{"id":75237,"date":"2026-01-29T18:02:57","date_gmt":"2026-01-29T16:02:57","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/arcad\/?p=75237"},"modified":"2026-03-18T11:08:22","modified_gmt":"2026-03-18T09:08:22","slug":"systemes-legacy-ia-securite-nouvelle-equation-2026","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/systemes-legacy-ia-securite-nouvelle-equation-2026\/","title":{"rendered":"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : la nouvelle \u00e9quation pour 2026"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:15px;--awb-padding-left:15px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-content-alignment:center;--awb-font-size:14px;--awb-text-color:var(--awb-color5);--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:600;\"><p>Article r\u00e9dig\u00e9 par Philippe Magne, le 29 janvier 2026<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><p>Pendant longtemps, les syst\u00e8mes legacy ont \u00e9t\u00e9 annonc\u00e9s comme condamn\u00e9s. Puis le cloud devait tout emporter. Aujourd&#8217;hui, c&#8217;est l&#8217;intelligence artificielle qui cristallise toutes les attentes, tous les fantasmes\u2026 et parfois toutes les peurs. La r\u00e9alit\u00e9 du terrain est pourtant beaucoup plus nuanc\u00e9e.<\/p>\n<p>En 2026, les DSI font face \u00e0 une \u00e9quation nouvelle, plus complexe, mais aussi plus riche : <strong>comment int\u00e9grer l&#8217;IA, renforcer la s\u00e9curit\u00e9 et moderniser des syst\u00e8mes critiques sans casser l&#8217;existant ?<\/strong> La r\u00e9ponse ne tient pas dans un effet d&#8217;annonce. Elle repose sur une approche pragmatique, progressive et profond\u00e9ment hybride.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:15px;--awb-padding-left:15px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" id=\"blog-content\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><script type=\"text\/javascript\">\n(function ($) {\n  function setInnerLinks(containerID, elementClass) {\n    var $container = $('#' + containerID);\n    if (!$container.length) return;\n\n    \/\/ Emplacement du sommaire (Avada) avec repli sur le container\n    var $host = $(\"#blog-content>.fusion-builder-row>.fusion-layout-column:first-child .fusion-column-wrapper\");\n    if (!$host.length) $host = $container;\n\n    \/\/ Cr\u00e9e le bloc sommaire une seule fois\n    var $summary = $host.find('.summary');\n    if (!$summary.length) {\n      $summary = $(\"<div class='summary'><\/div>\");\n      var host = window.location.hostname.toLowerCase();\nvar tocTitle =\n  host.endsWith('.fr') ? 'Sommaire' :\n  host.endsWith('.com') ? 'Summary' :\n  ((document.documentElement.lang || '').toLowerCase().startsWith('fr') ? 'Sommaire' : 'Summary');\n\n\/\/ Insertion du titre (en texte, pas en HTML)\n$summary.append($('<h2\/>', { text: tocTitle, class: 'exclude-summary', style: 'padding-left: 25px;' }));\n      $summary.append(\"<ol id='\" + containerID + \"_links'><\/ol>\");\n      $host.prepend($summary);\n    }\n    var $list = $('#' + containerID + '_links').empty();\n\n    \/\/ Helpers: enlever la num\u00e9rotation, slug, unicit\u00e9\n    function stripLeadingEnumeration(str) {\n      var s = (str || '').trim();\n\n      \/\/ Cas 1 : \"1) Titre\", \"1. Titre\", \"1 - Titre\", \"1 \u2014 Titre\", \"1: Titre\"\n      s = s.replace(\/^\\d+\\s*[).:\\-\u2013\u2014]\\s+\/, '');\n\n      \/\/ Cas 2 : \"1.2 Titre\", \"2.3.4 Titre\" (au moins un point dans le groupe)\n      s = s.replace(\/^\\d+(?:\\.\\d+)+\\s+\/, '');\n\n      \/\/ NB : on ne retire PAS un simple nombre suivi d\u2019un espace (ex: \"2025 Roadmap\")\n      return s.trim();\n    }\n    var slugCounts = {};\n    function toSlug(str) {\n      return (str || '')\n        .toLowerCase()\n        .normalize('NFD').replace(\/[\\u0300-\\u036f]\/g, '')\n        .replace(\/[^\\w\\s-]\/g, '')\n        .trim()\n        .replace(\/\\s+\/g, '-')\n        .replace(\/-+\/g, '-');\n    }\n    function uniqueId(base) {\n      var n = (slugCounts[base] || 0) + 1;\n      slugCounts[base] = n;\n      return n === 1 ? base : base + '-' + n;\n    }\n\n    \/\/ S\u00e9lectionne les titres\n    var selector = elementClass || 'h2:not(.exclude-summary)';\n    var $headings = $container.find(selector);\n\n    $headings.each(function () {\n      var $h = $(this);\n      if ($h.hasClass('exclude-summary')) return;\n\n      \/\/ Texte pour l'affichage dans l'OL : sans la num\u00e9rotation initiale\n      var rawText = $.trim($h.text());\n      var displayText = stripLeadingEnumeration(rawText);\n\n      \/\/ ID bas\u00e9 sur le texte nettoy\u00e9 pour un slug plus propre\n      if (!$h.attr('id')) {\n        var base = toSlug(displayText || 'section');\n        var id = uniqueId(base);\n        while (document.getElementById(id)) { id = uniqueId(base); }\n        $h.attr('id', id);\n      }\n      var id = $h.attr('id');\n\n      \/\/ Focusable quand on suit l\u2019ancre\n      if (!$h.attr('tabindex')) $h.attr('tabindex', '-1');\n\n      \/\/ Ajoute l\u2019item de la liste ordonn\u00e9e (le num\u00e9ro est fourni par <ol>)\n      $list.append(\"<li><a href='#\" + id + \"'>\" + displayText + \"<\/a><\/li>\");\n    });\n\n    \/\/ Scroll fluide avec offset si header fixe\n    var $header = $('.fusion-header, .fusion-header-wrapper, header, .site-header').first();\n    var isFixed = \/fixed|sticky\/.test(($header.css('position') || ''));\n    var offset = isFixed ? ($header.outerHeight() || 0) : 0;\n\n    \/\/ D\u00e9l\u00e9gation: un seul handler pour tous les liens\n    $list.off('click.toc').on('click.toc', 'a', function (e) {\n      e.preventDefault();\n      var targetId = $(this).attr('href'); \/\/ ex: #vs-code-settings-sync\n      var $t = $(targetId);\n      if (!$t.length) return;\n\n      var y = Math.max($t.offset().top - offset, 0);\n      $('html, body').animate({ scrollTop: y }, 400);\n\n      \/\/ Met \u00e0 jour l\u2019URL sans jump\n      if (history.replaceState) history.replaceState(null, '', targetId);\n    });\n  }\n\n  \/\/ Document ready\n  $(function () {\n    setInnerLinks('blog-content', 'h2:not(.exclude-summary)');\n  });\n\n  \/\/ Optionnel: exporter la fonction\n  window.setInnerLinks = setInnerLinks;\n})(jQuery);\n<\/script>\n\n<div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">1. Les syst\u00e8mes legacy : toujours critiques, toujours strat\u00e9giques<\/h2><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.3;\">Pourquoi le legacy n&#8217;a pas disparu<\/h3><\/div><div class=\"fusion-text fusion-text-3\"><p>Contrairement \u00e0 ce que certains pr\u00e9disaient il y a encore quelques ann\u00e9es, le legacy est bien vivant. Et il le restera. Ces applications portent le c\u0153ur de l&#8217;activit\u00e9 des entreprises : finance, logistique, production, facturation, conformit\u00e9. Elles traitent des volumes de donn\u00e9es consid\u00e9rables, avec des exigences de performance et de fiabilit\u00e9 rarement \u00e9gal\u00e9es.<\/p>\n<p>Le legacy n&#8217;est pas un probl\u00e8me en soi. Le probl\u00e8me, c&#8217;est de ne pas savoir comment le faire \u00e9voluer intelligemment.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.3;\">Le risque majeur : la perte de connaissance applicative<\/h3><\/div><div class=\"fusion-text fusion-text-4\"><p>Le vrai talon d&#8217;Achille du legacy n&#8217;est pas technique, il est humain. Les r\u00e8gles m\u00e9tiers sont enfouies dans le code. La documentation est souvent absente, incompl\u00e8te ou obsol\u00e8te. Et surtout, les experts qui ma\u00eetrisent ces applications critiques partent progressivement \u00e0 la retraite. Cette transition g\u00e9n\u00e9rationnelle, annonc\u00e9e depuis plus de quinze ans, s&#8217;acc\u00e9l\u00e8re brutalement. Certaines entreprises se retrouvent d\u00e9j\u00e0 dans des situations critiques, faute d&#8217;avoir anticip\u00e9 la transmission de cette connaissance.<\/p>\n<p>Pour y r\u00e9pondre, les organisations aimeraient centraliser et structurer la connaissance de leur patrimoine applicatif, afin de rendre le code compr\u00e9hensible, partageable et exploitable par diff\u00e9rents profils. C&#8217;est pr\u00e9cis\u00e9ment l&#8217;objectif de <a href=\"\/discover\/\" target=\"_blank\" rel=\"noopener noreferrer\">plateformes d&#8217;Application Intelligence comme DISCOVER<\/a>.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">2. IA en entreprise : sortir du fantasme pour entrer dans le pragmatisme<\/h2><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.3;\">Une r\u00e9volution\u2026 mais pas sans effets de bord<\/h3><\/div><div class=\"fusion-text fusion-text-5\"><p>Oui, l&#8217;IA est une r\u00e9volution. Et c&#8217;est pr\u00e9cis\u00e9ment pour cela qu&#8217;il faut garder la t\u00eate froide. Toute r\u00e9volution technologique s&#8217;accompagne d&#8217;effets secondaires : destructions d&#8217;emplois, consommation \u00e9nerg\u00e9tique massive, empreinte carbone pr\u00e9occupante. Il est temps d&#8217;arr\u00eater d&#8217;utiliser un marteau-pilon pour \u00e9craser une mouche. L&#8217;IA est un outil puissant, mais elle doit \u00eatre utilis\u00e9e avec discernement, en fonction de cas d&#8217;usage r\u00e9els et ma\u00eetris\u00e9s.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.3;\">D\u00e9terminisme vs probabilisme : deux logiques compl\u00e9mentaires<\/h3><\/div><div class=\"fusion-text fusion-text-6\"><p>Historiquement, les syst\u00e8mes critiques reposent sur des algorithmes d\u00e9terministes : on part d&#8217;un point A, on arrive \u00e0 un point B, avec un r\u00e9sultat garanti. L&#8217;IA, elle, est de nature probabiliste. Elle explore le champ des possibles, acc\u00e9l\u00e8re, propose, mais ne garantit pas toujours le m\u00eame r\u00e9sultat.<\/p>\n<p>Opposer ces deux approches n&#8217;a aucun sens. <strong>Le d\u00e9terminisme garantit, l&#8217;IA acc\u00e9l\u00e8re et explore<\/strong>. C&#8217;est la combinaison des deux qui cr\u00e9e de la valeur.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">3. IA et Legacy : une opportunit\u00e9 sous conditions<\/h2><\/div><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.3;\">L&#8217;IA comme levier de transmission et de d\u00e9mocratisation<\/h3><\/div><div class=\"fusion-text fusion-text-7\"><p>L&#8217;un des apports majeurs de l&#8217;IA est sa capacit\u00e9 \u00e0 <strong>ouvrir le d\u00e9veloppement \u00e0 d&#8217;autres profils que les experts historiques<\/strong>. Jusqu&#8217;ici, l&#8217;expertise \u00e9tait souvent conserv\u00e9e comme un pouvoir. L&#8217;IA change la donne : elle permet aux m\u00e9tiers de se r\u00e9approprier une partie du SI, de gagner en autonomie, de cr\u00e9er plus rapidement de nouvelles applications. Le syst\u00e8me d&#8217;information devient progressivement data-centrique, avec des plateformes de donn\u00e9es s\u00e9curis\u00e9es, consomm\u00e9es par des applications cr\u00e9\u00e9es plus rapidement, parfois \u00e0 la vol\u00e9e.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.3;\">La connaissance applicative comme carburant de l&#8217;IA<\/h3><\/div><div class=\"fusion-text fusion-text-8\"><p>Mais l&#8217;IA n&#8217;est pertinente que si elle est bien nourrie. Sans connaissance du syst\u00e8me existant, sans r\u00e9f\u00e9rentiel de m\u00e9tadonn\u00e9es, elle reste aveugle. \u00c0 l&#8217;inverse, enrichie par des d\u00e9cennies d&#8217;analyse applicative, elle devient r\u00e9ellement utile. L&#8217;enjeu n&#8217;est donc pas d&#8217;injecter de l&#8217;IA partout, mais de <strong>l&#8217;adosser \u00e0 la connaissance existante<\/strong> pour la rendre pertinente, fiable et exploitable. C&#8217;est dans cette logique que certaines entreprises utilisent <a href=\"\/discover\/\" target=\"_blank\" rel=\"noopener noreferrer\">DISCOVER<\/a> comme r\u00e9f\u00e9rentiel structurant, servant de base \u00e0 des usages IA plus pertinents et plus fiables.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:15px;--awb-padding-right:15px;--awb-padding-bottom:15px;--awb-padding-left:15px;--awb-bg-image:radial-gradient(circle at center center, #daeaf65e 0%,#daeaf61a 100%);--awb-bg-size:cover;--awb-box-shadow:3px 3px 4px 0px #daeaf65e;;--awb-border-color:var(--awb-color5);--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_3_5 3_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-9 fusion-text-no-margin\" style=\"--awb-font-size:16px;--awb-line-height:1.3;--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:700;\"><p>Documentez vos applications legacy avec l&#8217;IA<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:right;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" data-hover=\"text_slide_up\" href=\"\/discover\/\"><div class=\"awb-button-text-transition  awb-button__hover-content--centered\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez DISCOVER<\/span><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez DISCOVER<\/span><\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">4. DevSecOps : s\u00e9curiser la modernisation sans rupture<\/h2><\/div><div class=\"fusion-title title fusion-title-11 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.3;\">Les limites du DevOps fragment\u00e9<\/h3><\/div><div class=\"fusion-text fusion-text-10\"><p>Les entreprises ont multipli\u00e9 les cha\u00eenes CI\/CD, souvent sans r\u00e9elle coh\u00e9rence globale. R\u00e9sultat : une explosion des besoins en ressources, alors m\u00eame que les comp\u00e9tences DevOps sont rares. Cette fragmentation montre ses limites, en particulier sur des environnements critiques o\u00f9 la stabilit\u00e9 et la conformit\u00e9 sont essentielles.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-12 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.3;\">Platform Engineering : l&#8217;\u00e9volution naturelle du DevOps<\/h3><\/div><div class=\"fusion-text fusion-text-11\"><p>Le Platform Engineering s&#8217;impose comme une r\u00e9ponse pragmatique. Il s&#8217;agit d&#8217;industrialiser les environnements, de mutualiser les comp\u00e9tences, de standardiser les cha\u00eenes, tout en conservant un haut niveau de contr\u00f4le. C&#8217;est une \u00e9volution profonde du DevOps, parfaitement adapt\u00e9e aux syst\u00e8mes critiques et aux organisations complexes. Dans cette logique, certaines organisations s&#8217;appuient sur des <a href=\"\/drops\/\" target=\"_blank\" rel=\"noopener noreferrer\">plateformes centrales capables d&#8217;orchestrer les d\u00e9ploiements sur des environnements h\u00e9t\u00e9rog\u00e8nes<\/a> (legacy, cloud, mainframe) comme DROPS, utilis\u00e9 comme point de convergence et de contr\u00f4le.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:15px;--awb-padding-right:15px;--awb-padding-bottom:15px;--awb-padding-left:15px;--awb-bg-image:radial-gradient(circle at center center, #daeaf65e 0%,#daeaf61a 100%);--awb-bg-size:cover;--awb-box-shadow:3px 3px 4px 0px #daeaf65e;;--awb-border-color:var(--awb-color5);--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_3_5 3_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-12 fusion-text-no-margin\" style=\"--awb-font-size:16px;--awb-line-height:1.3;--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:700;\"><p>Orchestrez vos d\u00e9ploiements multiplateformes<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-3 fusion_builder_column_inner_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:right;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" data-hover=\"text_slide_up\" href=\"\/drops\/\"><div class=\"awb-button-text-transition  awb-button__hover-content--centered\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez DROPS<\/span><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez DROPS<\/span><\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-13 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">5. S\u00e9curit\u00e9 applicative : un imp\u00e9ratif non n\u00e9gociable<\/h2><\/div><div class=\"fusion-title title fusion-title-14 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.3;\">La cybers\u00e9curit\u00e9 int\u00e9gr\u00e9e d\u00e8s le code<\/h3><\/div><div class=\"fusion-text fusion-text-13\"><p>La s\u00e9curit\u00e9 ne peut plus \u00eatre un sujet trait\u00e9 en bout de cha\u00eene. L&#8217;analyse statique de s\u00e9curit\u00e9 devient un standard, en particulier sur les environnements legacy o\u00f9 les vuln\u00e9rabilit\u00e9s sont plus difficiles \u00e0 d\u00e9tecter. Dans ce contexte, des outils sp\u00e9cialis\u00e9s comme <a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\" target=\"_blank\" rel=\"noopener noreferrer\">ARCAD CodeChecker<\/a> sont utilis\u00e9s pour int\u00e9grer la cybers\u00e9curit\u00e9 directement dans les processus de d\u00e9veloppement.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-15 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.3;\">Fuites de donn\u00e9es : un risque syst\u00e9mique sous-estim\u00e9<\/h3><\/div><div class=\"fusion-text fusion-text-14\"><p>Les fuites de donn\u00e9es se multiplient, avec des cons\u00e9quences tr\u00e8s concr\u00e8tes : phishing cibl\u00e9, usurpation d&#8217;identit\u00e9, exposition directe des utilisateurs finaux. La responsabilit\u00e9 des DSI et des directions g\u00e9n\u00e9rales est engag\u00e9e. Continuer \u00e0 sous-estimer ce risque n&#8217;est plus acceptable.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:15px;--awb-padding-right:15px;--awb-padding-bottom:15px;--awb-padding-left:15px;--awb-bg-image:radial-gradient(circle at center center, #daeaf65e 0%,#daeaf61a 100%);--awb-bg-size:cover;--awb-box-shadow:3px 3px 4px 0px #daeaf65e;;--awb-border-color:var(--awb-color5);--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-4 fusion_builder_column_inner_3_5 3_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-15 fusion-text-no-margin\" style=\"--awb-font-size:16px;--awb-line-height:1.3;--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:700;\"><p>Prot\u00e9gez votre code contre les vuln\u00e9rabilit\u00e9s<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-5 fusion_builder_column_inner_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:right;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-3 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" data-hover=\"text_slide_up\" href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\"><div class=\"awb-button-text-transition  awb-button__hover-content--centered\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">ARCAD CodeChecker<\/span><span class=\"fusion-button-text awb-button__text awb-button__text--default\">ARCAD CodeChecker<\/span><\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-16 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">6. Donn\u00e9es, IA et conformit\u00e9 : l&#8217;anonymisation comme socle de confiance<\/h2><\/div><div class=\"fusion-title title fusion-title-17 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.3;\">Pourquoi l&#8217;IA change la nature du risque data<\/h3><\/div><div class=\"fusion-text fusion-text-16\"><p>L&#8217;IA consomme \u00e9norm\u00e9ment de donn\u00e9es. Or, une fois expos\u00e9es, ces donn\u00e9es peuvent circuler bien au-del\u00e0 du p\u00e9rim\u00e8tre initialement pr\u00e9vu. La question n&#8217;est plus seulement de stocker les donn\u00e9es, mais de ma\u00eetriser leur usage.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-18 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.3;\">L&#8217;anonymisation comme acc\u00e9l\u00e9rateur, pas comme contrainte<\/h3><\/div><div class=\"fusion-text fusion-text-17\"><p>Anonymiser les donn\u00e9es permet de concilier innovation et conformit\u00e9. C&#8217;est une condition essentielle pour exploiter des donn\u00e9es dans des contextes IA ou Big Data sans exposer les informations sensibles. Dans ce cadre, des solutions comme <a href=\"\/dot\/\" target=\"_blank\" rel=\"noopener noreferrer\">DOT Anonymizer<\/a> permettent de concilier innovation, conformit\u00e9 et s\u00e9curit\u00e9.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:15px;--awb-padding-right:15px;--awb-padding-bottom:15px;--awb-padding-left:15px;--awb-bg-image:radial-gradient(circle at center center, #daeaf65e 0%,#daeaf61a 100%);--awb-bg-size:cover;--awb-box-shadow:3px 3px 4px 0px #daeaf65e;;--awb-border-color:var(--awb-color5);--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-6 fusion_builder_column_inner_1_2 1_2 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-18 fusion-text-no-margin\" style=\"--awb-font-size:16px;--awb-line-height:1.3;--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:700;\"><p>Renforcez la protection de vos donn\u00e9es<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-7 fusion_builder_column_inner_2_5 2_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:4.8%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:4.8%;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:4.8%;--awb-spacing-left-medium:4.8%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:right;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-4 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" data-hover=\"text_slide_up\" href=\"\/dot\/\"><div class=\"awb-button-text-transition  awb-button__hover-content--centered\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez DOT Anonymizer<\/span><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez DOT Anonymizer<\/span><\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-19 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">7. S\u00e9curiser les changements applicatifs : le r\u00f4le cl\u00e9 des tests<\/h2><\/div><div class=\"fusion-title title fusion-title-20 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.3;\">La non-r\u00e9gression comme \u00ab\u202ffirewall\u202f\u00bb applicatif<\/h3><\/div><div class=\"fusion-text fusion-text-19\"><p>Dans les syst\u00e8mes critiques, la moindre erreur peut avoir des cons\u00e9quences financi\u00e8res majeures. Les tests de non-r\u00e9gression jouent le r\u00f4le de v\u00e9ritable firewall applicatif, en s\u00e9curisant chaque \u00e9volution. Sans automatisation des tests, il est illusoire de pr\u00e9tendre moderniser rapidement et en toute s\u00e9curit\u00e9. C&#8217;est dans cette optique que des outils comme <a href=\"\/arcad\/produits\/arcad-verifier-test-de-non-regression\/\" target=\"_blank\" rel=\"noopener noreferrer\">ARCAD Verifier<\/a> sont utilis\u00e9s pour r\u00e9duire drastiquement le risque op\u00e9rationnel.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-21 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.3;\">Gouvernance des changements et s\u00e9paration des r\u00f4les<\/h3><\/div><div class=\"fusion-text fusion-text-20\"><p>DevSecOps ne signifie pas l&#8217;abandon des bonnes pratiques historiques. La s\u00e9paration des r\u00f4les (d\u00e9veloppement, test, mise en production) reste fondamentale. Les revues de code, les validations multiples et les processus de changement sont des garde-fous indispensables.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:15px;--awb-padding-right:15px;--awb-padding-bottom:15px;--awb-padding-left:15px;--awb-bg-image:radial-gradient(circle at center center, #daeaf65e 0%,#daeaf61a 100%);--awb-bg-size:cover;--awb-box-shadow:3px 3px 4px 0px #daeaf65e;;--awb-border-color:var(--awb-color5);--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-8 fusion_builder_column_inner_1_2 1_2 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-21 fusion-text-no-margin\" style=\"--awb-font-size:16px;--awb-line-height:1.3;--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:700;\"><p>Automatisez vos tests de r\u00e9gression<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-9 fusion_builder_column_inner_2_5 2_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:4.8%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:4.8%;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:4.8%;--awb-spacing-left-medium:4.8%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:right;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-5 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" data-hover=\"text_slide_up\" href=\"\/arcad\/produits\/arcad-verifier-test-de-non-regression\/\"><div class=\"awb-button-text-transition  awb-button__hover-content--centered\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez ARCAD Verifier<\/span><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez ARCAD Verifier<\/span><\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-22 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">8. Cloud : la fin du dogme, l&#8217;av\u00e8nement de l&#8217;hybride<\/h2><\/div><div class=\"fusion-title title fusion-title-23 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.3;\">Pourquoi le \u201ctout cloud\u201d ne fonctionne pas pour le critique<\/h3><\/div><div class=\"fusion-text fusion-text-22\"><p>Le discours du \u201ctout cloud\u201d a montr\u00e9 ses limites. Les contraintes \u00e9conomiques, r\u00e9glementaires et techniques rendent cette approche irr\u00e9aliste pour de nombreux syst\u00e8mes critiques. Le legacy, souvent on-premise, conserve toute sa pertinence.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-24 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.3;\">L&#8217;hybridation comme choix strat\u00e9gique<\/h3><\/div><div class=\"fusion-text fusion-text-23\"><p>L&#8217;avenir est hybride :<\/p>\n<ul>\n<li>back-end robustes et s\u00e9curis\u00e9s,<\/li>\n<li>fronts digitaux plus agiles,<\/li>\n<li>coexistence ma\u00eetris\u00e9e du cloud et de l&#8217;on-premise.<\/li>\n<\/ul>\n<p>Ce n&#8217;est pas un \u00e9chec, c&#8217;est un choix rationnel.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-15 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-25 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">9. En conclusion<\/h2><\/div><div class=\"fusion-text fusion-text-24\"><p>En 2026, le v\u00e9ritable enjeu n&#8217;est pas d&#8217;innover plus vite, mais d&#8217;<strong>innover sans fragiliser l&#8217;existant<\/strong>. La modernisation ne peut pas \u00eatre un big bang. Elle doit \u00eatre progressive, ma\u00eetris\u00e9e et s\u00e9curis\u00e9e. Il ne s&#8217;agit pas de tout remplacer, mais de faire \u00e9voluer intelligemment des syst\u00e8mes qui, par d\u00e9finition, sont critiques.<\/p>\n<p>L&#8217;intelligence artificielle a un r\u00f4le cl\u00e9 \u00e0 jouer, \u00e0 condition de sortir du fantasme. L&#8217;IA n&#8217;est pas une baguette magique. <strong>Int\u00e9gr\u00e9e sans cadre, elle devient un risque. Int\u00e9gr\u00e9e de mani\u00e8re contr\u00f4l\u00e9e, elle devient un acc\u00e9l\u00e9rateur<\/strong>. La m\u00eame logique s&#8217;applique aux infrastructures : le \u201ctout cloud\u201d n&#8217;est pas une fin en soi. L&#8217;hybridation est d\u00e9sormais la norme.<\/p>\n<p>Au final, la s\u00e9curit\u00e9 n&#8217;est pas un frein \u00e0 l&#8217;innovation, le legacy n&#8217;est pas un probl\u00e8me \u00e0 \u00e9liminer, mais une fondation sur laquelle s&#8217;appuyer. <strong>La r\u00e9ussite des DSI en 2026 reposera sur une approche pragmatique, hybride et responsable<\/strong>, o\u00f9 chaque \u00e9volution est pens\u00e9e comme un pas de plus, et non comme une rupture.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:45px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-16 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-padding-top:25px;--awb-padding-right:25px;--awb-padding-bottom:25px;--awb-padding-left:25px;--awb-bg-color:var(--awb-color1);--awb-bg-color-hover:var(--awb-color1);--awb-bg-size:cover;--awb-box-shadow:2px 1px 4px 0px rgba(33,41,52,0.41);;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-10 fusion_builder_column_inner_1_5 1_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:20%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:5px;--awb-spacing-left-large:9.6%;--awb-width-medium:20%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:9.6%;--awb-width-small:20%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:9.6%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:130px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:50px;\"><img decoding=\"async\" width=\"500\" height=\"500\" title=\"Photo Arcad &#8211; Philippe Magne\" src=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/06\/Photo-Arcad-Philippe-Magne.png\" alt class=\"img-responsive wp-image-74137\" srcset=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/06\/Photo-Arcad-Philippe-Magne-200x200.png 200w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/06\/Photo-Arcad-Philippe-Magne-400x400.png 400w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/06\/Photo-Arcad-Philippe-Magne.png 500w\" sizes=\"(max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-11 fusion_builder_column_inner_4_5 4_5 fusion-flex-column fusion-flex-align-self-flex-start\" style=\"--awb-padding-left:5px;--awb-bg-size:cover;--awb-width-large:80%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.4%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.4%;--awb-width-medium:80%;--awb-order-medium:0;--awb-spacing-right-medium:2.4%;--awb-spacing-left-medium:2.4%;--awb-width-small:80%;--awb-order-small:0;--awb-margin-top-small:0px;--awb-spacing-right-small:2.4%;--awb-spacing-left-small:2.4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-26 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:rgba(48,135,120,0.59);--awb-margin-top:0px;--awb-margin-bottom:7px;--awb-margin-top-small:0px;--awb-margin-bottom-small:0px;--awb-font-size:13px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:500;margin:0;font-size:1em;--fontSize:13;--minFontSize:13;line-height:1.2;\">\u00c0 propos de l&#8217;auteur<\/h2><\/div><div class=\"fusion-title title fusion-title-27 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-bottom-small:0px;--awb-font-size:22px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:22;--minFontSize:22;line-height:1.3;\">Philippe Magne<\/h3><\/div><div class=\"fusion-title title fusion-title-28 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-top:0px;--awb-margin-bottom:5px;--awb-margin-top-small:0px;--awb-margin-bottom-small:10px;--awb-font-size:16px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;--fontSize:16;--minFontSize:16;line-height:1.36;\">Pr\u00e9sident Directeur G\u00e9n\u00e9ral, ARCAD Software<\/h4><\/div><div class=\"fusion-text fusion-text-25 fusion-text-no-margin\" style=\"--awb-font-size:14px;--awb-line-height:1.4;--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Philippe Magne est le PDG et le Fondateur du groupe ARCAD Software, un \u00e9diteur de logiciels international sp\u00e9cialis\u00e9 dans les solutions multi-plateformes pour DevOps, la modernisation d\u2019applications, l\u2019automatisation des tests et le masquage des donn\u00e9es. Il dirige l\u2019entreprise pour produire une gamme de solutions compl\u00e8tes et int\u00e9gr\u00e9es, distribu\u00e9es par IBM dans le monde entier. Philippe est un expert de la modernisation et est un conf\u00e9rencier reconnu dans les \u00e9v\u00e9nements IBM.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : en 2026, les DSI devront adopter une approche pragmatique, hybride et responsable.<\/p>\n","protected":false},"author":3,"featured_media":75270,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[246],"tags":[569,556],"class_list":["post-75237","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-fr","tag-blog","tag-modernisation-ibm-i"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : la nouvelle \u00e9quation pour 2026<\/title>\n<meta name=\"description\" content=\"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : en 2026, les DSI devront adopter une approche pragmatique, hybride et responsable.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/systemes-legacy-ia-securite-nouvelle-equation-2026\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : la nouvelle \u00e9quation pour 2026\" \/>\n<meta property=\"og:description\" content=\"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : en 2026, les DSI devront adopter une approche pragmatique, hybride et responsable.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/systemes-legacy-ia-securite-nouvelle-equation-2026\/\" \/>\n<meta property=\"og:site_name\" content=\"ARCAD\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-29T16:02:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T09:08:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2026\/01\/systemes-legacy-ia-securite-nouvelle-equation-2026.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1634\" \/>\n\t<meta property=\"og:image:height\" content=\"609\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"administrator\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"administrator\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/systemes-legacy-ia-securite-nouvelle-equation-2026\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/systemes-legacy-ia-securite-nouvelle-equation-2026\\\/\"},\"author\":{\"name\":\"administrator\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/ac3c33678907c9c414148df7a202dfbf\"},\"headline\":\"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : la nouvelle \u00e9quation pour 2026\",\"datePublished\":\"2026-01-29T16:02:57+00:00\",\"dateModified\":\"2026-03-18T09:08:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/systemes-legacy-ia-securite-nouvelle-equation-2026\\\/\"},\"wordCount\":9499,\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/systemes-legacy-ia-securite-nouvelle-equation-2026\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/systemes-legacy-ia-securite-nouvelle-equation-2026.png\",\"keywords\":[\"blog\",\"Modernisation IBM i\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/systemes-legacy-ia-securite-nouvelle-equation-2026\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/systemes-legacy-ia-securite-nouvelle-equation-2026\\\/\",\"name\":\"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : la nouvelle \u00e9quation pour 2026\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/systemes-legacy-ia-securite-nouvelle-equation-2026\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/systemes-legacy-ia-securite-nouvelle-equation-2026\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/systemes-legacy-ia-securite-nouvelle-equation-2026.png\",\"datePublished\":\"2026-01-29T16:02:57+00:00\",\"dateModified\":\"2026-03-18T09:08:22+00:00\",\"description\":\"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : en 2026, les DSI devront adopter une approche pragmatique, hybride et responsable.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/systemes-legacy-ia-securite-nouvelle-equation-2026\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/systemes-legacy-ia-securite-nouvelle-equation-2026\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/systemes-legacy-ia-securite-nouvelle-equation-2026\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/systemes-legacy-ia-securite-nouvelle-equation-2026.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/systemes-legacy-ia-securite-nouvelle-equation-2026.png\",\"width\":1634,\"height\":609,\"caption\":\"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/systemes-legacy-ia-securite-nouvelle-equation-2026\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"ARCAD\",\"item\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : la nouvelle \u00e9quation pour 2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"name\":\"ARCAD\",\"description\":\"Experts DevOps &amp; Modernisation sur IBM i (alias AS\\\/400 ou AS400)\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\",\"name\":\"ARCAD Software\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"width\":144,\"height\":200,\"caption\":\"ARCAD Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/Arcad-Software\\\/116086138469235\",\"https:\\\/\\\/x.com\\\/arcad_software\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/arcad-software\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ARCADSoftwareInc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/ac3c33678907c9c414148df7a202dfbf\",\"name\":\"administrator\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/author\\\/administrator\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : la nouvelle \u00e9quation pour 2026","description":"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : en 2026, les DSI devront adopter une approche pragmatique, hybride et responsable.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/systemes-legacy-ia-securite-nouvelle-equation-2026\/","og_locale":"en_US","og_type":"article","og_title":"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : la nouvelle \u00e9quation pour 2026","og_description":"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : en 2026, les DSI devront adopter une approche pragmatique, hybride et responsable.","og_url":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/systemes-legacy-ia-securite-nouvelle-equation-2026\/","og_site_name":"ARCAD","article_publisher":"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","article_published_time":"2026-01-29T16:02:57+00:00","article_modified_time":"2026-03-18T09:08:22+00:00","og_image":[{"width":1634,"height":609,"url":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2026\/01\/systemes-legacy-ia-securite-nouvelle-equation-2026.png","type":"image\/png"}],"author":"administrator","twitter_misc":{"Written by":"administrator","Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/systemes-legacy-ia-securite-nouvelle-equation-2026\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/systemes-legacy-ia-securite-nouvelle-equation-2026\/"},"author":{"name":"administrator","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/ac3c33678907c9c414148df7a202dfbf"},"headline":"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : la nouvelle \u00e9quation pour 2026","datePublished":"2026-01-29T16:02:57+00:00","dateModified":"2026-03-18T09:08:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/systemes-legacy-ia-securite-nouvelle-equation-2026\/"},"wordCount":9499,"publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"image":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/systemes-legacy-ia-securite-nouvelle-equation-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2026\/01\/systemes-legacy-ia-securite-nouvelle-equation-2026.png","keywords":["blog","Modernisation IBM i"],"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/systemes-legacy-ia-securite-nouvelle-equation-2026\/","url":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/systemes-legacy-ia-securite-nouvelle-equation-2026\/","name":"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : la nouvelle \u00e9quation pour 2026","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/systemes-legacy-ia-securite-nouvelle-equation-2026\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/systemes-legacy-ia-securite-nouvelle-equation-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2026\/01\/systemes-legacy-ia-securite-nouvelle-equation-2026.png","datePublished":"2026-01-29T16:02:57+00:00","dateModified":"2026-03-18T09:08:22+00:00","description":"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : en 2026, les DSI devront adopter une approche pragmatique, hybride et responsable.","breadcrumb":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/systemes-legacy-ia-securite-nouvelle-equation-2026\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/systemes-legacy-ia-securite-nouvelle-equation-2026\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/systemes-legacy-ia-securite-nouvelle-equation-2026\/#primaryimage","url":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2026\/01\/systemes-legacy-ia-securite-nouvelle-equation-2026.png","contentUrl":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2026\/01\/systemes-legacy-ia-securite-nouvelle-equation-2026.png","width":1634,"height":609,"caption":"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9"},{"@type":"BreadcrumbList","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/systemes-legacy-ia-securite-nouvelle-equation-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"ARCAD","item":"https:\/\/www.arcadsoftware.com\/arcad\/"},{"@type":"ListItem","position":2,"name":"Syst\u00e8mes legacy, IA et s\u00e9curit\u00e9 : la nouvelle \u00e9quation pour 2026"}]},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website","url":"https:\/\/www.arcadsoftware.com\/arcad\/","name":"ARCAD","description":"Experts DevOps &amp; Modernisation sur IBM i (alias AS\/400 ou AS400)","publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/arcad\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization","name":"ARCAD Software","url":"https:\/\/www.arcadsoftware.com\/arcad\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","width":144,"height":200,"caption":"ARCAD Software"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","https:\/\/x.com\/arcad_software","https:\/\/www.linkedin.com\/company\/arcad-software","https:\/\/www.youtube.com\/user\/ARCADSoftwareInc"]},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/ac3c33678907c9c414148df7a202dfbf","name":"administrator","url":"https:\/\/www.arcadsoftware.com\/arcad\/author\/administrator\/"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/posts\/75237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/comments?post=75237"}],"version-history":[{"count":4,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/posts\/75237\/revisions"}],"predecessor-version":[{"id":75477,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/posts\/75237\/revisions\/75477"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/media\/75270"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/media?parent=75237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/categories?post=75237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/tags?post=75237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}