{"id":135697,"date":"2023-12-19T07:00:00","date_gmt":"2023-12-19T06:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=135697"},"modified":"2023-12-19T08:44:26","modified_gmt":"2023-12-19T07:44:26","slug":"la-demande-cree-des-opportunites-de-croissance-sur-le-marche-de-la-cybersecurite","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/la-demande-cree-des-opportunites-de-croissance-sur-le-marche-de-la-cybersecurite\/","title":{"rendered":"La demande cr\u00e9e des opportunit\u00e9s de croissance sur le march\u00e9 de la cybers\u00e9curit\u00e9"},"content":{"rendered":"<p>La longue histoire du succ\u00e8s du march\u00e9 de la cybers\u00e9curit\u00e9 se poursuit. Face \u00e0 la pression des attaques qui ne cesse de cro\u00eetre et \u00e0 la p\u00e9nurie de personnel qualifi\u00e9 qui s'aggrave parall\u00e8lement, les signes de croissance se poursuivent. Surtout dans les PME. En effet, alors que les grandes entreprises tendent \u00e0 reconduire leurs budgets d\u00e9j\u00e0 \u00e9lev\u00e9s et \u00e0 les augmenter l\u00e9g\u00e8rement dans l'ensemble, ce sont surtout les petites et moyennes entreprises (PME) qui assurent une demande suppl\u00e9mentaire. C'est ce que rapporte la nouvelle \u00e9tude \"ISG Provider Lens Cybersecurity - Solutions &amp; Services 2023\", que la soci\u00e9t\u00e9 d'\u00e9tudes de march\u00e9 et de conseil Information Services Group (ISG) vient de publier dans deux \u00e9ditions distinctes pour l'Allemagne et la Suisse. ISG y examine le portefeuille et la force concurrentielle de plus de 100 prestataires de services et fournisseurs de produits sur le march\u00e9 de la cybers\u00e9curit\u00e9.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Facteurs de d\u00e9veloppement<\/h2>\n\n\n\n<p>La cybers\u00e9curit\u00e9 devient une comp\u00e9tence cl\u00e9. Deux facteurs poussent particuli\u00e8rement cette \u00e9volution. Premi\u00e8rement, la num\u00e9risation toujours plus pouss\u00e9e des entreprises augmente massivement la taille des surfaces d'attaque et le nombre de voies d'attaque. Deuxi\u00e8mement, les attaquants sont de plus en plus capables de modifier leur approche m\u00e9thodique et tactique \u00e0 des intervalles de plus en plus courts et de recourir \u00e0 de nouvelles technologies. C'est le cas par exemple des formes d'intelligence artificielle (IA). La variabilit\u00e9 et la port\u00e9e des attaques sont donc de plus en plus grandes. Malgr\u00e9 cela, les entreprises et les organisations gouvernementales poursuivent la num\u00e9risation de leurs processus afin de pouvoir travailler plus efficacement et de mani\u00e8re plus adapt\u00e9e aux clients. Afin d'orchestrer la diversit\u00e9 des m\u00e9canismes de d\u00e9fense utilis\u00e9s et de d\u00e9tecter suffisamment t\u00f4t les attaques pertinentes, les fournisseurs d\u00e9veloppent l'utilisation de solutions d'auto-apprentissage qui fonctionnent avec diff\u00e9rentes techniques d'automatisation, d'apprentissage automatique et d'IA.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Intelligence humaine<\/h2>\n\n\n\n<p>\"La main d'\u0153uvre humaine dans les SOC n'en devient pas pour autant superflue. Bien au contraire\", explique l'auteur de l'\u00e9tude Frank Heuer, qui travaille en tant que Lead Analyst Cybersecurity DACH pour ISG. \"Il faut en effet des connaissances d'experts approfondies pour mettre en place des solutions d'automatisation adapt\u00e9es \u00e0 la situation concr\u00e8te en mati\u00e8re de menaces. Il s'agit en outre d'\u00e9valuer de mani\u00e8re critique les r\u00e9sultats des syst\u00e8mes\".<\/p>\n\n\n\n<p><a href=\"https:\/\/ei.isg-one.com\/research\" target=\"_blank\" rel=\"noreferrer noopener\">research.isg-one.com<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>ISG compare la comp\u00e9titivit\u00e9 et la force du portefeuille des prestataires de services et des fournisseurs de produits en Allemagne et en Suisse. Forte dynamique dans le segment de la s\u00e9curit\u00e9 administr\u00e9e.<\/p>","protected":false},"author":2368,"featured_media":135703,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,43707],"tags":[19703],"coauthors":[39720],"class_list":["post-135697","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-23-12","tag-isg","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673-600x450.jpg",600,450,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Sicherheit-1_shutterstock_2003662673-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>ISG vergleicht Wettbewerbs- und Portfoliost\u00e4rke von Dienstleistern und Produktanbietern in Deutschland und der Schweiz. Hohe Dynamik im Managed-Security-Segment.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/categorie\/sap-nouvelles\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/categorie\/mag-23-12\/\" rel=\"category tag\">MAG 23-12 \/ 24-01<\/a>","author_info_v2":{"name":"E3 Magazine","url":"https:\/\/e3mag.com\/fr\/author\/e3_magazin\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/135697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/2368"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=135697"}],"version-history":[{"count":4,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/135697\/revisions"}],"predecessor-version":[{"id":135707,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/135697\/revisions\/135707"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/135703"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=135697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=135697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=135697"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=135697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}