{"id":198950,"date":"2024-10-30T08:45:35","date_gmt":"2024-10-30T12:45:35","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/services-financiers\/"},"modified":"2025-12-04T04:26:29","modified_gmt":"2025-12-04T09:26:29","slug":"financial-services","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/solutions\/financial-services\/","title":{"rendered":"Services financiers"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime; offset=\u00a0\u00bbvc_col-md-6&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h1>CyberArk S\u00e9curit\u00e9 des Identit\u00e9s pour les services financiers<\/h1>\n<p><\/p>\n<h2>Une s\u00e9curit\u00e9 sur laquelle vous pouvez compter pour garantir votre succ\u00e8s.<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=\u00a0\u00bbRegarder le webinaire\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwebinars%2Fidentity-security-trailblazer-automating-identity-security-in-finance-with-erste-digital|title:Regarder%20maintenant|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/global-financial-services-firm\/\">Lire le t\u00e9moignage client<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2&Prime;][vc_single_image image=\u00a0\u00bb183554&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 v3 cybv2-pad overview-vt\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Prot\u00e9gez vos services financiers gr\u00e2ce aux solutions de s\u00e9curit\u00e9 des identit\u00e9s\u200b<\/h3>\n<p>S\u00e9curisez l\u2019acc\u00e8s de toutes les identit\u00e9s au sein de votre institution et dans les applications clients et prot\u00e9gez-vous contre les menaces croissantes qui p\u00e8sent sur vos donn\u00e9es personnelles et confidentielles tout en acc\u00e9l\u00e9rant l\u2019innovation num\u00e9rique pour r\u00e9pondre \u00e0 l\u2019\u00e9volution des besoins des clients.\u200b[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img decoding=\"async\" class=\"alignnone wp-image-129798 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg\" alt=\"L\u2019int\u00e9gration des solutions Endpoint Privilege Manager et CyberArk Identity Adaptive MFA vous permet de renforcer la s\u00e9curit\u00e9 des points d\u2019acc\u00e8s\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Limitez les vols d\u2019identifiants et emp\u00eachez les attaques<\/h4>\n<p>Utilisez des solutions fiables de s\u00e9curit\u00e9 des identit\u00e9s et de gestion des acc\u00e8s \u00e0 privil\u00e8ges pour emp\u00eacher les attaques ciblant les donn\u00e9es personnelles et les informations confidentielles.\u200b[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img decoding=\"async\" class=\"alignnone wp-image-126434 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/partner-handshake-icon.svg\" alt=\"Liens communautaires\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>B\u00e2tissez et pr\u00e9servez la confiance de vos clients\u200b<\/h4>\n<p>R\u00e9duisez le risque de perte de donn\u00e9es et les impacts sur les exp\u00e9riences clients tout en utilisant des outils DevOps pour renforcer la s\u00e9curit\u00e9 des applications clients essentielles \u00e0 votre transformation num\u00e9rique.\u200b[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img decoding=\"async\" class=\"alignnone wp-image-118792 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Satisfy-Audit-and-Compliance-icon.svg\" alt=\"Ic\u00f4ne R\u00e9ussir l\u2019audit et le contr\u00f4le de conformit\u00e9\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Garantir la conformit\u00e9\u200b<\/h4>\n<p>R\u00e9pondez aux exigences des principales r\u00e9glementations\u00a0: Sarbanes Oxley, PCI DSS, MAS TRM, NAIC, IFRS, IDD et RGPD.\u200b[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-more-col\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/6&Prime; el_class=\u00a0\u00bbtext-md-center heading\u00a0\u00bb offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-sm-offset-1&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h2>S\u00e9curiser les transactions num\u00e9riques\u200b<\/h2>\n<p><\/p>\n<h5>Voici quelques exemples de fa\u00e7ons dont CyberArk peut vous aider \u00e0 avancer en toute confiance.\u200b<\/h5>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-6&Prime;]<img decoding=\"async\" class=\"alignnone wp-image-129945 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/3_MachineIdentitiesIcon-01.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Enable the digital business\u200b<\/h4>\n<p>Secure access to business apps for human and machine identities.\u200b<br \/><a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/digital-business-transformation\/\"><br \/>\nStart Today<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-6&Prime;]<img decoding=\"async\" class=\"alignnone wp-image-118800 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\" alt=\"Cybers\u00e9curit\u00e9\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Se d\u00e9fendre contre les ran\u00e7ongiciels\u200b<\/h4>\n<p>Prot\u00e9gez en toute confiance votre entreprise contre les attaques, y\u00a0compris les ran\u00e7ongiciels et le vol d\u2019identifiants, tout en maintenant l\u2019efficacit\u00e9 de vos op\u00e9rations. <\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/defend-against-attacks\/\"> D\u00e9couvrir comment<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-6&Prime;]<img decoding=\"async\" class=\"alignnone wp-image-125619 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/remote-work-icon.svg\" alt=\"ic\u00f4ne de travail \u00e0 distance\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>S\u00e9curiser le travail \u00e0 distance<\/h4>\n<p>Connectez vos employ\u00e9s \u00e0 distance aux outils dont elle a besoin rapidement et efficacement.\u200b <\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/secure-your-workforce\/\"> Obtenir plus d\u2019informations<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-6&Prime;]<img decoding=\"async\" class=\"alignnone wp-image-130803 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/cv-unmatchedexpertise-icon.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Respect des exigences d\u2019audit et de conformit\u00e9\u200b<\/h4>\n<p>R\u00e9pondez aux exigences en constante \u00e9volution d\u2019un large \u00e9ventail de r\u00e9glementations, cadres directeurs et normes.\u200b <\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/\"> En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad text-md-center\u00a0\u00bb][vc_column el_class=\u00a0\u00bbpb-4&Prime;][vc_column_text]<\/p>\n<h2>Tendances li\u00e9es \u00e0 la s\u00e9curit\u00e9 des identit\u00e9s dans les services financiers\u200b<\/h2>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw cyb-reverse\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-left\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>\u00c9pisode\u00a051 \u2013 Concilier innovation et s\u00e9curit\u00e9 dans le secteur des technologies financi\u00e8res\u200b<\/h4>\n<p>Dans cet \u00e9pisode de Trust Issues, l\u2019animateur David Puner \u00e9change avec Eric Hussey, vice-pr\u00e9sident et responsable de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information (CISO) chez Finastra, un fournisseur majeur de logiciels et services financiers. Eric Hussey partage sa vision sur le r\u00f4le \u00e9volutif des CISO, les d\u00e9fis li\u00e9s aux r\u00e9glementations nouvelles et changeantes dans le domaine de la cybers\u00e9curit\u00e9 et la n\u00e9cessit\u00e9 de concilier innovation et s\u00e9curit\u00e9 dans le secteur des technologies financi\u00e8res. \u200b[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1721310959841{margin-top: 20px !important;}\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/podcasts\/ep-51-balancing-innovation-and-security-in-fintech\/\">\u00c9couter l\u2019\u00e9pisode\u200b<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-114312 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1.jpg\" alt=\"Gestion des acc\u00e8s\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove wistia_embed\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-112224 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/EnableDigital-Business-HV_CTA-770x550-1.jpg\" alt=\"CTA D\u00e9bloquer le potentiel du num\u00e9rique\" width=\"770\" height=\"550\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/EnableDigital-Business-HV_CTA-770x550-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/EnableDigital-Business-HV_CTA-770x550-1-300x214.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/EnableDigital-Business-HV_CTA-770x550-1-768x549.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/EnableDigital-Business-HV_CTA-770x550-1-150x107.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-right\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>Un exercice d\u2019\u00e9quilibrisme\u00a0: le r\u00f4le essentiel de la s\u00e9curit\u00e9 des identit\u00e9s dans l\u2019industrie de la finance\u200b<\/h4>\n<p>Dans ce tour d\u2019\u00e9quilibriste du secteur des services financiers, les solutions de s\u00e9curit\u00e9 des identit\u00e9s agissent en tant que filet de s\u00e9curit\u00e9 soigneusement con\u00e7u pour intercepter les erreurs avant qu\u2019elles ne m\u00e8nent \u00e0 un d\u00e9sastre.\u200b[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1721311145485{margin-top: 20px !important;}\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/blog\/financial-highwire-the-critical-role-of-identity-security-in-finance\">Lire la suite<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 customer-stories cybv2-pad-top\u00a0\u00bb][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-md-offset-2&Prime; el_class=\u00a0\u00bbtext-center\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbpb-4&Prime;]<\/p>\n<h3>T\u00e9moignages de clients du secteur des services financiers\u200b<\/h3>\n<p><\/p>\n<h6>Plus de 8\u00a0000\u00a0entreprises du monde entier font confiance \u00e0 CyberArk.\u200b<\/h6>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_customer_stories vc_tta-o-non-responsive\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1686775642430{background-color: #ffffff !important;}\u00a0\u00bb][vc_column][vc_tta_tabs style=\u00a0\u00bbflat\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb color=\u00a0\u00bbwhite\u00a0\u00bb spacing=\u00a0\u00bb\u00a0\u00bb gap=\u00a0\u00bb20&Prime; alignment=\u00a0\u00bbcenter\u00a0\u00bb active_section=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbcybv2_customer_stories_tabs\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676900675{background-color: #ffffff !important;}\u00a0\u00bb][vc_tta_section title=\u00a0\u00bbRabobank International\u00a0\u00bb tab_id=\u00a0\u00bbrabobank-international\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_icon vc_active\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653503563{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb191689&Prime; img_size=\u00a0\u00bb590X560&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0Nous pouvons g\u00e9rer cinq fois plus de comptes depuis le d\u00e9ploiement de la solution de CyberArk.\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]Alexa Glynn, directrice de l\u2019entit\u00e9 Security Integration\u00a0&#038;\u00a0Tooling, Global, chez <strong>Rabobank International<\/strong>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/rabobank\/\">Lire le t\u00e9moignage client<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbNational Australia Bank\u00a0\u00bb tab_id=\u00a0\u00bbnational-australia-bank\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab2_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1687286224685{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb128574&Prime; img_size=\u00a0\u00bb590X560&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0Avec son \u00e9quipe d\u00e9vou\u00e9e et sa solution d\u2019entreprise automatis\u00e9e pour la gestion des identit\u00e9s \u00e0 privil\u00e8ges, CyberArk nous a aid\u00e9s \u00e0 mener \u00e0 bien notre projet dans le monde entier. L\u2019\u00e9quipe a parfaitement g\u00e9r\u00e9 l\u2019envergure et la complexit\u00e9 du projet et r\u00e9pondu \u00e0 nos exigences pour am\u00e9liorer notre productivit\u00e9 et notre transparence.\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]Responsable de la s\u00e9curit\u00e9, <strong>National Australia Bank<\/strong>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1724047013074{margin-top: 20px !important;}\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/national-australia-bank\/\">Read Customer Story\u200b<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbTIAA\u00a0\u00bb tab_id=\u00a0\u00bbtiaa\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab3_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb129822&Prime; img_size=\u00a0\u00bb590X560&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0C\u2019\u00e9tait \u00e9poustouflant\u00a0: Nous avons compar\u00e9 le nombre d\u2019applications et de secrets que CyberArk Conjur pouvait actuellement g\u00e9rer avec des solutions concurrentes, et la diff\u00e9rence de co\u00fbt \u00e9tait vraiment convaincante.\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]Adam\u00a0Powers, Lead Info Security Engineering Manager, <strong>TIAA<\/strong>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/tiaa\/\">Read Customer Story\u200b<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbEntreprise de services financiers\u00a0\u00bb tab_id=\u00a0\u00bbfinancial-services-firm\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab4_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb35775&Prime; img_size=\u00a0\u00bb590X560&Prime; alignment=\u00a0\u00bbright\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0Notre \u00e9quipe b\u00e9n\u00e9ficie vraiment de la simplicit\u00e9 d\u2019utilisation et des gains d\u2019efficacit\u00e9 offerts par la solution Privileged Access Manager de CyberArk. Nous avons \u00e9limin\u00e9 les \u00e9tapes manuelles qui entravaient notre productivit\u00e9, et nous pouvons \u00e0 pr\u00e9sent v\u00e9rifier rapidement les comptes et automatiser de nombreux processus li\u00e9s.\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]Responsable de la s\u00e9curit\u00e9, <strong>Entreprise de services financiers<\/strong>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/global-financial-services-firm\/\">Read Customer Story\u200b<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbno-break\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbno-break\u00a0\u00bb]<\/p>\n<h3>Explorer les<br \/>\nressources<br \/>\nconnexes<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/all-blog-posts\/securing-a-lifeline-why-identity-security-is-paramount-in-healthcare\">Voir toutes les ressources<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column\u00a0\u00bb][vc_column el_class=\u00a0\u00bbnew_hpstyle_section8_col1&Prime;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00a0\u00bb.vc_custom_1721310776257{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section8_uberflip\u00a0\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime; offset=\u00a0\u00bbvc_col-md-6&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb] CyberArk S\u00e9curit\u00e9 des Identit\u00e9s pour les services financiers Une s\u00e9curit\u00e9 sur laquelle vous pouvez compter pour garantir votre succ\u00e8s. [\/vc_column_text][vc_btn title=\u00a0\u00bbRegarder le webinaire\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb&#8230;<\/p>\n","protected":false},"author":255,"featured_media":0,"parent":51588,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-198950","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Solutions de s\u00e9curit\u00e9 des identit\u00e9s CyberArk pour les services financiers\u200b<\/title>\n<meta name=\"description\" content=\"Nous combinons les pages web d\u00e9di\u00e9es aux services bancaires et d\u2019assurance pour cr\u00e9er une nouvelle page web sur les services financiers dans notre nouvelle marque.\u200b\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/financial-services\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Services financiers\" \/>\n<meta property=\"og:description\" content=\"Nous combinons les pages web d\u00e9di\u00e9es aux services bancaires et d\u2019assurance pour cr\u00e9er une nouvelle page web sur les services financiers dans notre nouvelle marque.\u200b\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/financial-services\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-04T09:26:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/financial-services\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/financial-services\/\",\"name\":\"Solutions de s\u00e9curit\u00e9 des identit\u00e9s CyberArk pour les services financiers\u200b\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/financial-services\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/financial-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg\",\"datePublished\":\"2024-10-30T12:45:35+00:00\",\"dateModified\":\"2025-12-04T09:26:29+00:00\",\"description\":\"Nous combinons les pages web d\u00e9di\u00e9es aux services bancaires et d\u2019assurance pour cr\u00e9er une nouvelle page web sur les services financiers dans notre nouvelle marque.\u200b\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/financial-services\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/financial-services\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/financial-services\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/financial-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions de s\u00e9curit\u00e9 des identit\u00e9s\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Services financiers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Solutions de s\u00e9curit\u00e9 des identit\u00e9s CyberArk pour les services financiers\u200b","description":"Nous combinons les pages web d\u00e9di\u00e9es aux services bancaires et d\u2019assurance pour cr\u00e9er une nouvelle page web sur les services financiers dans notre nouvelle marque.\u200b","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/financial-services\/","og_locale":"fr_FR","og_type":"article","og_title":"Services financiers","og_description":"Nous combinons les pages web d\u00e9di\u00e9es aux services bancaires et d\u2019assurance pour cr\u00e9er une nouvelle page web sur les services financiers dans notre nouvelle marque.\u200b","og_url":"https:\/\/www.cyberark.com\/solutions\/financial-services\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-12-04T09:26:29+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/financial-services\/","url":"https:\/\/www.cyberark.com\/solutions\/financial-services\/","name":"Solutions de s\u00e9curit\u00e9 des identit\u00e9s CyberArk pour les services financiers\u200b","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/solutions\/financial-services\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/solutions\/financial-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg","datePublished":"2024-10-30T12:45:35+00:00","dateModified":"2025-12-04T09:26:29+00:00","description":"Nous combinons les pages web d\u00e9di\u00e9es aux services bancaires et d\u2019assurance pour cr\u00e9er une nouvelle page web sur les services financiers dans notre nouvelle marque.\u200b","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/financial-services\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/financial-services\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/solutions\/financial-services\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/financial-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Solutions de s\u00e9curit\u00e9 des identit\u00e9s","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Services financiers"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/198950","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/255"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=198950"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/198950\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51588"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=198950"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=198950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}