{"id":38883,"date":"2020-07-01T16:41:25","date_gmt":"2020-07-01T15:41:25","guid":{"rendered":"https:\/\/powell-software.com\/?p=38883"},"modified":"2026-02-03T18:57:51","modified_gmt":"2026-02-03T16:57:51","slug":"shadow-it-informatique-entreprise","status":"publish","type":"post","link":"https:\/\/powell-software.com\/fr\/resources\/blog\/shadow-it-informatique-entreprise\/","title":{"rendered":"Shadow IT : Reprendre le contr\u00f4le sans brider l&#8217;innovation"},"content":{"rendered":"<div style=\"font-family: 'Lexend', sans-serif; line-height: 1.7; color: #003c49; font-size: 16.5px;\">\r\n<h2 style=\"margin: 40px 0 14px 0; font-size: 30px; line-height: 1.3; font-weight: 800; color: #003c49; border-left: 6px solid #e55393; padding-left: 12px;\">1. Le Shadow IT : un ph\u00e9nom\u00e8ne invisible mais omnipr\u00e9sent<\/h2>\r\n<h3 style=\"margin: 24px 0 8px 0; font-size: 22px; font-weight: bold; color: #004f5a;\">D\u00e9finition et ampleur<\/h3>\r\n<p style=\"margin: 0 0 18px 0;\">Le Shadow IT, selon Gartner, d\u00e9signe \u00ab les dispositifs, logiciels et services informatiques en dehors de la propri\u00e9t\u00e9 ou du contr\u00f4le des organisations informatiques \u00bb. Il s&#8217;agit de <strong style=\"color: #003c49; font-weight: 600;\">solutions cloud, applications SaaS et syst\u00e8mes d&#8217;informations<\/strong> d\u00e9ploy\u00e9s sans validation des \u00e9quipes IT. L&#8217;entreprise moyenne poss\u00e8de <strong style=\"color: #003c49; font-weight: 600;\">975 services cloud inconnus<\/strong> contre seulement 108 services cloud utilis\u00e9s officiellement. Plus alarmant : <strong style=\"color: #003c49; font-weight: 600;\">42% des applications d&#8217;une entreprise<\/strong> r\u00e9sultent du recours au Shadow IT.<\/p>\r\n\r\n<div style=\"background: #fff8e1; border-left: 5px solid #ffe350; padding: 18px 22px; border-radius: 8px; margin: 22px 0;\">\r\n<p style=\"margin: 0;\">Les exemples de solutions cloud non autoris\u00e9es sont nombreux : Dropbox personnel, outils de gestion de projet comme Trello, ou messageries comme WhatsApp pour des communications professionnelles.<\/p>\r\n\r\n<\/div>\r\n<h3 style=\"margin: 24px 0 8px 0; font-size: 22px; font-weight: bold; color: #004f5a;\">Les chiffres r\u00e9v\u00e9lateurs<\/h3>\r\n<div style=\"display: grid; grid-template-columns: repeat(auto-fit, minmax(200px, 1fr)); gap: 20px; margin: 30px 0;\">\r\n<div style=\"background: white; padding: 20px; border-radius: 8px; box-shadow: 0 2px 8px rgba(0,0,0,0.1);\"><strong style=\"color: #003c49; display: block; margin-bottom: 8px; font-size: 24px;\">39%<\/strong> <span style=\"color: #555;\">des employ\u00e9s utilisent des applications non g\u00e9r\u00e9es (source : Dashlane)<\/span><\/div>\r\n<div style=\"background: white; padding: 20px; border-radius: 8px; box-shadow: 0 2px 8px rgba(0,0,0,0.1);\"><strong style=\"color: #003c49; display: block; margin-bottom: 8px; font-size: 24px;\">30 \u00e0 40%<\/strong> <span style=\"color: #555;\">des d\u00e9penses IT totales li\u00e9 au shadow IT (source : Gartner)<\/span><\/div>\r\n<\/div>\r\n<p style=\"margin: 0 0 18px 0;\"><strong style=\"color: #003c49; font-weight: 600;\">65% des applications SaaS<\/strong> non sanctionn\u00e9es sont adopt\u00e9es sans approbation IT. Le gaspillage annuel en licences inutilis\u00e9es atteint <strong style=\"color: #003c49; font-weight: 600;\">34 milliards de dollars<\/strong> entre les \u00c9tats-Unis et le Royaume-Uni.<\/p>\r\n\r\n<h3 style=\"margin: 24px 0 8px 0; font-size: 22px; font-weight: bold; color: #004f5a;\">Les motivations des employ\u00e9s<\/h3>\r\n<p style=\"margin: 0 0 18px 0;\"><strong style=\"color: #003c49; font-weight: 600;\">91% des \u00e9quipes<\/strong> se sentent sous pression pour prioriser les op\u00e9rations plut\u00f4t que la s\u00e9curit\u00e9. Les <strong style=\"color: #003c49; font-weight: 600;\">d\u00e9lais IT lents<\/strong> poussent 38% des employ\u00e9s vers le recours au Shadow IT, et 61% ne sont pas satisfaits des technologies fournies.<span style=\"color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px;\"> Cette insatisfaction, combin\u00e9e \u00e0 la facilit\u00e9 d&#8217;acc\u00e8s aux nouvelles technologies SaaS et aux solutions cloud, cr\u00e9e un large espace pour l&#8217;adoption d&#8217;outils non autoris\u00e9s.<\/span><\/p>\r\n\r\n<\/div>\r\n<div style=\"font-family: 'Lexend', sans-serif; line-height: 1.7; color: #003c49; font-size: 16.5px;\">\r\n<h2 style=\"margin: 40px 0 14px 0; font-size: 30px; line-height: 1.3; font-weight: 800; color: #003c49; border-left: 6px solid #e55393; padding-left: 12px;\">2. Les risques majeurs du Shadow IT<\/h2>\r\n<h3 style=\"margin: 24px 0 8px 0; font-size: 22px; font-weight: bold; color: #004f5a;\">Violations de conformit\u00e9 et sanctions<\/h3>\r\n<p style=\"margin: 0 0 18px 0;\">Le RGPD impose des sanctions jusqu&#8217;\u00e0 <strong style=\"color: #003c49; font-weight: 600;\">20 millions d&#8217;euros ou 4% du chiffre d&#8217;affaires<\/strong> mondial pour les violations de donn\u00e9es. En 2024, la CNIL a prononc\u00e9 87 sanctions pour 55,2 millions d&#8217;euros. Avec DORA entr\u00e9 en vigueur le 17 janvier 2025, le secteur financier fait face \u00e0 de nouvelles exigences strictes en r\u00e9silience op\u00e9rationnelle num\u00e9rique, rendant le contr\u00f4le des risques li\u00e9s au Shadow IT encore plus critique.<\/p>\r\n\r\n<div style=\"background: #ffffff; border: 2px solid #e0e0e0; padding: 24px; border-radius: 10px; margin: 24px 0; box-shadow: 0 2px 8px rgba(0,0,0,0.05);\">\r\n<h4 style=\"margin: 0 0 8px 0; font-size: 18px; color: #e55393; font-weight: 800;\">Exemples de sanctions CNIL<\/h4>\r\n<p style=\"margin: 0 0 12px 0;\">Free Mobile sanctionn\u00e9 \u00e0 42 millions d&#8217;euros pour violations de donn\u00e9es li\u00e9es au Shadow IT (source : CNIL, le 14 janvier 2026).<\/p>\r\n<p style=\"margin: 0;\">American Express \u00e0 1,5 million d&#8217;euros.<\/p>\r\n\r\n<\/div>\r\n<h3 style=\"margin: 24px 0 8px 0; font-size: 22px; font-weight: bold; color: #004f5a;\">Failles de s\u00e9curit\u00e9 et fuite de donn\u00e9es<\/h3>\r\nLes failles de s\u00e9curit\u00e9 li\u00e9es au Shadow IT sont critiques. <strong>76% des PME<\/strong> consid\u00e8rent les risques du Shadow IT comme une menace de cybers\u00e9curit\u00e9 mod\u00e9r\u00e9e \u00e0 s\u00e9v\u00e8re. Les grandes entreprises stockent 5,5 millions d&#8217;actifs dans des applications SaaS, et <strong>31% des anciens employ\u00e9s y ont encore acc\u00e8s<\/strong>, cr\u00e9ant des risques de fuite de donn\u00e9es sensibles. Le co\u00fbt moyen d&#8217;une cyberattaque li\u00e9e au Shadow IT : <strong>4,2 millions de dollars.<\/strong>\r\n\r\nL&#8217;<strong>ENISA<\/strong> a recens\u00e9 488 incidents affectant le secteur financier europ\u00e9en entre 2023 et 2024, dont <strong>46% concernaient des banques<\/strong>, soulignant les risques encourus face aux failles de s\u00e9curit\u00e9 syst\u00e9miques.\r\n\r\n<\/div>\r\n&nbsp;\r\n\r\n&nbsp;\r\n<div class=\"wp-block-button is-style-default\" style=\"text-align: center;\"><a class=\"wp-block-button__link has-light-color has-pink-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/powell-software.com\/fr\/industrie\/banque-finance\/\">Le sujet des banques et de l&#8217;intranet s\u00e9curis\u00e9 ici<\/a><\/div>\r\n<div><\/div>\r\n<div><\/div>\r\n<div><\/div>\r\n<div><\/div>\r\n\r\n\r\n<!-- \/wp:post-content -->\r\n<h3 style=\"margin: 24px 0 8px 0; font-size: 22px; font-weight: bold; color: #004f5a;\">Fragmentation et inefficacit\u00e9s<\/h3>\r\n<p style=\"margin: 0 0 18px 0;\"><strong>65%<\/strong> des organisations manquent de visibilit\u00e9 sur leurs <strong>activit\u00e9s Shadow IT<\/strong>. <strong>66% des entreprises<\/strong> estiment que cela <strong>r\u00e9duit l&#8217;efficacit\u00e9<\/strong> de leurs \u00e9quipes IT, tandis que <strong>53% des DSI<\/strong> affirment que leur capacit\u00e9 \u00e0 <strong>appliquer les politiques de s\u00e9curit\u00e9<\/strong> est impact\u00e9e. Les \u00e9quipes IT se retrouvent submerg\u00e9es : <strong>78% des responsables<\/strong> g\u00e8rent des probl\u00e8mes de mots de passe<strong> au moins hebdomadairement<\/strong>, 28% quotidiennement<\/p>\r\n&nbsp;\r\n<div style=\"font-family: 'Lexend', sans-serif; line-height: 1.7; color: #003c49; font-size: 16.5px;\">\r\n<h2 style=\"margin: 40px 0 14px 0; font-size: 30px; line-height: 1.3; font-weight: 800; color: #003c49; border-left: 6px solid #e55393; padding-left: 12px;\">3. Strat\u00e9gies pour reprendre le contr\u00f4le<\/h2>\r\n<h3 style=\"margin: 24px 0 8px 0; font-size: 22px; font-weight: bold; color: #004f5a;\">Gouvernance IT claire et accessible<\/h3>\r\nCr\u00e9ez un catalogue d&#8217;applications approuv\u00e9es avec un processus de validation rapide. Impliquez les m\u00e9tiers dans les d\u00e9cisions IT pour que les solutions r\u00e9pondent aux besoins r\u00e9els. Dans <span style=\"color: #ef6da6;\"><strong><a style=\"color: #ef6da6;\" href=\"https:\/\/powell-software.com\/fr\/resources\/blog\/sharepoint\/\">SharePoint<\/a><\/strong><\/span>et Microsoft 365, d\u00e9finissez des politiques claires, des contr\u00f4les d&#8217;acc\u00e8s rigoureux et assurez une visibilit\u00e9 compl\u00e8te sur les outils utilis\u00e9s.\r\n<h3 style=\"margin: 24px 0 8px 0; font-size: 22px; font-weight: bold; color: #004f5a;\">D\u00e9tection et cartographie<\/h3>\r\n<p style=\"margin: 0 0 18px 0;\">Utilisez des outils CASB (Cloud Access Security Broker) pour visualiser les services cloud utilis\u00e9s au sein de l&#8217;organisation. Analysez les logs r\u00e9seau et menez des audits r\u00e9guliers pour cartographier l&#8217;\u00e9cosyst\u00e8me applicatif r\u00e9el et identifier tous les outils cloud utilis\u00e9s sans autorisation. <strong>\u00c9valuez les risques par application<\/strong> : sensibilit\u00e9 des donn\u00e9es sensibles trait\u00e9es, niveau de s\u00e9curit\u00e9, impact sur la conformit\u00e9.<\/p>\r\n\r\n<h3 style=\"margin: 24px 0 8px 0; font-size: 22px; font-weight: bold; color: #004f5a;\">Formation continue<\/h3>\r\nSeulement 20% des employ\u00e9s sont conscients des risques encourus. 69% ont intentionnellement contourn\u00e9 la cybers\u00e9curit\u00e9.\r\n<div style=\"background: #eef8f0; border-left: 5px solid #2e7d32; padding: 18px 22px; border-radius: 8px; margin: 22px 0;\">\r\n<p style=\"margin: 0;\">Les employ\u00e9s form\u00e9s sont 2,5 fois plus susceptibles d&#8217;\u00e9viter les risques cyber sans ralentir leur travail. Expliquez le \u00ab pourquoi \u00bb des r\u00e8gles pour cr\u00e9er une culture de s\u00e9curit\u00e9 partag\u00e9e.<\/p>\r\n\r\n<\/div>\r\n<h3 style=\"margin: 24px 0 8px 0; font-size: 22px; font-weight: bold; color: #004f5a;\">Alternatives attractives<\/h3>\r\nLes applications Shadow IT ont un taux d&#8217;engagement de 54%, contre 40% pour celles g\u00e9r\u00e9es par l&#8217;IT. Offrez des outils aussi performants que les alternatives SaaS, simplifiez l&#8217;acc\u00e8s, am\u00e9liorez l&#8217;exp\u00e9rience utilisateur. Un espace s\u00e9curis\u00e9, c&#8217;est bien, mais un espace qui engage les utilisateurs, c&#8217;est aussi s&#8217;assurer qu&#8217;ils vont l&#8217;utiliser et ne pas aller sur un outil tiers.\r\n\r\n<strong><span style=\"color: #ef6da6;\"><a style=\"color: #ef6da6;\" href=\"https:\/\/powell-software.com\/fr\/produits\/powell-intranet\/\">Powell Intranet<\/a><\/span><\/strong>, int\u00e9gr\u00e9 \u00e0 Microsoft 365, offre gouvernance renforc\u00e9e et facilite l&#8217;adoption des nouvelles technologies dans un cadre s\u00e9curis\u00e9, r\u00e9duisant ainsi le recours au Shadow IT.\r\n\r\n<img fetchpriority=\"low\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-155455 aligncenter\" src=\"https:\/\/powell-software.com\/wp-content\/uploads\/2020\/07\/03.png\" alt=\"gestion documentaire intranet microsoft sharepoint powell intranet\" width=\"1526\" height=\"648\" srcset=\"https:\/\/powell-software.com\/wp-content\/uploads\/2020\/07\/03.png 2000w, https:\/\/powell-software.com\/wp-content\/uploads\/2020\/07\/03-480x204.png 480w, https:\/\/powell-software.com\/wp-content\/uploads\/2020\/07\/03-1200x509.png 1200w, https:\/\/powell-software.com\/wp-content\/uploads\/2020\/07\/03-768x326.png 768w, https:\/\/powell-software.com\/wp-content\/uploads\/2020\/07\/03-1536x652.png 1536w\" sizes=\"auto, (max-width: 1526px) 100vw, 1526px\" \/>\r\n\r\n&nbsp;\r\n<h2 style=\"margin: 40px 0 14px 0; font-size: 30px; line-height: 1.3; font-weight: 800; color: #003c49; border-left: 6px solid #e55393; padding-left: 12px;\">4. Gouvernance dans Microsoft 365<\/h2>\r\n<h3 style=\"margin: 24px 0 8px 0; font-size: 22px; font-weight: bold; color: #004f5a;\">Outils natifs<\/h3>\r\n<p style=\"margin: 0 0 18px 0;\">Microsoft 365 propose un arsenal complet pour limiter les risques du Shadow IT : <strong>Microsoft Purview<\/strong> pour la gouvernance des donn\u00e9es sensibles, <strong>Conditional Access<\/strong> pour les contr\u00f4les de s\u00e9curit\u00e9,<strong> Data Loss Prevention (DLP)<\/strong> pour pr\u00e9venir la perte de donn\u00e9es et les fuites, <strong>Information Protection<\/strong> pour la classification, et <strong>Microsoft Defender for Cloud Apps<\/strong> pour d\u00e9tecter les services cloud utilis\u00e9s sans autorisation et les comportements \u00e0 risque.<\/p>\r\n\r\n<h3 style=\"margin: 24px 0 8px 0; font-size: 22px; font-weight: bold; color: #004f5a;\">Centralisation avec Powell Intranet<\/h3>\r\n<div style=\"background: #f0f7f7; border: 2px solid #cce3e3; border-left: 6px solid #003c49; padding: 24px; border-radius: 10px; margin: 30px 0;\">\r\n<h3 style=\"margin: 0 0 10px 0; font-size: 22px; font-weight: 800; color: #003c49;\">Pourquoi choisir Powell Intranet ?<\/h3>\r\nUne plateforme unifi\u00e9e est cl\u00e9 pour r\u00e9duire le Shadow IT. Powell Intranet, int\u00e9gr\u00e9 nativement \u00e0 Microsoft 365, offre :\r\n<ul style=\"list-style: none; padding: 0; margin: 0;\">\r\n \t<li style=\"position: relative; padding-left: 26px; margin: 6px 0;\"><span style=\"position: absolute; left: 0; color: #e55393; font-weight: 800;\">\u2192<\/span> Gestion centralis\u00e9e des acc\u00e8s et contenus<\/li>\r\n \t<li style=\"position: relative; padding-left: 26px; margin: 6px 0;\"><span style=\"position: absolute; left: 0; color: #e55393; font-weight: 800;\">\u2192<\/span> Gouvernance conforme (RGPD, DORA)<\/li>\r\n \t<li style=\"position: relative; padding-left: 26px; margin: 6px 0;\"><span style=\"position: absolute; left: 0; color: #e55393; font-weight: 800;\">\u2192<\/span> Exp\u00e9rience utilisateur fluide<\/li>\r\n \t<li><\/li>\r\n \t<li>Il r\u00e9pond aux besoins de collaboration, communication et gestion de l&#8217;information tout en maintenant contr\u00f4le strict sur s\u00e9curit\u00e9 et conformit\u00e9.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n&nbsp;\r\n\r\n&nbsp;\r\n<div style=\"font-family: 'Lexend', sans-serif; line-height: 1.7; color: #003c49; font-size: 16.5px;\">\r\n<h2 style=\"margin: 40px 0 14px 0; font-size: 30px; line-height: 1.3; font-weight: 800; color: #003c49; border-left: 6px solid #e55393; padding-left: 12px;\">Conclusion : Transformer le Shadow IT en opportunit\u00e9<\/h2>\r\nLe Shadow IT est un sympt\u00f4me r\u00e9v\u00e9lateur du d\u00e9calage entre besoins m\u00e9tiers et offre IT. Avec 67% des employ\u00e9s du Fortune 1000 utilisant des applications non approuv\u00e9es, et un contexte r\u00e9glementaire strict (DORA depuis janvier 2025, sanctions RGPD alourdies), l&#8217;ignorer n&#8217;est plus une option.\r\n\r\nLa strat\u00e9gie gagnante : d\u00e9tecter le Shadow IT, comprendre les motivations, proposer des alternatives attractives. Powell Intranet, par son int\u00e9gration Microsoft 365, sa gouvernance renforc\u00e9e et son exp\u00e9rience utilisateur optimale, offre une solution compl\u00e8te pour reprendre le contr\u00f4le sans brider l&#8217;innovation.\r\n\r\nL&#8217;avenir appartient aux organisations qui transforment le Shadow IT d&#8217;une menace en opportunit\u00e9 d&#8217;innovation contr\u00f4l\u00e9e, en pla\u00e7ant l&#8217;utilisateur au centre tout en maintenant les plus hauts standards de s\u00e9curit\u00e9 et de conformit\u00e9.\r\n\r\n<\/div>\r\n&nbsp;\r\n\r\n&nbsp;\r\n<div style=\"font-family: 'Lexend', sans-serif; line-height: 1.7; color: #003c49; font-size: 16.5px;\">\r\n<h2 style=\"margin: 40px 0 14px 0; font-size: 30px; line-height: 1.3; font-weight: 800; color: #003c49; border-left: 6px solid #e55393; padding-left: 12px;\">Sources<\/h2>\r\n<ol>\r\n \t<li>JumpCloud (2024). &#8220;What Is Shadow IT? 2024 Statistics &amp; Solutions&#8221;<\/li>\r\n \t<li>Auvik (2024). &#8220;50 Shadow IT Statistics for Business and IT Leaders in 2024&#8221;<\/li>\r\n \t<li>ACPR &#8211; Banque de France (2025). &#8220;Digital Operational Resilience Act (DORA)&#8221;<\/li>\r\n \t<li>CNIL (2025). &#8220;Les sanctions prononc\u00e9es par la CNIL&#8221;<\/li>\r\n \t<li>Gartner. &#8220;Shadow IT Definition&#8221;<\/li>\r\n \t<li>Productiv (2024). &#8220;5 Shadow IT Stats That Businesses Should Know in 2024&#8221;<\/li>\r\n \t<li>Dashlane (2025). &#8220;New Data Shows How Shadow IT and Burnt-Out IT Teams Impact Business Security&#8221;<\/li>\r\n \t<li>Zluri (2025). &#8220;Shadow IT Statistics: Key Facts to Learn in 2025&#8221;<\/li>\r\n \t<li>Josys (2024). &#8220;Shadow IT Definition: 2024 Statistics and Solutions&#8221;<\/li>\r\n \t<li>G2 Track. &#8220;21 Shadow IT Management Statistics You Need to Know&#8221;<\/li>\r\n \t<li>LockSelf (2025). &#8220;R\u00e8glement DORA 2025 en vigueur&#8221;<\/li>\r\n \t<li>Gitnux (2025). &#8220;Shadow IT Statistics&#8221;<\/li>\r\n<\/ol>\r\n<\/div><!-- \/wp:freeform -->","protected":false},"excerpt":{"rendered":"<p>Si l&#8217;informatique parall\u00e8le, ou Shadow IT &#8211; en anglais, est un probl\u00e8me r\u00e9pandu au sein de votre organisation, il se peut qu&#8217;elle vous apprenne quelque chose de plus important sur les besoins insatisfaits de vos employ\u00e9s.<\/p>\n","protected":false},"author":60,"featured_media":155217,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1671],"audiences":[1688],"interests":[1676],"products":[],"zones":[],"class_list":["post-38883","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","audiences-information-technologie","interests-digital-workplace"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Shadow IT : Risques, Chiffres et Strat\u00e9gies de Contr\u00f4le en 2026<\/title>\n<meta name=\"description\" content=\"67% des employ\u00e9s utilisent des logiciels non approuv\u00e9s. D\u00e9couvrez les risques majeurs du Shadow IT (DORA, RGPD) et comment reprendre le contr\u00f4le sans brider l&#039;innovation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/powell-software.com\/fr\/resources\/blog\/shadow-it-informatique-entreprise\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shadow IT : Risques, Chiffres et Strat\u00e9gies de Contr\u00f4le en 2026\" \/>\n<meta property=\"og:description\" content=\"67% des employ\u00e9s utilisent des logiciels non approuv\u00e9s. D\u00e9couvrez les risques majeurs du Shadow IT (DORA, RGPD) et comment reprendre le contr\u00f4le sans brider l&#039;innovation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/powell-software.com\/fr\/resources\/blog\/shadow-it-informatique-entreprise\/\" \/>\n<meta property=\"og:site_name\" content=\"Powell\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PowellSoftware\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-01T15:41:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-03T16:57:51+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/powell-software.com\/wp-content\/uploads\/2026\/01\/iStock-1667372318-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1230\" \/>\n\t<meta property=\"og:image:height\" content=\"852\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Victor Roux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@powellsoftware\" \/>\n<meta name=\"twitter:site\" content=\"@powellsoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Victor Roux\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/resources\\\/blog\\\/shadow-it-informatique-entreprise\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/resources\\\/blog\\\/shadow-it-informatique-entreprise\\\/\"},\"author\":{\"name\":\"Victor Roux\",\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/#\\\/schema\\\/person\\\/5cca750c8124d38d30836ed30200f35d\"},\"headline\":\"Shadow IT : Reprendre le contr\u00f4le sans brider l&#8217;innovation\",\"datePublished\":\"2020-07-01T15:41:25+00:00\",\"dateModified\":\"2026-02-03T16:57:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/resources\\\/blog\\\/shadow-it-informatique-entreprise\\\/\"},\"wordCount\":1255,\"publisher\":{\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/resources\\\/blog\\\/shadow-it-informatique-entreprise\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/powell-software.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/iStock-1667372318-min.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/resources\\\/blog\\\/shadow-it-informatique-entreprise\\\/\",\"url\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/resources\\\/blog\\\/shadow-it-informatique-entreprise\\\/\",\"name\":\"Shadow IT : Risques, Chiffres et Strat\u00e9gies de Contr\u00f4le en 2026\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/resources\\\/blog\\\/shadow-it-informatique-entreprise\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/resources\\\/blog\\\/shadow-it-informatique-entreprise\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/powell-software.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/iStock-1667372318-min.jpg\",\"datePublished\":\"2020-07-01T15:41:25+00:00\",\"dateModified\":\"2026-02-03T16:57:51+00:00\",\"description\":\"67% des employ\u00e9s utilisent des logiciels non approuv\u00e9s. D\u00e9couvrez les risques majeurs du Shadow IT (DORA, RGPD) et comment reprendre le contr\u00f4le sans brider l'innovation.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/resources\\\/blog\\\/shadow-it-informatique-entreprise\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/powell-software.com\\\/fr\\\/resources\\\/blog\\\/shadow-it-informatique-entreprise\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/resources\\\/blog\\\/shadow-it-informatique-entreprise\\\/#primaryimage\",\"url\":\"https:\\\/\\\/powell-software.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/iStock-1667372318-min.jpg\",\"contentUrl\":\"https:\\\/\\\/powell-software.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/iStock-1667372318-min.jpg\",\"width\":1230,\"height\":852,\"caption\":\"shadow IT\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/resources\\\/blog\\\/shadow-it-informatique-entreprise\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/resources\\\/.\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Shadow IT : Reprendre le contr\u00f4le&hellip;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/\",\"name\":\"Powell\",\"description\":\"La solution de Digital Workplace\",\"publisher\":{\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/#organization\",\"name\":\"Powell\",\"url\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/powell-software.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/favicon.webp\",\"contentUrl\":\"https:\\\/\\\/powell-software.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/favicon.webp\",\"width\":969,\"height\":969,\"caption\":\"Powell\"},\"image\":{\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PowellSoftware\",\"https:\\\/\\\/x.com\\\/powellsoftware\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCBX2pfEUCxJQWCKOx9hvv8w\",\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/powell-software\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/powell-software.com\\\/fr\\\/#\\\/schema\\\/person\\\/5cca750c8124d38d30836ed30200f35d\",\"name\":\"Victor Roux\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/be83b11e380184f67d33ef8fc076beac2e08758346fa62cbf67b942db37dcaca?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/be83b11e380184f67d33ef8fc076beac2e08758346fa62cbf67b942db37dcaca?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/be83b11e380184f67d33ef8fc076beac2e08758346fa62cbf67b942db37dcaca?s=96&d=mm&r=g\",\"caption\":\"Victor Roux\"},\"description\":\"Victor est responsable du site web et du r\u00e9f\u00e9rencement chez Powell. Son objectif : cr\u00e9er du contenu \u00e0 forte valeur ajout\u00e9e sur les intranets, SharePoint et la communication interne pour aider les entreprises \u00e0 am\u00e9liorer leurs performances et leur transformation num\u00e9rique en toute transparence. Parce qu'entre les chiffres et les clics, se cache une vraie histoire sur la mani\u00e8re dont les gens collaborent.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/victor-roux-711817160\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Shadow IT : Risques, Chiffres et Strat\u00e9gies de Contr\u00f4le en 2026","description":"67% des employ\u00e9s utilisent des logiciels non approuv\u00e9s. D\u00e9couvrez les risques majeurs du Shadow IT (DORA, RGPD) et comment reprendre le contr\u00f4le sans brider l'innovation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/powell-software.com\/fr\/resources\/blog\/shadow-it-informatique-entreprise\/","og_locale":"fr_FR","og_type":"article","og_title":"Shadow IT : Risques, Chiffres et Strat\u00e9gies de Contr\u00f4le en 2026","og_description":"67% des employ\u00e9s utilisent des logiciels non approuv\u00e9s. D\u00e9couvrez les risques majeurs du Shadow IT (DORA, RGPD) et comment reprendre le contr\u00f4le sans brider l'innovation.","og_url":"https:\/\/powell-software.com\/fr\/resources\/blog\/shadow-it-informatique-entreprise\/","og_site_name":"Powell","article_publisher":"https:\/\/www.facebook.com\/PowellSoftware","article_published_time":"2020-07-01T15:41:25+00:00","article_modified_time":"2026-02-03T16:57:51+00:00","og_image":[{"width":1230,"height":852,"url":"http:\/\/powell-software.com\/wp-content\/uploads\/2026\/01\/iStock-1667372318-min.jpg","type":"image\/jpeg"}],"author":"Victor Roux","twitter_card":"summary_large_image","twitter_creator":"@powellsoftware","twitter_site":"@powellsoftware","twitter_misc":{"Written by":"Victor Roux","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/powell-software.com\/fr\/resources\/blog\/shadow-it-informatique-entreprise\/#article","isPartOf":{"@id":"https:\/\/powell-software.com\/fr\/resources\/blog\/shadow-it-informatique-entreprise\/"},"author":{"name":"Victor Roux","@id":"https:\/\/powell-software.com\/fr\/#\/schema\/person\/5cca750c8124d38d30836ed30200f35d"},"headline":"Shadow IT : Reprendre le contr\u00f4le sans brider l&#8217;innovation","datePublished":"2020-07-01T15:41:25+00:00","dateModified":"2026-02-03T16:57:51+00:00","mainEntityOfPage":{"@id":"https:\/\/powell-software.com\/fr\/resources\/blog\/shadow-it-informatique-entreprise\/"},"wordCount":1255,"publisher":{"@id":"https:\/\/powell-software.com\/fr\/#organization"},"image":{"@id":"https:\/\/powell-software.com\/fr\/resources\/blog\/shadow-it-informatique-entreprise\/#primaryimage"},"thumbnailUrl":"https:\/\/powell-software.com\/wp-content\/uploads\/2026\/01\/iStock-1667372318-min.jpg","articleSection":["Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/powell-software.com\/fr\/resources\/blog\/shadow-it-informatique-entreprise\/","url":"https:\/\/powell-software.com\/fr\/resources\/blog\/shadow-it-informatique-entreprise\/","name":"Shadow IT : Risques, Chiffres et Strat\u00e9gies de Contr\u00f4le en 2026","isPartOf":{"@id":"https:\/\/powell-software.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/powell-software.com\/fr\/resources\/blog\/shadow-it-informatique-entreprise\/#primaryimage"},"image":{"@id":"https:\/\/powell-software.com\/fr\/resources\/blog\/shadow-it-informatique-entreprise\/#primaryimage"},"thumbnailUrl":"https:\/\/powell-software.com\/wp-content\/uploads\/2026\/01\/iStock-1667372318-min.jpg","datePublished":"2020-07-01T15:41:25+00:00","dateModified":"2026-02-03T16:57:51+00:00","description":"67% des employ\u00e9s utilisent des logiciels non approuv\u00e9s. D\u00e9couvrez les risques majeurs du Shadow IT (DORA, RGPD) et comment reprendre le contr\u00f4le sans brider l'innovation.","breadcrumb":{"@id":"https:\/\/powell-software.com\/fr\/resources\/blog\/shadow-it-informatique-entreprise\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/powell-software.com\/fr\/resources\/blog\/shadow-it-informatique-entreprise\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/powell-software.com\/fr\/resources\/blog\/shadow-it-informatique-entreprise\/#primaryimage","url":"https:\/\/powell-software.com\/wp-content\/uploads\/2026\/01\/iStock-1667372318-min.jpg","contentUrl":"https:\/\/powell-software.com\/wp-content\/uploads\/2026\/01\/iStock-1667372318-min.jpg","width":1230,"height":852,"caption":"shadow IT"},{"@type":"BreadcrumbList","@id":"https:\/\/powell-software.com\/fr\/resources\/blog\/shadow-it-informatique-entreprise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/powell-software.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/powell-software.com\/fr\/resources\/.\/blog\/"},{"@type":"ListItem","position":3,"name":"Shadow IT : Reprendre le contr\u00f4le&hellip;"}]},{"@type":"WebSite","@id":"https:\/\/powell-software.com\/fr\/#website","url":"https:\/\/powell-software.com\/fr\/","name":"Powell","description":"La solution de Digital Workplace","publisher":{"@id":"https:\/\/powell-software.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/powell-software.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/powell-software.com\/fr\/#organization","name":"Powell","url":"https:\/\/powell-software.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/powell-software.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/powell-software.com\/wp-content\/uploads\/2025\/03\/favicon.webp","contentUrl":"https:\/\/powell-software.com\/wp-content\/uploads\/2025\/03\/favicon.webp","width":969,"height":969,"caption":"Powell"},"image":{"@id":"https:\/\/powell-software.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PowellSoftware","https:\/\/x.com\/powellsoftware","https:\/\/www.youtube.com\/channel\/UCBX2pfEUCxJQWCKOx9hvv8w","https:\/\/fr.linkedin.com\/company\/powell-software"]},{"@type":"Person","@id":"https:\/\/powell-software.com\/fr\/#\/schema\/person\/5cca750c8124d38d30836ed30200f35d","name":"Victor Roux","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/be83b11e380184f67d33ef8fc076beac2e08758346fa62cbf67b942db37dcaca?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/be83b11e380184f67d33ef8fc076beac2e08758346fa62cbf67b942db37dcaca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/be83b11e380184f67d33ef8fc076beac2e08758346fa62cbf67b942db37dcaca?s=96&d=mm&r=g","caption":"Victor Roux"},"description":"Victor est responsable du site web et du r\u00e9f\u00e9rencement chez Powell. Son objectif : cr\u00e9er du contenu \u00e0 forte valeur ajout\u00e9e sur les intranets, SharePoint et la communication interne pour aider les entreprises \u00e0 am\u00e9liorer leurs performances et leur transformation num\u00e9rique en toute transparence. Parce qu'entre les chiffres et les clics, se cache une vraie histoire sur la mani\u00e8re dont les gens collaborent.","sameAs":["https:\/\/www.linkedin.com\/in\/victor-roux-711817160\/"]}]}},"_links":{"self":[{"href":"https:\/\/powell-software.com\/fr\/wp-json\/wp\/v2\/posts\/38883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/powell-software.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/powell-software.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/powell-software.com\/fr\/wp-json\/wp\/v2\/users\/60"}],"replies":[{"embeddable":true,"href":"https:\/\/powell-software.com\/fr\/wp-json\/wp\/v2\/comments?post=38883"}],"version-history":[{"count":5,"href":"https:\/\/powell-software.com\/fr\/wp-json\/wp\/v2\/posts\/38883\/revisions"}],"predecessor-version":[{"id":155459,"href":"https:\/\/powell-software.com\/fr\/wp-json\/wp\/v2\/posts\/38883\/revisions\/155459"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/powell-software.com\/fr\/wp-json\/wp\/v2\/media\/155217"}],"wp:attachment":[{"href":"https:\/\/powell-software.com\/fr\/wp-json\/wp\/v2\/media?parent=38883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/powell-software.com\/fr\/wp-json\/wp\/v2\/categories?post=38883"},{"taxonomy":"audiences","embeddable":true,"href":"https:\/\/powell-software.com\/fr\/wp-json\/wp\/v2\/audiences?post=38883"},{"taxonomy":"interests","embeddable":true,"href":"https:\/\/powell-software.com\/fr\/wp-json\/wp\/v2\/interests?post=38883"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/powell-software.com\/fr\/wp-json\/wp\/v2\/products?post=38883"},{"taxonomy":"zones","embeddable":true,"href":"https:\/\/powell-software.com\/fr\/wp-json\/wp\/v2\/zones?post=38883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}