{"id":4693,"date":"2021-07-15T11:38:31","date_gmt":"2021-07-15T09:38:31","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/dot\/?page_id=4693"},"modified":"2025-11-18T11:54:19","modified_gmt":"2025-11-18T10:54:19","slug":"blog","status":"publish","type":"page","link":"https:\/\/www.arcadsoftware.fr\/dot\/blog\/","title":{"rendered":"Articles de blog"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:45px;--awb-padding-bottom:45px;--awb-padding-top-medium:40px;--awb-padding-right-medium:20px;--awb-padding-left-medium:20px;--awb-padding-top-small:45px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-background-image:radial-gradient(circle at center center, #23a5c2 0%,#054c7d 100%);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-space-between fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-position:right center;--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:100%;--awb-order-medium:0;--awb-margin-top-medium:0px;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#fefefe;--awb-margin-top:0px;--awb-margin-bottom:10px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-margin-bottom-medium:16px;--awb-font-size:55px;\"><h1 class=\"fusion-title-heading title-heading-left md-text-align-center sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:55;line-height:1.12;\">Articles de blog<\/h1><\/div><div class=\"fusion-text fusion-text-1 md-text-align-center sm-text-align-center fusion-text-no-margin\" style=\"--awb-font-size:23px;--awb-line-height:1.4em;--awb-letter-spacing:-0.02em;--awb-text-transform:none;--awb-text-color:#fefefe;--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:300;\"><p>Notre expertise en anonymisation de donn\u00e9es<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_6 1_6 fusion-flex-column fusion-no-small-visibility\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:20px;--awb-spacing-right-large:11.52%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0%;--awb-width-medium:16.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:11.52%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:45px;--awb-padding-bottom:75px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column bloggrid\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-blog-shortcode fusion-blog-shortcode-1 fusion-blog-archive fusion-blog-layout-grid-wrapper fusion-blog-no\" style=\"--awb-title-font-size:20px;--awb-title-font-family:&quot;Poppins&quot;;--awb-title-font-style:normal;--awb-title-font-weight:600;\"><style type=\"text\/css\">.fusion-blog-shortcode-1 .fusion-blog-layout-grid .fusion-post-grid{padding:11.5px;}.fusion-blog-shortcode-1 .fusion-posts-container{margin-left: -11.5px !important; margin-right:-11.5px !important;}<\/style><div class=\"fusion-posts-container fusion-posts-container-no fusion-no-meta-info fusion-blog-rollover fusion-blog-layout-grid fusion-blog-layout-grid-3 isotope fusion-blog-equal-heights\" data-pages=\"0\" data-grid-col-space=\"23\" style=\"margin: -11.5px -11.5px 0;min-height:500px;\"><article id=\"blog-1-post-13732\" class=\"fusion-post-grid post-13732 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"1000\" height=\"373\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/03\/comment-anonymiser-donnees-guide.webp\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Comment anonymiser des donn\u00e9es\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271000%27%20height%3D%27373%27%20viewBox%3D%270%200%201000%20373%27%3E%3Crect%20width%3D%271000%27%20height%3D%27373%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/03\/comment-anonymiser-donnees-guide.webp\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/03\/comment-anonymiser-donnees-guide-200x75.webp 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/03\/comment-anonymiser-donnees-guide-400x149.webp 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/03\/comment-anonymiser-donnees-guide-600x224.webp 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/03\/comment-anonymiser-donnees-guide-800x298.webp 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/03\/comment-anonymiser-donnees-guide.webp 1000w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/comment-anonymiser-donnees-guide-complet-pour-dsi\/\">\n\t\t\t\t\t\tComment anonymiser des donn\u00e9es ? Guide complet pour les DSI\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/comment-anonymiser-donnees-guide-complet-pour-dsi\/\" aria-label=\"Comment anonymiser des donn\u00e9es ? Guide complet pour les DSI\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/comment-anonymiser-donnees-guide-complet-pour-dsi\/\">Comment anonymiser des donn\u00e9es ? Guide complet pour les DSI<\/a><\/h2><div class=\"fusion-post-content-container\"><p>D\u00e9couvrez les techniques, les obligations RGPD et les bonnes pratiques pour industrialiser l\u2019anonymisation dans votre SI.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-13460\" class=\"fusion-post-grid post-13460 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"1634\" height=\"609\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/01\/donnees-synthetiques-vs-donnees-anonymisees.webp\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Donn\u00e9es synth\u00e9tiques VS donn\u00e9es anonymis\u00e9es\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271634%27%20height%3D%27609%27%20viewBox%3D%270%200%201634%20609%27%3E%3Crect%20width%3D%271634%27%20height%3D%27609%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/01\/donnees-synthetiques-vs-donnees-anonymisees.webp\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/01\/donnees-synthetiques-vs-donnees-anonymisees-200x75.webp 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/01\/donnees-synthetiques-vs-donnees-anonymisees-400x149.webp 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/01\/donnees-synthetiques-vs-donnees-anonymisees-600x224.webp 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/01\/donnees-synthetiques-vs-donnees-anonymisees-800x298.webp 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/01\/donnees-synthetiques-vs-donnees-anonymisees-1200x447.webp 1200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/01\/donnees-synthetiques-vs-donnees-anonymisees.webp 1634w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/donnees-synthetiques-ou-donnees-anonymisees-quelle-methode-adopter\/\">\n\t\t\t\t\t\tDonn\u00e9es synth\u00e9tiques ou donn\u00e9es anonymis\u00e9es : quelle m\u00e9thode adopter ?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/donnees-synthetiques-ou-donnees-anonymisees-quelle-methode-adopter\/\" aria-label=\"Donn\u00e9es synth\u00e9tiques ou donn\u00e9es anonymis\u00e9es : quelle m\u00e9thode adopter ?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/donnees-synthetiques-ou-donnees-anonymisees-quelle-methode-adopter\/\">Donn\u00e9es synth\u00e9tiques ou donn\u00e9es anonymis\u00e9es : quelle m\u00e9thode adopter ?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Performances, coh\u00e9rence, co\u00fbts et conformit\u00e9 : quelle m\u00e9thode choisir entre donn\u00e9es synth\u00e9tiques et donn\u00e9es anonymis\u00e9es ?<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-13301\" class=\"fusion-post-grid post-13301 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"600\" height=\"224\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/12\/souverainete-numerique-protection-donnees-sensibles.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Souverainet\u00e9 Num\u00e9rique - Protection donn\u00e9es sensibles\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27600%27%20height%3D%27224%27%20viewBox%3D%270%200%20600%20224%27%3E%3Crect%20width%3D%27600%27%20height%3D%27224%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/12\/souverainete-numerique-protection-donnees-sensibles.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/12\/souverainete-numerique-protection-donnees-sensibles-200x75.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/12\/souverainete-numerique-protection-donnees-sensibles-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/12\/souverainete-numerique-protection-donnees-sensibles.png 600w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/souverainete-numerique-protegez-vos-donnees-sensibles\/\">\n\t\t\t\t\t\tSouverainet\u00e9 Num\u00e9rique : prot\u00e9gez vos donn\u00e9es sensibles\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/souverainete-numerique-protegez-vos-donnees-sensibles\/\" aria-label=\"Souverainet\u00e9 Num\u00e9rique : prot\u00e9gez vos donn\u00e9es sensibles\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/souverainete-numerique-protegez-vos-donnees-sensibles\/\">Souverainet\u00e9 Num\u00e9rique : prot\u00e9gez vos donn\u00e9es sensibles<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Renforcez votre souverainet\u00e9 num\u00e9rique : anonymisation RGPD, s\u00e9curit\u00e9 et ma\u00eetrise de vos donn\u00e9es hors production avec DOT Anonymizer.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-12945\" class=\"fusion-post-grid post-12945 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"298\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/anonymisation-developpement-interne-vs-solution-dediee.webp\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Comparatif developpement interne vs solution d&#039;anonymisation d\u00e9di\u00e9e\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27800%27%20height%3D%27298%27%20viewBox%3D%270%200%20800%20298%27%3E%3Crect%20width%3D%27800%27%20height%3D%27298%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/anonymisation-developpement-interne-vs-solution-dediee.webp\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/anonymisation-developpement-interne-vs-solution-dediee-200x75.webp 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/anonymisation-developpement-interne-vs-solution-dediee-400x149.webp 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/anonymisation-developpement-interne-vs-solution-dediee-600x224.webp 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/anonymisation-developpement-interne-vs-solution-dediee.webp 800w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/creer-son-propre-outil-anonymisation-bonne-idee-ou-erreur-strategique\/\">\n\t\t\t\t\t\tCr\u00e9er son propre outil d\u2019anonymisation : bonne id\u00e9e ou erreur strat\u00e9gique ?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/creer-son-propre-outil-anonymisation-bonne-idee-ou-erreur-strategique\/\" aria-label=\"Cr\u00e9er son propre outil d\u2019anonymisation : bonne id\u00e9e ou erreur strat\u00e9gique ?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/creer-son-propre-outil-anonymisation-bonne-idee-ou-erreur-strategique\/\">Cr\u00e9er son propre outil d\u2019anonymisation : bonne id\u00e9e ou erreur strat\u00e9gique ?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>D\u00e9velopper son propre outil d\u2019anonymisation ou choisir une solution d\u00e9di\u00e9e ? Co\u00fbts, risques, conformit\u00e9 RGPD, avantages : comparatif complet.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-12873\" class=\"fusion-post-grid post-12873 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"298\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/serveur-design-serveur-production-anonymisation.webp\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Serveur Design &amp; Serveur Production illustration\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27800%27%20height%3D%27298%27%20viewBox%3D%270%200%20800%20298%27%3E%3Crect%20width%3D%27800%27%20height%3D%27298%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/serveur-design-serveur-production-anonymisation.webp\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/serveur-design-serveur-production-anonymisation-200x75.webp 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/serveur-design-serveur-production-anonymisation-400x149.webp 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/serveur-design-serveur-production-anonymisation-600x224.webp 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/serveur-design-serveur-production-anonymisation.webp 800w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/serveur-design-serveur-production-anonymisation-moderne-et-industrialisee\/\">\n\t\t\t\t\t\tServeur Design et Serveur Production : deux piliers d&rsquo;une architecture d&rsquo;anonymisation moderne et industrialis\u00e9e\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/serveur-design-serveur-production-anonymisation-moderne-et-industrialisee\/\" aria-label=\"Serveur Design et Serveur Production : deux piliers d&rsquo;une architecture d&rsquo;anonymisation moderne et industrialis\u00e9e\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/serveur-design-serveur-production-anonymisation-moderne-et-industrialisee\/\">Serveur Design et Serveur Production : deux piliers d&rsquo;une architecture d&rsquo;anonymisation moderne et industrialis\u00e9e<\/a><\/h2><div class=\"fusion-post-content-container\"><p>S\u00e9parez les environnements Design et Production pour s\u00e9curiser, automatiser et industrialiser l'anonymisation de vos donn\u00e9es sensibles.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-3195\" class=\"fusion-post-grid post-3195 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"298\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/10\/identifier-donnees-personnelles-rgpd.webp\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Identification donn\u00e9es personnelles\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27800%27%20height%3D%27298%27%20viewBox%3D%270%200%20800%20298%27%3E%3Crect%20width%3D%27800%27%20height%3D%27298%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/10\/identifier-donnees-personnelles-rgpd.webp\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/10\/identifier-donnees-personnelles-rgpd-200x75.webp 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/10\/identifier-donnees-personnelles-rgpd-400x149.webp 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/10\/identifier-donnees-personnelles-rgpd-600x224.webp 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/10\/identifier-donnees-personnelles-rgpd.webp 800w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/identifier-donnees-personnelles-rgpd-par-ou-commencer\/\">\n\t\t\t\t\t\tIdentifier ses donn\u00e9es personnelles &#8211; RGPD : Par o\u00f9 commencer ?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/identifier-donnees-personnelles-rgpd-par-ou-commencer\/\" aria-label=\"Identifier ses donn\u00e9es personnelles &#8211; RGPD : Par o\u00f9 commencer ?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/identifier-donnees-personnelles-rgpd-par-ou-commencer\/\">Identifier ses donn\u00e9es personnelles &#8211; RGPD : Par o\u00f9 commencer ?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Identifiez vos donn\u00e9es personnelles pour alimenter votre registre et garantir une conformit\u00e9 RGPD optimale !<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-10388\" class=\"fusion-post-grid post-10388 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/12\/banniere-blog-article-fuites-de-donnees-dot.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banni\u00e8re Blog Fuites de donn\u00e9es\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/12\/banniere-blog-article-fuites-de-donnees-dot.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/12\/banniere-blog-article-fuites-de-donnees-dot-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/12\/banniere-blog-article-fuites-de-donnees-dot-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/12\/banniere-blog-article-fuites-de-donnees-dot-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/12\/banniere-blog-article-fuites-de-donnees-dot-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/12\/banniere-blog-article-fuites-de-donnees-dot.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/interview-fuites-de-donnees-pourquoi-les-environnements-hors-production-sont-ils-la-proie-facile-des-hackers\/\">\n\t\t\t\t\t\tFuites de donn\u00e9es : Pourquoi les environnements hors production sont-ils la proie facile des hackers ?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/interview-fuites-de-donnees-pourquoi-les-environnements-hors-production-sont-ils-la-proie-facile-des-hackers\/\" aria-label=\"Fuites de donn\u00e9es : Pourquoi les environnements hors production sont-ils la proie facile des hackers ?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/interview-fuites-de-donnees-pourquoi-les-environnements-hors-production-sont-ils-la-proie-facile-des-hackers\/\">Fuites de donn\u00e9es : Pourquoi les environnements hors production sont-ils la proie facile des hackers ?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>\u00c9vitez les fuites de donn\u00e9es, prot\u00e9gez vos environnements hors production gr\u00e2ce \u00e0 l\u2019anonymisation intelligente.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-9050\" class=\"fusion-post-grid post-9050 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-ressources\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Blog Article DOT Cyber Resilience Act CRA\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act-200x74.jpg 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act-400x149.jpg 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act-600x223.jpg 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act-800x298.jpg 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/le-cyber-resilience-act\/\">\n\t\t\t\t\t\tLe Cyber Resilience Act (CRA)\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/le-cyber-resilience-act\/\" aria-label=\"Le Cyber Resilience Act (CRA)\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/le-cyber-resilience-act\/\">Le Cyber Resilience Act (CRA)<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Le Cyber Resilience Act (CRA) a pour objectif de renforcer la s\u00e9curit\u00e9 des produits num\u00e9riques en imposant des normes de cybers\u00e9curit\u00e9, des obligations aux fabricants et des amendes en cas de non-respect.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-8972\" class=\"fusion-post-grid post-8972 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-ressources\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"705\" height=\"263\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner Directive NIS 2\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27705%27%20height%3D%27263%27%20viewBox%3D%270%200%20705%20263%27%3E%3Crect%20width%3D%27705%27%20height%3D%27263%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2-200x75.jpg 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2-400x149.jpg 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2-600x224.jpg 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg 705w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/\">\n\t\t\t\t\t\tLa Directive NIS 2\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/\" aria-label=\"La Directive NIS 2\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/\">La Directive NIS 2<\/a><\/h2><div class=\"fusion-post-content-container\"><p>D\u00e9couvrez comment la directive NIS 2 vise \u00e0 renforcer la s\u00e9curit\u00e9 des infrastructures et \u00e0 r\u00e9duire l'impact des cyberattaques sur les entit\u00e9s en imposant des mesures pr\u00e9ventives et en \u00e9valuant les risques potentiels.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-8923\" class=\"fusion-post-grid post-8923 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-ressources\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"846\" height=\"315\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner Article Norme PCI-DSS\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27846%27%20height%3D%27315%27%20viewBox%3D%270%200%20846%20315%27%3E%3Crect%20width%3D%27846%27%20height%3D%27315%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme-200x74.webp 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme-400x149.webp 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme-600x223.webp 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme-800x298.webp 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp 846w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-norme-pci-dss\/\">\n\t\t\t\t\t\tLa norme PCI-DSS\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-norme-pci-dss\/\" aria-label=\"La norme PCI-DSS\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-norme-pci-dss\/\">La norme PCI-DSS<\/a><\/h2><div class=\"fusion-post-content-container\"><p>La norme PCI-DSS d\u00e9finit des standards de s\u00e9curit\u00e9 pour prot\u00e9ger les transactions par carte de cr\u00e9dit et permet de pr\u00e9venir les fuites de donn\u00e9es et la fraude en ligne.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-8839\" class=\"fusion-post-grid post-8839 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"823\" height=\"306\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-blog-article-dora-dot-resilience-numerique.jpg\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banniere Article de Blog DORA Digital Operational Resilience Act\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27823%27%20height%3D%27306%27%20viewBox%3D%270%200%20823%20306%27%3E%3Crect%20width%3D%27823%27%20height%3D%27306%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-blog-article-dora-dot-resilience-numerique.jpg\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-blog-article-dora-dot-resilience-numerique-200x74.jpg 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-blog-article-dora-dot-resilience-numerique-400x149.jpg 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-blog-article-dora-dot-resilience-numerique-600x223.jpg 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-blog-article-dora-dot-resilience-numerique-800x297.jpg 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-blog-article-dora-dot-resilience-numerique.jpg 823w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/le-reglement-dora-reglementation-sur-la-resilience-operationnelle-numerique\/\">\n\t\t\t\t\t\tLe r\u00e8glement DORA\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/le-reglement-dora-reglementation-sur-la-resilience-operationnelle-numerique\/\" aria-label=\"Le r\u00e8glement DORA\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/le-reglement-dora-reglementation-sur-la-resilience-operationnelle-numerique\/\">Le r\u00e8glement DORA<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Tout ce que vous devez savoir sur le r\u00e8glement DORA (R\u00e9glementation sur la r\u00e9silience op\u00e9rationnelle num\u00e9rique) et son impact sur les entit\u00e9s financi\u00e8res.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-8784\" class=\"fusion-post-grid post-8784 post type-post status-publish format-standard has-post-thumbnail hentry category-blog tag-compliance-with-regulations-fr tag-test-performance-and-efficiency-fr\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banniere-interview-romain-alberca-importance-donnees-anonymisation.jpg\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banni\u00e8re Interview Romain Alberca Importance des donn\u00e9es anonymis\u00e9es\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banniere-interview-romain-alberca-importance-donnees-anonymisation.jpg\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banniere-interview-romain-alberca-importance-donnees-anonymisation-200x74.jpg 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banniere-interview-romain-alberca-importance-donnees-anonymisation-400x149.jpg 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banniere-interview-romain-alberca-importance-donnees-anonymisation-600x223.jpg 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banniere-interview-romain-alberca-importance-donnees-anonymisation-800x298.jpg 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banniere-interview-romain-alberca-importance-donnees-anonymisation.jpg 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-donnees-rssi\/\">\n\t\t\t\t\t\tL&#8217;anonymisation des donn\u00e9es d&#8217;un point de vue RSSI\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-donnees-rssi\/\" aria-label=\"L&#8217;anonymisation des donn\u00e9es d&#8217;un point de vue RSSI\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-donnees-rssi\/\">L&#8217;anonymisation des donn\u00e9es d&#8217;un point de vue RSSI<\/a><\/h2><div class=\"fusion-post-content-container\"><p>D\u00e9couvrez le r\u00f4le de l\u2019anonymisation des donn\u00e9es dans la cybers\u00e9curit\u00e9 et la conformit\u00e9 RGPD \u00e0 travers l\u2019interview de notre RSSI adjoint.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-8351\" class=\"fusion-post-grid post-8351 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/08\/banniere-blog-negocier-budget-de-securite.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banni\u00e8re blog N\u00e9gocier budget de s\u00e9curit\u00e9\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/08\/banniere-blog-negocier-budget-de-securite.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/08\/banniere-blog-negocier-budget-de-securite-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/08\/banniere-blog-negocier-budget-de-securite-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/08\/banniere-blog-negocier-budget-de-securite-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/08\/banniere-blog-negocier-budget-de-securite-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/08\/banniere-blog-negocier-budget-de-securite.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/negocier-le-budget-de-securite-comment-convaincre-la-hierarchie-face-aux-defis-croissants-des-cyberattaques\/\">\n\t\t\t\t\t\tN\u00e9gocier le budget de s\u00e9curit\u00e9 : Comment convaincre la hi\u00e9rarchie face aux d\u00e9fis croissants des cyberattaques\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/negocier-le-budget-de-securite-comment-convaincre-la-hierarchie-face-aux-defis-croissants-des-cyberattaques\/\" aria-label=\"N\u00e9gocier le budget de s\u00e9curit\u00e9 : Comment convaincre la hi\u00e9rarchie face aux d\u00e9fis croissants des cyberattaques\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/negocier-le-budget-de-securite-comment-convaincre-la-hierarchie-face-aux-defis-croissants-des-cyberattaques\/\">N\u00e9gocier le budget de s\u00e9curit\u00e9 : Comment convaincre la hi\u00e9rarchie face aux d\u00e9fis croissants des cyberattaques<\/a><\/h2><div class=\"fusion-post-content-container\"><p>D\u00e9couvrez dans cet article comment n\u00e9gocier le budget de s\u00e9curit\u00e9 et comment convaincre la hi\u00e9rarchie de l'importance d'investir dans la s\u00e9curit\u00e9.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-7895\" class=\"fusion-post-grid post-7895 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banniere blog article anonymisation des donnees perimetre restreint\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/\">\n\t\t\t\t\t\tAnonymisation des donn\u00e9es : commencez petit, pensez grand !\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/\" aria-label=\"Anonymisation des donn\u00e9es : commencez petit, pensez grand !\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/\">Anonymisation des donn\u00e9es : commencez petit, pensez grand !<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Commencez l\u2019anonymisation par un p\u00e9rim\u00e8tre restreint pour s\u00e9curiser vos donn\u00e9es, impliquer vos \u00e9quipes et r\u00e9ussir votre conformit\u00e9 RGPD.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-6919\" class=\"fusion-post-grid post-6919 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quels-sont-les-risques-de-travailler-avec-des-donnees-non-anonymisees\/\">\n\t\t\t\t\t\tQuels sont les risques de travailler avec des donn\u00e9es non anonymis\u00e9es ?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quels-sont-les-risques-de-travailler-avec-des-donnees-non-anonymisees\/\" aria-label=\"Quels sont les risques de travailler avec des donn\u00e9es non anonymis\u00e9es ?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quels-sont-les-risques-de-travailler-avec-des-donnees-non-anonymisees\/\">Quels sont les risques de travailler avec des donn\u00e9es non anonymis\u00e9es ?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>D\u00e9couvrez dans cet article les diff\u00e9rents risques pour les entreprises de travailler avec des donn\u00e9es non anonymis\u00e9es.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-6228\" class=\"fusion-post-grid post-6228 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/01\/Banner-article-DOT-Fuite-de-donnees.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Data Breach illustration\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/01\/Banner-article-DOT-Fuite-de-donnees.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/01\/Banner-article-DOT-Fuite-de-donnees-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/01\/Banner-article-DOT-Fuite-de-donnees-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/01\/Banner-article-DOT-Fuite-de-donnees-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/01\/Banner-article-DOT-Fuite-de-donnees-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/01\/Banner-article-DOT-Fuite-de-donnees.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/prevenir-fuites-donnees-anonymisation\/\">\n\t\t\t\t\t\tPr\u00e9venir les fuites de donn\u00e9es gr\u00e2ce \u00e0 l\u2019anonymisation\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/prevenir-fuites-donnees-anonymisation\/\" aria-label=\"Pr\u00e9venir les fuites de donn\u00e9es gr\u00e2ce \u00e0 l\u2019anonymisation\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/prevenir-fuites-donnees-anonymisation\/\">Pr\u00e9venir les fuites de donn\u00e9es gr\u00e2ce \u00e0 l\u2019anonymisation<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Les fuites de donn\u00e9es repr\u00e9sentent la principale menace dans le domaine de la cybers\u00e9curit\u00e9 \u00e0 laquelle l'anonymisation peut faire face.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-4759\" class=\"fusion-post-grid post-4759 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Anonymiser-ses-donnees-1.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT Anonymiser ses donn\u00e9es (1)\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Anonymiser-ses-donnees-1.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Anonymiser-ses-donnees-1-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Anonymiser-ses-donnees-1-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Anonymiser-ses-donnees-1-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Anonymiser-ses-donnees-1-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Anonymiser-ses-donnees-1.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymiser-donnees-entreprises\/\">\n\t\t\t\t\t\tAnonymiser ses donn\u00e9es : un enjeu cl\u00e9 du RGPD pour les entreprises\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymiser-donnees-entreprises\/\" aria-label=\"Anonymiser ses donn\u00e9es : un enjeu cl\u00e9 du RGPD pour les entreprises\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymiser-donnees-entreprises\/\">Anonymiser ses donn\u00e9es : un enjeu cl\u00e9 du RGPD pour les entreprises<\/a><\/h2><div class=\"fusion-post-content-container\"><p>D\u00e9couvrez pourquoi anonymiser ses donn\u00e9es est essentiel pour les entreprises et comment rester conforme au RGPD et aux exigences de la CNIL.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-4673\" class=\"fusion-post-grid post-4673 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Comment-utiliser-un-jeu-de-donnees.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT Comment utiliser un jeu de donn\u00e9es\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Comment-utiliser-un-jeu-de-donnees.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Comment-utiliser-un-jeu-de-donnees-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Comment-utiliser-un-jeu-de-donnees-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Comment-utiliser-un-jeu-de-donnees-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Comment-utiliser-un-jeu-de-donnees-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Comment-utiliser-un-jeu-de-donnees.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/comment-utiliser-un-jeu-de-donnees-en-respectant-le-rgpd\/\">\n\t\t\t\t\t\tComment utiliser un jeu de donn\u00e9es en respectant le RGPD ?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/comment-utiliser-un-jeu-de-donnees-en-respectant-le-rgpd\/\" aria-label=\"Comment utiliser un jeu de donn\u00e9es en respectant le RGPD ?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/comment-utiliser-un-jeu-de-donnees-en-respectant-le-rgpd\/\">Comment utiliser un jeu de donn\u00e9es en respectant le RGPD ?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>L'anonymisation permet aux entreprises d\u2019exploiter des jeux de donn\u00e9es en toute s\u00e9curit\u00e9 tout en prot\u00e9geant la vie priv\u00e9e de leurs utilisateurs.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-4668\" class=\"fusion-post-grid post-4668 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT TPE PME\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/tpe-pme-comment-proteger-les-donnees-de-mon-entreprise\/\">\n\t\t\t\t\t\tTPE\/PME : comment prot\u00e9ger les donn\u00e9es de mon entreprise ?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/tpe-pme-comment-proteger-les-donnees-de-mon-entreprise\/\" aria-label=\"TPE\/PME : comment prot\u00e9ger les donn\u00e9es de mon entreprise ?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/tpe-pme-comment-proteger-les-donnees-de-mon-entreprise\/\">TPE\/PME : comment prot\u00e9ger les donn\u00e9es de mon entreprise ?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Il existe plusieurs m\u00e9thodes d\u2019anonymisation pour lesquelles les TPE et PME sont concern\u00e9es et peuvent mettre en place une protection au sein de leur structure.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-4662\" class=\"fusion-post-grid post-4662 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Masquage-des-donnees.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT Masquage des donn\u00e9es\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Masquage-des-donnees.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Masquage-des-donnees-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Masquage-des-donnees-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Masquage-des-donnees-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Masquage-des-donnees-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Masquage-des-donnees.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/masquage-des-donnees-et-anonymisation-comprendre-les-differents-algorithmes\/\">\n\t\t\t\t\t\tMasquage et anonymisation des donn\u00e9es : 6 types d&#8217;algorithmes pour prot\u00e9ger vos donn\u00e9es\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/masquage-des-donnees-et-anonymisation-comprendre-les-differents-algorithmes\/\" aria-label=\"Masquage et anonymisation des donn\u00e9es : 6 types d&#8217;algorithmes pour prot\u00e9ger vos donn\u00e9es\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/masquage-des-donnees-et-anonymisation-comprendre-les-differents-algorithmes\/\">Masquage et anonymisation des donn\u00e9es : 6 types d&#8217;algorithmes pour prot\u00e9ger vos donn\u00e9es<\/a><\/h2><div class=\"fusion-post-content-container\"><p>D\u00e9couvrez 6 techniques de masquage et d\u2019anonymisation des donn\u00e9es : substitution, m\u00e9lange, variation num\u00e9rique, et plus encore.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-4651\" class=\"fusion-post-grid post-4651 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT Protection des donn\u00e9es\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/\">\n\t\t\t\t\t\tProtection des donn\u00e9es : une fuite sur deux est li\u00e9e \u00e0 un probl\u00e8me interne dans l&#8217;entreprise\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/\" aria-label=\"Protection des donn\u00e9es : une fuite sur deux est li\u00e9e \u00e0 un probl\u00e8me interne dans l&#8217;entreprise\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/\">Protection des donn\u00e9es : une fuite sur deux est li\u00e9e \u00e0 un probl\u00e8me interne dans l&#8217;entreprise<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Anonymiser les donn\u00e9es et cr\u00e9er un \u00e9cosyst\u00e8me sain au c\u0153ur de son entreprise pour limiter les probl\u00e8mes et les fuites de donn\u00e9es.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-4657\" class=\"fusion-post-grid post-4657 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-cas-dor-du-digital.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Les cas d&#039;Or du digital\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-cas-dor-du-digital.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-cas-dor-du-digital-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-cas-dor-du-digital-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-cas-dor-du-digital-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-cas-dor-du-digital-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-cas-dor-du-digital.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/arcad-software-recompense-aux-cas-dor-service-public-numerique\/\">\n\t\t\t\t\t\tARCAD Software r\u00e9compens\u00e9 aux Cas d&#8217;OR Service Public Num\u00e9rique !\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/arcad-software-recompense-aux-cas-dor-service-public-numerique\/\" aria-label=\"ARCAD Software r\u00e9compens\u00e9 aux Cas d&#8217;OR Service Public Num\u00e9rique !\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/arcad-software-recompense-aux-cas-dor-service-public-numerique\/\">ARCAD Software r\u00e9compens\u00e9 aux Cas d&#8217;OR Service Public Num\u00e9rique !<\/a><\/h2><div class=\"fusion-post-content-container\"><p>ARCAD Software r\u00e9compens\u00e9 aux Cas d'OR Service Public Num\u00e9rique !<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-4606\" class=\"fusion-post-grid post-4606 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT Data Masking\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/\">\n\t\t\t\t\t\tQu&#8217;est-ce que le data masking ?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/\" aria-label=\"Qu&#8217;est-ce que le data masking ?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/\">Qu&#8217;est-ce que le data masking ?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Le Data Masking garantit la confidentialit\u00e9, la disponibilit\u00e9 mais aussi l\u2019int\u00e9grit\u00e9 des donn\u00e9es pour les utilisateurs et pour les entreprises<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-4597\" class=\"fusion-post-grid post-4597 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Limpact-du-RGPD.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT L&#039;impact du RGPD\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Limpact-du-RGPD.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Limpact-du-RGPD-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Limpact-du-RGPD-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Limpact-du-RGPD-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Limpact-du-RGPD-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Limpact-du-RGPD.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/limpact-du-rgpd-sur-la-cybersecurite-dune-entreprise\/\">\n\t\t\t\t\t\tL&#8217;impact du RGPD sur la cybers\u00e9curit\u00e9 d&#8217;une entreprise\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/limpact-du-rgpd-sur-la-cybersecurite-dune-entreprise\/\" aria-label=\"L&#8217;impact du RGPD sur la cybers\u00e9curit\u00e9 d&#8217;une entreprise\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/limpact-du-rgpd-sur-la-cybersecurite-dune-entreprise\/\">L&#8217;impact du RGPD sur la cybers\u00e9curit\u00e9 d&#8217;une entreprise<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Le RGPD impose aux entreprises des normes plus strictes en mati\u00e8re de s\u00e9curisation des donn\u00e9es et donc de cybers\u00e9curit\u00e9<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-4561\" class=\"fusion-post-grid post-4561 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"395\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/04\/Banner-940x350px-Anonymisation-les-bonnes-pratiques.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Anonymisation les bonnes pratiques \u00e0 mettre en oeuvre\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271024%27%20height%3D%27395%27%20viewBox%3D%270%200%201024%20395%27%3E%3Crect%20width%3D%271024%27%20height%3D%27395%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/04\/Banner-940x350px-Anonymisation-les-bonnes-pratiques.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/04\/Banner-940x350px-Anonymisation-les-bonnes-pratiques-200x77.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/04\/Banner-940x350px-Anonymisation-les-bonnes-pratiques-400x154.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/04\/Banner-940x350px-Anonymisation-les-bonnes-pratiques-600x231.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/04\/Banner-940x350px-Anonymisation-les-bonnes-pratiques-800x309.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/04\/Banner-940x350px-Anonymisation-les-bonnes-pratiques.png 1024w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-les-bonnes-pratiques-a-mettre-en-oeuvre\/\">\n\t\t\t\t\t\tAnonymisation : les bonnes pratiques \u00e0 mettre en \u0153uvre\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-les-bonnes-pratiques-a-mettre-en-oeuvre\/\" aria-label=\"Anonymisation : les bonnes pratiques \u00e0 mettre en \u0153uvre\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-les-bonnes-pratiques-a-mettre-en-oeuvre\/\">Anonymisation : les bonnes pratiques \u00e0 mettre en \u0153uvre<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Pour se conformer au RGPD, il est primordial d'entamer une proc\u00e9dure d'anonymisation des donn\u00e9es individuelles<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-4389\" class=\"fusion-post-grid post-4389 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT RGPD\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/\">\n\t\t\t\t\t\tRGPD : un enjeu de cybers\u00e9curit\u00e9 et une vraie cyberprotection\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/\" aria-label=\"RGPD : un enjeu de cybers\u00e9curit\u00e9 et une vraie cyberprotection\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/\">RGPD : un enjeu de cybers\u00e9curit\u00e9 et une vraie cyberprotection<\/a><\/h2><div class=\"fusion-post-content-container\"><p>En s\u00e9curisant les donn\u00e9es personnelles des utilisateurs des sites, le RGPD se r\u00e9v\u00e8le un rempart efficace en termes de cybers\u00e9curit\u00e9.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-3469\" class=\"fusion-post-grid post-3469 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"346\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/11\/Banner-RGPD-et-anonymisation-jusquou-faut-il-aller.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"RGPD et Anonymisation, jusqu\u2019o\u00f9 doit-on aller ?\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27346%27%20viewBox%3D%270%200%20940%20346%27%3E%3Crect%20width%3D%27940%27%20height%3D%27346%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/11\/Banner-RGPD-et-anonymisation-jusquou-faut-il-aller.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/11\/Banner-RGPD-et-anonymisation-jusquou-faut-il-aller-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/11\/Banner-RGPD-et-anonymisation-jusquou-faut-il-aller-400x147.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/11\/Banner-RGPD-et-anonymisation-jusquou-faut-il-aller-600x221.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/11\/Banner-RGPD-et-anonymisation-jusquou-faut-il-aller-800x294.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/11\/Banner-RGPD-et-anonymisation-jusquou-faut-il-aller.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-et-anonymisation-jusqu-ou-doit-on-aller\/\">\n\t\t\t\t\t\tRGPD et Anonymisation, jusqu\u2019o\u00f9 doit-on aller ?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-et-anonymisation-jusqu-ou-doit-on-aller\/\" aria-label=\"RGPD et Anonymisation, jusqu\u2019o\u00f9 doit-on aller ?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-et-anonymisation-jusqu-ou-doit-on-aller\/\">RGPD et Anonymisation, jusqu\u2019o\u00f9 doit-on aller ?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Quelle est la d\u00e9finition de l'anonymisation dans le RGPD, et est-elle applicable dans la r\u00e9alit\u00e9 ?<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-5943\" class=\"fusion-post-grid post-5943 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"370\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/09\/Donnees-personnelles-et-donnees-sensibles-ce-qui-les-differencie.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Donn\u00e9es sensibles et donn\u00e9es personnelles : ce qui les diff\u00e9rencie\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27370%27%20viewBox%3D%270%200%20940%20370%27%3E%3Crect%20width%3D%27940%27%20height%3D%27370%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/09\/Donnees-personnelles-et-donnees-sensibles-ce-qui-les-differencie.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/09\/Donnees-personnelles-et-donnees-sensibles-ce-qui-les-differencie-200x79.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/09\/Donnees-personnelles-et-donnees-sensibles-ce-qui-les-differencie-400x157.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/09\/Donnees-personnelles-et-donnees-sensibles-ce-qui-les-differencie-600x236.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/09\/Donnees-personnelles-et-donnees-sensibles-ce-qui-les-differencie-800x315.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/09\/Donnees-personnelles-et-donnees-sensibles-ce-qui-les-differencie.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/donnees-sensibles-donnees-personnelles-differences-rgpd\/\">\n\t\t\t\t\t\tDonn\u00e9es personnelles ou donn\u00e9es sensibles, quelles diff\u00e9rences ?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/donnees-sensibles-donnees-personnelles-differences-rgpd\/\" aria-label=\"Donn\u00e9es personnelles ou donn\u00e9es sensibles, quelles diff\u00e9rences ?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/donnees-sensibles-donnees-personnelles-differences-rgpd\/\">Donn\u00e9es personnelles ou donn\u00e9es sensibles, quelles diff\u00e9rences ?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Depuis le RGPD, le terme \u201cdonn\u00e9e sensible\u201d est souvent utilis\u00e9 \u00e0 tort. Savez-vous vraiment ce qu\u2019est une donn\u00e9e sensible? <\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-3202\" class=\"fusion-post-grid post-3202 post type-post status-publish format-standard has-post-thumbnail hentry category-blog\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2018\/09\/Banner-article-DOT-5-questions.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT 5 questions\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2018\/09\/Banner-article-DOT-5-questions.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2018\/09\/Banner-article-DOT-5-questions-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2018\/09\/Banner-article-DOT-5-questions-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2018\/09\/Banner-article-DOT-5-questions-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2018\/09\/Banner-article-DOT-5-questions-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2018\/09\/Banner-article-DOT-5-questions.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/5-questions-anonymisation-des-donnees\/\">\n\t\t\t\t\t\t5 questions les plus fr\u00e9quentes sur l\u2019anonymisation des donn\u00e9es\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/5-questions-anonymisation-des-donnees\/\" aria-label=\"5 questions les plus fr\u00e9quentes sur l\u2019anonymisation des donn\u00e9es\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/5-questions-anonymisation-des-donnees\/\">5 questions les plus fr\u00e9quentes sur l\u2019anonymisation des donn\u00e9es<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Comment l\u2019anonymisation prot\u00e8ge vos donn\u00e9es personnelles ? R\u00f4le, diff\u00e9rences, impacts sur la performance et conformit\u00e9 RGPD.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"demo\" class=\"fusion-container-anchor\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling dem\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0%;--awb-padding-bottom:5%;--awb-padding-top-medium:40px;--awb-padding-top-small:0px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-background-color:#124d79;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-menu-anchor\" id=\"version-d-essai\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:0.96%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"1.6\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#ffffff;--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:50px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:800;margin:0;font-size:1em;--fontSize:50;line-height:1.14;\">VERSION D\u2019ESSAI \/ DEMO<\/h2><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:center;--awb-font-size:25px;--awb-line-height:1.4em;--awb-letter-spacing:-0.02em;--awb-text-color:#ffffff;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:300;\"><p>R\u00e9servez une version d\u2019essai ou une session dans notre sandbox !<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion-flex-column fusion-animated\" style=\"--awb-padding-top:32px;--awb-padding-right:20px;--awb-padding-bottom:18px;--awb-padding-left:20px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-box-shadow:0px 24px 32px -6px rgba(0,0,0,0.1);;--awb-border-color:rgba(0,0,0,0.08);--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:solid;--awb-border-radius:12px 12px 12px 12px;--awb-width-large:42%;--awb-margin-top-large:20px;--awb-spacing-right-large:9.1428571428571%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:18.285714285714%;--awb-width-medium:50%;--awb-order-medium:2;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:10px;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:30px;\"><h3 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:30;line-height:1.26;\">Version d\u2019essai<\/h3><\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"85\" height=\"85\" alt=\"Test Data Management Expert\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2785%27%20height%3D%2785%27%20viewBox%3D%270%200%2085%2085%27%3E%3Crect%20width%3D%2785%27%20height%3D%2785%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2025\/04\/contact-trial-version.png\" class=\"lazyload img-responsive wp-image-11670\"\/><\/span><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:2px;--awb-margin-left-small:0px;--awb-margin-bottom-medium:4px;--awb-font-size:20px;\"><h4 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:20;--minFontSize:20;line-height:1.4;\">Essayez maintenant !<\/h4><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-div\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-top:0px;--awb-margin-bottom:4px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:2px;--awb-margin-left-small:0px;--awb-margin-bottom-medium:4px;--awb-font-size:16px;\"><div class=\"fusion-title-heading title-heading-center title-heading-tag fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;--fontSize:16;--minFontSize:16;line-height:1.63;\">R\u00e9servez une version d\u2019essai<\/div><\/div><script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    region: \"na1\",\n    portalId: \"4514828\",\n    formId: \"c5c6cf73-1a34-4925-a9b5-7cf588a9d350\",\n\tcss: \"\",\n        blockedDomains: [\"freschelegacy.com\",\"freschesolutions.com\",\"rocketsoftware.com\",\"softlanding.com\",\"mkssoftware.com\",\"midrangedynamics.com\",\"remainsoftware.com\",\"taskforce-it.de\",\"origsoft.com\",\"itheis.com\",\"idinfo-conseil.com\",\"broadcom.com\",\"rs.com\",\"idinfo.eu\",\"looksoftware.com\",\"proximity.co.uk\",\"bigblue.it\",\"xhypm.com\",\"seagullsoftware.com\",\"seagullsoftware.com\",\"xcase.com\",\"comsid.de\",\"genebag.com\",\"mailo.com\",\"neuf.fr\",\"pks.de\",\"armonie.group\",\"pascalpolverini.com\",\"polverinipartners.com\",\"systnaps.com\",\"sarus.tech\",\"microfocus.com\",\"opentext.com\",\"md-na.com\",\"redbourn.co.uk\",\"omninet.be\",\"cdinvest.be\",\"cdinvest.eu\",\"ptc.com\",\"alvinecapital.co.uk\",\"katchou.eu\",\"talend.com\",\"bartech.es\"],\n        translations: {\n           fr: {\n             required: \"Ce champs est requis.\",\n             missingSelect: \"Ce champs est requis.\",\n             forbiddenEmailDomain: \"Veuillez saisir une adresse professionnelle\",\n             manuallyBlockedEmailDomain: \"Veuillez saisir une adresse professionnelle\",\n             submitText: \"R\u00e9server une version d'essai\"\n           }\n       }\n});\n<\/script><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:14px;width:100%;\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion-flex-column fusion-no-medium-visibility\" style=\"--awb-bg-size:cover;--awb-width-large:10%;--awb-margin-top-large:20px;--awb-spacing-right-large:19.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:19.2%;--awb-width-medium:10%;--awb-order-medium:0;--awb-spacing-right-medium:19.2%;--awb-spacing-left-medium:19.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3 sm-text-align-center fusion-text-no-margin\" style=\"--awb-font-size:64px;--awb-text-color:#ffffff;--awb-margin-bottom:0px;\"><p><strong>ou<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion-flex-column fusion-animated\" style=\"--awb-padding-top:32px;--awb-padding-right:20px;--awb-padding-bottom:18px;--awb-padding-left:20px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-box-shadow:0px 24px 32px -6px rgba(0,0,0,0.1);;--awb-border-color:rgba(0,0,0,0.08);--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:solid;--awb-border-radius:12px 12px 12px 12px;--awb-width-large:42%;--awb-margin-top-large:20px;--awb-spacing-right-large:18.285714285714%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:9.1428571428571%;--awb-width-medium:50%;--awb-order-medium:2;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:10px;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-top:0px;--awb-margin-bottom:5px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:30px;\"><h3 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:30;line-height:1.26;\">D\u00e9mo<\/h3><\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"85\" height=\"85\" alt=\"Test Data Management Expert\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2785%27%20height%3D%2785%27%20viewBox%3D%270%200%2085%2085%27%3E%3Crect%20width%3D%2785%27%20height%3D%2785%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2025\/05\/contact-demo.webp\" class=\"lazyload img-responsive wp-image-11921\"\/><\/span><\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:2px;--awb-margin-left-small:0px;--awb-margin-bottom-medium:4px;--awb-font-size:20px;\"><h4 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:20;--minFontSize:20;line-height:1.4;\">D\u00e9mo personnalis\u00e9e<\/h4><\/div><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-div\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-top:0px;--awb-margin-bottom:4px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:2px;--awb-margin-left-small:0px;--awb-margin-bottom-medium:4px;--awb-font-size:16px;\"><div class=\"fusion-title-heading title-heading-center title-heading-tag fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;--fontSize:16;--minFontSize:16;line-height:1.63;\">Sollicitez nos experts<\/div><\/div><!-- [if lte IE 8]><script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2-legacy.js\"><\/script><![endif]--><script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2.js\"><\/script><script>\n  hbspt.forms.create({\n\tportalId: \"4514828\",\n\tformId: \"b6532b6d-2b5b-4f14-8aec-017c973391c6\",\n\tcss: \"\",\n        blockedDomains: [\"freschelegacy.com\",\"freschesolutions.com\",\"rocketsoftware.com\",\"softlanding.com\",\"mkssoftware.com\",\"midrangedynamics.com\",\"remainsoftware.com\",\"taskforce-it.de\",\"origsoft.com\",\"itheis.com\",\"idinfo-conseil.com\",\"broadcom.com\",\"rs.com\",\"idinfo.eu\",\"looksoftware.com\",\"proximity.co.uk\",\"bigblue.it\",\"xhypm.com\",\"seagullsoftware.com\",\"seagullsoftware.com\",\"xcase.com\",\"comsid.de\",\"genebag.com\",\"mailo.com\",\"neuf.fr\",\"pks.de\",\"armonie.group\",\"pascalpolverini.com\",\"polverinipartners.com\",\"systnaps.com\",\"sarus.tech\",\"microfocus.com\",\"opentext.com\",\"md-na.com\",\"redbourn.co.uk\",\"omninet.be\",\"cdinvest.be\",\"cdinvest.eu\",\"ptc.com\",\"alvinecapital.co.uk\",\"katchou.eu\",\"talend.com\",\"bartech.es\"],\n        translations: {\n           fr: {\n             required: \"Ce champs est requis.\",\n             missingSelect: \"Ce champs est requis.\",\n             forbiddenEmailDomain: \"Veuillez saisir une adresse professionnelle\",\n             manuallyBlockedEmailDomain: \"Veuillez saisir une adresse professionnelle\",\n             submitText: \"Demander une d\u00e9mo\"\n           }\n       }\n});\n<\/script><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:14px;width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-4693","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>D\u00e9couvrez nos articles de blog sur l&#039;anonymisation des donn\u00e9es<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez tous nos articles de blog \u00e9crits par nos experts en mati\u00e8re d&#039;identification, de masquage et d&#039;anonymisation de donn\u00e9es.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/blog\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"D\u00e9couvrez nos articles de blog sur l&#039;anonymisation des donn\u00e9es\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez tous nos articles de blog \u00e9crits par nos experts en mati\u00e8re d&#039;identification, de masquage et d&#039;anonymisation de donn\u00e9es.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.fr\/dot\/blog\/\" \/>\n<meta property=\"og:site_name\" content=\"DOT - Data Oriented Testing\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T10:54:19+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/blog\/\",\"url\":\"https:\/\/www.arcadsoftware.fr\/dot\/blog\/\",\"name\":\"D\u00e9couvrez nos articles de blog sur l'anonymisation des donn\u00e9es\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\"},\"datePublished\":\"2021-07-15T09:38:31+00:00\",\"dateModified\":\"2025-11-18T10:54:19+00:00\",\"description\":\"D\u00e9couvrez tous nos articles de blog \u00e9crits par nos experts en mati\u00e8re d'identification, de masquage et d'anonymisation de donn\u00e9es.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arcadsoftware.fr\/dot\/blog\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/\",\"name\":\"DOT - Data Oriented Testing\",\"description\":\"Confidential Data Testing Automation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"D\u00e9couvrez nos articles de blog sur l'anonymisation des donn\u00e9es","description":"D\u00e9couvrez tous nos articles de blog \u00e9crits par nos experts en mati\u00e8re d'identification, de masquage et d'anonymisation de donn\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.fr\/dot\/blog\/","og_locale":"en_US","og_type":"article","og_title":"D\u00e9couvrez nos articles de blog sur l'anonymisation des donn\u00e9es","og_description":"D\u00e9couvrez tous nos articles de blog \u00e9crits par nos experts en mati\u00e8re d'identification, de masquage et d'anonymisation de donn\u00e9es.","og_url":"https:\/\/www.arcadsoftware.fr\/dot\/blog\/","og_site_name":"DOT - Data Oriented Testing","article_modified_time":"2025-11-18T10:54:19+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.fr\/dot\/blog\/","url":"https:\/\/www.arcadsoftware.fr\/dot\/blog\/","name":"D\u00e9couvrez nos articles de blog sur l'anonymisation des donn\u00e9es","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#website"},"datePublished":"2021-07-15T09:38:31+00:00","dateModified":"2025-11-18T10:54:19+00:00","description":"D\u00e9couvrez tous nos articles de blog \u00e9crits par nos experts en mati\u00e8re d'identification, de masquage et d'anonymisation de donn\u00e9es.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.fr\/dot\/blog\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/dot\/#website","url":"https:\/\/www.arcadsoftware.com\/dot\/","name":"DOT - Data Oriented Testing","description":"Confidential Data Testing Automation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/pages\/4693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/comments?post=4693"}],"version-history":[{"count":6,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/pages\/4693\/revisions"}],"predecessor-version":[{"id":13083,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/pages\/4693\/revisions\/13083"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/media?parent=4693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}