{"id":126586,"date":"2019-03-11T09:00:19","date_gmt":"2019-03-11T08:00:19","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=126586"},"modified":"2024-06-20T14:23:29","modified_gmt":"2024-06-20T13:23:29","slug":"top-5-des-idees-recues-sur-le-chiffrement-des-donnees","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/","title":{"rendered":"Top 5 des id\u00e9es re\u00e7ues sur le chiffrement des donn\u00e9es"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-126588\" title=\"Image utilis\u00e9e sous licence de Shutterstock.com\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_412533256.jpg\" alt=\"5 id\u00e9es re\u00e7ues sur le chiffrement des donn\u00e9es | Stormshield\" width=\"800\" height=\"567\" \/><\/p>\n<p><strong>Bon nombre de pr\u00e9jug\u00e9s emp\u00eachent encore les entreprises d\u2019adopter des solutions de chiffrement pour prot\u00e9ger leurs donn\u00e9es. Une r\u00e9ticence qui peut co\u00fbter cher \u00e0 l\u2019heure des fuites de donn\u00e9es massives ! Retour sur 5 mythes r\u00e9currents autour du chiffrement des donn\u00e9es.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2><em>\u00ab Chiffrer ces donn\u00e9es, \u00e7a co\u00fbte mais ne rapporte rien\u00a0\u00bb<\/em><\/h2>\n<p>Le chiffrement de ses donn\u00e9es, c\u2019est un peu comme un contrat d\u2019assurance. C\u2019est lorsqu\u2019on a un probl\u00e8me qu\u2019on en per\u00e7oit vraiment l\u2019utilit\u00e9. Et pourtant, les chiffres parlent d\u2019eux-m\u00eames. Selon l\u2019\u00e9tude \u00ab\u00a02018\u00a0: Cost of data breach study : global overview\u00a0\u00bb men\u00e9e par Ponemon Institute pour IBM, le co\u00fbt d\u2019un vol de donn\u00e9es s\u2019\u00e9l\u00e8ve en moyenne \u00e0 3,54 millions d\u2019euros en France, soit une hausse de 8,2\u00a0% par rapport \u00e0 2017.<\/p>\n<blockquote><p><em>Le co\u00fbt d\u2019un vol de donn\u00e9es s\u2019\u00e9l\u00e8ve en moyenne \u00e0 3,54 millions d\u2019euros en France<\/em><\/p><\/blockquote>\n<p>Comme le souligne le livre blanc de Stormshield, \u00ab <a href=\"https:\/\/www.stormshield.com\/fr\/ressourcescenter\/transformation-numerique-entreprises-et-la-securite\/\">Transformation nume\u0301rique des entreprises : et la se\u0301curite\u0301 dans tout c\u0327a\u00a0?<\/a>\u00a0\u00bb, le nomadisme des salari\u00e9s, les services de partage de documents dans le cloud et l\u2019\u00e9mergence des objets connect\u00e9s sont autant de sources potentielles de nouvelles vuln\u00e9rabilit\u00e9s \u00e0 ne pas n\u00e9gliger. Et qui peuvent, elles, co\u00fbter tr\u00e8s cher.<\/p>\n<p>&nbsp;<\/p>\n<h2><em>\u00ab Le chiffrement, c\u2019est trop complique\u0301 \u00e0 mettre en \u0153uvre\u00a0\u00bb<\/em><\/h2>\n<p><em>Middleware<\/em>, PKI, carte cryptographique et autre politique de certification\u2026 Il y a encore quelques ann\u00e9es, la complexit\u00e9 des proc\u00e9dures de protection des donn\u00e9es avait de quoi d\u00e9courager les plus t\u00e9m\u00e9raires.<\/p>\n<p>Mais aujourd\u2019hui, les \u00e9diteurs proposent des solutions ne n\u00e9cessitant plus la mise en \u0153uvre d\u2019une infrastructure ultra-complexe. Que ce soit pour l\u2019utilisateur final ou l\u2019administrateur, ces nouvelles solutions permettent de rendre plus transparente la mise en place et la gestion d\u2019un syst\u00e8me de chiffrement. Comme par exemple en mode SaaS, avec des co\u00fbts d\u2019infrastructures et de maintenance encore plus sensiblement all\u00e9g\u00e9s.<\/p>\n<p>&nbsp;<\/p>\n<h2><em>\u00ab Face au chiffrement, il existe d\u2019autres solutions aussi efficaces\u00a0\u00bb<\/em><\/h2>\n<p>Souvent, la notion de chiffrement est associ\u00e9e \u00e0 la mise en place de re\u0301seaux prive\u0301s virtuels (VPN) \u2013 utile pour prot\u00e9ger les flux de donn\u00e9es en transit sur Internet., Cependant, une telle protection ne garantit pas leur int\u00e9grit\u00e9, comme par exemple en cas de vol du terminal.<\/p>\n<p>D\u2019autre part, au-del\u00e0 des VPN, <em>firewall<\/em> et droits d\u2019acc\u00e8s, le chiffrement de surface des terminaux s\u2019avance comme une autre piste possible. Ici, c\u2019est bien le terminal qui est prot\u00e9g\u00e9, pour r\u00e9pondre notamment \u00e0 cette probl\u00e9matique de vol. Mais non plus les donn\u00e9es \u00e9chang\u00e9es.<\/p>\n<p>Ces solutions, compl\u00e9mentaires, peuvent et devraient \u00eatre envisag\u00e9es aux c\u00f4t\u00e9s d\u2019une solution de chiffrement des donn\u00e9es, comme v\u00e9ritable triptyque d\u2019une politique de s\u00e9curit\u00e9 informatique. D\u00e8s lors, peu importe qui a acc\u00e8s au poste, au serveur, au partage de r\u00e9seau ou de cloud : seul l\u2019utilisateur ayant le droit de d\u00e9chiffrement pourra les exploiter.<\/p>\n<p>&nbsp;<\/p>\n<h2><em>\u00ab Pas besoin du chiffrement, les cyberattaques n\u2019arrivent qu\u2019aux autres\u00a0\u00bb<\/em><\/h2>\n<p>\u00ab <em>Je ne suis pas concern\u00e9<\/em> \u00bb, \u00ab\u00a0<em>Je n\u2019ai pas de donn\u00e9es sensibles \u00e0 prot\u00e9ger<\/em>\u00a0\u00bb\u2026 Ce type de remarque est plus courante qu\u2019on ne le croit et pas seulement au sein des associations ou collectivit\u00e9s locales. Il n\u2019incombe pas aux seuls secteurs sensibles de prot\u00e9ger les donn\u00e9es qu\u2019ils g\u00e8rent. Le RGPD (<a href=\"https:\/\/www.economie.gouv.fr\/entreprises\/reglement-general-sur-protection-des-donnees-rgpd\" target=\"_blank\" rel=\"noopener noreferrer\">R\u00e8glement G\u00e9n\u00e9ral sur la Protection des Donn\u00e9es<\/a>) rappelle ainsi \u00e0 ceux qui en doutaient encore que tout le monde est responsable des donn\u00e9es de quelqu\u2019un.<\/p>\n<p>L\u2019amende de 250 000 \u20ac inflig\u00e9e en juin 2018 par la CNIL \u00e0 Optic Center pour avoir insuffisamment s\u00e9curis\u00e9 les donn\u00e9es de ses clients t\u00e9moigne que la n\u00e9gligence peut aussi avoir un co\u00fbt. Or la menace est omnipr\u00e9sente : r\u00e9cemment encore, le g\u00e9ant du conseil en technologie Altran a \u00e9t\u00e9 victime d\u2019une cyberattaque.<\/p>\n<p>&nbsp;<\/p>\n<h2><em>\u00ab Si je chiffre mes donn\u00e9es, je risque de ne pas les r\u00e9cup\u00e9rer\u00a0\u00bb<\/em><\/h2>\n<p>Reste une crainte r\u00e9currente, celle de perdre des donn\u00e9es parce que l\u2019on a oubli\u00e9 son mot de passe ou qu\u2019un collaborateur a quitt\u00e9 la soci\u00e9t\u00e9 sans transmettre le sien. Des technologies permettent d\u2019\u00e9viter ce genre de d\u00e9sagr\u00e9ment, tels que le recouvrement de donn\u00e9es qui autorise une ou deux personnes dans l\u2019entreprise \u00e0 y avoir acc\u00e8s en cas de besoin imp\u00e9rieux. Ou encore la technique du s\u00e9questre, une base de donn\u00e9es (chiffr\u00e9e, bien entendu !) de toutes les cl\u00e9s de chiffrement de la soci\u00e9t\u00e9.<\/p>\n<p>En r\u00e9sum\u00e9, parce que les cons\u00e9quences d\u2019un vol de donn\u00e9es sont bien plus co\u00fbteuses que les moyens de protection ; parce que les technologies se sont simplifi\u00e9es ; parce que personne n\u2019est \u00e0 l\u2019abri du risque et, enfin, parce que le chiffrement reste l\u2019une des protections les plus efficaces, plus rien aujourd\u2019hui ne devrait emp\u00eacher une entreprise de se doter de solutions de chiffrement dignes de ce nom.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bon nombre de pr\u00e9jug\u00e9s emp\u00eachent encore les entreprises d\u2019adopter des solutions de chiffrement pour prot\u00e9ger leurs donn\u00e9es. Une r\u00e9ticence qui peut co\u00fbter cher \u00e0 l\u2019heure des fuites de donn\u00e9es massives ! Retour sur 5 mythes r\u00e9currents autour du chiffrement des donn\u00e9es. &nbsp; \u00ab Chiffrer ces&#8230;<\/p>\n","protected":false},"author":25,"featured_media":126588,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1608],"tags":[4363],"business_size":[682,683,681],"industry":[695,689,693,697],"help_mefind":[],"features":[],"type_security":[754],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1570],"class_list":["post-126586","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-paroles-experts","tag-la-cybersecurite-premiers-pas","business_size-eti","business_size-grande-entreprise","business_size-pme","industry-administrations-publiques","industry-banque-et-finance","industry-education-et-enseignement","industry-sante-et-etablissements-de-soin","type_security-donnees","listing_product-sds-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 id\u00e9es re\u00e7ues sur le chiffrement des donn\u00e9es | Stormshield<\/title>\n<meta name=\"description\" content=\"De nombreux pr\u00e9jug\u00e9s emp\u00eachent encore les entreprises d\u2019adopter des solutions pour chiffrer leurs donn\u00e9es. Une r\u00e9ticence qui peut co\u00fbter cher \u00e0 l\u2019heure des fuites de donn\u00e9es massives !\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 id\u00e9es re\u00e7ues sur le chiffrement des donn\u00e9es | Stormshield\" \/>\n<meta property=\"og:description\" content=\"De nombreux pr\u00e9jug\u00e9s emp\u00eachent encore les entreprises d\u2019adopter des solutions pour chiffrer leurs donn\u00e9es. Une r\u00e9ticence qui peut co\u00fbter cher \u00e0 l\u2019heure des fuites de donn\u00e9es massives !\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-11T08:00:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-20T13:23:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_412533256.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"709\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jocelyn Krystlik\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@j_krystlik\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jocelyn Krystlik\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/\"},\"author\":{\"name\":\"Jocelyn Krystlik\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/f4bc6e60b84be0ff5246c60a485d48c7\"},\"headline\":\"Top 5 des id\u00e9es re\u00e7ues sur le chiffrement des donn\u00e9es\",\"datePublished\":\"2019-03-11T08:00:19+00:00\",\"dateModified\":\"2024-06-20T13:23:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/\"},\"wordCount\":885,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_412533256.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - premiers pas\"],\"articleSection\":[\"Paroles d'experts\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/\",\"url\":\"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/\",\"name\":\"5 id\u00e9es re\u00e7ues sur le chiffrement des donn\u00e9es | Stormshield\",\"isPartOf\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_412533256.jpg\",\"datePublished\":\"2019-03-11T08:00:19+00:00\",\"dateModified\":\"2024-06-20T13:23:29+00:00\",\"author\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/f4bc6e60b84be0ff5246c60a485d48c7\"},\"description\":\"De nombreux pr\u00e9jug\u00e9s emp\u00eachent encore les entreprises d\u2019adopter des solutions pour chiffrer leurs donn\u00e9es. Une r\u00e9ticence qui peut co\u00fbter cher \u00e0 l\u2019heure des fuites de donn\u00e9es massives !\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/#primaryimage\",\"url\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_412533256.jpg\",\"contentUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_412533256.jpg\",\"width\":1000,\"height\":709},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stormshield.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 5 des id\u00e9es re\u00e7ues sur le chiffrement des donn\u00e9es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#website\",\"url\":\"https:\/\/www.stormshield.com\/fr\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/f4bc6e60b84be0ff5246c60a485d48c7\",\"name\":\"Jocelyn Krystlik\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7798dd2615e081fa5c43f7673135396e3570eac84b1149ace12edae1a5a1a4e5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7798dd2615e081fa5c43f7673135396e3570eac84b1149ace12edae1a5a1a4e5?s=96&d=mm&r=g\",\"caption\":\"Jocelyn Krystlik\"},\"description\":\"Jocelyn has varied experience in security: he spent eight years in consulting and product management for Arkoon until it was bought out by Stormshield\u2019s parent company, Airbus. Since 2014, he has been helping Stormshield's clients reduce their exposure to threats by providing expertise, advice, and training in data security, especially in the cloud. He played a key role in bringing Security Box, a corporate data security product, to market. He is currently Head of the Data Security Business Unit and Head of Business Development for the Defence sector.\",\"sameAs\":[\"http:\/\/#\",\"https:\/\/x.com\/j_krystlik\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 id\u00e9es re\u00e7ues sur le chiffrement des donn\u00e9es | Stormshield","description":"De nombreux pr\u00e9jug\u00e9s emp\u00eachent encore les entreprises d\u2019adopter des solutions pour chiffrer leurs donn\u00e9es. Une r\u00e9ticence qui peut co\u00fbter cher \u00e0 l\u2019heure des fuites de donn\u00e9es massives !","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/","og_locale":"fr_FR","og_type":"article","og_title":"5 id\u00e9es re\u00e7ues sur le chiffrement des donn\u00e9es | Stormshield","og_description":"De nombreux pr\u00e9jug\u00e9s emp\u00eachent encore les entreprises d\u2019adopter des solutions pour chiffrer leurs donn\u00e9es. Une r\u00e9ticence qui peut co\u00fbter cher \u00e0 l\u2019heure des fuites de donn\u00e9es massives !","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/","og_site_name":"Stormshield","article_published_time":"2019-03-11T08:00:19+00:00","article_modified_time":"2024-06-20T13:23:29+00:00","og_image":[{"width":1000,"height":709,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_412533256.jpg","type":"image\/jpeg"}],"author":"Jocelyn Krystlik","twitter_card":"summary_large_image","twitter_creator":"@j_krystlik","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Jocelyn Krystlik","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/"},"author":{"name":"Jocelyn Krystlik","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/f4bc6e60b84be0ff5246c60a485d48c7"},"headline":"Top 5 des id\u00e9es re\u00e7ues sur le chiffrement des donn\u00e9es","datePublished":"2019-03-11T08:00:19+00:00","dateModified":"2024-06-20T13:23:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/"},"wordCount":885,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_412533256.jpg","keywords":["La cybers\u00e9curit\u00e9 - premiers pas"],"articleSection":["Paroles d'experts"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/","name":"5 id\u00e9es re\u00e7ues sur le chiffrement des donn\u00e9es | Stormshield","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_412533256.jpg","datePublished":"2019-03-11T08:00:19+00:00","dateModified":"2024-06-20T13:23:29+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/f4bc6e60b84be0ff5246c60a485d48c7"},"description":"De nombreux pr\u00e9jug\u00e9s emp\u00eachent encore les entreprises d\u2019adopter des solutions pour chiffrer leurs donn\u00e9es. Une r\u00e9ticence qui peut co\u00fbter cher \u00e0 l\u2019heure des fuites de donn\u00e9es massives !","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_412533256.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_412533256.jpg","width":1000,"height":709},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-5-des-idees-recues-sur-le-chiffrement-des-donnees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Top 5 des id\u00e9es re\u00e7ues sur le chiffrement des donn\u00e9es"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/f4bc6e60b84be0ff5246c60a485d48c7","name":"Jocelyn Krystlik","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7798dd2615e081fa5c43f7673135396e3570eac84b1149ace12edae1a5a1a4e5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7798dd2615e081fa5c43f7673135396e3570eac84b1149ace12edae1a5a1a4e5?s=96&d=mm&r=g","caption":"Jocelyn Krystlik"},"description":"Jocelyn has varied experience in security: he spent eight years in consulting and product management for Arkoon until it was bought out by Stormshield\u2019s parent company, Airbus. Since 2014, he has been helping Stormshield's clients reduce their exposure to threats by providing expertise, advice, and training in data security, especially in the cloud. He played a key role in bringing Security Box, a corporate data security product, to market. He is currently Head of the Data Security Business Unit and Head of Business Development for the Defence sector.","sameAs":["http:\/\/#","https:\/\/x.com\/j_krystlik"]}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/126586","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=126586"}],"version-history":[{"count":12,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/126586\/revisions"}],"predecessor-version":[{"id":548893,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/126586\/revisions\/548893"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/126588"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=126586"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=126586"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=126586"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=126586"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=126586"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=126586"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=126586"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=126586"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=126586"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=126586"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=126586"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=126586"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=126586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}