{"id":69,"date":"2011-02-25T11:38:09","date_gmt":"2011-02-25T10:38:09","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=69"},"modified":"2014-11-28T15:59:15","modified_gmt":"2014-11-28T14:59:15","slug":"les-operateurs-acteurs-naturels-du-cloud-computing","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/","title":{"rendered":"Les op\u00e9rateurs, acteurs naturels du cloud computing"},"content":{"rendered":"<h2>Qu&#8217;est ce que le Cloud computing\u00a0 ?<\/h2>\n<p>V\u00e9ritable <strong>transformation du SI<\/strong>, l\u2019\u00ab\u00a0informatique dans les nuages\u00a0\u00bb s\u2019accompagne de <strong>nouveaux besoins<\/strong>, <strong>nouvelles pratiques<\/strong> et d\u2019un <strong>nouveau mod\u00e8le \u00e9conomique<\/strong>. A l\u2019\u00e8re des investissements lourds en Datacenter et infrastructures succ\u00e8deront les services h\u00e9berg\u00e9s, factur\u00e9s \u00e0 l\u2019usage.<\/p>\n<p><!--more-->Les offres Cloud du march\u00e9 IT\u00a0 couvrent l\u2019ensemble des mod\u00e8les de services Cloud\u00a0: IaaS (Infrastructure as a Service), PaaS (Platform as a Service) et SaaS (Software as a Service).<\/p>\n<p>Aussi, on retrouve sous la banni\u00e8re du Cloud des acteurs allant de l\u2019\u00e9diteur de logiciels \u00e0 l\u2019acteur issu du monde de l\u2019e-business en passant par l\u2019expert en solutions de virtualisation\u2026.ou l\u2019op\u00e9rateur de T\u00e9l\u00e9coms.<\/p>\n<h2>Que font les op\u00e9rateurs t\u00e9l\u00e9com dans les nuages\u00a0?<\/h2>\n<p>Pour d\u00e9ployer l\u2019ensemble des services Cloud, la base est indispensable\u00a0; et cette base, c\u2019est l\u2019IaaS \u2013 les infrastructures\u2026<\/p>\n<p>Experts dans la conception, la production et l\u2019exploitation de solutions de communications entreprises, les op\u00e9rateurs ont donc une carte \u00e0 jouer.<\/p>\n<p>Certains op\u00e9rateurs proposent d\u00e9j\u00e0 des offres Cloud, \u00e0 base de solutions de virtualisation d\u2019infrastructure et d\u2019acc\u00e8s r\u00e9seaux \u00e0 la carte\u00a0\/ \u00e0 la demande. C\u2019est le cas de <a href=\"http:\/\/www.verizonbusiness.com\/fr\/products\/itsolutions\/caas\/\" target=\"_blank\">Verizon Business<\/a> avec CaaS (Computer as a Service)\u00a0 et de l\u2019offre <a href=\"http:\/\/www.orange-business.com\/fr\/entreprise\/real-times\/solutions-it\/infrastructures\/flexible-computing-premium\/\" target=\"_blank\">Flexible Computing<\/a> d\u2019Orange business Service, d\u00e9clin\u00e9e en version premium depuis D\u00e9cembre 2010. SFR a de son c\u00f4t\u00e9 lanc\u00e9 en France une offre <a href=\"http:\/\/www.sfrbusinessteam.fr\/nos-solutions\/services-herberges\/infrastructure-SI\" target=\"_blank\">Infrastructure SI \u00e0 la Demande<\/a> le 30 juin dernier. L\u2019op\u00e9rateur s\u2019est pour cela alli\u00e9 \u00e0 HP qui fournit l\u2019expertise Infrastructure manquant \u00e0 l\u2019op\u00e9rateur.<\/p>\n<h2>Des atouts ind\u00e9niables<\/h2>\n<p>Les op\u00e9rateurs de t\u00e9l\u00e9coms b\u00e9n\u00e9ficient d\u2019une notori\u00e9t\u00e9 et d\u2019un capital confiance in\u00e9gal\u00e9s dans le monde des solutions et services informatiques. Par ailleurs, alors que <strong>s\u00e9curit\u00e9<\/strong> et \u00a0<strong>d\u00e9pendance au r\u00e9seau<\/strong> sont \u00e9voqu\u00e9s comme des freins majeurs, ils y offrent des r\u00e9ponses concr\u00e8tes.<\/p>\n<p>&#8211; S\u00e9curit\u00e9\u00a0: les op\u00e9rateurs proposent des solutions d\u2019interconnexion d\u2019utilisateurs, de sites ou\u00a0d\u2019infrastructures s\u00e9curis\u00e9s depuis plusieurs ann\u00e9es.<\/p>\n<p>&#8211; D\u00e9pendance au r\u00e9seau\u00a0: les op\u00e9rateurs exploitent des solutions Tr\u00e8s Haut D\u00e9bit de moins en moins ch\u00e8res, avec une disponibilit\u00e9 bien souvent garantie \u00e0 100% et des engagements de niveaux de service associ\u00e9s.<\/p>\n<p>Ils disposent en outre d\u2019avantages concurrentiels \u00e9tablis sur ce march\u00e9 (<strong>client\u00e8le mixte entreprises et grand public<\/strong>, <strong>expertise en infrastructure et r\u00e9seau, couverture globale et\u00a0capacit\u00e9 d\u2019intervention IT locale<\/strong>) et sont rod\u00e9s au mod\u00e8le \u00e9conomique de facturation \u00e0 l\u2019usage, caract\u00e9ristique du Cloud.<\/p>\n<h2>Un positionnement appel\u00e9 \u00e0 \u00e9voluer<\/h2>\n<p>Le positionnement des principaux offreurs du march\u00e9 se veut de plus en plus \u00ab\u00a0<strong>g\u00e9n\u00e9raliste<\/strong> \u00bb. Apr\u00e8s avoir capitalis\u00e9 sur leurs c\u0153urs de m\u00e9tier respectifs (\u00e9dition, gestion d\u2019infrastructures, r\u00e9seau) ils cherchent \u00e0 \u00e9largir l\u2019empreinte de leurs offres.<\/p>\n<p>Pour les op\u00e9rateurs notamment, cela passe par des alliances strat\u00e9giques avec les offreurs actifs sur les autres couches de la pyramide. Par exemple, Orange Business Services s\u2019allie \u00e0 Microsoft pour int\u00e9grer des solutions de messagerie et de collaboration de la <a href=\"http:\/\/office365.microsoft.com\/en-US\/online-services.aspx\" target=\"_blank\">plate-forme Microsoft Office 365<\/a>, h\u00e9berg\u00e9e dans le Cloud. Dans ce cas, l\u2019op\u00e9rateur global qu\u2019est France-T\u00e9l\u00e9com Orange, met \u00e9galement \u00e0 profit son savoir faire et ses ressources disponibles dans l\u2019int\u00e9gration de solutions informatiques.<\/p>\n<h2>Quelles perspectives ?<\/h2>\n<p>Le march\u00e9 du Cloud n\u2019en est vraisemblablement qu\u2019\u00e0 ses d\u00e9buts, mais il dispose d\u2019un potentiel de croissance fort que d\u00e9notent les investissements consentis sur le sujet et les premiers bilans \u00e9conomiques.<\/p>\n<p>On ne compte plus les parall\u00e8les pour \u00e9voquer cette croissance attendue, par exemple avec la VoIP, un march\u00e9 aujourd\u2019hui mature et au c\u0153ur de la srat\u00e9gie des op\u00e9rateurs de t\u00e9l\u00e9coms.<\/p>\n<p>Selon la plupart des acteurs du Cloud que j\u2019ai pu rencontrer, ce march\u00e9 repr\u00e9senterait 50% du march\u00e9 total de l\u2019IT dans le monde \u00e0 horizon 5 ans. Ce palier de 50% demeurera la limite \u00ab\u00a0physique\u00a0\u00bb de d\u00e9veloppement du Cloud, tout l\u2019IT n\u2019ayant pas vocation \u00e0 \u00ab\u00a0basculer\u00a0\u00bb.<\/p>\n<p>Pour les analystes il devrait peser en 2015 dans le monde, entre 200 Mrd$ et 500 Mrd$. Le march\u00e9 Fran\u00e7ais pourrait \u00eatre estim\u00e9 entre 10Mrd\u20ac et 20Mrd\u20ac cette m\u00eame ann\u00e9e (estimation Solucom).<\/p>\n<p>Il y a fort \u00e0 parier que St\u00e9phane Richard, Directeur G\u00e9n\u00e9ral du groupe France T\u00e9l\u00e9com, avait ces chiffres en t\u00eate en l\u2019identifiant comme levier de croissance cl\u00e9 dans le cadre du plan strat\u00e9gique \u00ab conqu\u00eates 2015\u00a0\u00bb. Chiffres qui vont avec la certitude que les op\u00e9rateurs disposent des atouts pour qu\u2019une part importante du g\u00e2teau leur revienne d\u2019ici 2015.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Qu&#8217;est ce que le Cloud computing\u00a0 ? V\u00e9ritable transformation du SI, l\u2019\u00ab\u00a0informatique dans les nuages\u00a0\u00bb s\u2019accompagne de nouveaux besoins, nouvelles pratiques et d\u2019un nouveau mod\u00e8le \u00e9conomique. A l\u2019\u00e8re des investissements lourds en Datacenter et infrastructures succ\u00e8deront les services h\u00e9berg\u00e9s, factur\u00e9s&#8230;<\/p>\n","protected":false},"author":115,"featured_media":6343,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[43],"tags":[44,89,90,73],"coauthors":[957],"class_list":["post-69","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-telcos","tag-cloud-computing","tag-iaas","tag-paas","tag-saas"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les op\u00e9rateurs, acteurs naturels du cloud computing - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les op\u00e9rateurs, acteurs naturels du cloud computing - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Qu&#8217;est ce que le Cloud computing\u00a0 ? V\u00e9ritable transformation du SI, l\u2019\u00ab\u00a0informatique dans les nuages\u00a0\u00bb s\u2019accompagne de nouveaux besoins, nouvelles pratiques et d\u2019un nouveau mod\u00e8le \u00e9conomique. A l\u2019\u00e8re des investissements lourds en Datacenter et infrastructures succ\u00e8deront les services h\u00e9berg\u00e9s, factur\u00e9s...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2011-02-25T10:38:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-11-28T14:59:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lo\u00efc Michel\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lo\u00efc Michel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/\"},\"author\":{\"name\":\"Lo\u00efc Michel\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/123c67162b4a01504cc890e6f487905b\"},\"headline\":\"Les op\u00e9rateurs, acteurs naturels du cloud computing\",\"datePublished\":\"2011-02-25T10:38:09+00:00\",\"dateModified\":\"2014-11-28T14:59:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/\"},\"wordCount\":801,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"keywords\":[\"Cloud computing\",\"IaaS\",\"PaaS\",\"SaaS\"],\"articleSection\":[\"M\u00e9tiers - Telcos\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/\",\"name\":\"Les op\u00e9rateurs, acteurs naturels du cloud computing - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"datePublished\":\"2011-02-25T10:38:09+00:00\",\"dateModified\":\"2014-11-28T14:59:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les op\u00e9rateurs, acteurs naturels du cloud computing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/123c67162b4a01504cc890e6f487905b\",\"name\":\"Lo\u00efc Michel\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/loic-michel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les op\u00e9rateurs, acteurs naturels du cloud computing - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/","og_locale":"en_US","og_type":"article","og_title":"Les op\u00e9rateurs, acteurs naturels du cloud computing - RiskInsight","og_description":"Qu&#8217;est ce que le Cloud computing\u00a0 ? V\u00e9ritable transformation du SI, l\u2019\u00ab\u00a0informatique dans les nuages\u00a0\u00bb s\u2019accompagne de nouveaux besoins, nouvelles pratiques et d\u2019un nouveau mod\u00e8le \u00e9conomique. A l\u2019\u00e8re des investissements lourds en Datacenter et infrastructures succ\u00e8deront les services h\u00e9berg\u00e9s, factur\u00e9s...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/","og_site_name":"RiskInsight","article_published_time":"2011-02-25T10:38:09+00:00","article_modified_time":"2014-11-28T14:59:15+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","type":"image\/jpeg"}],"author":"Lo\u00efc Michel","twitter_misc":{"Written by":"Lo\u00efc Michel","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/"},"author":{"name":"Lo\u00efc Michel","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/123c67162b4a01504cc890e6f487905b"},"headline":"Les op\u00e9rateurs, acteurs naturels du cloud computing","datePublished":"2011-02-25T10:38:09+00:00","dateModified":"2014-11-28T14:59:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/"},"wordCount":801,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","keywords":["Cloud computing","IaaS","PaaS","SaaS"],"articleSection":["M\u00e9tiers - Telcos"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/","name":"Les op\u00e9rateurs, acteurs naturels du cloud computing - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","datePublished":"2011-02-25T10:38:09+00:00","dateModified":"2014-11-28T14:59:15+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/les-operateurs-acteurs-naturels-du-cloud-computing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Les op\u00e9rateurs, acteurs naturels du cloud computing"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/123c67162b4a01504cc890e6f487905b","name":"Lo\u00efc Michel","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/loic-michel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/69","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/115"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=69"}],"version-history":[{"count":16,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/69\/revisions"}],"predecessor-version":[{"id":6569,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/69\/revisions\/6569"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6343"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=69"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=69"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=69"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=69"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}