{"id":51876,"date":"2019-04-16T15:10:52","date_gmt":"2019-04-16T19:10:52","guid":{"rendered":"https:\/\/www.cyberark.com\/securite-des-environnements-nix\/"},"modified":"2020-07-15T11:46:28","modified_gmt":"2020-07-15T15:46:28","slug":"unixlinux-security","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/solutions\/unixlinux-security\/","title":{"rendered":"S\u00e9curit\u00e9 des environnements *NIX"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbtop\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/security-risk-hero.jpg?id=26750) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero-section\u00a0\u00bb][vc_column][vc_row_inner content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero-header\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-hero-header-text\u00a0\u00bb][vc_custom_heading text=\u00a0\u00bbS\u00c9CURIT\u00c9 DES ENVIRONNEMENTS *NIX\u00a0\u00bb font_container=\u00a0\u00bbtag:h1|text_align:left\u00a0\u00bb use_theme_fonts=\u00a0\u00bbyes\u00a0\u00bb][vc_btn title=\u00a0\u00bbT\u00c9L\u00c9CHARGER LA FICHE PRODUIT\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb#ffffff\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fresource%2Fleast-privilege-server-protection-for-nix%2F|\u00a0\u00bb el_class=\u00a0\u00bbcyb-button xlarge event-click\u00a0\u00bb el_id=\u00a0\u00bb*Nix Security Page: Download Datasheet\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=\u00a0\u00bb.vc_custom_1538259380473{padding-top: 2rem !important;padding-bottom: 2rem !important;}\u00a0\u00bb][vc_column_text]<\/p>\n<h4><strong>S\u00e9curisez les environnements *NIX avec une solution compl\u00e8te et int\u00e9gr\u00e9e<\/strong><\/h4>\n<p>Dans les environnements *NIX, les privil\u00e8ges administratifs ont tendance \u00e0 s\u2019apparenter \u00e0 un \u00e9change du type \u00ab tout ou rien \u00bb. Les utilisateurs des comptes \u00e0 privil\u00e8ges doivent maintenir les syst\u00e8mes critiques en condition op\u00e9rationnelle, mais la mani\u00e8re dont les droits d\u2019acc\u00e8s \u00e0 privil\u00e8ges sont utilis\u00e9s fait l\u2019objet de peu de contr\u00f4le. Dans ce contexte, les entreprises sont souvent contraintes d\u2019accorder des privil\u00e8ges de super-utilisateur permanents, continus et anonymes par d\u00e9faut aux utilisateurs auxquels on peut ou non faire confiance.<\/p>\n<p>Pour r\u00e9duire les risques inh\u00e9rents aux comptes \u00e0 privil\u00e8ges *NIX et la probabilit\u00e9 d\u2019une violation de donn\u00e9es, les entreprises doivent mettre en place, de mani\u00e8re proactive, des contr\u00f4les de s\u00e9curit\u00e9 *NIX qui prot\u00e8gent les comptes, s\u00e9curisent toutes les informations d\u2019identification \u00e0 privil\u00e8ges, y compris les mots de passe et cl\u00e9s SSH utilis\u00e9s par des utilisateurs et des applications, limiter les privil\u00e8ges administratifs aux seules personnes qui en ont besoin et superviser toutes les activit\u00e9s des utilisateurs au cours des sessions \u00e0 privil\u00e8ges.<\/p>\n<p>Pour aider les entreprises \u00e0 s\u00e9curiser les environnements *NIX et \u00e0 r\u00e9pondre aux exigences de contr\u00f4le et de conformit\u00e9, CyberArk propose une solution de s\u00e9curit\u00e9 des comptes \u00e0 privil\u00e8ges de bout en bout, incluant les fonctionnalit\u00e9s suivantes :<\/p>\n<ul>\n<li>D\u00e9couverte compl\u00e8te de tous les comptes \u00e0 privil\u00e8ges *NIX et de toutes les cl\u00e9s SSH<\/li>\n<li>Stockage s\u00e9curis\u00e9, rotation automatique des mots de passe \u00e0 privil\u00e8ges et des cl\u00e9s SSH, et contr\u00f4le des acc\u00e8s \u00e0 ces informations<\/li>\n<li>Remplacement des mots de passe statiques et des cl\u00e9s SSH stock\u00e9es localement, qui sont utilis\u00e9s dans les applications et les scripts, par des informations d\u2019identification dynamiques, stock\u00e9es en toute s\u00e9curit\u00e9<\/li>\n<li>Application du principe des privil\u00e8ges minimaux avec des contr\u00f4les d\u2019acc\u00e8s granulaires pour autoriser les commandes super-utilisateur uniquement lorsqu\u2019elles sont n\u00e9cessaires \u00e0 des fins professionnelles<\/li>\n<li>Supervision et enregistrement en temps r\u00e9el des sessions \u00e0 privil\u00e8ges pour renforcer la s\u00e9curit\u00e9 tout en pr\u00e9servant l\u2019interface que les utilisateurs *NIX pr\u00e9f\u00e8rent : l\u2019invite de commandes<\/li>\n<li>Fonctions d\u2019audit et de reporting qui appliquent le principe de la responsabilit\u00e9 individuelle \u00e0 l\u2019utilisation des comptes administratifs partag\u00e9s<\/li>\n<li>Fonctions de passerelle Active Directory pour l\u2019int\u00e9gration de l\u2019authentification, du provisionnement et du reporting<\/li>\n<li>Analyses comportementales des activit\u00e9s des comptes \u00e0 privil\u00e8ges *NIX, avec d\u00e9tection en temps r\u00e9el des activit\u00e9s anormales<\/li>\n<\/ul>\n<p>Cet ensemble unique de fonctions de s\u00e9curit\u00e9 des comptes \u00e0 privil\u00e8ges *NIX est fourni sur une seule plate-forme int\u00e9gr\u00e9e con\u00e7ue pour s\u00e9curiser tous les comptes \u00e0 privil\u00e8ges, y compris dans les environnements *NIX, Windows et de type Cloud hybride et public. En int\u00e9grant les syst\u00e8mes et les comptes *NIX dans une strat\u00e9gie plus large de s\u00e9curit\u00e9 des comptes \u00e0 privil\u00e8ges, les entreprises b\u00e9n\u00e9ficient d\u2019un certain nombre d\u2019avantages tels que les suivants :<\/p>\n<h3>Principaux avantages<\/h3>\n<ul>\n<li>D\u00e9couverte de tous les comptes \u00e0 privil\u00e8ges *NIX et de toutes les informations d\u2019identification de ces comptes pour identifier l\u2019emplacement des vuln\u00e9rabilit\u00e9s et \u00e9laborer un plan de gestion et de protection programmatiques de l\u2019environnement<\/li>\n<li>R\u00e9duction du risque d\u2019acc\u00e8s non autoris\u00e9 gr\u00e2ce \u00e0 la protection proactive des informations d\u2019identification *NIX, y compris les mots de passe et les cl\u00e9s SSH, sur une seule et m\u00eame plate-forme<\/li>\n<li>Limitation de la port\u00e9e des privil\u00e8ges au strict minimum, afin d\u2019emp\u00eacher les utilisateurs autoris\u00e9s d\u2019ex\u00e9cuter des commandes nuisibles, malintentionn\u00e9es ou non<\/li>\n<li>Journaux d\u2019audit d\u00e9taill\u00e9s et reporting centralis\u00e9 des activit\u00e9s des comptes \u00e0 privil\u00e8ges *NIX, afin de rationaliser les processus d\u2019audit<\/li>\n<li>Possibilit\u00e9 de connecter les comptes *NIX \u00e0 Active Directory pour l\u2019int\u00e9gration de l\u2019authentification et du provisionnement, afin d\u2019am\u00e9liorer l\u2019efficacit\u00e9 de l\u2019administration des comptes *NIX<\/li>\n<li>R\u00e9duction du co\u00fbt total de possession gr\u00e2ce \u00e0 une solution unifi\u00e9e, bas\u00e9e sur des r\u00e8gles, pour la gestion des mots de passe des comptes partag\u00e9s\/comptes logiciels et des privil\u00e8ges super-utilisateur dans les environnements *NIX, ce qui \u00e9limine le besoin d\u2019utiliser deux produits distincts<\/li>\n<li>D\u00e9tection et signalement en temps r\u00e9el des activit\u00e9s anormales des comptes \u00e0 privil\u00e8ges pour r\u00e9duire le risque de r\u00e9ussite des tentatives d\u2019attaque sur les syst\u00e8mes critiques *NIX<\/li>\n<li>Mise en \u0153uvre, extension et gestion d\u2019une solution compl\u00e8te avec une infrastructure partag\u00e9e : <a href=\"https:\/\/www.cyberark.com\/fr\/products\/privileged-account-security-solution\/core-privileged-account-security\/\">CyberArk Privileged Access Security<\/a><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbtop\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/security-risk-hero.jpg?id=26750) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero-section\u00a0\u00bb][vc_column][vc_row_inner content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero-header\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-hero-header-text\u00a0\u00bb][vc_custom_heading text=\u00a0\u00bbS\u00c9CURIT\u00c9 DES ENVIRONNEMENTS *NIX\u00a0\u00bb font_container=\u00a0\u00bbtag:h1|text_align:left\u00a0\u00bb use_theme_fonts=\u00a0\u00bbyes\u00a0\u00bb][vc_btn title=\u00a0\u00bbT\u00c9L\u00c9CHARGER LA FICHE PRODUIT\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb#ffffff\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fresource%2Fleast-privilege-server-protection-for-nix%2F|\u00a0\u00bb el_class=\u00a0\u00bbcyb-button xlarge event-click\u00a0\u00bb el_id=\u00a0\u00bb*Nix&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":51588,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-51876","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>S\u00e9curiser les environnemenst Unix et Linux avec CyberArk Privileged Access<\/title>\n<meta name=\"description\" content=\"CyberArk offre des solutions de s\u00e9curit\u00e9 des comptes \u00e0 privil\u00e8ges de de bout en bout pour aider les organisations \u00e0 s\u00e9curiser les environnements Unix et \u00e0 r\u00e9soudre les probl\u00e8mes d&#039;audit et de conformit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/fr\/solutions\/security-risk-management__trashed\/unixlinux-security\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 des environnements *NIX\" \/>\n<meta property=\"og:description\" content=\"CyberArk offre des solutions de s\u00e9curit\u00e9 des comptes \u00e0 privil\u00e8ges de de bout en bout pour aider les organisations \u00e0 s\u00e9curiser les environnements Unix et \u00e0 r\u00e9soudre les probl\u00e8mes d&#039;audit et de conformit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/fr\/solutions\/security-risk-management__trashed\/unixlinux-security\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-15T15:46:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/security-risk-management__trashed\/unixlinux-security\/\",\"url\":\"https:\/\/www.cyberark.com\/fr\/solutions\/security-risk-management__trashed\/unixlinux-security\/\",\"name\":\"S\u00e9curiser les environnemenst Unix et Linux avec CyberArk Privileged Access\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2019-04-16T19:10:52+00:00\",\"dateModified\":\"2020-07-15T15:46:28+00:00\",\"description\":\"CyberArk offre des solutions de s\u00e9curit\u00e9 des comptes \u00e0 privil\u00e8ges de de bout en bout pour aider les organisations \u00e0 s\u00e9curiser les environnements Unix et \u00e0 r\u00e9soudre les probl\u00e8mes d'audit et de conformit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/security-risk-management__trashed\/unixlinux-security\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/fr\/solutions\/security-risk-management__trashed\/unixlinux-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/security-risk-management__trashed\/unixlinux-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions de s\u00e9curit\u00e9 des identit\u00e9s\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"S\u00e9curit\u00e9 des environnements *NIX\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"S\u00e9curiser les environnemenst Unix et Linux avec CyberArk Privileged Access","description":"CyberArk offre des solutions de s\u00e9curit\u00e9 des comptes \u00e0 privil\u00e8ges de de bout en bout pour aider les organisations \u00e0 s\u00e9curiser les environnements Unix et \u00e0 r\u00e9soudre les probl\u00e8mes d'audit et de conformit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/fr\/solutions\/security-risk-management__trashed\/unixlinux-security\/","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 des environnements *NIX","og_description":"CyberArk offre des solutions de s\u00e9curit\u00e9 des comptes \u00e0 privil\u00e8ges de de bout en bout pour aider les organisations \u00e0 s\u00e9curiser les environnements Unix et \u00e0 r\u00e9soudre les probl\u00e8mes d'audit et de conformit\u00e9.","og_url":"https:\/\/www.cyberark.com\/fr\/solutions\/security-risk-management__trashed\/unixlinux-security\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-07-15T15:46:28+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/fr\/solutions\/security-risk-management__trashed\/unixlinux-security\/","url":"https:\/\/www.cyberark.com\/fr\/solutions\/security-risk-management__trashed\/unixlinux-security\/","name":"S\u00e9curiser les environnemenst Unix et Linux avec CyberArk Privileged Access","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2019-04-16T19:10:52+00:00","dateModified":"2020-07-15T15:46:28+00:00","description":"CyberArk offre des solutions de s\u00e9curit\u00e9 des comptes \u00e0 privil\u00e8ges de de bout en bout pour aider les organisations \u00e0 s\u00e9curiser les environnements Unix et \u00e0 r\u00e9soudre les probl\u00e8mes d'audit et de conformit\u00e9.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/fr\/solutions\/security-risk-management__trashed\/unixlinux-security\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/fr\/solutions\/security-risk-management__trashed\/unixlinux-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/fr\/solutions\/security-risk-management__trashed\/unixlinux-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Solutions de s\u00e9curit\u00e9 des identit\u00e9s","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"S\u00e9curit\u00e9 des environnements *NIX"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51876","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=51876"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51876\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51588"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=51876"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=51876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}