{"id":199438,"date":"2024-11-13T07:31:48","date_gmt":"2024-11-13T12:31:48","guid":{"rendered":"https:\/\/www.cyberark.com\/wiz\/"},"modified":"2025-07-31T06:18:07","modified_gmt":"2025-07-31T10:18:07","slug":"wiz","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/wiz\/","title":{"rendered":"Wiz"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbcolumn-1&Prime; offset=\u00a0\u00bbvc_col-md-5&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h1><span class=\"chartreuse\">Acc\u00e9l\u00e9rez le d\u00e9veloppement dans le cloud<\/span> avec CyberArk et Wiz.\u200b<\/h1>\n<h2>Visibilit\u00e9 et protection compl\u00e8tes des acc\u00e8s \u00e0 privil\u00e8ges.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbDemander une d\u00e9mo\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Ftry-buy%2Fsecure-cloud-access-demo%2F|title:En%20savoir%20plus|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][vc_btn title=\u00a0\u00bbPr\u00e9sentation de la solution\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fcloud-security%2Fbuild-faster-in-the-cloud-with-cyberark-and-wiz|title:En%20savoir%20plus|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2 mt-auto\u00a0\u00bb offset=\u00a0\u00bbvc_col-md-offset-1&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_68b1d7k8sg videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 v3 products cybv2-pad box-row\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1748531337406{background-color: #E8E8E3 !important;}\u00a0\u00bb][vc_column][vc_row_inner el_class=\u00a0\u00bbjustify-content-center cybv2-pad-btm pad-top-120&Prime;][vc_column_inner el_class=\u00a0\u00bbcyb-center\u00a0\u00bb width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-md-offset-2&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h2>Visibilit\u00e9 et contr\u00f4le des acc\u00e8s au cloud sur mesure<\/h2>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbtext-center\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbicon-box\u00a0\u00bb width=\u00a0\u00bb1\/3&Prime; column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fsolutions%2Fdigital-business-transformation%2F|title:En%20savoir%20plus|\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-199307\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/hat-icon.svg\" alt=\"ic\u00f4ne chapeau\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>D\u00e9tection des risques pour toutes les identit\u00e9s\u200b<\/h4>\n<p>Visualisez clairement les identit\u00e9s \u00e0 privil\u00e8ges pour surveiller et s\u00e9curiser l\u2019acc\u00e8s gr\u00e2ce aux contr\u00f4les intelligents des privil\u00e8ges de CyberArk.\u200b[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbicon-box\u00a0\u00bb width=\u00a0\u00bb1\/3&Prime; column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fsolutions%2Fdefend-against-attacks%2F|title:En%20savoir%20plus|\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-199316\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/overview-vertical-arrow-icon.svg\" alt=\"fl\u00e8che\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Correction sans interruption<\/h4>\n<p>Appliquez facilement les contr\u00f4les des privil\u00e8ges pour s\u00e9curiser les identit\u00e9s humaines et machines ayant des acc\u00e8s \u00e0 haut risque. \u200b[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbicon-box\u00a0\u00bb width=\u00a0\u00bb1\/3&Prime; column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fsolutions%2Fsecure-your-workforce%2F|title:En%20savoir%20plus|\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-199325\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/report-icon.svg\" alt=\"ic\u00f4ne de papier\" width=\"39\" height=\"46\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Rapports complets<\/h4>\n<p>Appliquez facilement les contr\u00f4les des privil\u00e8ges pour s\u00e9curiser les identit\u00e9s humaines et machines ayant des acc\u00e8s \u00e0 haut risque.\u200b[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-hz\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1748531275889{margin-bottom: 40px !important;}\u00a0\u00bb]<\/p>\n<h3>Vous rencontrez ces d\u00e9fis\u00a0? Nous pouvons vous aider.<\/h3>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbLire le blog\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fblog|title:Lire%20maintenant|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb][vc_column_inner width=\u00a0\u00bb5\/12&Prime;][vc_column_text css=\u00a0\u00bb.vc_custom_1731438379114{margin-bottom: 30px !important;}\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-199253\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-6.jpg\" alt=\"femme\" width=\"200\" height=\"201\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-6.jpg 200w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-6-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-6-100x100.jpg 100w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h4>Manque de visibilit\u00e9 globale\u200b<\/h4>\n<p>Une visibilit\u00e9 limit\u00e9e g\u00e9n\u00e8re des angles morts en mati\u00e8re de s\u00e9curit\u00e9.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text css=\u00a0\u00bb.vc_custom_1731438386503{margin-bottom: 30px !important;}\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-199262\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-1.jpg\" alt=\"homme\" width=\"200\" height=\"201\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-1.jpg 200w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-1-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-1-100x100.jpg 100w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h4>R\u00f4les non d\u00e9finis\u200b<\/h4>\n<p>Un trop grand nombre d\u2019autorisations entra\u00eene une attribution excessive d\u2019acc\u00e8s et des risques accrus.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb5\/12&Prime; css=\u00a0\u00bb.vc_custom_1736362437897{margin-top: 40px !important;}\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1731438396760{margin-bottom: 30px !important;}\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-199271\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-2.jpg\" alt=\"homme\" width=\"200\" height=\"201\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-2.jpg 200w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-2-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-2-100x100.jpg 100w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h4>Manque d\u2019ergonomie pour les d\u00e9veloppeurs<\/h4>\n<p>Les contr\u00f4les complexes freinent l\u2019adoption des solutions de s\u00e9curit\u00e9.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime; css=\u00a0\u00bb.vc_custom_1736362428507{margin-top: 40px !important;}\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1731438402717{margin-bottom: 30px !important;}\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-199280\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-3.jpg\" alt=\"femme\" width=\"200\" height=\"201\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-3.jpg 200w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-3-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-3-100x100.jpg 100w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h4>Rapports et analyses inad\u00e9quats<\/h4>\n<p>L\u2019absence d\u2019informations compl\u00e8tes nuit \u00e0 l\u2019\u00e9valuation des risques li\u00e9s aux identit\u00e9s.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb5\/12&Prime; css=\u00a0\u00bb.vc_custom_1736362411375{margin-top: 40px !important;}\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1731438411789{margin-bottom: 30px !important;}\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-199289\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-4.jpg\" alt=\"femme\" width=\"200\" height=\"201\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-4.jpg 200w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-4-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-4-100x100.jpg 100w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h4>Processus de rem\u00e9diation inefficaces\u200b<\/h4>\n<p>Les actions correctives effectu\u00e9es manuellement retardent la r\u00e9ponse aux menaces.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime; css=\u00a0\u00bb.vc_custom_1736362417893{margin-top: 40px !important;}\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1731438417979{margin-bottom: 30px !important;}\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-199298\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-5.jpg\" alt=\"homme\" width=\"200\" height=\"201\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-5.jpg 200w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-5-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/wiz-5-100x100.jpg 100w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h4>Manque d\u2019efficacit\u00e9 op\u00e9rationnelle pour la s\u00e9curit\u00e9<\/h4>\n<p>La gestion des identit\u00e9s dans les diff\u00e9rents syst\u00e8mes suscite une fatigue li\u00e9e aux demandes d\u2019autorisation.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hero dark\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1748531025266{background-color: #E8E8E3 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbcolumn-1&Prime; offset=\u00a0\u00bbvc_col-md-5&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h3>Cliquez sur les diff\u00e9rents \u00e9l\u00e9ments pour voir l\u2019int\u00e9gration de CyberArk et Wiz en action.<\/h3>\n<p>B\u00e9n\u00e9ficiez d\u2019une visibilit\u00e9 et d\u2019une s\u00e9curit\u00e9 totales gr\u00e2ce \u00e0 CyberArk et Wiz.[\/vc_column_text][vc_btn title=\u00a0\u00bbD\u00e9couvrir la solution\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb custom_onclick=\u00a0\u00bbtrue\u00a0\u00bb link=\u00a0\u00bburl:%23|title:En%20savoir%20plus|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb custom_onclick_code=\u00a0\u00bbStorylane.Play({type: &lsquo;popup&rsquo;, demo_type: &lsquo;html&rsquo;, width: 1280, height: 800, scale: &lsquo;0.95&rsquo;, demo_url: &lsquo;https:\/\/app.storylane.io\/demo\/fwa3jg16xql3?embed=popup&rsquo;, padding_bottom: &lsquo;56.25%&rsquo;})\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2&Prime; offset=\u00a0\u00bbvc_col-md-offset-1&Prime;][vc_single_image image=\u00a0\u00bb199361&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad quote-component white\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1737658121182{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/01\/blue-dota-background.jpg?id=201917) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbimg-box\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1748971569920{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/06\/udi-matt-cs.jpg?id=211181) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcontent-column\u00a0\u00bb][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-201899\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/01\/double-quotes.svg\" alt=\"guillemets\" width=\"87\" height=\"64\" \/><\/p>\n<h4>Ensemble, CyberArk et Wiz renforcent la s\u00e9curit\u00e9 multicloud en am\u00e9liorant la visibilit\u00e9 et le contr\u00f4le des acc\u00e8s \u00e0 privil\u00e8ges des identit\u00e9s humaines et machines, le tout sans ralentir ni limiter le d\u00e9veloppement dans le cloud.<\/h4>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbD\u00e9marrer\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1748531771284{margin-top: 40px !important;}\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fcommunity.cyberark.com%2Fmarketplace%2Fs%2F%23a35Ht0000018sACIAY-a39Ht000004GLSJIA4|title:D%C3%A9marrer|target:_blank|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]JTNDc2NyaXB0JTIwYXN5bmMlMjBzcmMlM0QlMjJodHRwcyUzQSUyRiUyRmpzLnN0b3J5bGFuZS5pbyUyRmpzJTJGdjIlMkZzdG9yeWxhbmUuanMlMjIlM0UlM0MlMkZzY3JpcHQlM0U=[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbcolumn-1&Prime; offset=\u00a0\u00bbvc_col-md-5&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb] Acc\u00e9l\u00e9rez le d\u00e9veloppement dans le cloud avec CyberArk et Wiz.\u200b Visibilit\u00e9 et protection compl\u00e8tes des acc\u00e8s \u00e0 privil\u00e8ges. [\/vc_column_text][vc_btn title=\u00a0\u00bbDemander une d\u00e9mo\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-199438","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Le partenariat entre CyberArk et Wiz | CyberArk<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez comment CyberArk et Wiz font \u00e9quipe pour fournir des solutions avanc\u00e9es pour garantir la s\u00e9curit\u00e9 du cloud et des identit\u00e9s. Renforcez votre posture de s\u00e9curit\u00e9 dans le cloud gr\u00e2ce \u00e0 des int\u00e9grations transparentes et \u00e0 des outils innovants.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/wiz\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wiz\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez comment CyberArk et Wiz font \u00e9quipe pour fournir des solutions avanc\u00e9es pour garantir la s\u00e9curit\u00e9 du cloud et des identit\u00e9s. Renforcez votre posture de s\u00e9curit\u00e9 dans le cloud gr\u00e2ce \u00e0 des int\u00e9grations transparentes et \u00e0 des outils innovants.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/wiz\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-31T10:18:07+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/wiz\/\",\"url\":\"https:\/\/www.cyberark.com\/wiz\/\",\"name\":\"Le partenariat entre CyberArk et Wiz | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/wiz\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/wiz\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/hat-icon.svg\",\"datePublished\":\"2024-11-13T12:31:48+00:00\",\"dateModified\":\"2025-07-31T10:18:07+00:00\",\"description\":\"D\u00e9couvrez comment CyberArk et Wiz font \u00e9quipe pour fournir des solutions avanc\u00e9es pour garantir la s\u00e9curit\u00e9 du cloud et des identit\u00e9s. Renforcez votre posture de s\u00e9curit\u00e9 dans le cloud gr\u00e2ce \u00e0 des int\u00e9grations transparentes et \u00e0 des outils innovants.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/wiz\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/wiz\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/wiz\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/hat-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/hat-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/wiz\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wiz\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Le partenariat entre CyberArk et Wiz | CyberArk","description":"D\u00e9couvrez comment CyberArk et Wiz font \u00e9quipe pour fournir des solutions avanc\u00e9es pour garantir la s\u00e9curit\u00e9 du cloud et des identit\u00e9s. Renforcez votre posture de s\u00e9curit\u00e9 dans le cloud gr\u00e2ce \u00e0 des int\u00e9grations transparentes et \u00e0 des outils innovants.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/wiz\/","og_locale":"fr_FR","og_type":"article","og_title":"Wiz","og_description":"D\u00e9couvrez comment CyberArk et Wiz font \u00e9quipe pour fournir des solutions avanc\u00e9es pour garantir la s\u00e9curit\u00e9 du cloud et des identit\u00e9s. Renforcez votre posture de s\u00e9curit\u00e9 dans le cloud gr\u00e2ce \u00e0 des int\u00e9grations transparentes et \u00e0 des outils innovants.","og_url":"https:\/\/www.cyberark.com\/wiz\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-07-31T10:18:07+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/wiz\/","url":"https:\/\/www.cyberark.com\/wiz\/","name":"Le partenariat entre CyberArk et Wiz | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/wiz\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/wiz\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/hat-icon.svg","datePublished":"2024-11-13T12:31:48+00:00","dateModified":"2025-07-31T10:18:07+00:00","description":"D\u00e9couvrez comment CyberArk et Wiz font \u00e9quipe pour fournir des solutions avanc\u00e9es pour garantir la s\u00e9curit\u00e9 du cloud et des identit\u00e9s. Renforcez votre posture de s\u00e9curit\u00e9 dans le cloud gr\u00e2ce \u00e0 des int\u00e9grations transparentes et \u00e0 des outils innovants.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/wiz\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/wiz\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/wiz\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/hat-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/hat-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/wiz\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Wiz"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/199438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=199438"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/199438\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=199438"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=199438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}