{"id":23017,"date":"2017-05-06T14:42:18","date_gmt":"2017-05-06T13:42:18","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=23017\/"},"modified":"2023-06-15T15:00:45","modified_gmt":"2023-06-15T14:00:45","slug":"protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\/","title":{"rendered":"Protection des donn\u00e9es dans le cloud : la r\u00e9volution du chiffrement par les utilisateurs"},"content":{"rendered":"<p align=\"justify\"><strong>Malgr\u00e9 ses nombreux avantages, le cloud n\u2019inspire pas vraiment confiance aux entreprises. La solution\u00a0: mettre en place une protection suppl\u00e9mentaire g\u00e9r\u00e9e directement par l'utilisateur.<\/strong><\/p>\n<h2 align=\"justify\">La n\u00e9cessaire protection des donn\u00e9es sensibles<\/h2>\n<p align=\"justify\">Malgr\u00e9 les b\u00e9n\u00e9fices \u00e9vidents du Cloud, notamment en mati\u00e8re de travail collaboratif, mais aussi d\u2019acquisition et de maintenance des mat\u00e9riels et logiciels, force est de constater que le taux d\u2019adoption de cette technologie par les entreprises fran\u00e7aises reste encore en de\u00e7\u00e0 de celui de nos voisins europ\u00e9ens. En effet, autour de ce nouvel environnement, des doutes persistent : comment \u00e9viter que <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/dessine-moi-une-donnee-sensible\/\">des informations sensibles<\/a> ne tombent entre de mauvaises mains ? Comment \u00e9tablir et faire respecter les politiques de gouvernance des donn\u00e9es, lorsque les utilisateurs acc\u00e8dent au Cloud ? Comment assurer la s\u00e9curit\u00e9 des informations dans une logique d\u2019acc\u00e8s en mobilit\u00e9 ?<\/p>\n<p align=\"justify\">La <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/mais-pourquoi-le-chiffrement-des-donnees-a-autant-de-mal-dans-les-entreprises\/\">r\u00e9ticence<\/a> tient plus particuli\u00e8rement au chiffrement des donn\u00e9es. La plupart du temps, les syst\u00e8mes existants disparaissent d\u00e8s que les informations migrent vers le Cloud. D\u2019o\u00f9 des actifs num\u00e9riques qui deviennent p\u00e9rilleusement vuln\u00e9rables.<\/p>\n<p align=\"justify\">Le probl\u00e8me, c\u2019est que faute d\u2019une d\u00e9cision claire de l\u2019entreprise en la mati\u00e8re, les utilisateurs finissent par choisir eux-m\u00eames leurs propres services cloud. Il s\u2019agit d\u2019ailleurs souvent de ceux qu\u2019ils utilisent \u00e0 titre personnel. Une libert\u00e9 n\u00e9cessaire pour qu\u2019ils puissent collaborer et partager des fichiers entre eux, ainsi qu\u2019avec leurs clients et partenaires, mais qui met en danger les donn\u00e9es de l\u2019entreprise. Il est donc urgent de r\u00e9agir\u00a0!<\/p>\n<h2 align=\"justify\">Le chiffrement individuel\u00a0: une solution innovante et s\u00e9curisante<\/h2>\n<p align=\"justify\">En cherchant \u00e0 prot\u00e9ger leurs donn\u00e9es stock\u00e9es et \u00e9chang\u00e9es dans le cloud, les entreprises se retrouvent donc face \u00e0 plusieurs d\u00e9fis, dont celui de s\u00e9curiser des technologies en constante \u00e9volution. Au sein de l\u2019entreprise, des solutions DLP (<em>Data Loss Prevention<\/em>) garantissent, en fonction des politiques et r\u00e8gles d\u00e9finies, que les informations chiffr\u00e9es ne quittent ni l\u2019appareil, ni le r\u00e9seau. Dans le cas d\u2019une migration vers le cloud, elles fonctionnent sur le m\u00eame principe. Seulement, une fois export\u00e9es, ces donn\u00e9es sont difficilement utilisables dans le cadre d\u2019une collaboration avec des tiers, quand les solutions DLP ne bloquent pas tout simplement leur partage.<\/p>\n<p align=\"justify\">L\u2019entreprise se doit donc de proposer une autre approche, en permettant aux utilisateurs d\u2019appliquer eux-m\u00eames un chiffrement aux fichiers exploit\u00e9s. Elle doit fournir des outils qui permettent aux collaborateurs de d\u00e9finir leur propre entourage de confiance, ceux avec qui ils partageront leurs informations via le cloud. Cette d\u00e9marche nouvelle, alli\u00e9e \u00e0 la centralisation des contr\u00f4les et des r\u00e8gles de s\u00e9curit\u00e9 comme de tra\u00e7abilit\u00e9, permet de construire <a href=\"https:\/\/www.stormshield.com\/fr\/produits-et-services\/produits\/protection-des-donnees\/gamme-sds\/\">un syst\u00e8me performant de protection<\/a>, tout en donnant le pouvoir aux utilisateurs et en pr\u00e9servant le contr\u00f4le des donn\u00e9es \u00e9chang\u00e9es par le service informatique de l\u2019entreprise.<\/p>\n<p align=\"justify\">Cette m\u00e9thode r\u00e9duit \u00e9galement le temps consacr\u00e9 \u00e0 la s\u00e9curisation des documents. En effet, les utilisateurs peuvent s\u00e9lectionner les donn\u00e9es n\u00e9cessaires \u00e0 leurs t\u00e2ches, sans devoir attendre la validation du service IT ou la mise \u00e0 jour de la liste des collaborateurs approuv\u00e9s. Enfin, simple et transparente pour les utilisateurs, elle facilite la recherche et le tri des informations en interne. Aujourd\u2019hui disponibles sur tous les \u00e9quipements (PC, mobile, tablette\u2026), ces technologies ouvrent une voie royale \u00e0 la s\u00e9curisation des donn\u00e9es lors de leur migration vers le Cloud.<\/p>\n<p align=\"justify\">Une chronique de <strong>Jocelyn Krystlik<\/strong>, parue <a href=\"http:\/\/www.journaldunet.com\/solutions\/expert\/66715\/protection-des-donnees-dans-le-cloud---la-revolution-du-chiffrement-par-les-utilisateurs.shtml\" target=\"_blank\" rel=\"noopener\">dans le Journal du Net<\/a> en mai 2017.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malgr\u00e9 ses nombreux avantages, le cloud n\u2019inspire pas vraiment confiance aux entreprises. La solution\u00a0: mettre en place une protection suppl\u00e9mentaire g\u00e9r\u00e9e directement par l&rsquo;utilisateur. La n\u00e9cessaire protection des donn\u00e9es sensibles Malgr\u00e9 les b\u00e9n\u00e9fices \u00e9vidents du Cloud, notamment en mati\u00e8re de travail collaboratif, mais aussi d\u2019acquisition&#8230;<\/p>\n","protected":false},"author":25,"featured_media":24601,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1608],"tags":[4368],"business_size":[],"industry":[],"help_mefind":[],"features":[],"type_security":[1853,754],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1570],"class_list":["post-23017","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-paroles-experts","tag-la-cybersecurite-par-stormshield","type_security-cloud-fr","type_security-donnees","listing_product-sds-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data &amp; Cloud : la r\u00e9volution du chiffrement par les utilisateurs | Stormshield<\/title>\n<meta name=\"description\" content=\"Le Cloud n\u2019inspire pas vraiment confiance aux entreprises. La solution : mettre en place une protection suppl\u00e9mentaire g\u00e9r\u00e9e directement par l&#039;utilisateur.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data &amp; Cloud : la r\u00e9volution du chiffrement par les utilisateurs | Stormshield\" \/>\n<meta property=\"og:description\" content=\"Le Cloud n\u2019inspire pas vraiment confiance aux entreprises. La solution : mettre en place une protection suppl\u00e9mentaire g\u00e9r\u00e9e directement par l&#039;utilisateur.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-06T13:42:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-15T14:00:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/Protection_donn\u00e9es_CLOUD.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jocelyn Krystlik\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@j_krystlik\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jocelyn Krystlik\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\\\/\"},\"author\":{\"name\":\"Jocelyn Krystlik\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/f4bc6e60b84be0ff5246c60a485d48c7\"},\"headline\":\"Protection des donn\u00e9es dans le cloud : la r\u00e9volution du chiffrement par les utilisateurs\",\"datePublished\":\"2017-05-06T13:42:18+00:00\",\"dateModified\":\"2023-06-15T14:00:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\\\/\"},\"wordCount\":629,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/Protection_donn\u00e9es_CLOUD.png\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - par Stormshield\"],\"articleSection\":[\"Paroles d'experts\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\\\/\",\"name\":\"Data & Cloud : la r\u00e9volution du chiffrement par les utilisateurs | Stormshield\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/Protection_donn\u00e9es_CLOUD.png\",\"datePublished\":\"2017-05-06T13:42:18+00:00\",\"dateModified\":\"2023-06-15T14:00:45+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/f4bc6e60b84be0ff5246c60a485d48c7\"},\"description\":\"Le Cloud n\u2019inspire pas vraiment confiance aux entreprises. La solution : mettre en place une protection suppl\u00e9mentaire g\u00e9r\u00e9e directement par l'utilisateur.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/Protection_donn\u00e9es_CLOUD.png\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/Protection_donn\u00e9es_CLOUD.png\",\"width\":800,\"height\":540},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protection des donn\u00e9es dans le cloud : la r\u00e9volution du chiffrement par les utilisateurs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/f4bc6e60b84be0ff5246c60a485d48c7\",\"name\":\"Jocelyn Krystlik\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7798dd2615e081fa5c43f7673135396e3570eac84b1149ace12edae1a5a1a4e5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7798dd2615e081fa5c43f7673135396e3570eac84b1149ace12edae1a5a1a4e5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7798dd2615e081fa5c43f7673135396e3570eac84b1149ace12edae1a5a1a4e5?s=96&d=mm&r=g\",\"caption\":\"Jocelyn Krystlik\"},\"description\":\"Jocelyn has varied experience in security: he spent eight years in consulting and product management for Arkoon until it was bought out by Stormshield\u2019s parent company, Airbus. Since 2014, he has been helping Stormshield's clients reduce their exposure to threats by providing expertise, advice, and training in data security, especially in the cloud. He played a key role in bringing Security Box, a corporate data security product, to market. He is currently Head of the Data Security Business Unit and Head of Business Development for the Defence sector.\",\"sameAs\":[\"http:\\\/\\\/#\",\"https:\\\/\\\/x.com\\\/j_krystlik\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data & Cloud : la r\u00e9volution du chiffrement par les utilisateurs | Stormshield","description":"Le Cloud n\u2019inspire pas vraiment confiance aux entreprises. La solution : mettre en place une protection suppl\u00e9mentaire g\u00e9r\u00e9e directement par l'utilisateur.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\/","og_locale":"fr_FR","og_type":"article","og_title":"Data & Cloud : la r\u00e9volution du chiffrement par les utilisateurs | Stormshield","og_description":"Le Cloud n\u2019inspire pas vraiment confiance aux entreprises. La solution : mettre en place une protection suppl\u00e9mentaire g\u00e9r\u00e9e directement par l'utilisateur.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\/","og_site_name":"Stormshield","article_published_time":"2017-05-06T13:42:18+00:00","article_modified_time":"2023-06-15T14:00:45+00:00","og_image":[{"width":800,"height":540,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/Protection_donn\u00e9es_CLOUD.png","type":"image\/png"}],"author":"Jocelyn Krystlik","twitter_card":"summary_large_image","twitter_creator":"@j_krystlik","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Jocelyn Krystlik","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\/"},"author":{"name":"Jocelyn Krystlik","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/f4bc6e60b84be0ff5246c60a485d48c7"},"headline":"Protection des donn\u00e9es dans le cloud : la r\u00e9volution du chiffrement par les utilisateurs","datePublished":"2017-05-06T13:42:18+00:00","dateModified":"2023-06-15T14:00:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\/"},"wordCount":629,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/Protection_donn\u00e9es_CLOUD.png","keywords":["La cybers\u00e9curit\u00e9 - par Stormshield"],"articleSection":["Paroles d'experts"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\/","name":"Data & Cloud : la r\u00e9volution du chiffrement par les utilisateurs | Stormshield","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/Protection_donn\u00e9es_CLOUD.png","datePublished":"2017-05-06T13:42:18+00:00","dateModified":"2023-06-15T14:00:45+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/f4bc6e60b84be0ff5246c60a485d48c7"},"description":"Le Cloud n\u2019inspire pas vraiment confiance aux entreprises. La solution : mettre en place une protection suppl\u00e9mentaire g\u00e9r\u00e9e directement par l'utilisateur.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/Protection_donn\u00e9es_CLOUD.png","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/Protection_donn\u00e9es_CLOUD.png","width":800,"height":540},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/protection-des-donnees-dans-le-cloud-la-revolution-du-chiffrement-par-les-utilisateurs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Protection des donn\u00e9es dans le cloud : la r\u00e9volution du chiffrement par les utilisateurs"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/f4bc6e60b84be0ff5246c60a485d48c7","name":"Jocelyn Krystlik","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/7798dd2615e081fa5c43f7673135396e3570eac84b1149ace12edae1a5a1a4e5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7798dd2615e081fa5c43f7673135396e3570eac84b1149ace12edae1a5a1a4e5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7798dd2615e081fa5c43f7673135396e3570eac84b1149ace12edae1a5a1a4e5?s=96&d=mm&r=g","caption":"Jocelyn Krystlik"},"description":"Jocelyn has varied experience in security: he spent eight years in consulting and product management for Arkoon until it was bought out by Stormshield\u2019s parent company, Airbus. Since 2014, he has been helping Stormshield's clients reduce their exposure to threats by providing expertise, advice, and training in data security, especially in the cloud. He played a key role in bringing Security Box, a corporate data security product, to market. He is currently Head of the Data Security Business Unit and Head of Business Development for the Defence sector.","sameAs":["http:\/\/#","https:\/\/x.com\/j_krystlik"]}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/23017","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=23017"}],"version-history":[{"count":6,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/23017\/revisions"}],"predecessor-version":[{"id":422189,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/23017\/revisions\/422189"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/24601"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=23017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=23017"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=23017"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=23017"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=23017"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=23017"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=23017"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=23017"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=23017"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=23017"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=23017"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=23017"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=23017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}