{"id":192883,"date":"2024-06-20T08:43:49","date_gmt":"2024-06-20T12:43:49","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/critical-infrastructure\/"},"modified":"2024-10-30T08:59:18","modified_gmt":"2024-10-30T12:59:18","slug":"critical-infrastructure","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/","title":{"rendered":"Infrastructures critiques"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime; offset=\u00a0\u00bbvc_col-md-6&Prime;][vc_column_text]<\/p>\n<h1>Solutions de s\u00e9curit\u00e9 des identit\u00e9s CyberArk pour les infrastructures critiques<\/h1>\n<h2>Le parcours vers le Zero Trust et la s\u00e9curit\u00e9 des acc\u00e8s commence par l\u2019identit\u00e9.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbEn savoir plus\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fcustomer-stories%2Frepsol%2F|title:En%20savoir%20plus|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2&Prime;][vc_single_image image=\u00a0\u00bb183554&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 v3 cybv2-pad overview-vt\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Prot\u00e9gez le c\u0153ur des services essentiels<\/h3>\n<p>S\u00e9curisez les identit\u00e9s de tous les utilisateurs humains et machines dans tous les syst\u00e8mes \u00e9conomiques et physiques qui soutiennent les services essentiels de fourniture d\u2019\u00e9nergie et d\u2019int\u00e9r\u00eat public. En qualit\u00e9 de leader mondial de la s\u00e9curit\u00e9 des identit\u00e9s, CyberArk garantit une protection in\u00e9gal\u00e9e pour maintenir en tout temps votre r\u00e9silience.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-144043\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg\" alt=\"\" width=\"45\" height=\"45\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>R\u00e9duire les risques<\/h4>\n<p>Appliquez le principe de violation pr\u00e9sum\u00e9e et adoptez une approche bas\u00e9e sur les risques pour s\u00e9curiser les syst\u00e8mes utilis\u00e9s par les institutions et les services publics.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-144051\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-2.svg\" alt=\"\" width=\"45\" height=\"45\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Contenir les attaques<\/h4>\n<p>Emp\u00eachez les attaques de se propager en mettant \u0153uvre une strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s multicouches et centr\u00e9e sur les contr\u00f4les des privil\u00e8ges pour l\u2019ensemble de vos employ\u00e9s et de vos fournisseurs tiers.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-144059\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg\" alt=\"\" width=\"45\" height=\"45\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Respecter les exigences d\u2019audit et de conformit\u00e9<\/h4>\n<p>R\u00e9pondez aux exigences d\u2019un large \u00e9ventail de r\u00e9glementations, cadres directeurs et normes, y compris celles du NIST, du RGPD et des Essential Eight.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-background-oval tour sub-2&Prime;][vc_column][vc_row_inner el_class=\u00a0\u00bbcyb-center\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-pad-btm\u00a0\u00bb width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-2&Prime;][vc_column_text el_class=\u00a0\u00bbleft-mobile\u00a0\u00bb]<\/p>\n<h3>Une strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s multicouches<\/h3>\n<p>Renforcez votre posture de s\u00e9curit\u00e9 et r\u00e9duisez l\u2019exposition aux menaces dynamiques. Apprenez-en plus sur nos solutions et d\u00e9couvrez comment CyberArk peut vous aider \u00e0 g\u00e9rer et \u00e0 s\u00e9curiser toutes les identit\u00e9s dans les infrastructures critiques.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=\u00a0\u00bbsquare\u00a0\u00bb active_section=\u00a0\u00bb1&Prime; css_animation=\u00a0\u00bbnone\u00a0\u00bb][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbAcc\u00e8s des employ\u00e9s et des clients\u00a0\u00bb tab_id=\u00a0\u00bbcustomer\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Acc\u00e8s des employ\u00e9s et des clients<\/h4>\n<p>Fournissez l\u2019acc\u00e8s sur n\u2019importe quel appareil, n\u2019importe o\u00f9 et au bon moment, en surveillant en permanence les comportements pour vous assurer que les utilisateurs sont bien ceux qu\u2019ils disent \u00eatre.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/fr\/products\/access-management\/\">G\u00e9rez les acc\u00e8s en toute confiance<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-132520\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/identity-flows-tour.png\" alt=\"femme utilisant un ordinateur\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/identity-flows-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/identity-flows-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/identity-flows-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/identity-flows-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbS\u00e9curit\u00e9 des privil\u00e8ges aux points d\u2019acc\u00e8s\u00a0\u00bb tab_id=\u00a0\u00bbeps\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>S\u00e9curit\u00e9 des privil\u00e8ges aux points d\u2019acc\u00e8s<\/h4>\n<p>Supprimez les droits d\u2019administrateur local, appliquez le principe du moindre privil\u00e8ge et mettez en \u0153uvre des contr\u00f4les de s\u00e9curit\u00e9 des points d\u2019acc\u00e8s de base sur tous les points d\u2019acc\u00e8s, des environnements hybrides aux environnements cloud.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/\">Adoptez avec succ\u00e8s le principe du moindre privil\u00e8ge<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-129221\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/workforce-user-behavior-analytics-tour.png\" alt=\"Analyse du comportement des utilisateurs\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/workforce-user-behavior-analytics-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/workforce-user-behavior-analytics-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/workforce-user-behavior-analytics-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/workforce-user-behavior-analytics-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbGestion des acc\u00e8s \u00e0 privil\u00e8ges\u00a0\u00bb tab_id=\u00a0\u00bbpam\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Gestion des acc\u00e8s \u00e0 privil\u00e8ges<\/h4>\n<p>Appliquez les contr\u00f4les de s\u00e9curit\u00e9 \u00e0 moindre privil\u00e8ge. Prot\u00e9gez les acc\u00e8s \u00e0 privil\u00e8ges sur l\u2019ensemble des identit\u00e9s, infrastructures et applications, depuis les points d\u2019acc\u00e8s jusqu\u2019au cloud.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/fr\/products\/privileged-access\/\">Stoppez les cybercriminels sur leur lanc\u00e9e<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-132190\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/workforce-identity-endpoint-auth-tour.png\" alt=\"femme\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/workforce-identity-endpoint-auth-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/workforce-identity-endpoint-auth-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/workforce-identity-endpoint-auth-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/workforce-identity-endpoint-auth-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbGestion des secrets\u00a0\u00bb tab_id=\u00a0\u00bbsecrets\u00a0\u00bb][vc_row_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Gestion des secrets<\/h4>\n<p>S\u00e9curisez simplement les identit\u00e9s non humaines pour l\u2019ensemble des applications, pipelines DevoPS et workloads.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/resources\/endpoint-privilege-manager\/elevate-linux-sudo-based-least-privilege-to-the-next-level\">Gestion centralis\u00e9e des secrets<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-132182\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/workforce-identity-directory-services-tour.png\" alt=\"homme utilisant un ordinateur portable\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/workforce-identity-directory-services-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/workforce-identity-directory-services-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/workforce-identity-directory-services-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/workforce-identity-directory-services-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbS\u00e9curit\u00e9 du cloud\u00a0\u00bb tab_id=\u00a0\u00bbcloud\u00a0\u00bb][vc_row_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>S\u00e9curit\u00e9 du cloud<\/h4>\n<p>Mettez en \u0153uvre le principe du moindre privil\u00e8ge et de l\u2019acc\u00e8s juste \u00e0 temps en b\u00e9n\u00e9ficiant de conseils adapt\u00e9s au contexte. Analysez, s\u00e9curisez et surveillez les acc\u00e8s \u00e0 risque dans AWS, Azure et GCP.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/products\/cloud-security\/\">Surveillez vos environnements<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-129229\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/workforce-sws-tour.png\" alt=\"Secure Web Sessions\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/workforce-sws-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/workforce-sws-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/workforce-sws-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/workforce-sws-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbGestion des identit\u00e9s\u00a0\u00bb tab_id=\u00a0\u00bbidentity-management\u00a0\u00bb][vc_row_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Gestion des identit\u00e9s<\/h4>\n<p>Donnez \u00e0 votre personnel un acc\u00e8s simple et s\u00e9curis\u00e9 aux ressources de l\u2019entreprise avec CyberArk Workforce Identity.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/products\/workforce-identity\/\">Accordez l\u2019acc\u00e8s \u00e0 votre personnel<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-130299\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/workforce-identity-lcm-tour.png\" alt=\"Une jeune femme d\u2019affaires souriante serre la main d\u2019un coll\u00e8gue de bureau\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/workforce-identity-lcm-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/workforce-identity-lcm-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/workforce-identity-lcm-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/workforce-identity-lcm-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbServices partag\u00e9s\u00a0\u00bb tab_id=\u00a0\u00bbshared-services\u00a0\u00bb][vc_row_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Services partag\u00e9s<\/h4>\n<p>Les services partag\u00e9s permettent d\u2019am\u00e9liorer l\u2019efficacit\u00e9 op\u00e9rationnelle, en tirant parti d\u2019un portail d\u2019administration unique avec un audit unifi\u00e9 et le service Identity Security Intelligence.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/product-datasheets\/identity-security-platform-shared-services\">R\u00e9duisez les cyberrisques<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-130275\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/workforce-identity-app-gateway-tour.png\" alt=\"Homme afro-am\u00e9ricain utilisant un ordinateur portable\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/workforce-identity-app-gateway-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/workforce-identity-app-gateway-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/workforce-identity-app-gateway-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/workforce-identity-app-gateway-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 customer-stories cybv2-pad-top\u00a0\u00bb][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-md-offset-2&Prime; el_class=\u00a0\u00bbtext-center\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbpb-4&Prime;]<\/p>\n<h3>T\u00e9moignages de clients utilisant nos solutions pour les infrastructures critiques<\/h3>\n<h6>Plus de 8\u00a0000\u00a0entreprises du monde entier font confiance \u00e0 CyberArk.<\/h6>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_customer_stories vc_tta-o-non-responsive\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1686775642430{background-color: #ffffff !important;}\u00a0\u00bb][vc_column][vc_tta_tabs style=\u00a0\u00bbflat\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb color=\u00a0\u00bbwhite\u00a0\u00bb spacing=\u00a0\u00bb\u00a0\u00bb gap=\u00a0\u00bb20&Prime; alignment=\u00a0\u00bbcenter\u00a0\u00bb active_section=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbcybv2_customer_stories_tabs\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676900675{background-color: #ffffff !important;}\u00a0\u00bb][vc_tta_section title=\u00a0\u00bbRepsol\u00a0\u00bb tab_id=\u00a0\u00bbrepsol\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab3_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1687286224685{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb192810&Prime; img_size=\u00a0\u00bb590X560&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0Nous avons d\u00e9cid\u00e9 d\u2019utiliser une seule plateforme unifi\u00e9e pour s\u00e9curiser les identit\u00e9s \u00e0 privil\u00e8ges et leur acc\u00e8s \u00e0 distance. En effet, avec plusieurs solutions, le co\u00fbt est plus \u00e9lev\u00e9 et le d\u00e9ploiement plus difficile. Il \u00e9tait donc plus logique que de tout r\u00e9unir au m\u00eame endroit en b\u00e9n\u00e9ficiant des synergies offertes par un fournisseur unique.\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]Lukene Berrosteguieta, directrice du centre des op\u00e9rations de s\u00e9curit\u00e9 chez <strong>Repsol<\/strong>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1718727387420{margin-top: 20px !important;}\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/repsol\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbHealthfirst\u00a0\u00bb tab_id=\u00a0\u00bbhealthifrst\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab2_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653503563{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb192819&Prime; img_size=\u00a0\u00bb590X560&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0Si nous pouvons contr\u00f4ler l\u2019identit\u00e9, nous pouvons arr\u00eater la plupart des attaques modernes. Et si vous contr\u00f4lez l\u2019identit\u00e9, vous contr\u00f4lez chaque p\u00e9rim\u00e8tre, application, conteneur, c\u2019est-\u00e0-dire chaque partie de l\u2019environnement. C\u2019est ce que j\u2019appelle le v\u00e9ritable Zero Trust et c\u2019est pourquoi nous utilisons CyberArk. C\u2019est ce qui m\u2019aide \u00e0 bien dormir\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]Brian Miller, RSSI, <strong>Healthfirst<\/strong>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/healthfirst\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbQuanta Services\u00a0\u00bb tab_id=\u00a0\u00bbcocanta\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_icon vc_active\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb190538&Prime; img_size=\u00a0\u00bb590X560&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0J\u2019ai d\u00e9ploy\u00e9 les solutions CyberArk dans des entreprises de 150\u00a0utilisateurs seulement, jusqu\u2019\u00e0 Quanta avec 16\u00a0000\u00a0terminaux et de nombreux comptes individuels. Dans tous les cas, mon approche est identique. Et je me r\u00e9jouis encore une fois de ne pas avoir \u00e0 r\u00e9orienter ma strat\u00e9gie\u00a0; le d\u00e9ploiement avec CyberArk fonctionne quelle que soit la taille de l\u2019entreprise.\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]Richard Breaux, responsable principal de la s\u00e9curit\u00e9 informatique chez <strong>Quanta Services<\/strong>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/quanta-services\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbno-break\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbno-break\u00a0\u00bb]<\/p>\n<h3>Explorer les<br \/>\nressources<br \/>\nconnexes<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/resources\/\">Voir toutes les ressources<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip\u00a0\u00bb][vc_column el_class=\u00a0\u00bbnew_hpstyle_section8_col1&Prime;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html el_class=\u00a0\u00bbnew_hpstyle_section8_uberflip\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1718373643570{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime; offset=\u00a0\u00bbvc_col-md-6&Prime;][vc_column_text] Solutions de s\u00e9curit\u00e9 des identit\u00e9s CyberArk pour les infrastructures critiques Le parcours vers le Zero Trust et la s\u00e9curit\u00e9 des acc\u00e8s commence par l\u2019identit\u00e9. [\/vc_column_text][vc_btn&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":51588,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-192883","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Infrastructures critiques | CyberArk<\/title>\n<meta name=\"description\" content=\"Les solutions de s\u00e9curit\u00e9 des identit\u00e9s pour les infrastructures critiques de CyberArk prot\u00e8gent les identit\u00e9s de tous les utilisateurs humains et machines dans tous les syst\u00e8mes \u00e9conomiques et physiques qui soutiennent les services essentiels de fourniture d\u2019\u00e9nergie et d\u2019int\u00e9r\u00eat public.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infrastructures critiques\" \/>\n<meta property=\"og:description\" content=\"Les solutions de s\u00e9curit\u00e9 des identit\u00e9s pour les infrastructures critiques de CyberArk prot\u00e8gent les identit\u00e9s de tous les utilisateurs humains et machines dans tous les syst\u00e8mes \u00e9conomiques et physiques qui soutiennent les services essentiels de fourniture d\u2019\u00e9nergie et d\u2019int\u00e9r\u00eat public.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-30T12:59:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/\",\"url\":\"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/\",\"name\":\"Infrastructures critiques | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg\",\"datePublished\":\"2024-06-20T12:43:49+00:00\",\"dateModified\":\"2024-10-30T12:59:18+00:00\",\"description\":\"Les solutions de s\u00e9curit\u00e9 des identit\u00e9s pour les infrastructures critiques de CyberArk prot\u00e8gent les identit\u00e9s de tous les utilisateurs humains et machines dans tous les syst\u00e8mes \u00e9conomiques et physiques qui soutiennent les services essentiels de fourniture d\u2019\u00e9nergie et d\u2019int\u00e9r\u00eat public.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions de s\u00e9curit\u00e9 des identit\u00e9s\",\"item\":\"https:\/\/www.cyberark.com\/fr\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Infrastructures critiques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Infrastructures critiques | CyberArk","description":"Les solutions de s\u00e9curit\u00e9 des identit\u00e9s pour les infrastructures critiques de CyberArk prot\u00e8gent les identit\u00e9s de tous les utilisateurs humains et machines dans tous les syst\u00e8mes \u00e9conomiques et physiques qui soutiennent les services essentiels de fourniture d\u2019\u00e9nergie et d\u2019int\u00e9r\u00eat public.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/","og_locale":"fr_FR","og_type":"article","og_title":"Infrastructures critiques","og_description":"Les solutions de s\u00e9curit\u00e9 des identit\u00e9s pour les infrastructures critiques de CyberArk prot\u00e8gent les identit\u00e9s de tous les utilisateurs humains et machines dans tous les syst\u00e8mes \u00e9conomiques et physiques qui soutiennent les services essentiels de fourniture d\u2019\u00e9nergie et d\u2019int\u00e9r\u00eat public.","og_url":"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2024-10-30T12:59:18+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/","url":"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/","name":"Infrastructures critiques | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg","datePublished":"2024-06-20T12:43:49+00:00","dateModified":"2024-10-30T12:59:18+00:00","description":"Les solutions de s\u00e9curit\u00e9 des identit\u00e9s pour les infrastructures critiques de CyberArk prot\u00e8gent les identit\u00e9s de tous les utilisateurs humains et machines dans tous les syst\u00e8mes \u00e9conomiques et physiques qui soutiennent les services essentiels de fourniture d\u2019\u00e9nergie et d\u2019int\u00e9r\u00eat public.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/fr\/solutions\/critical-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Solutions de s\u00e9curit\u00e9 des identit\u00e9s","item":"https:\/\/www.cyberark.com\/fr\/solutions\/"},{"@type":"ListItem","position":3,"name":"Infrastructures critiques"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/fr\/#website","url":"https:\/\/www.cyberark.com\/fr\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/fr\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/192883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=192883"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/192883\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51588"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=192883"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=192883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}