00e0 respecter.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/chiffrement-des-donnees-en-entreprise-mode-demploi\/","og_site_name":"Stormshield","article_published_time":"2018-10-01T06:50:45+00:00","article_modified_time":"2024-06-20T12:34:48+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_526680238.jpg","type":"image\/jpeg"}],"author":"Jocelyn Krystlik","twitter_card":"summary_large_image","twitter_creator":"@j_krystlik","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Jocelyn Krystlik","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/chiffrement-des-donnees-en-entreprise-mode-demploi\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/chiffrement-des-donnees-en-entreprise-mode-demploi\/"},"author":{"name":"Jocelyn Krystlik","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/f4bc6e60b84be0ff5246c60a485d48c7"},"headline":"Chiffrement des donn\u00e9es en entreprise : mode d\u2019emploi","datePublished":"2018-10-01T06:50:45+00:00","dateModified":"2024-06-20T12:34:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/chiffrement-des-donnees-en-entreprise-mode-demploi\/"},"wordCount":612,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/chiffrement-des-donnees-en-entreprise-mode-demploi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_526680238.jpg","keywords":["La cybers\u00e9curit\u00e9 - premiers pas"],"articleSection":["Paroles d'experts"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/chiffrement-des-donnees-en-entreprise-mode-demploi\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/chiffrement-des-donnees-en-entreprise-mode-demploi\/","name":"Chiffrement des donn\u00e9es : mode d\u2019emploi | Stormshield","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/chiffrement-des-donnees-en-entreprise-mode-demploi\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/chiffrement-des-donnees-en-entreprise-mode-demploi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_526680238.jpg","datePublished":"2018-10-01T06:50:45+00:00","dateModified":"2024-06-20T12:34:48+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/f4bc6e60b84be0ff5246c60a485d48c7"},"description":"Face aux risques de fuites ou de vols de donn\u00e9es en entreprise, une parade efficace existe : le chiffrement des donn\u00e9es. Voici quelques r\u00e8gles \u00e0 respecter.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/chiffrement-des-donnees-en-entreprise-mode-demploi\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/chiffrement-des-donnees-en-entreprise-mode-demploi\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/chiffrement-des-donnees-en-entreprise-mode-demploi\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_526680238.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_526680238.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/chiffrement-des-donnees-en-entreprise-mode-demploi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Chiffrement des donn\u00e9es en entreprise : mode d\u2019emploi"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/f4bc6e60b84be0ff5246c60a485d48c7","name":"Jocelyn Krystlik","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/7798dd2615e081fa5c43f7673135396e3570eac84b1149ace12edae1a5a1a4e5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7798dd2615e081fa5c43f7673135396e3570eac84b1149ace12edae1a5a1a4e5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7798dd2615e081fa5c43f7673135396e3570eac84b1149ace12edae1a5a1a4e5?s=96&d=mm&r=g","caption":"Jocelyn Krystlik"},"description":"Jocelyn has varied experience in security: he spent eight years in consulting and product management for Arkoon until it was bought out by Stormshield\u2019s parent company, Airbus. Since 2014, he has been helping Stormshield's clients reduce their exposure to threats by providing expertise, advice, and training in data security, especially in the cloud. He played a key role in bringing Security Box, a corporate data security product, to market. He is currently Head of the Data Security Business Unit and Head of Business Development for the Defence sector.","sameAs":["http:\/\/#","https:\/\/x.com\/j_krystlik"]}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/106463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=106463"}],"version-history":[{"count":6,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/106463\/revisions"}],"predecessor-version":[{"id":548852,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/106463\/revisions\/548852"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/106464"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=106463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=106463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=106463"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=106463"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=106463"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=106463"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=106463"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=106463"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=106463"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=106463"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=106463"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=106463"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=106463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}