{"id":3274,"date":"2022-06-15T11:05:51","date_gmt":"2022-06-15T11:05:51","guid":{"rendered":"https:\/\/locaterisk.com\/?p=3274"},"modified":"2025-08-08T07:27:48","modified_gmt":"2025-08-08T07:27:48","slug":"schatten-it","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/fr\/schatten-it\/","title":{"rendered":"Shadow IT : comment d\u00e9tecter les syst\u00e8mes cach\u00e9s"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Retour au blog                <a href=\"https:\/\/locaterisk.com\/fr\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\"><strong><strong>Shadow IT : comment d\u00e9tecter les syst\u00e8mes cach\u00e9s<\/strong><\/strong><\/h1>\r\n            <p class=\"paragraph\">La direction des syst\u00e8mes d'informations ne peut prot\u00e9ger que ce qu'il conna\u00eet. Les syst\u00e8mes non r\u00e9pertori\u00e9s repr\u00e9sentent donc un risque de s\u00e9curit\u00e9 incalculable. La bonne nouvelle, c'est qu'un inventaire automatis\u00e9 permet de d\u00e9tecter en un clin d'\u0153il ce que l'on appelle le Shadow IT.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"478\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/Schatten-IT_\u00dcberwachungskamera-1024x478.png\" alt=\"\" class=\"wp-image-3278\" srcset=\"\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" data-srcset=\"\" \/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Qu'est-ce que le Shadow IT ?<\/strong><\/h3>\n\n\n\n<p>Le Shadow IT comprend tous les syst\u00e8mes informatiques tels que les applications, les logiciels du cloud, les appareils en r\u00e9seau, etc. qui existent en dehors de l'infrastructure informatique officielle d'une entreprise et \u00e0 l'insu du service informatique. Il peut s'agir d'applications Software as a Service (SaaS) utilis\u00e9es par des collaborateurs sans l'autorisation de la direction informatique ou d'anciens sites web oubli\u00e9s et qui devraient \u00eatre d\u00e9sactiv\u00e9s depuis longtemps. Les plates-formes de productivit\u00e9 et de collaboration install\u00e9es de mani\u00e8re arbitraire en font \u00e9galement partie, dans la mesure o\u00f9 elles ne sont pas soumises au contr\u00f4le de la direction informatique.&nbsp;<\/p>\n\n\n\n<p>Les syst\u00e8mes non r\u00e9pertori\u00e9s contribuent consid\u00e9rablement \u00e0 la surface d'attaque de l'infrastructure informatique d'une entreprise. Ils ne sont pas pris en compte dans les mesures de protection et de sauvegarde, car le service informatique n'a pas conscience de leur existence.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Exemples de Shadow IT<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Appareils physiques : <\/strong>les appareils personnels non surveill\u00e9s sur le r\u00e9seau de l'entreprise, comme les smartphones ainsi que les appareils connect\u00e9s au r\u00e9seau domestique dans le bureau \u00e0 domicile et les appareils IOT (par exemple les cam\u00e9ras de surveillance dans les usines, etc.)<\/li>\n\n\n\n<li><strong>Stockage dans le cloud:<\/strong> Par exemple Google Drive, Dropbox, ...<\/li>\n\n\n\n<li><strong>Applications de productivit\u00e9 : <\/strong>Par exemple Trello, Asana, wrike, Monday.com, ...<\/li>\n\n\n\n<li><strong>les applications de collaboration ou de messagerie : <\/strong>Par exemple Whatsapp sur les t\u00e9l\u00e9phones portables de l'entreprise ou des applications de collaboration comme Microsoft Teams, Zoom, Google Meet, ...<\/li>\n<\/ul>\n\n\n\n<p>Comme les administrateurs informatiques ne connaissent g\u00e9n\u00e9ralement pas l'\u00e9tendue du Shadow IT \u00e0 l'\u00e9chelle de l'entreprise, ils ne peuvent pas non plus l'entretenir, et encore moins le prot\u00e9ger. Les syst\u00e8mes restent sans surveillance dans l'infrastructure informatique et constituent une porte d'entr\u00e9e bienvenue pour les cybercriminels.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Quel est l'impact du Shadow IT sur la s\u00e9curit\u00e9 du r\u00e9seau ?<\/strong><\/h3>\n\n\n\n<p>Quiconque s'active de temps \u00e0 autre et installe lui-m\u00eame un programme, une imprimante, une webcam, etc. pour des raisons de rapidit\u00e9, peut imaginer ce que les syst\u00e8mes non r\u00e9pertori\u00e9s peuvent accumuler au fil des ans dans une organisation comptant plusieurs centaines ou milliers de collaborateurs. Chaque compte qu'un collaborateur cr\u00e9e avec son adresse \u00e9lectronique d'entreprise ouvre un nouveau point d'acc\u00e8s au r\u00e9seau. Les mots de passe sont souvent utilis\u00e9s \u00e0 plusieurs reprises, ce qui facilite la t\u00e2che des pirates. Chaque appareil externe qui se connecte \u00e0 votre r\u00e9seau est un point d'acc\u00e8s. Tant que ces appareils ne sont pas r\u00e9pertori\u00e9s par l'\u00e9quipe informatique, ils ne sont pas non plus surveill\u00e9s.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><b><strong><strong>Comment d\u00e9tecter le Shadow IT dans votre r\u00e9seau<\/strong><\/strong><\/b><\/h3>\n\n\n\n<p>Des vecteurs d'attaque ou des points d'entr\u00e9e qui ne sont m\u00eame pas connus de votre service informatique peuvent \u00eatre la chose la plus triviale qui soit et, dans le pire des cas, faire tomber toute votre infrastructure informatique entre les mains de criminels informatiques.&nbsp;<\/p>\n\n\n\n<p>Une analyse des points faibles permet de d\u00e9tecter en un temps record le \"Shadow IT\" tant redout\u00e9. La premi\u00e8re \u00e9tape consiste \u00e0 identifier et \u00e0 inventorier les syst\u00e8mes accessibles via Internet \u00e0 l'aide de leurs adresses IP. L'\u00e9tape suivante consiste \u00e0 v\u00e9rifier la s\u00e9curit\u00e9 informatique.<\/p>\n\n\n\n<p>Nous sommes nous-m\u00eames toujours surpris de ce que nous trouvons sur les Reseau de nos clients - par exemple des appareils IOT comme la cam\u00e9ra de surveillance de l'usine d'un sous-traitant automobile qui a transmis des images du prototype sur l'Internet. Ou encore des anciens sites web non patch\u00e9s que plus personne ne conna\u00eet, mais qui sont toujours accessibles de l'ext\u00e9rieur. Des applications de d\u00e9veloppement et des r\u00e9pertoires GIT accessibles au public par inadvertance font \u00e9galement souvent leur apparition.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"963\" height=\"1024\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/IT-Inventarbericht-963x1024.png\" alt=\"\" class=\"wp-image-3289\" style=\"width:548px;height:583px\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/IT-Inventarbericht-963x1024.png 963w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/IT-Inventarbericht-282x300.png 282w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/IT-Inventarbericht-768x817.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/IT-Inventarbericht-11x12.png 11w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/IT-Inventarbericht.png 1080w\" sizes=\"auto, (max-width: 963px) 100vw, 963px\" \/><figcaption class=\"wp-element-caption\">Rapport de d\u00e9monstration LocateRisk d'un inventaire informatique<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\"><b><strong>Conclusion<\/strong><\/b><\/h3>\n\n\n\n<p>La premi\u00e8re \u00e9tape dans la gestion du Shadow IT consiste \u00e0 savoir qu'il existe. Un inventaire informatique automatis\u00e9 permet d'obtenir en tr\u00e8s peu de temps la vue d'ensemble n\u00e9cessaire. Ignorer et ne pas savoir n'est pas une alternative. Si vous avez un aper\u00e7u de vos syst\u00e8mes et de leur \u00e9tat de s\u00e9curit\u00e9, vous pouvez prendre des mesures pour reduire ces Vulnerabilit\u00e9s.<\/p>\n\n\n\n<p>Pour les entreprises qui souhaitent avoir une vue d'ensemble de leurs \u00e9quipements et syst\u00e8mes r\u00e9seau existants : Un inventaire informatique LocateRisk est gratuit et se fait en moins de 5 minutes.<br>Il suffit d'envoyer un e-mail \u00e0 <a href=\"mailto:em@LocateRisk.com\">em@LocateRisk.com<\/a> envoyer.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Demandez maintenant une D\u00e9mo en direct personelle<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identifiez et r\u00e9duisez vos cyber-risques gr\u00e2ce \u00e0 un aper\u00e7u comparable et compr\u00e9hensible de votre s\u00e9curit\u00e9 informatique. Demandez conseil \u00e0 nos experts et d\u00e9couvrez comment LocateRisk peut vous aider \u00e0 r\u00e9soudre vos cyber-risques.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"schatten-it\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"Pr\u00e9nom\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"Nom\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Courrier \u00e9lectronique\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"T\u00e9l\u00e9phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">Je suis d'accord avec la politique de confidentialit\u00e9<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Demander une d\u00e9mo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>En savoir plus, r\u00e9server une d\u00e9mo ou simplement \u00e9changer quelques mots ? Nous nous en r\u00e9jouissons !<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Votre Contact<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">PDG<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Contactez-nous maintenant<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/fr\/\">Accueil<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/about\/\">par rapport \u00e0 nous<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/impressum\/\">mentiones l\u00e9gales<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/datenschutz\/\">Confidentialit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/agb.pdf\">CONDITIONS G\u00c9N\u00c9RALES DE VENTE<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/jobs\/\">Carri\u00e8re<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">s\u00e9curit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Centre de confiance<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Les syst\u00e8mes oubli\u00e9s dans le r\u00e9seau d'entreprise deviennent rapidement une porte d'entr\u00e9e pour les pirates. D\u00e9couvrez ce qu'est le Shadow IT et comment d\u00e9tecter ces syst\u00e8mes sans effort. <\/p>","protected":false},"author":8,"featured_media":3278,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[28],"class_list":["post-3274","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-schatten-it"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Schatten-IT: So sp\u00fcren Sie verborgene Systeme auf - LocateRisk<\/title>\n<meta name=\"description\" content=\"Vergessene Systeme im Unternehmensnetzwerk werden schnell zum Eintrittstor f\u00fcr Angreifer. Erfahren Sie was genau Schatten-IT ist und wie Sie die Systeme m\u00fchelos aufsp\u00fcren.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/fr\/schatten-it\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Schatten-IT: So sp\u00fcren Sie verborgene Systeme auf - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Vergessene Systeme im Unternehmensnetzwerk werden schnell zum Eintrittstor f\u00fcr Angreifer. Erfahren Sie was genau Schatten-IT ist und wie Sie die Systeme m\u00fchelos aufsp\u00fcren.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/fr\/schatten-it\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-15T11:05:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T07:27:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/Schatten-IT_U\u0308berwachungskamera.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"504\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kristina Breuer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristina Breuer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/\"},\"author\":{\"name\":\"Kristina Breuer\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\"},\"headline\":\"Schatten-IT: So sp\u00fcren Sie verborgene Systeme auf\",\"datePublished\":\"2022-06-15T11:05:51+00:00\",\"dateModified\":\"2025-08-08T07:27:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/\"},\"wordCount\":747,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Schatten-IT_U\u0308berwachungskamera.png\",\"keywords\":[\"Schatten-IT\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/\",\"name\":\"Schatten-IT: So sp\u00fcren Sie verborgene Systeme auf - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Schatten-IT_U\u0308berwachungskamera.png\",\"datePublished\":\"2022-06-15T11:05:51+00:00\",\"dateModified\":\"2025-08-08T07:27:48+00:00\",\"description\":\"Vergessene Systeme im Unternehmensnetzwerk werden schnell zum Eintrittstor f\u00fcr Angreifer. Erfahren Sie was genau Schatten-IT ist und wie Sie die Systeme m\u00fchelos aufsp\u00fcren.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Schatten-IT_U\u0308berwachungskamera.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Schatten-IT_U\u0308berwachungskamera.png\",\"width\":1080,\"height\":504,\"caption\":\"Quelle: shutterstock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Schatten-IT: So sp\u00fcren Sie verborgene Systeme auf\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\",\"name\":\"Kristina Breuer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"caption\":\"Kristina Breuer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Shadow IT : Comment d\u00e9tecter les syst\u00e8mes cach\u00e9s - LocateRisk","description":"Les syst\u00e8mes oubli\u00e9s dans le r\u00e9seau d'entreprise deviennent rapidement une porte d'entr\u00e9e pour les pirates. D\u00e9couvrez ce qu'est exactement le Shadow IT et comment d\u00e9tecter ces syst\u00e8mes sans effort.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/fr\/schatten-it\/","og_locale":"fr_FR","og_type":"article","og_title":"Schatten-IT: So sp\u00fcren Sie verborgene Systeme auf - LocateRisk","og_description":"Vergessene Systeme im Unternehmensnetzwerk werden schnell zum Eintrittstor f\u00fcr Angreifer. Erfahren Sie was genau Schatten-IT ist und wie Sie die Systeme m\u00fchelos aufsp\u00fcren.","og_url":"https:\/\/locaterisk.com\/fr\/schatten-it\/","og_site_name":"LocateRisk","article_published_time":"2022-06-15T11:05:51+00:00","article_modified_time":"2025-08-08T07:27:48+00:00","og_image":[{"width":1080,"height":504,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/Schatten-IT_U\u0308berwachungskamera.png","type":"image\/png"}],"author":"Kristina Breuer","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Kristina Breuer","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/schatten-it\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/schatten-it\/"},"author":{"name":"Kristina Breuer","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d"},"headline":"Schatten-IT: So sp\u00fcren Sie verborgene Systeme auf","datePublished":"2022-06-15T11:05:51+00:00","dateModified":"2025-08-08T07:27:48+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/schatten-it\/"},"wordCount":747,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/schatten-it\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/Schatten-IT_U\u0308berwachungskamera.png","keywords":["Schatten-IT"],"articleSection":["Blog post"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/schatten-it\/","url":"https:\/\/locaterisk.com\/schatten-it\/","name":"Shadow IT : Comment d\u00e9tecter les syst\u00e8mes cach\u00e9s - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/schatten-it\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/schatten-it\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/Schatten-IT_U\u0308berwachungskamera.png","datePublished":"2022-06-15T11:05:51+00:00","dateModified":"2025-08-08T07:27:48+00:00","description":"Les syst\u00e8mes oubli\u00e9s dans le r\u00e9seau d'entreprise deviennent rapidement une porte d'entr\u00e9e pour les pirates. D\u00e9couvrez ce qu'est exactement le Shadow IT et comment d\u00e9tecter ces syst\u00e8mes sans effort.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/schatten-it\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/schatten-it\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/schatten-it\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/Schatten-IT_U\u0308berwachungskamera.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/Schatten-IT_U\u0308berwachungskamera.png","width":1080,"height":504,"caption":"Quelle: shutterstock"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/schatten-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Schatten-IT: So sp\u00fcren Sie verborgene Systeme auf"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Mesurer et comparer la s\u00e9curit\u00e9 informatique","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d","name":"Kristina Breuer","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","caption":"Kristina Breuer"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/3274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/comments?post=3274"}],"version-history":[{"count":47,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/3274\/revisions"}],"predecessor-version":[{"id":6308,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/3274\/revisions\/6308"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media\/3278"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media?parent=3274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/categories?post=3274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/tags?post=3274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}