{"id":27374,"date":"2025-10-13T10:00:00","date_gmt":"2025-10-13T08:00:00","guid":{"rendered":"https:\/\/www.jalios.com\/fr\/?p=27374"},"modified":"2025-11-10T11:49:39","modified_gmt":"2025-11-10T10:49:39","slug":"directive-nis2-digital-workplace","status":"publish","type":"post","link":"https:\/\/www.jalios.com\/fr\/blog\/directive-nis2-digital-workplace\/","title":{"rendered":"Directive NIS2 et Digital Workplace: renforcer la r\u00e9silience num\u00e9rique des organisations"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27374\" class=\"elementor elementor-27374\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a0452dc e-flex e-con-boxed e-con e-parent\" data-id=\"a0452dc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33b0109 elementor-widget elementor-widget-text-editor\" data-id=\"33b0109\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La directive NIS2 marque une nouvelle \u00e9tape majeure dans la<strong><a href=\"https:\/\/www.jalios.com\/fr\/a-propos\/securite\/\"> cybers\u00e9curit\u00e9 europ\u00e9enne<\/a><\/strong>. Con\u00e7ue pour renforcer la r\u00e9silience des infrastructures num\u00e9riques face \u00e0 la mont\u00e9e des cybermenaces, elle impose \u00e0 des milliers d\u2019organisations de nouvelles exigences en mati\u00e8re de s\u00e9curit\u00e9, de gouvernance et de gestion des risques.<br \/>Dans ce contexte, Jalios, <strong><a href=\"https:\/\/www.jalios.com\/fr\/produits\/workplace\/\">\u00e9diteur fran\u00e7ais de solution de Digital Workplace<\/a><\/strong>, s\u2019affirme comme un acteur cl\u00e9 pour accompagner les entreprises et les administrations vers la<strong> <a href=\"https:\/\/cyber.gouv.fr\/la-directive-nis-2\" target=\"_blank\" rel=\"noopener\">conformit\u00e9 NIS2<\/a><\/strong> gr\u00e2ce \u00e0 ses fonctionnalit\u00e9s de s\u00e9curit\u00e9 avanc\u00e9es et \u00e0 son \u00e9cosyst\u00e8me souverain.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba78f9b elementor-widget elementor-widget-heading\" data-id=\"ba78f9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Comprendre la directive NIS2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d85a987 elementor-widget elementor-widget-text-editor\" data-id=\"d85a987\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Adopt\u00e9e par l\u2019Union europ\u00e9enne, la <strong><a href=\"https:\/\/www.jalios.com\/fr\/blog\/nis2-conformite\/\">directive NIS2 vise \u00e0 harmoniser et \u00e0 renforcer les pratiques de cybers\u00e9curit\u00e9<\/a><\/strong> des acteurs publics et priv\u00e9s op\u00e9rant dans des secteurs jug\u00e9s critiques : \u00e9nergie, sant\u00e9, transport, num\u00e9rique, ou encore services publics.<br \/>En France, pr\u00e8s de 15 000 entit\u00e9s sont concern\u00e9es. Celles-ci devront mettre en place des mesures organisationnelles et techniques pour prot\u00e9ger leurs syst\u00e8mes d\u2019information, d\u00e9tecter les incidents de s\u00e9curit\u00e9 et assurer la continuit\u00e9 de leurs activit\u00e9s.<\/p><p>La conformit\u00e9 \u00e0 NIS2 ne se limite donc pas \u00e0 une obligation r\u00e9glementaire : elle devient un levier strat\u00e9gique pour garantir la confiance num\u00e9rique et la souverainet\u00e9 des donn\u00e9es.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17bf089 elementor-widget elementor-widget-heading\" data-id=\"17bf089\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jalios au service de la conformit\u00e9 NIS2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f2993e elementor-widget elementor-widget-text-editor\" data-id=\"0f2993e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Face \u00e0 ces nouveaux d\u00e9fis, Jalios int\u00e8gre dans sa plateforme un ensemble complet de dispositifs de s\u00e9curit\u00e9 permettant aux organisations de r\u00e9pondre aux exigences de NIS2.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00feefd elementor-widget elementor-widget-heading\" data-id=\"00feefd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Authentification et gestion des acc\u00e8s renforc\u00e9es<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd13cb4 elementor-widget elementor-widget-text-editor\" data-id=\"dd13cb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Jalios propose une authentification \u00e0 deux facteurs (2FA) et une gestion centralis\u00e9e des utilisateurs, facilitant la mise en \u0153uvre de politiques d\u2019acc\u00e8s strictes. La robustesse des mots de passe et la tra\u00e7abilit\u00e9 des connexions sont \u00e9galement garanties, <strong>r\u00e9pondant aux crit\u00e8res d\u2019identification et de contr\u00f4le d\u2019acc\u00e8s impos\u00e9s par NIS2.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02dfa54 elementor-widget elementor-widget-heading\" data-id=\"02dfa54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">S\u00e9curit\u00e9 du syst\u00e8me d\u2019information<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8499428 elementor-widget elementor-widget-text-editor\" data-id=\"8499428\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les donn\u00e9es et contenus sont classifi\u00e9s et prot\u00e9g\u00e9s selon des politiques de s\u00e9curit\u00e9 fines. Jalios applique les standards les plus \u00e9lev\u00e9s, avec une certification <a href=\"https:\/\/cyber.gouv.fr\/produits-certifies\/jplatform-10-version-sp4-1004-patch-20201210\" target=\"_blank\" rel=\"noopener\"><strong>CSPN d\u00e9livr\u00e9e par l\u2019ANSSI<\/strong><\/a>, gage de confiance et de conformit\u00e9 aux normes fran\u00e7aises et europ\u00e9ennes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-934b9f8 elementor-widget elementor-widget-heading\" data-id=\"934b9f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Continuit\u00e9 d\u2019activit\u00e9 et r\u00e9silience<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-daea5f9 elementor-widget elementor-widget-text-editor\" data-id=\"daea5f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En cas d\u2019incident, Jalios assure une haute disponibilit\u00e9 gr\u00e2ce \u00e0 la r\u00e9plication, aux sauvegardes r\u00e9guli\u00e8res et \u00e0 un <strong>Plan de Reprise d\u2019Activit\u00e9<\/strong> (PRA) \u00e9prouv\u00e9. Ces m\u00e9canismes garantissent la continuit\u00e9 des services essentiels face \u00e0 des attaques telles que les ransomwares.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e849b56 e-con-full e-flex e-con e-child\" data-id=\"e849b56\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcc998f elementor-widget elementor-widget-heading\" data-id=\"dcc998f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Chez Jalios, la s\u00e9curit\u00e9 n'est pas une option.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d86da1d elementor-widget elementor-widget-text-editor\" data-id=\"d86da1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Jalios est la premi\u00e8re plateforme collaborative fran\u00e7aise<img decoding=\"async\" class=\"\" src=\"https:\/\/www.jalios.com\/fr\/wp-content\/uploads\/2024\/11\/1f1eb-1f1f7.png\" alt=\"france\" width=\"20\" height=\"20\" \/> \u00e0 avoir obtenu la<strong> certification CSPN<\/strong> en 2021.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-984ca13 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"984ca13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.jalios.com\/fr\/a-propos\/securite\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">En savoir plus<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1cacdd7 elementor-widget elementor-widget-heading\" data-id=\"1cacdd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Une approche globale de la cybers\u00e9curit\u00e9 et de la cha\u00eene d\u2019approvisionnement<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1063370 elementor-widget elementor-widget-text-editor\" data-id=\"1063370\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La directive NIS2 accorde une attention particuli\u00e8re \u00e0 la s\u00e9curit\u00e9 de la cha\u00eene d\u2019approvisionnement num\u00e9rique. Jalios renforce ainsi la protection de ses solutions tels que l&rsquo;Extranet pour garantir une <strong><a href=\"https:\/\/www.jalios.com\/fr\/blog\/collaboration-ia-gestion-projet\/\">collaboration<\/a> <\/strong>s\u00e9curis\u00e9e entre partenaires, fournisseurs et prestataires.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8bf908 elementor-widget elementor-widget-heading\" data-id=\"c8bf908\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Des int\u00e9grations avec les leaders de la cybers\u00e9curit\u00e9<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfdfa6e elementor-widget elementor-widget-text-editor\" data-id=\"cfdfa6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pour offrir une d\u00e9fense en profondeur, Jalios s\u2019int\u00e8gre \u00e0 des solutions tierces de cybers\u00e9curit\u00e9 reconnues comme FairTrust.<br \/>Ces int\u00e9grations permettent de <strong>renforcer la protection des identit\u00e9s num\u00e9riques<\/strong>, la gestion des certificats, le chiffrement des communications et la supervision des menaces.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f84646e elementor-widget elementor-widget-heading\" data-id=\"f84646e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cybers\u00e9curit\u00e9 des communications et protection des donn\u00e9es<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bfe685d elementor-widget elementor-widget-text-editor\" data-id=\"bfe685d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les <a href=\"https:\/\/www.jalios.com\/fr\/blog\/plateforme-collaborative-en-2026\/\"><strong>outils collaboratifs<\/strong><\/a> int\u00e9gr\u00e9s \u00e0 Jalios assurent des communications vid\u00e9o et messageries s\u00e9curis\u00e9es.<br \/>Les donn\u00e9es en transit sont chiffr\u00e9es conform\u00e9ment aux normes ANSSI, garantissant leur int\u00e9grit\u00e9 et leur confidentialit\u00e9.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36a14e3 elementor-widget elementor-widget-heading\" data-id=\"36a14e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">L\u2019humain au c\u0153ur de la strat\u00e9gie<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c070ed6 elementor-widget elementor-widget-text-editor\" data-id=\"c070ed6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Parce que la s\u00e9curit\u00e9 repose aussi sur la vigilance des utilisateurs, Jalios met \u00e0 disposition JLearn, un module de <a href=\"https:\/\/www.jalios.com\/fr\/solutions\/metiers\/formations\/\"><strong>formation<\/strong> <\/a>et de sensibilisation \u00e0 la cyber hygi\u00e8ne.<br \/>Cet outil adaptatif aide les collaborateurs \u00e0 adopter les bons r\u00e9flexes face aux risques cyber et \u00e0 contribuer activement \u00e0 la s\u00e9curit\u00e9 globale de leur organisation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c428a0 elementor-widget elementor-widget-heading\" data-id=\"5c428a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Un acteur souverain engag\u00e9 dans l\u2019\u00e9cosyst\u00e8me cyber fran\u00e7ais et europ\u00e9en<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1191831 elementor-widget elementor-widget-text-editor\" data-id=\"1191831\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Membre d\u2019Hexatrust, Jalios participe activement \u00e0 la construction d\u2019un \u00e9cosyst\u00e8me cyber souverain. La certification CSPN ANSSI de Jalios t\u00e9moigne de son engagement \u00e0 <strong>prot\u00e9ger les donn\u00e9es sensibles fran\u00e7aises et europ\u00e9ennes<\/strong> tout en <strong>soutenant une <a href=\"https:\/\/www.jalios.com\/fr\/blog\/souverainete-numerique\/\">strat\u00e9gie de cybers\u00e9curit\u00e9 nationale<\/a>.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-54cd880 e-con-full e-flex e-con e-child\" data-id=\"54cd880\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-82e5f43 elementor-widget elementor-widget-heading\" data-id=\"82e5f43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Brochure Hexatrust : souverainet\u00e9 &amp; cybers\u00e9curit\u00e9<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9dacda9 elementor-widget elementor-widget-text-editor\" data-id=\"9dacda9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pour mieux comprendre <strong>comment vous \u00e9quiper face aux exigences de NIS2<\/strong>, nous vous recommandons le <strong>guide publi\u00e9 par Hexatrust<\/strong> (collectif de r\u00e9f\u00e9rence des acteurs cybers\u00e9curit\u00e9 fran\u00e7ais);<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5637029 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"5637029\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/infos.jalios.com\/brochure-hexatrust\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewBox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">T\u00e9l\u00e9charger la brochure<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-122392c elementor-widget elementor-widget-heading\" data-id=\"122392c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jalios, un partenaire de confiance pour anticiper NIS2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b74d76 elementor-widget elementor-widget-text-editor\" data-id=\"0b74d76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00c0 l\u2019heure o\u00f9 la directive NIS2 red\u00e9finit les standards de s\u00e9curit\u00e9 num\u00e9rique, Jalios se positionne comme un <strong>alli\u00e9 strat\u00e9gique<\/strong> pour toutes les organisations souhaitant se conformer aux nouvelles exigences tout en renfor\u00e7ant leur r\u00e9silience cyber.<br \/>Gr\u00e2ce \u00e0 ses <strong>fonctions de s\u00e9curit\u00e9 int\u00e9gr\u00e9es<\/strong>, ses <strong>partenariats technologiques<\/strong> et son <strong>ancrage souverain<\/strong>, Jalios permet aux entreprises de faire de la s\u00e9curit\u00e9 un moteur de <strong>confiance<\/strong>, de <strong>conformit\u00e9<\/strong> et de <strong>performance durable.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c85d951 elementor-widget elementor-widget-heading\" data-id=\"c85d951\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQ \u2013 Les questions fr\u00e9quentes autour de NIS2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bad641 elementor-widget elementor-widget-n-accordion\" data-id=\"4bad641\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7930\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-7930\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><p class=\"e-n-accordion-item-title-text\"> Qu'est-ce que la directive NIS2 et quand sera-t-elle applicable? <\/p><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-down\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7930\" class=\"elementor-element elementor-element-990d312 e-con-full e-flex e-con e-child\" data-id=\"990d312\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9a62149 elementor-widget elementor-widget-text-editor\" data-id=\"9a62149\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La directive NIS2 est une norme europ\u00e9enne de cybers\u00e9curit\u00e9 visant \u00e0 <strong>renforcer la r\u00e9silience des infrastructures num\u00e9riques<\/strong>. Elle s&rsquo;appliquera aux entit\u00e9s op\u00e9rant dans le domaine num\u00e9rique en Europe \u00e0 partir d&rsquo;<strong>octobre 2024<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7931\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7931\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><p class=\"e-n-accordion-item-title-text\"> Quelle est l'implication de la directive NIS2 pour les entit\u00e9s en France? <\/p><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-down\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7931\" class=\"elementor-element elementor-element-c0cf438 e-con-full e-flex e-con e-child\" data-id=\"c0cf438\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eab8016 elementor-widget elementor-widget-text-editor\" data-id=\"eab8016\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Environ 15 000 entit\u00e9s en France devront mettre en place des mesures de s\u00e9curit\u00e9 ad\u00e9quates pour <strong>prot\u00e9ger leurs syst\u00e8mes<\/strong> <strong>et leurs donn\u00e9es<\/strong> contre les cybermenaces conform\u00e9ment \u00e0 la directive NIS2.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7932\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7932\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><p class=\"e-n-accordion-item-title-text\"> Quelles fonctionnalit\u00e9s de s\u00e9curit\u00e9 offre la solution Jalios pour se conformer \u00e0 NIS2? <\/p><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-down\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7932\" class=\"elementor-element elementor-element-5e61f2e e-con-full e-flex e-con e-child\" data-id=\"5e61f2e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0588f56 elementor-widget elementor-widget-text-editor\" data-id=\"0588f56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Jalios propose de nombreuses fonctionnalit\u00e9s de <strong>s\u00e9curit\u00e9<\/strong> incluant l&rsquo;int\u00e9gration de l&rsquo;authentification \u00e0 deux facteurs, la gestion centralis\u00e9e des utilisateurs, des politiques de robustesse des mots de passe, et l&rsquo;int\u00e9gration avec des solutions tierces de <strong>cybers\u00e9curit\u00e9<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7933\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7933\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><p class=\"e-n-accordion-item-title-text\"> Quel est le r\u00f4le de Jalios dans l'\u00e9cosyst\u00e8me cyber national et europ\u00e9en? <\/p><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-down\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7933\" class=\"elementor-element elementor-element-cb8c0cc e-flex e-con-boxed e-con e-child\" data-id=\"cb8c0cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15287a7 elementor-widget elementor-widget-text-editor\" data-id=\"15287a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Jalios joue un r\u00f4le central dans l&rsquo;\u00e9cosyst\u00e8me cyber avec sa<strong> certification ANSSI CSPN<\/strong> et est membre d&rsquo;<strong>Hexatrust<\/strong>, contribuant ainsi \u00e0 prot\u00e9ger les donn\u00e9es sensibles de fa\u00e7on souveraine.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-37a4f566 e-con-full e-flex e-con e-child\" data-id=\"37a4f566\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6cd67c0a elementor-widget elementor-widget-heading\" data-id=\"6cd67c0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">D\u00e9couvrez Jalios Workplace<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29be87ad elementor-widget elementor-widget-text-editor\" data-id=\"29be87ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ed18a25 elementor-widget elementor-widget-text-editor\" data-id=\"ed18a25\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Pour offrir la\u00a0<strong>meilleure exp\u00e9rience collaborateur<\/strong>\u00a0: coh\u00e9rente, utile et personnalis\u00e9e. Disponible en compl\u00e9ment de Microsoft 365 ou en version\u00a0<strong>souveraine<\/strong>\u00a0et m\u00eame en r\u00e9gion\u00a0<strong>SecNumCloud<\/strong>.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-549fe198 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"549fe198\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/eu1.hubs.ly\/H0cD2SB0\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">R\u00e9server une d\u00e9mo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>La directive NIS2 marque une nouvelle \u00e9tape majeure dans la cybers\u00e9curit\u00e9 europ\u00e9enne. Con\u00e7ue pour renforcer la r\u00e9silience des infrastructures num\u00e9riques face \u00e0 la mont\u00e9e des cybermenaces, elle impose \u00e0 des milliers d\u2019organisations de nouvelles exigences en mati\u00e8re de s\u00e9curit\u00e9, de gouvernance et de gestion des risques.Dans ce contexte, Jalios, \u00e9diteur fran\u00e7ais de solution de Digital [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":27375,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[51,86],"tags":[79],"class_list":["post-27374","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-articles","tag-securite"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/posts\/27374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/comments?post=27374"}],"version-history":[{"count":32,"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/posts\/27374\/revisions"}],"predecessor-version":[{"id":28138,"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/posts\/27374\/revisions\/28138"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/media\/27375"}],"wp:attachment":[{"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/media?parent=27374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/categories?post=27374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/tags?post=27374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}