{"id":115336,"date":"2021-02-03T18:41:35","date_gmt":"2021-02-03T23:41:35","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/operational-efficiences\/"},"modified":"2025-02-13T18:04:51","modified_gmt":"2025-02-13T23:04:51","slug":"operational-efficiencies","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/","title":{"rendered":"Efficacit\u00e9 op\u00e9rationnelle"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-full\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text]<\/p>\n<h1>Stimulez l\u2019efficacit\u00e9 op\u00e9rationnelle<\/h1>\n<h2>R\u00e9duisez la complexit\u00e9 et la charge informatique des solutions de s\u00e9curit\u00e9 des identit\u00e9s tout en am\u00e9liorant la protection de l\u2019entreprise.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbeBook de la s\u00e9curit\u00e9 des identit\u00e9s\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Fidentity-security|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/the-rise-of-ai-powered-identity-security\">Guide sur la s\u00e9curit\u00e9 bas\u00e9e sur l\u2019IA<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2&Prime; css=\u00a0\u00bb.vc_custom_1613084260480{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/CybarArk_Drive-Operational-Efficiencies_1320x1200.jpg?id=108166) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_sticky_nav\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1614201964540{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_column_text el_class=\u00a0\u00bbsticky-nav-title\u00a0\u00bb]<\/p>\n<h3><i class=\"fas fa-long-arrow-alt-up\"><\/i>Efficacit\u00e9 op\u00e9rationnelle<br \/>\n<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_raw_html el_class=\u00a0\u00bbsticky-nav-buttons\u00a0\u00bb]PCEtLSBBZGQgbGkgZm9yIHNlY3Rpb24gZGF0YS1zY3JvbGwtY2xhc3MgaXMgd2hlcmUgeW91IHB1dCB0aGUgc2VjdGlvbiBjbGFzcyB5b3Ugd2FudCB0byBzY3JvbGwgdG8gLS0+DQo8dWw+DQo8bGkgZGF0YS1zY3JvbGwtY2xhc3M9InN1Yi0xIj5WdWUgZOKAmWVuc2VtYmxlPC9saT4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTIiPlByb2R1aXRzPC9saT4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTMiPlNjw6luYXJpb3MgZOKAmXV0aWxpc2F0aW9uPC9saT4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTQiPkludMOpZ3JhdGlvbnM8L2xpPg0KPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWItNSI+UmVzc291cmNlczwvbGk+DQo8L3VsPg==[\/vc_raw_html][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_btn title=\u00a0\u00bbDemandez une d\u00e9mo\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Frequest-demo%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbsubnav-dropdown\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbsticky-nav-title\u00a0\u00bb]<\/p>\n<h5 style=\"text-align: right;\">Passer \u00e0<i class=\"fas fa-chevron-circle-down\"><\/i><\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-vt sub-1&Prime; css=\u00a0\u00bb.vc_custom_1617037733517{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Une approche privil\u00e9giant la s\u00e9curit\u00e9 avec une performance mettant en avant la productivit\u00e9<\/h3>\n<p>Il est plus facile de se concentrer sur l\u2019avenir lorsque vous ne surveillez pas vos arri\u00e8res. Avec une gestion unifi\u00e9e des <a href=\"https:\/\/www.cyberark.com\/fr\/products\/access-management\/\">acc\u00e8s<\/a> pour toutes les identit\u00e9s, vous pouvez consolider les technologies de s\u00e9curit\u00e9 cl\u00e9s, simplifier l\u2019application des politiques de s\u00e9curit\u00e9 et m\u00eame pleinement satisfaire vos utilisateurs finaux.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-112436\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/DevSecOps-Icon.svg\" alt=\"Connected workforce icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Personnel connect\u00e9<\/h4>\n<p>Connectez votre main-d\u2019\u0153uvre \u00e0 distance aux outils dont elle a besoin rapidement et efficacement.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-110590\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Seamless-Access.svg\" alt=\"Seamless Access Icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Acc\u00e8s facile<\/h4>\n<p>Garantissez une adoption \u00e9lev\u00e9e pour une main-d\u2019\u0153uvre plus autonome et plus productive.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-110598\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Consistent-Security.svg\" alt=\"Consistent Security Icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>S\u00e9curit\u00e9 constante<\/h4>\n<p>Approche coh\u00e9rente consolidant la gestion des privil\u00e8ges, des acc\u00e8s et des secrets.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-top text-md-center sub-2&Prime;][vc_column][vc_column_text]<\/p>\n<h2>Laissez entrer les utilisateurs en gardant votre entreprise \u00e0 l\u2019\u00e9cart des probl\u00e8mes<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-btm text-md-center\u00a0\u00bb][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-2&Prime;][vc_column_text]<\/p>\n<h5>S\u00e9curisez l\u2019acc\u00e8s des employ\u00e9s, des sous-traitants et des partenaires \u00e0 chaque application sur n\u2019importe quel appareil.<\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111942\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets-Page-Seesaw-Comp-CyberArk_Workforce-Identities-770x515-2.jpg\" alt=\"Secure Workforce Identity\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets-Page-Seesaw-Comp-CyberArk_Workforce-Identities-770x515-2.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets-Page-Seesaw-Comp-CyberArk_Workforce-Identities-770x515-2-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets-Page-Seesaw-Comp-CyberArk_Workforce-Identities-770x515-2-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets-Page-Seesaw-Comp-CyberArk_Workforce-Identities-770x515-2-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-right\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>S\u00e9curisez l\u2019Identit\u00e9 du personnel<\/h4>\n<p>Donnez \u00e0 votre personnel un acc\u00e8s simple et s\u00e9curis\u00e9 aux applications professionnelles critiques en tirant parti de l\u2019authentification <a href=\"https:\/\/www.cyberark.com\/fr\/products\/single-sign-on\/\">unique<\/a> et <a href=\"https:\/\/www.cyberark.com\/fr\/products\/adaptive-multi-factor-authentication\/\">de l\u2019authentification<\/a>adaptative \u00e0 plusieurs facteurs.[\/vc_column_text][vc_btn title=\u00a0\u00bbEn savoir plus\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2Fworkforce-identity%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw cyb-reverse\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-left\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>Renforcez l\u2019identit\u00e9 du client<\/h4>\n<p>Comblez vos clients gr\u00e2ce \u00e0 un acc\u00e8s facile et s\u00e9curis\u00e9 \u00e0 vos outils num\u00e9riques, qui les fid\u00e9lisera \u00e0 votre entreprise.[\/vc_column_text][vc_btn title=\u00a0\u00bbEn savoir plus\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2Fcustomer-identity%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111950\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets_Page-Seesaw_Comp-Girl_on_Mobile-770x515-2.jpg\" alt=\"Empower Customer Identity\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets_Page-Seesaw_Comp-Girl_on_Mobile-770x515-2.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets_Page-Seesaw_Comp-Girl_on_Mobile-770x515-2-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets_Page-Seesaw_Comp-Girl_on_Mobile-770x515-2-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets_Page-Seesaw_Comp-Girl_on_Mobile-770x515-2-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111958\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets-Page-Seesaw-Comp-CyberArk_Enforce-Privilege-770x515-1.jpg\" alt=\"Enforce Privilege\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets-Page-Seesaw-Comp-CyberArk_Enforce-Privilege-770x515-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets-Page-Seesaw-Comp-CyberArk_Enforce-Privilege-770x515-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets-Page-Seesaw-Comp-CyberArk_Enforce-Privilege-770x515-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets-Page-Seesaw-Comp-CyberArk_Enforce-Privilege-770x515-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-right\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>Appliquer le privil\u00e8ge<\/h4>\n<p>Isolez les menaces et emp\u00eachez les attaquants de se d\u00e9placer pour prendre le contr\u00f4le en g\u00e9rant les comptes \u00e0 privil\u00e8ges, les identifiants et les sessions et en \u00e9liminant les activit\u00e9s risqu\u00e9es.[\/vc_column_text][vc_btn title=\u00a0\u00bbEn savoir plus\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2Fprivileged-access-manager%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw cyb-reverse\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-left\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>S\u00e9curisez le DevOps<\/h4>\n<p>S\u00e9curisez les identifiants utilis\u00e9s par les applications, scripts et autres identit\u00e9s non humaines.[\/vc_column_text][vc_btn title=\u00a0\u00bbEn savoir plus\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2Fsecrets-manager-enterprise%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111966\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets_Page-Seesaw_Comp-SecureDevOps-770x515-1.jpg\" alt=\"Secure DevOps\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets_Page-Seesaw_Comp-SecureDevOps-770x515-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets_Page-Seesaw_Comp-SecureDevOps-770x515-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets_Page-Seesaw_Comp-SecureDevOps-770x515-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets_Page-Seesaw_Comp-SecureDevOps-770x515-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1621538972718{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cyber-security-section5-bckgrd.jpg?id=105424) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_full_width_resource\u00a0\u00bb][vc_column][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section5_title\u00a0\u00bb]<\/p>\n<h5 style=\"text-align: center;\">Rapport Forrester TEI<\/h5>\n<p>[\/vc_column_text][vc_row_inner el_class=\u00a0\u00bbnew_hpstyle_section5_container\u00a0\u00bb][vc_column_inner][vc_single_image image=\u00a0\u00bb118149&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section5_gart_img\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section5_text1&Prime;]<\/p>\n<h4>Rapport Forrester Total Economic Impact\u2122 sur la solution SaaS de CyberArk<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section5_text2&Prime;]<\/p>\n<p style=\"text-align: left;\">L\u2019\u00e9tude montre les \u00e9conomies r\u00e9alis\u00e9es par Privilege Cloud et Endpoint Privilege Manager de CyberArk.<\/p>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbLire l\u2019\u00e9tude de cas\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Finfographics%2Fforrester-tei-cyberark-saas-infographic|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid cyb-button-hpstyle_section5&Prime;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-hz sub-3&Prime;][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>S\u00e9curisez partout<\/h3>\n<p>Voici d\u2019autres m\u00e9thodes qui vous aideront \u00e0 progresser sans crainte dans un monde num\u00e9rique.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-110639\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Enable-the-Digital-Business-icon.svg\" alt=\"Enable the Digital Business icon\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1699360705923{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Favorisez l\u2019activit\u00e9 num\u00e9rique<\/h4>\n<p>S\u00e9curisez l\u2019acc\u00e8s aux applications professionnelles pour les identit\u00e9s humaines et machines.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/digital-business-transformation\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-110647\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Defend-Against-Attacks.svg\" alt=\"Defend Against Attacks Icon\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1699360716609{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Prot\u00e9gez-vous contre les attaques<\/h4>\n<p>Prot\u00e9gez-vous contre la cause principale des violations\u00a0: les identit\u00e9s et identifiants compromis.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/defend-against-attacks\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-110655\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Remote-Work.svg\" alt=\"Remote Work Icon\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1699360727761{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Support pour le travail \u00e0 distance<\/h4>\n<p>Fournissez \u00e0 votre personnel qui travaille \u00e0 distance les outils dont il a besoin, sans compromettre la s\u00e9curit\u00e9.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/remote-workforce-access\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-110663\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Stop-Ransomware-1.svg\" alt=\"Stop Ransomware Icon\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1699360736813{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Bloquez les ran\u00e7ongiciels<\/h4>\n<p>Obtenez un taux de r\u00e9ussite de 100\u00a0% dans la pr\u00e9vention des mouvements lat\u00e9raux afin de lutter contre plus de 3\u00a0millions de formes de ran\u00e7ongiciels.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/ransomware-protection\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbsub-4&Prime;][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_customer_stories vc_tta-o-non-responsive vc_custom_1608676874239 vc_row-has-fill vc_row-o-equal-height vc_row-flex\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_js\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<link rel=\"stylesheet\" type=\"text\/css\" href=\"\/\/cdn.jsdelivr.net\/npm\/slick-carousel@1.8.1\/slick\/slick.css\"\/>\n<script type=\"text\/javascript\" src=\"\/\/cdn.jsdelivr.net\/npm\/slick-carousel@1.8.1\/slick\/slick.min.js\"><\/script>\n<script>\njQuery(document).ready(function(){\n    \/\/Add Active to tab on page load\n    $panels = jQuery('.cybv2_customer_stories_tabs .vc_tta-panels .vc_tta-panel');\n    $tabs = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-list .vc_tta-tab');\n    var index = 0;\n\n    \/\/Align Tabs with panels\n    $panels.each(function(){\n        jQuery(this).hasClass('vc_active');\n        return false;\n        index++;\n    })\n    var newIndex = 0;\n    $tabs.each(function(){\n        if(index == newIndex){\n            jQuery(this).addClass('vc_active');\n        }\n        newIndex++;\n    })\n\n    \/\/Add custom icon to tabs\n    var iconIndex = 1;\n    $panels.each(function(){\n        $this = jQuery(this);\n        $tab = $this.find('.tab-icon');\n        $tab.find('img').prependTo(jQuery('.cybv2_customer_stories_tabs .vc_tta-tab:nth-of-type(' + iconIndex + ') a'));\n        jQuery('.cybv2_customer_stories_tabs .vc_tta-tab:nth-of-type(' + iconIndex + ') a i').remove()\n        $tab.remove();\n        iconIndex++;\n    })\n});\njQuery(window).on('load resize orientationchange', function() {\n    var $carousel = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list');\n    var $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n\n    \/\/Change slide to selected panel for tabs\n    var slideGoTo = function(){\n        if ($carousel.hasClass('slick-initialized')) {\n            $carousel.slick('slickGoTo', +jQuery(this).attr('data-slick-index'));\n            setTimeout(function(){ \n                $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n                $click.each(function(){\n                    if(jQuery(this).hasClass('vc_active') && (!jQuery(this).hasClass('slick-center') || !jQuery(this).hasClass('slick-active'))){\n                        jQuery(this).removeClass('vc_active');\n                    }\n                })\n            }, 1000);\n        }\n    }\n\n    \/\/Update panel for selected slide (aka tab)\n    var afterChangeFunction = function(slick, currentSlide){\n        $currentTab = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab.slick-center.slick-active a');\n        if(!$currentTab.parent().hasClass('vc_active')){\n            $currentTab.trigger('click');\n        }\n        \/*setTimeout(function(){ \n            $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n            $click.each(function(){\n                if(jQuery(this).hasClass('vc_active') && (!jQuery(this).hasClass('slick-center') || !jQuery(this).hasClass('slick-active'))){\n                    jQuery(this).removeClass('vc_active');\n                }\n            })\n        }, 1000);*\/\n    }\n\n    \/* Initializes a slick carousel only on mobile screens *\/\n    \/\/ slick on mobile\n    if (jQuery(window).width() > 768) {\n        if ($carousel.hasClass('slick-initialized')) {\n            $carousel.slick('unslick');\n            $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n            $click.unbind('click', slideGoTo)\n            $carousel.unbind('afterChange', afterChangeFunction);\n        }\n    }\n    else{\n        if (!$carousel.hasClass('slick-initialized')) {\n            $carousel.slick({\n                slidesToShow: 3,\n                slidesToScroll: 1,\n                mobileFirst: true,\n                infinite: true,\n                centerMode: true,\n                centerPadding: '50px'\n            });\n            $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n            $click.bind('click', slideGoTo)\n            $carousel.bind('afterChange', afterChangeFunction);\n            $click.each(function(){\n                if(jQuery(this).hasClass('vc_active') && !jQuery(this).hasClass('slick-cloned')){\n                    jQuery(this).trigger('click');\n                }\n            })\n        }\n    }\n});\n<\/script>\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_tta-container\" data-vc-action=\"collapse\"><div class=\"vc_general vc_tta vc_tta-tabs vc_tta-color-white vc_tta-style-flat vc_tta-shape-square vc_tta-o-shape-group vc_tta-gap-20  cybv2_customer_stories_tabs vc_tta-tabs-position-top vc_tta-controls-align-center vc_custom_1608676900675\"><div class=\"vc_tta-tabs-container\"><ul class=\"vc_tta-tabs-list\" role=\"tablist\"><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742493330-265de97c-f2d9eb66-6bf8\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Clients<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742494008-8c0fb98b-2b6beb66-6bf8\"><i class=\"vc_tta-icon fas fa-satellite-dish\"><\/i><span class=\"vc_tta-title-text\">Telco<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742494616-60a6dced-32cfeb66-6bf8\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Financier<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742495229-255d985e-6d0ceb66-6bf8\"><i class=\"vc_tta-icon fas fa-industry\"><\/i><span class=\"vc_tta-title-text\">Industrie<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742495902-f2d9a00d-8e74eb66-6bf8\"><i class=\"vc_tta-icon fas fa-university\"><\/i><span class=\"vc_tta-title-text\">Assurance<\/span><\/a><\/li><\/ul><\/div><div class=\"vc_tta-panels-container\"><div class=\"vc_tta-panels\"><div class=\"vc_tta-panel new_hpstyle_section6_tab1_icon vc_active\" id=\"1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Clients<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653500231\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Finance\" title=\"Finance-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/customers-icon.svg\" class=\"vc_single_image-img attachment-full\" alt=\"customer icon\" title=\"customers-icon\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u00ab\u00a0CyberArk a \u00e9t\u00e9 le meilleur fournisseur avec lequel j\u2019ai travaill\u00e9 au cours de ma carri\u00e8re informatique de plus de 20\u00a0ans. CyberArk fournit d\u2019excellents produits qui dominent le secteur dans la gestion des acc\u00e8s \u00e0 privil\u00e8ges\u00a0\u00bb<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Responsable de la s\u00e9curit\u00e9 informatique<\/strong>, Gestion de la s\u00e9curit\u00e9 et des risques<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/\">Lire d\u2019autres t\u00e9moignages de clients<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab2_icon\" id=\"1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-satellite-dish\"><\/i><span class=\"vc_tta-title-text\">Telco<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653503563\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Telecom-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Telecom\" title=\"Telecom-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Telecom-1.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"Telecom\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u00ab\u00a0Gr\u00e2ce \u00e0 CyberArk, nous sommes convaincus que nous avons mis en \u0153uvre une technologie qui fonctionnera avec nous au fur et \u00e0 mesure que notre entreprise grandira et se d\u00e9veloppera.\u00a0\u00bb<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Jean-Pierre Blanc<\/strong>, Bouygues Telecom<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/bouygues-telecom\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab3_icon\" id=\"1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Financier<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653481888\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance-02-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Finance-02-590x500\" title=\"Finance-02-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance.svg\" class=\"vc_single_image-img attachment-full\" alt=\"Finance\" title=\"Finance\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u00ab\u00a0Il ne s\u2019agit pas seulement d\u2019un exercice de v\u00e9rification de la conformit\u00e9, nous concevons et alignons activement les politiques sur les meilleures pratiques de cybers\u00e9curit\u00e9 pour renforcer notre niveau de s\u00e9curit\u00e9 globale et aligner nos \u00e9quipes internes.\u00a0\u00bb<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Joel Harris<\/strong>, Manager<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/national-australia-bank\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab4_icon\" id=\"1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-industry\"><\/i><span class=\"vc_tta-title-text\">Industrie<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653496575\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Customer-Identities-770x550-1-590x500.jpg\" width=\"590\" height=\"500\" alt=\"Customer-Identities----770x550\" title=\"Customer-Identities----770x550\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Manufactoring.svg\" class=\"vc_single_image-img attachment-full\" alt=\"Manufacturing\" title=\"Manufactoring\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u00ab\u00a0CyberArk nous a donn\u00e9 la visibilit\u00e9 et le contr\u00f4le granulaire n\u00e9cessaires pour appliquer \u00e0 la fois le principe du moindre privil\u00e8ge et la politique de contr\u00f4le des applications, \u00ab\u00a0refus par d\u00e9faut\u00a0\u00bb avec un minimum de perturbations pour l\u2019entreprise.\u00a0\u00bb<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Ken Brown<\/strong>, CISO<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/milliken\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab5_icon\" id=\"1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-university\"><\/i><span class=\"vc_tta-title-text\">Assurance<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653492933\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Insurance-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Insurance-590x500\" title=\"Insurance-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Insurance-1.svg\" class=\"vc_single_image-img attachment-full\" alt=\"insurance\" title=\"Insurance\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u00ab\u00a0Avec les migrations RPA et Cloud, les identifiants sont de plus en plus r\u00e9pandus en dehors des contr\u00f4les \u00ab\u00a0normaux\u00a0\u00bb. CyberArk peut se d\u00e9ployer pour couvrir tous les sc\u00e9narios de mani\u00e8re standard.\u00a0\u00bb<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Conseiller en s\u00e9curit\u00e9 de l\u2019information<\/strong>, Technologies des solutions de cybers\u00e9curit\u00e9 d\u2019entreprise<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/\">Lire d\u2019autres t\u00e9moignages de clients<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources sub-5&Prime; css=\u00a0\u00bb.vc_custom_1617037772046{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbno-break\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbno-break\u00a0\u00bb]<\/p>\n<h3>Explorez les<br \/>\nressources<br \/>\nconnexes<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/resources\/\">Afficher toutes les ressources<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip\u00a0\u00bb][vc_column el_class=\u00a0\u00bbnew_hpstyle_section8_col1&Prime;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00a0\u00bb.vc_custom_1611200738035{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section8_uberflip\u00a0\u00bb]PCEtLSBVYmVyZmxpcCBFbWJlZGRlZCBIdWIgV2lkZ2V0IC0tPg0KDQogIDxkaXYgaWQ9IlVmRW1iZWRkZWRIdWIxNjEwNDY0ODEwODY4Ij48L2Rpdj4NCg0KICA8c2NyaXB0Pg0KICB3aW5kb3cuX3VmSHViQ29uZmlnID0gd2luZG93Ll91Zkh1YkNvbmZpZyB8fCBbXTsNCiAgd2luZG93Ll91Zkh1YkNvbmZpZy5wdXNoKHsNCiAgICAnY29udGFpbmVycyc6eydhcHAnOicjVWZFbWJlZGRlZEh1YjE2MTA0NjQ4MTA4NjgnfSwNCiAgICAnY29sbGVjdGlvbic6ICc3NDUxMTg4JywNCiAgICAnb3BlbkxpbmsnOmZ1bmN0aW9uKHVybCl7DQogICAgICB3aW5kb3cudG9wLmxvY2F0aW9uLmhyZWY9dXJsOw0KICAgIH0sDQogICAgJ2xhenlsb2FkZXInOnsNCiAgICAgICdpdGVtRGlzcGxheUxpbWl0JzoyMCwNCiAgICAgICdtYXhUaWxlc1BlclJvdyc6MywNCiAgICAgICdtYXhJdGVtc1RvdGFsJzogMw0KICAgIH0sDQogICAgJ3RpbGVTaXplJzogJ2xhcmdlJywNCiAgICAnZW5hYmxlUGFnZVRyYWNraW5nJzpmYWxzZSwNCiAgICAnYmFzZVVybCc6ICdodHRwczovL3d3dy5jeWJlcmFyay5jb20vcmVzb3VyY2VzLycsDQogICAgJ2ZpbGVzVXJsJzogJ2h0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9yZXNvdXJjZXMvJywNCiAgICAnZ2VuZXJhdGVkQXRVVEMnOiAnMjAyMS0wMS0xMiAxNDo1OTozMicsDQogIH0pOw0KICA8L3NjcmlwdD4NCg0KICA8c2NyaXB0PihmdW5jdGlvbihkLHQsdSkgew0KICAgIGZ1bmN0aW9uIGxvYWQoKXsNCiAgICAgIHZhciBzPWQuY3JlYXRlRWxlbWVudCh0KTtzLnNyYz11O2QuYm9keS5hcHBlbmRDaGlsZChzKTsNCiAgICB9DQogICAgaWYgKHdpbmRvdy5hZGRFdmVudExpc3RlbmVyKSB7DQogICAgICB3aW5kb3cuYWRkRXZlbnRMaXN0ZW5lcignbG9hZCcsbG9hZCxmYWxzZSk7DQogICAgfQ0KICAgIGVsc2UgaWYgKHdpbmRvdy5hdHRhY2hFdmVudCkgew0KICAgICAgd2luZG93LmF0dGFjaEV2ZW50KCdvbmxvYWQnLGxvYWQpOw0KICAgIH0NCiAgICBlbHNlew0KICAgICAgd2luZG93Lm9ubG9hZD1sb2FkOw0KICAgIH0NCiAgfShkb2N1bWVudCwnc2NyaXB0JywnaHR0cHM6Ly93d3cuY3liZXJhcmsuY29tL3Jlc291cmNlcy9odWJzRnJvbnQvZW1iZWRfY29sbGVjdGlvbicpKTsNCiAgPC9zY3JpcHQ+DQogIDwhLS0gL0VuZCBVYmVyZmxpcCBFbWJlZGRlZCBIdWIgV2lkZ2V0IC0tPg==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad cybv2-oval-left-background hv-cta-list\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1611885567532{background-color: #ff7600 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbimg-box cyb-clm-background-rc\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1612378479966{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/high-value-CTA.jpg?id=111985) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbstat-column\u00a0\u00bb][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb width=\u00a0\u00bb3\/4&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text]<\/p>\n<h2>Demandez une d\u00e9mo<\/h2>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]Automatisez la gestion des privil\u00e8ges et des secrets[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]Gestion des acc\u00e8s contextuelle, bas\u00e9e sur les risques et adaptative (SSO, MFA, LCM)[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]Interface unique pour administrer, attribuer les privil\u00e8ges d\u2019acc\u00e8s, permettre l\u2019acc\u00e8s et s\u00e9curiser les identit\u00e9s[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_btn title=\u00a0\u00bbDemandez une d\u00e9mo\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Frequest-demo%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":51588,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-115336","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Am\u00e9liorez l\u2019efficacit\u00e9 des op\u00e9rations de s\u00e9curit\u00e9 | CyberArk<\/title>\n<meta name=\"description\" content=\"Am\u00e9liorez l\u2019efficacit\u00e9 des op\u00e9rations de s\u00e9curit\u00e9 et r\u00e9duisez la complexit\u00e9 et la charge informatique gr\u00e2ce \u00e0 des solutions de s\u00e9curit\u00e9 des identit\u00e9s qui am\u00e9liorent la protection de l\u2019entreprise.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Efficacit\u00e9 op\u00e9rationnelle\" \/>\n<meta property=\"og:description\" content=\"Am\u00e9liorez l\u2019efficacit\u00e9 des op\u00e9rations de s\u00e9curit\u00e9 et r\u00e9duisez la complexit\u00e9 et la charge informatique gr\u00e2ce \u00e0 des solutions de s\u00e9curit\u00e9 des identit\u00e9s qui am\u00e9liorent la protection de l\u2019entreprise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-13T23:04:51+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/\",\"url\":\"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/\",\"name\":\"Am\u00e9liorez l\u2019efficacit\u00e9 des op\u00e9rations de s\u00e9curit\u00e9 | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/DevSecOps-Icon.svg\",\"datePublished\":\"2021-02-03T23:41:35+00:00\",\"dateModified\":\"2025-02-13T23:04:51+00:00\",\"description\":\"Am\u00e9liorez l\u2019efficacit\u00e9 des op\u00e9rations de s\u00e9curit\u00e9 et r\u00e9duisez la complexit\u00e9 et la charge informatique gr\u00e2ce \u00e0 des solutions de s\u00e9curit\u00e9 des identit\u00e9s qui am\u00e9liorent la protection de l\u2019entreprise.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/DevSecOps-Icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/DevSecOps-Icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions de s\u00e9curit\u00e9 des identit\u00e9s\",\"item\":\"https:\/\/www.cyberark.com\/fr\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Efficacit\u00e9 op\u00e9rationnelle\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Am\u00e9liorez l\u2019efficacit\u00e9 des op\u00e9rations de s\u00e9curit\u00e9 | CyberArk","description":"Am\u00e9liorez l\u2019efficacit\u00e9 des op\u00e9rations de s\u00e9curit\u00e9 et r\u00e9duisez la complexit\u00e9 et la charge informatique gr\u00e2ce \u00e0 des solutions de s\u00e9curit\u00e9 des identit\u00e9s qui am\u00e9liorent la protection de l\u2019entreprise.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/","og_locale":"fr_FR","og_type":"article","og_title":"Efficacit\u00e9 op\u00e9rationnelle","og_description":"Am\u00e9liorez l\u2019efficacit\u00e9 des op\u00e9rations de s\u00e9curit\u00e9 et r\u00e9duisez la complexit\u00e9 et la charge informatique gr\u00e2ce \u00e0 des solutions de s\u00e9curit\u00e9 des identit\u00e9s qui am\u00e9liorent la protection de l\u2019entreprise.","og_url":"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-02-13T23:04:51+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/","url":"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/","name":"Am\u00e9liorez l\u2019efficacit\u00e9 des op\u00e9rations de s\u00e9curit\u00e9 | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/DevSecOps-Icon.svg","datePublished":"2021-02-03T23:41:35+00:00","dateModified":"2025-02-13T23:04:51+00:00","description":"Am\u00e9liorez l\u2019efficacit\u00e9 des op\u00e9rations de s\u00e9curit\u00e9 et r\u00e9duisez la complexit\u00e9 et la charge informatique gr\u00e2ce \u00e0 des solutions de s\u00e9curit\u00e9 des identit\u00e9s qui am\u00e9liorent la protection de l\u2019entreprise.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/DevSecOps-Icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/DevSecOps-Icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Solutions de s\u00e9curit\u00e9 des identit\u00e9s","item":"https:\/\/www.cyberark.com\/fr\/solutions\/"},{"@type":"ListItem","position":3,"name":"Efficacit\u00e9 op\u00e9rationnelle"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/fr\/#website","url":"https:\/\/www.cyberark.com\/fr\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/fr\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/115336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=115336"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/115336\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51588"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=115336"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=115336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}