{"id":190607,"date":"2024-05-09T15:25:09","date_gmt":"2024-05-09T19:25:09","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/manufacturing\/"},"modified":"2024-07-03T03:20:07","modified_gmt":"2024-07-03T07:20:07","slug":"manufacturing","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/solutions\/manufacturing\/","title":{"rendered":"Industrie"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime; offset=\u00a0\u00bbvc_col-md-6&Prime;][vc_column_text]<\/p>\n<h1>Solutions de s\u00e9curit\u00e9 des identit\u00e9s CyberArk pour l\u2019industrie<\/h1>\n<h2>Vers une transformation s\u00e9curis\u00e9e de l\u2019industrie.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbEn savoir plus\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fcustomer-stories%2Farcelik%2F|title:En%20savoir%20plus|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2&Prime;][vc_single_image image=\u00a0\u00bb183554&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 v3 cybv2-pad overview-vt\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>L\u2019industrie est une source d\u2019innovation qui exige une protection totale des actifs de propri\u00e9t\u00e9 intellectuelle. Gr\u00e2ce \u00e0 sa plateforme de s\u00e9curit\u00e9 des identit\u00e9s, CyberArk prot\u00e8ge le c\u0153ur de l\u2019industrie.<\/h3>\n<p>CyberArk offre une plateforme de s\u00e9curit\u00e9 des identit\u00e9s unifi\u00e9e, centr\u00e9e sur les contr\u00f4les intelligents des privil\u00e8ges. Cette plateforme s\u00e9curise de mani\u00e8re transparente l\u2019acc\u00e8s pour toutes les identit\u00e9s et automatise de mani\u00e8re flexible le cycle de vie de l\u2019identit\u00e9 gr\u00e2ce \u00e0 une d\u00e9tection et une pr\u00e9vention continues des menaces, le tout au moyen d\u2019une approche unifi\u00e9e. CyberArk permet aux industriels d\u2019adopter les technologies modernes tout en prot\u00e9geant leurs donn\u00e9es personnelles et de propri\u00e9t\u00e9 exclusive. Gr\u00e2ce \u00e0 notre savoir-faire, nous vous aidons \u00e0 mener votre transformation num\u00e9rique en toute s\u00e9curit\u00e9 et \u00e0 pr\u00e9server la confiance de vos clients en tout temps.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-144043\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg\" alt=\"\" width=\"45\" height=\"45\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>R\u00e9duire les menaces<\/h4>\n<p>Les solutions fiables de s\u00e9curit\u00e9 des identit\u00e9s et de gestion des acc\u00e8s \u00e0 privil\u00e8ges de CyberArk prot\u00e8gent le c\u0153ur de vos activit\u00e9s de production. S\u00e9curisez les points d\u2019acc\u00e8s sensibles et prot\u00e9gez \u00e0 la fois vos processus physiques et vos actifs num\u00e9riques contre les menaces \u00e9mergentes.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-144051\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-2.svg\" alt=\"\" width=\"45\" height=\"45\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>\u00c9tablir et s\u00e9curiser la cha\u00eene d\u2019approvisionnement<\/h4>\n<p>Dans un domaine o\u00f9 la r\u00e9putation est reine, CyberArk am\u00e9liore la confiance des clients en r\u00e9duisant au strict minimum le risque de vol de donn\u00e9es. Int\u00e9grez de mani\u00e8re transparente nos solutions de s\u00e9curit\u00e9 \u00e0 vos initiatives de transformation num\u00e9rique et prot\u00e9gez les donn\u00e9es de vos clients, de vos \u00e9quipes DevOps et de votre cha\u00eene d\u2019approvisionnement, ainsi que vos informations de propri\u00e9t\u00e9 exclusive.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-144059\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg\" alt=\"\" width=\"45\" height=\"45\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Garantir la conformit\u00e9<\/h4>\n<p>CyberArk vous guide \u00e0 travers le paysage r\u00e9glementaire complexe de l\u2019industrie. Nos solutions offrent une approche globale pour r\u00e9pondre aux r\u00e9glementations sp\u00e9cifiques \u00e0 l\u2019industrie, ce qui vous permet de garder une longueur d\u2019avance sur les exigences et de maintenir votre conformit\u00e9.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 v3 products cybv2-pad-btm box-row\u00a0\u00bb][vc_column][vc_row_inner el_class=\u00a0\u00bbd-flex justify-content-center cybv2-pad-btm\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-center\u00a0\u00bb width=\u00a0\u00bb5\/6&Prime;][vc_column_text]<\/p>\n<h2>Faire progresser l\u2019innovation industrielle en toute s\u00e9curit\u00e9 dans un monde num\u00e9rique<\/h2>\n<h5>Voici quelques exemples de fa\u00e7ons dont CyberArk peut vous aider \u00e0 moderniser et s\u00e9curiser vos processus.<\/h5>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbicon-box\u00a0\u00bb width=\u00a0\u00bb1\/4&Prime; column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fsolutions%2Fdigital-business-transformation%2F|title:En%20savoir%20plus|\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbpb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-144099\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/card-icon-4.svg\" alt=\"\" width=\"45\" height=\"45\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Favoriser l\u2019activit\u00e9 num\u00e9rique<\/h4>\n<p>S\u00e9curisez l\u2019acc\u00e8s pour les identit\u00e9s humaines et machines, en garantissant l\u2019efficacit\u00e9 et la s\u00e9curit\u00e9 des op\u00e9rations.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbchartreuse link-arrow-right pt-5&Prime;]<a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/digital-business-transformation\/\">D\u00e9marrer aujourd\u2019hui<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbicon-box\u00a0\u00bb width=\u00a0\u00bb1\/4&Prime; column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fsolutions%2Fdefend-against-attacks%2F|title:En%20savoir%20plus|\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbpb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-144107\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/card-icon-5.svg\" alt=\"\" width=\"45\" height=\"45\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Se d\u00e9fendre contre les ran\u00e7ongiciels<\/h4>\n<p>Prot\u00e9gez en toute confiance votre entreprise contre les attaques, y\u00a0compris les ran\u00e7ongiciels et le vol d\u2019identifiants, tout en maintenant l\u2019efficacit\u00e9 de vos op\u00e9rations.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbchartreuse link-arrow-right pt-5&Prime;]<a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/defend-against-attacks\/\">D\u00e9couvrir comment<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbicon-box\u00a0\u00bb width=\u00a0\u00bb1\/4&Prime; column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fsolutions%2Fsecure-your-workforce%2F|title:En%20savoir%20plus|\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbpb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-144091\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/card-icon-3.svg\" alt=\"cha\u00eene\" width=\"45\" height=\"45\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>S\u00e9curiser le travail \u00e0 distance<\/h4>\n<p>Garantissez un acc\u00e8s \u00e0 distance s\u00e9curis\u00e9 et efficace pour votre personnel, en maintenant la productivit\u00e9 au plus haut et sans compromettre la s\u00e9curit\u00e9.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbchartreuse link-arrow-right pt-5&Prime;]<a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/\">Obtenir plus d\u2019informations<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbicon-box\u00a0\u00bb width=\u00a0\u00bb1\/4&Prime; column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fsolutions%2Faudit-compliance%2F|title:En%20savoir%20plus|\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbpb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-144115\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/card-icon-6.svg\" alt=\"\" width=\"45\" height=\"45\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Respecter les exigences d\u2019audit et de conformit\u00e9<\/h4>\n<p>Garantissez votre conformit\u00e9 \u00e0 la multitude de r\u00e9glementations applicables \u00e0 l\u2019industrie.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbchartreuse link-arrow-right pt-5&Prime;]<a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad text-md-center featured-video dark\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1715105840454{padding-bottom: 110px !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/6&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text]<\/p>\n<h3>13\u00a0fa\u00e7ons d\u2019am\u00e9liorer la s\u00e9curit\u00e9 OT<\/h3>\n<p>Les technologies op\u00e9rationnelles (OT) demeurent aujourd\u2019hui la cible privil\u00e9gi\u00e9e des attaquants. Les incidents de s\u00e9curit\u00e9 OT peuvent entraver les op\u00e9rations commerciales critiques, perturber les services essentiels et m\u00eame mettre en danger la s\u00e9curit\u00e9 et la sant\u00e9 des personnes.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-btm featured-video-overflow\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1648658970573{background-color: #ffffff !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-2&Prime;][vc_raw_html]PGRpdiBjbGFzcz0idmlkZW8td2luZG93Ij5bd2lzdGlhX3ZpZGVvIGlkPSJxNWEzdmpxaTYyIl08L2Rpdj4=[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_talk_to_an_expert\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608677118624{background-color: #061b2b !important;}\u00a0\u00bb][vc_column el_class=\u00a0\u00bbtext-center\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbextra-space\u00a0\u00bb]<\/p>\n<h3>Lisez l\u2019analyse sur la s\u00e9curit\u00e9 des terminaux\u00a0: au sein de l\u2019industrie mondiale<\/h3>\n<h5>Dans l\u2019industrie automobile en constante \u00e9volution, l\u2019int\u00e9gration des technologies num\u00e9riques aux syst\u00e8mes des v\u00e9hicules a mis en \u00e9vidence l\u2019importance de mesures de s\u00e9curit\u00e9 renforc\u00e9es.<\/h5>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbLire la suite\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb align=\u00a0\u00bbcenter\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fendpoint-security-review-manufacturing|title:lire|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-green cyb-button-hpstyle_section5&Prime;][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 customer-stories cybv2-pad-top\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/6&Prime;][vc_column_text el_class=\u00a0\u00bbpb-4&Prime;]<\/p>\n<h3>T\u00e9moignages de clients de l\u2019industrie<\/h3>\n<h6>Plus de 8\u00a0000\u00a0entreprises du monde entier font confiance \u00e0 CyberArk.<\/h6>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/?post_type=customer_story&#038;p=128197\">Voir plus de clients<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_customer_stories vc_tta-o-non-responsive\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1686775642430{background-color: #ffffff !important;}\u00a0\u00bb][vc_column][vc_tta_tabs style=\u00a0\u00bbflat\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb color=\u00a0\u00bbwhite\u00a0\u00bb spacing=\u00a0\u00bb\u00a0\u00bb gap=\u00a0\u00bb20&Prime; alignment=\u00a0\u00bbcenter\u00a0\u00bb active_section=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbcybv2_customer_stories_tabs\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676900675{background-color: #ffffff !important;}\u00a0\u00bb][vc_tta_section title=\u00a0\u00bbAr\u00e7elik\u00a0\u00bb tab_id=\u00a0\u00bbarcelik\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_icon vc_active\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb190529&Prime; img_size=\u00a0\u00bb590X560&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0Ar\u00e7elik voulait adopter la plateforme de s\u00e9curit\u00e9 des identit\u00e9s de CyberArk car elle leur offrait une solution \u00e9conomique bas\u00e9e sur le cloud. La solution de CyberArk a \u00e9t\u00e9 configur\u00e9e simplement en l\u2019espace de quelques minutes. En quelques clics, nous sommes pr\u00eats \u00e0 r\u00e9pondre \u00e0 tous les besoins.\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]\u00d6mer \u00dc\u00e7ler, architecte syst\u00e8mes et administrateur cloud chez <strong>Ar\u00e7elik<\/strong>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/arcelik\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbQuanta Services\u00a0\u00bb tab_id=\u00a0\u00bbquanta-services\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab2_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653503563{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb190538&Prime; img_size=\u00a0\u00bb590X560&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0Nous avons fait appel \u00e0 CyberArk pour r\u00e9soudre nos probl\u00e8mes li\u00e9s aux privil\u00e8ges, car je savais que nous pourrions mettre la solution en service rapidement et qu\u2019elle r\u00e9pondrait pr\u00e9cis\u00e9ment \u00e0 nos besoins. J\u2019\u00e9tais \u00e9galement convaincu qu\u2019elle nous aiderait \u00e0 am\u00e9liorer l\u2019efficacit\u00e9 de nos op\u00e9rations informatiques.\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]Richard Breaux, responsable principal de la s\u00e9curit\u00e9 informatique chez <strong>Quanta Services<\/strong>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/quanta-services\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbTransport international\u00a0\u00bb tab_id=\u00a0\u00bbglobal-transportation\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab3_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1687286224685{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb190547&Prime; img_size=\u00a0\u00bb590X560&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]CyberArk Privilege Cloud permet de prot\u00e9ger, contr\u00f4ler et surveiller les acc\u00e8s \u00e0 privil\u00e8ges dans les infrastructures on-premise, cloud et hybrides de l\u2019entreprise. Avant de d\u00e9ployer CyberArk Privilege Cloud, l\u2019entreprise ne disposait d\u2019aucun syst\u00e8me permettant de v\u00e9rifier si les actifs critiques \u00e9taient g\u00e9r\u00e9s, prot\u00e9g\u00e9s ou modifi\u00e9s de mani\u00e8re s\u00e9curis\u00e9e. Aujourd\u2019hui, les actifs critiques sont convenablement s\u00e9curis\u00e9s, car les mots de passe ne peuvent pas \u00eatre r\u00e9utilis\u00e9s ou compromis, m\u00eame pour les comptes partag\u00e9s.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1715265685171{margin-top: 20px !important;}\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/global-transportation-leader-takes-an-identity-security-first-saas-based-approach-to-shape-its-digital-transformation\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbMilliken\u00a0\u00bb tab_id=\u00a0\u00bbmilliken\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab4_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_single_image image=\u00a0\u00bb190556&Prime; img_size=\u00a0\u00bb590X560&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0CyberArk Endpoint Privilege Manager nous a donn\u00e9 la visibilit\u00e9 et le contr\u00f4le granulaire n\u00e9cessaires pour appliquer \u00e0 la fois le principe du moindre privil\u00e8ge et la strat\u00e9gie de contr\u00f4le des applications bas\u00e9e sur le \u00ab\u00a0refus par d\u00e9faut\u00a0\u00bb, avec un minimum de perturbations pour l\u2019entreprise.\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]Ken Brown, responsable de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information chez <strong>Milliken &amp; Company<\/strong>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/milliken\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbno-break\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbno-break\u00a0\u00bb]<\/p>\n<h3>Explorer les ressources connexes<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/resources\/\">Voir toutes les ressources<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column\u00a0\u00bb][vc_column el_class=\u00a0\u00bbnew_hpstyle_section8_col1&Prime;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html el_class=\u00a0\u00bbnew_hpstyle_section8_uberflip\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1715173148967{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime; offset=\u00a0\u00bbvc_col-md-6&Prime;][vc_column_text] Solutions de s\u00e9curit\u00e9 des identit\u00e9s CyberArk pour l\u2019industrie Vers une transformation s\u00e9curis\u00e9e de l\u2019industrie. [\/vc_column_text][vc_btn title=\u00a0\u00bbEn savoir plus\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fcustomer-stories%2Farcelik%2F|title:En%20savoir%20plus|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":51588,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-190607","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Industrie | CyberArk<\/title>\n<meta name=\"description\" content=\"L\u2019industrie est une source d\u2019innovation qui exige une protection totale des actifs de propri\u00e9t\u00e9 intellectuelle. Gr\u00e2ce \u00e0 sa plateforme de s\u00e9curit\u00e9 des identit\u00e9s, CyberArk prot\u00e8ge le c\u0153ur de l\u2019industrie.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/manufacturing\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrie\" \/>\n<meta property=\"og:description\" content=\"L\u2019industrie est une source d\u2019innovation qui exige une protection totale des actifs de propri\u00e9t\u00e9 intellectuelle. Gr\u00e2ce \u00e0 sa plateforme de s\u00e9curit\u00e9 des identit\u00e9s, CyberArk prot\u00e8ge le c\u0153ur de l\u2019industrie.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/manufacturing\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-03T07:20:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/manufacturing\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/manufacturing\/\",\"name\":\"Industrie | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/manufacturing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/manufacturing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg\",\"datePublished\":\"2024-05-09T19:25:09+00:00\",\"dateModified\":\"2024-07-03T07:20:07+00:00\",\"description\":\"L\u2019industrie est une source d\u2019innovation qui exige une protection totale des actifs de propri\u00e9t\u00e9 intellectuelle. Gr\u00e2ce \u00e0 sa plateforme de s\u00e9curit\u00e9 des identit\u00e9s, CyberArk prot\u00e8ge le c\u0153ur de l\u2019industrie.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/manufacturing\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/manufacturing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/manufacturing\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/manufacturing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions de s\u00e9curit\u00e9 des identit\u00e9s\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Industrie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Industrie | CyberArk","description":"L\u2019industrie est une source d\u2019innovation qui exige une protection totale des actifs de propri\u00e9t\u00e9 intellectuelle. Gr\u00e2ce \u00e0 sa plateforme de s\u00e9curit\u00e9 des identit\u00e9s, CyberArk prot\u00e8ge le c\u0153ur de l\u2019industrie.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/manufacturing\/","og_locale":"fr_FR","og_type":"article","og_title":"Industrie","og_description":"L\u2019industrie est une source d\u2019innovation qui exige une protection totale des actifs de propri\u00e9t\u00e9 intellectuelle. Gr\u00e2ce \u00e0 sa plateforme de s\u00e9curit\u00e9 des identit\u00e9s, CyberArk prot\u00e8ge le c\u0153ur de l\u2019industrie.","og_url":"https:\/\/www.cyberark.com\/solutions\/manufacturing\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2024-07-03T07:20:07+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/manufacturing\/","url":"https:\/\/www.cyberark.com\/solutions\/manufacturing\/","name":"Industrie | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/solutions\/manufacturing\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/solutions\/manufacturing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg","datePublished":"2024-05-09T19:25:09+00:00","dateModified":"2024-07-03T07:20:07+00:00","description":"L\u2019industrie est une source d\u2019innovation qui exige une protection totale des actifs de propri\u00e9t\u00e9 intellectuelle. Gr\u00e2ce \u00e0 sa plateforme de s\u00e9curit\u00e9 des identit\u00e9s, CyberArk prot\u00e8ge le c\u0153ur de l\u2019industrie.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/manufacturing\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/manufacturing\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/solutions\/manufacturing\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/manufacturing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Solutions de s\u00e9curit\u00e9 des identit\u00e9s","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Industrie"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/190607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=190607"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/190607\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51588"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=190607"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=190607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}