{"id":126607,"date":"2019-03-18T09:05:25","date_gmt":"2019-03-18T08:05:25","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=126607"},"modified":"2024-06-20T14:11:54","modified_gmt":"2024-06-20T13:11:54","slug":"le-shadow-it-un-veritable-defi-pour-les-dsi","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/le-shadow-it-un-veritable-defi-pour-les-dsi\/","title":{"rendered":"Le shadow IT : un v\u00e9ritable d\u00e9fi pour les DSI"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-126609\" title=\"Image utilis\u00e9e sous licence de Shutterstock.com\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_387741175.jpg\" alt=\"Le shadow IT, cette menace de l\u2019int\u00e9rieur | Stormshield\" width=\"800\" height=\"534\" \/><\/p>\n<p><strong>Le \u00ab shadow IT \u00bb constitue une v\u00e9ritable menace pour les services informatiques. Mais d\u2019o\u00f9 vient ce ph\u00e9nom\u00e8ne ? Quels risques fait-il peser sur l\u2019entreprise ? Quelles r\u00e9ponses y apporter ? Nous avons sollicit\u00e9 cinq experts pour \u00e9voquer cet enjeu crucial, \u00e0 l\u2019heure o\u00f9 les promesses du cloud bouleversent les usages au sein des entreprises.<\/strong><\/p>\n<p>En entreprise, les DSI sont en g\u00e9n\u00e9ral aux avant-postes pour mesurer l\u2019impact de ces transformations sur les pratiques des collaborateurs. Or, ces derni\u00e8res ann\u00e9es, de nouvelles pratiques \u00e0 risque ont \u00e9merg\u00e9. <strong>Parmi elles, le \u00ab <em>shadow IT<\/em> \u00bb ; l\u2019utilisation d\u2019applications et de services, souvent localis\u00e9s dans le cloud, en parall\u00e8le des SaaS \u00ab officielles \u00bb propos\u00e9s par la direction IT.<\/strong> Aujourd\u2019hui, cette pratique se d\u00e9veloppe \u00e0 mesure que les services cloud et le nombre d\u2019objets connect\u00e9s explosent. Dans un rapport r\u00e9cent, un autre acteur de la cybers\u00e9curit\u00e9 estime ainsi que les entreprises ont recours, en moyenne, \u00e0 1 935 services de <a href=\"https:\/\/info.skyhighnetworks.com\/rs\/274-AUP-214\/images\/Cloud%20Adoption%20%26%20Risk%20Report%202019.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">cloud<\/a> aujourd\u2019hui. Un chiffre qui grimpe de 15% chaque ann\u00e9e. Quant au \u00ab shadow IT \u00bb, il est tr\u00e8s compliqu\u00e9 de quantifier la menace, tant celle-ci est diffuse et conjoncturelle. N\u00e9anmoins, <a href=\"http:\/\/www.magimages.org\/pwc-digital-iq-survey-2016\/\" target=\"_blank\" rel=\"noopener noreferrer\">une enqu\u00eate PwC<\/a> de 2015 notait d\u00e9j\u00e0 que 15 \u00e0 30% des d\u00e9penses informatiques se faisaient en dehors du budget officiel. Et il y a fort \u00e0 parier que cette tendance a continu\u00e9 d\u2019\u00e9voluer depuis.<\/p>\n<p>&nbsp;<\/p>\n<h2>Nouveaux usages, risques nouveaux<\/h2>\n<p>\u00ab <em>Avec le shadow IT, c\u2019est une partie du patrimoine informationnel de l\u2019entreprise qui \u00e9chappe au contr\u00f4le de la DSI<\/em> \u00bb, explique Emmanuel Dupont, Global Chief Security Officer de Oxya (groupe Hitachi). Fuites de donn\u00e9es, failles de s\u00e9curit\u00e9, vuln\u00e9rabilit\u00e9 aux logiciels malveillants\u2026 Cette perte de contr\u00f4le partielle n\u2019est pas sans faire peser des risques importants. \u00ab <em>Lorsque l\u2019on d\u00e9porte l\u2019information en dehors du p\u00e9rim\u00e8tre balis\u00e9 par l\u2019IT, on y d\u00e9porte \u00e9galement le risque, mais sans les moyens de protection mis en place par l\u2019entreprise.<\/em> \u00bb Un risque croissant puisque les \u00e9v\u00e9nements consid\u00e9r\u00e9s comme des menaces ont augment\u00e9 de 28% par rapport \u00e0 l\u2019an dernier. En parall\u00e8le, le partage de donn\u00e9es sensibles via un lien d\u2019acc\u00e8s public a lui augment\u00e9 de 23% en deux ans. \u00ab <em>Aujourd\u2019hui, le principal risque ce n\u2019est pas la grosse attaque directe massive, c\u2019est l\u2019employ\u00e9 lui-m\u00eame<\/em> \u00bb, indique Emmanuel Dupont. \u00ab <em>Lorsqu\u2019il utilise des outils dont la DSI n\u2019a pas connaissance, il devient une cible privil\u00e9gi\u00e9e et sans d\u00e9fense.<\/em> \u00bb<\/p>\n<blockquote><p><em>Aujourd\u2019hui, le principal risque ce n\u2019est pas la grosse attaque directe massive, c\u2019est l\u2019employ\u00e9 lui-m\u00eame<\/em><\/p>\n<pre><strong>Emmanuel Dupont,<\/strong> Global Chief Security Officer Oxya<\/pre>\n<\/blockquote>\n<p>Pour Paul Fariello, membre de l\u2019\u00e9quipe de Security Intelligence de Stormshield, cette pratique se trouve \u00e9galement renforc\u00e9e par l\u2019av\u00e8nement de nouveaux mod\u00e8les d\u2019entreprises. Dans ces organisations plus flexibles et ouvertes, le nomadisme des employ\u00e9s les am\u00e8ne parfois \u00e0 utiliser leur propre mat\u00e9riel informatique (ordinateur portable, t\u00e9l\u00e9phone personnel, montre connect\u00e9e ou <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/assistants-vocaux-et-cyber-securite-et-si-le-ver-etait-deja-dans-la-pomme\/\">assistants vocaux<\/a>) dans un cadre professionnel. \u00ab <em>Lorsque l\u2019on utilise ses \u00e9quipements personnels, on ne passe plus par les m\u00eames circuits de donn\u00e9es, on contourne les VPN s\u00e9curis\u00e9s. Mais dans le cas o\u00f9 les salari\u00e9s sont tr\u00e8s mobiles, il devient compliqu\u00e9 de contr\u00f4ler syst\u00e9matiquement o\u00f9 ils se connectent et comment.<\/em> \u00bb<\/p>\n<p>&nbsp;<\/p>\n<h2>Facteur financier et facteur temps<\/h2>\n<p>Pour nos experts, le d\u00e9veloppement du shadow IT est la cons\u00e9quence directe des politiques de r\u00e9duction des co\u00fbts en entreprise. \u00ab <em>L\u2019informatique interne a longtemps \u00e9t\u00e9 consid\u00e9r\u00e9e comme un centre de co\u00fbts<\/em> \u00bb, souligne Denis Lechevin, RSSI chez Worldline (E-payment). \u00ab <em>Les m\u00e9tiers ont donc mis les services propos\u00e9s par la DSI en concurrence avec des services externes, dont les co\u00fbts annonc\u00e9s sont moins importants.<\/em> \u00bb Sans prendre n\u00e9cessairement la mesure des risques encourus.<\/p>\n<p>Et dans de nombreux cas, les DSI r\u00e9agissent avec du retard. \u00ab <em>Ce manque d\u2019agilit\u00e9 des DSI explique en grande partie le d\u00e9veloppement du shadow IT<\/em> \u00bb, note Johanne Ulloa, animateur du podcast <a href=\"https:\/\/www.nolimitsecu.fr\/shadow-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">NoLimitSecu<\/a>. \u00ab <em>Si un collaborateur a besoin d\u2019une ressource, mais que la lourdeur du process fait que la DSI met du temps \u00e0 la lui fournir, alors on passe par un service tiers<\/em> \u00bb. Le facteur temps joue alors un r\u00f4le d\u00e9cisif. Mais souvent, les DSI donnent l\u2019impression d\u2019un \u00ab <em>rouleau compresseur qui se met en branle et donne sa r\u00e9ponse trop tard<\/em> \u00bb, souligne Denis Lechevin. \u00ab <em>Mais cette impression est accentu\u00e9e par le fait que, souvent, c\u2019est l\u2019entreprise qui sollicite trop tard les DSI.<\/em> \u00bb Face \u00e0 la facilit\u00e9 d\u2019acc\u00e8s et rapidit\u00e9 de d\u00e9ploiement de solutions externes, c\u2019est ce d\u00e9calage qui cr\u00e9\u00e9 un hiatus. Et l\u2019urgence li\u00e9e \u00e0 l\u2019usage m\u00e9tier entre alors en contradiction avec le besoin de structurer des services informatiques sur le long terme. \u00ab <em>Trop souvent, les DSI sont consid\u00e9r\u00e9es comme des fournisseurs de service interne, que l\u2019on peut mettre en concurrence avec des fournisseurs externes<\/em> \u00bb, conclut Denis Lechevin.<\/p>\n<blockquote><p><em>Ce manque d\u2019agilit\u00e9 des DSI explique en grande partie le d\u00e9veloppement du shadow IT<\/em><\/p>\n<pre><strong>Johanne Ulloa,<\/strong> animateur du podcast NoLimitSecu<\/pre>\n<\/blockquote>\n<p>Pourtant, \u00ab <em>les solutions tierces qui ne sont pas valid\u00e9es a priori par le service IT ne sont jamais des solutions de long terme<\/em> \u00bb, nuance Franck Nielacny, DSI chez Stormshield. \u00ab <em>M\u00eame si l\u2019outil fonctionne et est adopt\u00e9 par les \u00e9quipes, il peut s\u2019av\u00e9rer tr\u00e8s compliqu\u00e9 de l\u2019int\u00e9grer a posteriori dans le SI officiel de l\u2019entreprise. \u00c9volutions du r\u00e9seau, r\u00e8gles d\u2019acc\u00e8s, ou encore exigences de s\u00e9curit\u00e9 sont en effet autant de points de blocage potentiels. Il en va de m\u00eame s\u2019il s\u2019agit de mat\u00e9riel personnel.<\/em> \u00bb<\/p>\n<p>&nbsp;<\/p>\n<h2>Sensibilisation plus que coercition<\/h2>\n<p>D\u00e8s lors, <strong>quelles solutions s\u2019offrent aux DSI pour enrayer le d\u00e9veloppement du shadow IT ?<\/strong> \u00ab <em>Il y a trois types de r\u00e9ponses. Un axe pr\u00e9ventif, un axe curatif et un axe coercitif<\/em> \u00bb, pointe Johanne Ulloa. Dans le premier cas, les DSI sont les garants de la sensibilisation des collaborateurs. Ils doivent communiquer sur les mauvaises pratiques \u00e0 \u00e9viter, et les bonnes conduites \u00e0 adopter. \u00ab <em>L\u2019art du SI est donc de parvenir \u00e0 se \u00ab glisser \u00bb dans les conversations et les projets entre m\u00e9tiers, pour optimiser la s\u00e9curit\u00e9 de ces \u00e9changes<\/em> \u00bb, explique Franck Nielacny. De la mani\u00e8re la plus subtile possible. Car souvent, \u00ab <em>les couches de s\u00e9curit\u00e9 que l\u2019on vient rajouter sont per\u00e7ues comme g\u00eanantes<\/em> \u00bb, souligne Paul Fariello. \u00ab <em>Tout l\u2019enjeu est donc de parvenir \u00e0 impl\u00e9menter des moyens qui seront parfaitement ins\u00e9r\u00e9s dans le quotidien des collaborateurs.<\/em> \u00bb L\u2019aspect UX (User eXperience) et l\u2019int\u00e9gration de l\u2019IT dans les projets de d\u00e9veloppement jouent ici un r\u00f4le essentiel, de mani\u00e8re \u00e0 ce que ces derniers utilisent des solutions valid\u00e9es par l\u2019IT, plut\u00f4t que des applications tierces.<\/p>\n<blockquote><p><em>L\u2019art du SI est donc de parvenir \u00e0 se \u00ab glisser \u00bb dans les conversations et les projets entre m\u00e9tiers, pour optimiser la s\u00e9curit\u00e9 de ces \u00e9changes<\/em><\/p>\n<pre><strong>Franck Nielacny,<\/strong> DSI Stormshield<\/pre>\n<\/blockquote>\n<p>Dans le cadre d\u2019une politique curative, la DSI essaiera de \u00ab <em>d\u00e9terminer si de tels services sont d\u2019ores et d\u00e9j\u00e0 utilis\u00e9s par l\u2019entreprise, en utilisant principalement des moyens techniques, tel que l\u2019\u00e9tude des fichiers de logs<\/em> \u00bb, explique Johanne Ulloa.<\/p>\n<p>Le dernier axe est coercitif. Avec la mise en place du RGPD, certaines entreprises ont d\u2019ores et d\u00e9j\u00e0 durci leur politique. \u00ab <em>Il y a en effet un v\u00e9ritable enjeu r\u00e8glementaire<\/em> \u00bb, poursuit-il. \u00ab <em>En utilisant des applications ou services tiers, on s\u2019expose \u00e0 un risque de non-conformit\u00e9 avec les principes du RGPD dans la gestion des donn\u00e9es personnelles notamment.<\/em> \u00bb N\u00e9anmoins, pour ce dernier, la sensibilisation vaudra toujours mieux que la coercition.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le \u00ab shadow IT \u00bb constitue une v\u00e9ritable menace pour les services informatiques. Mais d\u2019o\u00f9 vient ce ph\u00e9nom\u00e8ne ? Quels risques fait-il peser sur l\u2019entreprise ? Quelles r\u00e9ponses y apporter ? Nous avons sollicit\u00e9 cinq experts pour \u00e9voquer cet enjeu crucial, \u00e0 l\u2019heure o\u00f9 les&#8230;<\/p>\n","protected":false},"author":31,"featured_media":126609,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1612],"tags":[4363],"business_size":[682,683,681],"industry":[695,689,703,693,699,697],"help_mefind":[],"features":[],"type_security":[1853,756],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1595,1565],"class_list":["post-126607","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veille-securite","tag-la-cybersecurite-premiers-pas","business_size-eti","business_size-grande-entreprise","business_size-pme","industry-administrations-publiques","industry-banque-et-finance","industry-commerce-et-e-commerce","industry-education-et-enseignement","industry-industrie-fr","industry-sante-et-etablissements-de-soin","type_security-cloud-fr","type_security-postes-et-serveurs","listing_product-breach-fighter-fr","listing_product-ses-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Le shadow IT, cette menace de l\u2019int\u00e9rieur | Stormshield<\/title>\n<meta name=\"description\" content=\"Et si les principaux risques informatiques ne venaient pas de cyberattaques ext\u00e9rieures mais bien du shadow IT \u2013 cette nouvelle pratique \u00e0 risques ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/le-shadow-it-un-veritable-defi-pour-les-dsi\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le shadow IT, cette menace de l\u2019int\u00e9rieur | Stormshield\" \/>\n<meta property=\"og:description\" content=\"Et si les principaux risques informatiques ne venaient pas de cyberattaques ext\u00e9rieures mais bien du shadow IT \u2013 cette nouvelle pratique \u00e0 risques ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/le-shadow-it-un-veritable-defi-pour-les-dsi\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-18T08:05:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-20T13:11:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_387741175.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Victor Poitevin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Victor Poitevin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/le-shadow-it-un-veritable-defi-pour-les-dsi\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/le-shadow-it-un-veritable-defi-pour-les-dsi\\\/\"},\"author\":{\"name\":\"Victor Poitevin\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\"},\"headline\":\"Le shadow IT : un v\u00e9ritable d\u00e9fi pour les DSI\",\"datePublished\":\"2019-03-18T08:05:25+00:00\",\"dateModified\":\"2024-06-20T13:11:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/le-shadow-it-un-veritable-defi-pour-les-dsi\\\/\"},\"wordCount\":1321,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/le-shadow-it-un-veritable-defi-pour-les-dsi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_387741175.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - premiers pas\"],\"articleSection\":[\"Veille s\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/le-shadow-it-un-veritable-defi-pour-les-dsi\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/le-shadow-it-un-veritable-defi-pour-les-dsi\\\/\",\"name\":\"Le shadow IT, cette menace de l\u2019int\u00e9rieur | Stormshield\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/le-shadow-it-un-veritable-defi-pour-les-dsi\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/le-shadow-it-un-veritable-defi-pour-les-dsi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_387741175.jpg\",\"datePublished\":\"2019-03-18T08:05:25+00:00\",\"dateModified\":\"2024-06-20T13:11:54+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\"},\"description\":\"Et si les principaux risques informatiques ne venaient pas de cyberattaques ext\u00e9rieures mais bien du shadow IT \u2013 cette nouvelle pratique \u00e0 risques ?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/le-shadow-it-un-veritable-defi-pour-les-dsi\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/le-shadow-it-un-veritable-defi-pour-les-dsi\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/le-shadow-it-un-veritable-defi-pour-les-dsi\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_387741175.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_387741175.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/le-shadow-it-un-veritable-defi-pour-les-dsi\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le shadow IT : un v\u00e9ritable d\u00e9fi pour les DSI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\",\"name\":\"Victor Poitevin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"caption\":\"Victor Poitevin\"},\"description\":\"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le shadow IT, cette menace de l\u2019int\u00e9rieur | Stormshield","description":"Et si les principaux risques informatiques ne venaient pas de cyberattaques ext\u00e9rieures mais bien du shadow IT \u2013 cette nouvelle pratique \u00e0 risques ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/le-shadow-it-un-veritable-defi-pour-les-dsi\/","og_locale":"fr_FR","og_type":"article","og_title":"Le shadow IT, cette menace de l\u2019int\u00e9rieur | Stormshield","og_description":"Et si les principaux risques informatiques ne venaient pas de cyberattaques ext\u00e9rieures mais bien du shadow IT \u2013 cette nouvelle pratique \u00e0 risques ?","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/le-shadow-it-un-veritable-defi-pour-les-dsi\/","og_site_name":"Stormshield","article_published_time":"2019-03-18T08:05:25+00:00","article_modified_time":"2024-06-20T13:11:54+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_387741175.jpg","type":"image\/jpeg"}],"author":"Victor Poitevin","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Victor Poitevin","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/le-shadow-it-un-veritable-defi-pour-les-dsi\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/le-shadow-it-un-veritable-defi-pour-les-dsi\/"},"author":{"name":"Victor Poitevin","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"headline":"Le shadow IT : un v\u00e9ritable d\u00e9fi pour les DSI","datePublished":"2019-03-18T08:05:25+00:00","dateModified":"2024-06-20T13:11:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/le-shadow-it-un-veritable-defi-pour-les-dsi\/"},"wordCount":1321,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/le-shadow-it-un-veritable-defi-pour-les-dsi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_387741175.jpg","keywords":["La cybers\u00e9curit\u00e9 - premiers pas"],"articleSection":["Veille s\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/le-shadow-it-un-veritable-defi-pour-les-dsi\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/le-shadow-it-un-veritable-defi-pour-les-dsi\/","name":"Le shadow IT, cette menace de l\u2019int\u00e9rieur | Stormshield","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/le-shadow-it-un-veritable-defi-pour-les-dsi\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/le-shadow-it-un-veritable-defi-pour-les-dsi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_387741175.jpg","datePublished":"2019-03-18T08:05:25+00:00","dateModified":"2024-06-20T13:11:54+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"description":"Et si les principaux risques informatiques ne venaient pas de cyberattaques ext\u00e9rieures mais bien du shadow IT \u2013 cette nouvelle pratique \u00e0 risques ?","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/le-shadow-it-un-veritable-defi-pour-les-dsi\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/le-shadow-it-un-veritable-defi-pour-les-dsi\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/le-shadow-it-un-veritable-defi-pour-les-dsi\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_387741175.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_387741175.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/le-shadow-it-un-veritable-defi-pour-les-dsi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Le shadow IT : un v\u00e9ritable d\u00e9fi pour les DSI"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2","name":"Victor Poitevin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","caption":"Victor Poitevin"},"description":"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations."}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/126607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=126607"}],"version-history":[{"count":10,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/126607\/revisions"}],"predecessor-version":[{"id":548873,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/126607\/revisions\/548873"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/126609"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=126607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=126607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=126607"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=126607"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=126607"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=126607"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=126607"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=126607"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=126607"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=126607"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=126607"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=126607"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=126607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}