{"id":115266,"date":"2021-02-03T16:05:43","date_gmt":"2021-02-03T21:05:43","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/"},"modified":"2025-02-14T12:44:34","modified_gmt":"2025-02-14T17:44:34","slug":"vendor-privileged-access-manager","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/","title":{"rendered":"Vendor Privileged Access Manager"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row el_class=\u00a0\u00bbcybv2 int-hero\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-breadcrumb\u00a0\u00bb]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/fr\/products\/privileged-access\/\"> Retour \u00e0 Privileged Access<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Vendor Privileged Access Manager<\/h1>\n<h2>S\u00e9curisez l\u2019acc\u00e8s des tiers aux ressources critiques internes gr\u00e2ce \u00e0 des fonctionnalit\u00e9s compl\u00e8tes d\u2019isolation, de surveillance et d\u2019audit des sessions sans avoir besoin de VPN, de mots de passe ou d\u2019agents.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbDemandez un essai gratuit\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ftry-buy%2Fvendor-privileged-access-manager%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/try-buy\/vendor-privileged-access-manager-demo\/\" target=\"_blank\" rel=\"noopener noreferrer\">Demandez une d\u00e9mo<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-110200\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg\" alt=\"Gestion des acc\u00e8s \u00e0 privil\u00e8ges des fournisseurs tiers\" width=\"770\" height=\"550\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1-300x214.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1-768x549.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1-150x107.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_sticky_nav\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1614201964540{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_column_text el_class=\u00a0\u00bbsticky-nav-title\u00a0\u00bb]<\/p>\n<h3><i class=\"fas fa-long-arrow-alt-up\"><\/i>Vendor Privileged Access Manager<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_raw_html el_class=\u00a0\u00bbsticky-nav-buttons\u00a0\u00bb]PCEtLSBBZGQgbGkgZm9yIHNlY3Rpb24gZGF0YS1zY3JvbGwtY2xhc3MgaXMgd2hlcmUgeW91IHB1dCB0aGUgc2VjdGlvbiBjbGFzcyB5b3Ugd2FudCB0byBzY3JvbGwgdG8gLS0+DQo8dWw+DQogCTxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTEiPkF2YW50YWdlczwvbGk+DQogCTxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTIiPkZvbmN0aW9ubmFsaXTDqXM8L2xpPg0KIAk8bGkgZGF0YS1zY3JvbGwtY2xhc3M9InN1Yi0zIj5Gb25jdGlvbm5lbWVudDwvbGk+DQogCTxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTQiPlJlc3NvdXJjZXM8L2xpPg0KPC91bD4=[\/vc_raw_html][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_btn title=\u00a0\u00bbDemandez un essai gratuit\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ftry-buy%2Fvendor-privileged-access-manager%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbsubnav-dropdown\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbsticky-nav-title\u00a0\u00bb]<\/p>\n<h5 style=\"text-align: right;\">Passer \u00e0<i class=\"fas fa-chevron-circle-down\"><\/i><\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-vt sub-1&Prime; css=\u00a0\u00bb.vc_custom_1616764259942{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Connectez les fournisseurs, bloquez les menaces<\/h3>\n<p>Garantissez un acc\u00e8s \u00e0 privil\u00e8ges s\u00e9curis\u00e9 et facile pour les fournisseurs externes.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Enable-Digital-Business.svg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-119142\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Enable-Digital-Business-correct.svg\" alt=\"Ic\u00f4ne Favorisez l\u2019activit\u00e9 num\u00e9rique\" \/><\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Favorisez l\u2019activit\u00e9 num\u00e9rique<\/h4>\n<p>Sans mot de passe et sans VPN, en offrant un acc\u00e8s rapide et s\u00e9curis\u00e9 aux fournisseurs via la MFA biom\u00e9trique.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks2.svg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-118884\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks2.svg\" alt=\"Ic\u00f4ne Prot\u00e9gez-vous contre les attaques\" \/><\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Prot\u00e9gez-vous contre les attaques<\/h4>\n<p>S\u00e9curisez les acc\u00e8s \u00e0 privil\u00e8ges des fournisseurs gr\u00e2ce \u00e0 des sessions surveill\u00e9es et isol\u00e9es automatiquement.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118726\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Enhance-Operational-Efficiencies.svg\" alt=\"Am\u00e9liorez l\u2019efficacit\u00e9 op\u00e9rationnelle\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Am\u00e9liorez l\u2019efficacit\u00e9 op\u00e9rationnelle<\/h4>\n<p>Fournissez un acc\u00e8s \u00ab\u00a0juste \u00e0 temps\u00a0\u00bb pour le fournisseur sans ajouter ses identit\u00e9s dans AD.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad cybv2-oval-left-background hv-cta-stats\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1611886714437{background-color: #ff7600 !important;}\u00a0\u00bb][vc_column el_class=\u00a0\u00bbtext-md-center head-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>S\u00e9curisez l\u2019acc\u00e8s des fournisseurs<\/h3>\n<h5>Fournissez un acc\u00e8s granulaire aux fournisseurs sans grande complexit\u00e9 ni soucis.<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbimg-box\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1612236218569{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-Benefits-Stats-770&#215;550-1.jpg?id=110232) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbstat-column\u00a0\u00bb][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]Simplifiez le provisionnement des acc\u00e8s des fournisseurs externes[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]Am\u00e9liorez la s\u00e9curit\u00e9, sans VPN, agents ni mots de passe[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]Faites l\u2019exp\u00e9rience de la gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM) en tant que service[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=\u00a0\u00bbstat-row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbstat\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-10&Prime;][vc_column_text]<\/p>\n<h4>96%<\/h4>\n<p>des entreprises autorisent des fournisseurs tiers \u00e0 acc\u00e9der \u00e0 leurs syst\u00e8mes critiques.*[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbstat\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-0 vc_col-xs-offset-1 vc_col-xs-10&Prime;][vc_column_text]<\/p>\n<h4>70%<\/h4>\n<p>des entreprises r\u00e9pertorient le risque provenant de l\u2019acc\u00e8s tiers comme l\u2019un des 10 principaux risques.*[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2-pad-top cybv2 cybv2-background-oval tour sub-2&Prime;][vc_column][vc_row_inner el_class=\u00a0\u00bbcyb-center\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-pad-btm\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbleft-mobile\u00a0\u00bb]<\/p>\n<h3>Ouvert aux fournisseurs, ferm\u00e9 aux cybermenaces<\/h3>\n<p>Connectez intelligemment vos partenaires \u00e0 votre entreprise.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=\u00a0\u00bbsquare\u00a0\u00bb active_section=\u00a0\u00bb1&Prime; css_animation=\u00a0\u00bbnone\u00a0\u00bb][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbAuthentification biom\u00e9trique \u00e0 plusieurs facteurs\u00a0\u00bb tab_id=\u00a0\u00bbbiometric\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Authentification biom\u00e9trique \u00e0 plusieurs facteurs<\/h4>\n<p>Assurez-vous que les fournisseurs externes confirment leur identit\u00e9 \u00e0 chaque fois qu\u2019ils ont besoin d\u2019acc\u00e9der \u00e0 des actifs critiques.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-110240\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-1.png\" alt=\"Authentification \u00e0 plusieurs facteurs\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbProvisionnement juste \u00e0 temps\u00a0\u00bb tab_id=\u00a0\u00bbjust-in-time\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Provisionnement juste \u00e0 temps<\/h4>\n<p>Int\u00e9grez et d\u00e9connectez facilement les fournisseurs. Permettez-leur d\u2019acc\u00e9der \u00e0 ce dont ils ont besoin, au moment o\u00f9 ils en ont besoin\u00a0; inclut l\u2019assistance aux fournisseurs pour qu\u2019ils g\u00e8rent eux-m\u00eames les invitations.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-110248\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-2.png\" alt=\"Provisionnement juste \u00e0 temps\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbEnregistrement et contr\u00f4le\u00a0\u00bb tab_id=\u00a0\u00bbrecord\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Enregistrement et contr\u00f4le<\/h4>\n<p>B\u00e9n\u00e9ficiez d\u2019une visibilit\u00e9 totale sur les activit\u00e9s des fournisseurs gr\u00e2ce \u00e0 des fonctionnalit\u00e9s compl\u00e8tes de cr\u00e9ation de rapports, d\u2019audit et de correction.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-110256\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-3.png\" alt=\"Enregistrement et contr\u00f4le\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbAcc\u00e8s hors ligne\u00a0\u00bb tab_id=\u00a0\u00bboffline-access\u00a0\u00bb][vc_row_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Acc\u00e8s hors ligne<\/h4>\n<p>Fournissez en toute s\u00e9curit\u00e9 des identifiants d\u2019acc\u00e8s \u00e0 des tiers autoris\u00e9s dans des environnements coup\u00e9s du r\u00e9seau et d\u2019autres environnements hors ligne. Consignez l\u2019usage des identifiants \u00e0 des fins de v\u00e9rification et de conformit\u00e9.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-127611\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/vendor-pam-tour.png\" alt=\"visite d\u2019acc\u00e8s hors ligne\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/vendor-pam-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/vendor-pam-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/vendor-pam-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/vendor-pam-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad info-graphic sub-3&Prime;][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-2&Prime;][vc_column_text el_class=\u00a0\u00bbtext-md-center head-box\u00a0\u00bb]<\/p>\n<h3>Acc\u00e8s \u00e0 privil\u00e8ges tiers z\u00e9ro confiance<\/h3>\n<p>Donnez aux fournisseurs externes un acc\u00e8s \u00e0 privil\u00e8ges chiffr\u00e9 rapide, facile et de bout en bout aux syst\u00e8mes internes critiques.[\/vc_column_text][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-119171\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/PAM_EV_v3-4.svg\" alt=\"Vendor Privileged Access Manager\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1650997476933{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_full_width_resource\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_title\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5 style=\"text-align: center;\">La s\u00e9curit\u00e9 des identit\u00e9s\u00a0: centr\u00e9e sur les<br \/>\ncontr\u00f4les intelligents des privil\u00e8ges<\/h5>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section5_container\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_center   new_hpstyle_section5_gart_img\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"Professional woman with glasses standing confidently against a dark background with a glowing triangular frame\" title=\"gartner-300x300\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1-100x100.jpg 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>CyberArk \u00e0 nouveau nomm\u00e9 leader dans le Magic Quadrant\u2122 de Gartner<sup>\u00ae<\/sup> pou PAM.<\/h4>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container  cybv2-button-solid cyb-button-hpstyle_section5 vc_btn3-inline\"  >\n\t<a class=\"vc_btn3-color-grey\" href=\"https:\/\/lp.cyberark.com\/gartner-mq-pam-2024-fr\" title=\"\" target=\"_blank\">Lire le rapport<\/a><\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_customer_stories vc_tta-o-non-responsive\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676874239{background-color: #ffffff !important;}\u00a0\u00bb][vc_column][vc_raw_js]%3Clink%20rel%3D%22stylesheet%22%20type%3D%22text%2Fcss%22%20href%3D%22%2F%2Fcdn.jsdelivr.net%2Fnpm%2Fslick-carousel%401.8.1%2Fslick%2Fslick.css%22%2F%3E%0A%3Cscript%20type%3D%22text%2Fjavascript%22%20src%3D%22%2F%2Fcdn.jsdelivr.net%2Fnpm%2Fslick-carousel%401.8.1%2Fslick%2Fslick.min.js%22%3E%3C%2Fscript%3E%0A%3Cscript%3E%0AjQuery%28document%29.ready%28function%28%29%7B%0A%20%20%20%20%2F%2FAdd%20Active%20to%20tab%20on%20page%20load%0A%20%20%20%20%24panels%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-panels%20.vc_tta-panel%27%29%3B%0A%20%20%20%20%24tabs%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20var%20index%20%3D%200%3B%0A%0A%20%20%20%20%2F%2FAlign%20Tabs%20with%20panels%0A%20%20%20%20%24panels.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20jQuery%28this%29.hasClass%28%27vc_active%27%29%3B%0A%20%20%20%20%20%20%20%20return%20false%3B%0A%20%20%20%20%20%20%20%20index%2B%2B%3B%0A%20%20%20%20%7D%29%0A%20%20%20%20var%20newIndex%20%3D%200%3B%0A%20%20%20%20%24tabs.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20if%28index%20%3D%3D%20newIndex%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20jQuery%28this%29.addClass%28%27vc_active%27%29%3B%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20newIndex%2B%2B%3B%0A%20%20%20%20%7D%29%0A%0A%20%20%20%20%2F%2FAdd%20custom%20icon%20to%20tabs%0A%20%20%20%20var%20iconIndex%20%3D%201%3B%0A%20%20%20%20%24panels.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20%24this%20%3D%20jQuery%28this%29%3B%0A%20%20%20%20%20%20%20%20%24tab%20%3D%20%24this.find%28%27.tab-icon%27%29%3B%0A%20%20%20%20%20%20%20%20%24tab.find%28%27img%27%29.prependTo%28jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tab%3Anth-of-type%28%27%20%2B%20iconIndex%20%2B%20%27%29%20a%27%29%29%3B%0A%20%20%20%20%20%20%20%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tab%3Anth-of-type%28%27%20%2B%20iconIndex%20%2B%20%27%29%20a%20i%27%29.remove%28%29%0A%20%20%20%20%20%20%20%20%24tab.remove%28%29%3B%0A%20%20%20%20%20%20%20%20iconIndex%2B%2B%3B%0A%20%20%20%20%7D%29%0A%7D%29%3B%0AjQuery%28window%29.on%28%27load%20resize%20orientationchange%27%2C%20function%28%29%20%7B%0A%20%20%20%20var%20%24carousel%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%27%29%3B%0A%20%20%20%20var%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%0A%20%20%20%20%2F%2FChange%20slide%20to%20selected%20panel%20for%20tabs%0A%20%20%20%20var%20slideGoTo%20%3D%20function%28%29%7B%0A%20%20%20%20%20%20%20%20if%20%28%24carousel.hasClass%28%27slick-initialized%27%29%29%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.slick%28%27slickGoTo%27%2C%20%2BjQuery%28this%29.attr%28%27data-slick-index%27%29%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20setTimeout%28function%28%29%7B%20%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%24click.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20if%28jQuery%28this%29.hasClass%28%27vc_active%27%29%20%26%26%20%28%21jQuery%28this%29.hasClass%28%27slick-center%27%29%20%7C%7C%20%21jQuery%28this%29.hasClass%28%27slick-active%27%29%29%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jQuery%28this%29.removeClass%28%27vc_active%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7D%29%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%2C%201000%29%3B%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%7D%0A%0A%20%20%20%20%2F%2FUpdate%20panel%20for%20selected%20slide%20%28aka%20tab%29%0A%20%20%20%20var%20afterChangeFunction%20%3D%20function%28slick%2C%20currentSlide%29%7B%0A%20%20%20%20%20%20%20%20%24currentTab%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab.slick-center.slick-active%20a%27%29%3B%0A%20%20%20%20%20%20%20%20if%28%21%24currentTab.parent%28%29.hasClass%28%27vc_active%27%29%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24currentTab.trigger%28%27click%27%29%3B%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%2F%2AsetTimeout%28function%28%29%7B%20%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20if%28jQuery%28this%29.hasClass%28%27vc_active%27%29%20%26%26%20%28%21jQuery%28this%29.hasClass%28%27slick-center%27%29%20%7C%7C%20%21jQuery%28this%29.hasClass%28%27slick-active%27%29%29%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jQuery%28this%29.removeClass%28%27vc_active%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%29%0A%20%20%20%20%20%20%20%20%7D%2C%201000%29%3B%2A%2F%0A%20%20%20%20%7D%0A%0A%20%20%20%20%2F%2A%20Initializes%20a%20slick%20carousel%20only%20on%20mobile%20screens%20%2A%2F%0A%20%20%20%20%2F%2F%20slick%20on%20mobile%0A%20%20%20%20if%20%28jQuery%28window%29.width%28%29%20%3E%20768%29%20%7B%0A%20%20%20%20%20%20%20%20if%20%28%24carousel.hasClass%28%27slick-initialized%27%29%29%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.slick%28%27unslick%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click.unbind%28%27click%27%2C%20slideGoTo%29%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.unbind%28%27afterChange%27%2C%20afterChangeFunction%29%3B%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%7D%0A%20%20%20%20else%7B%0A%20%20%20%20%20%20%20%20if%20%28%21%24carousel.hasClass%28%27slick-initialized%27%29%29%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.slick%28%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20slidesToShow%3A%203%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20slidesToScroll%3A%201%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mobileFirst%3A%20true%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20infinite%3A%20true%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20centerMode%3A%20true%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20centerPadding%3A%20%2750px%27%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click.bind%28%27click%27%2C%20slideGoTo%29%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.bind%28%27afterChange%27%2C%20afterChangeFunction%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20if%28jQuery%28this%29.hasClass%28%27vc_active%27%29%20%26%26%20%21jQuery%28this%29.hasClass%28%27slick-cloned%27%29%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jQuery%28this%29.trigger%28%27click%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%29%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%7D%0A%7D%29%3B%0A%3C%2Fscript%3E[\/vc_raw_js][vc_tta_tabs style=\u00a0\u00bbflat\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb color=\u00a0\u00bbwhite\u00a0\u00bb spacing=\u00a0\u00bb\u00a0\u00bb gap=\u00a0\u00bb20&Prime; alignment=\u00a0\u00bbcenter\u00a0\u00bb active_section=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbcybv2_customer_stories_tabs\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676900675{background-color: #ffffff !important;}\u00a0\u00bb][vc_tta_section i_icon_fontawesome=\u00a0\u00bbfas fa-piggy-bank\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbClients\u00a0\u00bb tab_id=\u00a0\u00bb1607742493330-265de97c-f2d9eb66-6bf8a95e-9371&Prime; el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_icon vc_active\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb135854&Prime; img_size=\u00a0\u00bb590&#215;500&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_single_image image=\u00a0\u00bb127960&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb el_class=\u00a0\u00bbtab-icon\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0Nous avons \u00e9t\u00e9 tr\u00e8s impressionn\u00e9s par le portail d\u2019acc\u00e8s des fournisseurs, l\u2019int\u00e9gration \u00e0 notre environnement (ce qui n\u2019a pas, selon nous, \u00e9t\u00e9 propos\u00e9 par d\u2019autres fournisseurs), et le fait que dans l\u2019ensemble, il s\u2019agissait d\u2019une solution intuitive et facile \u00e0 utiliser.\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]<strong>Brent Wallace,<\/strong> Directeur informatique, Comt\u00e9 de Norfolk[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/norfolk-county-meets-strict-insurance-guidelines-and-improves-third-party-access-management\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=\u00a0\u00bbfas fa-satellite-dish\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbTelco\u00a0\u00bb tab_id=\u00a0\u00bb1607742494008-8c0fb98b-2b6beb66-6bf8a95e-9371&Prime; el_class=\u00a0\u00bbnew_hpstyle_section6_tab2_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653503563{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb108213&Prime; img_size=\u00a0\u00bb590&#215;500&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_single_image image=\u00a0\u00bb108255&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb el_class=\u00a0\u00bbtab-icon\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab Gr\u00e2ce \u00e0 CyberArk, nous sommes convaincus d\u2019avoir mis en \u0153uvre une technologie qui fonctionnera avec nous au fur et \u00e0 mesure que notre entreprise grandira et se d\u00e9veloppera. \u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]<strong>Jean-Pierre Blanc<\/strong>, Bouygues Telecom[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/case-studies\/bouygues-telecom-secures-critical-business-systems-and-maintains-high-levels-of-customer-service-with-cyberark-solutions\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=\u00a0\u00bbfas fa-piggy-bank\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbFinances\u00a0\u00bb tab_id=\u00a0\u00bb1607742494616-60a6dced-32cfeb66-6bf8a95e-9371&Prime; el_class=\u00a0\u00bbnew_hpstyle_section6_tab3_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653481888{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb108222&Prime; img_size=\u00a0\u00bb590&#215;500&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_single_image image=\u00a0\u00bb108247&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb el_class=\u00a0\u00bbtab-icon\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0Il ne s\u2019agit pas seulement d\u2019un exercice de v\u00e9rification de la conformit\u00e9, nous concevons et alignons activement les politiques sur les meilleures pratiques de cybers\u00e9curit\u00e9 pour renforcer notre niveau de s\u00e9curit\u00e9 globale et aligner nos \u00e9quipes internes. \u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]<strong>Joel Harris,<\/strong> Manager[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/case-studies\/national-australia-bank-implements-pam-across-multiple-operation-areas\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=\u00a0\u00bbfas fa-industry\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbIndustrie\u00a0\u00bb tab_id=\u00a0\u00bb1607742495229-255d985e-6d0ceb66-6bf8a95e-9371&Prime; el_class=\u00a0\u00bbnew_hpstyle_section6_tab4_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653496575{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb110300&Prime; img_size=\u00a0\u00bb590&#215;500&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_single_image image=\u00a0\u00bb108271&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb el_class=\u00a0\u00bbtab-icon\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0CyberArk nous a donn\u00e9 la visibilit\u00e9 et le contr\u00f4le granulaire n\u00e9cessaires pour appliquer \u00e0 la fois le principe du moindre privil\u00e8ge et la politique de contr\u00f4le des applications, \u00ab\u00a0refus par d\u00e9faut\u00a0\u00bb, avec un minimum de perturbations pour l\u2019entreprise.\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]<strong>Ken Brown<\/strong>, CISO[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/case-studies\/milliken-company-enhances-security-protocol-through-least-privilege-with-default-deny-application-control-to-protect-global-end-users\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=\u00a0\u00bbfas fa-university\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbAssurance\u00a0\u00bb tab_id=\u00a0\u00bb1607742495902-f2d9a00d-8e74eb66-6bf8a95e-9371&Prime; el_class=\u00a0\u00bbnew_hpstyle_section6_tab5_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653492933{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb108238&Prime; img_size=\u00a0\u00bb590&#215;500&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_single_image image=\u00a0\u00bb108263&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb el_class=\u00a0\u00bbtab-icon\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0Avec les migrations RPA et Cloud, les identifiants sont de plus en plus r\u00e9pandus en dehors des contr\u00f4les \u00ab\u00a0normaux\u00a0\u00bb. CyberArk peut se d\u00e9ployer pour couvrir tous les sc\u00e9narios de mani\u00e8re standard.\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]<strong>Conseiller en s\u00e9curit\u00e9 de l\u2019information<\/strong>, Technologies des solutions de cybers\u00e9curit\u00e9 d\u2019entreprise[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/customer-stories\">Lire d\u2019autres t\u00e9moignages de clients<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=\u00a0\u00bbfas fa-school\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbEducation\u00a0\u00bb tab_id=\u00a0\u00bbeducation\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab5_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653492933{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb183627&Prime; img_size=\u00a0\u00bb590&#215;500&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_single_image image=\u00a0\u00bb183681&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb el_class=\u00a0\u00bbtab-icon\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u201cNow we are starting to use CyberArk Vendor Privileged Access Manager to secure and streamline vendor access. It is a beautiful thing because now vendors enjoy a password-less and VPN-less experience to access their target systems, they authenticate in a seamless way and only have access to their product. We can also control and limit their access to certain hours, and we can rotate passwords as soon as they log off.\u201d[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]<strong>John Vincent, Director of Technology<\/strong>, Chico Unified School District[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/chico-unified-school-district\/\">Read the Case Study<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][vc_row disable_element=\u00a0\u00bbyes\u00a0\u00bb][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_customer_stories vc_tta-o-non-responsive vc_custom_1608676874239 vc_row-has-fill vc_row-o-equal-height vc_row-flex\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_js\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<link rel=\"stylesheet\" type=\"text\/css\" href=\"\/\/cdn.jsdelivr.net\/npm\/slick-carousel@1.8.1\/slick\/slick.css\"\/>\n<script type=\"text\/javascript\" src=\"\/\/cdn.jsdelivr.net\/npm\/slick-carousel@1.8.1\/slick\/slick.min.js\"><\/script>\n<script>\njQuery(document).ready(function(){\n    \/\/Add Active to tab on page load\n    $panels = jQuery('.cybv2_customer_stories_tabs .vc_tta-panels .vc_tta-panel');\n    $tabs = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-list .vc_tta-tab');\n    var index = 0;\n\n    \/\/Align Tabs with panels\n    $panels.each(function(){\n        jQuery(this).hasClass('vc_active');\n        return false;\n        index++;\n    })\n    var newIndex = 0;\n    $tabs.each(function(){\n        if(index == newIndex){\n            jQuery(this).addClass('vc_active');\n        }\n        newIndex++;\n    })\n\n    \/\/Add custom icon to tabs\n    var iconIndex = 1;\n    $panels.each(function(){\n        $this = jQuery(this);\n        $tab = $this.find('.tab-icon');\n        $tab.find('img').prependTo(jQuery('.cybv2_customer_stories_tabs .vc_tta-tab:nth-of-type(' + iconIndex + ') a'));\n        jQuery('.cybv2_customer_stories_tabs .vc_tta-tab:nth-of-type(' + iconIndex + ') a i').remove()\n        $tab.remove();\n        iconIndex++;\n    })\n});\njQuery(window).on('load resize orientationchange', function() {\n    var $carousel = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list');\n    var $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n\n    \/\/Change slide to selected panel for tabs\n    var slideGoTo = function(){\n        if ($carousel.hasClass('slick-initialized')) {\n            $carousel.slick('slickGoTo', +jQuery(this).attr('data-slick-index'));\n            setTimeout(function(){ \n                $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n                $click.each(function(){\n                    if(jQuery(this).hasClass('vc_active') && (!jQuery(this).hasClass('slick-center') || !jQuery(this).hasClass('slick-active'))){\n                        jQuery(this).removeClass('vc_active');\n                    }\n                })\n            }, 1000);\n        }\n    }\n\n    \/\/Update panel for selected slide (aka tab)\n    var afterChangeFunction = function(slick, currentSlide){\n        $currentTab = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab.slick-center.slick-active a');\n        if(!$currentTab.parent().hasClass('vc_active')){\n            $currentTab.trigger('click');\n        }\n        \/*setTimeout(function(){ \n            $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n            $click.each(function(){\n                if(jQuery(this).hasClass('vc_active') && (!jQuery(this).hasClass('slick-center') || !jQuery(this).hasClass('slick-active'))){\n                    jQuery(this).removeClass('vc_active');\n                }\n            })\n        }, 1000);*\/\n    }\n\n    \/* Initializes a slick carousel only on mobile screens *\/\n    \/\/ slick on mobile\n    if (jQuery(window).width() > 768) {\n        if ($carousel.hasClass('slick-initialized')) {\n            $carousel.slick('unslick');\n            $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n            $click.unbind('click', slideGoTo)\n            $carousel.unbind('afterChange', afterChangeFunction);\n        }\n    }\n    else{\n        if (!$carousel.hasClass('slick-initialized')) {\n            $carousel.slick({\n                slidesToShow: 3,\n                slidesToScroll: 1,\n                mobileFirst: true,\n                infinite: true,\n                centerMode: true,\n                centerPadding: '50px'\n            });\n            $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n            $click.bind('click', slideGoTo)\n            $carousel.bind('afterChange', afterChangeFunction);\n            $click.each(function(){\n                if(jQuery(this).hasClass('vc_active') && !jQuery(this).hasClass('slick-cloned')){\n                    jQuery(this).trigger('click');\n                }\n            })\n        }\n    }\n});\n<\/script>\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_tta-container\" data-vc-action=\"collapse\"><div class=\"vc_general vc_tta vc_tta-tabs vc_tta-color-white vc_tta-style-flat vc_tta-shape-square vc_tta-o-shape-group vc_tta-gap-20  cybv2_customer_stories_tabs vc_tta-tabs-position-top vc_tta-controls-align-center vc_custom_1608676900675\"><div class=\"vc_tta-tabs-container\"><ul class=\"vc_tta-tabs-list\" role=\"tablist\"><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742493330-265de97c-f2d9eb66-6bf8\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Clients<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742494008-8c0fb98b-2b6beb66-6bf8\"><i class=\"vc_tta-icon fas fa-satellite-dish\"><\/i><span class=\"vc_tta-title-text\">Telco<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742494616-60a6dced-32cfeb66-6bf8\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Financier<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742495229-255d985e-6d0ceb66-6bf8\"><i class=\"vc_tta-icon fas fa-industry\"><\/i><span class=\"vc_tta-title-text\">Industrie<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742495902-f2d9a00d-8e74eb66-6bf8\"><i class=\"vc_tta-icon fas fa-university\"><\/i><span class=\"vc_tta-title-text\">Assurance<\/span><\/a><\/li><\/ul><\/div><div class=\"vc_tta-panels-container\"><div class=\"vc_tta-panels\"><div class=\"vc_tta-panel new_hpstyle_section6_tab1_icon vc_active\" id=\"1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Clients<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653500231\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Finance\" title=\"Finance-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/customers-icon.svg\" class=\"vc_single_image-img attachment-full\" alt=\"customer icon\" title=\"customers-icon\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u00ab\u00a0CyberArk a \u00e9t\u00e9 le meilleur fournisseur avec lequel j\u2019ai travaill\u00e9 au cours de ma carri\u00e8re informatique de plus de 20\u00a0ans. CyberArk fournit d\u2019excellents produits qui dominent le secteur dans la gestion des acc\u00e8s \u00e0 privil\u00e8ges\u00a0\u00bb<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Responsable de la s\u00e9curit\u00e9 informatique<\/strong>, Gestion de la s\u00e9curit\u00e9 et des risques<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/\">Lire d\u2019autres t\u00e9moignages de clients<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab2_icon\" id=\"1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-satellite-dish\"><\/i><span class=\"vc_tta-title-text\">Telco<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653503563\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Telecom-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Telecom\" title=\"Telecom-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Telecom-1.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"Telecom\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u00ab\u00a0Gr\u00e2ce \u00e0 CyberArk, nous sommes convaincus que nous avons mis en \u0153uvre une technologie qui fonctionnera avec nous au fur et \u00e0 mesure que notre entreprise grandira et se d\u00e9veloppera.\u00a0\u00bb<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Jean-Pierre Blanc<\/strong>, Bouygues Telecom<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/bouygues-telecom\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab3_icon\" id=\"1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Financier<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653481888\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance-02-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Finance-02-590x500\" title=\"Finance-02-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance.svg\" class=\"vc_single_image-img attachment-full\" alt=\"Finance\" title=\"Finance\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u00ab\u00a0Il ne s\u2019agit pas seulement d\u2019un exercice de v\u00e9rification de la conformit\u00e9, nous concevons et alignons activement les politiques sur les meilleures pratiques de cybers\u00e9curit\u00e9 pour renforcer notre niveau de s\u00e9curit\u00e9 globale et aligner nos \u00e9quipes internes.\u00a0\u00bb<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Joel Harris<\/strong>, Manager<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/national-australia-bank\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab4_icon\" id=\"1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-industry\"><\/i><span class=\"vc_tta-title-text\">Industrie<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653496575\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Customer-Identities-770x550-1-590x500.jpg\" width=\"590\" height=\"500\" alt=\"Customer-Identities----770x550\" title=\"Customer-Identities----770x550\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Manufactoring.svg\" class=\"vc_single_image-img attachment-full\" alt=\"Manufacturing\" title=\"Manufactoring\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u00ab\u00a0CyberArk nous a donn\u00e9 la visibilit\u00e9 et le contr\u00f4le granulaire n\u00e9cessaires pour appliquer \u00e0 la fois le principe du moindre privil\u00e8ge et la politique de contr\u00f4le des applications, \u00ab\u00a0refus par d\u00e9faut\u00a0\u00bb avec un minimum de perturbations pour l\u2019entreprise.\u00a0\u00bb<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Ken Brown<\/strong>, CISO<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/milliken\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab5_icon\" id=\"1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-university\"><\/i><span class=\"vc_tta-title-text\">Assurance<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653492933\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Insurance-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Insurance-590x500\" title=\"Insurance-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Insurance-1.svg\" class=\"vc_single_image-img attachment-full\" alt=\"insurance\" title=\"Insurance\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u00ab\u00a0Avec les migrations RPA et Cloud, les identifiants sont de plus en plus r\u00e9pandus en dehors des contr\u00f4les \u00ab\u00a0normaux\u00a0\u00bb. CyberArk peut se d\u00e9ployer pour couvrir tous les sc\u00e9narios de mani\u00e8re standard.\u00a0\u00bb<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Conseiller en s\u00e9curit\u00e9 de l\u2019information<\/strong>, Technologies des solutions de cybers\u00e9curit\u00e9 d\u2019entreprise<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/\">Lire d\u2019autres t\u00e9moignages de clients<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources sub-4&Prime; css=\u00a0\u00bb.vc_custom_1616764361087{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbno-break\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbno-break\u00a0\u00bb]<\/p>\n<h3>Explorez<br \/>\nles ressources<br \/>\nconnexes<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/vendor-privileged-access-manager\">Voir toutes les ressources<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip\u00a0\u00bb][vc_column el_class=\u00a0\u00bbnew_hpstyle_section8_col1&Prime;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00a0\u00bb.vc_custom_1611331958175{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section8_uberflip\u00a0\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1617028647965{background-color: #f7f7f7 !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top hv-cta\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb][vc_column_text]<\/p>\n<h2>Obtenez un essai de 30 jours<\/h2>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Garantissez un acc\u00e8s s\u00e9curis\u00e9 pour les fournisseurs externes[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]D\u00e9ployez une solution sans VPN, agent ni mot de passe[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Assurez la productivit\u00e9 des partenaires et tenez les attaquants \u00e0 l\u2019\u00e9cart[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Auditez et g\u00e9rez les sessions en toute transparence[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=\u00a0\u00bb108760&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb el_class=\u00a0\u00bbd-none d-md-block\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/12&Prime; css=\u00a0\u00bb.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbright-clmn cybv2-form\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbbold\u00a0\u00bb]<\/p>\n<h4>Inscrivez-vous maintenant<\/h4>\n<p>[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iODUxMCIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9mci90cnktYnV5L3RoYW5rLXlvdS12ZW5kb3ItcHJpdmlsZWdlZC1hY2Nlc3MtbWFuYWdlci8iXQ==[\/vc_raw_html][vc_column_text el_class=\u00a0\u00bbmore-tiny form-notice\u00a0\u00bb]<strong>Remarque pour les clients existants<\/strong> CyberArk propose actuellement aux clients CorePAS et\/ou EPV\/PSM existants sur v10.3 et les versions sup\u00e9rieures de d\u00e9ployer et d\u2019utiliser Alero pendant 30\u00a0jours*, afin de g\u00e9rer jusqu\u2019\u00e0 100\u00a0utilisateurs fournisseurs tiers. CyberArk comprend la pression que vous et votre entreprise subissez actuellement et s\u2019engage \u00e0 aider ses clients \u00e0 rester en s\u00e9curit\u00e9 de quelque mani\u00e8re que ce soit.<\/p>\n<p><strong>*Conditions g\u00e9n\u00e9rales<\/strong> L\u2019acc\u00e8s \u00e0 l\u2019abonnement gratuit \u00e0 Vendor Privileged Access Manager CyberArk est disponible pour les clients existants de CyberArk CorePAS et\/ou de l\u2019ancien mod\u00e8le EPV\/PSM uniquement, qui r\u00e9pondent aux exigences du syst\u00e8me pour ex\u00e9cuter Vendor Privileged Access Manager, et il est soumis \u00e0 des crit\u00e8res d\u2019admissibilit\u00e9, \u00e0 la seule discr\u00e9tion de CyberArk.<\/p>\n<p>Le calendrier de d\u00e9ploiement de Vendor Privileged Access Manager d\u00e9pend de la disponibilit\u00e9 des services professionnels CyberArk et des partenaires form\u00e9s.[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcyb-pad cybv2&Prime;][vc_column][vc_column_text el_class=\u00a0\u00bbtiny\u00a0\u00bb]*SOURCE\u00a0: <a href=\"https:\/\/www.cyberark.com\/resources\/ebooks\/third-party-privileged-access-to-critical-systems-ebook\">Acc\u00e8s \u00e0 privil\u00e8ges des tiers aux syst\u00e8mes critiques en 2020, CyberArk<\/a>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbtiny\u00a0\u00bb]CyberArk Has Patent Rights Relating To This Technology &#8211; <a href=\"https:\/\/www.cyberark.com\/fr\/patents\/\">https:\/\/www.cyberark.com\/patents<\/a>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":198,"featured_media":0,"parent":51589,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27777],"class_list":["post-115266","page","type-page","status-publish","hentry","product_category-privilege"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Acc\u00e8s des fournisseurs\u00a0\u2013 Gestion des acc\u00e8s \u00e0 privil\u00e8ges tiers | CyberArk<\/title>\n<meta name=\"description\" content=\"Fournissez un acc\u00e8s s\u00e9curis\u00e9 aux fournisseurs tiers de confiance sans avoir besoin de VPN, d\u2019agents ou de mots de passe avec CyberArk Vendor Privileged Access Manager.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vendor Privileged Access Manager\" \/>\n<meta property=\"og:description\" content=\"Fournissez un acc\u00e8s s\u00e9curis\u00e9 aux fournisseurs tiers de confiance sans avoir besoin de VPN, d\u2019agents ou de mots de passe avec CyberArk Vendor Privileged Access Manager.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-14T17:44:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/\",\"url\":\"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/\",\"name\":\"Acc\u00e8s des fournisseurs\u00a0\u2013 Gestion des acc\u00e8s \u00e0 privil\u00e8ges tiers | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg\",\"datePublished\":\"2021-02-03T21:05:43+00:00\",\"dateModified\":\"2025-02-14T17:44:34+00:00\",\"description\":\"Fournissez un acc\u00e8s s\u00e9curis\u00e9 aux fournisseurs tiers de confiance sans avoir besoin de VPN, d\u2019agents ou de mots de passe avec CyberArk Vendor Privileged Access Manager.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produits\",\"item\":\"https:\/\/www.cyberark.com\/fr\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Vendor Privileged Access Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Acc\u00e8s des fournisseurs\u00a0\u2013 Gestion des acc\u00e8s \u00e0 privil\u00e8ges tiers | CyberArk","description":"Fournissez un acc\u00e8s s\u00e9curis\u00e9 aux fournisseurs tiers de confiance sans avoir besoin de VPN, d\u2019agents ou de mots de passe avec CyberArk Vendor Privileged Access Manager.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/","og_locale":"fr_FR","og_type":"article","og_title":"Vendor Privileged Access Manager","og_description":"Fournissez un acc\u00e8s s\u00e9curis\u00e9 aux fournisseurs tiers de confiance sans avoir besoin de VPN, d\u2019agents ou de mots de passe avec CyberArk Vendor Privileged Access Manager.","og_url":"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-02-14T17:44:34+00:00","og_image":[{"width":770,"height":550,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/","url":"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/","name":"Acc\u00e8s des fournisseurs\u00a0\u2013 Gestion des acc\u00e8s \u00e0 privil\u00e8ges tiers | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg","datePublished":"2021-02-03T21:05:43+00:00","dateModified":"2025-02-14T17:44:34+00:00","description":"Fournissez un acc\u00e8s s\u00e9curis\u00e9 aux fournisseurs tiers de confiance sans avoir besoin de VPN, d\u2019agents ou de mots de passe avec CyberArk Vendor Privileged Access Manager.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Produits","item":"https:\/\/www.cyberark.com\/fr\/products\/"},{"@type":"ListItem","position":3,"name":"Vendor Privileged Access Manager"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/fr\/#website","url":"https:\/\/www.cyberark.com\/fr\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/fr\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/115266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/198"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=115266"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/115266\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51589"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=115266"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=115266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}