{"id":115385,"date":"2021-03-22T16:13:14","date_gmt":"2021-03-22T20:13:14","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/federal\/"},"modified":"2025-02-06T05:44:51","modified_gmt":"2025-02-06T10:44:51","slug":"federal","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/solutions\/federal\/","title":{"rendered":"Administrations f\u00e9d\u00e9rales"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-full\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text]<\/p>\n<h1>Solutions pour les administrations f\u00e9d\u00e9rales<\/h1>\n<h2>S\u00e9curisez l\u2019acc\u00e8s pour toutes les identit\u00e9s, sur tous les appareils, partout et au bon moment afin de prot\u00e9ger l\u2019infrastructure et les donn\u00e9es gouvernementales sensibles.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbLire le livre blanc\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fmitigate-risk-with-privileged-access-management|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1616174629453{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Federal.jpeg?id=114905) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}\u00a0\u00bb el_class=\u00a0\u00bbcolumn-2&Prime;][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-vt\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1611617874123{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Garantir la continuit\u00e9 des services de sant\u00e9<\/h3>\n<p>Offrant la plateforme de s\u00e9curit\u00e9 des identit\u00e9s la plus compl\u00e8te du secteur, CyberArk est pl\u00e9biscit\u00e9 par plus de 8\u00a0000\u00a0clients dans le monde entier.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114480\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/PreventAttacks.svg\" alt=\"Ic\u00f4ne Pr\u00e9vention des attaques\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Pr\u00e9vention des attaques<\/h4>\n<p>D\u00e9ployez des solutions fiables de s\u00e9curit\u00e9 des acc\u00e8s \u00e0 privil\u00e8ges pour vous prot\u00e9ger contre les menaces pesant sur les donn\u00e9es et les syst\u00e8mes f\u00e9d\u00e9raux.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114547\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/SecureDevOps.svg\" alt=\"Ic\u00f4ne Gagner la confiance des consommateurs \" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Gagner la confiance des consommateurs<\/h4>\n<p>Travaillez avec des outils DevOps qui facilitent l\u2019int\u00e9gration de la s\u00e9curit\u00e9 dans les applications grand public.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114415\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Compliance.svg\" alt=\"Ic\u00f4ne Conformit\u00e9\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Garantir la conformit\u00e9<\/h4>\n<p>Respectez les r\u00e9glementations cl\u00e9s, y compris FISMA et d\u2019autres normes NIST et NERC.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-top text-md-center\u00a0\u00bb][vc_column][vc_column_text]<\/p>\n<h2>R\u00e9pondez aux exigences des r\u00e9glementations sectorielles les plus rigoureuses<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-btm text-md-center\u00a0\u00bb][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-2&Prime;][vc_column_text]<\/p>\n<h5>Il ne devrait pas \u00eatre difficile de ma\u00eetriser les nouvelles r\u00e9glementations et d\u2019anticiper les menaces \u00e9mergentes.<\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove wistia_embed\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-120535\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-FISMA-and-NIST-800-53.jpeg\" alt=\"Logo NIST\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-FISMA-and-NIST-800-53.jpeg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-FISMA-and-NIST-800-53-300x201.jpeg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-FISMA-and-NIST-800-53-768x514.jpeg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-FISMA-and-NIST-800-53-150x100.jpeg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-right\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>FISMA NIST SP 800-53<\/h4>\n<p><a href=\"https:\/\/www.cyberark.com\/fr\/products\/privileged-access-manager\/\">La solution int\u00e9gr\u00e9e de gestion des acc\u00e8s \u00e0 privil\u00e8ges<\/a> et les solutions de surveillance en temps r\u00e9el de CyberArk r\u00e9pondent aux exigences des r\u00e9glementations FISMA et NIST 800-53 en offrant une approche bas\u00e9e sur les risques pour \u00e9tablir les programmes de s\u00e9curit\u00e9 de l\u2019information d\u2019une agence.[\/vc_column_text][vc_btn title=\u00a0\u00bbT\u00e9l\u00e9charger le livre blanc\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fnist-sp-800-53-revision-5-implementing-essential-security-controls-with-cyberark-solutions|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw cyb-reverse\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-left\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>NERC CIP<\/h4>\n<p>Dans le secteur des services \u00e9nerg\u00e9tiques, il peut \u00eatre difficile de se conformer aux normes NERC pour les comptes \u00e0 privil\u00e8ges en raison de la taille et de la complexit\u00e9 des syst\u00e8mes de contr\u00f4le industriel.<\/p>\n<p>Avec la solution Privileged Access Manager de CyberArk, les entreprises de service public de distribution d\u2019\u00e9lectricit\u00e9 peuvent r\u00e9pondre aux normes NERC CIP en rendant compte de chaque utilisation de comptes \u00e0 privil\u00e8ges ou partag\u00e9s.[\/vc_column_text][vc_btn title=\u00a0\u00bbT\u00e9l\u00e9charger le livre blanc\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fprotecting-the-grid-addressing-nerc-cip-requirements-for-securing-privileged-access|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-120543\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-NERC.jpeg\" alt=\"Logo NERC\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-NERC.jpeg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-NERC-300x201.jpeg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-NERC-768x514.jpeg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-NERC-150x100.jpeg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove wistia_embed\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-189188 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/fed-ramp-card.png\" alt=\"Autorisation FedRAMP au niveau d\u2019impact \u00e9lev\u00e9\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/fed-ramp-card.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/fed-ramp-card-300x201.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/fed-ramp-card-768x514.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/fed-ramp-card-150x100.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-right\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>Autorisation FedRAMP au niveau d\u2019impact \u00e9lev\u00e9<\/h4>\n<p>D\u00e9couvrez les solutions SaaS leaders de CyberArk, CyberArk Endpoint Privilege Manager et CyberArk Workforce Identity, qui b\u00e9n\u00e9ficient de l\u2019autorisation FedRAMP au niveau d\u2019impact \u00e9lev\u00e9, renfor\u00e7ant ainsi la s\u00e9curit\u00e9 des agences f\u00e9d\u00e9rales conform\u00e9ment aux principes Zero Trust.[\/vc_column_text][vc_btn title=\u00a0\u00bbEn savoir plus\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fpress%2Fcyberark-achieves-fedramp-high-authorization%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw cyb-reverse\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-left\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>Liste des produits approuv\u00e9s du r\u00e9seau d\u2019information du minist\u00e8re am\u00e9ricain de la D\u00e9fense (DoDIN APL)<\/h4>\n<p>La solution Privileged Access Manager Self-Hosted de CyberArk a \u00e9t\u00e9 officiellement inscrite sur la liste des solutions de confiance pour les usagers du minist\u00e8re am\u00e9ricain de la D\u00e9fense (DoD). La solution CyberArk PAM Self-Hosted est inscrite sur la liste des produits approuv\u00e9s du r\u00e9seau d\u2019information du minist\u00e8re am\u00e9ricain de la d\u00e9fense (DoDIN APL) et est conforme aux sp\u00e9cifications du minist\u00e8re am\u00e9ricain de la D\u00e9fense.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-189761 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/network-approved-product-1.png\" alt=\"\" width=\"720\" height=\"455\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/network-approved-product-1.png 720w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/network-approved-product-1-300x190.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/network-approved-product-1-150x95.png 150w\" sizes=\"auto, (max-width: 720px) 100vw, 720px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-hz\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1626123100448{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>\u00c0 votre service<\/h3>\n<p>Voici quelques exemples de fa\u00e7ons dont CyberArk peut vous aider \u00e0 avancer en toute confiance.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114571\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/DefendAgainstAttacks.svg\" alt=\"Prot\u00e9gez-vous contre les attaques\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1697707560542{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Prot\u00e9gez-vous contre les attaques<\/h4>\n<p>Prot\u00e9gez-vous contre la cause principale des compromissions\u00a0: les identit\u00e9s et identifiants compromis.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/defend-against-attacks\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114431\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Ransomware.svg\" alt=\"Bloquez les ransomwares\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1697707568161{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Bloquez les ransomwares<\/h4>\n<p>Emp\u00eachez les mouvements lat\u00e9raux et garantissez une s\u00e9curit\u00e9 sans faille contre plus de 3\u00a0millions de formes de ransomwares.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/ransomware-protection\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114579\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/ThirdPartyAccess.svg\" alt=\"S\u00e9curisez l\u2019acc\u00e8s des tiers\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1697707583043{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>S\u00e9curisez l\u2019acc\u00e8s des tiers<\/h4>\n<p>Connectez vos partenaires externes rapidement et efficacement aux ressources dont ils ont besoin.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/products\/vendor-privileged-access-manager\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114488\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Satisfy-Audit-and-Compliance-icon.svg\" alt=\"Respect des exigences des audits et de conformit\u00e9\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1697707593416{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Respectez les exigences des audits et de conformit\u00e9<\/h4>\n<p>Garantissez votre conformit\u00e9 \u00e0 un large \u00e9ventail de r\u00e9glementations, normes et cadres g\u00e9n\u00e9raux et sectoriels tels que ISO\/IEC 27002, NIST et HIPAA.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-top text-md-center\u00a0\u00bb][vc_column][vc_column_text]<\/p>\n<h2>Plateforme de s\u00e9curit\u00e9 des identit\u00e9s CyberArk<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-btm text-md-center\u00a0\u00bb][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-2&Prime;][vc_column_text]<\/p>\n<h5>Leader reconnu dans la gestion des acc\u00e8s \u00e0 privil\u00e8ges, CyberArk offre les fonctionnalit\u00e9s de s\u00e9curit\u00e9 des identit\u00e9s les plus compl\u00e8tes et les plus flexibles du secteur.<\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove wistia_embed\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-114447\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw.jpg\" alt=\"Acc\u00e8s \u00e0 privil\u00e8ges\" width=\"1500\" height=\"1000\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw.jpg 1500w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw-300x200.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw-1024x683.jpg 1024w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw-768x512.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw-150x100.jpg 150w\" sizes=\"auto, (max-width: 1500px) 100vw, 1500px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-right\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>Acc\u00e8s \u00e0 privil\u00e8ges<\/h4>\n<p>80\u00a0% des compromissions de la s\u00e9curit\u00e9 sont dues \u00e0 des identifiants \u00e0 privil\u00e8ges compromis. Avec CyberArk, vous pouvez isoler et arr\u00eater les attaques ciblant les privil\u00e8ges avant qu\u2019elles ne causent un pr\u00e9judice. Vos utilisateurs ont un acc\u00e8s natif \u00e0 toutes les ressources dont ils ont besoin et vous avez l\u2019assurance que vos actifs critiques sont en s\u00e9curit\u00e9.[\/vc_column_text][vc_btn title=\u00a0\u00bbExplorer les produits\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2Fprivileged-access%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw cyb-reverse\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-left\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>Identit\u00e9s du personnel et des clients<\/h4>\n<p>L\u2019identit\u00e9 est le nouveau \u00ab\u00a0champ de bataille\u00a0\u00bb en mati\u00e8re de s\u00e9curit\u00e9. La mise en \u0153uvre d\u2019une authentification forte sans mot de passe permet d\u2019accorder aux utilisateurs un acc\u00e8s transparent aux ressources, tandis que les solutions d\u2019IA maintiennent les menaces \u00e0 l\u2019\u00e9cart. Offrez \u00e0 votre personnel et \u00e0 vos clients un acc\u00e8s facile et s\u00e9curis\u00e9 \u00e0 partir de n\u2019importe quel appareil, n\u2019importe o\u00f9 et au bon moment.[\/vc_column_text][vc_btn title=\u00a0\u00bbExplorer les produits\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2Faccess-management%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-114312\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1.jpg\" alt=\"Gestion des acc\u00e8s\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-114304\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-img-03-770x515-1.jpg\" alt=\"S\u00e9curit\u00e9 DevOps\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-img-03-770x515-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-img-03-770x515-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-img-03-770x515-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-img-03-770x515-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-right\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>S\u00e9curisez le DevOps<\/h4>\n<p>Les outils d\u2019application et d\u2019automatisation sont essentiels \u00e0 l\u2019innovation. Le probl\u00e8me est qu\u2019ils constituent une cible privil\u00e9gi\u00e9e pour commettre des cyberattaques sophistiqu\u00e9es. Nous pouvons vous aider \u00e0 s\u00e9curiser les identit\u00e9s non humaines dans le <a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/devsecops-cloud-native-apps\/\">pipeline DevOps<\/a>, sans sacrifier votre agilit\u00e9 op\u00e9rationnelle.[\/vc_column_text][vc_btn title=\u00a0\u00bbExplorer les produits\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2Fdevsecops%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime;][vc_column_text el_class=\u00a0\u00bbno-break\u00a0\u00bb]<\/p>\n<h3>Explorer les<br \/>\nressources<br \/>\nconnexes<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\">Voir toutes les ressources<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column\u00a0\u00bb][vc_column el_class=\u00a0\u00bbnew_hpstyle_section8_col1&Prime;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html el_class=\u00a0\u00bbnew_hpstyle_section8_uberflip\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1674510261051{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad cybv2-oval-left-background hv-cta-list\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1611885567532{background-color: #ff7600 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbimg-box\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1616016703186{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Federal-HighValue-CTA.jpg?id=114587) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbstat-column\u00a0\u00bb][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb width=\u00a0\u00bb3\/4&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text]<\/p>\n<h2>Demander une d\u00e9mo<\/h2>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]Prot\u00e9gez les acc\u00e8s \u00e0 privil\u00e8ges dans toute l\u2019agence[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]Respectez les exigences de conformit\u00e9 en toute confiance[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]Cr\u00e9ez des applications grand public qui inspirent confiance[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_btn title=\u00a0\u00bbDemander une d\u00e9mo\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Frequest-demo%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":51588,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-115385","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Solutions de s\u00e9curit\u00e9 des identit\u00e9s et de gestion des acc\u00e8s des administrations f\u00e9d\u00e9rales | CyberArk<\/title>\n<meta name=\"description\" content=\"Prot\u00e9gez l\u2019infrastructure et les donn\u00e9es sensibles des administrations f\u00e9d\u00e9rales avec un acc\u00e8s s\u00e9curis\u00e9 pour toutes les identit\u00e9s, sur tous les appareils, partout et au bon moment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/federal\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Administrations f\u00e9d\u00e9rales\" \/>\n<meta property=\"og:description\" content=\"Prot\u00e9gez l\u2019infrastructure et les donn\u00e9es sensibles des administrations f\u00e9d\u00e9rales avec un acc\u00e8s s\u00e9curis\u00e9 pour toutes les identit\u00e9s, sur tous les appareils, partout et au bon moment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/federal\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-06T10:44:51+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/federal\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/federal\/\",\"name\":\"Solutions de s\u00e9curit\u00e9 des identit\u00e9s et de gestion des acc\u00e8s des administrations f\u00e9d\u00e9rales | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/federal\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/federal\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/PreventAttacks.svg\",\"datePublished\":\"2021-03-22T20:13:14+00:00\",\"dateModified\":\"2025-02-06T10:44:51+00:00\",\"description\":\"Prot\u00e9gez l\u2019infrastructure et les donn\u00e9es sensibles des administrations f\u00e9d\u00e9rales avec un acc\u00e8s s\u00e9curis\u00e9 pour toutes les identit\u00e9s, sur tous les appareils, partout et au bon moment.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/federal\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/federal\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/federal\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/PreventAttacks.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/PreventAttacks.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/federal\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions de s\u00e9curit\u00e9 des identit\u00e9s\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Administrations f\u00e9d\u00e9rales\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Solutions de s\u00e9curit\u00e9 des identit\u00e9s et de gestion des acc\u00e8s des administrations f\u00e9d\u00e9rales | CyberArk","description":"Prot\u00e9gez l\u2019infrastructure et les donn\u00e9es sensibles des administrations f\u00e9d\u00e9rales avec un acc\u00e8s s\u00e9curis\u00e9 pour toutes les identit\u00e9s, sur tous les appareils, partout et au bon moment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/federal\/","og_locale":"fr_FR","og_type":"article","og_title":"Administrations f\u00e9d\u00e9rales","og_description":"Prot\u00e9gez l\u2019infrastructure et les donn\u00e9es sensibles des administrations f\u00e9d\u00e9rales avec un acc\u00e8s s\u00e9curis\u00e9 pour toutes les identit\u00e9s, sur tous les appareils, partout et au bon moment.","og_url":"https:\/\/www.cyberark.com\/solutions\/federal\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-02-06T10:44:51+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/federal\/","url":"https:\/\/www.cyberark.com\/solutions\/federal\/","name":"Solutions de s\u00e9curit\u00e9 des identit\u00e9s et de gestion des acc\u00e8s des administrations f\u00e9d\u00e9rales | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/solutions\/federal\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/solutions\/federal\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/PreventAttacks.svg","datePublished":"2021-03-22T20:13:14+00:00","dateModified":"2025-02-06T10:44:51+00:00","description":"Prot\u00e9gez l\u2019infrastructure et les donn\u00e9es sensibles des administrations f\u00e9d\u00e9rales avec un acc\u00e8s s\u00e9curis\u00e9 pour toutes les identit\u00e9s, sur tous les appareils, partout et au bon moment.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/federal\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/federal\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/solutions\/federal\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/PreventAttacks.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/PreventAttacks.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/federal\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Solutions de s\u00e9curit\u00e9 des identit\u00e9s","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Administrations f\u00e9d\u00e9rales"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/115385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=115385"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/115385\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51588"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=115385"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=115385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}