{"id":1129,"date":"2020-09-03T07:06:54","date_gmt":"2020-09-03T07:06:54","guid":{"rendered":"https:\/\/regdatadev.affinities.ch\/?page_id=1129"},"modified":"2022-01-28T16:18:53","modified_gmt":"2022-01-28T16:18:53","slug":"enjeux","status":"publish","type":"page","link":"https:\/\/www.regdata.ch\/fr\/enjeux\/","title":{"rendered":"Enjeux"},"content":{"rendered":"<h1><a href=\"#\"><span class=\"uk-text-primary\">Les enjeux<\/span> techniques<br \/>et fonctionnels<br \/>\nde la<br \/>protection de donn\u00e9es<\/a><\/h1>\n<h2>Enterprise-wide data protection platform<\/h2>\n<div>\n<p style=\"text-align: justify;\">L\u2019enjeu de la protection des donn\u00e9es confidentielles et personnelles sensibles n\u2019est pas seulement de trouver la technique de protection avec le bon algorithme d\u2019encryption, la bonne anonymization ou tokenization d\u2019un point de vu niveau de s\u00e9curit\u00e9. Cela va bien au del\u00e0.<\/p>\n<p style=\"text-align: justify;\">Vous avez surement rencontr\u00e9 des probl\u00e8mes li\u00e9s \u00e0 la protection des donn\u00e9es:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Performance d\u00e9grad\u00e9e<\/li>\n<li>Logique m\u00e9tier non pr\u00e9serv\u00e9e<\/li>\n<li>Mod\u00e8le de donn\u00e9es non \u00e9ligible \u00e0 la protection<\/li>\n<li>Exp\u00e9rience utilisateur non acceptable<\/li>\n<li>Contextes m\u00e9tiers non pris en compte<\/li>\n<li>Cycle de vie de la donn\u00e9e adress\u00e9 partiellement<\/li>\n<li>Traitement m\u00e9tier de la donn\u00e9e trop restrictif<\/li>\n<li>&#8230;<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Depuis le 1er jour, le challenge de REGDATA a \u00e9t\u00e9 de concilier toutes ces dimensions m\u00e9tiers, utilisateurs, performance tout en appliquant un niveau de s\u00e9curit\u00e9 \u00e9lev\u00e9 et en \u00e9tant le moins intrusif possible.<\/p>\n<p style=\"text-align: justify;\">REGDATA a alors \u00e9t\u00e9 en position de proposer d\u2019autres services \u00e0 forte valeur ajout\u00e9e:<\/p>\n<p style=\"text-align: justify;\"><strong>Data compliance<\/strong>: Rapports de s\u00e9curit\u00e9 et de conformit\u00e9 en temps r\u00e9el, automatiques, auditables.<\/p>\n<p style=\"text-align: justify;\"><strong>Data value<\/strong>: Analyse profonde de donn\u00e9es pr\u00e9servant l\u2019identification des donn\u00e9es confidentielles et\/ou personnelles sensibles.<\/p>\n<\/div>\n<hr>\n<h2><a href=\"\/fr\/essai-gratuit\">demander <br class=\"uk-visible@s\" \/><span class=\"uk-text-primary\">un essai gratuit\u00a0\u00a0 <img decoding=\"async\" class=\"alignnone size-full wp-image-123\" src=\"\/wp-content\/uploads\/2020\/06\/goto_try_it.png\" alt=\"\" width=\"80\" \/><\/span><\/a><\/h2>\n<hr>\n<p><!-- {\"name\":\"tempvideo\",\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"style\":\"default\",\"width\":\"\",\"vertical_align\":\"middle\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"title_breakpoint\":\"xl\",\"image_position\":\"center-right\",\"width_expand\":\"left\",\"height\":\"full\",\"padding\":\"large\",\"animation\":\"slide-left-medium\",\"image\":\"wp-content\\\/uploads\\\/2020\\\/06\\\/HEXAGONE001-gauche-modif.png\",\"image_size\":\"contain\",\"padding_remove_bottom\":false,\"padding_remove_top\":true,\"animation_delay\":true,\"header_transparent_noplaceholder\":false},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"2-3,1-3\",\"width\":\"default\",\"width_expand\":\"left\",\"height\":\"full\",\"column_gap\":\"collapse\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-left\",\"media_overlay_gradient\":\"\",\"vertical_align\":\"middle\",\"image\":\"\",\"image_size\":\"contain\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"title_element\":\"h1\",\"title_style\":\"heading-2xlarge\",\"margin\":\"default\",\"block_align_breakpoint\":\"m\",\"animation\":\"slide-bottom-medium\",\"content\":\"<span class=\\\"uk-text-primary\\\">Les enjeux<\\\/span> techniques<br \/>et fonctionnels\\nde la<br \/>protection de donn\\u00e9es\",\"parallax_viewport\":\"0.25\",\"parallax_y_start\":\"4vh\",\"link\":\"#\",\"css\":\".el-element {padding:0;line-height:1.2em}\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[]}]}],\"name\":\"Accueil\"},{\"type\":\"section\",\"props\":{\"style\":\"muted\",\"width\":\"default\",\"vertical_align\":\"middle\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"title_breakpoint\":\"xl\",\"image_position\":\"center-center\"},\"children\":[{\"type\":\"row\",\"props\":{\"width\":\"default\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_medium\":\"1-1\"},\"children\":[{\"type\":\"headline\",\"props\":{\"title_element\":\"h2\",\"title_style\":\"heading-medium\",\"title_color\":\"primary\",\"content\":\"Enterprise-wide data protection platform\",\"id\":\"vue\"}},{\"type\":\"text\",\"props\":{\"margin\":\"default\",\"column_breakpoint\":\"m\",\"text_size\":\"large\",\"maxwidth\":\"2xlarge\",\"content\":\"\n\n<p style=\\\"text-align: justify;\\\">L\\u2019enjeu de la protection des donn\\u00e9es confidentielles et personnelles sensibles n\\u2019est pas seulement de trouver la technique de protection avec le bon algorithme d\\u2019encryption, la bonne anonymization ou tokenization d\\u2019un point de vu niveau de s\\u00e9curit\\u00e9. Cela va bien au del\\u00e0.<\\\/p>\\n\n\n<p style=\\\"text-align: justify;\\\">Vous avez surement rencontr\\u00e9 des probl\\u00e8mes li\\u00e9s \\u00e0 la protection des donn\\u00e9es:<\\\/p>\\n\n\n<ul style=\\\"text-align: justify;\\\">\\n\n\n<li>Performance d\\u00e9grad\\u00e9e<\\\/li>\\n\n\n<li>Logique m\\u00e9tier non pr\\u00e9serv\\u00e9e<\\\/li>\\n\n\n<li>Mod\\u00e8le de donn\\u00e9es non \\u00e9ligible \\u00e0 la protection<\\\/li>\\n\n\n<li>Exp\\u00e9rience utilisateur non acceptable<\\\/li>\\n\n\n<li>Contextes m\\u00e9tiers non pris en compte<\\\/li>\\n\n\n<li>Cycle de vie de la donn\\u00e9e adress\\u00e9 partiellement<\\\/li>\\n\n\n<li>Traitement m\\u00e9tier de la donn\\u00e9e trop restrictif<\\\/li>\\n\n\n<li>...<\\\/li>\\n<\\\/ul>\\n\n\n<p style=\\\"text-align: justify;\\\">Depuis le 1er jour, le challenge de REGDATA a \\u00e9t\\u00e9 de concilier toutes ces dimensions m\\u00e9tiers, utilisateurs, performance tout en appliquant un niveau de s\\u00e9curit\\u00e9 \\u00e9lev\\u00e9 et en \\u00e9tant le moins intrusif possible.<\\\/p>\\n\n\n<p style=\\\"text-align: justify;\\\">REGDATA a alors \\u00e9t\\u00e9 en position de proposer d\\u2019autres services \\u00e0 forte valeur ajout\\u00e9e:<\\\/p>\\n\n\n<p style=\\\"text-align: justify;\\\"><strong>Data compliance<\\\/strong>: Rapports de s\\u00e9curit\\u00e9 et de conformit\\u00e9 en temps r\\u00e9el, automatiques, auditables.<\\\/p>\\n\n\n<p style=\\\"text-align: justify;\\\"><strong>Data value<\\\/strong>: Analyse profonde de donn\\u00e9es pr\\u00e9servant l\\u2019identification des donn\\u00e9es confidentielles et\\\/ou personnelles sensibles.<\\\/p>\"}}]}]}],\"name\":\"Vues fonctionnelles\"},{\"type\":\"section\",\"props\":{\"style\":\"default\",\"width\":\"default\",\"vertical_align\":\"middle\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"title_breakpoint\":\"xl\",\"image_position\":\"center-center\",\"padding_remove_top\":false},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"expand,large\",\"margin\":\"medium\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_small\":\"expand\"},\"children\":[]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"vertical_align\":\"bottom\",\"width_small\":\"large\"},\"children\":[{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"\",\"divider_align\":\"\",\"divider_align_breakpoint\":\"\",\"divider_align_fallback\":\"\"}},{\"type\":\"headline\",\"props\":{\"title_element\":\"h2\",\"title_style\":\"heading-large\",\"content\":\"demander <br class=\\\"uk-visible@s\\\" \\\/><span class=\\\"uk-text-primary\\\">un essai gratuit\\u00a0\\u00a0 <img class=\\\"alignnone size-full wp-image-123\\\" src=\\\"\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/goto_try_it.png\\\" alt=\\\"\\\" width=\\\"80\\\" \\\/><\\\/span>\",\"link\":\"fr\\\/essai-gratuit\\\/\",\"link_style\":false,\"link_target\":false}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"\",\"divider_align\":\"\",\"divider_align_breakpoint\":\"\",\"divider_align_fallback\":\"\"}}]}]}],\"name\":\"lets go essai\"}],\"version\":\"2.2.5\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les enjeux techniqueset fonctionnels de laprotection de donn\u00e9es Enterprise-wide data protection platform L\u2019enjeu de la protection des donn\u00e9es confidentielles et personnelles sensibles n\u2019est pas seulement de trouver la technique de protection avec le bon algorithme d\u2019encryption, la bonne anonymization ou tokenization d\u2019un point de vu niveau de s\u00e9curit\u00e9. Cela va bien au del\u00e0. Vous avez [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1129","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Enjeux - REGDATA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.regdata.ch\/fr\/enjeux\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enjeux - REGDATA\" \/>\n<meta property=\"og:description\" content=\"Les enjeux techniqueset fonctionnels de laprotection de donn\u00e9es Enterprise-wide data protection platform L\u2019enjeu de la protection des donn\u00e9es confidentielles et personnelles sensibles n\u2019est pas seulement de trouver la technique de protection avec le bon algorithme d\u2019encryption, la bonne anonymization ou tokenization d\u2019un point de vu niveau de s\u00e9curit\u00e9. Cela va bien au del\u00e0. Vous avez [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.regdata.ch\/fr\/enjeux\/\" \/>\n<meta property=\"og:site_name\" content=\"REGDATA\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-28T16:18:53+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.regdata.ch\/fr\/enjeux\/\",\"url\":\"https:\/\/www.regdata.ch\/fr\/enjeux\/\",\"name\":\"Enjeux - REGDATA\",\"isPartOf\":{\"@id\":\"https:\/\/www.regdata.ch\/fr\/#website\"},\"datePublished\":\"2020-09-03T07:06:54+00:00\",\"dateModified\":\"2022-01-28T16:18:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.regdata.ch\/fr\/enjeux\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.regdata.ch\/fr\/enjeux\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.regdata.ch\/fr\/enjeux\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.regdata.ch\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enjeux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.regdata.ch\/fr\/#website\",\"url\":\"https:\/\/www.regdata.ch\/fr\/\",\"name\":\"REGDATA\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.regdata.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.regdata.ch\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.regdata.ch\/fr\/#organization\",\"name\":\"REGDATA SA\",\"url\":\"https:\/\/www.regdata.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.regdata.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/favicon.png\",\"contentUrl\":\"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/favicon.png\",\"width\":71,\"height\":71,\"caption\":\"REGDATA SA\"},\"image\":{\"@id\":\"https:\/\/www.regdata.ch\/fr\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enjeux - REGDATA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.regdata.ch\/fr\/enjeux\/","og_locale":"fr_FR","og_type":"article","og_title":"Enjeux - REGDATA","og_description":"Les enjeux techniqueset fonctionnels de laprotection de donn\u00e9es Enterprise-wide data protection platform L\u2019enjeu de la protection des donn\u00e9es confidentielles et personnelles sensibles n\u2019est pas seulement de trouver la technique de protection avec le bon algorithme d\u2019encryption, la bonne anonymization ou tokenization d\u2019un point de vu niveau de s\u00e9curit\u00e9. Cela va bien au del\u00e0. Vous avez [&hellip;]","og_url":"https:\/\/www.regdata.ch\/fr\/enjeux\/","og_site_name":"REGDATA","article_modified_time":"2022-01-28T16:18:53+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.regdata.ch\/fr\/enjeux\/","url":"https:\/\/www.regdata.ch\/fr\/enjeux\/","name":"Enjeux - REGDATA","isPartOf":{"@id":"https:\/\/www.regdata.ch\/fr\/#website"},"datePublished":"2020-09-03T07:06:54+00:00","dateModified":"2022-01-28T16:18:53+00:00","breadcrumb":{"@id":"https:\/\/www.regdata.ch\/fr\/enjeux\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.regdata.ch\/fr\/enjeux\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.regdata.ch\/fr\/enjeux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.regdata.ch\/fr\/"},{"@type":"ListItem","position":2,"name":"Enjeux"}]},{"@type":"WebSite","@id":"https:\/\/www.regdata.ch\/fr\/#website","url":"https:\/\/www.regdata.ch\/fr\/","name":"REGDATA","description":"","publisher":{"@id":"https:\/\/www.regdata.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.regdata.ch\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.regdata.ch\/fr\/#organization","name":"REGDATA SA","url":"https:\/\/www.regdata.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.regdata.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/favicon.png","contentUrl":"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/favicon.png","width":71,"height":71,"caption":"REGDATA SA"},"image":{"@id":"https:\/\/www.regdata.ch\/fr\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.regdata.ch\/fr\/wp-json\/wp\/v2\/pages\/1129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.regdata.ch\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.regdata.ch\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.regdata.ch\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.regdata.ch\/fr\/wp-json\/wp\/v2\/comments?post=1129"}],"version-history":[{"count":48,"href":"https:\/\/www.regdata.ch\/fr\/wp-json\/wp\/v2\/pages\/1129\/revisions"}],"predecessor-version":[{"id":2512,"href":"https:\/\/www.regdata.ch\/fr\/wp-json\/wp\/v2\/pages\/1129\/revisions\/2512"}],"wp:attachment":[{"href":"https:\/\/www.regdata.ch\/fr\/wp-json\/wp\/v2\/media?parent=1129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}