{"id":115350,"date":"2021-03-23T09:35:52","date_gmt":"2021-03-23T13:35:52","guid":{"rendered":"https:\/\/www.cyberark.com\/services-support\/remediation\/"},"modified":"2024-02-01T02:56:04","modified_gmt":"2024-02-01T07:56:04","slug":"remediation","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/services-support\/remediation\/","title":{"rendered":"Correction"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero cta-box slate\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text]<\/p>\n<h1>Services de correction<\/h1>\n<h2>Reprenez rapidement le contr\u00f4le des identifiants \u00e0 privil\u00e8ges compromis avec l\u2019expertise et le logiciel appropri\u00e9s.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbPr\u00e9sentation de la solution\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fsolution-briefs%2Fcyberark-remediation-services-solution-brief%2F|title:solution%20brief|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbcolumn-2&Prime;][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb][vc_column_inner width=\u00a0\u00bb1\/4&Prime; offset=\u00a0\u00bbvc_col-xs-3&Prime;][vc_single_image image=\u00a0\u00bb113406&Prime; img_size=\u00a0\u00bb94&#215;94&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-xs-8&Prime;][vc_column_text el_class=\u00a0\u00bbtext\u00a0\u00bb]<strong>Vous constatez une violation ?<\/strong><br \/>\nNos consultants certifi\u00e9s en r\u00e9action aux incidents sont l\u00e0 pour vous aider.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/services-support\/remediations-team\/\">Contact Us<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-vt\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1611617874123{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Reprenez le contr\u00f4le<\/h3>\n<p>Acc\u00e9l\u00e9rez votre r\u00e9cup\u00e9ration avec CyberArk services de correction.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-114683\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Accelerate-Recovery.svg\" alt=\"Accelerate Recovery Icon\" width=\"300\" height=\"300\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Acc\u00e9l\u00e9rez la r\u00e9cup\u00e9ration<\/h4>\n<p>Garantissez une r\u00e9cup\u00e9ration rapide avec des conditions pr\u00e9d\u00e9finies et un acc\u00e8s imm\u00e9diat \u00e0 l\u2019une des solutions de s\u00e9curit\u00e9 des identit\u00e9s n\u00e9cessaires.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114691\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Improve-Outcomes.svg\" alt=\"Improve Outcomes Icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Am\u00e9liorez les r\u00e9sultats<\/h4>\n<p>Les consultants et ing\u00e9nieurs certifi\u00e9s CyberArk en r\u00e9ponse aux incidents vous apportent des d\u00e9cennies d\u2019exp\u00e9rience dans le monde r\u00e9el.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114699\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Proactive-Protection.svg\" alt=\"Proactive Protection Icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Protection proactive<\/h4>\n<p>Les clients CyberArk peuvent r\u00e9server des services de correction \u00e0 l\u2019avance sans frais et les non-clients peuvent acheter sur une base ad hoc pour r\u00e9soudre des probl\u00e8mes de s\u00e9curit\u00e9 urgents.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-top text-md-center\u00a0\u00bb][vc_column][vc_column_text]<\/p>\n<h2>Reprenez votre activit\u00e9 rapidement<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-btm text-md-center\u00a0\u00bb][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-2&Prime;][vc_column_text]<\/p>\n<h5>Att\u00e9nuez l\u2019impact des attaques sophistiqu\u00e9es et r\u00e9tablissez rapidement et efficacement les services critiques de l\u2019entreprise.<\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove wistia_embed\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-114707\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Conjur-Secrets-Manager-seesaw.jpeg\" alt=\"Rapid Response\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Conjur-Secrets-Manager-seesaw.jpeg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Conjur-Secrets-Manager-seesaw-300x201.jpeg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Conjur-Secrets-Manager-seesaw-768x514.jpeg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Conjur-Secrets-Manager-seesaw-150x100.jpeg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-right\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>R\u00e9ponse rapide<\/h4>\n<p>Si votre entreprise conna\u00eet une violation de la s\u00e9curit\u00e9 <a href=\"https:\/\/www.cyberark.com\/fr\/products\/privileged-access\/\">privileged access<\/a>, CyberArk d\u00e9signera rapidement une \u00e9quipe de professionnels de services exp\u00e9riment\u00e9s pour vous aider \u00e0 isoler et \u00e0 att\u00e9nuer efficacement la menace.[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw cyb-reverse\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-left\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>Experts disponibles<\/h4>\n<p>Notre \u00e9quipe de services de correction comprend des consultants certifi\u00e9s, en r\u00e9ponse aux incidents et des ing\u00e9nieurs certifi\u00e9s CyberArk qui parlent la langue des intervenants de premi\u00e8re ligne et ma\u00eetrisent bien l\u2019utilisation des solutions CyberArk.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-114715\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/ExpertsOnCall-seesaw.jpeg\" alt=\"Experts On Call\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/ExpertsOnCall-seesaw.jpeg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/ExpertsOnCall-seesaw-300x201.jpeg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/ExpertsOnCall-seesaw-768x514.jpeg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/ExpertsOnCall-seesaw-150x100.jpeg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-114723\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/TrustedPlaybook-seesaw.jpeg\" alt=\"A Trusted Playbook\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/TrustedPlaybook-seesaw.jpeg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/TrustedPlaybook-seesaw-300x201.jpeg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/TrustedPlaybook-seesaw-768x514.jpeg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/TrustedPlaybook-seesaw-150x100.jpeg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-right\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>Un guide op\u00e9rationnel fiable<\/h4>\n<p>CyberArk a d\u00e9velopp\u00e9 une s\u00e9rie de guides op\u00e9rationnels pour \u00e9valuer, hi\u00e9rarchiser et r\u00e9pondre aux incidents de s\u00e9curit\u00e9 des acc\u00e8s \u00e0 privil\u00e8ges afin de vous aider \u00e0 contenir rapidement les menaces et \u00e0 reprendre le contr\u00f4le.[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw cyb-reverse\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-left\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>M\u00e9thode \u00e9prouv\u00e9e<\/h4>\n<p>CyberArk a corrig\u00e9 certaines des plus grandes violations du XXIe si\u00e8cle et nous pouvons \u00e9galement aider votre entreprise.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-114731\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/BattleTested-seesaw.jpeg\" alt=\"Battle Tested\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/BattleTested-seesaw.jpeg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/BattleTested-seesaw-300x201.jpeg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/BattleTested-seesaw-768x514.jpeg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/BattleTested-seesaw-150x100.jpeg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-114739\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/IndustryLeadingSolutions-SeeSaw.jpeg\" alt=\"Industry Leading Solutions\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/IndustryLeadingSolutions-SeeSaw.jpeg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/IndustryLeadingSolutions-SeeSaw-300x201.jpeg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/IndustryLeadingSolutions-SeeSaw-768x514.jpeg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/IndustryLeadingSolutions-SeeSaw-150x100.jpeg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-right\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>Solutions de pointe<\/h4>\n<p>L\u2019\u00e9quipe a un acc\u00e8s total \u00e0 l\u2019ensemble du portefeuille de solutions CyberArk tout au long de l\u2019effort de correction. Une fois le contr\u00f4le r\u00e9tabli, vous pouvez choisir de continuer \u00e0 accorder des licences aux solutions CyberArk pour vous prot\u00e9ger contre les incidents futurs.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbno-break\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbno-break\u00a0\u00bb]<\/p>\n<h3>Explorez les<br \/>\nressources<br \/>\nconnexes<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/resources\/\">Afficher toutes les ressources<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip\u00a0\u00bb][vc_column el_class=\u00a0\u00bbnew_hpstyle_section8_col1&Prime;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html el_class=\u00a0\u00bbnew_hpstyle_section8_uberflip\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1616177064868{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad cybv2-oval-left-background hv-cta-list\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1611885567532{background-color: #ff7600 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbimg-box\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1616178945141{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/AdobeStock_283522687-HighValueCTA.jpeg?id=114747) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbstat-column\u00a0\u00bb][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb width=\u00a0\u00bb3\/4&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text]<\/p>\n<h2>\u00c9valuation rapide des risques<\/h2>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"checklist icon\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]Reprenez les commandes et le contr\u00f4le[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"checklist icon\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]Travaillez avec une \u00e9quipe d\u2019experts[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"checklist icon\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]Corrigez les menaces urgentes[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_btn title=\u00a0\u00bbDemander une \u00e9valuation\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Ftry-buy%2Frapid-risk-assessment%2F|title:Demander%20une%20%C3%A9valuation|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero cta-box slate\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text] Services de correction Reprenez rapidement le contr\u00f4le des identifiants \u00e0 privil\u00e8ges compromis avec l\u2019expertise et le logiciel appropri\u00e9s. [\/vc_column_text][vc_btn title=\u00a0\u00bbPr\u00e9sentation de la solution\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":52431,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-115350","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Correction | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/services-support\/remediation\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Correction\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero cta-box slate\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text] Services de correction Reprenez rapidement le contr\u00f4le des identifiants \u00e0 privil\u00e8ges compromis avec l\u2019expertise et le logiciel appropri\u00e9s. [\/vc_column_text][vc_btn title=\u00a0\u00bbPr\u00e9sentation de la solution\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/services-support\/remediation\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-01T07:56:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Accelerate-Recovery.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/services-support\/remediation\/\",\"url\":\"https:\/\/www.cyberark.com\/services-support\/remediation\/\",\"name\":\"Correction | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/services-support\/remediation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/services-support\/remediation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Accelerate-Recovery.svg\",\"datePublished\":\"2021-03-23T13:35:52+00:00\",\"dateModified\":\"2024-02-01T07:56:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/services-support\/remediation\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/services-support\/remediation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/services-support\/remediation\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Accelerate-Recovery.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Accelerate-Recovery.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/services-support\/remediation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services et support\",\"item\":\"https:\/\/www.cyberark.com\/services-support\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Correction\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Correction | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/services-support\/remediation\/","og_locale":"fr_FR","og_type":"article","og_title":"Correction","og_description":"[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero cta-box slate\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text] Services de correction Reprenez rapidement le contr\u00f4le des identifiants \u00e0 privil\u00e8ges compromis avec l\u2019expertise et le logiciel appropri\u00e9s. [\/vc_column_text][vc_btn title=\u00a0\u00bbPr\u00e9sentation de la solution\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb...","og_url":"https:\/\/www.cyberark.com\/services-support\/remediation\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2024-02-01T07:56:04+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Accelerate-Recovery.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/services-support\/remediation\/","url":"https:\/\/www.cyberark.com\/services-support\/remediation\/","name":"Correction | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/services-support\/remediation\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/services-support\/remediation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Accelerate-Recovery.svg","datePublished":"2021-03-23T13:35:52+00:00","dateModified":"2024-02-01T07:56:04+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/services-support\/remediation\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/services-support\/remediation\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/services-support\/remediation\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Accelerate-Recovery.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Accelerate-Recovery.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/services-support\/remediation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Services et support","item":"https:\/\/www.cyberark.com\/services-support\/"},{"@type":"ListItem","position":3,"name":"Correction"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/115350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=115350"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/115350\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/52431"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=115350"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=115350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}