{"id":136162,"date":"2022-11-04T08:46:37","date_gmt":"2022-11-04T12:46:37","guid":{"rendered":"https:\/\/www.cyberark.com\/?page_id=136162"},"modified":"2023-09-11T13:29:47","modified_gmt":"2023-09-11T17:29:47","slug":"gartner-magic-quadrant-reports-for-pam-and-access-management","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/gartner-magic-quadrant-reports-for-pam-and-access-management\/","title":{"rendered":"Gartner Magic Quadrant Reports for PAM and Access Management"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top hv-cta\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb][vc_column_text]Rapport d\u2019analyste<\/p>\n<h1>CyberArk est le seul fournisseur positionn\u00e9 en tant que Leader dans les deux rapports Gartner<sup>\u00ae<\/sup> Magic Quadrant\u2122 pour PAM et Access Management.<\/h1>\n<h5>Le Gartner\u00ae Magic Quadrant\u2122 2023 pour Privileged Access Management (PAM)<br \/>\nLe Gartner\u00ae Magic Quadrant\u2122 2022 pour Access Management (IAM)<\/h5>\n<p><strong>Dans le paysage actuel des menaces, la s\u00e9curit\u00e9 des identit\u00e9s exige d\u2019\u00eatre en t\u00eate dans toutes les cat\u00e9gories.<\/strong><\/p>\n<p>Le Gartner\u00ae Magic Quadrant\u2122 2023 pour la gestion des acc\u00e8s privil\u00e9gi\u00e9s est d\u00e9sormais disponible et CyberArk a \u00e9t\u00e9 d\u00e9sign\u00e9 comme leader. CyberArk a \u00e9galement \u00e9t\u00e9 d\u00e9sign\u00e9 comme leader dans le Gartner\u00ae Magic Quadrant\u2122 2022 pour la gestion des acc\u00e8s pour la quatri\u00e8me ann\u00e9e cons\u00e9cutive. Nous sommes la seule entreprise \u00e0 avoir \u00e9t\u00e9 cit\u00e9e comme leader dans les deux rapports.<\/p>\n<p>Cela souligne notre strat\u00e9gie visant \u00e0 d\u00e9velopper la plateforme de s\u00e9curit\u00e9 des identit\u00e9s la plus compl\u00e8te du secteur, offrant ainsi une protection sans pr\u00e9c\u00e9dent pour toutes les identit\u00e9s \u2013 humaines et non-humaines \u2013 sur tous les appareils dans des environnements hybrides et cloud.<\/p>\n<p><strong>Ne vous contentez pas de g\u00e9rer les identit\u00e9s. S\u00e9curisez-les.<\/strong>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbtiny cybv2-pad-top\u00a0\u00bb]<em>*GARTNER est une marque d\u00e9pos\u00e9e et une marque de service, et MAGIC QUADRANT est une marque d\u00e9pos\u00e9e de Gartner, Inc. et\/ou de ses filiales aux \u00c9tats-Unis et dans le monde. Ces marques sont utilis\u00e9es dans le pr\u00e9sent document avec autorisation. Tous droits r\u00e9serv\u00e9s.<\/em><\/p>\n<p><em>Gartner n\u2019approuve aucun fournisseur, produit ou service repr\u00e9sent\u00e9 dans ses publications de recherche et ne conseille pas aux utilisateurs de technologies de s\u00e9lectionner uniquement les fournisseurs ayant obtenu les meilleurs classements ou une autre d\u00e9signation. Les publications de recherche de Gartner se composent des opinions de l\u2019organisme de recherche de Gartner et ne doivent pas \u00eatre interpr\u00e9t\u00e9es comme des d\u00e9clarations de faits. Gartner d\u00e9cline toute garantie, expresse ou implicite, concernant cette \u00e9tude, y compris toute garantie de qualit\u00e9 marchande ou d\u2019ad\u00e9quation \u00e0 un usage particulier.<\/em><\/p>\n<p><em>Gartner<sup>\u00ae<\/sup> Magic Quadrant\u2122 pour Privileged Access Management, par Felix Gaehtgens, James Hoover, Michael Kelley, Brian Guthrie, Abhyuday Data, 5 Septembre 2023<\/em><\/p>\n<p><em>Gartner<sup>\u00ae<\/sup> Magic Quadrant\u2122 pour Access Management, par Henrique Teixeira, Abhyuday Data, Michael Kelley, James Hoover, Brian Guthrie, 1 Novembre 2022<\/em>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/12&Prime; css=\u00a0\u00bb.vc_custom_1663681871597{margin-right: 45px !important;border-right-width: 1px !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbright-clmn cybv2-form\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbcyb-pad-btm\u00a0\u00bb]<\/p>\n<h5>Obnetez les rapports<\/h5>\n<p>[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iOTE4NiIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9mci90aGFuay15b3UtZ2FydG5lci1tYWdpYy1xdWFkcmFudC1yZXBvcnRzLWZvci1wYW0tYW5kLWFjY2Vzcy1tYW5hZ2VtZW50Il0=[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top hv-cta\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb][vc_column_text]Rapport d\u2019analyste CyberArk est le seul fournisseur positionn\u00e9 en tant que Leader dans les deux rapports Gartner\u00ae Magic Quadrant\u2122 pour PAM et Access Management. Le Gartner\u00ae Magic Quadrant\u2122&#8230;<\/p>\n","protected":false},"author":125,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"t_cybv2_nomenus.php","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-136162","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CyberArk est le seul Leader reconnu dans deux rapports Gartner\u00ae Magic Quadrant\u2122, Access Management et PAM | CyberArk<\/title>\n<meta name=\"description\" content=\"Le nouveau Gartner Magic Quadrant 2023 for Privileged Access Management est disponible : CyberArk a \u00e9t\u00e9 nomm\u00e9 dans la cat\u00e9gorie Leader.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/gartner-magic-quadrant-reports-for-pam-and-access-management\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gartner Magic Quadrant Reports for PAM and Access Management\" \/>\n<meta property=\"og:description\" content=\"Le nouveau Gartner Magic Quadrant 2023 for Privileged Access Management est disponible : CyberArk a \u00e9t\u00e9 nomm\u00e9 dans la cat\u00e9gorie Leader.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/gartner-magic-quadrant-reports-for-pam-and-access-management\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-11T17:29:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/gartner-magic-quadrant-reports-for-pam-and-access-management\/\",\"url\":\"https:\/\/www.cyberark.com\/gartner-magic-quadrant-reports-for-pam-and-access-management\/\",\"name\":\"CyberArk est le seul Leader reconnu dans deux rapports Gartner\u00ae Magic Quadrant\u2122, Access Management et PAM | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2022-11-04T12:46:37+00:00\",\"dateModified\":\"2023-09-11T17:29:47+00:00\",\"description\":\"Le nouveau Gartner Magic Quadrant 2023 for Privileged Access Management est disponible : CyberArk a \u00e9t\u00e9 nomm\u00e9 dans la cat\u00e9gorie Leader.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/gartner-magic-quadrant-reports-for-pam-and-access-management\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/gartner-magic-quadrant-reports-for-pam-and-access-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/gartner-magic-quadrant-reports-for-pam-and-access-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gartner Magic Quadrant Reports for PAM and Access Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CyberArk est le seul Leader reconnu dans deux rapports Gartner\u00ae Magic Quadrant\u2122, Access Management et PAM | CyberArk","description":"Le nouveau Gartner Magic Quadrant 2023 for Privileged Access Management est disponible : CyberArk a \u00e9t\u00e9 nomm\u00e9 dans la cat\u00e9gorie Leader.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/gartner-magic-quadrant-reports-for-pam-and-access-management\/","og_locale":"fr_FR","og_type":"article","og_title":"Gartner Magic Quadrant Reports for PAM and Access Management","og_description":"Le nouveau Gartner Magic Quadrant 2023 for Privileged Access Management est disponible : CyberArk a \u00e9t\u00e9 nomm\u00e9 dans la cat\u00e9gorie Leader.","og_url":"https:\/\/www.cyberark.com\/gartner-magic-quadrant-reports-for-pam-and-access-management\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2023-09-11T17:29:47+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/gartner-magic-quadrant-reports-for-pam-and-access-management\/","url":"https:\/\/www.cyberark.com\/gartner-magic-quadrant-reports-for-pam-and-access-management\/","name":"CyberArk est le seul Leader reconnu dans deux rapports Gartner\u00ae Magic Quadrant\u2122, Access Management et PAM | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2022-11-04T12:46:37+00:00","dateModified":"2023-09-11T17:29:47+00:00","description":"Le nouveau Gartner Magic Quadrant 2023 for Privileged Access Management est disponible : CyberArk a \u00e9t\u00e9 nomm\u00e9 dans la cat\u00e9gorie Leader.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/gartner-magic-quadrant-reports-for-pam-and-access-management\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/gartner-magic-quadrant-reports-for-pam-and-access-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/gartner-magic-quadrant-reports-for-pam-and-access-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Gartner Magic Quadrant Reports for PAM and Access Management"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/136162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=136162"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/136162\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=136162"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=136162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}