{"version":"1.0","provider_name":"CyberArk","provider_url":"https:\/\/www.cyberark.com\/fr\/","author_name":"Bhargavi Maddila","author_url":"https:\/\/www.cyberark.com\/fr\/blog\/author\/bmaddila\/","title":"S\u00e9curisation des points d\u2019acc\u00e8s et des serveurs","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"7NLDAPdgux\"><a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/secure-endpoints-and-servers\/\">S\u00e9curisation des points d\u2019acc\u00e8s et des serveurs<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberark.com\/fr\/solutions\/secure-endpoints-and-servers\/embed\/#?secret=7NLDAPdgux\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0S\u00e9curisation des points d\u2019acc\u00e8s et des serveurs\u00a0\u00bb &#8212; CyberArk\" data-secret=\"7NLDAPdgux\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberark.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Mettre en \u0153uvre le mod\u00e8le Zero Trust au niveau des points d\u2019acc\u00e8s en appliquant le principe du moindre privil\u00e8ge afin de bloquer les menaces, de renforcer la r\u00e9silience et de garantir la conformit\u00e9 sans ralentir l'activit\u00e9.","thumbnail_url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2026\/01\/glowing-connected-data-points.jpg","thumbnail_width":528,"thumbnail_height":446}