{"id":132473,"date":"2022-07-11T12:23:08","date_gmt":"2022-07-11T16:23:08","guid":{"rendered":"https:\/\/www.cyberark.com\/securite-de-lidentite\/"},"modified":"2024-10-17T16:24:40","modified_gmt":"2024-10-17T20:24:40","slug":"identity-security","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/identity-security\/","title":{"rendered":"S\u00e9curit\u00e9 des identit\u00e9s"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bb.cybv2 .int-hero-noimg blue-gradient\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/6&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text]<\/p>\n<h1><span class=\"font-green\">L\u2019avenir de la s\u00e9curit\u00e9 est l\u2019identit\u00e9<\/span><\/h1>\n<h2>Le paysage actuel des menaces se caract\u00e9rise par de nouvelles identit\u00e9s, de nouveaux environnements et de nouvelles m\u00e9thodes d\u2019attaque. La prolif\u00e9ration des identit\u00e9s, associ\u00e9e \u00e0 la migration vers le cloud et \u00e0 l\u2019acc\u00e9l\u00e9ration de l\u2019innovation des attaquants, alimente la hausse des cyberattaques bas\u00e9es sur l\u2019identit\u00e9. La seule fa\u00e7on de s\u2019assurer que les bons utilisateurs acc\u00e8dent aux bonnes ressources au bon moment est d\u2019appliquer des contr\u00f4les d\u2019autorisation appropri\u00e9s \u00e0 chaque identit\u00e9.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbD\u00e9couvrez comment\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fblueprint%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-transp-green\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top info-graphic\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/6&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text el_class=\u00a0\u00bbtext-md-center head-box\u00a0\u00bb]<\/p>\n<h3>Approuv\u00e9e par plus de 8\u00a0000\u00a0entreprises<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_customer_stories vc_tta-o-non-responsive\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1686775642430{background-color: #ffffff !important;}\u00a0\u00bb][vc_column][vc_tta_tabs style=\u00a0\u00bbflat\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb color=\u00a0\u00bbwhite\u00a0\u00bb spacing=\u00a0\u00bb\u00a0\u00bb gap=\u00a0\u00bb20&Prime; alignment=\u00a0\u00bbcenter\u00a0\u00bb active_section=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbcybv2_customer_stories_tabs\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676900675{background-color: #ffffff !important;}\u00a0\u00bb][vc_tta_section title=\u00a0\u00bbHealthfirst\u00a0\u00bb tab_id=\u00a0\u00bbhealthfirst\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_icon vc_active\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb188758&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbright\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00b0Si nous pouvons contr\u00f4ler l\u2019identit\u00e9, nous pouvons arr\u00eater la plupart des attaques modernes. Et si vous contr\u00f4lez l\u2019identit\u00e9, vous contr\u00f4lez chaque p\u00e9rim\u00e8tre, application, conteneur, c\u2019est-\u00e0-dire chaque partie de l\u2019environnement. C\u2019est ce que j\u2019appelle le v\u00e9ritable Zero Trust et c\u2019est pourquoi nous utilisons CyberArk. C\u2019est ce qui m\u2019aide \u00e0 bien dormir\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]Brian Miller, RSSI, <strong>Healthfirst<\/strong>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/healthfirst-applies-an-identity-security-first-approach-to-implement-zero-trust\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbGlasgow Caledonian University\u00a0\u00bb tab_id=\u00a0\u00bb1711948553583-e7615151-2203&Prime; el_class=\u00a0\u00bbnew_hpstyle_section6_tab2_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653503563{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb188767&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbright\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb] \u201cCes derni\u00e8res ann\u00e9es, GCU et d&rsquo;autres acteurs du secteur ont \u00e9t\u00e9 de plus en plus souvent la cible de cyberattaques. Ces risques nous ont amen\u00e9s \u00e0 revoir compl\u00e8tement notre approche de la cybers\u00e9curit\u00e9 en g\u00e9n\u00e9ral, et de la gestion des identit\u00e9s et des acc\u00e8s en particulier. Nous devions examiner de pr\u00e8s chaque aspect de notre pile de s\u00e9curit\u00e9. Nous avons choisi la plateforme CyberArk pour ses capacit\u00e9s bien \u00e9tablies de gestion des acc\u00e8s privil\u00e9gi\u00e9s et de gestion des acc\u00e8s, sachant qu&rsquo;elle pourrait offrir des capacit\u00e9s suppl\u00e9mentaires de s\u00e9curit\u00e9 des identit\u00e9s au fur et \u00e0 mesure que nous m\u00fbrissons et d\u00e9veloppons nos programmes de s\u00e9curit\u00e9.\u201d[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]Tahir Yousaf, Directeur informatique \u00e0 <strong>Glasgow Caledonian University (GCU)<\/strong>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/press\/glasgow-caledonian-university-selects-cyberark-to-reduce-identity-security-risk-for-thousands-of-staff-and-students\/\">Lire le communiqu\u00e9 de presse <\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbCapCom\u00a0\u00bb tab_id=\u00a0\u00bbcapcom\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab3_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1687286224685{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb185373&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbright\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0Outre l\u2019am\u00e9lioration des mesures techniques, notre mission est d\u2019am\u00e9liorer l\u2019alphab\u00e9tisation des utilisateurs finaux. En visualisant la situation actuelle, nous avons pu commencer \u00e0 cr\u00e9er un meilleur environnement&#8230; En ce sens, nous pensons que CyberArk Privileged Access Manager est une solution pour laquelle il n\u2019existe aucune autre possibilit\u00e9.\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]Kohei Akiyama, Service de soutien au d\u00e9veloppement des moteurs de jeu, R&amp;D, Service de technologie fondamentale, <strong>CapCom<\/strong>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/capcom\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top dark\u00a0\u00bb][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-2&Prime; el_class=\u00a0\u00bbtext-center\u00a0\u00bb][vc_column_text]<\/p>\n<h3>\u00c0 mesure que les <span class=\"font-green\">identit\u00e9s prolif\u00e8rent<\/span>, les d\u00e9fis de s\u00e9curit\u00e9 aussi<\/h3>\n<p>Une enqu\u00eate men\u00e9e en 2022 aupr\u00e8s de 1\u00a0500\u00a0professionnels de la s\u00e9curit\u00e9* \u00e0 travers le monde r\u00e9v\u00e8le que les d\u00e9fis li\u00e9s \u00e0 la s\u00e9curisation des identit\u00e9s augmentent de mani\u00e8re exponentielle.[\/vc_column_text][vc_btn title=\u00a0\u00bbT\u00e9l\u00e9charger le rapport d\u2019enqu\u00eate\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb align=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1687291468267{margin-top: 30px !important;}\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fanalyst-reports%2Fthe-holistic-identity-security-maturity-model|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-transp\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hz-stats dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_column_text el_class=\u00a0\u00bbstat-box dark\u00a0\u00bb]<strong>Les infrastructures sont fragment\u00e9es.<\/strong><\/p>\n<div class=\"stat\">\n<p>57\u00a0%<\/p>\n<\/div>\n<p>disposent de deux \u00e9quipes de s\u00e9curit\u00e9, l\u2019une pour l\u2019environnement sur site et l\u2019autre pour le cloud.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_column_text el_class=\u00a0\u00bbstat-box\u00a0\u00bb]<strong>Les identit\u00e9s continuent de se multiplier.<\/strong><\/p>\n<div class=\"stat\">\n<p>79\u00a0%<\/p>\n<\/div>\n<p>s\u2019attendent \u00e0 ce que les identit\u00e9s de toute l\u2019entreprise augmentent de plus du double chaque ann\u00e9e.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_column_text el_class=\u00a0\u00bbstat-box\u00a0\u00bb]<strong>L\u2019automatisation est la cl\u00e9.<\/strong><\/p>\n<div class=\"stat\">\n<p>61\u00a0%<\/p>\n<\/div>\n<p>ont des difficult\u00e9s \u00e0 automatiser les environnements hybrides avec des outils h\u00e9rit\u00e9s et natifs du cloud.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_column_text el_class=\u00a0\u00bbstat-box\u00a0\u00bb]<strong>Une approche unifi\u00e9e est pr\u00e9f\u00e9rable.<\/strong><\/p>\n<div class=\"stat\">\n<p>54\u00a0%<\/p>\n<\/div>\n<p>pr\u00e9f\u00e8rent adopter des contr\u00f4les unifi\u00e9s provenant d\u2019\u00e9diteurs moins nombreux.[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2-pad cybv2 graphic-csb\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbblue-gradient-background cyb-br\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1711991903947{padding-top: 50px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;}\u00a0\u00bb el_class=\u00a0\u00bbtext-center\u00a0\u00bb]<img decoding=\"async\" class=\"alignnone size-full wp-image-188738\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg\" alt=\"CSB graphic\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbright-clmn\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1711638016096{padding-top: 60px !important;}\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbhead-box\u00a0\u00bb]<\/p>\n<h3>La s\u00e9curit\u00e9 de l&rsquo;identit\u00e9 n\u00e9cessite une approche holistique, centr\u00e9e sur le contr\u00f4le des privil\u00e8ges.<\/h3>\n<p>Centr\u00e9e sur les contr\u00f4les intelligents des privil\u00e8ges, la S\u00e9curit\u00e9 des identit\u00e9s s\u00e9curise de mani\u00e8re transparente l\u2019acc\u00e8s pour toutes les identit\u00e9s et automatise de mani\u00e8re flexible le cycle de vie de l\u2019identit\u00e9 gr\u00e2ce \u00e0 une d\u00e9tection et une pr\u00e9vention continues des menaces, le tout au moyen d\u2019une approche unifi\u00e9e.[\/vc_column_text][vc_btn title=\u00a0\u00bbExplorez la plateforme\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1711991855874{margin-top: 40px !important;}\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2F|title:Explorez%20la%20plateforme|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_full_width_resource\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_title\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5 style=\"text-align: center;\">La s\u00e9curit\u00e9 des identit\u00e9s\u00a0: centr\u00e9e sur les<br \/>\ncontr\u00f4les intelligents des privil\u00e8ges<\/h5>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section5_container\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_center   new_hpstyle_section5_gart_img\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"Professional woman with glasses standing confidently against a dark background with a glowing triangular frame\" title=\"gartner-300x300\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1-100x100.jpg 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>CyberArk \u00e0 nouveau nomm\u00e9 leader dans le Magic Quadrant\u2122 de Gartner<sup>\u00ae<\/sup> pou PAM.<\/h4>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container  cybv2-button-solid cyb-button-hpstyle_section5 vc_btn3-inline\"  >\n\t<a class=\"vc_btn3-color-grey\" href=\"https:\/\/lp.cyberark.com\/gartner-mq-pam-2024-fr\" title=\"\" target=\"_blank\">Lire le rapport<\/a><\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources sub4&Prime; css=\u00a0\u00bb.vc_custom_1666797120002{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbno-break\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbno-break\u00a0\u00bb]<\/p>\n<h3>Explorez les ressources connexes<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/resources\/\">Voir toutes les ressources<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column uf-height\u00a0\u00bb][vc_column el_class=\u00a0\u00bbnew_hpstyle_section8_col1&Prime;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00a0\u00bb.vc_custom_1710357149501{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section8_uberflip\u00a0\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html]PGEgY2xhc3M9ImFuY2hvciIgbmFtZT0iZm9ybSI+PC9hPg==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1729196153107{background-color: #f7f7f7 !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top hv-cta\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h3>Consultez nos experts pour savoir comment:<\/h3>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-145290 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/icon-check.svg\" alt=\"\" width=\"23\" height=\"25\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]prendre le contr\u00f4le des privil\u00e8ges non g\u00e9r\u00e9s sur les terminaux[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-145290 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/icon-check.svg\" alt=\"\" width=\"23\" height=\"25\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]prot\u00e9ger les identifiants des employ\u00e9s et des clients[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-145290 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/icon-check.svg\" alt=\"\" width=\"23\" height=\"25\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]s\u00e9curiser les identit\u00e9s dans les environnements multiclouds[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-145290 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/icon-check.svg\" alt=\"\" width=\"23\" height=\"25\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]s\u00e9curiser et g\u00e9rer les secrets et les identifiants utilis\u00e9s par les identit\u00e9s non humaines[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-145290 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/icon-check.svg\" alt=\"\" width=\"23\" height=\"25\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]s\u00e9curiser les identit\u00e9s dans les environnements multiclouds[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=\u00a0\u00bb145624&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbright-clmn cybv2-form\u00a0\u00bb offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text el_class=\u00a0\u00bbbold\u00a0\u00bb]<\/p>\n<h4>Demander un entretien<\/h4>\n<p>[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iOTE3NCIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9mci90aGFuay15b3UtY29udGFjdC8iXQ==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcyb-pad cybv2&Prime;][vc_column][vc_column_text el_class=\u00a0\u00bbtiny\u00a0\u00bb]* Enqu\u00eate sur le mod\u00e8le de maturit\u00e9 de la s\u00e9curit\u00e9 des identit\u00e9s ESG 2022 sponsoris\u00e9e par CyberArk (N = 1\u00a0500) | 16\u00a0pays | 4\u00a0r\u00e9gions)[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27776],"class_list":["post-132473","page","type-page","status-publish","hentry","product_category-identity-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>S\u00e9curit\u00e9 des identit\u00e9s | CyberArk<\/title>\n<meta name=\"description\" content=\"Prot\u00e9gez vos applications, votre infrastructure et vos donn\u00e9es avec CyberArk Identity Security, une approche globale et bas\u00e9e sur les risques pour s\u00e9curiser les identit\u00e9s humaines et machines.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/identity-security\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 des identit\u00e9s\" \/>\n<meta property=\"og:description\" content=\"Prot\u00e9gez vos applications, votre infrastructure et vos donn\u00e9es avec CyberArk Identity Security, une approche globale et bas\u00e9e sur les risques pour s\u00e9curiser les identit\u00e9s humaines et machines.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/identity-security\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-17T20:24:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/identity-security\/\",\"url\":\"https:\/\/www.cyberark.com\/identity-security\/\",\"name\":\"S\u00e9curit\u00e9 des identit\u00e9s | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/identity-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/identity-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg\",\"datePublished\":\"2022-07-11T16:23:08+00:00\",\"dateModified\":\"2024-10-17T20:24:40+00:00\",\"description\":\"Prot\u00e9gez vos applications, votre infrastructure et vos donn\u00e9es avec CyberArk Identity Security, une approche globale et bas\u00e9e sur les risques pour s\u00e9curiser les identit\u00e9s humaines et machines.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/identity-security\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/identity-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/identity-security\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/identity-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 des identit\u00e9s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 des identit\u00e9s | CyberArk","description":"Prot\u00e9gez vos applications, votre infrastructure et vos donn\u00e9es avec CyberArk Identity Security, une approche globale et bas\u00e9e sur les risques pour s\u00e9curiser les identit\u00e9s humaines et machines.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/identity-security\/","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 des identit\u00e9s","og_description":"Prot\u00e9gez vos applications, votre infrastructure et vos donn\u00e9es avec CyberArk Identity Security, une approche globale et bas\u00e9e sur les risques pour s\u00e9curiser les identit\u00e9s humaines et machines.","og_url":"https:\/\/www.cyberark.com\/identity-security\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2024-10-17T20:24:40+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/identity-security\/","url":"https:\/\/www.cyberark.com\/identity-security\/","name":"S\u00e9curit\u00e9 des identit\u00e9s | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/identity-security\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/identity-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg","datePublished":"2022-07-11T16:23:08+00:00","dateModified":"2024-10-17T20:24:40+00:00","description":"Prot\u00e9gez vos applications, votre infrastructure et vos donn\u00e9es avec CyberArk Identity Security, une approche globale et bas\u00e9e sur les risques pour s\u00e9curiser les identit\u00e9s humaines et machines.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/identity-security\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/identity-security\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/identity-security\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/identity-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 des identit\u00e9s"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/132473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=132473"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/132473\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=132473"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=132473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}