{"version":"1.0","provider_name":"CyberArk","provider_url":"https:\/\/www.cyberark.com\/fr\/","author_name":"Dan Zoen","author_url":"https:\/\/www.cyberark.com\/fr\/blog\/author\/dzoen\/","title":"Securing External Access","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"6G8HOCg3Bv\"><a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/secure-external-access\/\">Securing External Access<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberark.com\/fr\/solutions\/secure-external-access\/embed\/#?secret=6G8HOCg3Bv\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Securing External Access\u00a0\u00bb &#8212; CyberArk\" data-secret=\"6G8HOCg3Bv\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberark.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"S\u00e9curisez l'acc\u00e8s des tiers aux ressources internes critiques gr\u00e2ce \u00e0 des fonctionnalit\u00e9s compl\u00e8tes d'isolation des sessions, de surveillance et d'audit des sessions, sans avoir recours \u00e0 des VPN, des mots de passe ou des agents.","thumbnail_url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2026\/01\/woman-looking-at-phone-in-car.jpg","thumbnail_width":528,"thumbnail_height":445}