{"id":74749,"date":"2025-10-23T11:13:01","date_gmt":"2025-10-23T09:13:01","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/arcad\/?p=74749"},"modified":"2026-03-18T11:11:05","modified_gmt":"2026-03-18T09:11:05","slug":"cybersecurite-enjeu-strategique-ibm-i","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/cybersecurite-enjeu-strategique-ibm-i\/","title":{"rendered":"Cybers\u00e9curit\u00e9 : un enjeu strat\u00e9gique sur IBM i"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:15px;--awb-padding-left:15px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-content-alignment:center;--awb-font-size:14px;--awb-text-color:var(--awb-color5);--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:600;\"><p>Article r\u00e9dig\u00e9 par Philippe Magne, le 23 octobre 2025<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:15px;--awb-padding-left:15px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" id=\"blog-content\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><script type=\"text\/javascript\">\n(function ($) {\n  function setInnerLinks(containerID, elementClass) {\n    var $container = $('#' + containerID);\n    if (!$container.length) return;\n\n    \/\/ Emplacement du sommaire (Avada) avec repli sur le container\n    var $host = $(\"#blog-content>.fusion-builder-row>.fusion-layout-column:first-child .fusion-column-wrapper\");\n    if (!$host.length) $host = $container;\n\n    \/\/ Cr\u00e9e le bloc sommaire une seule fois\n    var $summary = $host.find('.summary');\n    if (!$summary.length) {\n      $summary = $(\"<div class='summary'><\/div>\");\n      var host = window.location.hostname.toLowerCase();\nvar tocTitle =\n  host.endsWith('.fr') ? 'Sommaire' :\n  host.endsWith('.com') ? 'Summary' :\n  ((document.documentElement.lang || '').toLowerCase().startsWith('fr') ? 'Sommaire' : 'Summary');\n\n\/\/ Insertion du titre (en texte, pas en HTML)\n$summary.append($('<h2\/>', { text: tocTitle, class: 'exclude-summary', style: 'padding-left: 25px;' }));\n      $summary.append(\"<ol id='\" + containerID + \"_links'><\/ol>\");\n      $host.prepend($summary);\n    }\n    var $list = $('#' + containerID + '_links').empty();\n\n    \/\/ Helpers: enlever la num\u00e9rotation, slug, unicit\u00e9\n    function stripLeadingEnumeration(str) {\n      var s = (str || '').trim();\n\n      \/\/ Cas 1 : \"1) Titre\", \"1. Titre\", \"1 - Titre\", \"1 \u2014 Titre\", \"1: Titre\"\n      s = s.replace(\/^\\d+\\s*[).:\\-\u2013\u2014]\\s+\/, '');\n\n      \/\/ Cas 2 : \"1.2 Titre\", \"2.3.4 Titre\" (au moins un point dans le groupe)\n      s = s.replace(\/^\\d+(?:\\.\\d+)+\\s+\/, '');\n\n      \/\/ NB : on ne retire PAS un simple nombre suivi d\u2019un espace (ex: \"2025 Roadmap\")\n      return s.trim();\n    }\n    var slugCounts = {};\n    function toSlug(str) {\n      return (str || '')\n        .toLowerCase()\n        .normalize('NFD').replace(\/[\\u0300-\\u036f]\/g, '')\n        .replace(\/[^\\w\\s-]\/g, '')\n        .trim()\n        .replace(\/\\s+\/g, '-')\n        .replace(\/-+\/g, '-');\n    }\n    function uniqueId(base) {\n      var n = (slugCounts[base] || 0) + 1;\n      slugCounts[base] = n;\n      return n === 1 ? base : base + '-' + n;\n    }\n\n    \/\/ S\u00e9lectionne les titres\n    var selector = elementClass || 'h2:not(.exclude-summary)';\n    var $headings = $container.find(selector);\n\n    $headings.each(function () {\n      var $h = $(this);\n      if ($h.hasClass('exclude-summary')) return;\n\n      \/\/ Texte pour l'affichage dans l'OL : sans la num\u00e9rotation initiale\n      var rawText = $.trim($h.text());\n      var displayText = stripLeadingEnumeration(rawText);\n\n      \/\/ ID bas\u00e9 sur le texte nettoy\u00e9 pour un slug plus propre\n      if (!$h.attr('id')) {\n        var base = toSlug(displayText || 'section');\n        var id = uniqueId(base);\n        while (document.getElementById(id)) { id = uniqueId(base); }\n        $h.attr('id', id);\n      }\n      var id = $h.attr('id');\n\n      \/\/ Focusable quand on suit l\u2019ancre\n      if (!$h.attr('tabindex')) $h.attr('tabindex', '-1');\n\n      \/\/ Ajoute l\u2019item de la liste ordonn\u00e9e (le num\u00e9ro est fourni par <ol>)\n      $list.append(\"<li><a href='#\" + id + \"'>\" + displayText + \"<\/a><\/li>\");\n    });\n\n    \/\/ Scroll fluide avec offset si header fixe\n    var $header = $('.fusion-header, .fusion-header-wrapper, header, .site-header').first();\n    var isFixed = \/fixed|sticky\/.test(($header.css('position') || ''));\n    var offset = isFixed ? ($header.outerHeight() || 0) : 0;\n\n    \/\/ D\u00e9l\u00e9gation: un seul handler pour tous les liens\n    $list.off('click.toc').on('click.toc', 'a', function (e) {\n      e.preventDefault();\n      var targetId = $(this).attr('href'); \/\/ ex: #vs-code-settings-sync\n      var $t = $(targetId);\n      if (!$t.length) return;\n\n      var y = Math.max($t.offset().top - offset, 0);\n      $('html, body').animate({ scrollTop: y }, 400);\n\n      \/\/ Met \u00e0 jour l\u2019URL sans jump\n      if (history.replaceState) history.replaceState(null, '', targetId);\n    });\n  }\n\n  \/\/ Document ready\n  $(function () {\n    setInnerLinks('blog-content', 'h2:not(.exclude-summary)');\n  });\n\n  \/\/ Optionnel: exporter la fonction\n  window.setInnerLinks = setInnerLinks;\n})(jQuery);\n<\/script>\n\n<div class=\"fusion-text fusion-text-2\"><h2 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">1. Quand la qualit\u00e9 logicielle devient un pilier de la cybers\u00e9curit\u00e9<\/h2>\n<p>La cybers\u00e9curit\u00e9 est devenue une pr\u00e9occupation incontournable pour toutes les entreprises, qu&#8217;elles soient petites, moyennes ou grandes. Les menaces \u00e9voluent sans cesse, et les attaques ciblent de plus en plus souvent les applications m\u00e9tiers elles-m\u00eames.<\/p>\n<p>Dans ce contexte, <strong>le code source<\/strong>, c\u0153ur de tout syst\u00e8me d&#8217;information, repr\u00e9sente \u00e0 la fois une richesse et un risque majeur en mati\u00e8re de cybers\u00e9curit\u00e9. Une simple erreur de d\u00e9veloppement peut ouvrir une br\u00e8che exploitable par des acteurs malveillants.<\/p>\n<p>Pour faire face \u00e0 cette r\u00e9alit\u00e9, les entreprises s&#8217;\u00e9quipent d\u00e9sormais d&#8217;outils capables de <strong>d\u00e9tecter les vuln\u00e9rabilit\u00e9s d\u00e8s la phase de d\u00e9veloppement<\/strong>, avant m\u00eame que le code ne soit mis en production. C&#8217;est tout l&#8217;enjeu des solutions <strong>SAST (Static Application Security Testing)<\/strong>, et notamment de <a style=\"font-weight: normal;\" href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">CodeChecker<\/a>, l&#8217;outil d&#8217;analyse statique de s\u00e9curit\u00e9 con\u00e7u pour la plateforme <strong>IBM i<\/strong>.<\/p>\n<\/div><div class=\"fusion-text fusion-text-3\"><h2 class=\"\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">2. Les vuln\u00e9rabilit\u00e9s logicielles : un risque trop souvent sous-estim\u00e9<\/h2>\n<p>Les failles de s\u00e9curit\u00e9 provenant du code source ne sont pas forc\u00e9ment li\u00e9es \u00e0 de la n\u00e9gligence : elles sont souvent dues \u00e0 la complexit\u00e9 croissante des applications, aux contraintes de temps, ou \u00e0 la m\u00e9connaissance des bonnes pratiques de s\u00e9curit\u00e9.<\/p>\n<p>Sur les environnements IBM i, la probl\u00e9matique est encore plus sp\u00e9cifique. De nombreuses applications critiques, dans la banque, l&#8217;assurance, la logistique ou l&#8217;industrie, reposent sur des programmes historiques \u00e9crits en <strong>RPG, CLP ou DDS<\/strong>, souvent maintenus depuis des d\u00e9cennies. Ces applications strat\u00e9giques doivent \u00eatre <strong>modernis\u00e9es et s\u00e9curis\u00e9es sans rupture<\/strong>, dans une d\u00e9marche globale de cybers\u00e9curit\u00e9 du patrimoine applicatif.<\/p>\n<p>C&#8217;est pr\u00e9cis\u00e9ment l\u00e0 qu&#8217;interviennent les outils SAST.<\/p>\n<\/div><div class=\"fusion-text fusion-text-4\"><h2 class=\"\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">3. Les outils SAST : la premi\u00e8re ligne de d\u00e9fense du d\u00e9veloppeur<\/h2>\n<p>Les <strong>Static Application Security Testing (SAST)<\/strong> sont des outils qui analysent le code source \u00e0 la recherche d&#8217;erreurs, d&#8217;incoh\u00e9rences ou de vuln\u00e9rabilit\u00e9s. Contrairement aux tests dynamiques (DAST), ils interviennent <strong>en amont du cycle de d\u00e9veloppement<\/strong>, directement dans les environnements de codage.<\/p>\n<p>Leur objectif : <strong>d\u00e9tecter les failles d\u00e8s leur apparition<\/strong>, avant qu&#8217;elles ne se propagent dans les versions d\u00e9ploy\u00e9es. Cette approche s&#8217;inscrit pleinement dans la philosophie <strong>DevSecOps<\/strong>, qui consiste \u00e0 int\u00e9grer la s\u00e9curit\u00e9 au c\u0153ur du d\u00e9veloppement, et non \u00e0 la traiter comme une \u00e9tape finale.<\/p>\n<p>Gr\u00e2ce \u00e0 cette d\u00e9marche dite \u201c<strong>Shift Left Security<\/strong>\u201d, les entreprises gagnent \u00e0 la fois en <strong>fiabilit\u00e9, en r\u00e9activit\u00e9 et en conformit\u00e9<\/strong>.<\/p>\n<\/div><div class=\"fusion-text fusion-text-5\"><h2 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">4. CodeChecker : un SAST taill\u00e9 sur mesure pour IBM i<\/h2>\n<p>L&#8217;un des grands atouts de <strong><a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">CodeChecker<\/a><\/strong> est sa conception native pour la plateforme <strong>IBM i<\/strong>. L\u00e0 o\u00f9 la plupart des outils de s\u00e9curit\u00e9 g\u00e9n\u00e9ralistes peinent \u00e0 comprendre les sp\u00e9cificit\u00e9s des langages historiques, CodeChecker a \u00e9t\u00e9 <strong>d\u00e9velopp\u00e9 pour couvrir l&#8217;ensemble des dialectes<\/strong> utilis\u00e9s sur IBM i : <strong>RPG II, III, IV, ILE, Free<\/strong>, mais aussi <strong>CLP<\/strong> et <strong>DDS<\/strong>.<\/p>\n<p>Cette exhaustivit\u00e9 garantit une <strong>analyse fine et pertinente du code<\/strong>, sans faux positifs li\u00e9s \u00e0 une mauvaise interpr\u00e9tation syntaxique. CodeChecker ne se limite pas \u00e0 la s\u00e9curit\u00e9 : il contribue aussi \u00e0 la <strong>qualit\u00e9 du code<\/strong>, au <strong>respect des normes internes<\/strong> et \u00e0 la <strong>fiabilit\u00e9 globale des applications<\/strong>.<\/p>\n<p>En somme, il s&#8217;agit d&#8217;un outil doublement b\u00e9n\u00e9fique : il <a href=\"\/arcad\/solutions-fr\/securite-du-code-sur-ibm-i\/\">s\u00e9curise le code<\/a> tout en favorisant de meilleures pratiques de d\u00e9veloppement.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-padding-top:25px;--awb-padding-right:40px;--awb-padding-bottom:30px;--awb-padding-left:40px;--awb-bg-image:radial-gradient(circle at center center, #daeaf65e 0%,#daeaf61a 100%);--awb-bg-size:cover;--awb-box-shadow:3px 3px 4px 0px #daeaf65e;;--awb-border-color:var(--awb-color5);--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:25px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6 fusion-text-no-margin\" style=\"--awb-content-alignment:center;--awb-font-size:25px;--awb-text-color:var(--awb-color5);--awb-margin-bottom:15px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:800;\"><p>Identifiez les d\u00e9fauts de qualit\u00e9 et les risques de s\u00e9curit\u00e9 dans votre code IBM i<\/p>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ffffff;--button_accent_hover_color:var(--awb-color5);--button_border_hover_color:var(--awb-color5);--button_gradient_top_color:var(--awb-color5);--button_gradient_bottom_color:var(--awb-color5);--button_gradient_top_color_hover:#ffffff;--button_gradient_bottom_color_hover:#ffffff;\" target=\"_blank\" rel=\"noopener noreferrer\" data-hover=\"text_slide_up\" href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\"><div class=\"awb-button-text-transition  awb-button__hover-content--centered\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez CodeChecker<\/span><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez CodeChecker<\/span><\/div><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7\"><h2 class=\"\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">5. Un service complet de veille et d&#8217;accompagnement<\/h2>\n<p>Mais un outil, aussi performant soit-il, ne suffit pas \u00e0 lui seul. Dans le domaine de la cybers\u00e9curit\u00e9, <a href=\"\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/\">les menaces \u00e9voluent constamment<\/a>, et de nouvelles vuln\u00e9rabilit\u00e9s apparaissent chaque semaine. Pour rester efficace, un SAST doit donc \u00eatre accompagn\u00e9 d&#8217;un <strong>service de veille et de mise \u00e0 jour continue<\/strong>.<\/p>\n<p>C&#8217;est l\u00e0 que <strong>l&#8217;offre d&#8217;ARCAD Software<\/strong> prend toute sa valeur.<\/p>\n<p>L&#8217;entreprise fournit \u00e0 ses clients un <strong>service d&#8217;assistance et de surveillance des vuln\u00e9rabilit\u00e9s<\/strong> : les nouvelles menaces sont identifi\u00e9es, les r\u00e8gles de d\u00e9tection adapt\u00e9es sont cr\u00e9\u00e9es, puis livr\u00e9es rapidement aux utilisateurs de <a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">CodeChecker<\/a>. Ce mod\u00e8le \u201c<strong>outil + service<\/strong>\u201d permet aux entreprises de rester prot\u00e9g\u00e9es en permanence, sans effort suppl\u00e9mentaire.<\/p>\n<p>La valeur de la solution ne r\u00e9side pas uniquement dans la technologie, mais aussi dans <strong>l&#8217;expertise humaine et la r\u00e9activit\u00e9<\/strong> qui l&#8217;accompagnent.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8\"><h2 class=\"\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">6. \u201cCoach, no Cop\u201d : une approche p\u00e9dagogique de la s\u00e9curit\u00e9<\/h2>\n<p>Contr\u00f4ler le code, c&#8217;est bien. Mais <strong>accompagner les d\u00e9veloppeurs<\/strong>, c&#8217;est encore mieux. C&#8217;est tout le sens de la philosophie \u201c<strong>Coach, no Cop<\/strong>\u201d adopt\u00e9e par CodeChecker. L&#8217;objectif n&#8217;est pas de sanctionner les erreurs, mais de <strong>former et sensibiliser<\/strong> les \u00e9quipes de d\u00e9veloppement en continu.<\/p>\n<p>Plus une anomalie est d\u00e9tect\u00e9e t\u00f4t, moins elle co\u00fbte cher \u00e0 corriger. C&#8217;est pourquoi <a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">CodeChecker<\/a> s&#8217;int\u00e8gre <strong>directement dans les environnements de d\u00e9veloppement<\/strong> des programmeurs IBM i :<\/p>\n<ul>\n<li>dans les outils natifs (<strong>SEU\/PDM<\/strong>),<\/li>\n<li>dans <strong><a href=\"https:\/\/www.arcadsoftware.fr\/arcad\/produits\/rdi-rational-developer-for-i-fr\/\">RDi (Rational Developer for i)<\/a><\/strong>,<\/li>\n<li>et m\u00eame dans <strong><a href=\"\/arcad\/vs-code-sur-ibm-i-alias-as400-avec-arcad-for-devops\/\">Visual Studio Code<\/a><\/strong>.<\/li>\n<\/ul>\n<p>Les r\u00e9sultats d&#8217;analyse apparaissent <strong>en contexte, dans le code source<\/strong>, ce qui permet une correction imm\u00e9diate, fluide et intuitive.<\/p>\n<p>Cette int\u00e9gration favorise une adoption naturelle de l&#8217;outil et renforce la culture s\u00e9curit\u00e9 au sein des \u00e9quipes.<\/p>\n<\/div><div class=\"fusion-text fusion-text-9\"><h2 class=\"\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">7. Une mise en \u0153uvre rapide, des b\u00e9n\u00e9fices mesurables<\/h2>\n<p>Contrairement \u00e0 certaines solutions de s\u00e9curit\u00e9 complexes, <strong><a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">CodeChecker<\/a> est simple \u00e0 impl\u00e9menter et \u00e0 utiliser<\/strong>. Il est livr\u00e9 avec <strong>un ensemble complet de r\u00e8gles de s\u00e9curit\u00e9 pr\u00eates \u00e0 l&#8217;emploi<\/strong>, ainsi qu&#8217;une centaine de r\u00e8gles de <strong>qualit\u00e9 et de conformit\u00e9<\/strong> standard.<\/p>\n<p>Les entreprises qui l&#8217;adoptent constatent rapidement :<\/p>\n<ul>\n<li>une <strong>r\u00e9duction du temps de revue de code<\/strong>,<\/li>\n<li>une <strong>diminution des incidents de s\u00e9curit\u00e9<\/strong>,<\/li>\n<li>et une <strong>meilleure conformit\u00e9<\/strong> avec les normes internes ou r\u00e9glementaires.<\/li>\n<\/ul>\n<p>Dans des secteurs fortement r\u00e9glement\u00e9s comme la <strong>banque ou l&#8217;assurance<\/strong>, o\u00f9 les revues de code sont obligatoires, CodeChecker apporte un <strong>gain de temps consid\u00e9rable<\/strong> et une <strong>s\u00e9curit\u00e9 renforc\u00e9e<\/strong> sans ralentir le d\u00e9veloppement.<\/p>\n<\/div><div class=\"fusion-text fusion-text-10\"><h2 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">8. Conclusion : s\u00e9curit\u00e9 et qualit\u00e9, deux faces d&#8217;une m\u00eame exigence<\/h2>\n<p>Dans un monde num\u00e9rique o\u00f9 la fiabilit\u00e9 du code conditionne la s\u00e9curit\u00e9 des entreprises, <strong>l&#8217;analyse statique devient un r\u00e9flexe indispensable<\/strong>.<\/p>\n<p>Pour les organisations qui s&#8217;appuient sur IBM i, <strong>CodeChecker <\/strong>repr\u00e9sente bien plus qu&#8217;un simple outil de contr\u00f4le : c&#8217;est <strong>un partenaire de confiance<\/strong>, combinant expertise technique, veille permanente et accompagnement humain.<\/p>\n<p>En int\u00e9grant la cybers\u00e9curit\u00e9 au plus pr\u00e8s du d\u00e9veloppeur, dans une logique de \u201cCoach, no Cop\u201d, les entreprises adoptent une d\u00e9marche <strong>pr\u00e9ventive, efficace et durable<\/strong>.<\/p>\n<p>Parce que la s\u00e9curit\u00e9 ne se d\u00e9cr\u00e8te pas : elle se construit, ligne de code apr\u00e8s ligne de code.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:45px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-padding-top:25px;--awb-padding-right:25px;--awb-padding-bottom:25px;--awb-padding-left:25px;--awb-bg-color:var(--awb-color1);--awb-bg-color-hover:var(--awb-color1);--awb-bg-size:cover;--awb-box-shadow:2px 1px 4px 0px rgba(33,41,52,0.41);;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_5 1_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:20%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:5px;--awb-spacing-left-large:9.6%;--awb-width-medium:20%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:9.6%;--awb-width-small:20%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:9.6%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:130px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:50px;\"><img decoding=\"async\" width=\"500\" height=\"500\" title=\"Photo Arcad &#8211; Philippe Magne\" src=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/06\/Photo-Arcad-Philippe-Magne.png\" alt class=\"img-responsive wp-image-74137\" srcset=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/06\/Photo-Arcad-Philippe-Magne-200x200.png 200w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/06\/Photo-Arcad-Philippe-Magne-400x400.png 400w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/06\/Photo-Arcad-Philippe-Magne.png 500w\" sizes=\"(max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_4_5 4_5 fusion-flex-column fusion-flex-align-self-flex-start\" style=\"--awb-padding-left:5px;--awb-bg-size:cover;--awb-width-large:80%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.4%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.4%;--awb-width-medium:80%;--awb-order-medium:0;--awb-spacing-right-medium:2.4%;--awb-spacing-left-medium:2.4%;--awb-width-small:80%;--awb-order-small:0;--awb-margin-top-small:0px;--awb-spacing-right-small:2.4%;--awb-spacing-left-small:2.4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:rgba(48,135,120,0.59);--awb-margin-top:0px;--awb-margin-bottom:7px;--awb-margin-top-small:0px;--awb-margin-bottom-small:0px;--awb-font-size:13px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:500;margin:0;font-size:1em;--fontSize:13;--minFontSize:13;line-height:1.2;\">\u00c0 propos de l&#8217;auteur<\/h2><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-bottom-small:0px;--awb-font-size:22px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:22;--minFontSize:22;line-height:1.3;\">Philippe Magne<\/h3><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-top:0px;--awb-margin-bottom:5px;--awb-margin-top-small:0px;--awb-margin-bottom-small:10px;--awb-font-size:16px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;--fontSize:16;--minFontSize:16;line-height:1.36;\">Pr\u00e9sident Directeur G\u00e9n\u00e9ral, ARCAD Software<\/h4><\/div><div class=\"fusion-text fusion-text-11 fusion-text-no-margin\" style=\"--awb-font-size:14px;--awb-line-height:1.4;--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Philippe Magne est le PDG et le Fondateur du groupe ARCAD Software, un \u00e9diteur de logiciels international sp\u00e9cialis\u00e9 dans les solutions multi-plateformes pour DevOps, la modernisation d\u2019applications, l\u2019automatisation des tests et le masquage des donn\u00e9es. Il dirige l\u2019entreprise pour produire une gamme de solutions compl\u00e8tes et int\u00e9gr\u00e9es, distribu\u00e9es par IBM dans le monde entier. Philippe est un expert de la modernisation et est un conf\u00e9rencier reconnu dans les \u00e9v\u00e9nements IBM.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Renforcez la cybers\u00e9curit\u00e9 de vos applications IBM i gr\u00e2ce \u00e0 CodeChecker, l\u2019outil SAST qui d\u00e9tecte les vuln\u00e9rabilit\u00e9s d\u00e8s le d\u00e9veloppement.<\/p>\n","protected":false},"author":3,"featured_media":74758,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[246],"tags":[569,556],"class_list":["post-74749","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-fr","tag-blog","tag-modernisation-ibm-i"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybers\u00e9curit\u00e9 : un enjeu strat\u00e9gique sur IBM i<\/title>\n<meta name=\"description\" content=\"Renforcez la cybers\u00e9curit\u00e9 de vos applications IBM i gr\u00e2ce \u00e0 CodeChecker, l\u2019outil SAST qui d\u00e9tecte les vuln\u00e9rabilit\u00e9s d\u00e8s le d\u00e9veloppement.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/cybersecurite-enjeu-strategique-ibm-i\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 : un enjeu strat\u00e9gique sur IBM i\" \/>\n<meta property=\"og:description\" content=\"Renforcez la cybers\u00e9curit\u00e9 de vos applications IBM i gr\u00e2ce \u00e0 CodeChecker, l\u2019outil SAST qui d\u00e9tecte les vuln\u00e9rabilit\u00e9s d\u00e8s le d\u00e9veloppement.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/cybersecurite-enjeu-strategique-ibm-i\/\" \/>\n<meta property=\"og:site_name\" content=\"ARCAD\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-23T09:13:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T09:11:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/10\/cybersecurity-ibm-i.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"784\" \/>\n\t<meta property=\"og:image:height\" content=\"293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"administrator\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"administrator\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/cybersecurite-enjeu-strategique-ibm-i\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/cybersecurite-enjeu-strategique-ibm-i\\\/\"},\"author\":{\"name\":\"administrator\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/ac3c33678907c9c414148df7a202dfbf\"},\"headline\":\"Cybers\u00e9curit\u00e9 : un enjeu strat\u00e9gique sur IBM i\",\"datePublished\":\"2025-10-23T09:13:01+00:00\",\"dateModified\":\"2026-03-18T09:11:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/cybersecurite-enjeu-strategique-ibm-i\\\/\"},\"wordCount\":2510,\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/cybersecurite-enjeu-strategique-ibm-i\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cybersecurity-ibm-i.webp\",\"keywords\":[\"blog\",\"Modernisation IBM i\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/cybersecurite-enjeu-strategique-ibm-i\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/cybersecurite-enjeu-strategique-ibm-i\\\/\",\"name\":\"Cybers\u00e9curit\u00e9 : un enjeu strat\u00e9gique sur IBM i\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/cybersecurite-enjeu-strategique-ibm-i\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/cybersecurite-enjeu-strategique-ibm-i\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cybersecurity-ibm-i.webp\",\"datePublished\":\"2025-10-23T09:13:01+00:00\",\"dateModified\":\"2026-03-18T09:11:05+00:00\",\"description\":\"Renforcez la cybers\u00e9curit\u00e9 de vos applications IBM i gr\u00e2ce \u00e0 CodeChecker, l\u2019outil SAST qui d\u00e9tecte les vuln\u00e9rabilit\u00e9s d\u00e8s le d\u00e9veloppement.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/cybersecurite-enjeu-strategique-ibm-i\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/cybersecurite-enjeu-strategique-ibm-i\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/cybersecurite-enjeu-strategique-ibm-i\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cybersecurity-ibm-i.webp\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cybersecurity-ibm-i.webp\",\"width\":784,\"height\":293,\"caption\":\"Cybersecurity IBM i\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/cybersecurite-enjeu-strategique-ibm-i\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"ARCAD\",\"item\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9 : un enjeu strat\u00e9gique sur IBM i\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"name\":\"ARCAD\",\"description\":\"Experts DevOps &amp; Modernisation sur IBM i (alias AS\\\/400 ou AS400)\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\",\"name\":\"ARCAD Software\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"width\":144,\"height\":200,\"caption\":\"ARCAD Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/Arcad-Software\\\/116086138469235\",\"https:\\\/\\\/x.com\\\/arcad_software\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/arcad-software\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ARCADSoftwareInc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/ac3c33678907c9c414148df7a202dfbf\",\"name\":\"administrator\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/author\\\/administrator\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 : un enjeu strat\u00e9gique sur IBM i","description":"Renforcez la cybers\u00e9curit\u00e9 de vos applications IBM i gr\u00e2ce \u00e0 CodeChecker, l\u2019outil SAST qui d\u00e9tecte les vuln\u00e9rabilit\u00e9s d\u00e8s le d\u00e9veloppement.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/cybersecurite-enjeu-strategique-ibm-i\/","og_locale":"en_US","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 : un enjeu strat\u00e9gique sur IBM i","og_description":"Renforcez la cybers\u00e9curit\u00e9 de vos applications IBM i gr\u00e2ce \u00e0 CodeChecker, l\u2019outil SAST qui d\u00e9tecte les vuln\u00e9rabilit\u00e9s d\u00e8s le d\u00e9veloppement.","og_url":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/cybersecurite-enjeu-strategique-ibm-i\/","og_site_name":"ARCAD","article_publisher":"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","article_published_time":"2025-10-23T09:13:01+00:00","article_modified_time":"2026-03-18T09:11:05+00:00","og_image":[{"width":784,"height":293,"url":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/10\/cybersecurity-ibm-i.webp","type":"image\/webp"}],"author":"administrator","twitter_misc":{"Written by":"administrator","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/cybersecurite-enjeu-strategique-ibm-i\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/cybersecurite-enjeu-strategique-ibm-i\/"},"author":{"name":"administrator","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/ac3c33678907c9c414148df7a202dfbf"},"headline":"Cybers\u00e9curit\u00e9 : un enjeu strat\u00e9gique sur IBM i","datePublished":"2025-10-23T09:13:01+00:00","dateModified":"2026-03-18T09:11:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/cybersecurite-enjeu-strategique-ibm-i\/"},"wordCount":2510,"publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"image":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/cybersecurite-enjeu-strategique-ibm-i\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/10\/cybersecurity-ibm-i.webp","keywords":["blog","Modernisation IBM i"],"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/cybersecurite-enjeu-strategique-ibm-i\/","url":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/cybersecurite-enjeu-strategique-ibm-i\/","name":"Cybers\u00e9curit\u00e9 : un enjeu strat\u00e9gique sur IBM i","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/cybersecurite-enjeu-strategique-ibm-i\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/cybersecurite-enjeu-strategique-ibm-i\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/10\/cybersecurity-ibm-i.webp","datePublished":"2025-10-23T09:13:01+00:00","dateModified":"2026-03-18T09:11:05+00:00","description":"Renforcez la cybers\u00e9curit\u00e9 de vos applications IBM i gr\u00e2ce \u00e0 CodeChecker, l\u2019outil SAST qui d\u00e9tecte les vuln\u00e9rabilit\u00e9s d\u00e8s le d\u00e9veloppement.","breadcrumb":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/cybersecurite-enjeu-strategique-ibm-i\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/cybersecurite-enjeu-strategique-ibm-i\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/cybersecurite-enjeu-strategique-ibm-i\/#primaryimage","url":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/10\/cybersecurity-ibm-i.webp","contentUrl":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/10\/cybersecurity-ibm-i.webp","width":784,"height":293,"caption":"Cybersecurity IBM i"},{"@type":"BreadcrumbList","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/cybersecurite-enjeu-strategique-ibm-i\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"ARCAD","item":"https:\/\/www.arcadsoftware.com\/arcad\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9 : un enjeu strat\u00e9gique sur IBM i"}]},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website","url":"https:\/\/www.arcadsoftware.com\/arcad\/","name":"ARCAD","description":"Experts DevOps &amp; Modernisation sur IBM i (alias AS\/400 ou AS400)","publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/arcad\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization","name":"ARCAD Software","url":"https:\/\/www.arcadsoftware.com\/arcad\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","width":144,"height":200,"caption":"ARCAD Software"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","https:\/\/x.com\/arcad_software","https:\/\/www.linkedin.com\/company\/arcad-software","https:\/\/www.youtube.com\/user\/ARCADSoftwareInc"]},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/ac3c33678907c9c414148df7a202dfbf","name":"administrator","url":"https:\/\/www.arcadsoftware.com\/arcad\/author\/administrator\/"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/posts\/74749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/comments?post=74749"}],"version-history":[{"count":4,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/posts\/74749\/revisions"}],"predecessor-version":[{"id":75478,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/posts\/74749\/revisions\/75478"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/media\/74758"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/media?parent=74749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/categories?post=74749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/tags?post=74749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}