{"id":713828,"date":"2023-03-20T16:32:11","date_gmt":"2023-03-20T15:32:11","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=713828"},"modified":"2025-03-04T07:11:16","modified_gmt":"2025-03-04T06:11:16","slug":"quelle-securite-pour-les-environnements-sap","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/","title":{"rendered":"Quelle s\u00e9curit\u00e9 pour les environnements SAP\u00a0?"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Quelle s\u00e9curit\u00e9 pour les environnements SAP\u00a0? <\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Vanessa-Cerdan-rotated.jpg?w=960?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Vanessa Cerdan<\/h5><h5 class=\"blog-date\">20 mars 2023<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">Dans son r\u00f4le d&#8217;ERP (<em>Enterprise Resource Planning<\/em>), SAP est devenu une v\u00e9ritable \u00e9pine dorsale pour les SI de nombreuses entreprises. <\/h2><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;D&#8217;apr\u00e8s IDC, 64% des d\u00e9ploiements ERP ont fait l&#8217;objet d&#8217;une attaque au cours des 24 derniers mois.&#8221; <\/p>\n<\/blockquote>\n\n\n\n<p>On compte aujourd\u2019hui des centaines de milliers de mises en \u0153uvre d\u2019ERP \u00e0 travers le monde, qui prennent en charge les processus m\u00e9tiers les plus critiques des plus grandes organisations. Sans lui, elles ne pourraient ni produire, ni exp\u00e9dier, ni facturer. En cas de corruption ou d\u2019arr\u00eat inopin\u00e9, c\u2019est toute l\u2019activit\u00e9 m\u00e9tier qui est paralys\u00e9e. De part la quantit\u00e9 et la sensibilit\u00e9 des donn\u00e9es h\u00e9berg\u00e9es au sein de l\u2019ERP, ce syst\u00e8me doit \u00eatre consid\u00e9r\u00e9 comme faisant partie des plus critiques de l\u2019entreprise. &nbsp;Or, on constate une hausse constante des attaques sur les ERP. <a href=\"https:\/\/onapsis.com\/press-releases\/independent-market-survey-reveals-64-erp-deployments-have-been-breached-last-24\" target=\"_blank\" rel=\"noreferrer noopener\">En 2020, IDC estimait d\u00e9j\u00e0 que 64% des d\u00e9ploiements ERP avaient fait l&#8217;objet d&#8217;une attaque au cours des deux derni\u00e8res ann\u00e9es et que, sur la m\u00eame p\u00e9riode, deux entreprises sur trois avaient \u00e9t\u00e9 touch\u00e9es. <\/a>Les \u00e9volutions de ces derniers mois nous confirment que la menace est bien r\u00e9elle, y compris sur les progiciels jug\u00e9s robustes.<\/p>\n\n\n\n<p>Les trois principales menaces inh\u00e9rentes aux environnements SAP sont similaires \u00e0 celles que l\u2019on traite sur les environnements IT&nbsp;. En premier lieu, il y a les vuln\u00e9rabilit\u00e9s applicatives, c\u2019est-\u00e0-dire les failles occasionn\u00e9es par des d\u00e9fauts de conception, de configuration ou d\u2019int\u00e9gration avec des outils tiers, une gestion inappropri\u00e9e des droits des utilisateurs, ou encore un d\u00e9ploiement incomplet des patchs de s\u00e9curit\u00e9. On trouve ensuite les vuln\u00e9rabilit\u00e9s provenant du code lui-m\u00eame, en particulier via les d\u00e9veloppements sp\u00e9cifiques, les transports de donn\u00e9es SAP et la gestion des changements. Enfin, la troisi\u00e8me menace est de nature r\u00e9glementaire car tout \u00e9v\u00e9nement ou changement de nature \u00e0 perturber ou modifier le fonctionnement de l\u2019application peut avoir un impact sur le niveau de conformit\u00e9 attendu. <\/p>\n\n\n\n<p>\u00c0 ces trois enjeux de s\u00e9curit\u00e9 propres \u00e0 l\u2019ERP, il faut bien s\u00fbr ajouter les pr\u00e9occupations usuelles concernant la ma\u00eetrise des acc\u00e8s et des droits, la protection des donn\u00e9es, la s\u00e9curisation de l\u2019environnement d\u2019h\u00e9bergement (sur site ou dans le cloud), ainsi que la supervision et la d\u00e9tection des incidents. Pour les organisations qui ex\u00e9cutent des applications ERP dans des environnements cloud (IaaS), il est important de rappeler que la protection de la couche d\u2019application ERP rel\u00e8ve de l\u2019enti\u00e8re responsabilit\u00e9 de l\u2019entreprise.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-une-securite-qui-passe-souvent-au-second-plan\">Une s\u00e9curit\u00e9 qui passe souvent au second plan<\/h2>\n\n\n\n<p>S\u00e9curiser les environnements SAP n\u00e9cessite donc de pouvoir appr\u00e9hender \u00e0 la fois les risques qui leur sont sp\u00e9cifiques et ceux qui rel\u00e8vent du champ usuel de la cybers\u00e9curit\u00e9, tout en prenant en compte les enjeux m\u00e9tiers et le niveau de disponibilit\u00e9 toujours plus \u00e9lev\u00e9. Les ERP sont par nature bien souvent administr\u00e9s par des \u00e9quipes d\u00e9di\u00e9es, \u00e0 dominante m\u00e9tier, qui n\u2019ont pas toujours la culture, les comp\u00e9tences ou les bonnes pratiques li\u00e9es \u00e0 &nbsp;la cybers\u00e9curit\u00e9. Dans le syst\u00e8me d\u2019information, SAP donne parfois l\u2019impression d\u2019\u00eatre un monde \u00e0 part, avec ses propres r\u00e8gles, ses propres \u00e9quipes et sa propre organisation, o\u00f9 les enjeux de fonctionnalit\u00e9s, de stabilit\u00e9 et de disponibilit\u00e9 priment sur la s\u00e9curit\u00e9. Le r\u00e9sultat&nbsp;est que <a href=\"https:\/\/1digitaltrust.com\/media\/Executive_Brief_Cyber_sec_Mar_2020_1DigitalTrust_Onapsis.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">45 % des entreprises n\u2019ont pas de programme de gestion des vuln\u00e9rabilit\u00e9s de leur impl\u00e9mentation de SAP<\/a> et <a href=\"https:\/\/www.turnkeyconsulting.com\/hubfs\/Turnkey &amp; Onapsis - SAP Security Survey Report 2021.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">75 % n\u2019ont pas de visibilit\u00e9s sur les incidents de s\u00e9curit\u00e9 la concernant.<\/a> Les enjeux sont donc forts pour faire \u00e9voluer le niveau de maturit\u00e9 cybers\u00e9curit\u00e9 autour des ERP de fa\u00e7on g\u00e9n\u00e9rale.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">B\u00e2tir une politique de s\u00e9curit\u00e9 globale<\/h2>\n\n\n\n<p>Pour b\u00e2tir une politique de s\u00e9curit\u00e9 globale, il est indispensable de commencer par un \u00e9tat des lieux. On va examiner la politique et les proc\u00e9dures de s\u00e9curit\u00e9 existantes, identifier les vuln\u00e9rabilit\u00e9s applicatives et de code existantes, recenser les patchs de s\u00e9curit\u00e9 manquants, passer en revue la gestion des acc\u00e8s\u2026 Cette photographie va notamment permettre d\u2019identifier les risques les plus importants auxquels est expos\u00e9e l\u2019entreprise afin de d\u00e9terminer les plans de rem\u00e9diation associ\u00e9s. L\u2019enjeu est de pouvoir d\u00e9finir les impacts de chacun de ces risques afin d\u2019\u00e9tablir des plans d\u2019actions r\u00e9alistes et ex\u00e9cutables \u00e0 court terme.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Mettre en place une gestion des vuln\u00e9rabilit\u00e9s<\/h2>\n\n\n\n<p>Sur la base de ce constat, on pourra, dans un second temps, d\u00e9finir et mettre en place une gestion globale des vuln\u00e9rabilit\u00e9s de l\u2019environnement SAP permettant d\u2019en garantir la s\u00e9curit\u00e9 dans la dur\u00e9e. Cette gestion des vuln\u00e9rabilit\u00e9s doit s\u2019int\u00e9grer dans les activit\u00e9s de cybers\u00e9curit\u00e9 existantes afin d\u2019apporter aux \u00e9quipes une vision d\u2019ensemble. Gr\u00e2ce \u00e0 une surveillance en continu de l\u2019application, on pourra d\u00e9tecter et analyser ses vuln\u00e9rabilit\u00e9s potentielles, identifier les risques encourus et prioriser les actions de rem\u00e9diation. Le d\u00e9ploiement des patchs de s\u00e9curit\u00e9 de l\u2019\u00e9diteur doit \u00e9galement \u00eatre int\u00e9gr\u00e9 dans la d\u00e9marche globale de patching afin d\u2019assurer un d\u00e9ploiement adapt\u00e9 au niveau d\u2019exposition. <\/p>\n\n\n\n<p>En parall\u00e8le, la politique de gestion des acc\u00e8s sera revue de mani\u00e8re \u00e0 n\u2019accorder \u00e0 chaque utilisateur que les droits qui lui sont strictement n\u00e9cessaires, sur la base du principe de moindre privil\u00e8ge. Enfin, les d\u00e9veloppements sp\u00e9cifiques feront eux aussi l\u2019objet d\u2019un contr\u00f4le s\u00e9curit\u00e9 accru en int\u00e9grant la dimension s\u00e9curit\u00e9 nativement dans le cycle de d\u00e9veloppement ainsi que des scans de code r\u00e9guliers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Un outillage sp\u00e9cialis\u00e9 en compl\u00e9ment des mesures existantes<\/h2>\n\n\n\n<p>La mise en \u0153uvre d\u2019outils sp\u00e9cifiques doit permettre de compl\u00e9ter les pratiques et programmes de cybers\u00e9curit\u00e9 existant dans l\u2019entreprise. SAP propose lui-m\u00eame un certain nombre d\u2019outils et fonctionnalit\u00e9s (comme SolMan\/Focused Run ou SAP Enterprise Threat Detection), tandis qu\u2019un certain nombre d\u2019\u00e9diteurs, comme Onapsis, Protect4S ou Security Bridge, d\u00e9veloppent des solutions sp\u00e9cialis\u00e9es et certifi\u00e9es par SAP pour augmenter le niveau de protection. De tels outillage sont indispensables car ils permettre de savoir, par exemple, si l\u2019on est concern\u00e9 par le contenu d\u2019un bulletin de s\u00e9curit\u00e9 \u00e9mis par SAP et si l\u2019on est en mesure d\u2019appliquer les actions recommand\u00e9es ou bien encore d\u2019ex\u00e9cuter de l\u2019analyse de vuln\u00e9rabilit\u00e9 du code ABAP.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Une n\u00e9cessaire implication des m\u00e9tiers<\/h2>\n\n\n\n<p>Au-del\u00e0 de la mise en place d\u2019un outil, prendre davantage en compte la s\u00e9curit\u00e9 constitue un changement important pour tous les acteurs de l\u2019environnement SAP d\u2019un point de vue organisationnel, mais aussi culturel. C\u2019est pourquoi il est important d\u2019associer d\u00e8s le d\u00e9part les m\u00e9tiers \u00e0 cette d\u00e9marche dont ils doivent devenir partie prenante. Chacun doit prendre conscience qu\u2019aucun logiciel n\u2019est invuln\u00e9rable, et qu\u2019il faut appliquer les m\u00eames pratiques et la m\u00eame hygi\u00e8ne de cybers\u00e9curit\u00e9 quelle que soit l\u2019application, sa r\u00e9putation ou son environnement\u2026 et \u00e0 plus forte raison quand elle est aussi critique que SAP.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A retenir&nbsp;:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pour b\u00e2tir une politique de s\u00e9curit\u00e9 globale de son ERP, il est indispensable de commencer par \u00e9tablir un \u00e9tat des lieux et d\u2019identifier les risques les plus importants auxquels est expos\u00e9e l\u2019entreprise, ainsi que les actions de rem\u00e9diation prioritaires.<\/li>\n\n\n\n<li>Dans un second temps on pourra d\u00e9finir et mettre en place une gestion globale des vuln\u00e9rabilit\u00e9s de l\u2019environnement SAP et un contr\u00f4le accru des d\u00e9veloppements sp\u00e9cifiques, permettant d\u2019en garantir la s\u00e9curit\u00e9 dans la dur\u00e9e.<\/li>\n\n\n\n<li>Un outillage sp\u00e9cialis\u00e9 est indispensable, de m\u00eame que l\u2019implication des m\u00e9tiers qui doivent \u00eatre partie prenante de la d\u00e9marche de s\u00e9curit\u00e9 dans l\u2019entreprise.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Auteure<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Vanessa-Cerdan-rotated.jpg\" alt=\"Vanessa Cerdan\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/vanessa-cerdan-39669550\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Vanessa Cerdan<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Consultante Avant Vente Cybers\u00e9curit\u00e9, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/vanessa-cerdan-39669550\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Vanessa Cerdan est Consultante Avant Vente Cybers\u00e9curit\u00e9 chez Capgemini depuis 2022. Elle accompagne les clients dans le choix des solutions et services Cybers\u00e9curit\u00e9 pour r\u00e9pondre \u00e0 leur exposition Cyber.\nIssue d\u2019une formation d\u2019Ing\u00e9nieur en Informatique et Gestion, elle a tout d\u2019abord assur\u00e9 des r\u00f4les de Directrice de projets, Transition &#038; Transformation Manager dans le domaine de l\u2019IT avant de se sp\u00e9cialiser en 2017 dans le domaine de la Cybers\u00e9curit\u00e9.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>D&#8217;apr\u00e8s IDC, 64% des d\u00e9ploiements ERP (entreprise ressource planning) ont fait l&#8217;objet d&#8217;une attaque au cours des 24 derniers mois.<\/p>\n","protected":false},"author":251,"featured_media":713841,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"7bccd7cc-1a02-4cf5-8da5-a8c09d150c1b\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"7045ca2a-f577-43ae-bbf9-5fbd74c5a618\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[138],"tags":[192],"brand":[],"service":[47],"industry":[],"partners":[],"blog-topic":[354],"content-group":[],"class_list":["post-713828","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-transformation","tag-cybersecurite","service-cybersecurite","blog-topic-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Quelle s\u00e9curit\u00e9 pour les environnements SAP\u00a0? - Capgemini France<\/title>\n<meta name=\"description\" content=\"D&#039;apr\u00e8s IDC, 64% des d\u00e9ploiements ERP (entreprise ressource planning) ont fait l&#039;objet d&#039;une attaque au cours des 24 derniers mois.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quelle s\u00e9curit\u00e9 pour les environnements SAP\u00a0?\" \/>\n<meta property=\"og:description\" content=\"D&#039;apr\u00e8s IDC, 64% des d\u00e9ploiements ERP (entreprise ressource planning) ont fait l&#039;objet d&#039;une attaque au cours des 24 derniers mois.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-20T15:32:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T06:11:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cyber-X-Secu-SAP-WPjpg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"801\" \/>\n\t<meta property=\"og:image:height\" content=\"418\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Quelle s\u00e9curit\u00e9 pour les environnements SAP\u00a0?\",\"datePublished\":\"2023-03-20T15:32:11+00:00\",\"dateModified\":\"2025-03-04T06:11:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/\"},\"wordCount\":1405,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cyber-X-Secu-SAP-Image.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Transformation\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/\",\"name\":\"Quelle s\u00e9curit\u00e9 pour les environnements SAP\u00a0? - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cyber-X-Secu-SAP-Image.jpg\",\"datePublished\":\"2023-03-20T15:32:11+00:00\",\"dateModified\":\"2025-03-04T06:11:16+00:00\",\"description\":\"D'apr\u00e8s IDC, 64% des d\u00e9ploiements ERP (entreprise ressource planning) ont fait l'objet d'une attaque au cours des 24 derniers mois.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cyber-X-Secu-SAP-Image.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cyber-X-Secu-SAP-Image.jpg\",\"width\":3800,\"height\":2533,\"caption\":\"Little daughter with the father running fast while they flying up colorful kites on the high grass meadow in the mountain fields. Warm family moments or outdoor time spending concept image.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Quelle s\u00e9curit\u00e9 pour les environnements SAP\u00a0? - Capgemini France","description":"D'apr\u00e8s IDC, 64% des d\u00e9ploiements ERP (entreprise ressource planning) ont fait l'objet d'une attaque au cours des 24 derniers mois.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/","og_locale":"fr_FR","og_type":"article","og_title":"Quelle s\u00e9curit\u00e9 pour les environnements SAP\u00a0?","og_description":"D'apr\u00e8s IDC, 64% des d\u00e9ploiements ERP (entreprise ressource planning) ont fait l'objet d'une attaque au cours des 24 derniers mois.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/","og_site_name":"Capgemini France","article_published_time":"2023-03-20T15:32:11+00:00","article_modified_time":"2025-03-04T06:11:16+00:00","og_image":[{"width":801,"height":418,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cyber-X-Secu-SAP-WPjpg.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/"},"author":{"name":"","@id":""},"headline":"Quelle s\u00e9curit\u00e9 pour les environnements SAP\u00a0?","datePublished":"2023-03-20T15:32:11+00:00","dateModified":"2025-03-04T06:11:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/"},"wordCount":1405,"commentCount":0,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cyber-X-Secu-SAP-Image.jpg","keywords":["Cybers\u00e9curit\u00e9"],"articleSection":["Transformation"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/","name":"Quelle s\u00e9curit\u00e9 pour les environnements SAP\u00a0? - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cyber-X-Secu-SAP-Image.jpg","datePublished":"2023-03-20T15:32:11+00:00","dateModified":"2025-03-04T06:11:16+00:00","description":"D'apr\u00e8s IDC, 64% des d\u00e9ploiements ERP (entreprise ressource planning) ont fait l'objet d'une attaque au cours des 24 derniers mois.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cyber-X-Secu-SAP-Image.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cyber-X-Secu-SAP-Image.jpg","width":3800,"height":2533,"caption":"Little daughter with the father running fast while they flying up colorful kites on the high grass meadow in the mountain fields. Warm family moments or outdoor time spending concept image."},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"","url":"https:\/\/www.capgemini.com\/fr-fr\/author\/"}]}},"blog_topic_info":[{"id":354,"name":"Cybers\u00e9curit\u00e9"}],"taxonomy_info":{"category":[{"id":138,"name":"Transformation","slug":"transformation"}],"post_tag":[{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}],"service":[{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"}],"blog-topic":[{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Quelle s\u00e9curit\u00e9 pour les environnements SAP\u00a0?","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cyber-X-Secu-SAP-Image.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cyber-X-Secu-SAP-Image.jpg"},"articleSection":"Transformation","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9"],"dateCreated":"2023-03-20T15:32:11Z","datePublished":"2023-03-20T15:32:11Z","dateModified":"2025-03-04T06:11:16Z"},"rendered":"<meta name=\"parsely-title\" content=\"Quelle s\u00e9curit\u00e9 pour les environnements SAP\u00a0?\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securite-environnements-sap\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cyber-X-Secu-SAP-Image.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2023-03-20T15:32:11Z\" \/>\n<meta name=\"parsely-section\" content=\"Transformation\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cyber-X-Secu-SAP-Image.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cyber-X-Secu-SAP-Image.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":797592,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/exploiter-la-puissance-de-la-gen-ai-tout-en-gardant-le-controle-sur-les-donnees-et-la-propriete-intellectuelle\/","url_meta":{"origin":713828,"position":0},"title":"Exploiter la puissance de la Gen AI tout en gardant le contr\u00f4le sur les donn\u00e9es et la propri\u00e9t\u00e9 intellectuelle\u00a0","author":"audreykone","date":"November 26, 2025","format":false,"excerpt":"Le d\u00e9bat sur l\u2019IA \u00e9volue : la question n\u2019est plus \u00ab que peut faire l\u2019IA ? \u00bb mais \u00ab que sommes-nous pr\u00eats \u00e0 lui confier ? \u00bb. Chez Capgemini, nous aidons les organisations \u00e0 b\u00e9n\u00e9ficier d\u2019une IA performante tout en prot\u00e9geant leurs donn\u00e9es, leurs syst\u00e8mes et leur propri\u00e9t\u00e9 intellectuelle. D\u00e9couvrez\u2026","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/11\/GettyImages-521419798.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/11\/GettyImages-521419798.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/11\/GettyImages-521419798.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/11\/GettyImages-521419798.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":797505,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/liberer-la-valeur-des-agents-sap-ai-pour-ameliorer-les-operations-metiers\/","url_meta":{"origin":713828,"position":1},"title":"Lib\u00e9rer la valeur des agents SAP AI pour am\u00e9liorer les op\u00e9rations m\u00e9tiers\u00a0","author":"audreykone","date":"November 25, 2025","format":false,"excerpt":"L\u2019IA devient concr\u00e8te lorsqu\u2019elle simplifie les op\u00e9rations m\u00e9tiers. Avec Capgemini et SAP, les agents IA Joule int\u00e9gr\u00e9s \u00e0 SAP ERP Cloud transforment les processus, offrent transparence et s\u00e9curit\u00e9, et renforcent la confiance. No-code et faciles \u00e0 d\u00e9ployer, ils permettent aux \u00e9quipes de se concentrer sur l\u2019essentiel. D\u00e9couvrez comment l\u2019IA peut\u2026","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/11\/Adopt-AI-banner.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/11\/Adopt-AI-banner.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/11\/Adopt-AI-banner.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/11\/Adopt-AI-banner.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":800316,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/ia-generative-dans-les-transformations-de-rise-with-sap\/","url_meta":{"origin":713828,"position":2},"title":"Un catalyseur de changement : l&#8217;IA g\u00e9n\u00e9rative dans les transformations\u00a0de\u00a0RISE\u00a0with\u00a0SAP","author":"audreykone","date":"January 12, 2026","format":false,"excerpt":"L\u2019intelligence artificielle (IA) et l\u2019IA g\u00e9n\u00e9rative (Gen\u00a0AI) jouent toutes deux un r\u00f4le cl\u00e9 dans les transformations\u00a0de\u00a0RISE\u00a0with\u00a0SAP.\u00a0Mais l\u2019IA g\u00e9n\u00e9rative va plus loin : elle apporte des capacit\u00e9s sp\u00e9cifiques qui enrichissent le d\u00e9ploiement de RISE\u00a0with\u00a0SAP et permettent d\u2019en exploiter tout le potentiel.\u00a0","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/GettyImages-2244832366.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/GettyImages-2244832366.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/GettyImages-2244832366.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/GettyImages-2244832366.jpeg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":800419,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/ia-sap-et-entreprise-et-si-l-avenir-ressemblait-surtout-a-une-evidence\/","url_meta":{"origin":713828,"position":3},"title":"L\u2019IA, SAP et l\u2019entreprise : et si l\u2019avenir ressemblait surtout \u00e0 une \u00e9vidence ?\u00a0","author":"audreykone","date":"January 12, 2026","format":false,"excerpt":"\u00ab De SAP aux IA g\u00e9n\u00e9ratives, l\u2019informatique a suivi la m\u00eame \u00e9volution que nos smartphones : hier, on s\u2019adaptait \u00e0 la machine. Aujourd\u2019hui, c\u2019est elle qui s\u2019adapte \u00e0 nous. \u00bb Amine Loukil, expert SAP et IA chez Capgemini, t\u00e9moigne de 20 ans de transformation continue des interfaces homme\u2013machine.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/GettyImages-1251534885.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/GettyImages-1251534885.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/GettyImages-1251534885.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/GettyImages-1251534885.jpeg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":761324,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/processus-metiers-la-genai-au-service-de-la-creation-de-valeur\/","url_meta":{"origin":713828,"position":4},"title":"Processus m\u00e9tiers\u00a0: la Gen AI au service de la cr\u00e9ation de valeur","author":"Tarek Edde Gomez","date":"September 23, 2024","format":false,"excerpt":"Avec la GenAI, tous les processus des entreprises peuvent gagner en performance et en fluidit\u00e9. R\u00e9sultat\u00a0: cette technologie devient un levier incontournable, y compris lorsqu\u2019elle est int\u00e9gr\u00e9e aux ERP.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":715255,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-donnees-dans-environnement-cloud\/","url_meta":{"origin":713828,"position":5},"title":"S\u00e9curiser les donn\u00e9es dans un environnement cloud\u00a0","author":"","date":"April 4, 2023","format":false,"excerpt":"\u00c0 l\u2019\u00e8re du cloud, la data est partout, circulant entre les syst\u00e8mes, se d\u00e9ployant sur d\u2019innombrables terminaux. Elle doit \u00eatre disponible \u00e0 tout moment pour quiconque en a besoin.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-167167826.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-167167826.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-167167826.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-167167826.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cyber-X-Secu-SAP-Image.jpg","author_title":"Vanessa Cerdan","author_thumbnail_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Vanessa-Cerdan-rotated.jpg?w=960","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/713828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/251"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=713828"}],"version-history":[{"count":12,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/713828\/revisions"}],"predecessor-version":[{"id":776653,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/713828\/revisions\/776653"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/713841"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=713828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=713828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=713828"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=713828"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=713828"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=713828"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=713828"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=713828"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=713828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}