{"id":207002,"date":"2025-04-03T05:47:13","date_gmt":"2025-04-03T09:47:13","guid":{"rendered":"https:\/\/www.cyberark.com\/migration-vers-le-pam-en-tant-que-service\/"},"modified":"2025-04-03T06:16:01","modified_gmt":"2025-04-03T10:16:01","slug":"pam-saas-migration","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/pam-saas-migration\/","title":{"rendered":"Migration vers le PAM en tant que service"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime; offset=\u00a0\u00bbvc_col-md-6&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h1>Acc\u00e9l\u00e9rez votre <span style=\"color: #d4eb33;\">transformation num\u00e9rique<\/span><\/h1>\n<p><\/p>\n<h2>Modernisez votre programme PAM gr\u00e2ce \u00e0 la solution PAM en tant que service. D\u00e9ployez nos tout derniers contr\u00f4les de s\u00e9curit\u00e9 et simplifiez la gestion gr\u00e2ce aux mises \u00e0 jour automatiques. R\u00e9duisez de mani\u00e8re significative les risques pour la s\u00e9curit\u00e9 des identit\u00e9s tout en diminuant les co\u00fbts op\u00e9rationnels.\u200b<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=\u00a0\u00bbDemander une d\u00e9mo\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:%23demo|title:Essai%20gratuit|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2&Prime;][vc_single_image image=\u00a0\u00bb201275&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad overview-vt\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1701205350215{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h3>Renforcez votre programme PAM avec des fonctionnalit\u00e9s de s\u00e9curit\u00e9 de pointe fournies via une solution SaaS.\u200b<\/h3>\n<p>D\u00e9ployez des solutions SaaS soutenues par l\u2019IA et tirez profit de la plateforme de s\u00e9curit\u00e9 des identit\u00e9s.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/fr\/products\/\" rel=\"noopener\">D\u00e9couvrir la plateforme<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img decoding=\"async\" class=\"alignnone wp-image-196150 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/automation-robot.svg\" alt=\"Ic\u00f4ne cloud\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h4>Am\u00e9liorer l\u2019efficacit\u00e9 op\u00e9rationnelle\u200b<\/h4>\n<p>Acc\u00e9l\u00e9rez l\u2019adoption et r\u00e9duisez de mani\u00e8re optimale les risques en modernisant votre programme PAM, et b\u00e9n\u00e9ficiez d\u2019une r\u00e9duction des co\u00fbts d\u2019infrastructure et des frais g\u00e9n\u00e9raux.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img decoding=\"async\" class=\"alignnone wp-image-196141 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Secure-Authentication-icon.svg\" alt=\"Poste de travail s\u00e9curis\u00e9\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h4>S\u00e9curisez votre transformation num\u00e9rique\u200b<\/h4>\n<p>Accordez aux \u00e9quipes IT et Op\u00e9rations Cloud un acc\u00e8s \u00e0 privil\u00e8ges natif et s\u00e9curis\u00e9, le tout de mani\u00e8re centralis\u00e9e.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img decoding=\"async\" class=\"alignnone wp-image-196159 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/dns__navy.svg\" alt=\"Ic\u00f4ne d\u2019engrenages\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h4>R\u00e9duire les cyberrisques de mani\u00e8re mesurable\u200b\u200b<\/h4>\n<p>G\u00e9rez en toute s\u00e9curit\u00e9 les acc\u00e8s \u00e0 haut risque \u00e0 votre \u00e9cosyst\u00e8me informatique via des identifiants prot\u00e9g\u00e9s et avec z\u00e9ro privil\u00e8ge permanent dans des environnements multicloud et hybrides.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 v3 cybv2-pad overview-vt\u00a0\u00bb][vc_column width=\u00a0\u00bb6\/12&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h3>S\u00e9curisez et g\u00e9rez simplement les acc\u00e8s \u00e0 privil\u00e8ges dans tous les environnements.<\/h3>\n<p>Services s\u00e9curis\u00e9s, conformes \u00e0 SOC 2 Type 2 avec un SLA certifi\u00e9 de 99,95 % pour la disponibilit\u00e9[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"cyb-br alignnone size-full wp-image-196801\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/SOC.jpg\" alt=\"SOC 2\" width=\"640\" height=\"350\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 v3 cybv2-pad overview-vt\u00a0\u00bb][vc_column width=\u00a0\u00bb6\/12&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"cyb-br alignnone size-full wp-image-196801\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Modernize-your-PAM-program.jpg\" alt=\"Modernisez votre programme PAM\" width=\"640\" height=\"350\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h3>Modernisez votre programme PAM<\/h3>\n<p>Am\u00e9liorez l\u2019efficacit\u00e9 gr\u00e2ce aux mises \u00e0 jour et aux correctifs automatis\u00e9s et r\u00e9duisez le co\u00fbt total de possession.[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-btm\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1738227128291{background-color: #FFFFFF00 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/6&Prime; el_class=\u00a0\u00bbtext-md-center heading pb-12&Prime; offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-sm-offset-1&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h2>Modernisez votre programme PAM pour vos environnements multicloud et d\u00e9ployez la solution PAM en tant que service.<\/h2>\n<p><a href=\"https:\/\/www.cyberark.com\/resources\/solution-briefs\/cyberark-privileged-user-saas-migration-jump-start-2 \" rel=\"noopener\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/5&Prime; el_class=\u00a0\u00bbcta-box text-center mb-10&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-201293 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/dns__navy.svg\" alt=\"navy\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Approche par \u00e9tapes pour la migration depuis votre environnement auto-h\u00e9berg\u00e9<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/5&Prime; el_class=\u00a0\u00bbcta-box text-center mb-10&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-6&Prime;]<img decoding=\"async\" class=\"alignnone wp-image-196765 size-thumbnail\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Enable-Seamless-User-Access-icon.svg\" alt=\"Accorder un acc\u00e8s transparent aux utilisateurs \" width=\"40px\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Migration guid\u00e9e avec Jump Start de CyberArk\u200b\u200b<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/5&Prime; el_class=\u00a0\u00bbcta-box text-center mb-10&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-6&Prime;]<img decoding=\"async\" class=\"alignnone wp-image-196783 size-thumbnail\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg\" alt=\"Flexible\" width=\"40px\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Planification et d\u00e9ploiement soutenus par les experts CyberArk<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/5&Prime; el_class=\u00a0\u00bbcta-box text-center mb-10&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-6&Prime;]<img decoding=\"async\" class=\"alignnone wp-image-196792 size-thumbnail\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Endpoint.svg\" alt=\"Endpoint\" width=\"40px\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Outils automatiques pour la migration des donn\u00e9es<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/5&Prime; el_class=\u00a0\u00bbcta-box text-center mb-10&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-6&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-201045 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/01\/extend-identity-security-to-endpoints.svg\" alt=\"\u00c9tendre la s\u00e9curit\u00e9 des identit\u00e9s aux endpoints\" width=\"45\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Bilan post-migration et r\u00e9solution des probl\u00e8mes\u200b<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 customer-stories cybv2-pad-top\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/6&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-4&Prime;]<\/p>\n<h3>T\u00e9moignages de clients<\/h3>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-btm\u00a0\u00bb][vc_column][vc_raw_html css=\u00a0\u00bb\u00a0\u00bb]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0iY3VzdG9tZXJfc3RvcnkiIHBvc3RzX3Blcl9wYWdlPSI0IiBjb2x1bW5zX2xhcmdlPSIzIiBzaG93X2F1dGhvcj0iZmFsc2UiIHNob3dfZXhjZXJwdD0iZmFsc2UiIHBvczFfaWQ9IjE4MDAyOSIgcG9zMl9pZD0iMTQwMTMwIiBwb3MzX2lkPSIxMzA0NTYiIHBvczRfaWQ9IjE4ODM2OSJd[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbno-break\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbno-break\u00a0\u00bb]<\/p>\n<h3>Explorer les<br \/>\nressources<br \/>\nconnexes<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/resources\/\">Voir toutes les ressources<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column\u00a0\u00bb][vc_column el_class=\u00a0\u00bbnew_hpstyle_section8_col1&Prime;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00a0\u00bb.vc_custom_1736952768444{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section8_uberflip\u00a0\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1741890917060{background-color: #f7f7f7 !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top hv-cta\u00a0\u00bb el_id=\u00a0\u00bbd\u00e9mo\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb][vc_column_text]<\/p>\n<h1>Demande de d\u00e9monstration de Privileged Access Manager<\/h1>\n<p><\/p>\n<h5>CyberArk offre les solutions les plus compl\u00e8tes pour s\u00e9curiser efficacement les acc\u00e8s \u00e0 privil\u00e8ges dans tous les environnements informatiques. Cette d\u00e9monstration vous montrera comment :<\/h5>\n<p>\n[\/vc_column_text][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]D\u00e9couvrir, int\u00e9grer et g\u00e9rer en toute s\u00e9curit\u00e9 les comptes et les identifiants \u00e0 privil\u00e8ges[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Visualiser l\u2019exp\u00e9rience utilisateur des administrateurs syst\u00e8mes qui mettent en \u0153uvre l\u2019acc\u00e8s natif aux infrastructures Linux\/Unix et Windows[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Examiner les sessions \u00e0 privil\u00e8ges comme le ferait un auditeur \u00e0 l\u2019aide d\u2019enregistrements d\u2019activit\u00e9s et de journaux d\u2019audit centralis\u00e9s[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Explorer les autres solutions de s\u00e9curit\u00e9 des identit\u00e9s pour s\u00e9curiser les acc\u00e8s \u00e0 privil\u00e8ges du personnel, des fournisseurs tiers et des identit\u00e9s machines[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]D\u00e9ployer une approche par \u00e9tapes pour r\u00e9duire le risque de vol d\u2019identifiants \u00e0 privil\u00e8ges[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Isoler et surveiller les sessions critiques gr\u00e2ce \u00e0 la gestion des sessions \u00e0 privil\u00e8ges[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=\u00a0\u00bb1\/12&Prime; css=\u00a0\u00bb.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbright-clmn cybv2-form\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbbold\u00a0\u00bb]<\/p>\n<h4>Inscrivez-vous pour obtenir une d\u00e9mo personnalis\u00e9e<\/h4>\n<p>\n[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iODIzMyIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS90cnktYnV5L3RoYW5rLXlvdS1wcml2aWxlZ2VkLWFjY2Vzcy1tYW5hZ2VyLyJd[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime; offset=\u00a0\u00bbvc_col-md-6&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb] Acc\u00e9l\u00e9rez votre transformation num\u00e9rique Modernisez votre programme PAM gr\u00e2ce \u00e0 la solution PAM en tant que service. D\u00e9ployez nos tout derniers contr\u00f4les de s\u00e9curit\u00e9&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-207002","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Migration vers le PAM en tant que service | CyberArk<\/title>\n<meta name=\"description\" content=\"Renforcez votre programme PAM avec des fonctionnalit\u00e9s de s\u00e9curit\u00e9 de pointe fournies via une solution SaaS.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/pam-saas-migration\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Migration vers le PAM en tant que service\" \/>\n<meta property=\"og:description\" content=\"Renforcez votre programme PAM avec des fonctionnalit\u00e9s de s\u00e9curit\u00e9 de pointe fournies via une solution SaaS.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/pam-saas-migration\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T10:16:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/automation-robot.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/pam-saas-migration\/\",\"url\":\"https:\/\/www.cyberark.com\/pam-saas-migration\/\",\"name\":\"Migration vers le PAM en tant que service | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/pam-saas-migration\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/pam-saas-migration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/automation-robot.svg\",\"datePublished\":\"2025-04-03T09:47:13+00:00\",\"dateModified\":\"2025-04-03T10:16:01+00:00\",\"description\":\"Renforcez votre programme PAM avec des fonctionnalit\u00e9s de s\u00e9curit\u00e9 de pointe fournies via une solution SaaS.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/pam-saas-migration\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/pam-saas-migration\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/pam-saas-migration\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/automation-robot.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/automation-robot.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/pam-saas-migration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Migration vers le PAM en tant que service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Migration vers le PAM en tant que service | CyberArk","description":"Renforcez votre programme PAM avec des fonctionnalit\u00e9s de s\u00e9curit\u00e9 de pointe fournies via une solution SaaS.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/pam-saas-migration\/","og_locale":"fr_FR","og_type":"article","og_title":"Migration vers le PAM en tant que service","og_description":"Renforcez votre programme PAM avec des fonctionnalit\u00e9s de s\u00e9curit\u00e9 de pointe fournies via une solution SaaS.","og_url":"https:\/\/www.cyberark.com\/pam-saas-migration\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-04-03T10:16:01+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/automation-robot.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/pam-saas-migration\/","url":"https:\/\/www.cyberark.com\/pam-saas-migration\/","name":"Migration vers le PAM en tant que service | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/pam-saas-migration\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/pam-saas-migration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/automation-robot.svg","datePublished":"2025-04-03T09:47:13+00:00","dateModified":"2025-04-03T10:16:01+00:00","description":"Renforcez votre programme PAM avec des fonctionnalit\u00e9s de s\u00e9curit\u00e9 de pointe fournies via une solution SaaS.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/pam-saas-migration\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/pam-saas-migration\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/pam-saas-migration\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/automation-robot.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/automation-robot.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/pam-saas-migration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Migration vers le PAM en tant que service"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/207002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=207002"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/207002\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=207002"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=207002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}