{"id":115252,"date":"2021-02-03T17:52:11","date_gmt":"2021-02-03T22:52:11","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/app-gateway\/"},"modified":"2025-12-24T02:49:56","modified_gmt":"2025-12-24T07:49:56","slug":"app-gateway","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/products\/app-gateway\/","title":{"rendered":"Passerelle d\u2019application"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row el_class=\u00a0\u00bbcybv2 int-hero\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-breadcrumb\u00a0\u00bb]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/fr\/products\/workforce-identity\/\">Retour \u00e0 Workforce Identity<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>App Gateway<\/h1>\n<p><\/p>\n<h2>Acc\u00e8s \u00e0 distance s\u00e9curis\u00e9 aux applications sur site sans qu\u2019il soit n\u00e9cessaire d\u2019installer et de g\u00e9rer un VPN, de modifier du code ou de d\u00e9ployer une infrastructure suppl\u00e9mentaire.s, making code changes, or deploying additional infrastructure.<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=\u00a0\u00bbDemandez une d\u00e9monstration\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Ftry-buy%2Fworkforce-access-solutions-demo%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111416\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Application-Gateway-hero.jpg\" alt=\"Application Gateway\" width=\"770\" height=\"530\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Application-Gateway-hero.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Application-Gateway-hero-300x206.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Application-Gateway-hero-768x529.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Application-Gateway-hero-150x103.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_sticky_nav\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1614201964540{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_column_text el_class=\u00a0\u00bbsticky-nav-title\u00a0\u00bb]<\/p>\n<h3><i class=\"fas fa-long-arrow-alt-up\"><\/i>App Gateway<\/h3>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_raw_html el_class=\u00a0\u00bbsticky-nav-buttons\u00a0\u00bb]PCEtLSBBZGQgbGkgZm9yIHNlY3Rpb24gZGF0YS1zY3JvbGwtY2xhc3MgaXMgd2hlcmUgeW91IHB1dCB0aGUgc2VjdGlvbiBjbGFzcyB5b3Ugd2FudCB0byBzY3JvbGwgdG8gLS0+PGJyPjx1bD4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTEiPkF2YW50YWdlczwvbGk+DQo8bGkgZGF0YS1zY3JvbGwtY2xhc3M9InN1Yi0yIj5Gb25jdGlvbm5hbGl0w6lzPC9saT4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTMiPkZvbmN0aW9ubmVtZW50PC9saT4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTQiPlJlc3NvdXJjZXM8L2xpPg0KPC91bD4=[\/vc_raw_html][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_btn title=\u00a0\u00bbDemandez une d\u00e9monstration\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Ftry-buy%2Fworkforce-access-solutions-demo%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbsubnav-dropdown\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbsticky-nav-title\u00a0\u00bb]<\/p>\n<h5 style=\"text-align: right;\">Passer \u00e0<i class=\"fas fa-chevron-circle-down\"><\/i><\/h5>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-vt sub-1&Prime; css=\u00a0\u00bb.vc_custom_1617027238968{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Une passerelle s\u00e9curis\u00e9e pour les applications<\/h3>\n<p>S\u00e9curisez l\u2019acc\u00e8s \u00e0 distance aux applications sur site.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-111424\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Improve-Security.svg\" alt=\"Improve Security\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Am\u00e9liorez la s\u00e9curit\u00e9<\/h4>\n<p>\u00c9tendez <a href=\"https:\/\/www.cyberark.com\/fr\/products\/single-sign-on\/\">SSO<\/a>, la <a href=\"https:\/\/www.cyberark.com\/fr\/?page_id=115224\">adaptive MFA<\/a>, et les strat\u00e9gies d\u2019acc\u00e8s affin\u00e9es \u00e0 vos applications.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-143134 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\" alt=\"risk\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>R\u00e9duisez les risques<\/h4>\n<p>Connexions directes aux applications sur site sans accorder un acc\u00e8s total au r\u00e9seau.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-111440\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Improve-User-Experience.svg\" alt=\"Improve User Experience\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Simplifiez l\u2019exp\u00e9rience utilisateur<\/h4>\n<p>Les utilisateurs s\u2019authentifient une fois et acc\u00e8dent en un clic \u00e0 toutes les applications dont ils ont besoin.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2-pad-top cybv2 cybv2-background-oval tour sub-2&Prime;][vc_column][vc_row_inner el_class=\u00a0\u00bbcyb-center\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-pad-btm\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbleft-mobile\u00a0\u00bb]<\/p>\n<h3>Toutes vos applications en un seul lieu s\u00fbr<\/h3>\n<p>Permettez aux utilisateurs finaux d\u2019acc\u00e9der aux applications sur site en plus des applications modernes dans le cloud.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=\u00a0\u00bbsquare\u00a0\u00bb active_section=\u00a0\u00bb1&Prime; css_animation=\u00a0\u00bbnone\u00a0\u00bb][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbProtection adaptative\u00a0\u00bb tab_id=\u00a0\u00bbadaptive\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Protection adaptative<\/h4>\n<p>Installez <a href=\"https:\/\/www.cyberark.com\/fr\/?page_id=115224\">Adaptive Multi-Factor Authentication<\/a> aux applications h\u00e9berg\u00e9es en interne telles que SAP, Microsoft SharePoint et Oracle.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111448\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-ApplicationGateway-1.png\" alt=\"Adaptive MFA Protection\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-ApplicationGateway-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-ApplicationGateway-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-ApplicationGateway-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbD\u00e9ploiement facile\u00a0\u00bb tab_id=\u00a0\u00bbeasy\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>D\u00e9ploiement facile<\/h4>\n<p>Retirez votre solution Web Access Management (WAM) existante. La configuration de l\u2019acc\u00e8s \u00e0 distance ne n\u00e9cessite ni modification de code sur site, ni infrastructure suppl\u00e9mentaire, ni VPN.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111456\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-ApplicationGateway-2.png\" alt=\"Easy Deployment\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-ApplicationGateway-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-ApplicationGateway-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-ApplicationGateway-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbExp\u00e9rience sans friction\u00a0\u00bb tab_id=\u00a0\u00bbfrictionless\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Exp\u00e9rience sans friction<\/h4>\n<p>Vos utilisateurs n\u2019ont rien de nouveau \u00e0 apprendre. Ils s\u2019authentifient simplement \u00e0 l\u2019aide d\u2019identifiants <a href=\"https:\/\/www.cyberark.com\/fr\/products\/single-sign-on\/\">single sign-on<\/a> et acc\u00e8dent \u00e0 toutes les applications sur site qui leur sont affect\u00e9es.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111464\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-ApplicationGateway-3.png\" alt=\"Single Sign-On Experience\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-ApplicationGateway-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-ApplicationGateway-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-ApplicationGateway-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbVisibilit\u00e9 et reporting\u00a0\u00bb tab_id=\u00a0\u00bbvisibility\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Visibilit\u00e9 et reporting<\/h4>\n<p>Utilisez les rapports int\u00e9gr\u00e9s ou d\u00e9finissez des requ\u00eates personnalis\u00e9es pour avoir une visibilit\u00e9 sur les indicateurs d\u2019acc\u00e8s des utilisateurs tels que les \u00e9checs de connexion et surveiller l\u2019utilisation de l\u2019application.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111472\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-ApplicationGateway-4.png\" alt=\"Built-in Reporting\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-ApplicationGateway-4.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-ApplicationGateway-4-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-ApplicationGateway-4-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad info-graphic sub-3&Prime;][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-2&Prime;][vc_column_text el_class=\u00a0\u00bbtext-md-center head-box\u00a0\u00bb]<\/p>\n<h3>Dites adieu aux VPN<\/h3>\n<p>Vous n\u2019avez besoin que d\u2019un seul agent install\u00e9 sur n\u2019importe quel serveur Windows ou de domaine derri\u00e8re votre pare-feu.[\/vc_column_text][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-111480\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/infographics_Access_AppGateway.svg\" alt=\"Application Gateway Eliminates VPNs\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_full_width_resource\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_title\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5 style=\"text-align: center;\">LA S\u00c9CURIT\u00c9 DES IDENTIT\u00c9S: CENTR\u00c9E SUR LES<br \/>\nCONTR\u00d4LES INTELLIGENTS DES PRIVIL\u00c8GES<\/h5>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section5_container\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_center   new_hpstyle_section5_gart_img\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/11\/gartner-square-cta.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"gartner-square-cta\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/11\/gartner-square-cta.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/11\/gartner-square-cta-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/11\/gartner-square-cta-100x100.jpg 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>CyberArk est nomm\u00e9 un Leader dans le Gartner\u00ae Magic Quadrant\u2122 2022 pour Access Management.<\/h4>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container  cybv2-button-solid cyb-button-hpstyle_section5 vc_btn3-inline\"  >\n\t<a class=\"vc_btn3-color-grey\" href=\"https:\/\/www.cyberark.com\/fr\/gartner-magic-quadrant-for-access-management\/\" title=\"\">Obtenez le Rapport<\/a><\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_customer_stories vc_tta-o-non-responsive vc_custom_1608676874239 vc_row-has-fill vc_row-o-equal-height vc_row-flex\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_js\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<link rel=\"stylesheet\" type=\"text\/css\" href=\"\/\/cdn.jsdelivr.net\/npm\/slick-carousel@1.8.1\/slick\/slick.css\"\/>\n<script type=\"text\/javascript\" src=\"\/\/cdn.jsdelivr.net\/npm\/slick-carousel@1.8.1\/slick\/slick.min.js\"><\/script>\n<script>\njQuery(document).ready(function(){\n    \/\/Add Active to tab on page load\n    $panels = jQuery('.cybv2_customer_stories_tabs .vc_tta-panels .vc_tta-panel');\n    $tabs = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-list .vc_tta-tab');\n    var index = 0;\n\n    \/\/Align Tabs with panels\n    $panels.each(function(){\n        jQuery(this).hasClass('vc_active');\n        return false;\n        index++;\n    })\n    var newIndex = 0;\n    $tabs.each(function(){\n        if(index == newIndex){\n            jQuery(this).addClass('vc_active');\n        }\n        newIndex++;\n    })\n\n    \/\/Add custom icon to tabs\n    var iconIndex = 1;\n    $panels.each(function(){\n        $this = jQuery(this);\n        $tab = $this.find('.tab-icon');\n        $tab.find('img').prependTo(jQuery('.cybv2_customer_stories_tabs .vc_tta-tab:nth-of-type(' + iconIndex + ') a'));\n        jQuery('.cybv2_customer_stories_tabs .vc_tta-tab:nth-of-type(' + iconIndex + ') a i').remove()\n        $tab.remove();\n        iconIndex++;\n    })\n});\njQuery(window).on('load resize orientationchange', function() {\n    var $carousel = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list');\n    var $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n\n    \/\/Change slide to selected panel for tabs\n    var slideGoTo = function(){\n        if ($carousel.hasClass('slick-initialized')) {\n            $carousel.slick('slickGoTo', +jQuery(this).attr('data-slick-index'));\n            setTimeout(function(){ \n                $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n                $click.each(function(){\n                    if(jQuery(this).hasClass('vc_active') && (!jQuery(this).hasClass('slick-center') || !jQuery(this).hasClass('slick-active'))){\n                        jQuery(this).removeClass('vc_active');\n                    }\n                })\n            }, 1000);\n        }\n    }\n\n    \/\/Update panel for selected slide (aka tab)\n    var afterChangeFunction = function(slick, currentSlide){\n        $currentTab = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab.slick-center.slick-active a');\n        if(!$currentTab.parent().hasClass('vc_active')){\n            $currentTab.trigger('click');\n        }\n        \/*setTimeout(function(){ \n            $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n            $click.each(function(){\n                if(jQuery(this).hasClass('vc_active') && (!jQuery(this).hasClass('slick-center') || !jQuery(this).hasClass('slick-active'))){\n                    jQuery(this).removeClass('vc_active');\n                }\n            })\n        }, 1000);*\/\n    }\n\n    \/* Initializes a slick carousel only on mobile screens *\/\n    \/\/ slick on mobile\n    if (jQuery(window).width() > 768) {\n        if ($carousel.hasClass('slick-initialized')) {\n            $carousel.slick('unslick');\n            $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n            $click.unbind('click', slideGoTo)\n            $carousel.unbind('afterChange', afterChangeFunction);\n        }\n    }\n    else{\n        if (!$carousel.hasClass('slick-initialized')) {\n            $carousel.slick({\n                slidesToShow: 3,\n                slidesToScroll: 1,\n                mobileFirst: true,\n                infinite: true,\n                centerMode: true,\n                centerPadding: '50px'\n            });\n            $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n            $click.bind('click', slideGoTo)\n            $carousel.bind('afterChange', afterChangeFunction);\n            $click.each(function(){\n                if(jQuery(this).hasClass('vc_active') && !jQuery(this).hasClass('slick-cloned')){\n                    jQuery(this).trigger('click');\n                }\n            })\n        }\n    }\n});\n<\/script>\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_tta-container\" data-vc-action=\"collapse\"><div class=\"vc_general vc_tta vc_tta-tabs vc_tta-color-white vc_tta-style-flat vc_tta-shape-square vc_tta-o-shape-group vc_tta-gap-20  cybv2_customer_stories_tabs vc_tta-tabs-position-top vc_tta-controls-align-center vc_custom_1608676900675\"><div class=\"vc_tta-tabs-container\"><ul class=\"vc_tta-tabs-list\" role=\"tablist\"><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742493330-265de97c-f2d9eb66-6bf8\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Clients<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742494008-8c0fb98b-2b6beb66-6bf8\"><i class=\"vc_tta-icon fas fa-satellite-dish\"><\/i><span class=\"vc_tta-title-text\">Telco<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742494616-60a6dced-32cfeb66-6bf8\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Financier<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742495229-255d985e-6d0ceb66-6bf8\"><i class=\"vc_tta-icon fas fa-industry\"><\/i><span class=\"vc_tta-title-text\">Industrie<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742495902-f2d9a00d-8e74eb66-6bf8\"><i class=\"vc_tta-icon fas fa-university\"><\/i><span class=\"vc_tta-title-text\">Assurance<\/span><\/a><\/li><\/ul><\/div><div class=\"vc_tta-panels-container\"><div class=\"vc_tta-panels\"><div class=\"vc_tta-panel new_hpstyle_section6_tab1_icon vc_active\" id=\"1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Clients<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653500231\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Finance\" title=\"Finance-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/customers-icon.svg\" class=\"vc_single_image-img attachment-full\" alt=\"customer icon\" title=\"customers-icon\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u00ab\u00a0CyberArk a \u00e9t\u00e9 le meilleur fournisseur avec lequel j\u2019ai travaill\u00e9 au cours de ma carri\u00e8re informatique de plus de 20\u00a0ans. CyberArk fournit d\u2019excellents produits qui dominent le secteur dans la gestion des acc\u00e8s \u00e0 privil\u00e8ges\u00a0\u00bb<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Responsable de la s\u00e9curit\u00e9 informatique<\/strong>, Gestion de la s\u00e9curit\u00e9 et des risques<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/\">Lire d\u2019autres t\u00e9moignages de clients<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab2_icon\" id=\"1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-satellite-dish\"><\/i><span class=\"vc_tta-title-text\">Telco<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653503563\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Telecom-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Telecom\" title=\"Telecom-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Telecom-1.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"Telecom\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u00ab\u00a0Gr\u00e2ce \u00e0 CyberArk, nous sommes convaincus que nous avons mis en \u0153uvre une technologie qui fonctionnera avec nous au fur et \u00e0 mesure que notre entreprise grandira et se d\u00e9veloppera.\u00a0\u00bb<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Jean-Pierre Blanc<\/strong>, Bouygues Telecom<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/bouygues-telecom\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab3_icon\" id=\"1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Financier<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653481888\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance-02-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Finance-02-590x500\" title=\"Finance-02-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance.svg\" class=\"vc_single_image-img attachment-full\" alt=\"Finance\" title=\"Finance\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u00ab\u00a0Il ne s\u2019agit pas seulement d\u2019un exercice de v\u00e9rification de la conformit\u00e9, nous concevons et alignons activement les politiques sur les meilleures pratiques de cybers\u00e9curit\u00e9 pour renforcer notre niveau de s\u00e9curit\u00e9 globale et aligner nos \u00e9quipes internes.\u00a0\u00bb<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Joel Harris<\/strong>, Manager<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/national-australia-bank\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab4_icon\" id=\"1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-industry\"><\/i><span class=\"vc_tta-title-text\">Industrie<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653496575\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Customer-Identities-770x550-1-590x500.jpg\" width=\"590\" height=\"500\" alt=\"Customer-Identities----770x550\" title=\"Customer-Identities----770x550\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Manufactoring.svg\" class=\"vc_single_image-img attachment-full\" alt=\"Manufacturing\" title=\"Manufactoring\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u00ab\u00a0CyberArk nous a donn\u00e9 la visibilit\u00e9 et le contr\u00f4le granulaire n\u00e9cessaires pour appliquer \u00e0 la fois le principe du moindre privil\u00e8ge et la politique de contr\u00f4le des applications, \u00ab\u00a0refus par d\u00e9faut\u00a0\u00bb avec un minimum de perturbations pour l\u2019entreprise.\u00a0\u00bb<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Ken Brown<\/strong>, CISO<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/milliken\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab5_icon\" id=\"1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-university\"><\/i><span class=\"vc_tta-title-text\">Assurance<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653492933\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Insurance-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Insurance-590x500\" title=\"Insurance-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Insurance-1.svg\" class=\"vc_single_image-img attachment-full\" alt=\"insurance\" title=\"Insurance\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u00ab\u00a0Avec les migrations RPA et Cloud, les identifiants sont de plus en plus r\u00e9pandus en dehors des contr\u00f4les \u00ab\u00a0normaux\u00a0\u00bb. CyberArk peut se d\u00e9ployer pour couvrir tous les sc\u00e9narios de mani\u00e8re standard.\u00a0\u00bb<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Conseiller en s\u00e9curit\u00e9 de l\u2019information<\/strong>, Technologies des solutions de cybers\u00e9curit\u00e9 d\u2019entreprise<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/\">Lire d\u2019autres t\u00e9moignages de clients<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cyberark-blueprint dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section3_h4&Prime;]<\/p>\n<h3>Une s\u00e9curit\u00e9 des identit\u00e9s qui vous conna\u00eet mais ne vous ralentit pas<\/h3>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section3_text\u00a0\u00bb]<\/p>\n<h4>Explorez toutes les m\u00e9thodes de CyberArk destin\u00e9es \u00e0 vous offrir la tranquillit\u00e9 d\u2019esprit n\u00e9cessaire pour aller de l\u2019avant sans crainte.<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_btn title=\u00a0\u00bbEn savoir plus\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb align=\u00a0\u00bbright\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Ftry-buy%2Fworkforce-identity-trial%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad cybv2-oval-left-background hv-cta-list\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1617030681079{background-color: #ff7600 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbimg-box cyb-clm-background-rc\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1612303189333{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/WorkForceIdent_Page-High-value-CTA-770&#215;515-1.jpg?id=111231) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbstat-column\u00a0\u00bb][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb width=\u00a0\u00bb3\/4&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text]<\/p>\n<h2>Demandez une d\u00e9mo personnalis\u00e9e<\/h2>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]Renforcez l\u2019autonomie de votre personnel gr\u00e2ce \u00e0 l\u2019authentification unique[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]Authentifiez-vous en toute confiance \u00e0 l\u2019aide de l\u2019IA et de l\u2019analyse du comportement des utilisateurs[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]R\u00e9duisez la charge informatique gr\u00e2ce \u00e0 des outils en libre-service s\u00e9curis\u00e9s[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]\u00c9liminez le besoin de VPN[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_btn title=\u00a0\u00bbDemandez une d\u00e9monstration\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Ftry-buy%2Fworkforce-access-solutions-demo%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":198,"featured_media":0,"parent":51589,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-115252","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Passerelle d\u2019application\u00a0: Acc\u00e8s s\u00e9curis\u00e9 aux applications<\/title>\n<meta name=\"description\" content=\"La passerelle d\u2019application CyberArk (Application Gateway) fournit un acc\u00e8s s\u00e9curis\u00e9 \u00e0 distance aux applications sur site sans qu\u2019il soit n\u00e9cessaire d\u2019installer et de g\u00e9rer un VPN, de modifier du code ou de d\u00e9ployer une infrastructure suppl\u00e9mentaire.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/app-gateway\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Passerelle d\u2019application\" \/>\n<meta property=\"og:description\" content=\"La passerelle d\u2019application CyberArk (Application Gateway) fournit un acc\u00e8s s\u00e9curis\u00e9 \u00e0 distance aux applications sur site sans qu\u2019il soit n\u00e9cessaire d\u2019installer et de g\u00e9rer un VPN, de modifier du code ou de d\u00e9ployer une infrastructure suppl\u00e9mentaire.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/app-gateway\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-24T07:49:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Application-Gateway-hero.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"530\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/app-gateway\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/app-gateway\/\",\"name\":\"Passerelle d\u2019application\u00a0: Acc\u00e8s s\u00e9curis\u00e9 aux applications\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/app-gateway\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/app-gateway\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Application-Gateway-hero.jpg\",\"datePublished\":\"2021-02-03T22:52:11+00:00\",\"dateModified\":\"2025-12-24T07:49:56+00:00\",\"description\":\"La passerelle d\u2019application CyberArk (Application Gateway) fournit un acc\u00e8s s\u00e9curis\u00e9 \u00e0 distance aux applications sur site sans qu\u2019il soit n\u00e9cessaire d\u2019installer et de g\u00e9rer un VPN, de modifier du code ou de d\u00e9ployer une infrastructure suppl\u00e9mentaire.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/app-gateway\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/app-gateway\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/products\/app-gateway\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Application-Gateway-hero.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Application-Gateway-hero.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/app-gateway\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produits\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Passerelle d\u2019application\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Passerelle d\u2019application\u00a0: Acc\u00e8s s\u00e9curis\u00e9 aux applications","description":"La passerelle d\u2019application CyberArk (Application Gateway) fournit un acc\u00e8s s\u00e9curis\u00e9 \u00e0 distance aux applications sur site sans qu\u2019il soit n\u00e9cessaire d\u2019installer et de g\u00e9rer un VPN, de modifier du code ou de d\u00e9ployer une infrastructure suppl\u00e9mentaire.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/app-gateway\/","og_locale":"fr_FR","og_type":"article","og_title":"Passerelle d\u2019application","og_description":"La passerelle d\u2019application CyberArk (Application Gateway) fournit un acc\u00e8s s\u00e9curis\u00e9 \u00e0 distance aux applications sur site sans qu\u2019il soit n\u00e9cessaire d\u2019installer et de g\u00e9rer un VPN, de modifier du code ou de d\u00e9ployer une infrastructure suppl\u00e9mentaire.","og_url":"https:\/\/www.cyberark.com\/products\/app-gateway\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-12-24T07:49:56+00:00","og_image":[{"width":770,"height":530,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Application-Gateway-hero.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/app-gateway\/","url":"https:\/\/www.cyberark.com\/products\/app-gateway\/","name":"Passerelle d\u2019application\u00a0: Acc\u00e8s s\u00e9curis\u00e9 aux applications","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/app-gateway\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/app-gateway\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Application-Gateway-hero.jpg","datePublished":"2021-02-03T22:52:11+00:00","dateModified":"2025-12-24T07:49:56+00:00","description":"La passerelle d\u2019application CyberArk (Application Gateway) fournit un acc\u00e8s s\u00e9curis\u00e9 \u00e0 distance aux applications sur site sans qu\u2019il soit n\u00e9cessaire d\u2019installer et de g\u00e9rer un VPN, de modifier du code ou de d\u00e9ployer une infrastructure suppl\u00e9mentaire.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/app-gateway\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/app-gateway\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/products\/app-gateway\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Application-Gateway-hero.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Application-Gateway-hero.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/app-gateway\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Produits","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Passerelle d\u2019application"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/115252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/198"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=115252"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/115252\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51589"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=115252"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=115252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}