{"id":220652,"date":"2022-02-24T09:30:20","date_gmt":"2022-02-24T14:30:20","guid":{"rendered":"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/"},"modified":"2025-12-17T01:44:56","modified_gmt":"2025-12-17T06:44:56","slug":"redhat","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/partners\/alliance-partners\/redhat\/","title":{"rendered":"RedHat"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-breadcrumb\u00a0\u00bb]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/devsecops-cloud-native-apps\/\">Retour \u00e0 S\u00e9curiser les pipelines DevOps et les applications cloud natives<\/a>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h1>S\u00e9curit\u00e9 des applications et automatisation avec Red Hat<\/h1>\n<p><\/p>\n<h2>Automatisez et s\u00e9curisez vos pipelines DevOps en d\u00e9pla\u00e7ant la s\u00e9curit\u00e9 vers la gauche. D\u00e9couvrez comment CyberArk fonctionne en \u00e9troite collaboration avec les plateformes Red Hat Ansible et OpenShift.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbLire maintenant\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fsolution-briefs%2Fsecrets-management-for-red-hat-openshift-and-ansible-automation-platforms|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/cyberark.com\/resources\/conjur-secrets-manager-enterprise\/securing-red-hat-openshift-containerized-applications-at-enterprise-scale\">Voir le webinaire<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2&Prime;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_x32kb5ua7z videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-hz\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>D\u00e9placement vers la gauche et s\u00e9curisation DevOps<\/h3>\n<p>CyberArk et Red Hat collaborent en permanence \u00e0 l&rsquo;\u00e9laboration de solutions communes visant \u00e0 rendre DevOps plus s\u00fbr et plus agile. Notre objectif commun est de s\u00e9curiser le <a href=\"https:\/\/www.cyberark.com\/what-is\/ci-cd-pipeline\/\">pipeline CI\/CD<\/a> en soutenant le mouvement \u00ab Shift Left \u00bb (d\u00e9placement vers la gauche) et en proposant des approches plus s\u00fbres d\u00e8s le d\u00e9but du cycle DevOps.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-126167\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/webinar-video-icon.svg\" alt=\"Video Icon\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1701168586157{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Aider les \u00e9quipes de d\u00e9veloppement \u00e0 se concentrer sur la s\u00e9curit\u00e9 en amont<\/h4>\n<p>\u00c9coutez les strat\u00e8ges de CyberArk et Red Hat discuter du d\u00e9placement de la s\u00e9curit\u00e9 vers la gauche.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/red-hat-cyberark\/helping-development-and-security-teams-collaborate-to-shift-security-left\" rel=\"noopener\">Voir la vid\u00e9o<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-125342\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/lock-arrows-icon.svg\" alt=\"Container and Cluster Security\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1701168595323{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>S\u00e9curisation des conteneurs et des clusters<\/h4>\n<p>D\u00e9couvrez comment CyberArk et Red Hat centralisent et automatisent la gestion des secrets.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/red-hat-cyberark\/simplify-cluster-security-at-scale-centralized-secrets-management-across-hybrid-multicloud-environments\">Lire le livre blanc<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-125350\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/vault-icon.svg\" alt=\"DevOps Secrets Management\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1701168617679{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Gestion compl\u00e8te des secrets DevOps<\/h4>\n<p>Am\u00e9liorez la s\u00e9curit\u00e9 DevOps et des conteneurs gr\u00e2ce \u00e0 l&rsquo;int\u00e9gration de CyberArk avec Red Hat.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/red-hat-cyberark\/secrets-management-for-red-hat-openshift-and-ansible-automation-platforms\">Lire la pr\u00e9sentation des solutions<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-126268\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/roadmap-icon.svg\" alt=\"Technology Roadmap icon\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1701168637546{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Feuille de route technologique commune<\/h4>\n<p>D\u00e9couvrez les \u00e9tapes pratiques de mise en \u0153uvre pour am\u00e9liorer votre posture DevSecOps.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/red-hat-cyberark\/secrets-management-roadmap-for-red-hat-openshift-with-cyberark\">Acc\u00e9der \u00e0 la feuille de route<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2-pad cybv2 cybv2-background-oval tour\u00a0\u00bb][vc_column][vc_row_inner el_class=\u00a0\u00bbcyb-center\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-pad-btm\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbleft-mobile\u00a0\u00bb]<\/p>\n<h3>D\u00e9couvrez notre relation commune<\/h3>\n<p>D\u00e9couvrez comment vous pouvez tirer parti de notre collaboration et de nos int\u00e9grations.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=\u00a0\u00bbsquare\u00a0\u00bb active_section=\u00a0\u00bb1&Prime; css_animation=\u00a0\u00bbnone\u00a0\u00bb][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbInt\u00e9grations avec Ansible\u00a0\u00bb tab_id=\u00a0\u00bbansible\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Int\u00e9grations avec Ansible<\/h4>\n<p>CyberArk s&rsquo;int\u00e8gre \u00e0 Red Hat Ansible Automation pour offrir aux organisations une gestion simplifi\u00e9e et automatis\u00e9e des secrets, notamment gr\u00e2ce \u00e0 des int\u00e9grations avec CyberArk Conjur Secrets Manager Enterprise, CyberArk Conjur Secrets Manager Open Source et Credential Providers.<br \/> [\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/solution-briefs\/secrets-management-for-red-hat-openshift-and-ansible-automation-platforms\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-126300\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-1.png\" alt=\"Red Hat Ansible\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbInt\u00e9grations avec OpenShift\u00a0\u00bb tab_id=\u00a0\u00bbopenshift\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Int\u00e9grations avec OpenShift<\/h4>\n<p>CyberArk et Red Hat simplifient et renforcent la s\u00e9curit\u00e9 des conteneurs en prot\u00e9geant les secrets des applications ex\u00e9cut\u00e9es dans OpenShift. Ensemble, CyberArk et Red Hat peuvent aider les \u00e9quipes \u00e0 d\u00e9ployer plus facilement et en toute s\u00e9curit\u00e9 des applications \u00e0 grande \u00e9chelle.<br \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/blog\/ramp-up-container-security-with-red-hat-openshift-and-cyberark\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-126292\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-2.png\" alt=\"Red Hat OpenShift\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbRed Hat et CyberArk Conjur Secrets Manager\u00a0\u00bb tab_id=\u00a0\u00bbconjur\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Red Hat et CyberArk Conjur Secrets Manager<\/h4>\n<p>CyberArk Conjur s&rsquo;int\u00e8gre \u00e0 Ansible pour automatiser la protection des secrets tout au long du pipeline DevOps. L&rsquo;int\u00e9gration de CyberArk Conjur \u00e0 Ansible permet aux \u00e9quipes DevOps et de s\u00e9curit\u00e9 de s\u00e9curiser et de g\u00e9rer automatiquement les secrets utilis\u00e9s par les outils CI\/CD.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.ansible.com\/integrations\/devops-tools\/cyberark\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-126284\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-3.png\" alt=\"Ansible Integrations\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbTravail d&#039;int\u00e9gration conjoint\u00a0\u00bb tab_id=\u00a0\u00bbjoint\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Travail d&rsquo;int\u00e9gration conjoint<\/h4>\n<p>Consultez notre catalogue d&rsquo;int\u00e9grations conjointes CyberArk\/Red Hat sur les plateformes Conjur, Ansible et OpenShift.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/cyberark.my.site.com\/mplace\/s\/#--red+hat\" target=\"_blank\" rel=\"noopener\">Consulter le catalogue<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-126276\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-4.png\" alt=\"CyberArk and Red Hat Integrations\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-4.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-4-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-4-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1615402724220{background-color: #f7f7f7 !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top stckd-cllt flex-column-reverse flex-lg-row\u00a0\u00bb][vc_column el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb offset=\u00a0\u00bbvc_col-md-5&Prime;][vc_column_text el_class=\u00a0\u00bbhead-box\u00a0\u00bb]<\/p>\n<h3>Compagnie d&rsquo;assurance de premier plan<\/h3>\n<p><\/p>\n<p class=\"cyb-quote\">\u00ab Nous avons appr\u00e9ci\u00e9 la facilit\u00e9 avec laquelle il \u00e9tait possible de g\u00e9rer les secrets sur Red Hat OpenShift \u00e0 l&rsquo;aide de la plateforme de gestion des secrets de CyberArk. \u00bb<\/p>\n<p>~ Grande compagnie d&rsquo;assurance nord-am\u00e9ricaine[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/case-studies\/case-study-leading-insurance-company-leverages-secrets-management-for-containerized-applications\">Lire l&rsquo;\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column el_class=\u00a0\u00bbright-clmn\u00a0\u00bb offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_single_image image=\u00a0\u00bb126308&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb el_class=\u00a0\u00bb.border-shadow\u00a0\u00bb][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top featured-integrations\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbbox-heading\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Int\u00e9grations et catalogues pr\u00e9sent\u00e9s<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/catalog.redhat.com\/partners\/detail\/452dabf9cf1211ed8b8702e289077cf5\" target=\"_blank\" rel=\"noopener\">Catalogue des partenaires Red Hat<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/cyberark.my.site.com\/mplace\/s\/#--red+hat\" rel=\"noopener\">Catalogue des partenaires CyberArk<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb column_link=\u00a0\u00bburl:https%3A%2F%2Fcyberark-customers.force.com%2Fmplace%2Fs%2F%23a3550000000EiaKAAS-a3950000000jjcSAAQ|target:_blank|\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-126226\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/integrations-aws-console-access.jpg\" alt=\"Secure temporary console access with AWS Secure Token Service (STS)\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/integrations-aws-console-access.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/integrations-aws-console-access-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/integrations-aws-console-access-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbtiny\u00a0\u00bb]<\/p>\n<h4>Int\u00e9gration du fournisseur d&rsquo;acc\u00e8s dynamique Red Hat OpenShift<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/cyberark.my.site.com\/mplace\/s\/#a3550000000EiaKAAS-a3950000000jjcSAAQ\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb column_link=\u00a0\u00bburl:https%3A%2F%2Fcyberark-customers.force.com%2Fmplace%2Fs%2F%23a352J000000pdrvQAA-a392J000001h4NsQAI|target:_blank|\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-126037\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/redhat-test-img-742w.jpeg\" alt=\"Red Hat Ansible\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/redhat-test-img-742w.jpeg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/redhat-test-img-742w-300x122.jpeg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/redhat-test-img-742w-150x61.jpeg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbtiny\u00a0\u00bb]<\/p>\n<h4>Int\u00e9gration Red Hat Ansible automatisation de la s\u00e9curit\u00e9 ansible<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/cyberark.my.site.com\/mplace\/s\/#a352J000000pdrvQAA-a392J000001h4NsQAI\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb column_link=\u00a0\u00bburl:https%3A%2F%2Fcyberark-customers.force.com%2Fmplace%2Fs%2F%23a3550000000EmKcAAK-a3950000000jjz7AAA|target:_blank|\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-126242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/integrations-console-access-for-root.jpg\" alt=\"Create secure sessions to Amazon Web Services (AWS) for the root account.\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/integrations-console-access-for-root.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/integrations-console-access-for-root-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/integrations-console-access-for-root-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbtiny\u00a0\u00bb]<\/p>\n<h4>Red Hat OpenShift Conjur Open Source<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/cyberark.my.site.com\/mplace\/s\/#a3550000000EmKcAAK-a3950000000jjz7AAA\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb column_link=\u00a0\u00bburl:https%3A%2F%2Fcyberark-customers.force.com%2Fmplace%2Fs%2F%23a3550000000EiCDAA0-a3950000000jjUnAAI|\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-126037\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/redhat-test-img-742w.jpeg\" alt=\"Red Hat Ansible\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/redhat-test-img-742w.jpeg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/redhat-test-img-742w-300x122.jpeg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/redhat-test-img-742w-150x61.jpeg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbtiny\u00a0\u00bb]<\/p>\n<h4>Int\u00e9gration de Red Hat Ansible Secrets Manager<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/cyberark.my.site.com\/mplace\/s\/#a3550000000EiCDAA0-a3950000000jjUnAAI\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1615402724220{background-color: #f7f7f7 !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top stckd-cllt flex-column-reverse flex-lg-row\u00a0\u00bb][vc_column el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb offset=\u00a0\u00bbvc_col-md-5&Prime;][vc_column_text el_class=\u00a0\u00bbhead-box\u00a0\u00bb]<\/p>\n<p class=\"cyb-quote\">CyberArk est un partenaire pr\u00e9cieux pour Red Hat, et nous sommes ravis de lui d\u00e9cerner ce prix bien m\u00e9rit\u00e9. Nous nous r\u00e9jouissons de poursuivre notre collaboration avec CyberArk et de l&rsquo;aider \u00e0 fournir les meilleures solutions de s\u00e9curit\u00e9 \u00e0 nos clients communs qui utilisent la technologie open source Red Hat.<\/p>\n<p>~ Chris Gray, Vice President, Alliances strat\u00e9giques Am\u00e9rique du Nord, Red Hat[\/vc_column_text][\/vc_column][vc_column el_class=\u00a0\u00bbright-clmn\u00a0\u00bb offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_single_image image=\u00a0\u00bb127527&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb el_class=\u00a0\u00bb.border-shadow\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cyberark-blueprint dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section3_h4&Prime;]<\/p>\n<h3>Transformez votre gestion des identit\u00e9s<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section3_text\u00a0\u00bb]<\/p>\n<h4>CyberArk et Red Hat s&rsquo;associent pour un podcast et discutent de la mani\u00e8re de distinguer les utilisateurs l\u00e9gitimes des intrus potentiels.<\/h4>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_btn title=\u00a0\u00bb\u00c9couter maintenant\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb align=\u00a0\u00bbright\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.redhat.com%2Fen%2Fcode-comments-podcast%2Fseason-3%2Fcyberark|title:%C3%89couter%20maintenant|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime;][vc_column_text el_class=\u00a0\u00bbno-break\u00a0\u00bb]<\/p>\n<h3>Actualit\u00e9s et ressources en vedette<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/resources\/\">Voir toutes les ressources<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip\u00a0\u00bb][vc_column el_class=\u00a0\u00bbnew_hpstyle_section8_col1&Prime;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00a0\u00bb.vc_custom_1721289726635{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section8_uberflip\u00a0\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-breadcrumb\u00a0\u00bb]Retour \u00e0 S\u00e9curiser les pipelines DevOps et les applications cloud natives[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb] S\u00e9curit\u00e9 des applications et automatisation avec Red Hat Automatisez et s\u00e9curisez vos pipelines DevOps en d\u00e9pla\u00e7ant la&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":73624,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-220652","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>S\u00e9curit\u00e9 des applications et automatisation - CyberArk et Red Hat | CyberArk<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez comment CyberArk et RedHat automatisent et s\u00e9curisent les pipelines CI\/CD en d\u00e9pla\u00e7ant la s\u00e9curit\u00e9 vers la gauche et en proposant des approches plus s\u00e9curis\u00e9es d\u00e8s le d\u00e9but du cycle DevOps.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RedHat\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez comment CyberArk et RedHat automatisent et s\u00e9curisent les pipelines CI\/CD en d\u00e9pla\u00e7ant la s\u00e9curit\u00e9 vers la gauche et en proposant des approches plus s\u00e9curis\u00e9es d\u00e8s le d\u00e9but du cycle DevOps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-17T06:44:56+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/\",\"url\":\"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/\",\"name\":\"S\u00e9curit\u00e9 des applications et automatisation - CyberArk et Red Hat | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/webinar-video-icon.svg\",\"datePublished\":\"2022-02-24T14:30:20+00:00\",\"dateModified\":\"2025-12-17T06:44:56+00:00\",\"description\":\"D\u00e9couvrez comment CyberArk et RedHat automatisent et s\u00e9curisent les pipelines CI\/CD en d\u00e9pla\u00e7ant la s\u00e9curit\u00e9 vers la gauche et en proposant des approches plus s\u00e9curis\u00e9es d\u00e8s le d\u00e9but du cycle DevOps.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/webinar-video-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/webinar-video-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Partenaires\",\"item\":\"https:\/\/www.cyberark.com\/fr\/partners\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Partenaire Alliance\",\"item\":\"https:\/\/www.cyberark.com\/partners\/alliance-partners\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"RedHat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 des applications et automatisation - CyberArk et Red Hat | CyberArk","description":"D\u00e9couvrez comment CyberArk et RedHat automatisent et s\u00e9curisent les pipelines CI\/CD en d\u00e9pla\u00e7ant la s\u00e9curit\u00e9 vers la gauche et en proposant des approches plus s\u00e9curis\u00e9es d\u00e8s le d\u00e9but du cycle DevOps.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/","og_locale":"fr_FR","og_type":"article","og_title":"RedHat","og_description":"D\u00e9couvrez comment CyberArk et RedHat automatisent et s\u00e9curisent les pipelines CI\/CD en d\u00e9pla\u00e7ant la s\u00e9curit\u00e9 vers la gauche et en proposant des approches plus s\u00e9curis\u00e9es d\u00e8s le d\u00e9but du cycle DevOps.","og_url":"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-12-17T06:44:56+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/","url":"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/","name":"S\u00e9curit\u00e9 des applications et automatisation - CyberArk et Red Hat | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/webinar-video-icon.svg","datePublished":"2022-02-24T14:30:20+00:00","dateModified":"2025-12-17T06:44:56+00:00","description":"D\u00e9couvrez comment CyberArk et RedHat automatisent et s\u00e9curisent les pipelines CI\/CD en d\u00e9pla\u00e7ant la s\u00e9curit\u00e9 vers la gauche et en proposant des approches plus s\u00e9curis\u00e9es d\u00e8s le d\u00e9but du cycle DevOps.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/webinar-video-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/webinar-video-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Partenaires","item":"https:\/\/www.cyberark.com\/fr\/partners\/"},{"@type":"ListItem","position":3,"name":"Partenaire Alliance","item":"https:\/\/www.cyberark.com\/partners\/alliance-partners\/"},{"@type":"ListItem","position":4,"name":"RedHat"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/220652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=220652"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/220652\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/73624"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=220652"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=220652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}