{"id":186196,"date":"2023-12-22T17:25:47","date_gmt":"2023-12-22T22:25:47","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/securisez-votre-personnel\/"},"modified":"2026-04-01T06:27:33","modified_gmt":"2026-04-01T10:27:33","slug":"secure-your-workforce","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/","title":{"rendered":"Secure Your Workforce"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h1>S\u00e9curiser le personnel<\/h1>\n<p><\/p>\n<p class=\"lead\">Gestion unifi\u00e9e des identit\u00e9s et des acc\u00e8s, du point d\u2019acc\u00e8s \u00e0 l&rsquo;application<\/p>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbDemander une d\u00e9mo\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Ftry-buy%2Fworkforce-access-solutions-demo%2F|title:Essayer%20maintenant|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a class=\"js-storylane-demo\" href=\"#\">D\u00e9couvrez-le en action<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_h2qll9d8d5 videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 v3 products cybv2-pad-top box-row\u00a0\u00bb][vc_column][vc_row_inner el_class=\u00a0\u00bbcybv2-pad-btm\u00a0\u00bb][vc_column_inner width=\u00a0\u00bb5\/6&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<p class=\"head-content\">PROBL\u00c9MATIQUES<\/p>\n<h2 class=\"h3\">Les lacunes en mati\u00e8re d&rsquo;identit\u00e9 des employ\u00e9s compromettent la s\u00e9curit\u00e9 et la productivit\u00e9<\/h2>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbicon-box mb-6&Prime; width=\u00a0\u00bb1\/2&Prime; column_link=\u00a0\u00bbtitle:En%20savoir%20plus|\u00a0\u00bb offset=\u00a0\u00bbvc_col-lg-3&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-119676 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/critical-issue.svg\" alt=\"Vulnerabilities Are Critical Issues Icon\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>L&rsquo;identit\u00e9 est le vecteur d&rsquo;attaque num\u00e9ro un<\/h4>\n<p>La croissance rapide des identit\u00e9s, des applications SaaS, des points d\u2019acc\u00e8s et des environnements cloud distants, combin\u00e9e aux attaques acc\u00e9l\u00e9r\u00e9es par l&rsquo;IA, a consid\u00e9rablement accru les risques cyber.[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbicon-box mb-6&Prime; width=\u00a0\u00bb1\/2&Prime; column_link=\u00a0\u00bbtitle:En%20savoir%20plus|\u00a0\u00bb offset=\u00a0\u00bbvc_col-lg-3&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-110378 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Social_Login-Overview-Vertical-Overview-Vertical-Authentication-Authorization-1.svg\" alt=\"Social Login Icon\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>La s\u00e9curit\u00e9 lors de la connexion ignore les risques avant et apr\u00e8s l&rsquo;authentification<\/h4>\n<p>La s\u00e9curit\u00e9 traditionnelle s&rsquo;arr\u00eate \u00e0 l&rsquo;authentification, laissant les sessions vuln\u00e9rables au d\u00e9tournement, \u00e0 l&rsquo;exfiltration de donn\u00e9es et \u00e0 d&rsquo;autres menaces post-connexion.[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbicon-box mb-6&Prime; width=\u00a0\u00bb1\/2&Prime; column_link=\u00a0\u00bbtitle:En%20savoir%20plus|\u00a0\u00bb offset=\u00a0\u00bbvc_col-lg-3&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-110957 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Defend-Against-Attacks-icon.svg\" alt=\"lock icon\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Les mots de passe continuent de poser des risques li\u00e9s \u00e0 la s\u00e9curit\u00e9<\/h4>\n<p>Les attaques de phishing et par force brute r\u00e9ussissent parce que les mots de passe sont encore faciles \u00e0 voler et \u00e0 r\u00e9utiliser. Les organisations ont besoin d&rsquo;une protection plus forte des identifiants et d&rsquo;un acc\u00e8s sans mot de passe.[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbicon-box mb-6&Prime; width=\u00a0\u00bb1\/2&Prime; column_link=\u00a0\u00bbtitle:En%20savoir%20plus|\u00a0\u00bb offset=\u00a0\u00bbvc_col-lg-3&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-123641 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/10\/Managed-Services-Providers-MSP@2x.svg\" alt=\"Managed Services Providers (MSP) icon\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>La s\u00e9curit\u00e9 des identit\u00e9s traditionnelle peine \u00e0 r\u00e9pondre aux exigences des entreprises<\/h4>\n<p>Les solutions d&rsquo;identit\u00e9 cloisonn\u00e9es cr\u00e9ent des failles de s\u00e9curit\u00e9, ralentissent le fonctionnement et obligent les \u00e9quipes \u00e0 se consacrer \u00e0 la maintenance plut\u00f4t qu&rsquo;\u00e0 l&rsquo;innovation.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad\u00a0\u00bb][vc_column offset=\u00a0\u00bbvc_col-lg-10&Prime; el_class=\u00a0\u00bbmb-4&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<p class=\"head-content\">SOLUTIONS<\/p>\n<h2 class=\"h3\">Prot\u00e9ger le parcours utilisateur, du terminal \u00e0 l&rsquo;application<\/h2>\n<p>[\/vc_column_text][\/vc_column][vc_column offset=\u00a0\u00bbvc_col-lg-8&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<p class=\"lead\">Prot\u00e9ger l&rsquo;acc\u00e8s \u00e0 toutes les ressources, des points d\u2019acc\u00e8s aux applications SaaS et cloud, et se d\u00e9fendre contre les attaques sophistiqu\u00e9es qui vont au-del\u00e0 de la connexion.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbseesaw-v2 cybv2-pad-btm-120 cyb-reverse v3&Prime;][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbcolumn\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h3>S\u00e9curit\u00e9 des identit\u00e9s d\u00e8s le point d\u2019acc\u00e8s<\/h3>\n<p>Supprimer les droits d&rsquo;administrateur local gr\u00e2ce \u00e0 des contr\u00f4les bas\u00e9s sur le principe du moindre privil\u00e8ge afin de prot\u00e9ger l\u2019organisation contre les menaces telles que les ransomwares.[\/vc_column_text][vc_row_inner el_class=\u00a0\u00bbpt-4&Prime;][vc_column_inner][vc_btn title=\u00a0\u00bbEn savoir plus\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2Fendpoint-identity-security%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; offset=\u00a0\u00bbvc_col-lg-offset-1&Prime;][vc_single_image image=\u00a0\u00bb220808&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbseesaw-v2 cybv2-pad-btm-120&Prime;][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbd-flex align-items-start\u00a0\u00bb][vc_single_image image=\u00a0\u00bb220817&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-lg-offset-1&Prime; el_class=\u00a0\u00bbcolumn\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h3>Sans mot de passe de bout en bout<\/h3>\n<p>S\u00e9curiser chaque connexion gr\u00e2ce \u00e0 la MFA adaptative et r\u00e9sistante au phishing, une gestion plus intelligente des identifiants et un acc\u00e8s sans mot de passe plus simple pour les utilisateurs.[\/vc_column_text][vc_row_inner el_class=\u00a0\u00bbpt-4&Prime;][vc_column_inner][vc_btn title=\u00a0\u00bbEn savoir plus\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2Fpasswordless%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbseesaw-v2 cybv2-pad-btm-120 cyb-reverse v3&Prime;][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbcolumn\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h3>S\u00e9curit\u00e9 au-del\u00e0 de la connexion<\/h3>\n<p>Des contr\u00f4les multicouches qui s\u00e9curisent les sessions utilisateur au-del\u00e0 de la connexion contribuent \u00e0 prot\u00e9ger les ressources et les applications sensibles contre les menaces post-authentification.[\/vc_column_text][vc_row_inner el_class=\u00a0\u00bbpt-4&Prime;][vc_column_inner][vc_btn title=\u00a0\u00bbEn savoir plus\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2Fsecure-web-sessions%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; offset=\u00a0\u00bbvc_col-lg-offset-1&Prime;][vc_single_image image=\u00a0\u00bb220826&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbseesaw-v2 cybv2-pad-btm-120&Prime;][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbd-flex align-items-start\u00a0\u00bb][vc_single_image image=\u00a0\u00bb220835&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-lg-offset-1&Prime; el_class=\u00a0\u00bbcolumn\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h3>Gouvernance automatis\u00e9e des identit\u00e9s<\/h3>\n<p>Automatiser la gestion du cycle de vie des identit\u00e9s et l&rsquo;application des politiques afin de r\u00e9duire les risques, d&rsquo;acc\u00e9l\u00e9rer l&rsquo;int\u00e9gration et de maintenir un acc\u00e8s s\u00e9curis\u00e9 et conforme pour le personnel.[\/vc_column_text][vc_row_inner el_class=\u00a0\u00bbpt-4&Prime;][vc_column_inner][vc_btn title=\u00a0\u00bbEn savoir plus\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2Fmodern-iga%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1768512135505{background-color: #E8E8E3 !important;}\u00a0\u00bb][vc_column][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbmb-4&Prime; offset=\u00a0\u00bbvc_col-lg-10&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<p class=\"head-content\">FONCTIONNALIT\u00c9S ET CARACT\u00c9RISTIQUES CL\u00c9S<\/p>\n<h2 class=\"h3\">Int\u00e9gration des contr\u00f4les d&rsquo;identit\u00e9 intelligents \u00e0 partir d&rsquo;une plateforme de s\u00e9curit\u00e9 des identit\u00e9s unifi\u00e9e<\/h2>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbmb-12&Prime; offset=\u00a0\u00bbvc_col-lg-8&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<p class=\"lead\">S\u00e9curiser l&rsquo;acc\u00e8s \u00e0 toutes les ressources, depuis n&rsquo;importe quelle identit\u00e9, sur n&rsquo;importe quel terminal et depuis n&rsquo;importe quel endroit, sans compromettre la productivit\u00e9.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcta-box mb-6&Prime; offset=\u00a0\u00bbvc_col-lg-4&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbmb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-109553 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Enable-the-Digital-Business-icon-2.svg\" alt=\"Enable the Digital Business\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Gestionnaire des privil\u00e8ges des points d\u2019acc\u00e8s<\/h4>\n<p>Supprimez les droits d&rsquo;administrateur local et \u00e9tendez l\u2019 authentification multifacteur (MFA) aux points d\u2019acc\u00e8s pour valider et authentifier les utilisateurs.[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbchartreuse link-arrow-right pt-5&Prime;]<a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/secure-endpoints-and-servers\/\">D\u00e9couvrir comment cela fonctionne<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box mb-6&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbmb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-127590 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/aws-partner-icon-2.svg\" alt=\"AWS partner icon\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Gestion des mots de passe des employ\u00e9s<\/h4>\n<p>Stocker, g\u00e9rer et partager en toute s\u00e9curit\u00e9 les identifiants des applications professionnelles.[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbchartreuse link-arrow-right pt-5&Prime;]<a href=\"https:\/\/www.cyberark.com\/fr\/products\/workforce-password-management\/\">D\u00e9couvrir comment cela fonctionne<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box mb-6&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbmb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-110378 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Social_Login-Overview-Vertical-Overview-Vertical-Authentication-Authorization-1.svg\" alt=\"Social Login Icon\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Single Sign-On<\/h4>\n<p>Acc\u00e9der en toute s\u00e9curit\u00e9 et en un seul clic \u00e0 toutes les ressources dont les employ\u00e9s ont besoin.[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbchartreuse link-arrow-right pt-5&Prime;]<a href=\"https:\/\/www.cyberark.com\/fr\/products\/single-sign-on\/\">D\u00e9couvrir comment cela fonctionne<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box mb-6&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbmb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-112490 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/adaptive-Acecss-LockedApp-Icon.svg\" alt=\"Locked App Icon\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Authentification multifacteur adaptative<\/h4>\n<p>Politiques d&rsquo;authentification bas\u00e9es sur les risques pour \u00e9quilibrer s\u00e9curit\u00e9 et productivit\u00e9.[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbchartreuse link-arrow-right pt-5&Prime;]<a href=\"https:\/\/www.cyberark.com\/fr\/products\/adaptive-multi-factor-authentication\/\">D\u00e9couvrir comment cela fonctionne<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box mb-6&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbmb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-127590 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/aws-partner-icon-2.svg\" alt=\"AWS partner icon\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Secure Web Sessions<\/h4>\n<p>B\u00e9n\u00e9ficier d&rsquo;une visibilit\u00e9 sur chaque action effectu\u00e9e par les utilisateurs dans les applications Web.[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbchartreuse link-arrow-right pt-5&Prime;]<a href=\"https:\/\/www.cyberark.com\/fr\/products\/secure-web-sessions\/\">D\u00e9couvrirz comment cela fonctionne<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 dark stat-component\u00a0\u00bb][vc_column][vc_row_inner el_class=\u00a0\u00bbheading\u00a0\u00bb][vc_column_inner width=\u00a0\u00bb11\/12&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<p class=\"head-content\">AVANTAGES ET VALEURS<\/p>\n<h2 class=\"h3\">Pourquoi la s\u00e9curit\u00e9 des identit\u00e9s ne peut attendre<\/h2>\n<p>Les attaquants agissent de mani\u00e8re de plus en plus rapide, et l&rsquo;identit\u00e9 reste leur moyen d&rsquo;acc\u00e8s le plus courant.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbprogress-component\u00a0\u00bb][vc_column_inner width=\u00a0\u00bb1\/2&Prime; offset=\u00a0\u00bbvc_col-lg-4&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbtext-lg\u00a0\u00bb]<\/p>\n<div class=\"h2 text-white\">90%<\/div>\n<p>des organisations ont \u00e9t\u00e9 victimes d&rsquo;une violation li\u00e9e \u00e0 l&rsquo;identit\u00e9 au cours de l&rsquo;ann\u00e9e \u00e9coul\u00e9e.[\/vc_column_text][vc_raw_html css=\u00a0\u00bb\u00a0\u00bb]PGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyLWNvbnRhaW5lciI+DQo8ZGl2IGNsYXNzPSJwcm9ncmVzcy1iYXIgcHJvZ3Jlc3MtYmFyLXB1cnBsZSIgZGF0YS1wZXJjZW50YWdlPSI5MCI+PC9kaXY+PGJyPjwvZGl2Pg==[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime; offset=\u00a0\u00bbvc_col-lg-4&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbtext-lg\u00a0\u00bb]<\/p>\n<div class=\"h2 text-white\">N\u00b01<\/div>\n<p>Le vecteur d&rsquo;attaque n\u00b0 1 est le vol d&rsquo;identifiants et le phishing.[\/vc_column_text][vc_raw_html css=\u00a0\u00bb\u00a0\u00bb]PGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyLWNvbnRhaW5lciI+DQo8ZGl2IGNsYXNzPSJwcm9ncmVzcy1iYXIgcHJvZ3Jlc3MtYmFyLWdyZWVuIiBkYXRhLXBlcmNlbnRhZ2U9IjEwMCI+PC9kaXY+PGJyPjwvZGl2Pg==[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime; offset=\u00a0\u00bbvc_col-lg-4&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbtext-lg\u00a0\u00bb]<\/p>\n<div class=\"h2 text-white\">30 minutes<\/div>\n<p>Les attaquants peuvent se d\u00e9placer lat\u00e9ralement en moins de 30 minutes apr\u00e8s la compromission initiale.[\/vc_column_text][vc_raw_html css=\u00a0\u00bb\u00a0\u00bb]PGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyLWNvbnRhaW5lciI+DQo8ZGl2IGNsYXNzPSJwcm9ncmVzcy1iYXIgcHJvZ3Jlc3MtYmFyLWJsdWUiIGRhdGEtcGVyY2VudGFnZT0iNzkiPjwvZGl2Pjxicj48L2Rpdj4=[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2&Prime;][vc_column][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<p class=\"head-content\">RESOURCES<\/p>\n<h2 class=\"h3\">Ressources professionnelles mises en avant<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column cybv2-pad-top\u00a0\u00bb][vc_column el_class=\u00a0\u00bbnew_hpstyle_section8_col1&Prime;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00a0\u00bb.vc_custom_1767961219061{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section8_uberflip\u00a0\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 partners cybv2-pad-btm box-row cyb-background-lt bgimg-hide-mobile\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1768511304625{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_column][vc_row_inner el_class=\u00a0\u00bbcybv2 cybv2-pad-top\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbmb-4&Prime; offset=\u00a0\u00bbvc_col-lg-10&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<p class=\"head-content\">MARQUES DE CONFIANCE<\/p>\n<h2 class=\"h3\">La s\u00e9curit\u00e9 des identit\u00e9s des employ\u00e9s en action<\/h2>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbmb-8&Prime; offset=\u00a0\u00bbvc_col-lg-8&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbmb-4&Prime;][\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<p class=\"lead\">Les plus grandes organisations mondiales font confiance \u00e0 CyberArk pour prot\u00e9ger leurs identit\u00e9s et s\u00e9curiser l&rsquo;acc\u00e8s, du point d\u2019acc\u00e8s \u00e0 l&rsquo;application. Nous sommes fiers de les accompagner dans leur d\u00e9marche de s\u00e9curit\u00e9 des identit\u00e9s.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner el_class=\u00a0\u00bbpartner-box\u00a0\u00bb width=\u00a0\u00bb1\/6&Prime; offset=\u00a0\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&Prime; column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fcustomer-stories%2Foptiv%2F|\u00a0\u00bb][vc_single_image image=\u00a0\u00bb210595&Prime; img_size=\u00a0\u00bb\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpartner-logo\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbpartner-box\u00a0\u00bb width=\u00a0\u00bb1\/6&Prime; offset=\u00a0\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&Prime; column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fcustomer-stories%2Fhealthfirst%2F|\u00a0\u00bb][vc_single_image image=\u00a0\u00bb135516&Prime; img_size=\u00a0\u00bb\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbpartner-box\u00a0\u00bb width=\u00a0\u00bb1\/6&Prime; offset=\u00a0\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&Prime; column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fcustomer-stories%2Fpacific-dental-services-secures-access-to-clinical-resources-for-over-900-dental-practices%2F|\u00a0\u00bb][vc_single_image image=\u00a0\u00bb140142&Prime; img_size=\u00a0\u00bb\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpartner-logo\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbpartner-box\u00a0\u00bb width=\u00a0\u00bb1\/6&Prime; offset=\u00a0\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&Prime; column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fcustomer-stories%2Fecad%2F|\u00a0\u00bb][vc_single_image image=\u00a0\u00bb190032&Prime; img_size=\u00a0\u00bb\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpartner-logo\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbpartner-box\u00a0\u00bb width=\u00a0\u00bb1\/6&Prime; offset=\u00a0\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&Prime; column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fcustomer-stories%2Fheng-leong-hang%2F|\u00a0\u00bb][vc_single_image image=\u00a0\u00bb187514&Prime; img_size=\u00a0\u00bb\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpartner-logo\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbpartner-box\u00a0\u00bb width=\u00a0\u00bb1\/6&Prime; offset=\u00a0\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&Prime; column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fcustomer-stories%2Fchico-unified-school-district%2F|\u00a0\u00bb][vc_single_image image=\u00a0\u00bb182303&Prime; img_size=\u00a0\u00bb\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpartner-logo\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 fullaccordion2 cybv2-pad acc1&Prime;][vc_column][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbheading\u00a0\u00bb]<\/p>\n<p class=\"head-content\">FAQ<\/p>\n<h2 class=\"h3\">S\u00e9curisation du personnel FAQ<\/h2>\n<p>[\/vc_column_text][vc_tta_accordion shape=\u00a0\u00bbsquare\u00a0\u00bb color=\u00a0\u00bbwhite\u00a0\u00bb c_icon=\u00a0\u00bb\u00a0\u00bb active_section=\u00a0\u00bb1&Prime; css_animation=\u00a0\u00bbnone\u00a0\u00bb collapsible_all=\u00a0\u00bbtrue\u00a0\u00bb][vc_tta_section title=\u00a0\u00bbQu&#039;est-ce que la s\u00e9curit\u00e9 des identit\u00e9s professionnelles et pourquoi est-elle importante ?\u00a0\u00bb tab_id=\u00a0\u00bbgeneral-1&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpadding-content-img\u00a0\u00bb]La s\u00e9curit\u00e9 des identit\u00e9s des employ\u00e9s prot\u00e8ge les employ\u00e9s, les sous-traitants et les partenaires en contr\u00f4lant l&rsquo;acc\u00e8s aux applications et aux donn\u00e9es sur tous les terminaux et dans toutes les conditions, ce qui r\u00e9duit le risque de violation tout en favorisant l&rsquo;agilit\u00e9 de l&rsquo;entreprise.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbComment l&#039;authentification sans mot de passe r\u00e9duit-elle les attaques bas\u00e9es sur les identifiants ?\u00a0\u00bb tab_id=\u00a0\u00bbgeneral-2&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpadding-content-img\u00a0\u00bb]Les m\u00e9thodes sans mot de passe (cl\u00e9s d&rsquo;acc\u00e8s, FIDO2, identifiants li\u00e9s \u00e0 un terminal) \u00e9liminent les mots de passe statiques que les attaquants peuvent r\u00e9cup\u00e9rer ou r\u00e9utiliser, ce qui r\u00e9duit consid\u00e9rablement les risques de vol d&rsquo;identifiants, de phishing et d&rsquo;attaques par force brute. C&rsquo;est pourquoi les organisations adoptent rapidement les cl\u00e9s d&rsquo;acc\u00e8s et l&rsquo;authentification cryptographique.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbQu&#039;est-ce que l&#039;acc\u00e8s \u00e0 moindre privil\u00e8ge et comment permet-il de pr\u00e9venir les ransomwares ?\u00a0\u00bb tab_id=\u00a0\u00bbgeneral-3&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpadding-content-img\u00a0\u00bb]Le moindre privil\u00e8ge limite les droits des utilisateurs \u00e0 ce qui est n\u00e9cessaire pour leur travail, ce qui r\u00e9duit les mouvements lat\u00e9raux et limite les dommages caus\u00e9s par les comptes compromis. Il s&rsquo;agit d&rsquo;un contr\u00f4le essentiel recommand\u00e9 pour la pr\u00e9vention des ransomwares et la conformit\u00e9 r\u00e9glementaire.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbPourquoi les contr\u00f4les au-del\u00e0 de la connexion (session et post-authentification) sont-ils importants ?\u00a0\u00bb tab_id=\u00a0\u00bbgeneral-4&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpadding-content-img\u00a0\u00bb]Des menaces peuvent survenir apr\u00e8s l&rsquo;authentification (d\u00e9tournement de session, vol d&rsquo;identifiants, comportements \u00e0 risque). Les contr\u00f4les de session temps r\u00e9el et la visibilit\u00e9 vous permettent de d\u00e9tecter et d&rsquo;arr\u00eater les activit\u00e9s \u00e0 risque pendant une session, et pas seulement lors de la connexion.<br \/>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbComment la s\u00e9curit\u00e9 des identit\u00e9s des employ\u00e9s s&#039;int\u00e8gre-t-elle aux syst\u00e8mes SSO ou IAM existants ?\u00a0\u00bb tab_id=\u00a0\u00bbfeatures-and-capabilities-1&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpadding-content-img\u00a0\u00bb]Les solutions modernes pour les employ\u00e9s sont con\u00e7ues pour se connecter aux syst\u00e8mes SSO, IAM et RH via des protocoles standard (SAML, OIDC) et des API, offrant une application unifi\u00e9e des politiques, une orchestration du cycle de vie et des rapports coh\u00e9rents sur l&rsquo;ensemble de votre infrastructure technologique.<br \/>\n[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]JTNDc2NyaXB0JTNFJTBBalF1ZXJ5JTI4JTIwZG9jdW1lbnQlMjAlMjkucmVhZHklMjglMjBmdW5jdGlvbiUyOCUyMCUyNCUyMCUyOSUyMCU3QiUwQSUyMCUyMCUyMCUyMGpRdWVyeSUyOCUyMCUyNy52Y190dGEtcGFuZWwtdGl0bGUlMjclMjAlMjkuY2xpY2slMjglMjBmdW5jdGlvbiUyOCUyOSUyMCU3QiUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMHZhciUyMHBhbmUlMjAlM0QlMjBqUXVlcnklMjh0aGlzJTI5JTNCJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwc2V0VGltZW91dCUyOCUyMGZ1bmN0aW9uJTI4JTI5JTdCJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwdmFyJTIwJTI0cGFuZWwlMjAlM0QlMjBwYW5lLmNsb3Nlc3QlMjglMjAlMjcudmNfdHRhLXBhbmVsJTI3JTIwJTI5JTNCJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTdEJTJDJTIwMTAwMCUyMCUyOSUzQiUwQSUyMCUyMCUyMCUyMCU3RCUyMCUyOSUzQiUwQSU3RCUyMCUyOSUzQiUwQSUwQSUzQyUyRnNjcmlwdCUzRQ==[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 get-started cybv2-pad\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1767699683138{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2026\/01\/CTA-bg_1300x392-min.jpg?id=221378) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb2\/3&Prime; el_class=\u00a0\u00bbstat-column text-center\u00a0\u00bb offset=\u00a0\u00bbvc_col-md-offset-2&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbextra-space chartreuse\u00a0\u00bb]<\/p>\n<h2 class=\"h3\" style=\"color: white;\">Quand la s\u00e9curit\u00e9 rencontre la simplicit\u00e9 pour chaque employ\u00e9<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbDemander une d\u00e9mo\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Ftry-buy%2Fworkforce-access-solutions-demo%2F|title:Contact|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid-chartreuse mt-8&Prime;][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb] S\u00e9curiser le personnel Gestion unifi\u00e9e des identit\u00e9s et des acc\u00e8s, du point d\u2019acc\u00e8s \u00e0 l&rsquo;application [\/vc_column_text][vc_btn title=\u00a0\u00bbDemander une d\u00e9mo\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Ftry-buy%2Fworkforce-access-solutions-demo%2F|title:Essayer%20maintenant|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb&#8230;<\/p>\n","protected":false},"author":125,"featured_media":0,"parent":51588,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-186196","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Secure Your Workforce | CyberArk<\/title>\n<meta name=\"description\" content=\"Unifier les contr\u00f4les d&#039;acc\u00e8s, d&#039;authentification et de privil\u00e8ges afin de s\u00e9curiser chaque utilisateur et chaque terminal, du point d\u2019acc\u00e8s \u00e0 l&#039;application, r\u00e9duisant ainsi les risques et am\u00e9liorant la productivit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Your Workforce\" \/>\n<meta property=\"og:description\" content=\"Unifier les contr\u00f4les d&#039;acc\u00e8s, d&#039;authentification et de privil\u00e8ges afin de s\u00e9curiser chaque utilisateur et chaque terminal, du point d\u2019acc\u00e8s \u00e0 l&#039;application, r\u00e9duisant ainsi les risques et am\u00e9liorant la productivit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T10:27:33+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/\",\"url\":\"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/\",\"name\":\"Secure Your Workforce | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/critical-issue.svg\",\"datePublished\":\"2023-12-22T22:25:47+00:00\",\"dateModified\":\"2026-04-01T10:27:33+00:00\",\"description\":\"Unifier les contr\u00f4les d'acc\u00e8s, d'authentification et de privil\u00e8ges afin de s\u00e9curiser chaque utilisateur et chaque terminal, du point d\u2019acc\u00e8s \u00e0 l'application, r\u00e9duisant ainsi les risques et am\u00e9liorant la productivit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/critical-issue.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/critical-issue.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions de s\u00e9curit\u00e9 des identit\u00e9s\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Secure Your Workforce\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Secure Your Workforce | CyberArk","description":"Unifier les contr\u00f4les d'acc\u00e8s, d'authentification et de privil\u00e8ges afin de s\u00e9curiser chaque utilisateur et chaque terminal, du point d\u2019acc\u00e8s \u00e0 l'application, r\u00e9duisant ainsi les risques et am\u00e9liorant la productivit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/","og_locale":"fr_FR","og_type":"article","og_title":"Secure Your Workforce","og_description":"Unifier les contr\u00f4les d'acc\u00e8s, d'authentification et de privil\u00e8ges afin de s\u00e9curiser chaque utilisateur et chaque terminal, du point d\u2019acc\u00e8s \u00e0 l'application, r\u00e9duisant ainsi les risques et am\u00e9liorant la productivit\u00e9.","og_url":"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-04-01T10:27:33+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/","url":"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/","name":"Secure Your Workforce | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/critical-issue.svg","datePublished":"2023-12-22T22:25:47+00:00","dateModified":"2026-04-01T10:27:33+00:00","description":"Unifier les contr\u00f4les d'acc\u00e8s, d'authentification et de privil\u00e8ges afin de s\u00e9curiser chaque utilisateur et chaque terminal, du point d\u2019acc\u00e8s \u00e0 l'application, r\u00e9duisant ainsi les risques et am\u00e9liorant la productivit\u00e9.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/critical-issue.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/critical-issue.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Solutions de s\u00e9curit\u00e9 des identit\u00e9s","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Secure Your Workforce"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/186196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=186196"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/186196\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51588"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=186196"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=186196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}