{"id":1639,"date":"2012-03-19T16:01:54","date_gmt":"2012-03-19T15:01:54","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=1639"},"modified":"2015-08-17T10:54:25","modified_gmt":"2015-08-17T09:54:25","slug":"cloud-prive-a-la-recherche-du-graal","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/","title":{"rendered":"Cloud priv\u00e9, \u00e0 la recherche du Graal"},"content":{"rendered":"<p>Les \u00e9volutions de plus en plus rapides des besoins m\u00e9tiers ainsi que le d\u00e9veloppement des technologies poussent \u00e0 la transformation du syst\u00e8me d\u2019information dans l\u2019entreprise.<\/p>\n<p>La virtualisation de serveurs a apport\u00e9 un premier niveau de r\u00e9ponse \u00e0 ces besoins de flexibilit\u00e9 au sein du datacenter. Plus r\u00e9cemment, le cloud computing est arriv\u00e9 avec son lot de promesses d\u2019optimisations et de souplesse suppl\u00e9mentaire.<\/p>\n<p>Au-del\u00e0 des buzz g\u00e9n\u00e9r\u00e9s successivement autour de ces solutions, dans quelle continuit\u00e9 s\u2019inscrivent-elles et quelles diff\u00e9rences y a-t-il entre deux concepts souvent confondus ?<\/p>\n<h3><strong>Retour sur les \u00e9volutions apport\u00e9es par la virtualisation\u00a0<\/strong><\/h3>\n<p>La virtualisation syst\u00e8me consiste \u00e0 faire fonctionner sur un m\u00eame serveur physique plusieurs syst\u00e8mes d\u2019exploitation en parall\u00e8le. Ceci est r\u00e9alis\u00e9 au travers d\u2019un hyperviseur assurant aussi bien la virtualisation du serveur physique que celle de ses interfaces (r\u00e9seau, stockage\u2026). La virtualisation s\u2019inscrit ainsi dans le <a href=\"http:\/\/www.solucom.fr\/Publications\" target=\"_blank\">mod\u00e8le SOI<\/a> comme un moyen d\u2019impl\u00e9menter une couche \u00ab\u00a0ressource\u00a0\u00bb.<\/p>\n<p>La virtualisation permet\u00a0:<\/p>\n<ul>\n<li>De r\u00e9duire le nombre de serveurs physiques en les consolidant,<\/li>\n<li>De normaliser le socle d\u2019h\u00e9bergement des OS sous forme de VM,<\/li>\n<li>D\u2019am\u00e9liorer l\u2019agilit\u00e9\u00a0en r\u00e9duisant le temps de provisioning,<\/li>\n<li>De renforcer la disponibilit\u00e9 et la reprise d\u2019activit\u00e9\u00a0en offrant des m\u00e9canismes de migration et de red\u00e9marrage automatique int\u00e9gr\u00e9s.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>La virtualisation apporte ainsi de nombreux b\u00e9n\u00e9fices qu\u2019il reste \u00e0 bien mettre en balance face \u00e0 ses contraintes. En effet, il faut \u00a0noter qu\u2019elle a tendance \u00e0 augmenter la complexit\u00e9 de l\u2019architecture et de son exploitation et que la facilit\u00e9 de cr\u00e9ation des machines virtuelles peut provoquer une prolif\u00e9ration des instances de serveurs. Par ailleurs, la virtualisation g\u00e9n\u00e8re de nouvelles probl\u00e9matiques de s\u00e9curit\u00e9 \u00a0et peut \u00eatre source de contentions entre les services. Enfin, m\u00eames virtualis\u00e9es, le temps de d\u00e9ploiement des ressources reste cons\u00e9quent.<\/p>\n<h3>\u00a0<strong>Le cloud computing : au-del\u00e0 du buzz, un mode de consommation <\/strong><\/h3>\n<p>Depuis 2008, parall\u00e8lement \u00e0 l\u2019\u00e9volution interne des SI est apparu le cloud computing publique, promettant un niveau suppl\u00e9mentaire d\u2019agilit\u00e9 avec une mise \u00e0 disposition tr\u00e8s rapide de ressources \u00e9lastiques et une facturation adapt\u00e9e \u00e0 la consommation r\u00e9elle.<\/p>\n<p>Malgr\u00e9 les promesses du cloud public, les entreprises restent aujourd\u2019hui frileuses dans son adoption. Les freins majeurs \u00e9tant\u00a0 les risques de s\u00e9curit\u00e9 per\u00e7us (utilisation d\u2019internet, confidentialit\u00e9 des donn\u00e9es et soumission \u00e0 des lois locales \u00e0 l\u2019op\u00e9rateur) ainsi que la d\u00e9pendance aux fournisseurs engendr\u00e9e par le manque de standards.<\/p>\n<p>Une notion interm\u00e9diaire est donc apparue, le cloud priv\u00e9. Il a pour vocation d\u2019amener la flexibilit\u00e9 du cloud public dans le SI des entreprises tout en r\u00e9pondant aux r\u00e9ticences des DSI sur la s\u00e9curit\u00e9 et la fiabilit\u00e9 des services fournis.<\/p>\n<h3>\u00a0<strong>De la virtualisation au cloud priv\u00e9<\/strong><\/h3>\n<p>La mise en place d\u2019un cloud priv\u00e9 peut \u00eatre<a href=\"http:\/\/www.solucominsight.fr\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/schema-cloud\/\" rel=\"attachment wp-att-1640\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-1640\" title=\"sch\u00e9ma cloud\" src=\"http:\/\/www.solucominsight.fr\/wp-content\/uploads\/2012\/03\/sch%C3%A9ma-cloud.jpg\" alt=\"\" width=\"315\" height=\"155\" \/><\/a> vue comme un empilement de blocs fonctionnels mettant \u00e0 disposition des utilisateurs les ressources du SI en self-service, de mani\u00e8re automatis\u00e9e, tout en offrant un niveau de qualit\u00e9 de service et de s\u00e9curit\u00e9 calibr\u00e9.<\/p>\n<p>Pour obtenir une plate-forme de cloud priv\u00e9 interne IaaS*, les principales fonctionnalit\u00e9s agr\u00e9g\u00e9es autour d\u2019un socle de virtualisation syst\u00e8me \u00a0sont les suivantes\u00a0:<\/p>\n<ul>\n<li><strong>L\u2019automatisation du provisioning<\/strong>\u00a0: supprimer les actions manuelles des processus de mise \u00e0 disposition de ressources\u00a0;<\/li>\n<li><strong>L\u2019orchestration<\/strong>\u00a0: mettre en musique les actions sur les diff\u00e9rents composants de la plate-forme\u00a0;<\/li>\n<li><strong>La supervision<\/strong>\u00a0: contr\u00f4ler le bon fonctionnement et collecter les m\u00e9triques d\u2019usage\u00a0;<\/li>\n<li><strong>L\u2019authentification\u00a0et le contr\u00f4le d\u2019acc\u00e8s<\/strong> : g\u00e9rer finement les droits d\u2019acc\u00e8s aux ressources et \u00e0 leur administration\u00a0;<\/li>\n<li><strong>Le portail self-service<\/strong>\u00a0: permettre \u00e0 l\u2019utilisateur de r\u00e9aliser ses demandes de cr\u00e9ation, modifications, et \u00e9ventuellement suppression de ressources ainsi qu\u2019en consulter les informations (inventaire, facturation, utilisation\u2026)\u00a0;<\/li>\n<li><strong>La refacturation\u00a0\u00e0 l\u2019usage<\/strong> : traduire les m\u00e9triques d\u2019utilisation des ressources en termes budg\u00e9taires et les basculer dans les syst\u00e8mes de gestion internes\u00a0;<\/li>\n<li><strong>Le catalogue de service<\/strong>\u00a0: \u00eatre le r\u00e9f\u00e9rentiel des caract\u00e9ristiques de ce qui peut \u00eatre d\u00e9ploy\u00e9.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>La majorit\u00e9 de ces blocs existent d\u00e9j\u00e0 dans les SI et sont alors adapt\u00e9s \u00e0 l\u2019occasion du passage au cloud priv\u00e9. Ce passage s\u2019inscrit dans une d\u00e9marche d\u2019\u00e9volution \u00e0 la suite des travaux de normalisation et standardisation, de catalogues de services, d\u2019automatisation et mise en place de strat\u00e9gies self-service dans les DSI. C\u2019est un mouvement pr\u00e9curseur des grandes tendances d\u2019automatisation globale du SI.<\/p>\n<p>[Article r\u00e9dig\u00e9 en collaboration avec Julien Contal et Aur\u00e9lien Delcros]<\/p>\n<p>Pour en savoir plus sur la virtualisation et le cloud computing, consulter la synth\u00e8se Solucom\u00a0:\u00a0<a href=\"http:\/\/www.solucom.fr\/Publications\/Synthese-n-37-Virtualisation-et-cloud-computing-jusqu-ou-aller\">Virtualisation et cloud computing\u00a0: jusqu\u2019o\u00f9 aller\u00a0?\u00a0<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><em><span style=\"font-size: x-small;\">* : Le march\u00e9 du cloud priv\u00e9 est structur\u00e9 de la m\u00eame facon que le cloud publique entre SaaS, PaaS et IaaS. Ce billet traite principalement du cloud priv\u00e9 interne IaaS. La structuration de ce march\u00e9 est d\u00e9crite dans la synth\u00e8se <a href=\"http:\/\/www.solucom.fr\/Publications\/Synthese-n-37-Virtualisation-et-cloud-computing-jusqu-ou-aller\">Virtualisation et cloud computing\u00a0: jusqu\u2019o\u00f9 aller\u00a0?\u00a0<\/a><\/span><\/em><\/p>\n<div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Les \u00e9volutions de plus en plus rapides des besoins m\u00e9tiers ainsi que le d\u00e9veloppement des technologies poussent \u00e0 la transformation du syst\u00e8me d\u2019information dans l\u2019entreprise. La virtualisation de serveurs a apport\u00e9 un premier niveau de r\u00e9ponse \u00e0 ces besoins de&#8230;<\/p>\n","protected":false},"author":31,"featured_media":3381,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[35],"tags":[120,402,51,403,355],"coauthors":[909,1014],"class_list":["post-1639","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-strategie-projets-it","tag-architecture-si-2","tag-automatisation","tag-dsi","tag-soi","tag-virtualisation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cloud priv\u00e9, \u00e0 la recherche du Graal - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud priv\u00e9, \u00e0 la recherche du Graal - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Les \u00e9volutions de plus en plus rapides des besoins m\u00e9tiers ainsi que le d\u00e9veloppement des technologies poussent \u00e0 la transformation du syst\u00e8me d\u2019information dans l\u2019entreprise. La virtualisation de serveurs a apport\u00e9 un premier niveau de r\u00e9ponse \u00e0 ces besoins de...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2012-03-19T15:01:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-08-17T09:54:25+00:00\" \/>\n<meta name=\"author\" content=\"Yannick Neff, Julien Contal\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yannick Neff, Julien Contal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/\"},\"author\":{\"name\":\"Yannick Neff\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8dd86ea6c55fe2fb6d9339d101e24bfd\"},\"headline\":\"Cloud priv\u00e9, \u00e0 la recherche du Graal\",\"datePublished\":\"2012-03-19T15:01:54+00:00\",\"dateModified\":\"2015-08-17T09:54:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/\"},\"wordCount\":863,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"architecture Si\",\"automatisation\",\"DSI\",\"SOI\",\"virtualisation\"],\"articleSection\":[\"M\u00e9tiers - Strat\u00e9gie &amp; projets IT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/\",\"name\":\"Cloud priv\u00e9, \u00e0 la recherche du Graal - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2012-03-19T15:01:54+00:00\",\"dateModified\":\"2015-08-17T09:54:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud priv\u00e9, \u00e0 la recherche du Graal\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8dd86ea6c55fe2fb6d9339d101e24bfd\",\"name\":\"Yannick Neff\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/yannick-neff\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud priv\u00e9, \u00e0 la recherche du Graal - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/","og_locale":"en_US","og_type":"article","og_title":"Cloud priv\u00e9, \u00e0 la recherche du Graal - RiskInsight","og_description":"Les \u00e9volutions de plus en plus rapides des besoins m\u00e9tiers ainsi que le d\u00e9veloppement des technologies poussent \u00e0 la transformation du syst\u00e8me d\u2019information dans l\u2019entreprise. La virtualisation de serveurs a apport\u00e9 un premier niveau de r\u00e9ponse \u00e0 ces besoins de...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/","og_site_name":"RiskInsight","article_published_time":"2012-03-19T15:01:54+00:00","article_modified_time":"2015-08-17T09:54:25+00:00","author":"Yannick Neff, Julien Contal","twitter_misc":{"Written by":"Yannick Neff, Julien Contal","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/"},"author":{"name":"Yannick Neff","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8dd86ea6c55fe2fb6d9339d101e24bfd"},"headline":"Cloud priv\u00e9, \u00e0 la recherche du Graal","datePublished":"2012-03-19T15:01:54+00:00","dateModified":"2015-08-17T09:54:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/"},"wordCount":863,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/#primaryimage"},"thumbnailUrl":"","keywords":["architecture Si","automatisation","DSI","SOI","virtualisation"],"articleSection":["M\u00e9tiers - Strat\u00e9gie &amp; projets IT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/","url":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/","name":"Cloud priv\u00e9, \u00e0 la recherche du Graal - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/#primaryimage"},"thumbnailUrl":"","datePublished":"2012-03-19T15:01:54+00:00","dateModified":"2015-08-17T09:54:25+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/cloud-prive-a-la-recherche-du-graal\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cloud priv\u00e9, \u00e0 la recherche du Graal"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8dd86ea6c55fe2fb6d9339d101e24bfd","name":"Yannick Neff","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/yannick-neff\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=1639"}],"version-history":[{"count":18,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1639\/revisions"}],"predecessor-version":[{"id":8167,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1639\/revisions\/8167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=1639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=1639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=1639"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=1639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}