{"id":207678,"date":"2025-04-09T18:15:43","date_gmt":"2025-04-09T22:15:43","guid":{"rendered":"https:\/\/www.cyberark.com\/privileged-access-management-analyst-reports\/"},"modified":"2025-06-24T00:58:23","modified_gmt":"2025-06-24T04:58:23","slug":"privileged-access-management-analyst-reports","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/privileged-access-management-analyst-reports\/","title":{"rendered":"Rapports d\u2019analyse PAM"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 dark hero\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1710879306471{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbmb-8&Prime;]<\/p>\n<h1 style=\"font-size: 60px;\">Votre s\u00e9rie de rapports sur l&rsquo;excellence en gestion moderne des acc\u00e8s privil\u00e9gi\u00e9s<\/h1>\n<h2>Avec CyberArk, expert reconnu de la gestion des acc\u00e8s \u00e0 privil\u00e8ges<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbT\u00e9l\u00e9charger les 4 rapports\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:%23form|title:T%C3%A9l%C3%A9charger%20le%20rapport|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1745600041224{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/reports-hero.png?id=208794) !important;}\u00a0\u00bb offset=\u00a0\u00bbvc_hidden-xs\u00a0\u00bb][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html css=\u00a0\u00bb\u00a0\u00bb]PGEgY2xhc3M9ImFuY2hvciIgbmFtZT0iZm9ybSI+PC9hPg==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1743010410664{background-color: #FFFFFF !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top hv-cta\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]CyberArk est mis \u00e0 l\u2019honneur dans les rapports d\u2019analystes les plus respect\u00e9s du secteur, ce qui refl\u00e8te notre position sur le march\u00e9 PAM. Les rapports de Gartner, de Forrester et de KuppingerCole fournissent un contexte pr\u00e9cieux \u00e0 ce que nous consid\u00e9rons comme un engagement in\u00e9branlable envers la s\u00e9curit\u00e9 et l\u2019innovation. D\u00e9couvrez plus en d\u00e9tail le livre blanc Business Value d\u2019IDC pour tout savoir sur le retour sur investissement de notre plateforme.<\/p>\n<p><strong>Gartner\u00ae Magic Quadrant\u2122 pour la gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM) :<\/strong> D\u00e9couvrez le Magic Quadrant 2024 pour la gestion des acc\u00e8s \u00e0 privil\u00e8ges et apprenez pourquoi CyberArk a \u00e9t\u00e9 nomm\u00e9 leader. <strong>The Forrester Wave\u2122 :<\/strong> Gestion des identit\u00e9s \u00e0 privil\u00e8ges : Plongez dans le rapport The Forrester Wave pour d\u00e9couvrir en quoi CyberArk constitue un pilier du PAM depuis plus de 20 ans. <strong>Leadership Compass de KuppingerCole Analysts sur la gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM) :<\/strong> D\u00e9couvrez nos points forts dans ce rapport Leadership Compass qui souligne l\u2019approche innovante et ax\u00e9e sur la s\u00e9curit\u00e9 de CyberArk en mati\u00e8re de gestion des acc\u00e8s \u00e0 privil\u00e8ges. <strong>La valeur commerciale de CyberArk :<\/strong> Consultez le livre blanc d\u2019IDC sur la valeur commerciale apport\u00e9e par CyberArk pour en savoir plus sur les avantages tangibles et le retour sur investissement de la plateforme.<\/p>\n<p>T\u00e9l\u00e9chargez la collection de 4 rapports d\u2019analyse donnant des informations sur nos comp\u00e9tences cl\u00e9s et la valeur que nous apportons sur le long terme. Dotez-vous des connaissances n\u00e9cessaires pour prendre des d\u00e9cisions \u00e9clair\u00e9es et prot\u00e9ger vos actifs les plus critiques.[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbtiny\u00a0\u00bb]<em>Gartner\u00ae Magic Quadrant\u2122 pour la gestion des acc\u00e8s \u00e0 privil\u00e8ges, par Abhyuday Data, Michael Kelley, Nayara Sangiorgio, Felix Gaehtgens, Paul Mezzera, 9 septembre 2024 The Forrester Wave\u2122 : Privileged Identity Manager, T4 2023 par Geoff Cairns, 11 octobre 2023 KuppingerCole Analysts, \u00ab Leadership Compass for Privileged Access Manager \u00bb, 7 octobre 2024 par Paul Fisher Livre blanc IDC, sponsoris\u00e9 par CyberArk, La valeur commerciale de CyberArk, IDC #US52652224, novembre 2024\u00a0<\/em><\/p>\n<p>*GARTNER est une marque d\u00e9pos\u00e9e et une marque de service de Gartner, Inc. et\/ou de ses filiales aux \u00c9tats-Unis et dans le monde entier, MAGIC QUADRANT est une marque d\u00e9pos\u00e9e de Gartner, Inc. et\/ou de ses filiales et est utilis\u00e9e ici avec leur permission. Tous droits r\u00e9serv\u00e9s. Gartner n\u2019approuve aucun fournisseur, produit ou service repr\u00e9sent\u00e9 dans ses publications de recherche et ne conseille pas aux utilisateurs de technologies de s\u00e9lectionner uniquement les fournisseurs ayant obtenu les meilleurs classements ou une autre d\u00e9signation. Les publications de recherche de Gartner se composent des opinions de l\u2019organisme de recherche de Gartner et ne doivent pas \u00eatre interpr\u00e9t\u00e9es comme des d\u00e9clarations de fait. Gartner d\u00e9cline toute garantie, expresse ou implicite, concernant cette \u00e9tude, y compris toute garantie de qualit\u00e9 marchande ou d\u2019ad\u00e9quation \u00e0 un usage particulier. Forrester n\u2019approuve aucune entreprise, aucun produit, aucune marque ou aucun service inclus dans ses publications de recherche et ne conseille \u00e0 personne de s\u00e9lectionner les produits ou services d\u2019une entreprise ou d\u2019une marque en fonction des notes incluses dans ces publications. Les informations sont bas\u00e9es sur les meilleures ressources disponibles. Les opinions refl\u00e8tent le jugement \u00e0 un moment donn\u00e9 et sont susceptibles de changer. Pour plus d\u2019informations, lisez l\u2019article sur l\u2019objectivit\u00e9 de Forrester ici.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/12&Prime; css=\u00a0\u00bb.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbright-clmn cybv2-form\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbbold\u00a0\u00bb]<\/p>\n<h4>S\u2019inscrire<\/h4>\n<p>[\/vc_column_text][vc_raw_html css=\u00a0\u00bb\u00a0\u00bb]W21hcmtldG9fZm9ybSBpZD0iMTMyODciIHR5X3BhZ2VfdXJsPSJodHRwczovL3d3dy5jeWJlcmFyay5jb20vZnIvdGhhbmsteW91LXByaXZpbGVnZWQtYWNjZXNzLW1hbmFnZW1lbnQtYW5hbHlzdC1yZXBvcnRzLyJd[\/vc_raw_html][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad content-callout-resource electric-cyan\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbimg-box\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1737656757400{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/01\/city-overhead-view.jpg?id=201829) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcontent-column\u00a0\u00bb][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb width=\u00a0\u00bb5\/6&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h3>Demandez une d\u00e9monstration gratuite<\/h3>\n<p>D\u00e9couvrez CyberArk Privileged Access Manager[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_btn title=\u00a0\u00bbDemander une d\u00e9mo\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1744236919911{margin-left: 30px !important;}\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Ftry-buy%2Fprivileged-access-manager-demo%2F|title:nous%20contacter|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 dark hero\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1710879306471{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbmb-8&Prime;] Votre s\u00e9rie de rapports sur l&rsquo;excellence en gestion moderne des acc\u00e8s privil\u00e9gi\u00e9s Avec CyberArk, expert reconnu de&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-207678","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Rapports d\u2019analyse PAM | CyberArk<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez pourquoi les entreprises font confiance \u00e0 la plateforme PAM de CyberArk pour s\u00e9curiser et g\u00e9rer les identit\u00e9s et les acc\u00e8s, r\u00e9duire les risques et garantir la conformit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/fr\/privileged-access-management-analyst-reports\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rapports d\u2019analyse PAM\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez pourquoi les entreprises font confiance \u00e0 la plateforme PAM de CyberArk pour s\u00e9curiser et g\u00e9rer les identit\u00e9s et les acc\u00e8s, r\u00e9duire les risques et garantir la conformit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/fr\/privileged-access-management-analyst-reports\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-24T04:58:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/privileged-access-management-analyst-reports\/\",\"url\":\"https:\/\/www.cyberark.com\/fr\/privileged-access-management-analyst-reports\/\",\"name\":\"Rapports d\u2019analyse PAM | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\"},\"datePublished\":\"2025-04-09T22:15:43+00:00\",\"dateModified\":\"2025-06-24T04:58:23+00:00\",\"description\":\"D\u00e9couvrez pourquoi les entreprises font confiance \u00e0 la plateforme PAM de CyberArk pour s\u00e9curiser et g\u00e9rer les identit\u00e9s et les acc\u00e8s, r\u00e9duire les risques et garantir la conformit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/privileged-access-management-analyst-reports\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/fr\/privileged-access-management-analyst-reports\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/privileged-access-management-analyst-reports\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rapports d\u2019analyse PAM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Rapports d\u2019analyse PAM | CyberArk","description":"D\u00e9couvrez pourquoi les entreprises font confiance \u00e0 la plateforme PAM de CyberArk pour s\u00e9curiser et g\u00e9rer les identit\u00e9s et les acc\u00e8s, r\u00e9duire les risques et garantir la conformit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/fr\/privileged-access-management-analyst-reports\/","og_locale":"fr_FR","og_type":"article","og_title":"Rapports d\u2019analyse PAM","og_description":"D\u00e9couvrez pourquoi les entreprises font confiance \u00e0 la plateforme PAM de CyberArk pour s\u00e9curiser et g\u00e9rer les identit\u00e9s et les acc\u00e8s, r\u00e9duire les risques et garantir la conformit\u00e9.","og_url":"https:\/\/www.cyberark.com\/fr\/privileged-access-management-analyst-reports\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-06-24T04:58:23+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/fr\/privileged-access-management-analyst-reports\/","url":"https:\/\/www.cyberark.com\/fr\/privileged-access-management-analyst-reports\/","name":"Rapports d\u2019analyse PAM | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/fr\/#website"},"datePublished":"2025-04-09T22:15:43+00:00","dateModified":"2025-06-24T04:58:23+00:00","description":"D\u00e9couvrez pourquoi les entreprises font confiance \u00e0 la plateforme PAM de CyberArk pour s\u00e9curiser et g\u00e9rer les identit\u00e9s et les acc\u00e8s, r\u00e9duire les risques et garantir la conformit\u00e9.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/fr\/privileged-access-management-analyst-reports\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/fr\/privileged-access-management-analyst-reports\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/fr\/privileged-access-management-analyst-reports\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Rapports d\u2019analyse PAM"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/fr\/#website","url":"https:\/\/www.cyberark.com\/fr\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/fr\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/207678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=207678"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/207678\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=207678"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=207678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}