{"id":6279,"date":"2022-01-20T14:48:02","date_gmt":"2022-01-20T13:48:02","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/dot\/?p=6279"},"modified":"2023-03-08T17:09:44","modified_gmt":"2023-03-08T16:09:44","slug":"lanonymisation-pour-optimiser-sa-cybersecurite","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/articles-de-presse\/lanonymisation-pour-optimiser-sa-cybersecurite\/","title":{"rendered":"L\u2019anonymisation pour optimiser sa cybers\u00e9curit\u00e9"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>L\u2019anonymisation des donn\u00e9es des utilisateurs est un enjeu central de la cybers\u00e9curit\u00e9 d\u2019une organisation. Il s\u2019agit de modifier le contenu des donn\u00e9es individuelles recueillies, afin de rendre toute identification des personnes impossible et s\u00e9curiser ainsi les informations les concernant et l\u2019int\u00e9grit\u00e9 de l\u2019organisation en mati\u00e8re de cybers\u00e9curit\u00e9.<\/p>\n<p>Cette op\u00e9ration d\u00e9licate peut \u00eatre effectu\u00e9e par des experts comme le cr\u00e9ateur de DOT-Anonymizer, ARCAD Software.<\/p>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_margin-top:30px;\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/www.zataz.com\/lanonymisation-pour-optimiser-sa-cybersecurite\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">En savoir plus<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019anonymisation des donn\u00e9es des utilisateurs est un enjeu central de la cybers\u00e9curit\u00e9 d\u2019une organisation. Il s\u2019agit de modifier le contenu des donn\u00e9es individuelles recueillies, afin de rendre toute identification des personnes impossible et s\u00e9curiser ainsi les informations les concernant et l\u2019int\u00e9grit\u00e9 de l\u2019organisation en mati\u00e8re de cybers\u00e9curit\u00e9.<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[99],"tags":[],"class_list":["post-6279","post","type-post","status-publish","format-standard","hentry","category-articles-de-presse"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>L\u2019anonymisation pour optimiser sa cybers\u00e9curit\u00e9 | Article de presse<\/title>\n<meta name=\"description\" content=\"L\u2019anonymisation des donn\u00e9es des utilisateurs est un enjeu central de la cybers\u00e9curit\u00e9 d\u2019une organisation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/articles-de-presse\/lanonymisation-pour-optimiser-sa-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L\u2019anonymisation pour optimiser sa cybers\u00e9curit\u00e9 | Article de presse\" \/>\n<meta property=\"og:description\" content=\"L\u2019anonymisation des donn\u00e9es des utilisateurs est un enjeu central de la cybers\u00e9curit\u00e9 d\u2019une organisation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/articles-de-presse\/lanonymisation-pour-optimiser-sa-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"DOT - Data Oriented Testing\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-20T13:48:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-08T16:09:44+00:00\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/articles-de-presse\/lanonymisation-pour-optimiser-sa-cybersecurite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/articles-de-presse\/lanonymisation-pour-optimiser-sa-cybersecurite\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"headline\":\"L\u2019anonymisation pour optimiser sa cybers\u00e9curit\u00e9\",\"datePublished\":\"2022-01-20T13:48:02+00:00\",\"dateModified\":\"2023-03-08T16:09:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/articles-de-presse\/lanonymisation-pour-optimiser-sa-cybersecurite\/\"},\"wordCount\":646,\"articleSection\":[\"Articles de presse\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/articles-de-presse\/lanonymisation-pour-optimiser-sa-cybersecurite\/\",\"url\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/articles-de-presse\/lanonymisation-pour-optimiser-sa-cybersecurite\/\",\"name\":\"L\u2019anonymisation pour optimiser sa cybers\u00e9curit\u00e9 | Article de presse\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\"},\"datePublished\":\"2022-01-20T13:48:02+00:00\",\"dateModified\":\"2023-03-08T16:09:44+00:00\",\"author\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"description\":\"L\u2019anonymisation des donn\u00e9es des utilisateurs est un enjeu central de la cybers\u00e9curit\u00e9 d\u2019une organisation.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/articles-de-presse\/lanonymisation-pour-optimiser-sa-cybersecurite\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/\",\"name\":\"DOT - Data Oriented Testing\",\"description\":\"Confidential Data Testing Automation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\",\"name\":\"Myriam Goutte\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L\u2019anonymisation pour optimiser sa cybers\u00e9curit\u00e9 | Article de presse","description":"L\u2019anonymisation des donn\u00e9es des utilisateurs est un enjeu central de la cybers\u00e9curit\u00e9 d\u2019une organisation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/articles-de-presse\/lanonymisation-pour-optimiser-sa-cybersecurite\/","og_locale":"en_US","og_type":"article","og_title":"L\u2019anonymisation pour optimiser sa cybers\u00e9curit\u00e9 | Article de presse","og_description":"L\u2019anonymisation des donn\u00e9es des utilisateurs est un enjeu central de la cybers\u00e9curit\u00e9 d\u2019une organisation.","og_url":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/articles-de-presse\/lanonymisation-pour-optimiser-sa-cybersecurite\/","og_site_name":"DOT - Data Oriented Testing","article_published_time":"2022-01-20T13:48:02+00:00","article_modified_time":"2023-03-08T16:09:44+00:00","author":"Myriam Goutte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/articles-de-presse\/lanonymisation-pour-optimiser-sa-cybersecurite\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/articles-de-presse\/lanonymisation-pour-optimiser-sa-cybersecurite\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"headline":"L\u2019anonymisation pour optimiser sa cybers\u00e9curit\u00e9","datePublished":"2022-01-20T13:48:02+00:00","dateModified":"2023-03-08T16:09:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/articles-de-presse\/lanonymisation-pour-optimiser-sa-cybersecurite\/"},"wordCount":646,"articleSection":["Articles de presse"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/articles-de-presse\/lanonymisation-pour-optimiser-sa-cybersecurite\/","url":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/articles-de-presse\/lanonymisation-pour-optimiser-sa-cybersecurite\/","name":"L\u2019anonymisation pour optimiser sa cybers\u00e9curit\u00e9 | Article de presse","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#website"},"datePublished":"2022-01-20T13:48:02+00:00","dateModified":"2023-03-08T16:09:44+00:00","author":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"description":"L\u2019anonymisation des donn\u00e9es des utilisateurs est un enjeu central de la cybers\u00e9curit\u00e9 d\u2019une organisation.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.fr\/dot\/ressources\/articles-de-presse\/lanonymisation-pour-optimiser-sa-cybersecurite\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/dot\/#website","url":"https:\/\/www.arcadsoftware.com\/dot\/","name":"DOT - Data Oriented Testing","description":"Confidential Data Testing Automation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2","name":"Myriam Goutte"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/6279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/comments?post=6279"}],"version-history":[{"count":2,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/6279\/revisions"}],"predecessor-version":[{"id":7073,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/6279\/revisions\/7073"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/media?parent=6279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/categories?post=6279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/tags?post=6279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}