{"id":1002,"date":"2011-09-21T00:10:49","date_gmt":"2011-09-20T22:10:49","guid":{"rendered":"http:\/\/www.auditsi.eu\/?p=1002"},"modified":"2011-09-22T23:59:43","modified_gmt":"2011-09-22T21:59:43","slug":"article-les-echos-comment-manager-son-passage-au-%c2%ab-cloud-computing%c2%bb","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=1002","title":{"rendered":"Article Les Echos : Comment manager son passage au \u00ab Cloud computing\u00bb ?"},"content":{"rendered":"<p style=\"text-align: justify;\">A premi\u00e8re vue, le \u00ab Cloud computing \u00bb, en rendant l&#8217;informatique simple et peu co\u00fbteuse, n&#8217;a que des avantages. Mais attention aux mirages, expliquent Bruno Hamon et Christophe D&#8217;ARCY, sp\u00e9cialistes du management de la s\u00e9curit\u00e9 de l&#8217;information *. Il convient de prendre quelques pr\u00e9cautions afin d&#8217;\u00e9viter de mettre en p\u00e9ril le patrimoine informationnel de l&#8217;entreprise lors du transfert \u00ab dans les nuages \u00bb. Quelques conseils pour garder&#8230;les pieds sur Terre !<\/p>\n<p style=\"text-align: justify;\">[&#8230;]<\/p>\n<p style=\"text-align: justify;\">Axes \u00e0 privil\u00e9gier :<\/p>\n<p style=\"text-align: justify;\">&#8211; Prot\u00e9ger son patrimoine informationnel,<\/p>\n<p style=\"text-align: justify;\">&#8211; Valider les engagements contractuels et juridiques,<\/p>\n<p style=\"text-align: justify;\">&#8211; Prendre garde aux \u00ab hackers \u00bb,<\/p>\n<p style=\"text-align: justify;\">&#8211; Des vuln\u00e9rabilit\u00e9s pendant le transfert.<\/p>\n<p style=\"text-align: justify;\">Lire l&#8217;article complet sur le site Les Echos (20\/09\/2011) :<\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.lesechos.fr\/management\/idees-neuves\/0201647268860-comment-manager-son-passage-au-cloud-computing-221709.php\">http:\/\/www.lesechos.fr\/management\/idees-neuves\/0201647268860-comment-manager-son-passage-au-cloud-computing-221709.php<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Article%20Les%20Echos%20%3A%20Comment%20manager%20son%20passage%20au%20%C2%AB%20Cloud%20computing%C2%BB%20%3F\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>A premi\u00e8re vue, le \u00ab Cloud computing \u00bb, en rendant l&#8217;informatique simple et peu co\u00fbteuse, n&#8217;a que des avantages. Mais attention aux mirages, expliquent Bruno Hamon et Christophe D&#8217;ARCY, sp\u00e9cialistes du management de la s\u00e9curit\u00e9 de l&#8217;information *. Il convient de prendre quelques pr\u00e9cautions afin d&#8217;\u00e9viter de mettre en p\u00e9ril le patrimoine informationnel de l&#8217;entreprise &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=1002\" class=\"more-link\">Continue reading &lsquo;Article Les Echos : Comment manager son passage au \u00ab Cloud computing\u00bb ?&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Article%20Les%20Echos%20%3A%20Comment%20manager%20son%20passage%20au%20%C2%AB%20Cloud%20computing%C2%BB%20%3F\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[31,35,24,33],"tags":[473,123,476,214,477,474,118,137,1629,475,1628,1624],"class_list":["post-1002","post","type-post","status-publish","format-standard","hentry","category-articles-de-magazine-journal","category-securite-informatique","category-systeme-dinformation","category-systeme-informatique","tag-cloud-computing","tag-confidentialite","tag-engagements-contractuels","tag-externalisation-de-la-fonction-informatique","tag-hackers","tag-nuage","tag-piratage","tag-politique-de-securite","tag-protection-des-donnees","tag-saas","tag-securite-informatique","tag-systeme-dinformation"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/1002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1002"}],"version-history":[{"count":0,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/1002\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}