{"id":130241,"date":"2023-09-13T08:00:00","date_gmt":"2023-09-13T06:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=130241"},"modified":"2023-06-29T10:07:48","modified_gmt":"2023-06-29T08:07:48","slug":"confiance-numerique","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/confiance-numerique\/","title":{"rendered":"Confiance num\u00e9rique"},"content":{"rendered":"<p>Suse s'est donn\u00e9 pour mission de prot\u00e9ger les donn\u00e9es de ses clients et de les aider \u00e0 pr\u00e9venir les menaces. C'est pourquoi Suse continue d'\u00e9tendre sa pile de s\u00e9curit\u00e9 d'infrastructure afin de garantir que les clients, les partenaires et les communaut\u00e9s open source puissent ex\u00e9cuter leurs charges de travail applicatives en toute s\u00e9curit\u00e9, o\u00f9 qu'elles se trouvent - dans le cloud, en p\u00e9riph\u00e9rie ou dans les centres de donn\u00e9es. \"Chaque entreprise doit maximiser sa r\u00e9silience pour faire face \u00e0 des attaques num\u00e9riques de plus en plus sophistiqu\u00e9es et potentiellement d\u00e9vastatrices\", explique le Dr Thomas Di Giacomo, Chief Technology and Product Officer de Suse. \"Cela signifie que les entreprises doivent se pencher s\u00e9rieusement sur la s\u00e9curit\u00e9 de leurs charges de travail complexes, en particulier les plateformes IA\/ML, pour lesquelles la protection des donn\u00e9es des clients est particuli\u00e8rement stricte. L'approche de Suse en mati\u00e8re de s\u00e9curit\u00e9 de la cha\u00eene d'approvisionnement et les r\u00e9centes annonces permettent aux clients de profiter en toute s\u00e9curit\u00e9 des avantages d'un monde cloud-natif et de s\u00e9curiser leur entreprise num\u00e9rique\". <\/p>\n\n\n\n<p>Suse Linux Enterprise 15 Service Pack 5, la derni\u00e8re version de la plate-forme Linux, a \u00e9t\u00e9 con\u00e7ue pour fournir des fonctions informatiques de haute performance. SLE 15 SP5 est la premi\u00e8re distribution Linux \u00e0 prendre en charge l'ensemble des fonctionnalit\u00e9s du Confidential Computing, une approche visant \u00e0 s\u00e9curiser les donn\u00e9es des clients trait\u00e9es dans le cloud public et les environnements de p\u00e9riph\u00e9rie. Les clients peuvent ainsi exploiter des machines virtuelles (VM) enti\u00e8rement crypt\u00e9es, quel que soit l'environnement. SLE 15 for SAP Applications am\u00e9liore la haute disponibilit\u00e9 des syst\u00e8mes SAP. Ces am\u00e9liorations comprennent la d\u00e9tection et la surveillance automatiques des serveurs, des instances cloud, des bases de donn\u00e9es Hana, de S\/4 ainsi que des applications NetWeaver et des clusters.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/e3mag.com\/fr\/partenaires\/suse-linux-gmbh\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SUSE.jpg\" alt=\"CI-SUSE.jpg\" class=\"wp-image-11380\" width=\"840\" height=\"94\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SUSE.jpg 1000w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SUSE-768x86.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SUSE-100x11.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SUSE-480x54.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SUSE-640x72.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SUSE-720x81.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SUSE-960x108.jpg 960w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><\/a><\/figure>","protected":false},"excerpt":{"rendered":"<p>Un rapport montre que plus de<br \/>\n88 % des personnes interrog\u00e9es ont subi plus d'un incident de s\u00e9curit\u00e9 dans l'environnement cloud au cours de l'ann\u00e9e \u00e9coul\u00e9e.<\/p>","protected":false},"author":2,"featured_media":130244,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[5,43277],"tags":[43278,66],"coauthors":[27825],"class_list":["post-130241","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-management","category-mag-23-07","tag-mag-23-07","tag-suse","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod.jpg",1200,540,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod.jpg",1200,540,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod-1168x526.jpg",1168,526,true],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod.jpg",1200,540,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod.jpg",1200,540,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod.jpg",1200,540,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod.jpg",1200,540,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod.jpg",1200,540,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod.jpg",1200,540,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod.jpg",1200,540,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod-600x540.jpg",600,540,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/09\/shutterstock_2142659351_13_Phunkod-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Ein Bericht zeigt, dass mehr als<br \/>\n88 Prozent der Befragten im vergangenen Jahr mehr als einen Sicherheitsvorfall im Cloud-Umfeld erlebt haben.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/categorie\/gestion-de-linformatique\/\" rel=\"category tag\">IT-Management<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/categorie\/mag-23-07\/\" rel=\"category tag\">Mag 23-07<\/a>","author_info_v2":{"name":"Peter M. F\u00e4rbinger, E3 Magazine","url":"https:\/\/e3mag.com\/fr\/author\/peter-m-faerbinger-e-3-magazin\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/130241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=130241"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/130241\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/130244"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=130241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=130241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=130241"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=130241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}