{"id":51614,"date":"2019-04-16T13:30:28","date_gmt":"2019-04-16T17:30:28","guid":{"rendered":"https:\/\/www.cyberark.com\/logiciel-en-tant-que-service-endpoint-privilege-manager\/"},"modified":"2024-10-25T14:34:37","modified_gmt":"2024-10-25T18:34:37","slug":"login","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/","title":{"rendered":"Logiciel en tant que service Endpoint Privilege Manager"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text]<\/p>\n<h1>Logiciel en tant que service Endpoint Privilege Manager<\/h1>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad text-md-center\u00a0\u00bb][vc_column][vc_column_text]<\/p>\n<h3>En quoi consiste ce service\u202f?<\/h3>\n<p>Le service CyberArk Endpoint\u00a0Privilege\u00a0Manager h\u00e9berg\u00e9 par CyberArk l\u00e8ve les obstacles \u00e0 l\u2019application du principe des privil\u00e8ges minimaux et permet aux entreprises de bloquer et de neutraliser les attaques sur les terminaux pour r\u00e9duire le risque de vol de donn\u00e9es ou d\u2019extorsion par chiffrement et prise en otage de donn\u00e9es. Une combinaison de fonctions de s\u00e9curit\u00e9 des privil\u00e8ges, de contr\u00f4le des applications et de pr\u00e9vention du vol d\u2019informations d\u2019identification r\u00e9duit le risque d\u2019infection par des programmes malveillants.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top office-details\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1637767072712{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/6&Prime; el_class=\u00a0\u00bbtext-md-center heading\u00a0\u00bb offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-sm-offset-1&Prime;][vc_column_text]<\/p>\n<h3>Vous avez d\u00e9j\u00e0 un compte SAAS Endpoint Privilege Manager?<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-107301\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg\" alt=\"icon circle\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>\u00c9tats Unis<\/h4>\n<p><a target=\"_blank\" href=\"https:\/\/login.epm.cyberark.com\/login\" rel=\"noopener\">Le Signe<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-107301\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg\" alt=\"icon circle\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Australie<\/h4>\n<p><a target=\"_blank\" href=\"https:\/\/au.epm.cyberark.com\/\" rel=\"noopener\">Le Signe<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-107301\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg\" alt=\"icon circle\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Canada<\/h4>\n<p><a href=\"https:\/\/ca.epm.cyberark.com\/\" target=\"_blank\" rel=\"noopener\">Le Signe<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-107301\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg\" alt=\"icon circle\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Angleterre<\/h4>\n<p><a href=\"https:\/\/uk.epm.cyberark.com\/\" target=\"_blank\" rel=\"noopener\">Le Signe<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-107301\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg\" alt=\"icon circle\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Allemagne<\/h4>\n<p><a href=\"https:\/\/eu.epm.cyberark.com\/\" target=\"_blank\" rel=\"noopener\">Le Signe<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-107301\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg\" alt=\"icon circle\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Inde<\/h4>\n<p><a href=\"https:\/\/in.epm.cyberark.com\/\" target=\"_blank\" rel=\"noopener\">Le Signe<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-107301\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg\" alt=\"icon circle\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Italie<\/h4>\n<p><a href=\"https:\/\/it.epm.cyberark.com\" target=\"_blank\" rel=\"noopener\">Le Signe<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-107301\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg\" alt=\"icon circle\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Japon<\/h4>\n<p><a href=\"https:\/\/jp.epm.cyberark.com\/\" target=\"_blank\" rel=\"noopener\">Le Signe<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-107301\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg\" alt=\"icon circle\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Singapour<\/h4>\n<p><a href=\"https:\/\/sg.epm.cyberark.com\/\" target=\"_blank\" rel=\"noopener\">Le Signe<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-107301\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg\" alt=\"icon circle\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>Suisse<\/h4>\n<p><a href=\"https:\/\/ch.epm.cyberark.com\/\" target=\"_blank\" rel=\"noopener\">Le Signe<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-107301\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg\" alt=\"icon circle\" width=\"94\" height=\"81\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4>\u00c9mirats Arabes Unis<\/h4>\n<p><a href=\"https:\/\/ae.epm.cyberark.com\" target=\"_blank\" rel=\"noopener\">Le Signe<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_talk_to_an_expert\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608677118624{background-color: #061b2b !important;}\u00a0\u00bb][vc_column][vc_column_text el_class=\u00a0\u00bbextra-space\u00a0\u00bb]<\/p>\n<h2 style=\"text-align: center;\">Essai gratuit<\/h2>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section9_text\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\">Vous souhaitez tester CyberArk Endpoint Privilege Manager ?<\/p>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbS\u2019Inscrire Pour Un Essai\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb align=\u00a0\u00bbcenter\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Ftry-buy%2Fendpoint-privilege-manager-trial%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid cyb-button-hpstyle_section5&Prime;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text] Logiciel en tant que service Endpoint Privilege Manager [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad text-md-center\u00a0\u00bb][vc_column][vc_column_text] En quoi consiste ce service\u202f? Le service CyberArk Endpoint\u00a0Privilege\u00a0Manager h\u00e9berg\u00e9 par CyberArk l\u00e8ve les obstacles \u00e0&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":115287,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27775],"class_list":["post-51614","page","type-page","status-publish","hentry","product_category-epm"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Endpoint Privilege Manager\u00a0: Endpoint PAM SaaS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Logiciel en tant que service Endpoint Privilege Manager\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text] Logiciel en tant que service Endpoint Privilege Manager [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad text-md-center\u00a0\u00bb][vc_column][vc_column_text] En quoi consiste ce service\u202f? Le service CyberArk Endpoint\u00a0Privilege\u00a0Manager h\u00e9berg\u00e9 par CyberArk l\u00e8ve les obstacles \u00e0...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-25T18:34:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/\",\"url\":\"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/\",\"name\":\"Endpoint Privilege Manager\u00a0: Endpoint PAM SaaS\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg\",\"datePublished\":\"2019-04-16T17:30:28+00:00\",\"dateModified\":\"2024-10-25T18:34:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produits\",\"item\":\"https:\/\/www.cyberark.com\/fr\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Endpoint Privilege Manager\",\"item\":\"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Logiciel en tant que service Endpoint Privilege Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Endpoint Privilege Manager\u00a0: Endpoint PAM SaaS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/","og_locale":"fr_FR","og_type":"article","og_title":"Logiciel en tant que service Endpoint Privilege Manager","og_description":"[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text] Logiciel en tant que service Endpoint Privilege Manager [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad text-md-center\u00a0\u00bb][vc_column][vc_column_text] En quoi consiste ce service\u202f? Le service CyberArk Endpoint\u00a0Privilege\u00a0Manager h\u00e9berg\u00e9 par CyberArk l\u00e8ve les obstacles \u00e0...","og_url":"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2024-10-25T18:34:37+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/","url":"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/","name":"Endpoint Privilege Manager\u00a0: Endpoint PAM SaaS","isPartOf":{"@id":"https:\/\/www.cyberark.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg","datePublished":"2019-04-16T17:30:28+00:00","dateModified":"2024-10-25T18:34:37+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-manual.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/login\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Produits","item":"https:\/\/www.cyberark.com\/fr\/products\/"},{"@type":"ListItem","position":3,"name":"Endpoint Privilege Manager","item":"https:\/\/www.cyberark.com\/fr\/products\/endpoint-privilege-manager\/"},{"@type":"ListItem","position":4,"name":"Logiciel en tant que service Endpoint Privilege Manager"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/fr\/#website","url":"https:\/\/www.cyberark.com\/fr\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/fr\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=51614"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51614\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/115287"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=51614"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=51614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}