{"id":153845,"date":"2025-08-26T07:00:00","date_gmt":"2025-08-26T05:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=153845"},"modified":"2025-09-01T12:21:46","modified_gmt":"2025-09-01T10:21:46","slug":"seul-celui-qui-automatise-profite","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/seul-celui-qui-automatise-profite\/","title":{"rendered":"Seuls ceux qui automatisent en profitent"},"content":{"rendered":"<p>Selon l'Office f\u00e9d\u00e9ral de la police criminelle, la cybercriminalit\u00e9 a caus\u00e9 un pr\u00e9judice \u00e9conomique total de 178,6 milliards d'euros en Allemagne en 2024. Les grandes entreprises sont particuli\u00e8rement vuln\u00e9rables. La complexit\u00e9 des syst\u00e8mes SAP, les versions obsol\u00e8tes, les concepts h\u00e9t\u00e9rog\u00e8nes de r\u00f4les et de droits ainsi que l'int\u00e9gration dans le cloud offrent aux pirates de nombreuses surfaces d'attaque. L'augmentation des attaques sp\u00e9cialis\u00e9es, dans lesquelles les cybercriminels se concentrent de mani\u00e8re cibl\u00e9e sur les structures SAP, est inqui\u00e9tante. Face \u00e0 ces d\u00e9fis, la gestion de la conformit\u00e9 prend de plus en plus d'importance. Il ne s'agit toutefois pas seulement de respecter les dispositions l\u00e9gales, mais bien plus d'emp\u00eacher les fraudes et les abus, de garantir la s\u00e9curit\u00e9 des audits et de repousser les menaces.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Des solutions modernes<\/h2>\n\n\n\n\n\n\n\n<p>Tout cela n'est possible qu'avec un syst\u00e8me qui centralise les identit\u00e9s (utilisateurs), les autorisations et la conformit\u00e9 \u00e0 certaines r\u00e9glementations. La suite de gestion de la conformit\u00e9 de Pointsharp est con\u00e7ue pour enregistrer et analyser automatiquement les points faibles, les risques et les violations de la conformit\u00e9 dans l'environnement SAP, et pour prendre des mesures de mani\u00e8re automatis\u00e9e. Supposons qu'un collaborateur soit autoris\u00e9 \u00e0 d\u00e9clencher des commandes et \u00e0 pr\u00e9parer des paiements. Le probl\u00e8me ici est que le collaborateur pourrait cr\u00e9er une commande pour un fournisseur fictif qui se situe d\u00e9lib\u00e9r\u00e9ment en dessous du seuil de validation. La commande serait automatiquement valid\u00e9e et le paiement correspondant pr\u00e9par\u00e9. L'entreprise pourrait ainsi perdre peu \u00e0 peu beaucoup d'argent. Le logiciel reconna\u00eet de telles combinaisons d'autorisation risqu\u00e9es et active par exemple le principe des quatre yeux ou bloque la transaction. Un tel syst\u00e8me automatis\u00e9 de surveillance et d'alerte pr\u00e9coce aide les entreprises \u00e0 exploiter leurs syst\u00e8mes SAP de mani\u00e8re s\u00fbre et conforme aux r\u00e8gles.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conseils pour la mise en \u0153uvre<\/h2>\n\n\n\n\n\n\n\n<p>Pour une mise en \u0153uvre r\u00e9ussie d'un syst\u00e8me de gestion de la conformit\u00e9, Pointsharp accompagne les entreprises \u00e9tape par \u00e9tape : tout commence par une analyse approfondie des concepts d'autorisation existants, qui identifie les combinaisons critiques et met syst\u00e9matiquement en \u00e9vidence les points faibles actuels. Ensuite, il s'agit d'introduire un syst\u00e8me de surveillance continu avec des m\u00e9canismes d'alerte automatiques et de mettre en place une documentation de tous les processus qui soit conforme aux exigences de la r\u00e9vision. Il est \u00e9galement indispensable de sensibiliser et de former les utilisateurs aux directives de conformit\u00e9 et de mettre en place une communication interne transparente. Un contr\u00f4le permanent par des audits r\u00e9guliers des param\u00e8tres du syst\u00e8me, des adaptations en temps r\u00e9el aux nouvelles exigences ainsi que l'\u00e9valuation continue des mesures mises en \u0153uvre garantissent un niveau de s\u00e9curit\u00e9 \u00e9lev\u00e9 \u00e0 long terme.<\/p>\n\n\n\n<p>Dans ce contexte, les d\u00e9penses li\u00e9es \u00e0 la gestion pr\u00e9ventive de la conformit\u00e9 sont nettement inf\u00e9rieures aux dommages financiers qui peuvent \u00eatre caus\u00e9s par la cybercriminalit\u00e9. Mais la s\u00e9curit\u00e9 doit \u00eatre simple \u00e0 mettre en \u0153uvre pour \u00eatre efficace. Les solutions de conformit\u00e9 modernes comme celles de Pointsharp offrent ici la protection n\u00e9cessaire sans compliquer les processus de travail. Les entreprises qui prennent les devants cr\u00e9ent les bases d'une transformation num\u00e9rique s\u00e9curis\u00e9e de leur environnement SAP.<\/p>\n\n\n\n<p>Inscription en ligne des partenaires :<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/e3mag.com\/fr\/partenaires\/pointsharp-gmbh\/\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"244\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2025\/01\/horizontal-logo-blue-pointsharp-1200x244.jpg\" alt=\"\" class=\"wp-image-148608\" style=\"width:502px;height:auto\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2025\/01\/horizontal-logo-blue-pointsharp-1200x244.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2025\/01\/horizontal-logo-blue-pointsharp-400x81.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2025\/01\/horizontal-logo-blue-pointsharp-768x156.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2025\/01\/horizontal-logo-blue-pointsharp-100x20.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2025\/01\/horizontal-logo-blue-pointsharp-480x98.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2025\/01\/horizontal-logo-blue-pointsharp-640x130.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2025\/01\/horizontal-logo-blue-pointsharp-720x147.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2025\/01\/horizontal-logo-blue-pointsharp-960x195.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2025\/01\/horizontal-logo-blue-pointsharp-1168x238.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2025\/01\/horizontal-logo-blue-pointsharp-1440x293.jpg 1440w, https:\/\/e3mag.com\/wp-content\/uploads\/2025\/01\/horizontal-logo-blue-pointsharp-scaled.jpg 1920w, https:\/\/e3mag.com\/wp-content\/uploads\/2025\/01\/horizontal-logo-blue-pointsharp-1536x313.jpg 1536w, https:\/\/e3mag.com\/wp-content\/uploads\/2025\/01\/horizontal-logo-blue-pointsharp-2048x417.jpg 2048w, https:\/\/e3mag.com\/wp-content\/uploads\/2025\/01\/horizontal-logo-blue-pointsharp-18x4.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2025\/01\/horizontal-logo-blue-pointsharp-600x122.jpg 600w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/a><\/figure>","protected":false},"excerpt":{"rendered":"<p>La num\u00e9risation pose de nouveaux d\u00e9fis aux entreprises, notamment en mati\u00e8re de s\u00e9curit\u00e9 informatique. Les syst\u00e8mes SAP sont de plus en plus dans la ligne de mire des criminels.<\/p>","protected":false},"author":2126,"featured_media":155072,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[5,44248],"tags":[117],"coauthors":[37982],"class_list":["post-153845","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-management","category-manager-magazin-2025","tag-sicherheit","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1-600x450.jpg",600,450,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2025\/08\/2508_pointsharp-1-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Die Digitalisierung stellt Unternehmen vor neue Herausforderungen \u2013 besonders bei der IT-Sicherheit. SAP-Systeme r\u00fccken verst\u00e4rkt in den Fokus der Kriminellen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/categorie\/gestion-de-linformatique\/\" rel=\"category tag\">IT-Management<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/categorie\/editions-2\/manager-magazin-2025\/\" rel=\"category tag\">Manager Magazin 2025<\/a>","author_info_v2":{"name":"Philipp Latini, Pointsharp","url":"https:\/\/e3mag.com\/fr\/author\/philipp-latini\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/153845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/2126"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=153845"}],"version-history":[{"count":6,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/153845\/revisions"}],"predecessor-version":[{"id":155106,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/153845\/revisions\/155106"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/155072"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=153845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=153845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=153845"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=153845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}