{"id":368,"date":"2015-07-22T09:35:28","date_gmt":"2015-07-22T08:35:28","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=368"},"modified":"2015-07-22T09:35:28","modified_gmt":"2015-07-22T08:35:28","slug":"comment-faire-fonctionner-le-byod-en-entreprise","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/22\/comment-faire-fonctionner-le-byod-en-entreprise\/","title":{"rendered":"Comment faire fonctionner le BYOD en entreprise"},"content":{"rendered":"<p>Si l&#8217;utilisation d&#8217;appareils personnels sur le lieu de travail fonctionne effectivement, elle est dans le meilleur des cas un compromis pr\u00e9par\u00e9 \u00e0&#8230;<br \/>\n<a href=\"http:\/\/www.zdnet.fr\/actualites\/comment-faire-fonctionner-le-byod-en-entreprise-39822594.htm\" target=\"_blank\">http:\/\/www.zdnet.fr\/actualites\/comment-faire-fonctionner-le-byod-en-entreprise-39822594.htm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Si l&#8217;utilisation d&#8217;appareils personnels sur le lieu de travail fonctionne effectivement, elle est dans le meilleur des cas un compromis pr\u00e9par\u00e9 \u00e0&#8230; http:\/\/www.zdnet.fr\/actualites\/comment-faire-fonctionner-le-byod-en-entreprise-39822594.htm<\/p>\n","protected":false},"author":1,"featured_media":369,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20],"tags":[],"class_list":["post-368","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy.jpg?fit=2542%2C1344&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-5W","jetpack-related-posts":[{"id":841,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/09\/09\/securite-et-byod-la-france-en-retard\/","url_meta":{"origin":368,"position":0},"title":"S\u00e9curit\u00e9 et BYOD : la France en retard","author":"Fred","date":"9 septembre 2015","format":false,"excerpt":"Quand on parle du Bring Your Own Device ou encore de mobilit\u00e9 en entreprise, la question de la s\u00e9curit\u00e9 vient rapidement sur la table. Pourtant,... http:\/\/www.zdnet.fr\/actualites\/securite-et-byod-la-france-en-retard-39824634.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/09\/F-Secure-BYOD-France.jpg?fit=750%2C615&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/09\/F-Secure-BYOD-France.jpg?fit=750%2C615&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/09\/F-Secure-BYOD-France.jpg?fit=750%2C615&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/09\/F-Secure-BYOD-France.jpg?fit=750%2C615&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":690,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/06\/25\/byod-et-securite-un-rapport-accablant-pour-les-tpe-et-pme\/","url_meta":{"origin":368,"position":1},"title":"BYOD et s\u00e9curit\u00e9 : un rapport accablant pour les TPE et PME","author":"Fred","date":"25 juin 2015","format":false,"excerpt":"Trop insouciantes, les tr\u00e8s petites, petites et moyennes entreprises oublient trop souvent qu\u2019il n\u2019y a pas que les soci\u00e9t\u00e9s cot\u00e9es en bourse \u00e0 \u00eatre... http:\/\/www.zdnet.fr\/actualites\/byod-et-securite-un-rapport-accablant-pour-les-tpe-et-pme-39821488.htm \u00a0","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":519,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/28\/byod-lanssi-et-la-cgpme-conseillent-fortement-de-separer-les-donnees-personnelles-et-professionnelles\/","url_meta":{"origin":368,"position":2},"title":"BYOD : l\u2019ANSSI et la CGPME conseillent fortement de s\u00e9parer les donn\u00e9es personnelles et professionnelles","author":"Fred","date":"28 juillet 2015","format":false,"excerpt":"Pour l\u2019Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d'information ainsi que la Conf\u00e9d\u00e9ration g\u00e9n\u00e9rale des petites et moyennes entreprises, s\u00e9parer... http:\/\/www.zdnet.fr\/actualites\/byod-l-anssi-et-la-cgpme-conseillent-fortement-de-separer-les-donnees-personnelles-et-professionnelles-39823028.htm Guide des bonnes pratiques de l\u2019informatique","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":360,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/22\/le-byod-progresse-ou-regresse-t-il\/","url_meta":{"origin":368,"position":3},"title":"Le BYOD progresse ou r\u00e9gresse-t-il ?","author":"Fred","date":"22 juillet 2015","format":false,"excerpt":"Apporter son propre appareil personnel au travail est-il une pratique plus populaire aujourd\u2019hui qu\u2019hier ou non ? Deux \u00e9tudes d\u00e9voil\u00e9es r\u00e9cemment... http:\/\/www.zdnet.fr\/actualites\/le-byod-progresse-ou-regresse-t-il-39822700.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/byod_survey_chart-100596658-large.idge_.jpg?fit=500%2C376&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":2329,"url":"https:\/\/mouillere.com\/universconvergents\/2017\/05\/08\/les-lignes-directrices-du-g29-pour-faciliter-la-mise-en-oeuvre-du-reglement-general-sur-la-protection-des-donnees\/","url_meta":{"origin":368,"position":4},"title":"Les lignes directrices du G29 pour faciliter la mise en oeuvre du R\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es","author":"Fred","date":"8 mai 2017","format":false,"excerpt":"Lors de sa derni\u00e8re assembl\u00e9e pl\u00e9ni\u00e8re du 4 et 5 avril 2017, le G29 a adopt\u00e9 des lignes directrices pour faciliter la mise en oeuvre\u00a0du R\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es qui entrera en vigueur le 25 mai 2018. Le G29 a adopt\u00e9 la version d\u00e9finitive de ses premi\u00e8res\u2026","rel":"","context":"Dans &quot;Donn\u00e9es personnelles&quot;","block_context":{"text":"Donn\u00e9es personnelles","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/donnees-personnelles\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":430,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/09\/quand-larchivage-rencontre-le-big-data-faire-du-decisionnel-a-bas-cout-dans-le-cloud-prive\/","url_meta":{"origin":368,"position":5},"title":"Quand l&#8217;archivage rencontre le Big Data : faire du d\u00e9cisionnel \u00e0 bas co\u00fbt dans le Cloud priv\u00e9","author":"Fred","date":"9 juillet 2015","format":false,"excerpt":"Les donn\u00e9es froides d\u00e9signent les donn\u00e9es rarement consult\u00e9es, mais n\u00e9cessaires. D\u00e9couvrez comment ce processus fonctionne et en quoi il peut aider... http:\/\/www.zdnet.fr\/actualites\/quand-l-archivage-rencontre-le-big-data-faire-du-decisionnel-a-bas-cout-dans-le-cloud-prive-39821276.htm","rel":"","context":"Dans &quot;Big Data&quot;","block_context":{"text":"Big Data","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/big-data\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/bigdata2.jpg?fit=1200%2C699&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/bigdata2.jpg?fit=1200%2C699&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/bigdata2.jpg?fit=1200%2C699&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/bigdata2.jpg?fit=1200%2C699&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/bigdata2.jpg?fit=1200%2C699&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=368"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/368\/revisions"}],"predecessor-version":[{"id":370,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/368\/revisions\/370"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/369"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}