{"id":127494,"date":"2022-02-16T11:26:00","date_gmt":"2022-02-16T16:26:00","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/secure-web-sessions\/"},"modified":"2026-04-01T01:58:03","modified_gmt":"2026-04-01T05:58:03","slug":"secure-web-sessions","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/","title":{"rendered":"Secure Web Sessions"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-breadcrumb\u00a0\u00bb]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/fr\/products\/workforce-identity\/\">Retour \u00e0 Identit\u00e9 du personnel<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Secure Web Sessions<\/h1>\n<p><\/p>\n<h2>B\u00e9n\u00e9ficiez d\u2019une visibilit\u00e9 sur chaque action de vos utilisateurs dans les applications Web s\u00e9curis\u00e9es par CyberArk Identity.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbDemander une d\u00e9monstration\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Ftry-buy%2Fworkforce-access-solutions-demo%2F|title:demo|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/workforce-access\/stop-post-login-threats-with-secure-web-sessions\/\">Lire la pr\u00e9sentation de la solution<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2&Prime;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_xqb24u085r videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_sticky_nav\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1614201964540{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_column_text el_class=\u00a0\u00bbsticky-nav-title\u00a0\u00bb]<\/p>\n<h3><i class=\"fas fa-long-arrow-alt-up\"><\/i>Secure Web Sessions<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_raw_html el_class=\u00a0\u00bbsticky-nav-buttons\u00a0\u00bb]PCEtLSBBZGQgbGkgZm9yIHNlY3Rpb24gZGF0YS1zY3JvbGwtY2xhc3MgaXMgd2hlcmUgeW91IHB1dCB0aGUgc2VjdGlvbiBjbGFzcyB5b3Ugd2FudCB0byBzY3JvbGwgdG8gLS0+PGJyPjx1bD4NCiAJPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWIxIj5BdmFudGFnZXM8L2xpPg0KIAk8bGkgZGF0YS1zY3JvbGwtY2xhc3M9InN1YjIiPkZvbmN0aW9ubmFsaXTDqXM8L2xpPg0KIAk8bGkgZGF0YS1zY3JvbGwtY2xhc3M9InN1YjMiPkZvbmN0aW9ubmVtZW50PC9saT4NCiAJPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWI0Ij5TY8OpbmFyaW9zIGTigJl1dGlsaXNhdGlvbjwvbGk+DQo8L3VsPg==[\/vc_raw_html][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_btn title=\u00a0\u00bbD\u00e9couvrez-le en action\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb custom_onclick=\u00a0\u00bbtrue\u00a0\u00bb link=\u00a0\u00bburl:%23|title:demo|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb custom_onclick_code=\u00a0\u00bbStorylane.Play({type: &lsquo;popup&rsquo;, demo_type: &lsquo;image&rsquo;, width: 1538, height: 923, scale: &lsquo;0.95&rsquo;, demo_url: &lsquo; https:\/\/app.storylane.io\/demo\/gydjzelfjlnu?embed=popup&rsquo; , padding_bottom: &lsquo;calc(60.01% + 25px)&rsquo;})\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbsubnav-dropdown\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbsticky-nav-title\u00a0\u00bb]<\/p>\n<h5 style=\"text-align: right;\">Passer \u00e0<i class=\"fas fa-chevron-circle-down\"><\/i><\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-vt sub1&Prime; css=\u00a0\u00bb.vc_custom_1633019615028{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>S\u00e9curit\u00e9 et visibilit\u00e9 \u00e0 chaque clic<\/h3>\n<p>Enregistrez, auditez et prot\u00e9gez toutes les activit\u00e9s des utilisateurs dans les applications Web accessibles via CyberArk Identity <a href=\"https:\/\/www.cyberark.com\/fr\/products\/single-sign-on\/\">Single Sign-On<\/a>.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-123526\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Overview-Session-Recording.svg\" alt=\"Session Recording\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Enregistrez chaque \u00e9tape<\/h4>\n<p>Enregistrez les actions effectu\u00e9es par des utilisateurs sp\u00e9cifiques dans les applications prot\u00e9g\u00e9es sans affecter l\u2019exp\u00e9rience utilisateur.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-123534\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Overview-Continuous-Authentication.svg\" alt=\"Overview Continuous Authentication\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Activez l\u2019authentification continue<\/h4>\n<p>V\u00e9rifiez que la personne qui a initi\u00e9 la session Web est celle qui utilise l\u2019application.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-123542\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Overview-Session-Protection.svg\" alt=\" Session Protection \" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Prot\u00e9gez les sessions Web<\/h4>\n<p>S\u00e9curisez les applications Web contre les menaces provenant des terminaux et emp\u00eachez l\u2019exfiltration des donn\u00e9es.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2-pad cybv2 cybv2-background-oval tour sub2&Prime;][vc_column][vc_row_inner el_class=\u00a0\u00bbcyb-center\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-pad-btm\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbleft-mobile\u00a0\u00bb]<\/p>\n<h3>S\u00e9curit\u00e9 des sessions Web en toute simplicit\u00e9<\/h3>\n<p>\u00c9tendez la s\u00e9curit\u00e9 des sessions Web aux applications SSO sans affecter l\u2019exp\u00e9rience de vos utilisateurs.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=\u00a0\u00bbsquare\u00a0\u00bb active_section=\u00a0\u00bb1&Prime; css_animation=\u00a0\u00bbnone\u00a0\u00bb][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbEnregistrement des sessions\u00a0\u00bb tab_id=\u00a0\u00bbsession-recording\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Enregistrement des sessions<\/h4>\n<p>Enregistrez toutes les activit\u00e9s des utilisateurs \u00e0 l\u2019aide d\u2019une approche \u00ab\u00a0pas-\u00e0-pas\u00a0\u00bb. Les actions telles que les clics de souris et les frappes de la touche \u00ab\u00a0Entr\u00e9e\u00a0\u00bb et de la touche de tabulation d\u00e9clenchent une capture d\u2019\u00e9cran de la fen\u00eatre du navigateur d\u2019un utilisateur avec les m\u00e9tadonn\u00e9es pertinentes.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-118816\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-PAM-2.png\" alt=\" Session Recording\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-PAM-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-PAM-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-PAM-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbJournal d\u2019audit\u00a0\u00bb tab_id=\u00a0\u00bbaudit-trail\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Journal d\u2019audit<\/h4>\n<p>Recherchez toutes les sessions enregistr\u00e9es \u00e0 l\u2019aide de la saisie de texte libre et filtrez les \u00e9v\u00e9nements de s\u00e9curit\u00e9 par dates et actions. Le journal d\u2019audit de la session fournit un contexte et une d\u00e9composition \u00e9tape par \u00e9tape des actions prises avant, pendant et apr\u00e8s un \u00e9v\u00e9nement de s\u00e9curit\u00e9.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-123446\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Session-Auditing.png\" alt=\"Session Auditing\" width=\"770\" height=\"550\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Session-Auditing.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Session-Auditing-300x214.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Session-Auditing-768x549.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Session-Auditing-150x107.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbAuthentification continue\u00a0\u00bb tab_id=\u00a0\u00bbcontinuous-authentication\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Authentification continue<\/h4>\n<p>Identifiez l\u2019instant o\u00f9 une session \u00e0 haut risque est laiss\u00e9e ouverte et n\u00e9cessite une nouvelle authentification pour s\u2019assurer que la personne qui a initi\u00e9 la session Web est celle qui utilise l\u2019application.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-123518\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Continuous-Authentication.png\" alt=\"Continuous Authentication\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Continuous-Authentication.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Continuous-Authentication-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Continuous-Authentication-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbProtection des sessions\u00a0\u00bb tab_id=\u00a0\u00bbsession-protection\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Protection des sessions<\/h4>\n<p>Prot\u00e9gez la session Web sur le terminal avec l\u2019extension du navigateur Secure Web Sessions. L\u2019int\u00e9gration optionnelle \u00e0 <a href=\"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/\">CyberArk Endpoint Privilege Manager<\/a> prot\u00e8ge \u00e9galement les sessions Web \u00e0 haut risque contre les processus malveillants provenant du terminal.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-123510\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Session-Protection.png\" alt=\" Session Protection\" width=\"770\" height=\"550\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Session-Protection.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Session-Protection-300x214.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Session-Protection-768x549.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Session-Protection-150x107.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-up\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbConfidentialit\u00e9 int\u00e9gr\u00e9e\u00a0\u00bb tab_id=\u00a0\u00bbprivacy\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Confidentialit\u00e9 int\u00e9gr\u00e9e<\/h4>\n<p>Enregistrez les activit\u00e9s de session Web uniquement pour les applications prot\u00e9g\u00e9es par Secure Web Sessions, quels que soient les autres onglets ouverts dans le navigateur. Les enregistrements ont lieu localement, sont chiffr\u00e9s et ne sont accessibles qu\u2019aux clients disposant d\u2019une cl\u00e9 priv\u00e9e sp\u00e9cifique.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-123502\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Built-In-Privacy.png\" alt=\"Built-in Privacy\" width=\"770\" height=\"550\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Built-In-Privacy.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Built-In-Privacy-300x214.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Built-In-Privacy-768x549.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Tour-Built-In-Privacy-150x107.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad info-graphic sub3&Prime; css=\u00a0\u00bb.vc_custom_1633019634465{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-2&Prime;][vc_column_text el_class=\u00a0\u00bbtext-md-center head-box\u00a0\u00bb]<\/p>\n<h3>Exp\u00e9rience utilisateur de Secure Web sessions<\/h3>\n<p>Secure Web Sessions est un module compl\u00e9mentaire \u00e0 CyberArk Identity Single Sign-On et sert de facteur d\u2019authentification pour acc\u00e9der aux applications Web prot\u00e9g\u00e9es. Les sessions Web sont enregistr\u00e9es et accessibles via le portail pour les utilisateurs valid\u00e9s.[\/vc_column_text][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-123689\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/10\/305662-Secure-Web-Sessions-diagramV2a-SVG-Outlined.svg\" alt=\"Secure Web Sessions\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-hz sub4&Prime;][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>S\u00e9curiser les sessions Web dans votre entreprise<\/h3>\n<p>Prot\u00e9gez toute application sensible et fournissez un acc\u00e8s s\u00e9curis\u00e9 et sans entraves \u00e0 tous les types d\u2019utilisateurs.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-123470\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Financial-Applications.svg\" alt=\"Financial Application Security\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1696412442105{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Applications financi\u00e8res<\/h4>\n<p>B\u00e9n\u00e9ficiez d\u2019une visibilit\u00e9 sur l\u2019\u00e9volution de la masse salariale, l\u2019acc\u00e8s aux informations bancaires et les exportations d\u2019informations personnelles identifiables (PII).[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-123478\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/DevOps-and-Security-icon.svg\" alt=\"DevOps and Security Tools icon\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1696412479597{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Le DevOps et la s\u00e9curit\u00e9<\/h4>\n<p>Enregistrez les mesures prises par les utilisateurs \u00e0 privil\u00e8ges dans les consoles cloud, les pare-feux et les outils de d\u00e9veloppement et de s\u00e9curit\u00e9.[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-123486\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Healthcare-icon.svg\" alt=\"Healthcare Application Security icon\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1633018305584{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Sant\u00e9<\/h4>\n<p>Veillez \u00e0 ce que les donn\u00e9es sensibles ne soient jamais laiss\u00e9es sans surveillance et que l\u2019acc\u00e8s, prot\u00e9g\u00e9 par la s\u00e9curit\u00e9 la plus \u00e9lev\u00e9e possible, soit accord\u00e9 \u00e0 l\u2019utilisateur qui convient.[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-123494\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Marketing-icon.svg\" alt=\"Marketing icon\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1633018287627{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Marketing<\/h4>\n<p>B\u00e9n\u00e9ficiez d\u2019une visibilit\u00e9 granulaire sur l\u2019activit\u00e9 des utilisateurs dans les applications de marketing et gardez un \u0153il sur les comptes partag\u00e9s sur les r\u00e9seaux sociaux de l\u2019entreprise.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1609868130755{background-color: #f7f7f7 !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top hv-cta\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h2>Demander une d\u00e9monstration<\/h2>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"checkmark icon\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]D\u00e9couvrez Secure Web Sessions avec une d\u00e9monstration personnalis\u00e9e[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"checkmark icon\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Applications et utilisateurs illimit\u00e9s[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"checkmark icon\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]CyberArk Identity Single Sign-On inclus[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=\u00a0\u00bb123555&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb el_class=\u00a0\u00bbd-none d-md-block\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/12&Prime; css=\u00a0\u00bb.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbright-clmn cybv2-form\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbbold\u00a0\u00bb]<\/p>\n<h4>INSCRIVEZ-VOUS MAINTENANT<\/h4>\n<p>[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iODY1MiIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9mci90cnktYnV5L3RoYW5rLXlvdS1zZWN1cmUtd2ViLXNlc3Npb25zLyJd[\/vc_raw_html][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcyb-pad cybv2&Prime;][vc_column][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbtiny\u00a0\u00bb]CyberArk Has Patent Rights Relating To This Technology &#8211; <a href=\"https:\/\/www.cyberark.com\/fr\/patents\/\">https:\/\/www.cyberark.com\/patents<\/a>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]JTNDc2NyaXB0JTIwYXN5bmMlMjBzcmMlM0QlMjJodHRwcyUzQSUyRiUyRmpzLnN0b3J5bGFuZS5pbyUyRmpzJTJGdjIlMkZzdG9yeWxhbmUuanMlMjIlM0UlM0MlMkZzY3JpcHQlM0U=[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-breadcrumb\u00a0\u00bb]Retour \u00e0 Identit\u00e9 du personnel[\/vc_column_text][vc_column_text] Secure Web Sessions B\u00e9n\u00e9ficiez d\u2019une visibilit\u00e9 sur chaque action de vos utilisateurs dans les applications Web s\u00e9curis\u00e9es par CyberArk Identity. [\/vc_column_text][vc_btn title=\u00a0\u00bbDemander&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":51589,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27773],"class_list":["post-127494","page","type-page","status-publish","hentry","product_category-access"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Secure Web Sessions | CyberArk<\/title>\n<meta name=\"description\" content=\"B\u00e9n\u00e9ficiez d\u2019une surveillance facile et efficace des sessions Web de votre entreprise pour s\u00e9curiser vos actifs professionnels pr\u00e9cieux gr\u00e2ce \u00e0 CyberArk Secure Web Sessions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Web Sessions\" \/>\n<meta property=\"og:description\" content=\"B\u00e9n\u00e9ficiez d\u2019une surveillance facile et efficace des sessions Web de votre entreprise pour s\u00e9curiser vos actifs professionnels pr\u00e9cieux gr\u00e2ce \u00e0 CyberArk Secure Web Sessions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T05:58:03+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/\",\"url\":\"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/\",\"name\":\"Secure Web Sessions | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Overview-Session-Recording.svg\",\"datePublished\":\"2022-02-16T16:26:00+00:00\",\"dateModified\":\"2026-04-01T05:58:03+00:00\",\"description\":\"B\u00e9n\u00e9ficiez d\u2019une surveillance facile et efficace des sessions Web de votre entreprise pour s\u00e9curiser vos actifs professionnels pr\u00e9cieux gr\u00e2ce \u00e0 CyberArk Secure Web Sessions.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Overview-Session-Recording.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Overview-Session-Recording.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produits\",\"item\":\"https:\/\/www.cyberark.com\/fr\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Secure Web Sessions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Secure Web Sessions | CyberArk","description":"B\u00e9n\u00e9ficiez d\u2019une surveillance facile et efficace des sessions Web de votre entreprise pour s\u00e9curiser vos actifs professionnels pr\u00e9cieux gr\u00e2ce \u00e0 CyberArk Secure Web Sessions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/","og_locale":"fr_FR","og_type":"article","og_title":"Secure Web Sessions","og_description":"B\u00e9n\u00e9ficiez d\u2019une surveillance facile et efficace des sessions Web de votre entreprise pour s\u00e9curiser vos actifs professionnels pr\u00e9cieux gr\u00e2ce \u00e0 CyberArk Secure Web Sessions.","og_url":"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-04-01T05:58:03+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/","url":"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/","name":"Secure Web Sessions | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Overview-Session-Recording.svg","datePublished":"2022-02-16T16:26:00+00:00","dateModified":"2026-04-01T05:58:03+00:00","description":"B\u00e9n\u00e9ficiez d\u2019une surveillance facile et efficace des sessions Web de votre entreprise pour s\u00e9curiser vos actifs professionnels pr\u00e9cieux gr\u00e2ce \u00e0 CyberArk Secure Web Sessions.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Overview-Session-Recording.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Overview-Session-Recording.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Produits","item":"https:\/\/www.cyberark.com\/fr\/products\/"},{"@type":"ListItem","position":3,"name":"Secure Web Sessions"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/fr\/#website","url":"https:\/\/www.cyberark.com\/fr\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/fr\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/127494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=127494"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/127494\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51589"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=127494"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=127494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}