[{"data":1,"prerenderedAt":1598},["ShallowReactive",2],{"fetchBlogArticle-securite-lms-fonctionnalites":3},{"headMetaInfo":4,"article":37,"metaForSocialNetwork":128,"slices":129,"tags":1585},{"htmlAttrs":5,"link":7,"meta":15,"title":28},{"lang":6},"fr-fr",[8,11,13],{"rel":9,"href":10},"canonical","https://360learning.com/fr/blog/securite-lms-fonctionnalites/",{"rel":12,"href":10,"hrefLang":6},"alternate",{"rel":12,"href":10,"hrefLang":14},"x-default",[16,18,21,23,26,29,32,34],{"property":17,"content":10},"og:url",{"property":19,"content":20},"og:locale","fr_FR",{"data-document-id":22},"fr-fr/aafrwxAAACAA-gy1",{"property":24,"content":25},"og:type","article",{"property":27,"content":28},"og:title","Sécurité des LMS : 7 critères pour faire le bon choix",{"property":30,"content":31},"og:description","La sécurité des LMS est un enjeu majeur pour votre DSI. Découvrez les 7 fonctionnalités incontournables pour protéger vos données de formation.",{"name":33,"content":31},"description",{"property":35,"content":36},"og:image","https://images.unsplash.com/photo-1614064641938-3bbee52942c7?crop=entropy&cs=srgb&fm=jpg&ixid=M3wzMzc0NjN8MHwxfHNlYXJjaHwyfHxzZWN1cml0eXxlbnwwfHx8fDE3NzI2MTI3NjR8MA&ixlib=rb-4.1.0&q=85&rect=0,590,7952,4123&w=1080&h=560",{"uid":38,"firstPublicationDate":39,"lastPublicationDate":39,"type":40,"title":41,"thumbnail":42,"author":78,"category":117},"securite-lms-fonctionnalites","2026-03-06T15:42:04+0000","Article","Sécurité des LMS : 7 fonctionnalités à regarder en priorité quand on est responsable formation en entreprise",{"dimensions":43,"alt":46,"copyright":47,"url":36,"id":48,"edit":49,"tile":54,"featured":61,"header":68,"details":71},{"width":44,"height":45},1080,560,"red padlock on black computer keyboard",null,"mT7lXZPjk7U",{"x":50,"y":51,"zoom":52,"background":53},0,590,1,"transparent",{"dimensions":55,"alt":46,"copyright":47,"url":58,"id":48,"edit":59},{"width":56,"height":57},375,418,"https://images.unsplash.com/photo-1614064641938-3bbee52942c7?crop=entropy&cs=srgb&fm=jpg&ixid=M3wzMzc0NjN8MHwxfHNlYXJjaHwyfHxzZWN1cml0eXxlbnwwfHx8fDE3NzI2MTI3NjR8MA&ixlib=rb-4.1.0&q=85&rect=1597,0,4758,5304&w=375&h=418",{"x":60,"y":50,"zoom":52,"background":53},1597,{"dimensions":62,"alt":46,"copyright":47,"url":65,"id":48,"edit":66},{"width":63,"height":64},500,570,"https://images.unsplash.com/photo-1614064641938-3bbee52942c7?crop=entropy&cs=srgb&fm=jpg&ixid=M3wzMzc0NjN8MHwxfHNlYXJjaHwyfHxzZWN1cml0eXxlbnwwfHx8fDE3NzI2MTI3NjR8MA&ixlib=rb-4.1.0&q=85&rect=1650,0,4653,5304&w=500&h=570",{"x":67,"y":50,"zoom":52,"background":53},1650,{"dimensions":69,"alt":46,"copyright":47,"url":36,"id":48,"edit":70},{"width":44,"height":45},{"x":50,"y":51,"zoom":52,"background":53},{"dimensions":72,"alt":46,"copyright":47,"url":75,"id":48,"edit":76},{"width":73,"height":74},150,80,"https://images.unsplash.com/photo-1614064641938-3bbee52942c7?crop=entropy&cs=srgb&fm=jpg&ixid=M3wzMzc0NjN8MHwxfHNlYXJjaHwyfHxzZWN1cml0eXxlbnwwfHx8fDE3NzI2MTI3NjR8MA&ixlib=rb-4.1.0&q=85&rect=0,531,7952,4241&w=150&h=80",{"x":50,"y":77,"zoom":52,"background":53},531,{"name":79,"job":80,"portrait":81,"id":107,"type":108,"tags":109,"lang":6,"slug":110,"first_publication_date":111,"last_publication_date":112,"uid":110,"data":113,"link_type":114,"key":115,"isBroken":116},"360Learning","Équipe",{"dimensions":82,"alt":85,"copyright":47,"url":86,"id":87,"edit":88,"tile":89,"header":95,"xl":101},{"width":83,"height":84},916,912,"360-logo","https://images.prismic.io/360learning/6012da11-56e1-43fb-8c02-005d4e3654fc_360-logo-2023.png?auto=compress,format","ZSQHrhEAACYAsZZH",{"x":50,"y":50,"zoom":52,"background":53},{"dimensions":90,"alt":85,"copyright":47,"url":92,"id":87,"edit":93},{"width":91,"height":91},36,"https://images.prismic.io/360learning/6012da11-56e1-43fb-8c02-005d4e3654fc_360-logo-2023.png?auto=compress,format&rect=0,0,912,912&w=36&h=36",{"x":50,"y":50,"zoom":94,"background":53},0.039473684210526314,{"dimensions":96,"alt":85,"copyright":47,"url":98,"id":87,"edit":99},{"width":97,"height":97},65,"https://images.prismic.io/360learning/6012da11-56e1-43fb-8c02-005d4e3654fc_360-logo-2023.png?auto=compress,format&rect=0,0,912,912&w=65&h=65",{"x":50,"y":50,"zoom":100,"background":53},0.0712719298245614,{"dimensions":102,"alt":85,"copyright":47,"url":104,"id":87,"edit":105},{"width":103,"height":103},100,"https://images.prismic.io/360learning/6012da11-56e1-43fb-8c02-005d4e3654fc_360-logo-2023.png?auto=compress,format&rect=0,0,912,912&w=100&h=100",{"x":50,"y":50,"zoom":106,"background":53},0.10964912280701754,"YCzVWxEAACgA35Ok","author",[],"360learning","2021-03-03T14:38:45+0000","2023-10-09T14:01:54+0000",{"name":79,"job":80,"portrait":81},"Document","42ab7993-9755-48e7-aa00-257ff5f9cf59",false,{"name":118,"id":119,"type":120,"tags":121,"lang":6,"slug":123,"first_publication_date":124,"last_publication_date":125,"uid":123,"data":126,"link_type":114,"key":127,"isBroken":116},"Formation","YLXwXBIAACAA_YeH","category",[122],"Funnel","formation","2021-06-01T08:31:27+0000","2021-06-01T08:32:42+0000",{"name":118},"2ea53959-10bb-4108-bf31-98948f4750a9",{"title":28,"description":31,"canonicalUrl":10},[130,279,451,634,649,1310,1315,1361,1576,1581],{"primary":131,"items":276,"id":277,"slice_type":278,"slice_label":47},{"text":132},[133,138,245,252,255,260,266,271],{"type":134,"text":135,"spans":136,"direction":137},"paragraph","Au moment de choisir un LMS, les responsables formation ont naturellement le regard tourné vers la pédagogie. L'objectif est clair : se doter des meilleures fonctionnalités pour rendre l'apprentissage à la fois évolutif, percutant et pertinent.",[],"ltr",{"type":134,"text":139,"spans":140,"direction":137},"Pourtant, comme toute solution logicielle d'entreprise, un LMS n'échappe pas à la règle : il doit impérativement passer au crible des exigences de la DSI en matière de sécurité et de conformité.",[141],{"start":142,"end":143,"type":144,"data":145},59,62,"hyperlink",{"id":146,"type":147,"tags":148,"lang":6,"slug":151,"first_publication_date":152,"last_publication_date":153,"uid":154,"data":155,"link_type":114,"isBroken":116},"YCPntBEAACoAuH2N","blog_article",[149,150],"LMS","conversion form added","lms--definition-fonctionnement-et-criteres-pour-bien-choisir","2021-03-03T14:35:30+0000","2026-03-16T14:35:16+0000","quest-ce-quun-lms-comment-bien-choisir",{"thumbnail":156,"article_type":40,"category":182,"title":190,"duration":195,"author":196,"description":212,"tags":216},{"dimensions":157,"alt":158,"copyright":47,"url":159,"id":160,"edit":161,"tile":163,"featured":169,"header":174,"details":177},{"width":44,"height":45},"tout-savoir-lms","https://images.prismic.io/360learning/Z1F4MZbqstJ98D5U_Blog_fr-tout-savoir-lms.jpg?auto=format%2Ccompress&rect=0%2C222%2C3000%2C1556&w=1080&h=560","Z1F4MZbqstJ98D5U",{"x":50,"y":162,"zoom":52,"background":53},222,{"dimensions":164,"alt":158,"copyright":47,"url":165,"id":160,"edit":166},{"width":56,"height":57},"https://images.prismic.io/360learning/Z1F4MZbqstJ98D5U_Blog_fr-tout-savoir-lms.jpg?auto=format%2Ccompress&rect=603%2C0%2C1794%2C2000&w=375&h=418",{"x":167,"y":50,"zoom":168,"background":53},603,1.0000000000000002,{"dimensions":170,"alt":158,"copyright":47,"url":171,"id":160,"edit":172},{"width":63,"height":64},"https://images.prismic.io/360learning/Z1F4MZbqstJ98D5U_Blog_fr-tout-savoir-lms.jpg?auto=format%2Ccompress&rect=1246%2C0%2C1754%2C2000&w=500&h=570",{"x":173,"y":50,"zoom":168,"background":53},1246,{"dimensions":175,"alt":158,"copyright":47,"url":159,"id":160,"edit":176},{"width":44,"height":45},{"x":50,"y":162,"zoom":52,"background":53},{"dimensions":178,"alt":158,"copyright":47,"url":179,"id":160,"edit":180},{"width":73,"height":74},"https://images.prismic.io/360learning/Z1F4MZbqstJ98D5U_Blog_fr-tout-savoir-lms.jpg?auto=format%2Ccompress&rect=0%2C200%2C3000%2C1600&w=150&h=80",{"x":50,"y":181,"zoom":52,"background":53},200,{"id":183,"type":120,"tags":184,"lang":6,"slug":185,"first_publication_date":186,"last_publication_date":186,"uid":185,"data":187,"link_type":114,"key":189,"isBroken":116},"Xuke8BIAAL_rh1Hz",[],"apprentissage-et-formation","2021-03-03T14:36:45+0000",{"name":188},"Apprentissage et formation","a85074a7-3a80-438d-bb7c-b62cc9db0af0",[191],{"type":192,"text":193,"spans":194,"direction":137},"heading1","LMS : définition, fonctionnement et critères pour bien choisir",[],9,{"id":107,"type":108,"tags":197,"lang":6,"slug":110,"first_publication_date":111,"last_publication_date":112,"uid":110,"data":198,"link_type":114,"key":211,"isBroken":116},[],{"name":79,"job":80,"portrait":199},{"dimensions":200,"alt":85,"copyright":47,"url":86,"id":87,"edit":201,"tile":202,"header":205,"xl":208},{"width":83,"height":84},{"x":50,"y":50,"zoom":52,"background":53},{"dimensions":203,"alt":85,"copyright":47,"url":92,"id":87,"edit":204},{"width":91,"height":91},{"x":50,"y":50,"zoom":94,"background":53},{"dimensions":206,"alt":85,"copyright":47,"url":98,"id":87,"edit":207},{"width":97,"height":97},{"x":50,"y":50,"zoom":100,"background":53},{"dimensions":209,"alt":85,"copyright":47,"url":104,"id":87,"edit":210},{"width":103,"height":103},{"x":50,"y":50,"zoom":106,"background":53},"27a62772-8835-4db4-b5fe-573c21bc5bb0",[213],{"type":134,"text":214,"spans":215},"Un LMS est une plateforme permettant de créer, gérer, et diffuser du contenu de formation en ligne. Voici TOUT ce que vous devez savoir pour choisir le plus adapté pour la gestion de vos formations.",[],[217,226,234],{"tag":218},{"id":219,"type":220,"tags":221,"lang":6,"slug":222,"first_publication_date":223,"last_publication_date":223,"uid":222,"data":224,"link_type":114,"key":225,"isBroken":116},"YCUHQxEAACkAvWOq","tag",[],"lms","2021-03-03T14:38:53+0000",{"label":222},"9456512a-ec58-49d6-9b83-f2e13ae00e8b",{"tag":227},{"id":228,"type":220,"tags":229,"lang":6,"slug":230,"first_publication_date":186,"last_publication_date":186,"uid":230,"data":231,"link_type":114,"key":233,"isBroken":116},"YCUHfREAACkAvWQJ",[],"collaborative-learning",{"label":232},"collaborative learning","ae179848-dae8-42b6-99ec-ef67d775c018",{"tag":235},{"id":236,"type":220,"tags":237,"lang":6,"slug":238,"first_publication_date":239,"last_publication_date":240,"uid":241,"data":242,"link_type":114,"key":244,"isBroken":116},"YCUA_REAACgAvUpr",[],"outils-du-responsable-formation","2021-03-03T14:40:41+0000","2022-03-24T15:22:46+0000","outils-responsable-formation",{"label":243},"Outils du responsable formation","febe23f5-a9b5-4e37-ae3d-598cc1ab0ec9",{"type":134,"text":246,"spans":247,"direction":137},"Il ne faut pas oublier qu'une plateforme de formation concentre une véritable mine d'informations sensibles : données personnelles des collaborateurs, savoir-faire internes confidentiels et indicateurs de performance. À l'heure où les connexions se multiplient depuis une myriade d'appareils et de zones géographiques, la protection de ces données est devenue une priorité absolue. C'est pourquoi les DSI et les responsables de la sécurité (RSSI) scrutent désormais à la loupe la manière dont les éditeurs LMS gèrent les accès et limitent les risques cyber.",[248],{"start":249,"end":250,"type":251},26,107,"strong",{"type":134,"text":253,"spans":254,"direction":137},"Pour les équipes de formation (L&D), la sécurité n'est donc plus un simple détail technique, mais un critère de choix décisif à intégrer au cahier des charges. En maîtrisant les véritables enjeux de la cybersécurité et en ciblant les fonctionnalités clés, vous pourrez faire le choix d'une plateforme qui sert vos ambitions pédagogiques tout en obtenant l'aval immédiat de vos directions techniques.",[],{"type":134,"text":256,"spans":257,"direction":137},"En résumé :",[258],{"start":50,"end":259,"type":251},11,{"type":261,"text":262,"spans":263,"direction":137},"list-item","La sécurité d'un LMS est un enjeu business majeur, et non une réflexion secondaire. Une plateforme vulnérable peut exposer votre entreprise à de lourdes conséquences financières, juridiques et d’image.",[264],{"start":50,"end":265,"type":251},83,{"type":261,"text":267,"spans":268,"direction":137},"Faire les bons choix de sécurité facilite le dialogue entre les services Formation et DSI. C'est l'assurance d'aligner vos équipes pour garantir un processus d'achat et un déploiement sans accroc.",[269],{"start":50,"end":270,"type":251},90,{"type":261,"text":272,"spans":273,"direction":137},"Un environnement sécurisé est le prérequis de la formation moderne. C'est la seule façon de pouvoir déployer l'apprentissage collaboratif, le partage de connaissances par les pairs (UGC) et l'accès à l'international en toute sérénité.",[274],{"start":50,"end":275,"type":251},67,[],"text$c2ad4fd8-5efd-4049-8124-1d87b6a2298b","text",{"primary":280,"items":448,"id":449,"slice_type":450,"slice_label":47},{"document":281},{"id":282,"type":283,"tags":284,"lang":6,"slug":285,"first_publication_date":286,"last_publication_date":287,"uid":288,"data":289,"link_type":114,"key":447,"isBroken":116},"X7vzUxIAACAAy1nq","form_page",[],"-default-demo-request-page","2021-03-03T14:41:42+0000","2025-10-23T12:26:52+0000","demo",{"body":290,"form_config":324},[291],{"primary":292,"items":297,"id":322,"slice_type":323,"slice_label":47},{"title":293},[294],{"type":192,"text":295,"spans":296,"direction":137},"Demandez votre démo de notre LMS augmenté par l’IA",[],[298,308,315],{"benefit_icon":299,"benefit_copy":307},{"dimensions":300,"alt":47,"copyright":47,"url":302,"id":303,"edit":304},{"width":301,"height":301},64,"https://360learning.cdn.prismic.io/360learning/de472731-2d30-4541-9ef7-9704702c9911_computer-training_icon.svg","ZR_B8xAAACYAEERz",{"x":50,"y":50,"zoom":305,"background":306},1.0666666666666667,"#fff","Automatisez vos tâches chronophages avec le #1 LMS augmenté par l’IA",{"benefit_icon":309,"benefit_copy":314},{"dimensions":310,"alt":47,"copyright":47,"url":311,"id":312,"edit":313},{"width":301,"height":301},"https://360learning.cdn.prismic.io/360learning/d23fcb27-6d5c-4a70-bf69-a378ac27f3cc_collaborative-learning_icon.svg","ZR_B8hAAACYAEERy",{"x":50,"y":50,"zoom":305,"background":306},"Créez du contenu pertinent en quelques clics avec vos experts internes",{"benefit_icon":316,"benefit_copy":321},{"dimensions":317,"alt":47,"copyright":47,"url":318,"id":319,"edit":320},{"width":301,"height":301},"https://360learning.cdn.prismic.io/360learning/c16c5a4c-14fd-42e1-bba2-af3df1fedc75_path-linearity.svg","ZR0H1hAAACcABGSf",{"x":50,"y":50,"zoom":52,"background":53},"Alignez vos formations sur vos priorités business","key_benefits$a37b0780-586d-495b-aef6-b648b50ec717","key_benefits",{"id":325,"type":326,"tags":327,"lang":6,"slug":288,"first_publication_date":286,"last_publication_date":329,"data":330,"link_type":114,"key":446,"isBroken":116},"X_grMBAAAASq_jRI","form_config",[328],"🇫🇷 2021 FORM CONFIG ","2025-08-05T16:38:48+0000",{"body":331,"platform_registration":431,"button_label_after_completion":433,"form_completion_subtitle":434,"is_secondary_cta_visible":116,"form_type":438,"button_link_after_completion":439,"marketo_form_id":442,"form_completion_title":443,"form_button_label":444,"secondary_cta_type":445},[332,341,348,355,372,388,397,404],{"primary":333,"items":337,"id":339,"slice_type":340,"slice_label":47},{"inline":334,"first_name_required":334,"first_name_placeholder":335,"last_name_required":334,"last_name__placeholder":336},true,"Prénom","Nom",[338],{},"first_last_name_inputs$47870b4e-82da-444b-b267-1aecee20c2da","first_last_name_inputs",{"primary":342,"items":344,"id":346,"slice_type":347,"slice_label":47},{"short":334,"required":334,"allow_non_pro_emails":116,"placeholder":343},"Email professionnel",[345],{},"email_input$9a7688a5-685b-496c-9d83-74fe94d578bf","email_input",{"primary":349,"items":351,"id":353,"slice_type":354,"slice_label":47},{"short":334,"required":334,"placeholder":350},"Numéro de téléphone",[352],{},"phone_input$533aae7b-5143-48ec-9e29-f0a320f840a6","phone_input",{"primary":356,"items":359,"id":370,"slice_type":371,"slice_label":47},{"short":334,"marketo_id":357,"required":334,"placeholder":358},"ProjectStart__c","Délai de votre projet LMS ?",[360,362,364,366,368],{"option":361},"Au plus vite",{"option":363},"Dans les 3 prochains mois",{"option":365},"Entre 3 et 6 mois",{"option":367},"Plus de 6 mois",{"option":369},"Je fais de la veille","dropdown_select_input$383cb902-98c6-40e8-b986-efa4216fd9e9","dropdown_select_input",{"primary":373,"items":376,"id":387,"slice_type":371,"slice_label":47},{"short":334,"marketo_id":374,"required":334,"placeholder":375},"Form_ProjectSize__c","Nombre estimé d'utilisateurs",[377,379,381,383,385],{"option":378},"Entre 0 et 99",{"option":380},"Entre 100 et 250",{"option":382},"Entre 251 et 1 000",{"option":384},"Entre 1 001 et 5 000",{"option":386},"Plus de 5 000","dropdown_select_input$4d9557a5-42cc-4954-8aae-3d3a6fb6a5e7",{"primary":389,"items":393,"id":395,"slice_type":396,"slice_label":47},{"short":116,"marketo_id":390,"required":334,"placeholder":391,"row_count":392},"FormMessage__c","Dites-nous en un peu plus sur votre projet !",3,[394],{},"text_area$c0d4ba53-3664-4a58-abf5-7dfdd62697a8","text_area",{"primary":398,"items":401,"id":403,"slice_type":396,"slice_label":47},{"short":116,"marketo_id":399,"required":334,"placeholder":400,"row_count":52},"HDYHAU_360L__c","Comment avez vous entendu parler de nous ?",[402],{},"text_area$b322b1ee-8948-4ab8-8b57-53d96975c81c",{"primary":405,"items":427,"id":429,"slice_type":430,"slice_label":47},{"copy":406},[407],{"type":134,"text":408,"spans":409},"En cliquant ici, vous acceptez de recevoir du contenu de 360Learning. Vous pouvez modifier votre choix à tout moment. Pour plus d'informations, voir notre politique de protection des données.",[410,416],{"start":411,"end":412,"type":144,"data":413},82,116,{"link_type":414,"url":415},"Web","https://360learning.com/fr/form/preferences-email/",{"start":417,"end":418,"type":144,"data":419},155,190,{"id":420,"type":421,"tags":422,"lang":6,"slug":423,"first_publication_date":424,"last_publication_date":425,"uid":426,"link_type":114,"isBroken":116},"YrwJdBAAACAAv-Rp","legal_document",[],"politique-de-confidentialite--360learning","2022-06-29T08:51:38+0000","2025-08-19T15:10:32+0000","confidentialite",[428],{},"legal_text$d02a20a9-3ee8-4cc4-a5f0-ae1422bad3eb","legal_text",[432],{"group_id":47,"session_id":47},"Retour à l'accueil",[435],{"type":134,"text":436,"spans":437},"Nous avons hâte de vous rencontrer et vous contacterons prochainement afin d'organiser votre démonstration personnalisée 😉",[],"Demo",{"link_type":414,"key":440,"url":441},"a85ddb52-caab-4de0-8528-804ba66f8b2d","https://360learning.com/fr/","236","Excellent 💪 !","Demandez votre démo","link","8e6312a3-991a-4a6d-a75b-0f41094d189b","5eb7e5d6-c634-4c4e-b557-aba7fa0f3a89",[],"conversion_form$8491c046-a09f-4476-a4b7-036e1ed9ccb2","conversion_form",{"primary":452,"items":632,"id":633,"slice_type":278,"slice_label":47},{"text":453},[454,458,461,466,470,475,480,485,490,494,497,503,616,619,629],{"type":455,"text":456,"spans":457,"direction":137},"heading2","En bref : les questions de sécurité à poser avant de choisir un  LMS",[],{"type":134,"text":459,"spans":460,"direction":137},"Pour faciliter le travail de votre DSI et gagner du temps lors de la phase d'évaluation, préparez le terrain en soumettant ces questions aux fournisseurs LMS que vous consultez :",[],{"type":261,"text":462,"spans":463,"direction":137},"Le LMS chiffre-t-il les données, aussi bien en transit qu'au repos ?",[464],{"start":50,"end":465,"type":251},68,{"type":261,"text":467,"spans":468,"direction":137},"La gestion des rôles et des permissions est-elle personnalisable pour calquer exactement la structure et la hiérarchie de nos équipes ?",[469],{"start":50,"end":301,"type":251},{"type":261,"text":471,"spans":472,"direction":137},"Quels protocoles d'authentification (SSO) prenez-vous en charge (SAML, OAuth...) ?",[473],{"start":50,"end":474,"type":251},63,{"type":261,"text":476,"spans":477,"direction":137},"Pouvez-vous nous fournir vos certifications, rapports d'audit et une documentation transparente sur vos processus de mise en conformité ?",[478],{"start":50,"end":479,"type":251},61,{"type":261,"text":481,"spans":482,"direction":137},"Quelles actions font l'objet d'une journalisation (logs) ? Quelle est la durée de rétention de ces historiques et qui peut y accéder ?",[483],{"start":50,"end":484,"type":251},58,{"type":261,"text":486,"spans":487,"direction":137},"Où les données sont-elles physiquement hébergées et par quels prestataires cloud ?",[488],{"start":50,"end":489,"type":251},48,{"type":261,"text":491,"spans":492,"direction":137},"Est-il facile de supprimer des données et de gérer les droits de confidentialité des utilisateurs directement depuis le LMS (dans le cadre de la conformité RGPD) ?",[493],{"start":50,"end":74,"type":251},{"type":455,"text":495,"spans":496,"direction":137},"Pourquoi la sécurité de votre LMS doit-elle être une priorité absolue ?",[],{"type":134,"text":498,"spans":499,"direction":137},"Par nature, un LMS centralise une multitude d'informations sensibles : données personnelles des collaborateurs, historiques d'apprentissage, résultats d'évaluations et, bien souvent, des savoir-faire internes hautement confidentiels. Sans une architecture de sécurité blindée, toutes ces données se retrouvent exposées aux fuites, aux accès non autorisés ou à des utilisations malveillantes.",[500],{"start":501,"end":502,"type":251},71,232,{"type":134,"text":504,"spans":505,"direction":137},"Il faut bien avoir conscience qu'un incident de cybersécurité ne cantonne pas ses effets aux seuls apprenants ou au service informatique : c'est l'ensemble de l'entreprise qui en subit l'onde de choc. Une violation de données peut déclencher de lourdes sanctions réglementaires, dégrader sérieusement votre marque employeur et briser la relation de confiance établie avec vos collaborateurs. Pour les équipes formation, c'est aussi le risque de voir la fiabilité de leurs processus remise en question, ce qui compliquera inévitablement l'adoption et le déploiement de futures initiatives pédagogiques.",[506],{"start":507,"end":508,"type":144,"data":509},263,277,{"id":510,"type":147,"tags":511,"lang":6,"slug":512,"first_publication_date":513,"last_publication_date":153,"uid":514,"data":515,"link_type":114,"isBroken":116},"ZHCtkhAAAB4AiTLB",[],"formation-reglementaire--mode-demploi-pour-ne-pas-se-perdre","2023-05-26T13:51:11+0000","formation-reglementaire",{"thumbnail":516,"article_type":40,"category":545,"title":549,"author":553,"description":583,"tags":587},{"dimensions":517,"alt":518,"copyright":47,"url":519,"id":520,"edit":521,"tile":524,"featured":530,"header":536,"details":539},{"width":44,"height":45},"fr-photo-formation-réglementaire-mode-emploi","https://images.prismic.io/360learning/53f3a22a-2323-4243-9b21-de16d311bcc4_Blog_fr-photo-formation-re%CC%81glementaire-mode-emploi.jpg?auto=compress,format&rect=0,498,6720,3484&w=1080&h=560","ZHC2pxAAAB4AiVtq",{"x":50,"y":522,"zoom":523,"background":306},-80,0.16071428571428573,{"dimensions":525,"alt":518,"copyright":47,"url":526,"id":520,"edit":527},{"width":56,"height":57},"https://images.prismic.io/360learning/53f3a22a-2323-4243-9b21-de16d311bcc4_Blog_fr-photo-formation-re%CC%81glementaire-mode-emploi.jpg?auto=compress,format&rect=1350,0,4019,4480&w=375&h=418",{"x":528,"y":50,"zoom":529,"background":306},-126,0.09330357142857143,{"dimensions":531,"alt":518,"copyright":47,"url":532,"id":520,"edit":533},{"width":63,"height":64},"https://images.prismic.io/360learning/53f3a22a-2323-4243-9b21-de16d311bcc4_Blog_fr-photo-formation-re%CC%81glementaire-mode-emploi.jpg?auto=compress,format&rect=1391,0,3930,4480&w=500&h=570",{"x":534,"y":50,"zoom":535,"background":306},-177,0.12723214285714285,{"dimensions":537,"alt":518,"copyright":47,"url":519,"id":520,"edit":538},{"width":44,"height":45},{"x":50,"y":522,"zoom":523,"background":306},{"dimensions":540,"alt":518,"copyright":47,"url":541,"id":520,"edit":542},{"width":73,"height":74},"https://images.prismic.io/360learning/53f3a22a-2323-4243-9b21-de16d311bcc4_Blog_fr-photo-formation-re%CC%81glementaire-mode-emploi.jpg?auto=compress,format&rect=0,448,6720,3584&w=150&h=80",{"x":50,"y":543,"zoom":544,"background":306},-10,0.022321428571428572,{"id":183,"type":120,"tags":546,"lang":6,"slug":185,"first_publication_date":186,"last_publication_date":186,"uid":185,"data":547,"link_type":114,"key":548,"isBroken":116},[],{"name":188},"a3607c9a-8032-48d1-a412-df368a37e5e9",[550],{"type":192,"text":551,"spans":552},"Formation réglementaire : mode d'emploi pour ne pas se perdre",[],{"id":554,"type":108,"tags":555,"lang":6,"slug":556,"first_publication_date":557,"last_publication_date":557,"uid":556,"data":558,"link_type":114,"key":582,"isBroken":116},"ZLpIBBQAACcAjD5V",[],"laurence-de-botton","2023-07-21T08:55:35+0000",{"name":559,"job":560,"portrait":561},"Laurence de Botton","Learning Engagement Coach cheez 360Learning",{"dimensions":562,"alt":559,"copyright":47,"url":564,"id":565,"edit":566,"tile":567,"header":572,"xl":577},{"width":563,"height":563},800,"https://images.prismic.io/360learning/14d90cf1-6ea8-437c-a998-647bf538ac78_Laurence.png?auto=compress,format","ZLpHvBQAACYAjD0W",{"x":50,"y":50,"zoom":52,"background":53},{"dimensions":568,"alt":559,"copyright":47,"url":569,"id":565,"edit":570},{"width":91,"height":91},"https://images.prismic.io/360learning/14d90cf1-6ea8-437c-a998-647bf538ac78_Laurence.png?auto=compress,format&rect=0,0,800,800&w=36&h=36",{"x":50,"y":50,"zoom":571,"background":53},0.045,{"dimensions":573,"alt":559,"copyright":47,"url":574,"id":565,"edit":575},{"width":97,"height":97},"https://images.prismic.io/360learning/14d90cf1-6ea8-437c-a998-647bf538ac78_Laurence.png?auto=compress,format&rect=0,0,800,800&w=65&h=65",{"x":50,"y":50,"zoom":576,"background":53},0.08125,{"dimensions":578,"alt":559,"copyright":47,"url":579,"id":565,"edit":580},{"width":103,"height":103},"https://images.prismic.io/360learning/14d90cf1-6ea8-437c-a998-647bf538ac78_Laurence.png?auto=compress,format&rect=0,0,800,800&w=100&h=100",{"x":50,"y":50,"zoom":581,"background":53},0.125,"ec4462c4-3dec-495a-8257-5c0b3851d99c",[584],{"type":134,"text":585,"spans":586},"Comment élaborer un plan de formation réglementaire sans ennuyer vos équipes ? Voici nos conseils pour être 100% conforme aux exigences en vigueur.",[],[588,597,607],{"tag":589},{"id":590,"type":220,"tags":591,"lang":6,"slug":592,"first_publication_date":593,"last_publication_date":593,"uid":592,"data":594,"link_type":114,"key":596,"isBroken":116},"Y_T_cxAAAB8A3ivH",[],"formations-reglementaires","2023-02-21T17:29:27+0000",{"label":595},"Formations réglementaires","8615c699-e0e0-43ff-a2af-b1497a0fe532",{"tag":598},{"id":599,"type":220,"tags":600,"lang":6,"slug":601,"first_publication_date":602,"last_publication_date":603,"uid":601,"data":604,"link_type":114,"key":606,"isBroken":116},"YyBXjxcAAC0A-Mfs",[],"expertise-interne","2022-09-13T10:12:37+0000","2022-09-13T10:13:16+0000",{"label":605},"Expertise interne","14094dac-a309-4ca0-bb6d-99c64ccb1db3",{"tag":608},{"id":609,"type":220,"tags":610,"lang":6,"slug":611,"first_publication_date":612,"last_publication_date":612,"uid":611,"data":613,"link_type":114,"key":615,"isBroken":116},"YCUDYhEAACoAvVNu",[],"developpement-des-competences","2021-03-03T14:41:22+0000",{"label":614},"développement des compétences","a42543ba-fe25-418b-bc52-62f6f2019442",{"type":134,"text":617,"spans":618,"direction":137},"Enfin, si la sécurisation des LMS est devenue un sujet si critique, c'est parce que ces plateformes ne fonctionnent plus en vase clos. Aujourd'hui, elles s'interconnectent en permanence avec votre SIRH, vos fournisseurs d'identité, vos outils collaboratifs ou encore vos bibliothèques de contenus externes.",[],{"type":134,"text":620,"spans":621,"direction":137},"Or, chaque nouvelle intégration vient élargir ce que l'on appelle la « surface d'attaque » de votre système d'information. C'est pourquoi exiger un socle de sécurité robuste, pensé dès la conception du logiciel (ce que l’on appelle le security by design), est la condition sine qua non pour toute entreprise qui souhaite former ses équipes en toute sérénité.",[622,626],{"start":623,"end":624,"type":625},235,253,"em",{"start":627,"end":628,"type":625},273,285,{"type":455,"text":630,"spans":631,"direction":137},"Les 7 fonctionnalités de sécurité LMS à prioriser",[],[],"text$a686d774-fe42-4c1e-bfda-3e7d563453bf",{"primary":635,"items":646,"id":647,"slice_type":648,"slice_label":47},{"image":636,"has_grey_background":116,"caption":47,"cta_type":445,"cta_link":644},{"dimensions":637,"alt":640,"copyright":47,"url":641,"id":642,"edit":643},{"width":638,"height":639},2752,1536,"Infographie - 7 fonctionnalités de sécurité LMS","https://images.prismic.io/360learning/aafuDlxvIZEnjTa9_DSCN6484.JPG?auto=format,compress","aafuDlxvIZEnjTa9",{"x":50,"y":50,"zoom":52,"background":53},{"link_type":645},"Any",[],"image$81f67f8a-f75c-4de9-839e-9cb32ec2c9bb","image",{"primary":650,"items":1308,"id":1309,"slice_type":278,"slice_label":47},{"text":651},[652,655,659,662,667,672,675,679,684,689,692,695,698,800,804,808,812,815,818,821,1045,1049,1053,1057,1060,1063,1075,1078,1082,1086,1090,1093,1096,1099,1103,1107,1111,1114,1117,1120,1123,1127,1131,1135,1138,1141,1245,1248,1252,1256,1260,1263,1266,1279,1285,1296,1299,1302,1305],{"type":134,"text":653,"spans":654,"direction":137},"Les fonctionnalités ci-dessous sont devenues des standards absolus pour les DSI, les RSSI et les équipes de conformité. Ce sont donc ces critères que les responsables de la formation doivent exiger lors de leur processus d'achat.",[],{"type":656,"text":657,"spans":658,"direction":137},"heading3","1. Le chiffrement des données",[],{"type":134,"text":660,"spans":661,"direction":137},"Le chiffrement garantit la protection de vos informations sensibles, qu'elles soient stockées sur des serveurs ou en cours d'échange entre les utilisateurs et la plateforme :",[],{"type":261,"text":663,"spans":664,"direction":137},"Le chiffrement en transit empêche toute interception des données lors de la connexion, de l'accès aux contenus ou de la génération de rapports. C'est une protection vitale, en particulier pour les collaborateurs en télétravail ou en mobilité.",[665],{"start":50,"end":666,"type":251},25,{"type":261,"text":668,"spans":669,"direction":137},"Le chiffrement au repos sécurise les données stockées, les rendant inexploitables même en cas de compromission de l'infrastructure (serveurs ou cloud).",[670],{"start":50,"end":671,"type":251},23,{"type":134,"text":673,"spans":674,"direction":137},"Combinées, ces deux mesures constituent le socle de sécurité de tout LMS digne de ce nom. Pour la majorité des DSI, c'est un critère absolument non négociable.",[],{"type":261,"text":676,"spans":677,"direction":137},"Pourquoi c'est important : Des données en clair sont une cible de choix pour les cyberattaques, d'autant plus dans des environnements de travail hybrides ou décentralisés.",[678],{"start":50,"end":249,"type":251},{"type":261,"text":680,"spans":681,"direction":137},"Ce que ça change : Le chiffrement neutralise l'impact d'un accès non autorisé. C'est d'ailleurs un prérequis systématique lors des audits de sécurité et de conformité.",[682],{"start":50,"end":683,"type":251},18,{"type":261,"text":685,"spans":686,"direction":137},"Ce qu'il faut exiger : Assurez-vous que l'éditeur utilise des algorithmes de chiffrement robustes et conformes aux standards de l'industrie, aussi bien pour les données en transit qu'au repos.",[687],{"start":50,"end":688,"type":251},22,{"type":134,"text":690,"spans":691,"direction":137},"Sans un chiffrement de pointe, votre LMS se transforme en une véritable poudrière contenant les données personnelles de vos collaborateurs.",[],{"type":656,"text":693,"spans":694,"direction":137},"2. Le contrôle d'accès basé sur les rôles (RBAC)",[],{"type":134,"text":696,"spans":697,"direction":137},"Le contrôle d'accès basé sur les rôles (RBAC) permet de limiter précisément ce que chaque utilisateur peut voir et faire sur le LMS, en fonction de son poste, de ses responsabilités ou de ses habilitations. Cela évite que des informations sensibles — comme les performances individuelles des apprenants, les paramètres d'administration ou des contenus internes confidentiels — ne tombent sous les yeux du mauvais public.",[],{"type":134,"text":699,"spans":700,"direction":137},"Le RBAC s'avère particulièrement critique dans les grandes entreprises où de multiples départements cohabitent sur la même plateforme. D'un point de vue cybersécurité, cette approche repose sur le fameux principe du moindre privilège, ce qui limite drastiquement les conséquences d'une erreur humaine ou d'un acte malveillant.",[701,797],{"start":702,"end":703,"type":144,"data":704},153,166,{"id":705,"type":147,"tags":706,"lang":6,"slug":707,"first_publication_date":708,"last_publication_date":709,"uid":710,"data":711,"link_type":114,"isBroken":116},"Z89N4RAAACAAf45o",[],"former-a-la-sensibilisation-a-la-cybersecurite--une-priorite-en-2026","2025-03-10T20:41:50+0000","2026-02-23T14:24:53+0000","former-sensibilisation-cybersecurite",{"thumbnail":712,"article_type":40,"category":739,"title":743,"duration":747,"author":748,"description":776,"tags":782},{"dimensions":713,"alt":714,"copyright":47,"url":715,"id":716,"edit":717,"tile":719,"featured":724,"header":729,"details":734},{"width":44,"height":45},"Verrous","https://images.prismic.io/360learning/Z89NEBsAHJWomTQA_Blog-FR_former-cybersecurite.jpg?auto=format%2Ccompress&rect=0%2C297%2C5472%2C2837&w=1080&h=560","Z89NEBsAHJWomTQA",{"x":50,"y":718,"zoom":52,"background":53},297,{"dimensions":720,"alt":714,"copyright":47,"url":721,"id":716,"edit":722},{"width":56,"height":57},"https://images.prismic.io/360learning/Z89NEBsAHJWomTQA_Blog-FR_former-cybersecurite.jpg?auto=format%2Ccompress&rect=1100%2C0%2C3273%2C3648&w=375&h=418",{"x":723,"y":50,"zoom":168,"background":53},1100,{"dimensions":725,"alt":714,"copyright":47,"url":726,"id":716,"edit":727},{"width":63,"height":64},"https://images.prismic.io/360learning/Z89NEBsAHJWomTQA_Blog-FR_former-cybersecurite.jpg?auto=format%2Ccompress&rect=1136%2C0%2C3200%2C3648&w=500&h=570",{"x":728,"y":50,"zoom":168,"background":53},1136,{"dimensions":730,"alt":714,"copyright":47,"url":731,"id":716,"edit":732},{"width":44,"height":45},"https://images.prismic.io/360learning/Z89NEBsAHJWomTQA_Blog-FR_former-cybersecurite.jpg?auto=format%2Ccompress&rect=0%2C405%2C5472%2C2837&w=1080&h=560",{"x":50,"y":733,"zoom":52,"background":53},405,{"dimensions":735,"alt":714,"copyright":47,"url":736,"id":716,"edit":737},{"width":73,"height":74},"https://images.prismic.io/360learning/Z89NEBsAHJWomTQA_Blog-FR_former-cybersecurite.jpg?auto=format%2Ccompress&rect=0%2C365%2C5472%2C2918&w=150&h=80",{"x":50,"y":738,"zoom":52,"background":53},365,{"id":183,"type":120,"tags":740,"lang":6,"slug":185,"first_publication_date":186,"last_publication_date":186,"uid":185,"data":741,"link_type":114,"key":742,"isBroken":116},[],{"name":188},"c97a5e67-b9d9-4c92-aabf-3005418a9f1c",[744],{"type":192,"text":745,"spans":746,"direction":137},"Former à la sensibilisation à la Cybersécurité : une priorité en 2026",[],6,{"id":749,"type":108,"tags":750,"lang":6,"slug":751,"first_publication_date":752,"last_publication_date":753,"uid":751,"data":754,"link_type":114,"key":775,"isBroken":116},"Z89NhBAAAB8Af43b",[],"maximilien-spirli-fraud","2025-03-10T20:37:26+0000","2025-03-10T20:37:45+0000",{"name":755,"job":756,"portrait":757},"Maximilien Spirli Fraud","Responsable de formation chez NowBrains",{"dimensions":758,"alt":759,"copyright":47,"url":760,"id":761,"edit":762,"tile":763,"header":767,"xl":771},{"width":563,"height":563},"Maximilien Spirli Fraud Nowbrains","https://images.prismic.io/360learning/Z89NUxsAHJWomTQE_Maximilien.jpeg?auto=format,compress","Z89NUxsAHJWomTQE",{"x":50,"y":50,"zoom":52,"background":53},{"dimensions":764,"alt":759,"copyright":47,"url":765,"id":761,"edit":766},{"width":91,"height":91},"https://images.prismic.io/360learning/Z89NUxsAHJWomTQE_Maximilien.jpeg?auto=format,compress&rect=0,0,800,800&w=36&h=36",{"x":50,"y":50,"zoom":52,"background":53},{"dimensions":768,"alt":759,"copyright":47,"url":769,"id":761,"edit":770},{"width":97,"height":97},"https://images.prismic.io/360learning/Z89NUxsAHJWomTQE_Maximilien.jpeg?auto=format,compress&rect=0,0,800,800&w=65&h=65",{"x":50,"y":50,"zoom":52,"background":53},{"dimensions":772,"alt":759,"copyright":47,"url":773,"id":761,"edit":774},{"width":103,"height":103},"https://images.prismic.io/360learning/Z89NUxsAHJWomTQE_Maximilien.jpeg?auto=format,compress&rect=0,0,800,800&w=100&h=100",{"x":50,"y":50,"zoom":52,"background":53},"695f2dbf-9635-43cd-93fc-f52b92305988",[777],{"type":134,"text":778,"spans":779,"direction":137},"La cybersécurité s'impose comme un enjeu quotidien pour les entreprises.  L'augmentation alarmante des attaques ces dernières années souligne l'urgence de renforcer les défenses numériques.",[780],{"start":50,"end":781,"type":625},189,[783,792],{"tag":784},{"id":785,"type":220,"tags":786,"lang":6,"slug":787,"first_publication_date":788,"last_publication_date":788,"uid":787,"data":789,"link_type":114,"key":791,"isBroken":116},"YCUDqhEAACkAvVTA",[],"formation-digitale","2021-03-03T14:39:17+0000",{"label":790},"formation digitale","0e7a9ba2-b1eb-47d7-9322-598a319d355e",{"tag":793},{"id":590,"type":220,"tags":794,"lang":6,"slug":592,"first_publication_date":593,"last_publication_date":593,"uid":592,"data":795,"link_type":114,"key":796,"isBroken":116},[],{"label":595},"540782e5-f301-4a65-8445-765c099c5b8c",{"start":798,"end":799,"type":251},204,233,{"type":261,"text":801,"spans":802,"direction":137},"Pourquoi c'est important : Octroyer des accès trop larges démultiplie les risques de fuites de données accidentelles ou d'utilisations abusives. De plus, cela fait perdre aux équipes de formation la maîtrise sur la structuration de leurs propres programmes.",[803],{"start":50,"end":249,"type":251},{"type":261,"text":805,"spans":806,"direction":137},"Ce que ça change : Le RBAC applique à la lettre le principe du moindre privilège, tout en offrant un cadre sécurisé pour la collaboration inter-équipes.",[807],{"start":50,"end":683,"type":251},{"type":261,"text":809,"spans":810,"direction":137},"Ce qu'il faut exiger : Demandez à l'éditeur jusqu'à quel niveau de granularité il est possible d'affiner les rôles, et comment faire évoluer ces permissions dans le temps.",[811],{"start":50,"end":688,"type":251},{"type":134,"text":813,"spans":814,"direction":137},"Pour les équipes L&D, le RBAC est la clé pour déployer l'apprentissage collaboratif à grande échelle, sans jamais transiger sur la sécurité.",[],{"type":656,"text":816,"spans":817,"direction":137},"3. L'authentification unique (SSO) et la gestion des identités",[],{"type":134,"text":819,"spans":820,"direction":137},"L'authentification unique (SSO) permet à vos collaborateurs de se connecter au LMS en utilisant leurs identifiants d'entreprise habituels, leur évitant ainsi de créer un énième compte. Cette approche combat efficacement la « fatigue des mots de passe » et réduit considérablement le risque lié aux mots de passe faibles ou réutilisés — une faille de sécurité tristement célèbre.",[],{"type":134,"text":822,"spans":823,"direction":137},"Le SSO simplifie également la vie de la DSI et des équipes RH : lors d'une intégration (onboarding), d'une mobilité interne ou du départ d'un collaborateur (offboarding), quelques clics suffisent pour octroyer ou révoquer ses accès de manière centralisée sur l'ensemble des outils de l'entreprise.",[824,827,936,939],{"start":825,"end":826,"type":625},88,98,{"start":825,"end":826,"type":144,"data":828},{"id":829,"type":147,"tags":830,"lang":6,"slug":831,"first_publication_date":832,"last_publication_date":153,"uid":833,"data":834,"link_type":114,"isBroken":116},"YAGubRAAACMAKF68",[],"procedure-dintegration--38-modeles-pour-construire-un-onboarding-complet","2021-04-29T17:37:46+0000","modeles-onboarding-checklist",{"thumbnail":835,"article_type":40,"category":867,"title":875,"duration":879,"author":880,"description":910,"tags":914},{"dimensions":836,"alt":837,"copyright":47,"url":838,"id":839,"edit":840,"tile":843,"featured":850,"header":856,"details":861},{"width":44,"height":45},"modèles d'onboarding pour un parcours d'intégration réussi | 360Learning","https://images.prismic.io/360learning/0487fb32-6084-4ce4-870e-c270d10157e4_Blog_38-mode%CC%80les-onboarding-checklists+pour+accueillir-+nouvelles-+recrues.jpeg?auto=compress,format&rect=0,221,1651,856&w=1080&h=560","YIrofxAAACMAegkK",{"x":50,"y":841,"zoom":842,"background":306},-144,0.6541490006056935,{"dimensions":844,"alt":845,"copyright":47,"url":846,"id":839,"edit":847},{"width":56,"height":57},"modèles d'onboarding et checklists pour accueillir vos nouvelles recrues | 360Learning","https://images.prismic.io/360learning/0487fb32-6084-4ce4-870e-c270d10157e4_Blog_38-mode%CC%80les-onboarding-checklists+pour+accueillir-+nouvelles-+recrues.jpeg?auto=compress,format&rect=428,0,987,1100&w=375&h=418",{"x":848,"y":50,"zoom":849,"background":306},-162,0.38,{"dimensions":851,"alt":845,"copyright":47,"url":852,"id":839,"edit":853},{"width":63,"height":64},"https://images.prismic.io/360learning/0487fb32-6084-4ce4-870e-c270d10157e4_Blog_38-mode%CC%80les-onboarding-checklists+pour+accueillir-+nouvelles-+recrues.jpeg?auto=compress,format&rect=471,0,965,1100&w=500&h=570",{"x":854,"y":50,"zoom":855,"background":306},-244,0.5181818181818182,{"dimensions":857,"alt":845,"copyright":47,"url":858,"id":839,"edit":859},{"width":44,"height":45},"https://images.prismic.io/360learning/0487fb32-6084-4ce4-870e-c270d10157e4_Blog_38-mode%CC%80les-onboarding-checklists+pour+accueillir-+nouvelles-+recrues.jpeg?auto=compress,format&rect=0,225,1651,856&w=1080&h=560",{"x":50,"y":860,"zoom":842,"background":306},-147,{"dimensions":862,"alt":845,"copyright":47,"url":863,"id":839,"edit":864},{"width":73,"height":74},"https://images.prismic.io/360learning/0487fb32-6084-4ce4-870e-c270d10157e4_Blog_38-mode%CC%80les-onboarding-checklists+pour+accueillir-+nouvelles-+recrues.jpeg?auto=compress,format&rect=0,207,1651,881&w=150&h=80",{"x":50,"y":865,"zoom":866,"background":306},-18,0.09085402786190187,{"id":868,"type":120,"tags":869,"lang":6,"slug":870,"first_publication_date":871,"last_publication_date":871,"uid":870,"data":872,"link_type":114,"key":874,"isBroken":116},"YGbBwBAAACAA0KSi",[],"onboarding","2021-04-02T07:03:32+0000",{"name":873,"description":873},"Onboarding","e1d06adf-b455-4a38-be0f-c46d65ab9f9f",[876],{"type":192,"text":877,"spans":878,"direction":137},"Procédure d'intégration : 38 modèles pour construire un onboarding complet",[],8,{"id":881,"type":108,"tags":882,"lang":6,"slug":883,"first_publication_date":884,"last_publication_date":884,"uid":883,"data":885,"link_type":114,"key":909,"isBroken":116},"XuNRjxEAACAAL_Ur",[],"joei-chan","2021-04-29T17:18:47+0000",{"name":886,"job":887,"portrait":888},"Joei Chan","Content Director, 360Learning",{"dimensions":889,"alt":886,"copyright":47,"url":891,"id":892,"edit":893,"tile":894,"header":899,"xl":904},{"width":890,"height":890},256,"https://images.prismic.io/360learning/5b70fcf0-dd3d-4f59-8527-11d48900e64e_joei+chan+pic.png?auto=compress,format","XsaZ_hIAACEAPJvE",{"x":50,"y":50,"zoom":52,"background":53},{"dimensions":895,"alt":47,"copyright":47,"url":896,"id":892,"edit":897},{"width":91,"height":91},"https://images.prismic.io/360learning/5b70fcf0-dd3d-4f59-8527-11d48900e64e_joei+chan+pic.png?auto=compress,format&rect=0,0,256,256&w=36&h=36",{"x":50,"y":50,"zoom":898,"background":53},0.140625,{"dimensions":900,"alt":47,"copyright":47,"url":901,"id":892,"edit":902},{"width":97,"height":97},"https://images.prismic.io/360learning/5b70fcf0-dd3d-4f59-8527-11d48900e64e_joei+chan+pic.png?auto=compress,format&rect=0,0,256,256&w=65&h=65",{"x":50,"y":50,"zoom":903,"background":53},0.25390625,{"dimensions":905,"alt":47,"copyright":47,"url":906,"id":892,"edit":907},{"width":103,"height":103},"https://images.prismic.io/360learning/5b70fcf0-dd3d-4f59-8527-11d48900e64e_joei+chan+pic.png?auto=compress,format&rect=0,0,256,256&w=100&h=100",{"x":50,"y":50,"zoom":908,"background":53},0.390625,"2f07784c-74b4-49f4-a4d1-237032ca39f7",[911],{"type":134,"text":912,"spans":913,"direction":137},"Si les meilleurs programmes d'onboarding fonctionnent, c'est parce qu'ils sont adaptés à votre entreprise et à vos nouveaux collaborateurs. Ne partez pas de zéro : voici +30 modèles à utiliser.",[],[915,922,931],{"tag":916},{"id":917,"type":220,"tags":918,"lang":6,"slug":870,"first_publication_date":919,"last_publication_date":919,"uid":870,"data":920,"link_type":114,"key":921,"isBroken":116},"YGW7rhAAACAAzAvY",[],"2021-04-01T12:25:21+0000",{"label":873},"dfb3e51e-e0bc-470d-85cc-6e61ae74dfea",{"tag":923},{"id":924,"type":220,"tags":925,"lang":6,"slug":926,"first_publication_date":927,"last_publication_date":927,"uid":926,"data":928,"link_type":114,"key":930,"isBroken":116},"YCUAuREAACkAvUn6",[],"teletravail","2021-03-03T14:44:43+0000",{"label":929},"télétravail","b14532c4-2788-493c-98f2-0c09d9142b44",{"tag":932},{"id":236,"type":220,"tags":933,"lang":6,"slug":238,"first_publication_date":239,"last_publication_date":240,"uid":241,"data":934,"link_type":114,"key":935,"isBroken":116},[],{"label":243},"225fb45c-5027-4122-b30f-84bbbf5acdaa",{"start":937,"end":938,"type":625},157,168,{"start":937,"end":938,"type":144,"data":940},{"id":941,"type":147,"tags":942,"lang":6,"slug":943,"first_publication_date":944,"last_publication_date":945,"uid":946,"data":947,"link_type":114,"isBroken":116},"Y1ZujhAAACAAH4H3",[],"le-processus-offboarding--pourquoi-cest-determinant-et-comment-reussir","2022-10-24T16:12:38+0000","2024-07-23T15:18:13+0000","offboarding",{"thumbnail":948,"article_type":40,"category":976,"title":980,"author":984,"description":1019,"tags":1023},{"dimensions":949,"alt":946,"copyright":47,"url":950,"id":951,"edit":952,"tile":955,"featured":961,"header":967,"details":970},{"width":44,"height":45},"https://images.prismic.io/360learning/df39d1bf-29f2-4789-8651-f5f647cec50d_blog-offboarding.jpg?auto=compress,format&rect=0,85,3992,2070&w=1080&h=560","YuPUWhEAACMAyUL_",{"x":50,"y":953,"zoom":954,"background":306},-23,0.27054108216432865,{"dimensions":956,"alt":946,"copyright":47,"url":957,"id":951,"edit":958},{"width":56,"height":57},"https://images.prismic.io/360learning/df39d1bf-29f2-4789-8651-f5f647cec50d_blog-offboarding.jpg?auto=compress,format&rect=70,0,2010,2240&w=375&h=418",{"x":959,"y":50,"zoom":960,"background":306},-13,0.18660714285714286,{"dimensions":962,"alt":946,"copyright":47,"url":963,"id":951,"edit":964},{"width":63,"height":64},"https://images.prismic.io/360learning/df39d1bf-29f2-4789-8651-f5f647cec50d_blog-offboarding.jpg?auto=compress,format&rect=133,0,1965,2240&w=500&h=570",{"x":965,"y":50,"zoom":966,"background":306},-33,0.2544642857142857,{"dimensions":968,"alt":946,"copyright":47,"url":950,"id":951,"edit":969},{"width":44,"height":45},{"x":50,"y":953,"zoom":954,"background":306},{"dimensions":971,"alt":946,"copyright":47,"url":972,"id":951,"edit":973},{"width":73,"height":74},"https://images.prismic.io/360learning/df39d1bf-29f2-4789-8651-f5f647cec50d_blog-offboarding.jpg?auto=compress,format&rect=0,53,3992,2129&w=150&h=80",{"x":50,"y":974,"zoom":975,"background":306},-2,0.037575150300601205,{"id":868,"type":120,"tags":977,"lang":6,"slug":870,"first_publication_date":871,"last_publication_date":871,"uid":870,"data":978,"link_type":114,"key":979,"isBroken":116},[],{"name":873,"description":873},"e6996f09-c374-4ff9-87ba-e428000f0dd3",[981],{"type":192,"text":982,"spans":983,"direction":137},"Le processus offboarding : pourquoi c'est déterminant et comment réussir",[],{"id":985,"type":108,"tags":986,"lang":6,"slug":987,"first_publication_date":988,"last_publication_date":989,"uid":987,"data":990,"link_type":114,"key":1018,"isBroken":116},"YEjtDREAACUAEGm5",[],"tom-baragwanath","2021-03-10T16:00:19+0000","2022-07-11T08:07:42+0000",{"name":991,"job":992,"portrait":993},"Tom Baragwanath","Global Head of Content, 360Learning",{"dimensions":994,"alt":991,"copyright":47,"url":997,"id":998,"edit":999,"tile":1000,"header":1006,"xl":1012},{"width":995,"height":996},596,514,"https://images.prismic.io/360learning/2d253156-a63c-486c-a690-f0d9fdd21162_Author_Tom-Baragwanath.jpeg?auto=compress,format","X-NiLBAAACIAohaS",{"x":50,"y":50,"zoom":52,"background":306},{"dimensions":1001,"alt":991,"copyright":47,"url":1002,"id":998,"edit":1003},{"width":91,"height":91},"https://images.prismic.io/360learning/2d253156-a63c-486c-a690-f0d9fdd21162_Author_Tom-Baragwanath.jpeg?auto=compress,format&rect=43,0,514,514&w=36&h=36",{"x":1004,"y":50,"zoom":1005,"background":306},-3,0.07003891050583658,{"dimensions":1007,"alt":991,"copyright":47,"url":1008,"id":998,"edit":1009},{"width":97,"height":97},"https://images.prismic.io/360learning/2d253156-a63c-486c-a690-f0d9fdd21162_Author_Tom-Baragwanath.jpeg?auto=compress,format&rect=40,0,514,514&w=65&h=65",{"x":1010,"y":50,"zoom":1011,"background":306},-5,0.1264591439688716,{"dimensions":1013,"alt":991,"copyright":47,"url":1014,"id":998,"edit":1015},{"width":103,"height":103},"https://images.prismic.io/360learning/2d253156-a63c-486c-a690-f0d9fdd21162_Author_Tom-Baragwanath.jpeg?auto=compress,format&rect=41,0,514,514&w=100&h=100",{"x":1016,"y":50,"zoom":1017,"background":306},-8,0.19455252918287938,"09fd5427-edce-45e7-987c-2050b2574385",[1020],{"type":134,"text":1021,"spans":1022},"La façon de dire au revoir à un employé qui quitte votre entreprise est aussi importante que la manière dont vous lui souhaitez la bienvenue ! ",[],[1024,1031,1040],{"tag":1025},{"id":1026,"type":220,"tags":1027,"lang":6,"slug":946,"first_publication_date":1028,"last_publication_date":1028,"uid":946,"data":1029,"link_type":114,"key":1030,"isBroken":116},"Y1ez6xAAACAAJR1b",[946],"2022-10-25T10:01:19+0000",{"label":946},"b111460a-f840-40c5-ae85-f962146482c6",{"tag":1032},{"id":1033,"type":220,"tags":1034,"lang":6,"slug":1035,"first_publication_date":1036,"last_publication_date":1036,"uid":1035,"data":1037,"link_type":114,"key":1039,"isBroken":116},"YCUBexEAACkAvUs6",[],"outils-rh","2021-03-03T14:41:35+0000",{"label":1038},"Outils RH","a7f21d65-04bf-4ee4-abcb-8637dd803c94",{"tag":1041},{"id":236,"type":220,"tags":1042,"lang":6,"slug":238,"first_publication_date":239,"last_publication_date":240,"uid":241,"data":1043,"link_type":114,"key":1044,"isBroken":116},[],{"label":243},"55c56396-df1b-42a4-b191-f9d3088fa505",{"type":261,"text":1046,"spans":1047,"direction":137},"Pourquoi c'est important : Les mots de passe trop simples ou recyclés d'un site à l'autre demeurent l'une des principales portes d'entrée pour les cybercriminels.",[1048],{"start":50,"end":249,"type":251},{"type":261,"text":1050,"spans":1051,"direction":137},"Ce que ça change : Le SSO supprime toute friction à la connexion pour les apprenants, tout en offrant à la DSI une gestion étanche et centralisée des accès.",[1052],{"start":50,"end":683,"type":251},{"type":261,"text":1054,"spans":1055,"direction":137},"Ce qu'il faut exiger : Vérifiez que la plateforme prend en charge les protocoles d'authentification standards du marché (comme SAML 2.0 ou OAuth) et qu'elle s'interface parfaitement avec votre fournisseur d'identité actuel (Azure AD, Okta, etc.).",[1056],{"start":50,"end":688,"type":251},{"type":134,"text":1058,"spans":1059,"direction":137},"Côté apprenant, le SSO garantit une expérience d'apprentissage fluide et sans couture. Côté DSI, il assure une sécurité optimale, parfaitement alignée avec les standards de gestion des identités de l'entreprise.",[],{"type":656,"text":1061,"spans":1062,"direction":137},"4. La conformité aux normes de sécurité et aux réglementations",[],{"type":134,"text":1064,"spans":1065,"direction":137},"Un LMS véritablement sécurisé doit prouver sa conformité aux grands standards et cadres réglementaires du marché, tels que l'ISO 27001, le SOC 2 et, bien évidemment, le RGPD. Ces normes attestent que l'éditeur applique les meilleures pratiques en matière de sécurité de l'information, de gestion des risques et de protection des données personnelles. Selon votre secteur d'activité, ces garanties peuvent même relever d'une obligation légale.",[1066,1069,1072],{"start":1067,"end":1068,"type":251},125,134,{"start":1070,"end":1071,"type":251},139,144,{"start":1073,"end":1074,"type":251},169,173,{"type":134,"text":1076,"spans":1077,"direction":137},"Sur le plan opérationnel, s'appuyer sur des certifications reconnues allège considérablement la charge de travail de vos équipes internes lors des audits. Votre DSI validera beaucoup plus facilement une solution dont la sécurité a déjà été éprouvée par des organismes tiers.",[],{"type":261,"text":1079,"spans":1080,"direction":137},"Pourquoi c'est essentiel : Déployer des outils non conformes expose l'entreprise à des risques juridiques, financiers et réputationnels majeurs.",[1081],{"start":50,"end":249,"type":251},{"type":261,"text":1083,"spans":1084,"direction":137},"Ce que ça change : Les certifications et rapports de conformité accélèrent drastiquement l'évaluation des risques liés aux fournisseurs et fluidifient le processus d'achat.",[1085],{"start":50,"end":683,"type":251},{"type":261,"text":1087,"spans":1088,"direction":137},"Ce qu'il faut exiger : Demandez des certifications à jour, des rapports d'audit (type SOC 2 Type II) et une documentation transparente sur les pratiques de mise en conformité de l'éditeur.",[1089],{"start":50,"end":688,"type":251},{"type":134,"text":1091,"spans":1092,"direction":137},"Un LMS incapable de fournir des preuves claires de sa conformité deviendra instantanément un point de blocage rédhibitoire pour votre direction informatique.",[],{"type":656,"text":1094,"spans":1095,"direction":137},"5. Les journaux d'audit (logs) et la surveillance de l'activité",[],{"type":134,"text":1097,"spans":1098,"direction":137},"Les logs d'audit conservent un historique détaillé et chronologique des actions effectuées sur le LMS : connexions, modifications de contenus, paramétrages administratifs, etc. Cette traçabilité est absolument vitale pour détecter des comportements suspects, mener l'enquête en cas d'incident de cybersécurité, et répondre aux exigences des auditeurs internes ou externes.",[],{"type":261,"text":1100,"spans":1101,"direction":137},"Pourquoi c'est important : Sans visibilité sur les actions menées, il est presque impossible de détecter une faille ou de comprendre l'origine d'un incident.",[1102],{"start":50,"end":249,"type":251},{"type":261,"text":1104,"spans":1105,"direction":137},"Ce que ça change : La journalisation est le pilier de la réponse aux incidents, des audits de conformité et de l'établissement des responsabilités internes.",[1106],{"start":50,"end":683,"type":251},{"type":261,"text":1108,"spans":1109,"direction":137},"Ce qu'il faut exiger : Vérifiez la granularité des actions tracées, la durée de conservation de ces logs et, surtout, qui est autorisé à accéder à ces historiques.",[1110],{"start":50,"end":688,"type":251},{"type":134,"text":1112,"spans":1113,"direction":137},"Pour le RSSI, cette traçabilité offre une visibilité totale sur l'utilisation réelle de la plateforme. Pour les équipes Formation, c'est l'assurance d'identifier et de résoudre rapidement toute anomalie rencontrée par les utilisateurs.",[],{"type":656,"text":1115,"spans":1116,"direction":137},"6. Une infrastructure cloud et un hébergement ultra-sécurisés",[],{"type":134,"text":1118,"spans":1119,"direction":137},"Un LMS fiable repose avant tout sur une infrastructure cloud robuste, dotée de contrôles de sécurité drastiques. Cela englobe notamment la redondance des données, des sauvegardes régulières, des Plans de Reprise d'Activité (PRA) éprouvés, et des boucliers contre les attaques visant l'infrastructure (comme les attaques DDoS).",[],{"type":134,"text":1121,"spans":1122,"direction":137},"Un hébergement sécurisé garantit non seulement une haute disponibilité et des performances optimales, mais minimise aussi les temps d'arrêt et le risque de perte de données. À mesure que vous déployez la formation à grande échelle, cette solidité du cloud devient prépondérante.",[],{"type":261,"text":1124,"spans":1125,"direction":137},"Pourquoi c'est essentiel : Une vulnérabilité au niveau de l'infrastructure physique ou cloud peut compromettre même l'application logicielle la mieux conçue du monde.",[1126],{"start":50,"end":249,"type":251},{"type":261,"text":1128,"spans":1129,"direction":137},"Ce que ça change : Un environnement cloud sécurisé garantit le déploiement à plus grande échelle, la résilience et une protection contre les menaces systémiques.",[1130],{"start":50,"end":683,"type":251},{"type":261,"text":1132,"spans":1133,"direction":137},"Ce qu'il faut exiger : Exigez la transparence sur la localisation géographique des données (enjeu de souveraineté), l'identité des prestataires cloud utilisés et la solidité des mesures de sauvegarde et de reprise.",[1134],{"start":50,"end":688,"type":251},{"type":134,"text":1136,"spans":1137,"direction":137},"Votre DSI s'attend à ce que l'éditeur s'appuie sur des leaders du cloud et des architectures de pointe. Autant anticiper ce besoin de réassurance et arriver avec des garanties solides.",[],{"type":656,"text":1139,"spans":1140,"direction":137},"7. La confidentialité des données et le contrôle utilisateur (Privacy by design)",[],{"type":134,"text":1142,"spans":1143,"direction":137},"Les fonctionnalités liées à la confidentialité permettent aux entreprises de maîtriser la façon dont les données des apprenants sont collectées, stockées, conservées et supprimées. Cela inclut la capacité à gérer facilement les droits des collaborateurs sur leurs données, un point particulièrement surveillé par les régulateurs. Cet enjeu est doublement stratégique si vous utilisez votre LMS pour former des collaborateurs externes (clients, partenaires, franchisés, ce qu'on appelle l'Extended Enterprise).",[1144,1242],{"start":1145,"end":1146,"type":144,"data":1147},31,46,{"id":1148,"type":147,"tags":1149,"lang":6,"slug":1150,"first_publication_date":1151,"last_publication_date":1152,"uid":1153,"data":1154,"link_type":114,"isBroken":116},"Z8hWDBAAACMA8JnR",[],"accessibilite--amelioration-de-la-conformite-de-nos-contenus-web-aux-normes-wcag-2.1-aa","2025-03-17T17:38:09+0000","2025-06-23T12:42:45+0000","conformite-aux-normes-wcag-2.1-niveau-aa",{"thumbnail":1155,"article_type":40,"category":1178,"title":1186,"duration":747,"author":1190,"description":1219,"tags":1223},{"dimensions":1156,"alt":47,"copyright":47,"url":1157,"id":1158,"edit":1159,"tile":1160,"featured":1165,"header":1170,"details":1173},{"width":44,"height":45},"https://images.prismic.io/360learning/Z8hUxRsAHJWomJFP_Cover.png?auto=format%2Ccompress&w=1080&h=560","Z8hUxRsAHJWomJFP",{"x":50,"y":50,"zoom":52,"background":53},{"dimensions":1161,"alt":47,"copyright":47,"url":1162,"id":1158,"edit":1163},{"width":56,"height":57},"https://images.prismic.io/360learning/Z8hUxRsAHJWomJFP_Cover.png?auto=format%2Ccompress&rect=550%2C0%2C1005%2C1120&w=375&h=418",{"x":1164,"y":50,"zoom":52,"background":53},550,{"dimensions":1166,"alt":47,"copyright":47,"url":1167,"id":1158,"edit":1168},{"width":63,"height":64},"https://images.prismic.io/360learning/Z8hUxRsAHJWomJFP_Cover.png?auto=format%2Ccompress&rect=508%2C0%2C982%2C1120&w=500&h=570",{"x":1169,"y":50,"zoom":52,"background":53},508,{"dimensions":1171,"alt":47,"copyright":47,"url":1157,"id":1158,"edit":1172},{"width":44,"height":45},{"x":50,"y":50,"zoom":52,"background":53},{"dimensions":1174,"alt":47,"copyright":47,"url":1175,"id":1158,"edit":1176},{"width":73,"height":74},"https://images.prismic.io/360learning/Z8hUxRsAHJWomJFP_Cover.png?auto=format%2Ccompress&rect=30%2C0%2C2100%2C1120&w=150&h=80",{"x":1177,"y":50,"zoom":52,"background":53},30,{"id":1179,"type":120,"tags":1180,"lang":6,"slug":1181,"first_publication_date":1182,"last_publication_date":1182,"uid":1181,"data":1183,"link_type":114,"key":1185,"isBroken":116},"Yd1kOxEAACMAr-Nu",[],"actualite","2022-01-11T11:04:31+0000",{"name":1184},"Actualité","8c7b16a5-d4da-4244-b9d3-6a37d8ced438",[1187],{"type":192,"text":1188,"spans":1189,"direction":137},"Accessibilité : amélioration de la conformité de nos contenus web aux normes WCAG 2.1 AA",[],{"id":1191,"type":108,"tags":1192,"lang":6,"slug":1193,"first_publication_date":1194,"last_publication_date":1195,"uid":1193,"data":1196,"link_type":114,"key":1218,"isBroken":116},"YzQGVRcAAC4ATshY",[],"athenais-fofana-blanco","2022-09-28T08:31:22+0000","2025-07-23T13:51:36+0000",{"name":1197,"job":1198,"portrait":1199},"Athénaïs Fofana-Blanco","Product Marketing Associate, 360Learning",{"dimensions":1200,"alt":1202,"copyright":47,"url":1203,"id":1204,"edit":1205,"tile":1206,"header":1210,"xl":1214},{"width":1201,"height":1201},480,"Athenaïs Fofana Blanco","https://images.prismic.io/360learning/aIDo1VGsbswqTLSU_fr-photo-athenais-fofana-blanco.png?auto=format,compress","aIDo1VGsbswqTLSU",{"x":50,"y":50,"zoom":52,"background":53},{"dimensions":1207,"alt":1202,"copyright":47,"url":1208,"id":1204,"edit":1209},{"width":91,"height":91},"https://images.prismic.io/360learning/aIDo1VGsbswqTLSU_fr-photo-athenais-fofana-blanco.png?auto=format,compress&rect=0,0,480,480&w=36&h=36",{"x":50,"y":50,"zoom":52,"background":53},{"dimensions":1211,"alt":1202,"copyright":47,"url":1212,"id":1204,"edit":1213},{"width":97,"height":97},"https://images.prismic.io/360learning/aIDo1VGsbswqTLSU_fr-photo-athenais-fofana-blanco.png?auto=format,compress&rect=0,0,480,480&w=65&h=65",{"x":50,"y":50,"zoom":52,"background":53},{"dimensions":1215,"alt":1202,"copyright":47,"url":1216,"id":1204,"edit":1217},{"width":103,"height":103},"https://images.prismic.io/360learning/aIDo1VGsbswqTLSU_fr-photo-athenais-fofana-blanco.png?auto=format,compress&rect=0,0,480,480&w=100&h=100",{"x":50,"y":50,"zoom":52,"background":53},"230c02d0-10b7-4a40-b1d5-74517419479b",[1220],{"type":134,"text":1221,"spans":1222,"direction":137},"Nous sommes ravis d'annoncer que nous sommes partiellement conformes à tous les critères des normes WCAG 2.1 Niveau AA.",[],[1224,1235],{"tag":1225},{"id":1226,"type":220,"tags":1227,"lang":6,"slug":1228,"first_publication_date":1229,"last_publication_date":1230,"uid":1231,"data":1232,"link_type":114,"key":1234,"isBroken":116},"YJuRaBIAACQAqur1",[],"rse-et-diversite","2021-05-12T08:27:24+0000","2022-03-24T14:59:22+0000","rse-diversite",{"label":1233},"RSE et diversité","eee4a2a1-fe3d-45d1-9abf-0f063e588187",{"tag":1236},{"id":1237,"type":220,"tags":1238,"lang":6,"slug":1181,"first_publication_date":1239,"last_publication_date":1239,"uid":1181,"data":1240,"link_type":114,"key":1241,"isBroken":116},"YPGBfBIAACQAXTVx",[],"2021-07-16T12:54:23+0000",{"label":1184},"ea146f87-bdcf-48e0-894e-d69eba14b4b5",{"start":1243,"end":1244,"type":625},488,507,{"type":134,"text":1246,"spans":1247,"direction":137},"Avoir la main sur ces paramètres aide les organisations à aligner l'usage du LMS avec leurs propres politiques internes de confidentialité et leurs obligations légales.",[],{"type":261,"text":1249,"spans":1250,"direction":137},"Pourquoi c'est important : Les réglementations (comme le RGPD) exigent toujours plus de transparence, de contrôle et de responsabilité concernant le traitement des données personnelles.",[1251],{"start":50,"end":249,"type":251},{"type":261,"text":1253,"spans":1254,"direction":137},"Ce que ça change : Des fonctionnalités claires de gestion des données minimisent les risques de non-conformité tout en renforçant le climat de confiance avec les apprenants.",[1255],{"start":50,"end":683,"type":251},{"type":261,"text":1257,"spans":1258,"direction":137},"Ce qu'il faut exiger : Demandez comment le LMS gère techniquement les durées de rétention, la suppression définitive des comptes et l'exercice des droits d'accès ou d'oubli directement depuis l'interface.",[1259],{"start":50,"end":688,"type":251},{"type":134,"text":1261,"spans":1262,"direction":137},"Côté apprenant, la transparence sur l'usage des données est un puissant levier de confiance. Côté L&D, c'est la garantie de déployer des initiatives de formation innovantes sans générer de risques juridiques masqués.",[],{"type":455,"text":1264,"spans":1265,"direction":137},"Comment 360Learning garantit la sécurité de son LMS",[],{"type":134,"text":1267,"spans":1268,"direction":137},"En tant que leader des plateformes LMS d'entreprise, la sécurité est inscrite au cœur même de la stratégie produit de 360Learning. Les grandes entreprises, même les plus décentralisées, peuvent ainsi déployer l'apprentissage collaboratif à grande échelle tout en satisfaisant aux exigences pointues des DSI, des équipes de sécurité et des responsables de la conformité.",[1269],{"start":1270,"end":1271,"type":144,"data":1272},12,51,{"id":1273,"type":1274,"tags":1275,"lang":6,"slug":1276,"first_publication_date":1277,"last_publication_date":1278,"link_type":114,"isBroken":116},"aSQ4LRIAACMACCiE","platform_overview",[],"platform-overview","2025-12-11T09:56:45+0000","2026-03-19T10:30:00+0000",{"type":134,"text":1280,"spans":1281,"direction":137},"La plateforme 360Learning a été pensée pour s'adapter aux structures organisationnelles complexes, aux utilisateurs répartis dans le monde entier et aux volumes massifs de données de formation sensibles. La sécurité est intégrée nativement à tous les niveaux — de l'infrastructure à la conception logicielle (security by design), en passant par nos processus opérationnels —, ce qui en fait une solution de confiance pour les environnements de travail des grands comptes.",[1282],{"start":1283,"end":1284,"type":625},309,327,{"type":134,"text":1286,"spans":1287,"direction":137},"En alliant une sécurité de niveau entreprise à la puissance du Collaborative Learning, 360Learning permet aux équipes Formation de déployer sereinement leurs initiatives stratégiques, tout en apportant à la DSI l'ensemble des garanties nécessaires pour valider et soutenir le projet.",[1288],{"start":474,"end":1289,"type":144,"data":1290},85,{"id":1291,"type":1292,"tags":1293,"lang":6,"slug":1294,"first_publication_date":1295,"last_publication_date":153,"link_type":114,"isBroken":116},"YBLUWxEAACgAbbRL","collaborative_learning_page",[],"collaborative-learning-page","2021-04-27T17:03:53+0000",{"type":455,"text":1297,"spans":1298,"direction":137},"Faites le choix d'un LMS performant et hautement sécurisé pour votre entreprise",[],{"type":134,"text":1300,"spans":1301,"direction":137},"Aujourd'hui, les plateformes de formation sont la colonne vertébrale du développement des compétences et du partage des connaissances en entreprise. C'est ce statut central qui fait de la sécurité d'un LMS une véritable priorité stratégique.",[],{"type":134,"text":1303,"spans":1304,"direction":137},"Pour les services de la formation, opter pour un LMS sécurisé ne se résume pas à cocher des cases pour éviter les risques : c'est le levier indispensable pour déployer à grande échelle, encourager la collaboration et asseoir sa crédibilité auprès des directions techniques.",[],{"type":134,"text":1306,"spans":1307,"direction":137},"En exigeant les bonnes fonctionnalités de cybersécurité, les entreprises protègent leurs données sensibles, assurent leur mise en conformité et bâtissent des fondations solides pour pérenniser le succès de leurs programmes pédagogiques.",[],[],"text$dfb7b9de-7af3-4efa-8503-f1698ec72153",{"primary":1311,"items":1312,"id":1313,"slice_type":1314,"slice_label":47},{},[],"subscription_banner$ae0cf559-f1ec-4b27-b981-daf3d0f091f8","subscription_banner",{"primary":1316,"items":1322,"id":1359,"slice_type":1360,"slice_label":47},{"is_ai_theme":116,"title":1317,"illustration":1321},[1318],{"type":455,"text":1319,"spans":1320,"direction":137},"Foire aux questions (FAQ) : La sécurité des LMS",[],{},[1323,1332,1341,1350],{"question":1324,"answer":1328},[1325],{"type":134,"text":1326,"spans":1327,"direction":137},"En quoi un LMS hautement sécurisé est-il un atout pour les services Formation ?",[],[1329],{"type":134,"text":1330,"spans":1331,"direction":137},"Un niveau de sécurité irréprochable accélère considérablement le processus d'achat et élimine les frictions habituelles avec la DSI. Cela permet aux responsables pédagogiques de se concentrer sur ce qui compte vraiment : l'impact de leurs formations, plutôt que sur la gestion des risques de sécurité.",[],{"question":1333,"answer":1337},[1334],{"type":134,"text":1335,"spans":1336,"direction":137},"Quels critères évaluer en priorité lors de l'audit de sécurité d'un LMS ?",[],[1338],{"type":134,"text":1339,"spans":1340,"direction":137},"Concentrez-vous sur ces piliers : le chiffrement des données, le contrôle des accès (RBAC, SSO), la conformité réglementaire (RGPD, ISO 27001), la traçabilité (logs d'audit), la solidité de l'infrastructure d'hébergement et la confidentialité des données. Exigez également de l'éditeur qu'il vous fournisse une documentation exhaustive et transparente pour chacun de ces points.",[],{"question":1342,"answer":1346},[1343],{"type":134,"text":1344,"spans":1345,"direction":137},"La plateforme 360Learning est-elle adaptée aux exigences des grandes entreprises ?",[],[1347],{"type":134,"text":1348,"spans":1349,"direction":137},"Absolument. 360Learning a été nativement conçue pour accompagner les organisations complexes et les grands comptes, avec des standards de sécurité et de gouvernance extrêmement élevés. Vous pouvez ainsi déployer vos programmes de formation à très grande échelle, sans jamais faire de compromis sur la sécurité ni sur la confidentialité des données de vos collaborateurs.",[],{"question":1351,"answer":1355},[1352],{"type":134,"text":1353,"spans":1354,"direction":137},"Comment 360Learning s'intègre-t-elle au système d'information et aux outils de gestion des identités existants ?",[],[1356],{"type":134,"text":1357,"spans":1358,"direction":137},"La plateforme prend en charge l'authentification unique (SSO) et s'interface de manière fluide avec les principaux fournisseurs d'identité du marché. Pour la DSI, cela simplifie amplement la gestion centralisée des accès tout en renforçant la sécurité globale du système.",[],"faq$dee66355-579f-458d-920e-872d803a1c06","faq",{"primary":1362,"items":1365,"id":1574,"slice_type":1575,"slice_label":47},{"title":1363,"cta_active":116,"cta_type":445,"cta_label":47,"cta_link":1364},[],{"link_type":645},[1366,1420,1496],{"resource":1367},{"id":705,"type":147,"tags":1368,"lang":6,"slug":707,"first_publication_date":708,"last_publication_date":709,"uid":710,"data":1369,"link_type":114,"key":1419,"isBroken":116},[],{"thumbnail":1370,"article_type":40,"category":1385,"title":1388,"duration":747,"author":1391,"description":1406,"tags":1410},{"dimensions":1371,"alt":714,"copyright":47,"url":715,"id":716,"edit":1372,"tile":1373,"featured":1376,"header":1379,"details":1382},{"width":44,"height":45},{"x":50,"y":718,"zoom":52,"background":53},{"dimensions":1374,"alt":714,"copyright":47,"url":721,"id":716,"edit":1375},{"width":56,"height":57},{"x":723,"y":50,"zoom":168,"background":53},{"dimensions":1377,"alt":714,"copyright":47,"url":726,"id":716,"edit":1378},{"width":63,"height":64},{"x":728,"y":50,"zoom":168,"background":53},{"dimensions":1380,"alt":714,"copyright":47,"url":731,"id":716,"edit":1381},{"width":44,"height":45},{"x":50,"y":733,"zoom":52,"background":53},{"dimensions":1383,"alt":714,"copyright":47,"url":736,"id":716,"edit":1384},{"width":73,"height":74},{"x":50,"y":738,"zoom":52,"background":53},{"id":183,"type":120,"tags":1386,"lang":6,"slug":185,"first_publication_date":186,"last_publication_date":186,"uid":185,"data":1387,"link_type":114,"key":742,"isBroken":116},[],{"name":188},[1389],{"type":192,"text":745,"spans":1390,"direction":137},[],{"id":749,"type":108,"tags":1392,"lang":6,"slug":751,"first_publication_date":752,"last_publication_date":753,"uid":751,"data":1393,"link_type":114,"key":775,"isBroken":116},[],{"name":755,"job":756,"portrait":1394},{"dimensions":1395,"alt":759,"copyright":47,"url":760,"id":761,"edit":1396,"tile":1397,"header":1400,"xl":1403},{"width":563,"height":563},{"x":50,"y":50,"zoom":52,"background":53},{"dimensions":1398,"alt":759,"copyright":47,"url":765,"id":761,"edit":1399},{"width":91,"height":91},{"x":50,"y":50,"zoom":52,"background":53},{"dimensions":1401,"alt":759,"copyright":47,"url":769,"id":761,"edit":1402},{"width":97,"height":97},{"x":50,"y":50,"zoom":52,"background":53},{"dimensions":1404,"alt":759,"copyright":47,"url":773,"id":761,"edit":1405},{"width":103,"height":103},{"x":50,"y":50,"zoom":52,"background":53},[1407],{"type":134,"text":778,"spans":1408,"direction":137},[1409],{"start":50,"end":781,"type":625},[1411,1415],{"tag":1412},{"id":785,"type":220,"tags":1413,"lang":6,"slug":787,"first_publication_date":788,"last_publication_date":788,"uid":787,"data":1414,"link_type":114,"key":791,"isBroken":116},[],{"label":790},{"tag":1416},{"id":590,"type":220,"tags":1417,"lang":6,"slug":592,"first_publication_date":593,"last_publication_date":593,"uid":592,"data":1418,"link_type":114,"key":796,"isBroken":116},[],{"label":595},"43cf6fde-150f-4077-8831-8271d92ad687",{"resource":1421},{"id":1422,"type":147,"tags":1423,"lang":6,"slug":1424,"first_publication_date":1425,"last_publication_date":1426,"uid":1427,"data":1428,"link_type":114,"key":1495,"isBroken":116},"aXdwSBAAACMAlJMo",[],"les-7-meilleures-plateformes-lms-pour-lonboarding-en-2026","2026-02-06T10:33:58+0000","2026-03-04T13:33:46+0000","meilleures-plateformes-lms-onboarding",{"thumbnail":1429,"article_type":40,"category":1454,"title":1458,"duration":1462,"author":1463,"tags":1479},{"dimensions":1430,"alt":1431,"copyright":47,"url":1432,"id":1433,"edit":1434,"tile":1436,"featured":1441,"header":1446,"details":1449},{"width":44,"height":45},"person holding black android smartphone","https://images.unsplash.com/photo-1605165566807-508fb529cf3e?crop=entropy&cs=srgb&fm=jpg&ixid=M3wzMzc0NjN8MHwxfHNlYXJjaHwxfHxvbmJvYXJkaW5nfGVufDB8fHx8MTc2OTQzNTYyMXww&ixlib=rb-4.1.0&q=85&rect=0,462,6240,3236&w=1080&h=560","xruML_FcCOk",{"x":50,"y":1435,"zoom":52,"background":53},462,{"dimensions":1437,"alt":1431,"copyright":47,"url":1438,"id":1433,"edit":1439},{"width":56,"height":57},"https://images.unsplash.com/photo-1605165566807-508fb529cf3e?crop=entropy&cs=srgb&fm=jpg&ixid=M3wzMzc0NjN8MHwxfHNlYXJjaHwxfHxvbmJvYXJkaW5nfGVufDB8fHx8MTc2OTQzNTYyMXww&ixlib=rb-4.1.0&q=85&rect=1254,0,3732,4160&w=375&h=418",{"x":1440,"y":50,"zoom":52,"background":53},1254,{"dimensions":1442,"alt":1431,"copyright":47,"url":1443,"id":1433,"edit":1444},{"width":63,"height":64},"https://images.unsplash.com/photo-1605165566807-508fb529cf3e?crop=entropy&cs=srgb&fm=jpg&ixid=M3wzMzc0NjN8MHwxfHNlYXJjaHwxfHxvbmJvYXJkaW5nfGVufDB8fHx8MTc2OTQzNTYyMXww&ixlib=rb-4.1.0&q=85&rect=1295,0,3649,4160&w=500&h=570",{"x":1445,"y":50,"zoom":52,"background":53},1295,{"dimensions":1447,"alt":1431,"copyright":47,"url":1432,"id":1433,"edit":1448},{"width":44,"height":45},{"x":50,"y":1435,"zoom":52,"background":53},{"dimensions":1450,"alt":1431,"copyright":47,"url":1451,"id":1433,"edit":1452},{"width":73,"height":74},"https://images.unsplash.com/photo-1605165566807-508fb529cf3e?crop=entropy&cs=srgb&fm=jpg&ixid=M3wzMzc0NjN8MHwxfHNlYXJjaHwxfHxvbmJvYXJkaW5nfGVufDB8fHx8MTc2OTQzNTYyMXww&ixlib=rb-4.1.0&q=85&rect=0,416,6240,3328&w=150&h=80",{"x":50,"y":1453,"zoom":52,"background":53},416,{"id":868,"type":120,"tags":1455,"lang":6,"slug":870,"first_publication_date":871,"last_publication_date":871,"uid":870,"data":1456,"link_type":114,"key":1457,"isBroken":116},[],{"name":873,"description":873},"b1609c55-a28f-4dbd-8d6a-fffae047beae",[1459],{"type":192,"text":1460,"spans":1461,"direction":137},"Les 7 meilleures plateformes LMS pour l’onboarding en 2026",[],7,{"id":107,"type":108,"tags":1464,"lang":6,"slug":110,"first_publication_date":111,"last_publication_date":112,"uid":110,"data":1465,"link_type":114,"key":1478,"isBroken":116},[],{"name":79,"job":80,"portrait":1466},{"dimensions":1467,"alt":85,"copyright":47,"url":86,"id":87,"edit":1468,"tile":1469,"header":1472,"xl":1475},{"width":83,"height":84},{"x":50,"y":50,"zoom":52,"background":53},{"dimensions":1470,"alt":85,"copyright":47,"url":92,"id":87,"edit":1471},{"width":91,"height":91},{"x":50,"y":50,"zoom":94,"background":53},{"dimensions":1473,"alt":85,"copyright":47,"url":98,"id":87,"edit":1474},{"width":97,"height":97},{"x":50,"y":50,"zoom":100,"background":53},{"dimensions":1476,"alt":85,"copyright":47,"url":104,"id":87,"edit":1477},{"width":103,"height":103},{"x":50,"y":50,"zoom":106,"background":53},"3e75ecec-a922-43c3-a74b-4cc40bcccebb",[1480,1485,1490],{"tag":1481},{"id":917,"type":220,"tags":1482,"lang":6,"slug":870,"first_publication_date":919,"last_publication_date":919,"uid":870,"data":1483,"link_type":114,"key":1484,"isBroken":116},[],{"label":873},"758ed728-a523-4063-860d-d52572c93b9f",{"tag":1486},{"id":219,"type":220,"tags":1487,"lang":6,"slug":222,"first_publication_date":223,"last_publication_date":223,"uid":222,"data":1488,"link_type":114,"key":1489,"isBroken":116},[],{"label":222},"cd21d6b0-ade7-401b-a2bf-adf6beda6b80",{"tag":1491},{"id":785,"type":220,"tags":1492,"lang":6,"slug":787,"first_publication_date":788,"last_publication_date":788,"uid":787,"data":1493,"link_type":114,"key":1494,"isBroken":116},[],{"label":790},"c599ca90-dd07-43b8-9883-b882b4b9c398","994bd39a-a3d8-45dd-b752-fca515192a2e",{"resource":1497},{"id":1498,"type":147,"tags":1499,"lang":6,"slug":1500,"first_publication_date":1501,"last_publication_date":1502,"uid":1503,"data":1504,"link_type":114,"key":1573,"isBroken":116},"aSa31xIAACIAC8UW",[],"les-7-meilleures-plateformes-lms-finance-en-2026","2025-11-26T09:46:47+0000","2026-03-17T16:16:30+0000","lms-finance",{"thumbnail":1505,"article_type":40,"category":1528,"title":1532,"duration":1536,"author":1537,"description":1553,"tags":1557},{"dimensions":1506,"alt":47,"copyright":47,"url":1507,"id":1508,"edit":1509,"tile":1511,"featured":1516,"header":1521,"details":1524},{"width":44,"height":45},"https://images.prismic.io/360learning/f55ed13d-fda1-4891-a4a6-a9e805b1ec2e_blog-en-photo-number-seven.jpg?auto=format%2Ccompress&rect=0%2C292%2C3872%2C2008&w=1080&h=560","Y_XSWBAAACEA4cqx",{"x":50,"y":1510,"zoom":52,"background":53},292,{"dimensions":1512,"alt":47,"copyright":47,"url":1513,"id":1508,"edit":1514},{"width":56,"height":57},"https://images.prismic.io/360learning/f55ed13d-fda1-4891-a4a6-a9e805b1ec2e_blog-en-photo-number-seven.jpg?auto=format%2Ccompress&rect=773%2C0%2C2325%2C2592&w=375&h=418",{"x":1515,"y":50,"zoom":52,"background":53},773,{"dimensions":1517,"alt":47,"copyright":47,"url":1518,"id":1508,"edit":1519},{"width":63,"height":64},"https://images.prismic.io/360learning/f55ed13d-fda1-4891-a4a6-a9e805b1ec2e_blog-en-photo-number-seven.jpg?auto=format%2Ccompress&rect=799%2C0%2C2274%2C2592&w=500&h=570",{"x":1520,"y":50,"zoom":52,"background":53},799,{"dimensions":1522,"alt":47,"copyright":47,"url":1507,"id":1508,"edit":1523},{"width":44,"height":45},{"x":50,"y":1510,"zoom":52,"background":53},{"dimensions":1525,"alt":47,"copyright":47,"url":1526,"id":1508,"edit":1527},{"width":73,"height":74},"https://images.prismic.io/360learning/f55ed13d-fda1-4891-a4a6-a9e805b1ec2e_blog-en-photo-number-seven.jpg?auto=format%2Ccompress&rect=0%2C263%2C3872%2C2065&w=150&h=80",{"x":50,"y":507,"zoom":52,"background":53},{"id":119,"type":120,"tags":1529,"lang":6,"slug":123,"first_publication_date":124,"last_publication_date":125,"uid":123,"data":1530,"link_type":114,"key":1531,"isBroken":116},[122],{"name":118},"f91ba02f-1015-4909-98b1-f830a641b567",[1533],{"type":192,"text":1534,"spans":1535,"direction":137},"Les 7 meilleures plateformes LMS finance en 2026",[],5,{"id":107,"type":108,"tags":1538,"lang":6,"slug":110,"first_publication_date":111,"last_publication_date":112,"uid":110,"data":1539,"link_type":114,"key":1552,"isBroken":116},[],{"name":79,"job":80,"portrait":1540},{"dimensions":1541,"alt":85,"copyright":47,"url":86,"id":87,"edit":1542,"tile":1543,"header":1546,"xl":1549},{"width":83,"height":84},{"x":50,"y":50,"zoom":52,"background":53},{"dimensions":1544,"alt":85,"copyright":47,"url":92,"id":87,"edit":1545},{"width":91,"height":91},{"x":50,"y":50,"zoom":94,"background":53},{"dimensions":1547,"alt":85,"copyright":47,"url":98,"id":87,"edit":1548},{"width":97,"height":97},{"x":50,"y":50,"zoom":100,"background":53},{"dimensions":1550,"alt":85,"copyright":47,"url":104,"id":87,"edit":1551},{"width":103,"height":103},{"x":50,"y":50,"zoom":106,"background":53},"791b020c-8c41-4495-8705-225613f38c76",[1554],{"type":134,"text":1555,"spans":1556,"direction":137},"Un comparatif des meilleures plateformes LMS finance et de leurs fonctionnalités, pour choisir la solution la plus adaptée",[],[1558,1563,1568],{"tag":1559},{"id":219,"type":220,"tags":1560,"lang":6,"slug":222,"first_publication_date":223,"last_publication_date":223,"uid":222,"data":1561,"link_type":114,"key":1562,"isBroken":116},[],{"label":222},"50f9e544-b039-4918-80e6-244d42cd3a7b",{"tag":1564},{"id":590,"type":220,"tags":1565,"lang":6,"slug":592,"first_publication_date":593,"last_publication_date":593,"uid":592,"data":1566,"link_type":114,"key":1567,"isBroken":116},[],{"label":595},"9607979c-3021-4dfe-bec2-7ac7d7fcda32",{"tag":1569},{"id":785,"type":220,"tags":1570,"lang":6,"slug":787,"first_publication_date":788,"last_publication_date":788,"uid":787,"data":1571,"link_type":114,"key":1572,"isBroken":116},[],{"label":790},"1d62e018-a5a7-4a8f-b741-e1af3b6ed0c0","bae3f08f-09c0-4397-9e53-915d34e39e9f","similar_resources$fba40c61-0fd1-400d-9751-14f2445e9ae5","similar_resources",{"primary":1577,"items":1578,"id":1579,"slice_type":1580,"slice_label":47},{},[],"tags_section$606521b9-461d-448e-927b-5c1fcdfea94f","tags_section",{"primary":1582,"items":1583,"id":1584,"slice_type":1314,"slice_label":47},{},[],"subscription_banner$372304f4-6349-4ed6-bfeb-f74075e58e9e",[1586,1590],{"id":219,"type":220,"tags":1587,"lang":6,"slug":222,"first_publication_date":223,"last_publication_date":223,"uid":222,"data":1588,"link_type":114,"key":1589,"isBroken":116},[],{"label":222},"10b61df8-860f-4cc3-b1d6-1fd8e87ae61e",{"id":1591,"type":220,"tags":1592,"lang":6,"slug":1593,"first_publication_date":1594,"last_publication_date":1594,"uid":1593,"data":1595,"link_type":114,"key":1597,"isBroken":116},"YmwBbxEAACIAr4Qn",[],"digitalisation","2022-04-29T15:17:08+0000",{"label":1596},"Digitalisation","7f8cf27d-7ece-437c-87df-cc9f81d547bf",1776341257261]