{"id":136145,"date":"2022-11-04T08:50:48","date_gmt":"2022-11-04T12:50:48","guid":{"rendered":"https:\/\/www.cyberark.com\/?page_id=136145"},"modified":"2022-11-04T08:50:48","modified_gmt":"2022-11-04T12:50:48","slug":"gartner-magic-quadrant-for-access-management","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/gartner-magic-quadrant-for-access-management\/","title":{"rendered":"Gartner Magic Quadrant for Access Management"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top hv-cta\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb][vc_column_text]Rapport d&rsquo;analyste<\/p>\n<h1>CyberArk est nomm\u00e9 un Leader dans le Gartner\u00ae Magic Quadrant\u2122 2022 pour Access Management<\/h1>\n<p><strong>Dans le monde num\u00e9rique actuel, toutes les identit\u00e9s &#8211; humaines et machine &#8211; sont menac\u00e9es. CyberArk vous aide \u00e0 adopter une approche ax\u00e9e en premier lieu sur la s\u00e9curit\u00e9 pour la gestion des Acc\u00e8s et des Identit\u00e9s.<\/strong><\/p>\n<p>Le nouveau Gartner Magic Quadrant 2022 pour l&rsquo;Access Management \u00e9value neuf fournisseurs de solutions de gestion des acc\u00e8s sur leurs capacit\u00e9s \u00e0 \u00e9tablir, appliquer et g\u00e9rer les contr\u00f4les d&rsquo;acc\u00e8s du personnel. CyberArk y a \u00e9t\u00e9 nomm\u00e9 un Leader !<\/p>\n<p>Cette reconnaissance vient compl\u00e9ter celle obtenue dans le rapport Gartner Magic Quadrant 2022 pour la gestion des acc\u00e8s \u00e0 privil\u00e8ges &#8211; dans lequel CyberArk est consid\u00e9r\u00e9 comme un Leader, pour la quatri\u00e8me fois cons\u00e9cutive. Ces r\u00e9sultats soulignent la validit\u00e9 de notre strat\u00e9gie visant \u00e0 fournir la plate-forme de s\u00e9curit\u00e9 des identit\u00e9s la plus compl\u00e8te du march\u00e9.<\/p>\n<p>Avec CyberArk, vous pouvez s\u00e9curiser l&rsquo;acc\u00e8s et l&rsquo;utilisation des applications et des endpoints, qui sont essentiels pour les initiatives majeures de votre organisation, de l&rsquo;adoption du Cloud \u00e0 la transformation digitale.<\/p>\n<p><strong>Ne vous contentez pas de g\u00e9rer les identit\u00e9s. S\u00e9curisez-les.<\/strong>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbtiny cybv2-pad-top\u00a0\u00bb]<em>*GARTNER est une marque d\u00e9pos\u00e9e et une marque de service de GARTNER, Inc. et\/ou de ses filiales aux \u00c9tats-Unis et \u00e0 l\u2019international. Elle est utilis\u00e9e dans le pr\u00e9sent document avec autorisation. Tous droits r\u00e9serv\u00e9s.<\/em><\/p>\n<p><em>Gartner n&rsquo;approuve aucun fournisseur, produit ou service repr\u00e9sent\u00e9 dans ses publications de recherche et ne conseille pas aux utilisateurs de technologies de s\u00e9lectionner uniquement les fournisseurs ayant obtenu les meilleurs classements ou une autre d\u00e9signation. Les publications de recherche de Gartner se composent des opinions de l&rsquo;organisme de recherche de Gartner et ne doivent pas \u00eatre interpr\u00e9t\u00e9es comme des d\u00e9clarations de faits. Gartner d\u00e9cline toute garantie, expresse ou implicite, concernant cette \u00e9tude, y compris toute garantie de qualit\u00e9 marchande ou d&rsquo;ad\u00e9quation \u00e0 un usage particulier.<\/em><\/p>\n<p><em>Gartner\u00ae Magic Quadrant\u2122 pour Privileged Access Management, par Michael Kelley, James Hoover, Felix Gaehtgens, Abhyuday Data, 19 Juillet 2022<\/em><\/p>\n<p><em>Gartner\u00ae Magic Quadrant\u2122 pour Access Management, par Henrique Teixeira, Abhyuday Data, Michael Kelley, James Hoover, Brian Guthrie, 1 Novembre 2022<\/em>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/12&Prime; css=\u00a0\u00bb.vc_custom_1663681871597{margin-right: 45px !important;border-right-width: 1px !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbright-clmn cybv2-form\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbcyb-pad-btm\u00a0\u00bb]<\/p>\n<h5>OBTENEZ LE RAPPORT<\/h5>\n<p>[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iOTE3NCIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9mci90aGFuay15b3UtZ2FydG5lci1tYWdpYy1xdWFkcmFudC1mb3ItYWNjZXNzLW1hbmFnZW1lbnQvIl0=[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top hv-cta\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb][vc_column_text]Rapport d&rsquo;analyste CyberArk est nomm\u00e9 un Leader dans le Gartner\u00ae Magic Quadrant\u2122 2022 pour Access Management Dans le monde num\u00e9rique actuel, toutes les identit\u00e9s &#8211; humaines et machine&#8230;<\/p>\n","protected":false},"author":125,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"t_cybv2_nomenus.php","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-136145","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CyberArk est nomm\u00e9 un Leader dans le Gartner\u00ae Magic Quadrant\u2122 2022 pour Access Management | CyberArk<\/title>\n<meta name=\"description\" content=\"Dans le monde num\u00e9rique actuel, toutes les identit\u00e9s - humaines et machine - sont menac\u00e9es. CyberArk vous aide \u00e0 adopter une approche ax\u00e9e en premier lieu sur la s\u00e9curit\u00e9 pour la gestion des Acc\u00e8s et des Identit\u00e9s.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/fr\/gartner-magic-quadrant-for-access-management\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gartner Magic Quadrant for Access Management\" \/>\n<meta property=\"og:description\" content=\"Dans le monde num\u00e9rique actuel, toutes les identit\u00e9s - humaines et machine - sont menac\u00e9es. CyberArk vous aide \u00e0 adopter une approche ax\u00e9e en premier lieu sur la s\u00e9curit\u00e9 pour la gestion des Acc\u00e8s et des Identit\u00e9s.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/fr\/gartner-magic-quadrant-for-access-management\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/gartner-magic-quadrant-for-access-management\/\",\"url\":\"https:\/\/www.cyberark.com\/fr\/gartner-magic-quadrant-for-access-management\/\",\"name\":\"CyberArk est nomm\u00e9 un Leader dans le Gartner\u00ae Magic Quadrant\u2122 2022 pour Access Management | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2022-11-04T12:50:48+00:00\",\"description\":\"Dans le monde num\u00e9rique actuel, toutes les identit\u00e9s - humaines et machine - sont menac\u00e9es. CyberArk vous aide \u00e0 adopter une approche ax\u00e9e en premier lieu sur la s\u00e9curit\u00e9 pour la gestion des Acc\u00e8s et des Identit\u00e9s.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/gartner-magic-quadrant-for-access-management\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/fr\/gartner-magic-quadrant-for-access-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/gartner-magic-quadrant-for-access-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gartner Magic Quadrant for Access Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CyberArk est nomm\u00e9 un Leader dans le Gartner\u00ae Magic Quadrant\u2122 2022 pour Access Management | CyberArk","description":"Dans le monde num\u00e9rique actuel, toutes les identit\u00e9s - humaines et machine - sont menac\u00e9es. CyberArk vous aide \u00e0 adopter une approche ax\u00e9e en premier lieu sur la s\u00e9curit\u00e9 pour la gestion des Acc\u00e8s et des Identit\u00e9s.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/fr\/gartner-magic-quadrant-for-access-management\/","og_locale":"fr_FR","og_type":"article","og_title":"Gartner Magic Quadrant for Access Management","og_description":"Dans le monde num\u00e9rique actuel, toutes les identit\u00e9s - humaines et machine - sont menac\u00e9es. CyberArk vous aide \u00e0 adopter une approche ax\u00e9e en premier lieu sur la s\u00e9curit\u00e9 pour la gestion des Acc\u00e8s et des Identit\u00e9s.","og_url":"https:\/\/www.cyberark.com\/fr\/gartner-magic-quadrant-for-access-management\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/fr\/gartner-magic-quadrant-for-access-management\/","url":"https:\/\/www.cyberark.com\/fr\/gartner-magic-quadrant-for-access-management\/","name":"CyberArk est nomm\u00e9 un Leader dans le Gartner\u00ae Magic Quadrant\u2122 2022 pour Access Management | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2022-11-04T12:50:48+00:00","description":"Dans le monde num\u00e9rique actuel, toutes les identit\u00e9s - humaines et machine - sont menac\u00e9es. CyberArk vous aide \u00e0 adopter une approche ax\u00e9e en premier lieu sur la s\u00e9curit\u00e9 pour la gestion des Acc\u00e8s et des Identit\u00e9s.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/fr\/gartner-magic-quadrant-for-access-management\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/fr\/gartner-magic-quadrant-for-access-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/fr\/gartner-magic-quadrant-for-access-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Gartner Magic Quadrant for Access Management"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/136145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=136145"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/136145\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=136145"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=136145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}