{"id":131344,"date":"2022-05-27T14:32:54","date_gmt":"2022-05-27T18:32:54","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/consolidation-des-fournisseurs-de-securite\/"},"modified":"2023-11-07T07:42:16","modified_gmt":"2023-11-07T12:42:16","slug":"security-vendor-consolidation","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/solutions\/security-vendor-consolidation\/","title":{"rendered":"Consolidation des fournisseurs de s\u00e9curit\u00e9"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-full\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-breadcrumb\u00a0\u00bb]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/operational-efficiencies\/\">Retour \u00e0 Stimuler l\u2019efficacit\u00e9 op\u00e9rationnelle<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Consolidation des fournisseurs de s\u00e9curit\u00e9<\/h1>\n<h2>Un trop grand nombre de fournisseurs entra\u00eene une complexit\u00e9 et, paradoxalement, des failles de s\u00e9curit\u00e9.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbDemander une d\u00e9mo\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Frequest-demo%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1624299303673{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Vendors_Consolidation.jpg?id=119459) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}\u00a0\u00bb el_class=\u00a0\u00bbcolumn-2&Prime;][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-vt\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1611617874123{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Trop de biens\u202f?<\/h3>\n<p>Le nombre de solutions et de technologies requises pour prot\u00e9ger une entreprise peut sembler accablant.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-119467 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Vendors.svg\" alt=\"Multiple Vendor Icon\" width=\"174\" height=\"150\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>79\u00a0%<\/h4>\n<p>des personnes interrog\u00e9es disent que le fait de travailler avec plusieurs fournisseurs pr\u00e9sente des d\u00e9fis importants.*[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-119475 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Vendors-consolodated.svg\" alt=\"Vendor Consolidation Icon\" width=\"174\" height=\"150\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>69\u00a0%<\/h4>\n<p>conviennent que donner la priorit\u00e9 \u00e0 la consolidation des fournisseurs conduirait \u00e0 une meilleure s\u00e9curit\u00e9.*[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-119483 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Vendors-consolodated-success.svg\" alt=\"Successful Security Vendor Consolidation Icon\" width=\"174\" height=\"150\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>66\u00a0%<\/h4>\n<p>consolident activement le nombre de leurs fournisseurs de cybers\u00e9curit\u00e9.**[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2-pad cybv2 cybv2-background-oval tour\u00a0\u00bb][vc_column][vc_row_inner el_class=\u00a0\u00bbcyb-center\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-pad-btm\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbleft-mobile\u00a0\u00bb]<\/p>\n<h3>Moins de fournisseurs. Plus d\u2019avantages.<\/h3>\n<p>R\u00e9duction des lacunes dans la couverture globale, du besoin de comp\u00e9tences sp\u00e9cialis\u00e9es et des d\u00e9lais de rentabilisation. C\u2019est une r\u00e9ussite \u00e0 tous les niveaux pour votre entreprise.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=\u00a0\u00bbsquare\u00a0\u00bb active_section=\u00a0\u00bb1&Prime; css_animation=\u00a0\u00bbnone\u00a0\u00bb][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbPlus s\u00fbr, moins cher\u00a0\u00bb tab_id=\u00a0\u00bbsecures-more\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Plus s\u00fbr, moins cher<\/h4>\n<p><a href=\"https:\/\/www.cyberark.com\/fr\/products\/\" target=\"_blank\" rel=\"noopener\">La s\u00e9curit\u00e9 des identit\u00e9s<\/a> est une approche compl\u00e8te pour s\u00e9curiser toutes les identit\u00e9s (administrateurs informatiques, fournisseurs tiers et travailleurs \u00e0 distance) tout au long du cycle d\u2019acc\u00e8s aux actifs critiques.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/products\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119491\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-Vendor-Consolidation-1.png\" alt=\"Secures More, Costs Less\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-Vendor-Consolidation-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-Vendor-Consolidation-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-Vendor-Consolidation-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbUn plan de r\u00e9ussite \u00e9prouv\u00e9\u00a0\u00bb tab_id=\u00a0\u00bbproven-blueprint\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Un plan de r\u00e9ussite \u00e9prouv\u00e9<\/h4>\n<p>Tous les outils et processus dont vous avez besoin aupr\u00e8s d\u2019un seul fournisseur de confiance. Suivez les recommandations de <a href=\"https:\/\/www.cyberark.com\/fr\/blueprint\/\">CyberArk Blueprint<\/a> pour p\u00e9renniser la s\u00e9curit\u00e9 de vos identit\u00e9s.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/try-buy\/blueprint-toolkit\/\">Demandez le kit d\u2019outils<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119499\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-Vendor-Consolidation-2.png\" alt=\"Blueprint for Success\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-Vendor-Consolidation-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-Vendor-Consolidation-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-Vendor-Consolidation-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbAtteindre le Zero Trust\u00a0\u00bb tab_id=\u00a0\u00bbachieve-zero-trust\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Atteindre le Zero Trust<\/h4>\n<p>Selon les mod\u00e8les <a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/zero-trust\/\" target=\"_blank\" rel=\"noopener\">Zero Trust<\/a>, tous les \u00e9l\u00e9ments et toutes les personnes qui tentent de se connecter aux syst\u00e8mes d\u2019une entreprise doivent d\u2019abord \u00eatre v\u00e9rifi\u00e9s avant qu\u2019un acc\u00e8s ne leur soit accord\u00e9. Recherchez des fournisseurs qui connaissent la valeur du Zero Trust et vous permettent d\u2019y parvenir.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/what-is\/zero-trust\/ \">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119507\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-Vendor-Consolidation-3.png\" alt=\"Achieve Zero Trust\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-Vendor-Consolidation-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-Vendor-Consolidation-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-Vendor-Consolidation-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime;][vc_column_text el_class=\u00a0\u00bbno-break\u00a0\u00bb]<\/p>\n<h3>Explorez<br \/>\nles ressources<br \/>\nconnexes<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/resources\/\">Afficher toutes les ressources<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip cybv2_resources_uberflip_2_column\u00a0\u00bb][vc_column el_class=\u00a0\u00bbnew_hpstyle_section8_col1&Prime;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html el_class=\u00a0\u00bbnew_hpstyle_section8_uberflip\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1624305537274{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad cybv2-oval-left-background hv-cta-list\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1611885567532{background-color: #ff7600 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbimg-box\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1624550457569{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/247333482-HighValueCTA.jpg?id=119801) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbstat-column\u00a0\u00bb][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb width=\u00a0\u00bb3\/4&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text]<\/p>\n<h2>Demandez une d\u00e9mo<\/h2>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]R\u00e9duire la complexit\u00e9 et les risques[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]Am\u00e9liorer la posture de s\u00e9curit\u00e9[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]Parvenir \u00e0 \u00e9tendre la couverture avec moins d\u2019\u00e9carts de s\u00e9curit\u00e9[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_btn title=\u00a0\u00bbDemander une d\u00e9mo\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Frequest-demo%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcyb-pad cybv2&Prime;][vc_column][vc_column_text el_class=\u00a0\u00bbtiny\u00a0\u00bb]*SOURCE\u00a0: https:\/\/blog.checkpoint.com\/2020\/06\/12\/cutting-complexity-to-strengthen-security-why-consolidation-matters\/<\/p>\n<p>**SOURCE\u00a0: https:\/\/www.esg-global.com\/blog\/the-cybersecurity-technology-consolidation-conundrum[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-full\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-breadcrumb\u00a0\u00bb]Retour \u00e0 Stimuler l\u2019efficacit\u00e9 op\u00e9rationnelle[\/vc_column_text][vc_column_text] Consolidation des fournisseurs de s\u00e9curit\u00e9 Un trop grand nombre de fournisseurs entra\u00eene une complexit\u00e9 et, paradoxalement, des failles de s\u00e9curit\u00e9. [\/vc_column_text][vc_btn title=\u00a0\u00bbDemander une&#8230;<\/p>\n","protected":false},"author":125,"featured_media":0,"parent":51588,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-131344","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Consolidation des fournisseurs de s\u00e9curit\u00e9 | CyberArk<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez la valeur de la consolidation des fournisseurs de s\u00e9curit\u00e9 pour r\u00e9duire la complexit\u00e9 et les failles de s\u00e9curit\u00e9 tout en offrant un d\u00e9lai de rentabilisation plus rapide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Consolidation des fournisseurs de s\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez la valeur de la consolidation des fournisseurs de s\u00e9curit\u00e9 pour r\u00e9duire la complexit\u00e9 et les failles de s\u00e9curit\u00e9 tout en offrant un d\u00e9lai de rentabilisation plus rapide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T12:42:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Vendors.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/\",\"name\":\"Consolidation des fournisseurs de s\u00e9curit\u00e9 | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Vendors.svg\",\"datePublished\":\"2022-05-27T18:32:54+00:00\",\"dateModified\":\"2023-11-07T12:42:16+00:00\",\"description\":\"D\u00e9couvrez la valeur de la consolidation des fournisseurs de s\u00e9curit\u00e9 pour r\u00e9duire la complexit\u00e9 et les failles de s\u00e9curit\u00e9 tout en offrant un d\u00e9lai de rentabilisation plus rapide.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Vendors.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Vendors.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions de s\u00e9curit\u00e9 des identit\u00e9s\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Consolidation des fournisseurs de s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Consolidation des fournisseurs de s\u00e9curit\u00e9 | CyberArk","description":"D\u00e9couvrez la valeur de la consolidation des fournisseurs de s\u00e9curit\u00e9 pour r\u00e9duire la complexit\u00e9 et les failles de s\u00e9curit\u00e9 tout en offrant un d\u00e9lai de rentabilisation plus rapide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/","og_locale":"fr_FR","og_type":"article","og_title":"Consolidation des fournisseurs de s\u00e9curit\u00e9","og_description":"D\u00e9couvrez la valeur de la consolidation des fournisseurs de s\u00e9curit\u00e9 pour r\u00e9duire la complexit\u00e9 et les failles de s\u00e9curit\u00e9 tout en offrant un d\u00e9lai de rentabilisation plus rapide.","og_url":"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2023-11-07T12:42:16+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Vendors.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/","url":"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/","name":"Consolidation des fournisseurs de s\u00e9curit\u00e9 | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Vendors.svg","datePublished":"2022-05-27T18:32:54+00:00","dateModified":"2023-11-07T12:42:16+00:00","description":"D\u00e9couvrez la valeur de la consolidation des fournisseurs de s\u00e9curit\u00e9 pour r\u00e9duire la complexit\u00e9 et les failles de s\u00e9curit\u00e9 tout en offrant un d\u00e9lai de rentabilisation plus rapide.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Vendors.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Vendors.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/security-vendor-consolidation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Solutions de s\u00e9curit\u00e9 des identit\u00e9s","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Consolidation des fournisseurs de s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/131344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=131344"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/131344\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51588"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=131344"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=131344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}