{"id":1710,"date":"2012-03-13T17:08:09","date_gmt":"2012-03-13T16:08:09","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=1710"},"modified":"2019-12-30T18:05:49","modified_gmt":"2019-12-30T17:05:49","slug":"byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/","title":{"rendered":"BYOD et DSI : quelles marges de man\u0153uvre pour s\u00e9curiser les donn\u00e9es de l\u2019entreprise ?"},"content":{"rendered":"<p>Selon une \u00e9tude men\u00e9e en juin 2011 par Google, 14 millions de Fran\u00e7ais poss\u00e8dent un smartphone en France. En y ajoutant le nombre d\u2019utilisateurs de tablettes, estim\u00e9 \u00e0 environ 2 millions, les entreprises s\u2019adaptent \u00e0 ces nouveaux outils \u00e0 un nouveau mode d\u2019utilisation, m\u00ealant les aspects personnels et professionnels. Gain de productivit\u00e9, modernisme, souplesse d\u2019utilisation, motivation des collaborateurs sont autant de gains attendus.<\/p>\n<p>M\u00eame s\u2019il est aujourd\u2019hui peu probable que l\u2019ensemble des collaborateurs soient pr\u00eats \u00e0 acheter eux-m\u00eames leur mat\u00e9riel avec une subvention de l\u2019entreprise, certains services ou processus peuvent se pr\u00eater \u00e0 ce type d\u2019innovation, en particulier dans les DSI ou pour des sites ayant des activit\u00e9s classiques de gestion, tels que les si\u00e8ges.<\/p>\n<p>Aujourd\u2019hui 3 grands chantiers se d\u00e9gagent pour le DSI : la protection du r\u00e9seau, l\u2019acc\u00e8s aux applications et l\u2019encadrement des pratiques par une charte sp\u00e9cifique.<\/p>\n<h2>Comment prot\u00e9ger les informations de l\u2019entreprise lorsque le collaborateur utilise son \u00e9quipement personnel\u00a0?<\/h2>\n<p>Lors de la connexion de postes non ma\u00eetris\u00e9s (et surtout non ma\u00eetrisables), il est essentiel de prot\u00e9ger la disponibilit\u00e9 de son r\u00e9seau. Ceci passe par la mise en \u0153uvre soit d\u2019un contr\u00f4le d\u2019acc\u00e8s au r\u00e9seau local qui isolera les postes dans un espace d\u00e9di\u00e9, soit par la mise en place d\u2019un r\u00e9seau Wi-Fi parall\u00e8le d\u00e9di\u00e9 \u00e0 cet usage. Il sera alors possible d\u2019isoler les postes les uns des autres et de leur donner acc\u00e8s \u00e0 des services basiques (acc\u00e8s internet par exemple).<\/p>\n<h2>Comment faire pour avoir acc\u00e8s aux applications des entreprises\u00a0?<\/h2>\n<p>Une fois isol\u00e9, le poste personnel doit cependant toujours pouvoir acc\u00e9der aux applications et aux donn\u00e9es de l\u2019entreprise. Ceci sans avoir un syst\u00e8me d\u2019exploitation compatible (MacOS, Linux, iOS, Android\u2026) et sans avoir la possibilit\u00e9 de faire fuir facilement des informations. La solution la plus simple est la virtualisation du poste de travail et des applications. En utilisant un client de d\u00e9port d\u2019\u00e9cran (de type Terminal Service ou Citrix, parfois m\u00eame en mode web), l\u2019utilisateur pourra se connecter \u00e0 un poste virtuel, \u00e9quivalent \u00e0 un poste classique. Il aura alors acc\u00e8s \u00e0 l\u2019ensemble des applications depuis cette bulle isol\u00e9e et ma\u00eetris\u00e9e par l\u2019entreprise. M\u00eame si cette solution n\u2019embrasse pas compl\u00e8tement le mod\u00e8le BYOD, qui pr\u00f4ne l\u2019utilisation des applications natives du poste, elle permet de garantir une compatibilit\u00e9 avec l\u2019existant, un niveau de s\u00e9curit\u00e9 acceptable et elle simplifie les habituels casse-t\u00eates de l\u2019acc\u00e8s aux ressources locales (imprimantes, etc.).<\/p>\n<h2>De quels moyens dispose le DSI pour sensibiliser ses collaborateurs \u00e0 ces nouveaux usages\u00a0?<\/h2>\n<p>Ces solutions ne sont utiles qu\u2019encadr\u00e9es par une charte d\u2019usage claire et pr\u00e9cise, abordant les points accept\u00e9s et ceux interdits. Ce document est \u00e9galement n\u00e9cessaire pour encadrer les nombreux points non directement li\u00e9s au SI mais plut\u00f4t aux aspects RH et juridiques (assurance des \u00e9quipements, propri\u00e9t\u00e9s des donn\u00e9es, acc\u00e8s en cas d\u2019investigations\/d\u2019incidents\u2026).<\/p>\n<p>L\u2019av\u00e8nement du BYOD passe certainement par la mise en place de m\u00e9canismes encore plus simples, permettant un acc\u00e8s direct aux donn\u00e9es. Mais ceci n\u00e9cessite une protection au plus pr\u00e8s des informations et l\u2019\u00e9valuation dynamique de la s\u00e9curit\u00e9 des \u00e9quipements utilis\u00e9s par les applications. Aujourd\u2019hui, ces technologies ne sont malheureusement pas encore assez m\u00fbres pour permettre des d\u00e9ploiements larges.<\/p>\n<p>Heureusement des solutions efficaces et disponibles d\u00e8s aujourd\u2019hui existent pour permettre l\u2019arriv\u00e9e du BYOD. Cependant, les investissements d\u2019infrastructure sont importants. L\u2019\u00e9quation \u00e9conomique devra donc \u00eatre d\u00e9finie et valid\u00e9e dans chaque entreprise en fonction de son existant (contr\u00f4le d\u2019acc\u00e8s r\u00e9seau\/ postes virtuels) et des gains apport\u00e9s par ces usages innovants !<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Selon une \u00e9tude men\u00e9e en juin 2011 par Google, 14 millions de Fran\u00e7ais poss\u00e8dent un smartphone en France. En y ajoutant le nombre d\u2019utilisateurs de tablettes, estim\u00e9 \u00e0 environ 2 millions, les entreprises s\u2019adaptent \u00e0 ces nouveaux outils \u00e0 un&#8230;<\/p>\n","protected":false},"author":15,"featured_media":2652,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[64,423,81,399],"coauthors":[837],"class_list":["post-1710","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-byod","tag-equipement-personnel","tag-protection-des-donnees","tag-usages"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BYOD et DSI : quelles marges de man\u0153uvre pour s\u00e9curiser les donn\u00e9es de l\u2019entreprise ?<\/title>\n<meta name=\"description\" content=\"Selon une \u00e9tude men\u00e9e en juin 2011 par Google, 14 millions de Fran\u00e7ais poss\u00e8dent un smartphone en France. En y ajoutant le nombre d\u2019utilisateurs de tablettes, estim\u00e9 \u00e0 environ 2 millions, les entreprises s\u2019adaptent \u00e0 ces nouveaux outils \u00e0 un nouveau mode d\u2019utilisation, m\u00ealant les aspects personnels et professionnels. Gain de productivit\u00e9, modernisme, souplesse d\u2019utilisation, motivation des collaborateurs sont autant de gains attendus.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BYOD et DSI : quelles marges de man\u0153uvre pour s\u00e9curiser les donn\u00e9es de l\u2019entreprise ?\" \/>\n<meta property=\"og:description\" content=\"Selon une \u00e9tude men\u00e9e en juin 2011 par Google, 14 millions de Fran\u00e7ais poss\u00e8dent un smartphone en France. En y ajoutant le nombre d\u2019utilisateurs de tablettes, estim\u00e9 \u00e0 environ 2 millions, les entreprises s\u2019adaptent \u00e0 ces nouveaux outils \u00e0 un nouveau mode d\u2019utilisation, m\u00ealant les aspects personnels et professionnels. Gain de productivit\u00e9, modernisme, souplesse d\u2019utilisation, motivation des collaborateurs sont autant de gains attendus.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2012-03-13T16:08:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-30T17:05:49+00:00\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"BYOD et DSI : quelles marges de man\u0153uvre pour s\u00e9curiser les donn\u00e9es de l\u2019entreprise ?\",\"datePublished\":\"2012-03-13T16:08:09+00:00\",\"dateModified\":\"2019-12-30T17:05:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/\"},\"wordCount\":679,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"BYOD\",\"\u00e9quipement personnel\",\"protection des donn\u00e9es\",\"usages\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/\",\"name\":\"BYOD et DSI : quelles marges de man\u0153uvre pour s\u00e9curiser les donn\u00e9es de l\u2019entreprise ?\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2012-03-13T16:08:09+00:00\",\"dateModified\":\"2019-12-30T17:05:49+00:00\",\"description\":\"Selon une \u00e9tude men\u00e9e en juin 2011 par Google, 14 millions de Fran\u00e7ais poss\u00e8dent un smartphone en France. En y ajoutant le nombre d\u2019utilisateurs de tablettes, estim\u00e9 \u00e0 environ 2 millions, les entreprises s\u2019adaptent \u00e0 ces nouveaux outils \u00e0 un nouveau mode d\u2019utilisation, m\u00ealant les aspects personnels et professionnels. Gain de productivit\u00e9, modernisme, souplesse d\u2019utilisation, motivation des collaborateurs sont autant de gains attendus.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BYOD et DSI : quelles marges de man\u0153uvre pour s\u00e9curiser les donn\u00e9es de l\u2019entreprise ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BYOD et DSI : quelles marges de man\u0153uvre pour s\u00e9curiser les donn\u00e9es de l\u2019entreprise ?","description":"Selon une \u00e9tude men\u00e9e en juin 2011 par Google, 14 millions de Fran\u00e7ais poss\u00e8dent un smartphone en France. En y ajoutant le nombre d\u2019utilisateurs de tablettes, estim\u00e9 \u00e0 environ 2 millions, les entreprises s\u2019adaptent \u00e0 ces nouveaux outils \u00e0 un nouveau mode d\u2019utilisation, m\u00ealant les aspects personnels et professionnels. Gain de productivit\u00e9, modernisme, souplesse d\u2019utilisation, motivation des collaborateurs sont autant de gains attendus.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/","og_locale":"en_US","og_type":"article","og_title":"BYOD et DSI : quelles marges de man\u0153uvre pour s\u00e9curiser les donn\u00e9es de l\u2019entreprise ?","og_description":"Selon une \u00e9tude men\u00e9e en juin 2011 par Google, 14 millions de Fran\u00e7ais poss\u00e8dent un smartphone en France. En y ajoutant le nombre d\u2019utilisateurs de tablettes, estim\u00e9 \u00e0 environ 2 millions, les entreprises s\u2019adaptent \u00e0 ces nouveaux outils \u00e0 un nouveau mode d\u2019utilisation, m\u00ealant les aspects personnels et professionnels. Gain de productivit\u00e9, modernisme, souplesse d\u2019utilisation, motivation des collaborateurs sont autant de gains attendus.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/","og_site_name":"RiskInsight","article_published_time":"2012-03-13T16:08:09+00:00","article_modified_time":"2019-12-30T17:05:49+00:00","author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"BYOD et DSI : quelles marges de man\u0153uvre pour s\u00e9curiser les donn\u00e9es de l\u2019entreprise ?","datePublished":"2012-03-13T16:08:09+00:00","dateModified":"2019-12-30T17:05:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/"},"wordCount":679,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/#primaryimage"},"thumbnailUrl":"","keywords":["BYOD","\u00e9quipement personnel","protection des donn\u00e9es","usages"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/","name":"BYOD et DSI : quelles marges de man\u0153uvre pour s\u00e9curiser les donn\u00e9es de l\u2019entreprise ?","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/#primaryimage"},"thumbnailUrl":"","datePublished":"2012-03-13T16:08:09+00:00","dateModified":"2019-12-30T17:05:49+00:00","description":"Selon une \u00e9tude men\u00e9e en juin 2011 par Google, 14 millions de Fran\u00e7ais poss\u00e8dent un smartphone en France. En y ajoutant le nombre d\u2019utilisateurs de tablettes, estim\u00e9 \u00e0 environ 2 millions, les entreprises s\u2019adaptent \u00e0 ces nouveaux outils \u00e0 un nouveau mode d\u2019utilisation, m\u00ealant les aspects personnels et professionnels. Gain de productivit\u00e9, modernisme, souplesse d\u2019utilisation, motivation des collaborateurs sont autant de gains attendus.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-et-dsi-quelles-marges-de-manoeuvre-pour-securiser-les-donnees-de-lentreprise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"BYOD et DSI : quelles marges de man\u0153uvre pour s\u00e9curiser les donn\u00e9es de l\u2019entreprise ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=1710"}],"version-history":[{"count":7,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1710\/revisions"}],"predecessor-version":[{"id":2962,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1710\/revisions\/2962"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=1710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=1710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=1710"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=1710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}