{"id":131027,"date":"2021-07-20T10:51:15","date_gmt":"2021-07-20T14:51:15","guid":{"rendered":"https:\/\/www.cyberark.com\/trust\/"},"modified":"2026-01-12T04:29:49","modified_gmt":"2026-01-12T09:29:49","slug":"trust","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/trust\/","title":{"rendered":"Centre de confiance"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text]<\/p>\n<h1>La confiance chez CyberArk<\/h1>\n<h2>Des entreprises de toutes tailles et de secteurs divers confient \u00e0 CyberArk la protection des cl\u00e9s de leur royaume. Comment prot\u00e9geons-nous les cl\u00e9s de notre royaume\u00a0?<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbAcc\u00e9der au portail d\u00e9di\u00e9 \u00e0 la confiance\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Ftrust.cyberark.com|title:Acc%C3%A9der|target:_blank|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/security-of-the-cyberark-corporate-network\">T\u00e9l\u00e9charger le livre blanc<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-icons\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120202\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg\" alt=\"Ic\u00f4ne S\u00e9curit\u00e9 de l\u2019entreprise\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>S\u00e9curit\u00e9 des entreprises<\/h4>\n<p>Nous suivons des pratiques administratives, op\u00e9rationnelles et de configuration \u00e9tendues pour prot\u00e9ger vos informations, en ayant recours \u00e0 un ensemble complet de contr\u00f4les, de pratiques et de formations en mati\u00e8re de s\u00e9curit\u00e9. Nos \u00e9quipes de s\u00e9curit\u00e9 d\u00e9di\u00e9es travaillent en permanence \u00e0 am\u00e9liorer nos pratiques en mati\u00e8re de d\u00e9veloppement s\u00e9curis\u00e9, d\u2019op\u00e9rations de s\u00e9curit\u00e9 et d\u2019att\u00e9nuation des menaces pour d\u00e9tecter et pr\u00e9venir des risques de s\u00e9curit\u00e9. Ces pratiques sont con\u00e7ues pour garantir la protection de vos donn\u00e9es.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/fr\/trust\/corporate-security\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120211\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/SaaS-Security.svg\" alt=\"Ic\u00f4ne S\u00e9curit\u00e9 SaaS\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>S\u00e9curit\u00e9 saas<\/h4>\n<p>Les entreprises d\u00e9ploient les produits et les services de s\u00e9curit\u00e9 de pointe de CyberArk dans le monde entier. C\u2019est pourquoi nous nous engageons \u00e0 fournir des produits et des offres SaaS hautement \u00e9volutifs, stables et s\u00e9curis\u00e9s \u00e0 grande \u00e9chelle. Nos offres SaaS reposent sur les meilleures technologies de base de leur cat\u00e9gorie. Elles sont con\u00e7ues pour fournir des performances et un taux de disponibilit\u00e9 \u00e9lev\u00e9s, afin d\u2019assurer la continuit\u00e9 des activit\u00e9s commerciales.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/trust\/saas-security\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 overview-icons\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120219\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Identity-Logon-Overview-Vertical-Directory-User-Management.svg\" alt=\"Ic\u00f4ne fiabilit\u00e9\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Fiabilit\u00e9<\/h4>\n<p>Nous voulons que nos clients se sentent en confiance lorsqu\u2019ils utilisent nos services. Notre planification organisationnelle pr\u00e9voit une gestion rigoureuse des actifs et des configurations, une surveillance r\u00e9seau continue ainsi que des plans de continuit\u00e9 des activit\u00e9s, des plans de reprise apr\u00e8s sinistre et des plans de r\u00e9ponse aux incidents.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/trust\/reliability\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120227\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/ContinuousCompliance-Overview-Vertical-Overview-Vertical.svg\" alt=\"Ic\u00f4ne Conformit\u00e9 aux normes industrielles\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1747146453237{margin-bottom: 40px !important;}\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Conformit\u00e9 aux normes sectorielles<\/h4>\n<p>Chez CyberArk, nous soumettons r\u00e9guli\u00e8rement nos produits et syst\u00e8mes de gestion de la s\u00e9curit\u00e9 de l\u2019information \u00e0 des examens et des tests rigoureux, y\u00a0compris des audits et des certifications comme SOC\u00a02 Type\u00a02 et ISO\u00a027001. Nos fournisseurs de services technologiques sont tenus de suivre un processus de qualification rigoureux en mati\u00e8re de pratiques de s\u00e9curit\u00e9. Les centres de donn\u00e9es de notre fournisseur de cloud sont au minimum conformes \u00e0 la certification SOC\u00a02.[\/vc_column_text][vc_btn title=\u00a0\u00bbAcc\u00e9der au portail d\u00e9di\u00e9 \u00e0 la confiance\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Ftrust.cyberark.com|title:Acc%C3%A9der|target:_blank|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbinline link-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/trust\/compliance\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 overview-icons\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120236\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Privacyandsinglesignon.svg\" alt=\"Ic\u00f4ne Protection de la confidentialit\u00e9 et conformit\u00e9 juridique\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Protection des donn\u00e9es et de la confidentialit\u00e9<\/h4>\n<p>Nous nous engageons \u00e0 prot\u00e9ger vos donn\u00e9es contre tout acc\u00e8s non autoris\u00e9 et \u00e0 aider votre organisation \u00e0 se conformer en tout temps aux normes en mati\u00e8re de confidentialit\u00e9 des donn\u00e9es. Nous avons \u00e9galement consacr\u00e9 d\u2019importants investissements dans des dispositifs de protection des donn\u00e9es rigoureux pour s\u00e9curiser vos donn\u00e9es, notamment notre programme de conformit\u00e9 au RGPD et de protection de la vie priv\u00e9e \u00e0 l\u2019\u00e9chelle internationale.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/fr\/trust\/privacy\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-126797\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/esg-hammer-icon.svg\" alt=\"Politiques et d\u00e9clarations\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Conformit\u00e9 juridique et code de conduite<\/h4>\n<p>Nous nous engageons \u00e0 mener nos activit\u00e9s conform\u00e9ment \u00e0 nos obligations l\u00e9gales et aux normes \u00e9thiques reconnues. Nous sommes convaincus que notre personnel, notre culture, nos valeurs et notre int\u00e9grit\u00e9 sont indissociables de notre succ\u00e8s.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/fr\/trust\/legal-compliance-and-code-of-conduct\/\" rel=\"noopener\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 overview-icons\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img decoding=\"async\" class=\"alignnone wp-image-133458 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/brain-icon.svg\" alt=\"ic\u00f4ne de conseils prescrits\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>IA responsable<\/h4>\n<p>Nous nous engageons \u00e0 concevoir des fonctionnalit\u00e9s d\u2019IA s\u00fbres, justes et pr\u00e9cises et \u00e0 vous fournir des outils destin\u00e9s \u00e0 am\u00e9liorer votre s\u00e9curit\u00e9 et votre exp\u00e9rience utilisateur.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/trust\/responsible-ai\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_full_width_resource\u00a0\u00bb][vc_column][vc_row_inner el_class=\u00a0\u00bbnew_hpstyle_section5_container\u00a0\u00bb][vc_column_inner][vc_single_image image=\u00a0\u00bb209396&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section5_gart_img\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1747147298130{margin-bottom: 20px !important;}\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section5_text1&Prime;]<\/p>\n<h4>Rendez-vous sur notre portail d\u00e9di\u00e9 \u00e0 la confiance pour en savoir plus sur nos mesures de s\u00e9curit\u00e9 et de protection des donn\u00e9es et acc\u00e9der \u00e0 la documentation.<\/h4>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbAcc\u00e9der au portail d\u00e9di\u00e9 \u00e0 la confiance\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Ftrust.cyberark.com|title:Acc%C3%A9der|target:_blank|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1615402724220{background-color: #f7f7f7 !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top stckd-cllt flex-column-reverse flex-lg-row\u00a0\u00bb][vc_column el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb offset=\u00a0\u00bbvc_col-md-5&Prime;][vc_column_text el_class=\u00a0\u00bbhead-box\u00a0\u00bb]<\/p>\n<h3>Le message de notre DSI<\/h3>\n<p class=\"cyb-quote\">\u00ab\u00a0En tant qu\u2019entreprise d\u00e9di\u00e9e \u00e0 la s\u00e9curisation des actifs et des syst\u00e8mes les plus critiques de nos clients, nous sommes passionn\u00e9s par la s\u00e9curit\u00e9 de l\u2019information et nous nous imposons des normes de s\u00e9curit\u00e9 robustes et \u00e9prouv\u00e9es.\u00a0\u00bb<\/p>\n<p>Omer Grossman, directeur des syst\u00e8mes d\u2019information chez CyberArk[\/vc_column_text][\/vc_column][vc_column el_class=\u00a0\u00bbright-clmn\u00a0\u00bb offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_single_image image=\u00a0\u00bb138111&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb el_class=\u00a0\u00bb.border-shadow\u00a0\u00bb][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top plp-overview-more-col\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/6&Prime; el_class=\u00a0\u00bbtext-center heading\u00a0\u00bb offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-sm-offset-1&Prime;][vc_column_text]<\/p>\n<h3>Personnes cl\u00e9s<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb offset=\u00a0\u00bbvc_col-md-offset-2 vc_col-sm-offset-2&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-134548\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/peretz-regev-small.jpg\" alt=\"Peretz Regev\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/peretz-regev-small.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/peretz-regev-small-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/peretz-regev-small-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Peretz Regev<\/h4>\n<p>Directeur produit<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/company\/leadership\/peretz-regev\/\">Lire la biographie<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-138116\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/12\/omer-grossman-people.jpg\" alt=\"portrait omer grossman\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/12\/omer-grossman-people.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/12\/omer-grossman-people-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/12\/omer-grossman-people-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Omer Grossman<\/h4>\n<p>Directeur des syst\u00e8mes d\u2019information<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/fr\/company\/leadership\/omer-grossman\/\">Lire la biographie<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-hz\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1625753067539{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Ressources cl\u00e9s<\/h3>\n<p>Trouvez les r\u00e9ponses dans nos ressources de soutien.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb3\/4&Prime;][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb1\/3&Prime; css=\u00a0\u00bb.vc_custom_1756992973507{padding-bottom: 20px !important;}\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118800\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\" alt=\"Protection contre les attaques\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1756992827893{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Aper\u00e7u de l\u2019incident li\u00e9 \u00e0 Drift de Salesloft et r\u00e9ponse de CyberArk<\/h4>\n<p>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/all-blog-posts\/salesloft-drift-incident-overview-and-cyberarks-response\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb1\/3&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120227\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/ContinuousCompliance-Overview-Vertical-Overview-Vertical.svg\" alt=\"Livre blanc sur la s\u00e9curit\u00e9 d\u2019entreprise\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1700483092115{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Livre blanc sur la s\u00e9curit\u00e9 d\u2019entreprise\u00a0: Normes et pratiques<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/cyberark-corporate-security-white-paper-standards-and-practices\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb1\/3&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118800\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\" alt=\"Protection contre les attaques\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1625751898228{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Centre de confidentialit\u00e9<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/privacy-center\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 get-started cybv2-pad dark\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1706302169617{margin-top: 80px !important;margin-bottom: 80px !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb2\/3&Prime; el_class=\u00a0\u00bbstat-column text-center\u00a0\u00bb offset=\u00a0\u00bbvc_col-md-offset-2&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbextra-space chartreuse\u00a0\u00bb]<\/p>\n<h3 style=\"color: #d4eb33 !important;\">Documents du centre de confiance<\/h3>\n<p>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1747146779520{margin-bottom: 40px !important;}\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section9_text\u00a0\u00bb]<\/p>\n<h5>D\u00e9couvrez notre posture en mati\u00e8re de s\u00e9curit\u00e9 et de conformit\u00e9 et retrouvez toute la documentation sur la s\u00e9curit\u00e9, la conformit\u00e9 et la protection des donn\u00e9es.<\/h5>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbAcc\u00e9der au portail d\u00e9di\u00e9 \u00e0 la confiance\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Ftrust.cyberark.com|title:Acc%C3%A9der|target:_blank|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text] La confiance chez CyberArk Des entreprises de toutes tailles et de secteurs divers confient \u00e0 CyberArk la protection des cl\u00e9s de leur royaume. Comment prot\u00e9geons-nous les cl\u00e9s de&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-131027","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Centre de confiance des entreprises | CyberArk<\/title>\n<meta name=\"description\" content=\"Chez CyberArk, la confiance commence par la s\u00e9curit\u00e9, mais englobe aussi la fiabilit\u00e9, la confidentialit\u00e9 et la conformit\u00e9 aux normes sectorielles et aux r\u00e9glementations l\u00e9gales. En savoir plus.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/trust\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Centre de confiance\" \/>\n<meta property=\"og:description\" content=\"Chez CyberArk, la confiance commence par la s\u00e9curit\u00e9, mais englobe aussi la fiabilit\u00e9, la confidentialit\u00e9 et la conformit\u00e9 aux normes sectorielles et aux r\u00e9glementations l\u00e9gales. En savoir plus.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/trust\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-12T09:29:49+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/trust\/\",\"url\":\"https:\/\/www.cyberark.com\/trust\/\",\"name\":\"Centre de confiance des entreprises | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/trust\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg\",\"datePublished\":\"2021-07-20T14:51:15+00:00\",\"dateModified\":\"2026-01-12T09:29:49+00:00\",\"description\":\"Chez CyberArk, la confiance commence par la s\u00e9curit\u00e9, mais englobe aussi la fiabilit\u00e9, la confidentialit\u00e9 et la conformit\u00e9 aux normes sectorielles et aux r\u00e9glementations l\u00e9gales. En savoir plus.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/trust\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/trust\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/trust\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Centre de confiance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Centre de confiance des entreprises | CyberArk","description":"Chez CyberArk, la confiance commence par la s\u00e9curit\u00e9, mais englobe aussi la fiabilit\u00e9, la confidentialit\u00e9 et la conformit\u00e9 aux normes sectorielles et aux r\u00e9glementations l\u00e9gales. En savoir plus.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/trust\/","og_locale":"fr_FR","og_type":"article","og_title":"Centre de confiance","og_description":"Chez CyberArk, la confiance commence par la s\u00e9curit\u00e9, mais englobe aussi la fiabilit\u00e9, la confidentialit\u00e9 et la conformit\u00e9 aux normes sectorielles et aux r\u00e9glementations l\u00e9gales. En savoir plus.","og_url":"https:\/\/www.cyberark.com\/trust\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-01-12T09:29:49+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/trust\/","url":"https:\/\/www.cyberark.com\/trust\/","name":"Centre de confiance des entreprises | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/trust\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg","datePublished":"2021-07-20T14:51:15+00:00","dateModified":"2026-01-12T09:29:49+00:00","description":"Chez CyberArk, la confiance commence par la s\u00e9curit\u00e9, mais englobe aussi la fiabilit\u00e9, la confidentialit\u00e9 et la conformit\u00e9 aux normes sectorielles et aux r\u00e9glementations l\u00e9gales. En savoir plus.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/trust\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/trust\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/trust\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Centre de confiance"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/131027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=131027"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/131027\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=131027"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=131027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}