{"id":2714,"date":"2012-12-18T14:57:31","date_gmt":"2012-12-18T13:57:31","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=2714"},"modified":"2019-12-31T12:01:15","modified_gmt":"2019-12-31T11:01:15","slug":"byod-la-securite-nest-plus-un-frein","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/12\/byod-la-securite-nest-plus-un-frein\/","title":{"rendered":"BYOD : la s\u00e9curit\u00e9 n&#8217;est plus un frein !"},"content":{"rendered":"<p align=\"left\"><em>Les questions de s\u00e9curit\u00e9 sont parmi les premi\u00e8res abord\u00e9es lorsque la question du BYOD est \u00e9voqu\u00e9e.\u00a0Pourtant, un certain nombre de solutions existent et permettent de mettre les risques sous contr\u00f4le.<\/em><\/p>\n<h2 align=\"left\">Quels sont les risques induits par le BYOD ?<\/h2>\n<p align=\"left\">\u00a0Les risques techniques induits par le BYOD sont en grande partie des risques d\u00e9j\u00e0 existants pour la majorit\u00e9 des syst\u00e8mes mobiles.<br \/>\nOn peut en distinguer trois types\u00a0:<\/p>\n<ul>\n<li>Les risques de perte ou de vol des donn\u00e9es de l\u2019entreprise stock\u00e9es sur les terminaux eux-m\u00eames.<\/li>\n<li>Les risques de capture ou de modification de donn\u00e9es sur les r\u00e9seaux auxquels ils se connectent.<\/li>\n<li>Les risques pesant sur le SI lui-m\u00eame : il pourrait subir diff\u00e9rentes attaques amenant \u00e0 une infection virale, une perte ou un vol de donn\u00e9es, voire une coupure de service.<\/li>\n<\/ul>\n<p align=\"left\">\u00a0La nouveaut\u00e9 r\u00e9side ici dans le fait que les terminaux sont personnels, et font donc l\u2019objet d\u2019usages qui amplifient les risques : applications personnelles, configurations non ma\u00eetris\u00e9es par l\u2019entreprise, utilisation en dehors du travail\u2026<\/p>\n<p align=\"left\">\u00a0Il appara\u00eet donc n\u00e9cessaire de trouver des solutions acceptables pour g\u00e9rer et s\u00e9curiser ces usages.<\/p>\n<p align=\"left\">Dans le cas du BYOD, l\u2019ergonomie est aussi un crit\u00e8re de r\u00e9ussite majeur qui ne peut pas \u00eatre n\u00e9glig\u00e9 dans le choix de la solution \u00e0 mettre en \u0153uvre.<\/p>\n<h2 align=\"left\">\u00a0L\u2019approche s\u00e9curitaire : ne rien stocker !<\/h2>\n<p align=\"left\">Les solutions de d\u00e9port d\u2019\u00e9cran permettent \u00e0 tout type de terminal (ordinateur, tablette, <em>smartphone<\/em>\u2026) de se connecter \u00e0 un environnement ma\u00eetris\u00e9 par l\u2019entreprise. Aucune donn\u00e9e n\u2019est stock\u00e9e sur le terminal et les utilisateurs disposent d\u2019un environnement adapt\u00e9 \u00e0 leurs t\u00e2ches professionnelles. Ces solutions n\u00e9cessitent la mise en place d\u2019une infrastructure assez lourde et requi\u00e8rent une connexion internet rapide pour fonctionner. Leur ergonomie est tr\u00e8s d\u00e9pendante du terminal \u00e0 partir duquel on se connecte. Les applications de type web sont \u00e9galement une alternative \u00e9vitant le stockage de donn\u00e9es sur le terminal. Accessibles \u00e0 l\u2019aide d\u2019un navigateur \u00e0 travers n\u2019importe quelle connexion internet, elles ont l\u2019avantage de ne pas n\u00e9cessiter d\u2019installation.<\/p>\n<p align=\"left\">\u00a0Cependant, elles offrent une exp\u00e9rience utilisateur limit\u00e9e \u00e0 certains usages tr\u00e8s sp\u00e9cifiques et ne sont pas adapt\u00e9es aux terminaux de taille r\u00e9duite comme les <em>smartphones<\/em>.<\/p>\n<h2 align=\"left\"><strong>\u00a0<\/strong>L\u2019approche pragmatique : s\u00e9curiser les usages en contr\u00f4lant l\u2019ensemble du terminal\u2026<\/h2>\n<p align=\"left\">Il s\u2019agit de fournir des solutions permettant de s\u00e9curiser les terminaux sans interdire d\u2019y stocker des donn\u00e9es professionnelles. Elle se d\u00e9cline en deux types de m\u00e9thodes techniques.<\/p>\n<p align=\"left\">La premi\u00e8re m\u00e9thode est de ma\u00eetriser l\u2019int\u00e9gralit\u00e9 du terminal, \u00e0 l\u2019aide d\u2019outils de gestion de flotte (aussi appel\u00e9s outils de MDM \u2013 <em>Mobile<\/em> <em>Device Management<\/em>). Ces outils s\u2019apparentent aux solutions de gestion de parc, largement pr\u00e9sentes en entreprise pour les postes de travail. M\u00eame si le niveau de s\u00e9curit\u00e9 de ces solutions d\u00e9pend fortement du type de terminal, elles sont aujourd\u2019hui industrialis\u00e9es.<\/p>\n<p align=\"left\">\u00a0Elles ne marquent cependant pas de r\u00e9elle s\u00e9paration entre les usages (donn\u00e9es) personnels et professionnels. Les restrictions de s\u00e9curit\u00e9 \u00e9tant appliqu\u00e9es indiff\u00e9remment sur l\u2019ensemble du terminal, elles sont per\u00e7ues par les utilisateurs comme une contrainte impos\u00e9e dans leur sph\u00e8re personnelle. \u00c0 ce titre, elles r\u00e9pondent peu aux probl\u00e9matiques du BYOD.<\/p>\n<h2 align=\"left\">\u00a0\u2026ou en se concentrant sur la partie qui concerne l\u2019entreprise<\/h2>\n<p align=\"left\">L\u2019autre m\u00e9thode de s\u00e9curisation des terminaux est plus innovante. Il s\u2019agit d\u2019isoler les donn\u00e9es professionnelles des autres donn\u00e9es sur le terminal, au sein d\u2019un \u00ab silo \u00bb, qui prend la forme d\u2019une application ou d\u2019un espace d\u00e9di\u00e9. L\u2019entreprise peut ainsi imposer des crit\u00e8res de s\u00e9curit\u00e9 adapt\u00e9s sur\u00a0ces donn\u00e9es \u2013 et uniquement sur elles : mot de passe obligatoire, chiffrement des donn\u00e9es, etc.<\/p>\n<p align=\"left\">L\u2019utilisateur n\u2019est soumis \u00e0 ces contraintes que dans le cadre de l\u2019utilisation professionnelle, l\u2019usage du terminal \u00e9tant tout \u00e0 fait libre par ailleurs. Ce type de solution a l\u2019avantage d\u2019\u00eatre relativement ind\u00e9pendant du type de terminal sur lequel on l\u2019installe : le niveau de s\u00e9curit\u00e9 est ainsi homog\u00e8ne m\u00eame sur une flotte h\u00e9t\u00e9rog\u00e8ne.<\/p>\n<h2 align=\"left\">\u00a0D\u2019autres bonnes pratiques facilitent le BYOD<\/h2>\n<p align=\"left\"><strong>\u00a0<\/strong>Quelle que soit l\u2019orientation retenue, un certain nombre de bonnes pratiques pour la s\u00e9curit\u00e9 des infrastructures restent de mise : le contr\u00f4le d\u2019acc\u00e8s et de conformit\u00e9 au r\u00e9seau (NAC), la gestion des traces (par exemple pour les acc\u00e8s internet r\u00e9alis\u00e9s avec les terminaux), ou encore l\u2019utilisation d\u2019un wifi d\u00e9di\u00e9 lorsque les collaborateurs sont dans les locaux.<\/p>\n<p align=\"left\">Ces infrastructures, si elles ne permettent pas directement la mise en place du BYOD, sont en tout cas des \u00e9l\u00e9ments facilitateurs \u00e0 son adoption et son extension.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les questions de s\u00e9curit\u00e9 sont parmi les premi\u00e8res abord\u00e9es lorsque la question du BYOD est \u00e9voqu\u00e9e.\u00a0Pourtant, un certain nombre de solutions existent et permettent de mettre les risques sous contr\u00f4le. Quels sont les risques induits par le BYOD ? \u00a0Les&#8230;<\/p>\n","protected":false},"author":13,"featured_media":2638,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[64,762,246,81,3302],"coauthors":[801],"class_list":["post-2714","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-byod","tag-mdm","tag-mobilite","tag-protection-des-donnees","tag-security-architecture"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BYOD : la s\u00e9curit\u00e9 n&#039;est plus un frein !<\/title>\n<meta name=\"description\" content=\"Les questions de s\u00e9curit\u00e9 sont parmi les premi\u00e8res abord\u00e9es lorsque la question du BYOD est \u00e9voqu\u00e9e. Pourtant, un certain nombre de solutions existent et permettent de mettre les risques sous contr\u00f4le.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BYOD : la s\u00e9curit\u00e9 n&#039;est plus un frein !\" \/>\n<meta property=\"og:description\" content=\"Les questions de s\u00e9curit\u00e9 sont parmi les premi\u00e8res abord\u00e9es lorsque la question du BYOD est \u00e9voqu\u00e9e. Pourtant, un certain nombre de solutions existent et permettent de mettre les risques sous contr\u00f4le.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2012-12-18T13:57:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:01:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/11\/Fotolia_44190609_S.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"832\" \/>\n\t<meta property=\"og:image:height\" content=\"577\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chadi Hantouche\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chadi Hantouche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/\"},\"author\":{\"name\":\"Chadi Hantouche\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc\"},\"headline\":\"BYOD : la s\u00e9curit\u00e9 n&#8217;est plus un frein !\",\"datePublished\":\"2012-12-18T13:57:31+00:00\",\"dateModified\":\"2019-12-31T11:01:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/\"},\"wordCount\":837,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/11\/Fotolia_44190609_S.jpg\",\"keywords\":[\"BYOD\",\"MDM\",\"Mobilit\u00e9\",\"protection des donn\u00e9es\",\"security architecture\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/\",\"name\":\"BYOD : la s\u00e9curit\u00e9 n'est plus un frein !\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/11\/Fotolia_44190609_S.jpg\",\"datePublished\":\"2012-12-18T13:57:31+00:00\",\"dateModified\":\"2019-12-31T11:01:15+00:00\",\"description\":\"Les questions de s\u00e9curit\u00e9 sont parmi les premi\u00e8res abord\u00e9es lorsque la question du BYOD est \u00e9voqu\u00e9e. Pourtant, un certain nombre de solutions existent et permettent de mettre les risques sous contr\u00f4le.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/11\/Fotolia_44190609_S.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/11\/Fotolia_44190609_S.jpg\",\"width\":832,\"height\":577},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BYOD : la s\u00e9curit\u00e9 n&rsquo;est plus un frein !\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc\",\"name\":\"Chadi Hantouche\",\"description\":\"Chadi Hantouche is a Cybersecurity and Digital Trust Senior Manager at Wavestone. For more than a decade, he has helped companies assessing their risk and maturity level, and defining associated solutions. He has a focus on security to support innovative technologies (Big Data, Internet of Things, Cloud computing, Mobility) as well as prevention and reaction against cyberattacks. Chadi is a CISSP, ISO 27001 LI and ITIL certified professional. He is a regular speaker on French and international TV channels, newspapers and conferences, and lecturer in several computer science universities.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/chadi-hantouche\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BYOD : la s\u00e9curit\u00e9 n'est plus un frein !","description":"Les questions de s\u00e9curit\u00e9 sont parmi les premi\u00e8res abord\u00e9es lorsque la question du BYOD est \u00e9voqu\u00e9e. Pourtant, un certain nombre de solutions existent et permettent de mettre les risques sous contr\u00f4le.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/","og_locale":"en_US","og_type":"article","og_title":"BYOD : la s\u00e9curit\u00e9 n'est plus un frein !","og_description":"Les questions de s\u00e9curit\u00e9 sont parmi les premi\u00e8res abord\u00e9es lorsque la question du BYOD est \u00e9voqu\u00e9e. Pourtant, un certain nombre de solutions existent et permettent de mettre les risques sous contr\u00f4le.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/","og_site_name":"RiskInsight","article_published_time":"2012-12-18T13:57:31+00:00","article_modified_time":"2019-12-31T11:01:15+00:00","og_image":[{"width":832,"height":577,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/11\/Fotolia_44190609_S.jpg","type":"image\/jpeg"}],"author":"Chadi Hantouche","twitter_misc":{"Written by":"Chadi Hantouche","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/"},"author":{"name":"Chadi Hantouche","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc"},"headline":"BYOD : la s\u00e9curit\u00e9 n&#8217;est plus un frein !","datePublished":"2012-12-18T13:57:31+00:00","dateModified":"2019-12-31T11:01:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/"},"wordCount":837,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/11\/Fotolia_44190609_S.jpg","keywords":["BYOD","MDM","Mobilit\u00e9","protection des donn\u00e9es","security architecture"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/","url":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/","name":"BYOD : la s\u00e9curit\u00e9 n'est plus un frein !","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/11\/Fotolia_44190609_S.jpg","datePublished":"2012-12-18T13:57:31+00:00","dateModified":"2019-12-31T11:01:15+00:00","description":"Les questions de s\u00e9curit\u00e9 sont parmi les premi\u00e8res abord\u00e9es lorsque la question du BYOD est \u00e9voqu\u00e9e. Pourtant, un certain nombre de solutions existent et permettent de mettre les risques sous contr\u00f4le.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/11\/Fotolia_44190609_S.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/11\/Fotolia_44190609_S.jpg","width":832,"height":577},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/byod-la-securite-nest-plus-un-frein\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"BYOD : la s\u00e9curit\u00e9 n&rsquo;est plus un frein !"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc","name":"Chadi Hantouche","description":"Chadi Hantouche is a Cybersecurity and Digital Trust Senior Manager at Wavestone. For more than a decade, he has helped companies assessing their risk and maturity level, and defining associated solutions. He has a focus on security to support innovative technologies (Big Data, Internet of Things, Cloud computing, Mobility) as well as prevention and reaction against cyberattacks. Chadi is a CISSP, ISO 27001 LI and ITIL certified professional. He is a regular speaker on French and international TV channels, newspapers and conferences, and lecturer in several computer science universities.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/chadi-hantouche\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=2714"}],"version-history":[{"count":13,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2714\/revisions"}],"predecessor-version":[{"id":2724,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2714\/revisions\/2724"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/2638"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=2714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=2714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=2714"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=2714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}