{"id":5171,"date":"2021-08-23T16:19:27","date_gmt":"2021-08-23T14:19:27","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/dot\/?page_id=5171"},"modified":"2025-11-18T11:54:56","modified_gmt":"2025-11-18T10:54:56","slug":"blog-articles","status":"publish","type":"page","link":"https:\/\/www.arcadsoftware.com\/dot\/blog-articles\/","title":{"rendered":"Blog"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:45px;--awb-padding-bottom:45px;--awb-padding-top-medium:40px;--awb-padding-right-medium:20px;--awb-padding-left-medium:20px;--awb-padding-top-small:45px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-background-image:radial-gradient(circle at center center, #23a5c2 0%,#054c7d 100%);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-space-between fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-position:right center;--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:100%;--awb-order-medium:0;--awb-margin-top-medium:0px;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#fefefe;--awb-margin-top:0px;--awb-margin-bottom:10px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-margin-bottom-medium:16px;--awb-font-size:55px;\"><h1 class=\"fusion-title-heading title-heading-left md-text-align-center sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:55;line-height:1.12;\">Blog posts<\/h1><\/div><div class=\"fusion-text fusion-text-1 md-text-align-center sm-text-align-center fusion-text-no-margin\" style=\"--awb-font-size:23px;--awb-line-height:1.4em;--awb-letter-spacing:-0.02em;--awb-text-transform:none;--awb-text-color:#fefefe;--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:300;\"><p>Our expertise in Data Anonymization<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_6 1_6 fusion-flex-column fusion-no-small-visibility\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:20px;--awb-spacing-right-large:11.52%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0%;--awb-width-medium:16.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:11.52%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:45px;--awb-padding-bottom:75px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column bloggrid\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-blog-shortcode fusion-blog-shortcode-1 fusion-blog-archive fusion-blog-layout-grid-wrapper fusion-blog-no\" style=\"--awb-title-font-size:20px;--awb-title-font-family:&quot;Poppins&quot;;--awb-title-font-style:normal;--awb-title-font-weight:600;\"><style type=\"text\/css\">.fusion-blog-shortcode-1 .fusion-blog-layout-grid .fusion-post-grid{padding:11.5px;}.fusion-blog-shortcode-1 .fusion-posts-container{margin-left: -11.5px !important; margin-right:-11.5px !important;}<\/style><div class=\"fusion-posts-container fusion-posts-container-no fusion-no-meta-info fusion-blog-rollover fusion-blog-layout-grid fusion-blog-layout-grid-3 isotope fusion-blog-equal-heights\" data-pages=\"0\" data-grid-col-space=\"23\" style=\"margin: -11.5px -11.5px 0;min-height:500px;\"><article id=\"blog-1-post-13934\" class=\"fusion-post-grid post-13934 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/04\/banner-blog-article-anonymisation-donnees-ia-medicale.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Anonymisation des donn\u00e9es de sant\u00e9\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/04\/banner-blog-article-anonymisation-donnees-ia-medicale.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/04\/banner-blog-article-anonymisation-donnees-ia-medicale-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/04\/banner-blog-article-anonymisation-donnees-ia-medicale-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/04\/banner-blog-article-anonymisation-donnees-ia-medicale-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/04\/banner-blog-article-anonymisation-donnees-ia-medicale-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/04\/banner-blog-article-anonymisation-donnees-ia-medicale.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/health-data-anonymization-challenges-techniques-and-best-practices-for-ai-and-medical-research\/\">\n\t\t\t\t\t\tHealth Data Anonymization: Challenges, Techniques and Best Practices for AI and Medical Research\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/health-data-anonymization-challenges-techniques-and-best-practices-for-ai-and-medical-research\/\" aria-label=\"Health Data Anonymization: Challenges, Techniques and Best Practices for AI and Medical Research\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/health-data-anonymization-challenges-techniques-and-best-practices-for-ai-and-medical-research\/\">Health Data Anonymization: Challenges, Techniques and Best Practices for AI and Medical Research<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Discover how to anonymize health data for AI and medical research while complying with GDPR and protecting patient privacy.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-13786\" class=\"fusion-post-grid post-13786 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"1000\" height=\"373\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/03\/comment-anonymiser-donnees-guide.webp\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Comment anonymiser des donn\u00e9es\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271000%27%20height%3D%27373%27%20viewBox%3D%270%200%201000%20373%27%3E%3Crect%20width%3D%271000%27%20height%3D%27373%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/03\/comment-anonymiser-donnees-guide.webp\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/03\/comment-anonymiser-donnees-guide-200x75.webp 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/03\/comment-anonymiser-donnees-guide-400x149.webp 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/03\/comment-anonymiser-donnees-guide-600x224.webp 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/03\/comment-anonymiser-donnees-guide-800x298.webp 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/03\/comment-anonymiser-donnees-guide.webp 1000w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/how-to-anonymize-data-a-complete-guide-for-cios\/\">\n\t\t\t\t\t\tHow to Anonymize Data: A Complete Guide for CIOs\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/how-to-anonymize-data-a-complete-guide-for-cios\/\" aria-label=\"How to Anonymize Data: A Complete Guide for CIOs\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/how-to-anonymize-data-a-complete-guide-for-cios\/\">How to Anonymize Data: A Complete Guide for CIOs<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Learn about the techniques, GDPR requirements, and best practices for implementing anonymization across your IT infrastructure.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-13544\" class=\"fusion-post-grid post-13544 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en category-resources\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"1634\" height=\"609\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/01\/donnees-synthetiques-vs-donnees-anonymisees.webp\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Donn\u00e9es synth\u00e9tiques VS donn\u00e9es anonymis\u00e9es\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271634%27%20height%3D%27609%27%20viewBox%3D%270%200%201634%20609%27%3E%3Crect%20width%3D%271634%27%20height%3D%27609%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/01\/donnees-synthetiques-vs-donnees-anonymisees.webp\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/01\/donnees-synthetiques-vs-donnees-anonymisees-200x75.webp 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/01\/donnees-synthetiques-vs-donnees-anonymisees-400x149.webp 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/01\/donnees-synthetiques-vs-donnees-anonymisees-600x224.webp 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/01\/donnees-synthetiques-vs-donnees-anonymisees-800x298.webp 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/01\/donnees-synthetiques-vs-donnees-anonymisees-1200x447.webp 1200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2026\/01\/donnees-synthetiques-vs-donnees-anonymisees.webp 1634w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/synthetic-data-or-anonymized-data-which-method-should-you-choose\/\">\n\t\t\t\t\t\tSynthetic data or anonymized data: which method should you choose?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/synthetic-data-or-anonymized-data-which-method-should-you-choose\/\" aria-label=\"Synthetic data or anonymized data: which method should you choose?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/synthetic-data-or-anonymized-data-which-method-should-you-choose\/\">Synthetic data or anonymized data: which method should you choose?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Performance, consistency, cost, and compliance: which approach should you choose between synthetic data and anonymized data?<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-13199\" class=\"fusion-post-grid post-13199 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"298\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/anonymisation-developpement-interne-vs-solution-dediee.webp\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Comparatif developpement interne vs solution d&#039;anonymisation d\u00e9di\u00e9e\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27800%27%20height%3D%27298%27%20viewBox%3D%270%200%20800%20298%27%3E%3Crect%20width%3D%27800%27%20height%3D%27298%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/anonymisation-developpement-interne-vs-solution-dediee.webp\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/anonymisation-developpement-interne-vs-solution-dediee-200x75.webp 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/anonymisation-developpement-interne-vs-solution-dediee-400x149.webp 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/anonymisation-developpement-interne-vs-solution-dediee-600x224.webp 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/anonymisation-developpement-interne-vs-solution-dediee.webp 800w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/creating-your-own-anonymization-tool-good-idea-or-strategic-mistake\/\">\n\t\t\t\t\t\tCreating your own anonymization tool: good idea or strategic mistake?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/creating-your-own-anonymization-tool-good-idea-or-strategic-mistake\/\" aria-label=\"Creating your own anonymization tool: good idea or strategic mistake?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/creating-your-own-anonymization-tool-good-idea-or-strategic-mistake\/\">Creating your own anonymization tool: good idea or strategic mistake?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Creating your own anonymization tool or choosing a dedicated solution? Costs, risks, GDPR compliance, benefits: a complete comparison.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-12941\" class=\"fusion-post-grid post-12941 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"298\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/serveur-design-serveur-production-anonymisation.webp\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Serveur Design &amp; Serveur Production illustration\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27800%27%20height%3D%27298%27%20viewBox%3D%270%200%20800%20298%27%3E%3Crect%20width%3D%27800%27%20height%3D%27298%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/serveur-design-serveur-production-anonymisation.webp\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/serveur-design-serveur-production-anonymisation-200x75.webp 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/serveur-design-serveur-production-anonymisation-400x149.webp 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/serveur-design-serveur-production-anonymisation-600x224.webp 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/11\/serveur-design-serveur-production-anonymisation.webp 800w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/design-server-and-production-server-two-pillars-of-a-modern-industrialized-anonymization-architecture\/\">\n\t\t\t\t\t\tDesign Server and Production Server: Two Pillars of a Modern, Industrialized Anonymization Architecture\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/design-server-and-production-server-two-pillars-of-a-modern-industrialized-anonymization-architecture\/\" aria-label=\"Design Server and Production Server: Two Pillars of a Modern, Industrialized Anonymization Architecture\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/design-server-and-production-server-two-pillars-of-a-modern-industrialized-anonymization-architecture\/\">Design Server and Production Server: Two Pillars of a Modern, Industrialized Anonymization Architecture<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Separate your Design and Production environments to secure, automate, and industrialize the anonymization of your sensitive data.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-5070\" class=\"fusion-post-grid post-5070 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"298\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/10\/identifier-donnees-personnelles-rgpd.webp\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Identification donn\u00e9es personnelles\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27800%27%20height%3D%27298%27%20viewBox%3D%270%200%20800%20298%27%3E%3Crect%20width%3D%27800%27%20height%3D%27298%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/10\/identifier-donnees-personnelles-rgpd.webp\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/10\/identifier-donnees-personnelles-rgpd-200x75.webp 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/10\/identifier-donnees-personnelles-rgpd-400x149.webp 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/10\/identifier-donnees-personnelles-rgpd-600x224.webp 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/10\/identifier-donnees-personnelles-rgpd.webp 800w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/gdpr-where-to-start-identify-your-personal-data\/\">\n\t\t\t\t\t\tIdentifying Personal Data \u2013 GDPR: Where to Start?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/gdpr-where-to-start-identify-your-personal-data\/\" aria-label=\"Identifying Personal Data \u2013 GDPR: Where to Start?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/gdpr-where-to-start-identify-your-personal-data\/\">Identifying Personal Data \u2013 GDPR: Where to Start?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Identify your personal data to build your data register and ensure optimal GDPR compliance!<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-9087\" class=\"fusion-post-grid post-9087 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en category-resources\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Blog Article DOT Cyber Resilience Act CRA\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act-200x74.jpg 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act-400x149.jpg 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act-600x223.jpg 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act-800x298.jpg 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/\">\n\t\t\t\t\t\tCyber Resilience Act (CRA)\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/\" aria-label=\"Cyber Resilience Act (CRA)\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/\">Cyber Resilience Act (CRA)<\/a><\/h2><div class=\"fusion-post-content-container\"><p>The Cyber Resilience Act (CRA) is intended to reinforce the security of digital products by imposing cybersecurity standards, obligations on manufacturers and fines for non-compliance.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-9020\" class=\"fusion-post-grid post-9020 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en category-resources\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"705\" height=\"263\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner Directive NIS 2\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27705%27%20height%3D%27263%27%20viewBox%3D%270%200%20705%20263%27%3E%3Crect%20width%3D%27705%27%20height%3D%27263%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2-200x75.jpg 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2-400x149.jpg 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2-600x224.jpg 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg 705w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/\">\n\t\t\t\t\t\tThe NIS 2 Directive\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/\" aria-label=\"The NIS 2 Directive\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/\">The NIS 2 Directive<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Find out how the NIS 2 directive aims to enhance infrastructure security and reduce the impact of cyberattacks on entities through preventive measures and risk assessment.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-8936\" class=\"fusion-post-grid post-8936 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en category-resources\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"846\" height=\"315\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner Article Norme PCI-DSS\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27846%27%20height%3D%27315%27%20viewBox%3D%270%200%20846%20315%27%3E%3Crect%20width%3D%27846%27%20height%3D%27315%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme-200x74.webp 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme-400x149.webp 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme-600x223.webp 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme-800x298.webp 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp 846w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/\">\n\t\t\t\t\t\tPCI-DSS standard\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/\" aria-label=\"PCI-DSS standard\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/\">PCI-DSS standard<\/a><\/h2><div class=\"fusion-post-content-container\"><p>PCI-DSS defines security standards to protect credit card transactions and prevent data leakage and online fraud.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-8898\" class=\"fusion-post-grid post-8898 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en category-resources\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"823\" height=\"306\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-blog-article-dora-dot-resilience-numerique.jpg\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banniere Article de Blog DORA Digital Operational Resilience Act\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27823%27%20height%3D%27306%27%20viewBox%3D%270%200%20823%20306%27%3E%3Crect%20width%3D%27823%27%20height%3D%27306%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-blog-article-dora-dot-resilience-numerique.jpg\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-blog-article-dora-dot-resilience-numerique-200x74.jpg 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-blog-article-dora-dot-resilience-numerique-400x149.jpg 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-blog-article-dora-dot-resilience-numerique-600x223.jpg 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-blog-article-dora-dot-resilience-numerique-800x297.jpg 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-blog-article-dora-dot-resilience-numerique.jpg 823w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/dora-the-digital-operational-resilience-act-regulation\/\">\n\t\t\t\t\t\tDORA, the Digital Operational Resilience Act (Regulation EU)\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/dora-the-digital-operational-resilience-act-regulation\/\" aria-label=\"DORA, the Digital Operational Resilience Act (Regulation EU)\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/dora-the-digital-operational-resilience-act-regulation\/\">DORA, the Digital Operational Resilience Act (Regulation EU)<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Learn all about DORA (Digital Operational Resilience Regulation) and its impact on financial entities.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-8822\" class=\"fusion-post-grid post-8822 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banniere-interview-romain-alberca-importance-donnees-anonymisation.jpg\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banni\u00e8re Interview Romain Alberca Importance des donn\u00e9es anonymis\u00e9es\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banniere-interview-romain-alberca-importance-donnees-anonymisation.jpg\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banniere-interview-romain-alberca-importance-donnees-anonymisation-200x74.jpg 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banniere-interview-romain-alberca-importance-donnees-anonymisation-400x149.jpg 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banniere-interview-romain-alberca-importance-donnees-anonymisation-600x223.jpg 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banniere-interview-romain-alberca-importance-donnees-anonymisation-800x298.jpg 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banniere-interview-romain-alberca-importance-donnees-anonymisation.jpg 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/interview-with-deputy-ciso-about-the-importance-of-data-anonymization\/\">\n\t\t\t\t\t\tInterview with our deputy CISO&#8217;s about the importance of data anonymization\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/interview-with-deputy-ciso-about-the-importance-of-data-anonymization\/\" aria-label=\"Interview with our deputy CISO&#8217;s about the importance of data anonymization\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/interview-with-deputy-ciso-about-the-importance-of-data-anonymization\/\">Interview with our deputy CISO&#8217;s about the importance of data anonymization<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Discover our deputy CISO's interview highlighting the importance of data anonymization, cybersecurity awareness in companies &amp; the risks of not complying with the GDPR.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-8367\" class=\"fusion-post-grid post-8367 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en category-resources\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/08\/banner-blog-negotiatate-security-budget.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner Blog Negotiatate Security Budget\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/08\/banner-blog-negotiatate-security-budget.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/08\/banner-blog-negotiatate-security-budget-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/08\/banner-blog-negotiatate-security-budget-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/08\/banner-blog-negotiatate-security-budget-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/08\/banner-blog-negotiatate-security-budget-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2023\/08\/banner-blog-negotiatate-security-budget.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/negotiating-the-security-budget-how-to-convince-management-in-the-face-of-the-growing-challenges-posed-by-cyber-attacks\/\">\n\t\t\t\t\t\tHow to Secure Budget for Cybersecurity \u2013 Convince Management Effectively\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/negotiating-the-security-budget-how-to-convince-management-in-the-face-of-the-growing-challenges-posed-by-cyber-attacks\/\" aria-label=\"How to Secure Budget for Cybersecurity \u2013 Convince Management Effectively\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/negotiating-the-security-budget-how-to-convince-management-in-the-face-of-the-growing-challenges-posed-by-cyber-attacks\/\">How to Secure Budget for Cybersecurity \u2013 Convince Management Effectively<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Find out in this article how to negotiate the security budget and convince management of the importance of investing in security.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-7202\" class=\"fusion-post-grid post-7202 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en category-resources\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/\">\n\t\t\t\t\t\tWhat are the risks of working with non-anonymized data?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/\" aria-label=\"What are the risks of working with non-anonymized data?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/\">What are the risks of working with non-anonymized data?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Find out in this article the different risks for companies of working with non-anonymized data.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-6830\" class=\"fusion-post-grid post-6830 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/01\/Banner-article-DOT-Fuite-de-donnees.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Data Breach illustration\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/01\/Banner-article-DOT-Fuite-de-donnees.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/01\/Banner-article-DOT-Fuite-de-donnees-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/01\/Banner-article-DOT-Fuite-de-donnees-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/01\/Banner-article-DOT-Fuite-de-donnees-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/01\/Banner-article-DOT-Fuite-de-donnees-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/01\/Banner-article-DOT-Fuite-de-donnees.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/preventing-data-breaches-through-anonymization\/\">\n\t\t\t\t\t\tPreventing Data Breaches Through Anonymization\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/preventing-data-breaches-through-anonymization\/\" aria-label=\"Preventing Data Breaches Through Anonymization\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/preventing-data-breaches-through-anonymization\/\">Preventing Data Breaches Through Anonymization<\/a><\/h2><div class=\"fusion-post-content-container\"><p>How to prevent data breaches in 2025: key stats, proven controls, and when anonymization beats pseudonymization for test &amp; analytics.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-5893\" class=\"fusion-post-grid post-5893 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/09\/banner-dot-protecting-your-data.jpg\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner DOT protection your data\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/09\/banner-dot-protecting-your-data.jpg\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/09\/banner-dot-protecting-your-data-200x74.jpg 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/09\/banner-dot-protecting-your-data-400x149.jpg 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/09\/banner-dot-protecting-your-data-600x223.jpg 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/09\/banner-dot-protecting-your-data-800x298.jpg 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/09\/banner-dot-protecting-your-data.jpg 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/protecting-your-pii-data-in-testing\/\">\n\t\t\t\t\t\tProtecting your PII data in Testing\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/protecting-your-pii-data-in-testing\/\" aria-label=\"Protecting your PII data in Testing\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/protecting-your-pii-data-in-testing\/\">Protecting your PII data in Testing<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Nearly every company has a test or development environment that is often less secure than production, and many of those have a failed audit to show for it. <\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-5751\" class=\"fusion-post-grid post-5751 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Anonymiser-ses-donnees-1.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT Anonymiser ses donn\u00e9es (1)\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Anonymiser-ses-donnees-1.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Anonymiser-ses-donnees-1-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Anonymiser-ses-donnees-1-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Anonymiser-ses-donnees-1-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Anonymiser-ses-donnees-1-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Anonymiser-ses-donnees-1.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymizing-your-data-why-is-it-important-for-all-organizations\/\">\n\t\t\t\t\t\tAnonymizing your data: why is it important for all organizations?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymizing-your-data-why-is-it-important-for-all-organizations\/\" aria-label=\"Anonymizing your data: why is it important for all organizations?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymizing-your-data-why-is-it-important-for-all-organizations\/\">Anonymizing your data: why is it important for all organizations?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>When an organization processes data, it is essential for it to anonymize it in order to comply with the rules imposed by the GDPR.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-5759\" class=\"fusion-post-grid post-5759 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Comment-utiliser-un-jeu-de-donnees.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT Comment utiliser un jeu de donn\u00e9es\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Comment-utiliser-un-jeu-de-donnees.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Comment-utiliser-un-jeu-de-donnees-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Comment-utiliser-un-jeu-de-donnees-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Comment-utiliser-un-jeu-de-donnees-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Comment-utiliser-un-jeu-de-donnees-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-Comment-utiliser-un-jeu-de-donnees.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/how-to-use-a-dataset-in-compliance-with-the-gdpr\/\">\n\t\t\t\t\t\tHow to use a dataset in compliance with the GDPR?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/how-to-use-a-dataset-in-compliance-with-the-gdpr\/\" aria-label=\"How to use a dataset in compliance with the GDPR?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/how-to-use-a-dataset-in-compliance-with-the-gdpr\/\">How to use a dataset in compliance with the GDPR?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Data Anonymization allows companies to exploit datasets securely while protecting the privacy of their users.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-5303\" class=\"fusion-post-grid post-5303 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT TPE PME\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/\">\n\t\t\t\t\t\tVSB\/SMB: how to protect my company&#8217;s data?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/\" aria-label=\"VSB\/SMB: how to protect my company&#8217;s data?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/\">VSB\/SMB: how to protect my company&#8217;s data?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>There are several methods of anonymization for which VSB and SMB are concerned and can set up protection within their organization. <\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-5232\" class=\"fusion-post-grid post-5232 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Masquage-des-donnees.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT Masquage des donn\u00e9es\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Masquage-des-donnees.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Masquage-des-donnees-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Masquage-des-donnees-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Masquage-des-donnees-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Masquage-des-donnees-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Masquage-des-donnees.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-masking-and-anonymization-understanding-the-different-algorithms\/\">\n\t\t\t\t\t\tData Masking and Anonymization: 6 Types of Algorithms to Protect Your Data\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-masking-and-anonymization-understanding-the-different-algorithms\/\" aria-label=\"Data Masking and Anonymization: 6 Types of Algorithms to Protect Your Data\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-masking-and-anonymization-understanding-the-different-algorithms\/\">Data Masking and Anonymization: 6 Types of Algorithms to Protect Your Data<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Different data masking techniques to better understand how each algorithm works.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-5221\" class=\"fusion-post-grid post-5221 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT Protection des donn\u00e9es\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/\">\n\t\t\t\t\t\tData protection: one in two leaks is linked to an internal problem in the company\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/\" aria-label=\"Data protection: one in two leaks is linked to an internal problem in the company\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/\">Data protection: one in two leaks is linked to an internal problem in the company<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Anonymize data and create a secure ecosystem at the heart of your business to minimize problems and data leakage. <\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-5228\" class=\"fusion-post-grid post-5228 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-cas-dor-du-digital.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Les cas d&#039;Or du digital\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-cas-dor-du-digital.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-cas-dor-du-digital-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-cas-dor-du-digital-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-cas-dor-du-digital-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-cas-dor-du-digital-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-cas-dor-du-digital.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/arcad-software-awarded-at-the-cas-d-or-service-public-numerique\/\">\n\t\t\t\t\t\tARCAD Software awarded at the Cas d&#8217;OR Service Public Num\u00e9rique!\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/arcad-software-awarded-at-the-cas-d-or-service-public-numerique\/\" aria-label=\"ARCAD Software awarded at the Cas d&#8217;OR Service Public Num\u00e9rique!\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/arcad-software-awarded-at-the-cas-d-or-service-public-numerique\/\">ARCAD Software awarded at the Cas d&#8217;OR Service Public Num\u00e9rique!<\/a><\/h2><div class=\"fusion-post-content-container\"><p>ARCAD Software wins two awards at the Cas d\u2019Or Service Public Num\u00e9rique for its DOT Anonymizer solution.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-5205\" class=\"fusion-post-grid post-5205 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT Data Masking\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-is-data-masking\/\">\n\t\t\t\t\t\tWhat is Data Masking?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-is-data-masking\/\" aria-label=\"What is Data Masking?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-is-data-masking\/\">What is Data Masking?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Data masking guarantees the confidentiality, availability and integrity of data for users and companies<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-5199\" class=\"fusion-post-grid post-5199 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Limpact-du-RGPD.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT L&#039;impact du RGPD\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Limpact-du-RGPD.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Limpact-du-RGPD-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Limpact-du-RGPD-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Limpact-du-RGPD-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Limpact-du-RGPD-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Limpact-du-RGPD.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-impact-of-the-gdpr-on-the-cybersecurity-of-a-company\/\">\n\t\t\t\t\t\tThe impact of the GDPR on the cybersecurity of a company\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-impact-of-the-gdpr-on-the-cybersecurity-of-a-company\/\" aria-label=\"The impact of the GDPR on the cybersecurity of a company\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-impact-of-the-gdpr-on-the-cybersecurity-of-a-company\/\">The impact of the GDPR on the cybersecurity of a company<\/a><\/h2><div class=\"fusion-post-content-container\"><p>The GDPR imposes stricter standards on companies in terms of data security and therefore cybersecurity. <\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-5185\" class=\"fusion-post-grid post-5185 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT RGPD\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/gdpr-a-cybersecurity-issue-and-real-cyberprotection\/\">\n\t\t\t\t\t\tGDPR: a cybersecurity challenge and true cyberprotection\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/gdpr-a-cybersecurity-issue-and-real-cyberprotection\/\" aria-label=\"GDPR: a cybersecurity challenge and true cyberprotection\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/gdpr-a-cybersecurity-issue-and-real-cyberprotection\/\">GDPR: a cybersecurity challenge and true cyberprotection<\/a><\/h2><div class=\"fusion-post-content-container\"><p>By securing the personal data of site users, the GDPR is proving to be an effective bulwark in terms of cybersecurity. <\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-5491\" class=\"fusion-post-grid post-5491 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"346\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/11\/Banner-RGPD-et-anonymisation-jusquou-faut-il-aller.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"RGPD et Anonymisation, jusqu\u2019o\u00f9 doit-on aller ?\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27346%27%20viewBox%3D%270%200%20940%20346%27%3E%3Crect%20width%3D%27940%27%20height%3D%27346%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/11\/Banner-RGPD-et-anonymisation-jusquou-faut-il-aller.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/11\/Banner-RGPD-et-anonymisation-jusquou-faut-il-aller-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/11\/Banner-RGPD-et-anonymisation-jusquou-faut-il-aller-400x147.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/11\/Banner-RGPD-et-anonymisation-jusquou-faut-il-aller-600x221.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/11\/Banner-RGPD-et-anonymisation-jusquou-faut-il-aller-800x294.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/11\/Banner-RGPD-et-anonymisation-jusquou-faut-il-aller.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/gdpr-and-anonymization-how-far-should-we-go\/\">\n\t\t\t\t\t\tGDPR and Anonymization, how far should we go?\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/gdpr-and-anonymization-how-far-should-we-go\/\" aria-label=\"GDPR and Anonymization, how far should we go?\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/gdpr-and-anonymization-how-far-should-we-go\/\">GDPR and Anonymization, how far should we go?<\/a><\/h2><div class=\"fusion-post-content-container\"><p>GDPR and Anonymization: what is the definition of anonymization in the GDPR, is it applicable in reality? And how?<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-5191\" class=\"fusion-post-grid post-5191 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices.jpg\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Anonymization Best Practices\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices.jpg\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices-200x74.jpg 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices-400x149.jpg 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices-600x223.jpg 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices-800x298.jpg 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices.jpg 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/\">\n\t\t\t\t\t\tAnonymization: best practices to put in place\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/\" aria-label=\"Anonymization: best practices to put in place\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/\">Anonymization: best practices to put in place<\/a><\/h2><div class=\"fusion-post-content-container\"><p>In order to comply with the GDPR, it is essential to initiate a process of anonymization of individual data<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-5103\" class=\"fusion-post-grid post-5103 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2018\/09\/Banner-article-DOT-5-questions.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner article DOT 5 questions\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2018\/09\/Banner-article-DOT-5-questions.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2018\/09\/Banner-article-DOT-5-questions-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2018\/09\/Banner-article-DOT-5-questions-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2018\/09\/Banner-article-DOT-5-questions-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2018\/09\/Banner-article-DOT-5-questions-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2018\/09\/Banner-article-DOT-5-questions.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/5-most-common-questions-about-data-anonymization\/\">\n\t\t\t\t\t\t5 most common questions about data anonymization\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/5-most-common-questions-about-data-anonymization\/\" aria-label=\"5 most common questions about data anonymization\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/5-most-common-questions-about-data-anonymization\/\">5 most common questions about data anonymization<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Maurice Marrel's interview about data anonymization.<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-5121\" class=\"fusion-post-grid post-5121 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,0);border:none;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(255,255,255,0);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t<img decoding=\"async\" width=\"940\" height=\"350\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2017\/01\/banner-dot-data-protection-gdpr.png\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"Banner Data protection GDPR\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2017\/01\/banner-dot-data-protection-gdpr.png\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2017\/01\/banner-dot-data-protection-gdpr-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2017\/01\/banner-dot-data-protection-gdpr-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2017\/01\/banner-dot-data-protection-gdpr-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2017\/01\/banner-dot-data-protection-gdpr-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2017\/01\/banner-dot-data-protection-gdpr.png 940w\" data-sizes=\"auto\" \/><div class=\"fusion-rollover\">\n\t<div class=\"fusion-rollover-content\">\n\n\t\t\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"fusion-rollover-title\">\n\t\t\t\t\t<a class=\"fusion-rollover-title-link\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-taste-things-come-world\/\">\n\t\t\t\t\t\tData Protection:\u00a0 a taste of things to come (the world over)\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\t\t<a class=\"fusion-link-wrapper\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-taste-things-come-world\/\" aria-label=\"Data Protection:\u00a0 a taste of things to come (the world over)\"><\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 15px 0px 15px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-taste-things-come-world\/\">Data Protection:\u00a0 a taste of things to come (the world over)<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Olenka Van Schendel's predictions about the wide-ranging impact of GDPR<\/p><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"demo\" class=\"fusion-container-anchor\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling dem\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0%;--awb-padding-bottom:5%;--awb-padding-top-medium:40px;--awb-padding-top-small:20px;--awb-background-color:#124d79;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-menu-anchor\" id=\"trial-version\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:0.96%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:60%;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:6.4%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"1.6\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#ffffff;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;--awb-font-size:50px;\"><h2 class=\"fusion-title-heading title-heading-center sm-text-align-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:800;margin:0;font-size:1em;--fontSize:50;line-height:1.14;\">TRIAL VERSION \/ DEMO<\/h2><\/div><div class=\"fusion-text fusion-text-2 sm-text-align-left\" style=\"--awb-content-alignment:center;--awb-font-size:25px;--awb-line-height:1.4em;--awb-letter-spacing:-0.02em;--awb-text-color:#ffffff;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:300;\"><p>Request a trial version or a session in our sandbox!<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion-flex-column fusion-animated\" style=\"--awb-padding-top:32px;--awb-padding-right:20px;--awb-padding-bottom:18px;--awb-padding-left:20px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-box-shadow:0px 24px 32px -6px rgba(0,0,0,0.1);;--awb-border-color:rgba(0,0,0,0.08);--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:solid;--awb-border-radius:12px 12px 12px 12px;--awb-width-large:42%;--awb-margin-top-large:20px;--awb-spacing-right-large:9.1428571428571%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:18.285714285714%;--awb-width-medium:50%;--awb-order-medium:2;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:10px;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;--awb-font-size:30px;\"><h3 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:30;line-height:1.26;\">Trial Version<\/h3><\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"85\" height=\"85\" alt=\"Test Data Management Expert\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2785%27%20height%3D%2785%27%20viewBox%3D%270%200%2085%2085%27%3E%3Crect%20width%3D%2785%27%20height%3D%2785%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/04\/contact-trial-version.png\" class=\"lazyload img-responsive wp-image-11670\"\/><\/span><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;--awb-margin-bottom-medium:4px;--awb-font-size:20px;\"><h4 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:20;--minFontSize:20;line-height:1.4;\">Try it now!<\/h4><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-div\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-top:0px;--awb-margin-bottom:4px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:2px;--awb-margin-left-small:0px;--awb-margin-bottom-medium:4px;--awb-font-size:16px;\"><div class=\"fusion-title-heading title-heading-center title-heading-tag fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;--fontSize:16;--minFontSize:16;line-height:1.63;\">Request a trial version<\/div><\/div><script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    region: \"na1\",\n    portalId: \"4514828\",\n    formId: \"2e767847-894f-45d4-a739-347d9706c879\",\n      css: \"\",\n        blockedDomains: [\"freschelegacy.com\",\"freschesolutions.com\",\"rocketsoftware.com\",\"softlanding.com\",\"mkssoftware.com\",\"midrangedynamics.com\",\"remainsoftware.com\",\"taskforce-it.de\",\"origsoft.com\",\"itheis.com\",\"idinfo-conseil.com\",\"broadcom.com\",\"rs.com\",\"idinfo.eu\",\"looksoftware.com\",\"proximity.co.uk\",\"bigblue.it\",\"xhypm.com\",\"seagullsoftware.com\",\"seagullsoftware.com\",\"xcase.com\",\"comsid.de\",\"genebag.com\",\"mailo.com\",\"neuf.fr\",\"pks.de\",\"armonie.group\",\"pascalpolverini.com\",\"polverinipartners.com\",\"systnaps.com\",\"sarus.tech\",\"microfocus.com\",\"opentext.com\",\"md-na.com\",\"redbourn.co.uk\",\"omninet.be\",\"cdinvest.be\",\"cdinvest.eu\",\"ptc.com\",\"alvinecapital.co.uk\",\"katchou.eu\",\"talend.com\",\"bartech.es\"],\n      translations: {\n           en: {\n             required: \"Please fill the required field.\",\n             missingSelect: \"Please fill the required field.\",\n             forbiddenEmailDomain: \"Business address required\",\n             manuallyBlockedEmailDomain: \"Business address required\",\n             submitText: \"Request a trial version\"\n           }\n       }\n});\n<\/script><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:14px;width:100%;\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:10%;--awb-margin-top-large:20px;--awb-spacing-right-large:19.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:19.2%;--awb-width-medium:10%;--awb-order-medium:0;--awb-spacing-right-medium:19.2%;--awb-spacing-left-medium:19.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3 fusion-text-no-margin\" style=\"--awb-font-size:64px;--awb-text-color:#ffffff;--awb-margin-bottom:0px;\"><p><strong>or<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion-flex-column fusion-animated\" style=\"--awb-padding-top:32px;--awb-padding-right:20px;--awb-padding-bottom:18px;--awb-padding-left:20px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-box-shadow:0px 24px 32px -6px rgba(0,0,0,0.1);;--awb-border-color:rgba(0,0,0,0.08);--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:solid;--awb-border-radius:12px 12px 12px 12px;--awb-width-large:42%;--awb-margin-top-large:20px;--awb-spacing-right-large:18.285714285714%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:9.1428571428571%;--awb-width-medium:50%;--awb-order-medium:2;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:10px;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;--awb-font-size:30px;\"><h3 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:30;line-height:1.26;\">Demo<\/h3><\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-margin-top:5px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"85\" height=\"85\" alt=\"Test Data Management Expert\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2785%27%20height%3D%2785%27%20viewBox%3D%270%200%2085%2085%27%3E%3Crect%20width%3D%2785%27%20height%3D%2785%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2025\/05\/contact-demo.webp\" class=\"lazyload img-responsive wp-image-11921\"\/><\/span><\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;--awb-margin-bottom-medium:4px;--awb-font-size:20px;\"><h4 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:20;--minFontSize:20;line-height:1.4;\">Personalized demo<\/h4><\/div><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-div\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-top:0px;--awb-margin-bottom:4px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:2px;--awb-margin-left-small:0px;--awb-margin-bottom-medium:4px;--awb-font-size:16px;\"><div class=\"fusion-title-heading title-heading-center title-heading-tag fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;--fontSize:16;--minFontSize:16;line-height:1.63;\">Ask our data masking experts<\/div><\/div><!--[if lte IE 8]>\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2-legacy.js\"><\/script>\n<![endif]-->\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    region: \"na1\",\n    portalId: \"4514828\",\n    formId: \"d44ecda7-76b8-4c54-bd9b-ec3f7f114dce\",\n      css: \"\",\n        blockedDomains: [\"freschelegacy.com\",\"freschesolutions.com\",\"rocketsoftware.com\",\"softlanding.com\",\"mkssoftware.com\",\"midrangedynamics.com\",\"remainsoftware.com\",\"taskforce-it.de\",\"origsoft.com\",\"itheis.com\",\"idinfo-conseil.com\",\"broadcom.com\",\"rs.com\",\"idinfo.eu\",\"looksoftware.com\",\"proximity.co.uk\",\"bigblue.it\",\"xhypm.com\",\"seagullsoftware.com\",\"seagullsoftware.com\",\"xcase.com\",\"comsid.de\",\"genebag.com\",\"mailo.com\",\"neuf.fr\",\"pks.de\",\"armonie.group\",\"pascalpolverini.com\",\"polverinipartners.com\",\"systnaps.com\",\"sarus.tech\",\"microfocus.com\",\"opentext.com\",\"md-na.com\",\"redbourn.co.uk\",\"omninet.be\",\"cdinvest.be\",\"cdinvest.eu\",\"ptc.com\",\"alvinecapital.co.uk\",\"katchou.eu\",\"talend.com\",\"bartech.es\"],\n      translations: {\n           en: {\n             required: \"Please fill the required field.\",\n             missingSelect: \"Please fill the required field.\",\n             forbiddenEmailDomain: \"Business address required\",\n             manuallyBlockedEmailDomain: \"Business address required\",\n             submitText: \"Request a demo\"\n           }\n       }\n});\n<\/script><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:14px;width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-5171","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Read our blog posts on data anonymization<\/title>\n<meta name=\"description\" content=\"Read all of our blog posts written by our experts on discovering, masking and data anonymization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.com\/dot\/blog-articles\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Read our blog posts on data anonymization\" \/>\n<meta property=\"og:description\" content=\"Read all of our blog posts written by our experts on discovering, masking and data anonymization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.com\/dot\/blog-articles\/\" \/>\n<meta property=\"og:site_name\" content=\"DOT - Data Oriented Testing\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T10:54:56+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/blog-articles\/\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/blog-articles\/\",\"name\":\"Read our blog posts on data anonymization\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\"},\"datePublished\":\"2021-08-23T14:19:27+00:00\",\"dateModified\":\"2025-11-18T10:54:56+00:00\",\"description\":\"Read all of our blog posts written by our experts on discovering, masking and data anonymization.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arcadsoftware.com\/dot\/blog-articles\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/\",\"name\":\"DOT - Data Oriented Testing\",\"description\":\"Confidential Data Testing Automation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Read our blog posts on data anonymization","description":"Read all of our blog posts written by our experts on discovering, masking and data anonymization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.com\/dot\/blog-articles\/","og_locale":"en_US","og_type":"article","og_title":"Read our blog posts on data anonymization","og_description":"Read all of our blog posts written by our experts on discovering, masking and data anonymization.","og_url":"https:\/\/www.arcadsoftware.com\/dot\/blog-articles\/","og_site_name":"DOT - Data Oriented Testing","article_modified_time":"2025-11-18T10:54:56+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.com\/dot\/blog-articles\/","url":"https:\/\/www.arcadsoftware.com\/dot\/blog-articles\/","name":"Read our blog posts on data anonymization","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#website"},"datePublished":"2021-08-23T14:19:27+00:00","dateModified":"2025-11-18T10:54:56+00:00","description":"Read all of our blog posts written by our experts on discovering, masking and data anonymization.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.com\/dot\/blog-articles\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/dot\/#website","url":"https:\/\/www.arcadsoftware.com\/dot\/","name":"DOT - Data Oriented Testing","description":"Confidential Data Testing Automation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/pages\/5171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/comments?post=5171"}],"version-history":[{"count":6,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/pages\/5171\/revisions"}],"predecessor-version":[{"id":13084,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/pages\/5171\/revisions\/13084"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/media?parent=5171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}