{"id":276,"date":"2020-11-02T15:31:51","date_gmt":"2020-11-02T21:31:51","guid":{"rendered":"https:\/\/idsinc.com\/?p=276"},"modified":"2021-11-30T14:17:41","modified_gmt":"2021-11-30T20:17:41","slug":"informatique-en-nuage","status":"publish","type":"post","link":"https:\/\/idsinc.com\/fr\/cloud-computing\/","title":{"rendered":"Cloud Computing \u2013 Plus ou moins s\u00e9curis\u00e9 ?"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\">Par: <a href=\"https:\/\/content.idiscoverysolutions.com\/blog\/author\/idiscovery-solutions\">Solutions d&#039;iD\u00e9couverte<\/a> le 02\/11\/2020<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Les cabinets d&#039;avocats n&#039;ont jamais \u00e9t\u00e9 \u00e0 la pointe des technologies de l&#039;information, mais la pand\u00e9mie et les changements dans notre fa\u00e7on de travailler ont eu un impact sur toutes les organisations. Les cabinets d&#039;avocats n&#039;ont pas \u00e9t\u00e9 \u00e9pargn\u00e9s. Le besoin de capacit\u00e9s de travail \u00e0 distance a pouss\u00e9 de nombreuses entreprises \u00e0 \u00e9valuer comment elles font ce qu&#039;elles font et la technologie qui prend en charge ces processus.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p class=\"wp-block-paragraph\">Alors que de nombreux acteurs du monde informatique ont reconnu que la migration de leurs applications et de leurs donn\u00e9es vers le cloud peut am\u00e9liorer, et non compromettre, la s\u00e9curit\u00e9, de nombreux cabinets d&#039;avocats h\u00e9sitent \u00e0 stocker des donn\u00e9es sensibles sur des serveurs qu&#039;ils ne poss\u00e8dent pas et qu&#039;ils ne peuvent pas voir physiquement.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Bien qu&#039;il existe certainement des risques associ\u00e9s au cloud computing, la r\u00e9alit\u00e9 est que les solutions cloud correctement mises en \u0153uvre sont g\u00e9n\u00e9ralement plus s\u00fbres et peuvent \u00eatre beaucoup plus s\u00fbres que d&#039;h\u00e9berger des donn\u00e9es sensibles sur vos propres syst\u00e8mes sur votre propre r\u00e9seau. Si vous y r\u00e9fl\u00e9chissez, qui, selon vous, d\u00e9pense le plus pour la s\u00e9curit\u00e9\u00a0? Votre cabinet d&#039;avocats ou Amazon, par exemple\u00a0? Quel centre de donn\u00e9es serait plus facile d&#039;acc\u00e8s, le v\u00f4tre ou celui de Microsoft\u00a0?<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Une vision holistique de la cybers\u00e9curit\u00e9 signifie que vous consid\u00e9rez la triade CIA de la cybers\u00e9curit\u00e9, qui est la confidentialit\u00e9, l&#039;int\u00e9grit\u00e9 et la disponibilit\u00e9. La plupart des gens ne pensent qu&#039;\u00e0 la dimension de la confidentialit\u00e9, mais le cloud computing permet aux entreprises de r\u00e9duire consid\u00e9rablement le risque d&#039;un probl\u00e8me de disponibilit\u00e9. Une fois que vos applications et vos donn\u00e9es sont dans le cloud, cr\u00e9er une redondance qui vous prot\u00e8ge contre la perte d&#039;acc\u00e8s ou la perte d&#039;alimentation d&#039;une seule installation devient un exercice tr\u00e8s simple et peu co\u00fbteux.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Bien que la s\u00e9curit\u00e9 du cloud comporte de nombreuses dimensions, certaines consid\u00e9rations sont essentielles, en particulier pour les cabinets d&#039;avocats. Premi\u00e8rement, si vous utilisez n&#039;importe quel type de ressource de cloud computing, cela signifie que vous transf\u00e9rez vos donn\u00e9es sur Internet. Il est donc extr\u00eamement important que vous vous assuriez que votre entreprise met en \u0153uvre et exige un cryptage fort pour prot\u00e9ger vos donn\u00e9es. Le chiffrement est simplement le processus de chiffrement\/codage des donn\u00e9es avant leur envoi et de chiffrement de toutes les donn\u00e9es au repos dans votre environnement cloud.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Deuxi\u00e8mement, la gestion des identit\u00e9s et des acc\u00e8s est un autre outil essentiel pour restreindre l&#039;acc\u00e8s aux donn\u00e9es sur les ordinateurs qui sont visibles sur Internet. L&#039;IAM, comme on l&#039;appelle, implique la v\u00e9rification d&#039;identit\u00e9 par le biais d&#039;une authentification multifacteur combin\u00e9e \u00e0 des contr\u00f4les d&#039;acc\u00e8s bas\u00e9s sur l&#039;identit\u00e9 de l&#039;utilisateur.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">L&#039;authentification multifacteur (&quot;MFA&quot;) signifie simplement que vous devez avoir plusieurs fa\u00e7ons diff\u00e9rentes de prouver que vous \u00eates qui vous pr\u00e9tendez \u00eatre. Historiquement, nous avons utilis\u00e9 l&#039;authentification \u00e0 facteur unique de quelque chose que vous connaissez - un nom d&#039;utilisateur et un mot de passe. Avec MFA, nous combinons quelque chose que vous connaissez avec quelque chose que vous avez comme un jeton qui g\u00e9n\u00e8re des chiffres ou un code qui est g\u00e9n\u00e9r\u00e9 sur votre smartphone.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">La gestion des acc\u00e8s n\u00e9cessite que vous identifiiez sp\u00e9cifiquement qui est autoris\u00e9 \u00e0 acc\u00e9der \u00e0 vos syst\u00e8mes, et une fois qu&#039;ils le font, \u00e0 quelles informations ils peuvent acc\u00e9der et ce qu&#039;ils font avec vos donn\u00e9es. Les meilleures pratiques ici consistent \u00e0 ne pas essayer de g\u00e9rer chaque utilisateur individuellement, mais plut\u00f4t \u00e0 cr\u00e9er des groupes clairement d\u00e9finis et \u00e0 ajouter des utilisateurs aux groupes. En outre, vous pouvez faire la m\u00eame chose avec les \u00e9quipes de cas et les sujets. Seule l&#039;\u00e9quipe charg\u00e9e du dossier peut acc\u00e9der \u00e0 des sujets ou \u00e0 des groupes de sujets sp\u00e9cifiques.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Dans l&#039;ensemble, il est important de se rappeler qu&#039;un environnement cloud n&#039;est pas plus vuln\u00e9rable aux menaces que votre propre centre de donn\u00e9es. En fait, compte tenu des ressources dont disposent la plupart des fournisseurs de cloud, ils sont susceptibles d&#039;avoir un meilleur temps de disponibilit\u00e9 du syst\u00e8me, de meilleures politiques de s\u00e9curit\u00e9 et probablement des outils de s\u00e9curit\u00e9 avanc\u00e9s que la plupart des cabinets d&#039;avocats ne peuvent pas se permettre.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"wp-block-paragraph\">iDiscovery Solutions est une soci\u00e9t\u00e9 de conseil strat\u00e9gique, de technologie et de services d&#039;experts - fournissant des solutions personnalis\u00e9es d&#039;eDiscovery allant de la criminalistique num\u00e9rique au t\u00e9moignage d&#039;expert pour les cabinets d&#039;avocats et les entreprises aux \u00c9tats-Unis et en Europe.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>","protected":false},"excerpt":{"rendered":"<p>By: iDiscovery Solutions on 11\/2\/2020 Law firms have historically not been on the leading edge of information technology, but the pandemic and changes in how we work have impacted every organization. Law firms have not been immune. The need for remote work capabilities has driven many firms to evaluate how they do what they do [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":2374,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-276","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cloud Computing \u2013 More or Less Secure? - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Working remotely is forcing firms to use cloud solutions. Cloud computing is safer than storing data on your network, but some are skeptical.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/fr\/informatique-en-nuage\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Computing \u2013 More or Less Secure?\" \/>\n<meta property=\"og:description\" content=\"Working remotely is forcing firms to use cloud solutions. Cloud computing is safer than storing data on your network, but some are skeptical.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/fr\/informatique-en-nuage\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-02T21:31:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-30T20:17:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202014.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iDiscovery Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"iDiscovery Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/cloud-computing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/cloud-computing\\\/\"},\"author\":{\"name\":\"iDiscovery Solutions\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\"},\"headline\":\"Cloud Computing \u2013 More or Less Secure?\",\"datePublished\":\"2020-11-02T21:31:51+00:00\",\"dateModified\":\"2021-11-30T20:17:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/cloud-computing\\\/\"},\"wordCount\":609,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/cloud-computing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/iDS-NewLogoBlogImages-202014.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/cloud-computing\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/es\\\/cloud-computing\\\/\",\"name\":\"Cloud Computing \u2013 More or Less Secure? - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/cloud-computing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/cloud-computing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/iDS-NewLogoBlogImages-202014.jpg\",\"datePublished\":\"2020-11-02T21:31:51+00:00\",\"dateModified\":\"2021-11-30T20:17:41+00:00\",\"description\":\"Working remotely is forcing firms to use cloud solutions. Cloud computing is safer than storing data on your network, but some are skeptical.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/cloud-computing\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/es\\\/cloud-computing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/cloud-computing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/iDS-NewLogoBlogImages-202014.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/iDS-NewLogoBlogImages-202014.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"Using Cloud Solutions to connect data remotely and increase cybersecurity.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/cloud-computing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cloud Computing \u2013 More or Less Secure?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\",\"name\":\"iDiscovery Solutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"caption\":\"iDiscovery Solutions\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/fr\\\/author\\\/idiscovery\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cloud Computing : plus ou moins s\u00e9curis\u00e9 ? - Solutions iDiscovery","description":"Le travail \u00e0 distance oblige les entreprises \u00e0 utiliser des solutions cloud. Le cloud computing est plus s\u00fbr que le stockage de donn\u00e9es sur votre r\u00e9seau, mais certains sont sceptiques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/fr\/informatique-en-nuage\/","og_locale":"fr_FR","og_type":"article","og_title":"Cloud Computing \u2013 More or Less Secure?","og_description":"Working remotely is forcing firms to use cloud solutions. Cloud computing is safer than storing data on your network, but some are skeptical.","og_url":"https:\/\/idsinc.com\/fr\/informatique-en-nuage\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2020-11-02T21:31:51+00:00","article_modified_time":"2021-11-30T20:17:41+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202014.jpg","type":"image\/jpeg"}],"author":"iDiscovery Solutions","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"iDiscovery Solutions","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/es\/cloud-computing\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/es\/cloud-computing\/"},"author":{"name":"iDiscovery Solutions","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736"},"headline":"Cloud Computing \u2013 More or Less Secure?","datePublished":"2020-11-02T21:31:51+00:00","dateModified":"2021-11-30T20:17:41+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/es\/cloud-computing\/"},"wordCount":609,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/es\/cloud-computing\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202014.jpg","articleSection":["Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/es\/cloud-computing\/","url":"https:\/\/idsinc.com\/es\/cloud-computing\/","name":"Cloud Computing : plus ou moins s\u00e9curis\u00e9 ? - Solutions iDiscovery","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/es\/cloud-computing\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/es\/cloud-computing\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202014.jpg","datePublished":"2020-11-02T21:31:51+00:00","dateModified":"2021-11-30T20:17:41+00:00","description":"Le travail \u00e0 distance oblige les entreprises \u00e0 utiliser des solutions cloud. Le cloud computing est plus s\u00fbr que le stockage de donn\u00e9es sur votre r\u00e9seau, mais certains sont sceptiques.","breadcrumb":{"@id":"https:\/\/idsinc.com\/es\/cloud-computing\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/es\/cloud-computing\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/es\/cloud-computing\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202014.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202014.jpg","width":2500,"height":1250,"caption":"Using Cloud Solutions to connect data remotely and increase cybersecurity."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/es\/cloud-computing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cloud Computing \u2013 More or Less Secure?"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Solutions d&#039;iD\u00e9couverte","description":"Utilisez les donn\u00e9es \u00e0 votre avantage dans la salle d\u2019audience","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Solutions d&#039;iD\u00e9couverte","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant \u00e0 l&#039;int\u00e9rieur qu&#039;\u00e0 l&#039;ext\u00e9rieur de la salle d&#039;audience. Les experts en la mati\u00e8re et les strat\u00e8ges en donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un passif.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736","name":"Solutions d&#039;iD\u00e9couverte","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","caption":"iDiscovery Solutions"},"url":"https:\/\/idsinc.com\/fr\/author\/idiscovery\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/276","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/comments?post=276"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/276\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media\/2374"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media?parent=276"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/categories?post=276"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/tags?post=276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}