{"id":51930,"date":"2019-04-16T17:10:41","date_gmt":"2019-04-16T21:10:41","guid":{"rendered":"https:\/\/www.cyberark.com\/audit-et-reporting-it\/"},"modified":"2020-07-22T15:16:55","modified_gmt":"2020-07-22T19:16:55","slug":"it-audit-and-reporting","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/it-audit-and-reporting\/","title":{"rendered":"Audit et reporting IT"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbtop\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/aud-comp-hero.jpg?id=26743) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero-section\u00a0\u00bb][vc_column][vc_row_inner content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero-header\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-hero-header-text\u00a0\u00bb][vc_custom_heading text=\u00a0\u00bbAUDIT ET REPORTING IT\u00a0\u00bb font_container=\u00a0\u00bbtag:h1|text_align:left\u00a0\u00bb use_theme_fonts=\u00a0\u00bbyes\u00a0\u00bb][vc_btn title=\u00a0\u00bbT\u00c9L\u00c9CHARGER LE LIVRE BLANC\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb#ffffff\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fresource%2Fnist-sp-800-53-revision-4-implementing-essential-security-controls-cyberark-solutions%2F|\u00a0\u00bb el_class=\u00a0\u00bbcyb-button xlarge event-click\u00a0\u00bb el_id=\u00a0\u00bbIT Audit &amp; Reporting Page: Download Whitepaper\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=\u00a0\u00bb.vc_custom_1538258032452{padding-top: 2rem !important;padding-bottom: 2rem !important;}\u00a0\u00bb][vc_column_text]<\/p>\n<h4>R\u00e9pondez aux exigences de mani\u00e8re simple, fiable et efficace<\/h4>\n<p>En raison de la prolif\u00e9ration des comptes \u00e0 privil\u00e8ges dans les entreprises et de l\u2019acc\u00e8s souvent anonyme et illimit\u00e9 \u00e0 ces comptes, il est difficile pour les auditeurs de produire des rapports fiables et pr\u00e9cis pour comprendre ce qui se passe \u00e0 l\u2019int\u00e9rieur de l\u2019entreprise. Les auditeurs doivent veiller \u00e0 ce que des instruments de contr\u00f4le soient en place au sein du r\u00e9seau pour pouvoir r\u00e9pondre, preuve \u00e0 l\u2019appui, aux questions suivantes :<\/p>\n<ul>\n<li><em>Qui<\/em>sont les utilisateurs qui acc\u00e8dent \u00e0 des comptes \u00e0 privil\u00e8ges ?<\/li>\n<li><em>Quand<\/em>demandent-ils l\u2019acc\u00e8s \u00e0 ces comptes ?<\/li>\n<li><em>Que<\/em>font-ils avec ces comptes critiques ?<\/li>\n<\/ul>\n<p>Les entreprises cherchent souvent une solution de gestion des mots de passe des comptes \u00e0 privil\u00e8ges pour contr\u00f4ler leur utilisation en appliquant des mesures telles que la <a href=\"https:\/\/www.cyberark.com\/fr\/products\/privileged-account-security-solution\/privileged-session-manager\/\">supervision des activit\u00e9s<\/a> des utilisateurs, l\u2019enregistrement des sessions et la <a href=\"https:\/\/www.cyberark.com\/fr\/products\/privileged-account-security-solution\/enterprise-password-vault\/\">responsabilisation individuelle<\/a> \u00e0 l\u2019\u00e9gard des acc\u00e8s \u00e0 privil\u00e8ges.<\/p>\n<p>La solution de CyberArk fournit la plate-forme de s\u00e9curit\u00e9 des comptes \u00e0 privil\u00e8ges et les outils de reporting les plus puissants, les plus pr\u00e9cis et les plus fiables pour r\u00e9pondre aux exigences de contr\u00f4le et de conformit\u00e9 informatique.<\/p>\n<p>Principaux avantages :<\/p>\n<ul>\n<li>Application automatis\u00e9e des r\u00e8gles de s\u00e9curit\u00e9 des comptes \u00e0 privil\u00e8ges (par exemple, fr\u00e9quence de rotation des informations d\u2019identification et complexit\u00e9 des mots de passe), permettant de r\u00e9pondre en toute confiance aux exigences de contr\u00f4le informatique<\/li>\n<li>Rapports complets et int\u00e9gr\u00e9s sur les comptes \u00e0 privil\u00e8ges et les activit\u00e9s des sessions ouvertes avec ces comptes pour apporter les r\u00e9ponses n\u00e9cessaires pour r\u00e9ussir les audits de s\u00e9curit\u00e9 informatique<\/li>\n<li>Stockage inviolable des journaux d\u2019audit, qui emp\u00eache leur acc\u00e8s, leur modification ou leur suppression illicite<\/li>\n<li>R\u00e9duction du temps consacr\u00e9 aux audits informatiques gr\u00e2ce aux journaux d\u2019audit consultables, contenant des informations d\u00e9taill\u00e9es sur les sessions<\/li>\n<li>Production simplifi\u00e9e des rapports d\u2019audit gr\u00e2ce \u00e0 une <a href=\"https:\/\/www.cyberark.com\/fr\/products\/privileged-account-security-solution\/shared-technology-platform\/\">plate-forme de gestion centralis\u00e9e<\/a><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1537546226715{padding-top: 2rem !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/12&Prime;][\/vc_column][vc_column width=\u00a0\u00bb5\/6&Prime; css=\u00a0\u00bb.vc_custom_1534353344275{padding-bottom: 1.25rem !important;}\u00a0\u00bb][vc_custom_heading text=\u00a0\u00bbRESSOURCES\u00a0\u00bb font_container=\u00a0\u00bbtag:h2|text_align:center|color:%23414042&Prime; use_theme_fonts=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcyb-ltr-spc-6&Prime;][\/vc_column][vc_column width=\u00a0\u00bb1\/12&Prime;][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html]PCEtLSBVYmVyZmxpcCBFbWJlZGRlZCBIdWIgV2lkZ2V0IC0tPg0KDQo8ZGl2IGlkPSJVZkVtYmVkZGVkSHViMTU5NTAxMjU1OTMzMCI+PC9kaXY+DQoNCjxzY3JpcHQ+DQp3aW5kb3cuX3VmSHViQ29uZmlnID0gd2luZG93Ll91Zkh1YkNvbmZpZyB8fCBbXTsNCndpbmRvdy5fdWZIdWJDb25maWcucHVzaCh7DQogICdjb250YWluZXJzJzp7J2FwcCc6JyNVZkVtYmVkZGVkSHViMTU5NTAxMjU1OTMzMCd9LA0KICAnY29sbGVjdGlvbic6ICc3MDIwMTk1JywNCiAgJ29wZW5MaW5rJzpmdW5jdGlvbih1cmwpew0KICAgIHdpbmRvdy50b3AubG9jYXRpb24uaHJlZj11cmw7DQogIH0sDQogICdsYXp5bG9hZGVyJzp7DQogICAgJ2l0ZW1EaXNwbGF5TGltaXQnOjIwLA0KICAgICdtYXhUaWxlc1BlclJvdyc6NCwNCiAgICAnbWF4SXRlbXNUb3RhbCc6IDQNCiAgfSwNCiAgJ3RpbGVTaXplJzogJ21lZGl1bScsDQogICdlbmFibGVQYWdlVHJhY2tpbmcnOmZhbHNlLA0KICAnYmFzZVVybCc6ICdodHRwczovL3d3dy5jeWJlcmFyay5jb20vZnIvcmVzb3VyY2VzLycsDQogICdmaWxlc1VybCc6ICdodHRwczovL3d3dy5jeWJlcmFyay5jb20vZnIvcmVzb3VyY2VzLycsDQogICdnZW5lcmF0ZWRBdFVUQyc6ICcyMDIwLTA3LTE3IDE5OjAyOjI4JywNCn0pOw0KPC9zY3JpcHQ+DQoNCjxzY3JpcHQ+KGZ1bmN0aW9uKGQsdCx1KSB7DQogIGZ1bmN0aW9uIGxvYWQoKXsNCiAgICB2YXIgcz1kLmNyZWF0ZUVsZW1lbnQodCk7cy5zcmM9dTtkLmJvZHkuYXBwZW5kQ2hpbGQocyk7DQogIH0NCiAgaWYgKHdpbmRvdy5hZGRFdmVudExpc3RlbmVyKSB7DQogICAgd2luZG93LmFkZEV2ZW50TGlzdGVuZXIoJ2xvYWQnLGxvYWQsZmFsc2UpOw0KICB9DQogIGVsc2UgaWYgKHdpbmRvdy5hdHRhY2hFdmVudCkgew0KICAgIHdpbmRvdy5hdHRhY2hFdmVudCgnb25sb2FkJyxsb2FkKTsNCiAgfQ0KICBlbHNlew0KICAgIHdpbmRvdy5vbmxvYWQ9bG9hZDsNCiAgfQ0KfShkb2N1bWVudCwnc2NyaXB0JywnaHR0cHM6Ly93d3cuY3liZXJhcmsuY29tL2ZyL3Jlc291cmNlcy9odWJzRnJvbnQvZW1iZWRfY29sbGVjdGlvbicpKTsNCjwvc2NyaXB0Pg0KPCEtLSAvRW5kIFViZXJmbGlwIEVtYmVkZGVkIEh1YiBXaWRnZXQgLS0+[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb][vc_column css=\u00a0\u00bb.vc_custom_1537546542206{padding-bottom: 3.125rem !important;}\u00a0\u00bb el_class=\u00a0\u00bbcyb-center\u00a0\u00bb][vc_btn title=\u00a0\u00bbPLUS DE RESSOURCES\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb#414042&Prime; shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fresources%2F|\u00a0\u00bb el_class=\u00a0\u00bbcyb-button\u00a0\u00bb][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbtop\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/aud-comp-hero.jpg?id=26743) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero-section\u00a0\u00bb][vc_column][vc_row_inner content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero-header\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-hero-header-text\u00a0\u00bb][vc_custom_heading text=\u00a0\u00bbAUDIT ET REPORTING IT\u00a0\u00bb font_container=\u00a0\u00bbtag:h1|text_align:left\u00a0\u00bb use_theme_fonts=\u00a0\u00bbyes\u00a0\u00bb][vc_btn title=\u00a0\u00bbT\u00c9L\u00c9CHARGER LE LIVRE BLANC\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb#ffffff\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fresource%2Fnist-sp-800-53-revision-4-implementing-essential-security-controls-cyberark-solutions%2F|\u00a0\u00bb el_class=\u00a0\u00bbcyb-button xlarge event-click\u00a0\u00bb el_id=\u00a0\u00bbIT&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":52009,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-51930","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Audit de s\u00e9curit\u00e9 et rapport de conformit\u00e9 | CyberArk<\/title>\n<meta name=\"description\" content=\"Les solutions int\u00e9gr\u00e9es de CyberArk aident les entreprises \u00e0 r\u00e9pondre aux obligations d&#039;audit et de conformit\u00e9 pour toutes les demandes de conformit\u00e9 des syst\u00e8mes informatiques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/it-audit-and-reporting\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Audit et reporting IT\" \/>\n<meta property=\"og:description\" content=\"Les solutions int\u00e9gr\u00e9es de CyberArk aident les entreprises \u00e0 r\u00e9pondre aux obligations d&#039;audit et de conformit\u00e9 pour toutes les demandes de conformit\u00e9 des syst\u00e8mes informatiques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/it-audit-and-reporting\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-22T19:16:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/it-audit-and-reporting\/\",\"url\":\"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/it-audit-and-reporting\/\",\"name\":\"Audit de s\u00e9curit\u00e9 et rapport de conformit\u00e9 | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\"},\"datePublished\":\"2019-04-16T21:10:41+00:00\",\"dateModified\":\"2020-07-22T19:16:55+00:00\",\"description\":\"Les solutions int\u00e9gr\u00e9es de CyberArk aident les entreprises \u00e0 r\u00e9pondre aux obligations d'audit et de conformit\u00e9 pour toutes les demandes de conformit\u00e9 des syst\u00e8mes informatiques.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/it-audit-and-reporting\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/it-audit-and-reporting\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/it-audit-and-reporting\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions de s\u00e9curit\u00e9 des identit\u00e9s\",\"item\":\"https:\/\/www.cyberark.com\/fr\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Audit et conformit\u00e9 r\u00e9glementaire\",\"item\":\"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Audit et reporting IT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Audit de s\u00e9curit\u00e9 et rapport de conformit\u00e9 | CyberArk","description":"Les solutions int\u00e9gr\u00e9es de CyberArk aident les entreprises \u00e0 r\u00e9pondre aux obligations d'audit et de conformit\u00e9 pour toutes les demandes de conformit\u00e9 des syst\u00e8mes informatiques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/it-audit-and-reporting\/","og_locale":"fr_FR","og_type":"article","og_title":"Audit et reporting IT","og_description":"Les solutions int\u00e9gr\u00e9es de CyberArk aident les entreprises \u00e0 r\u00e9pondre aux obligations d'audit et de conformit\u00e9 pour toutes les demandes de conformit\u00e9 des syst\u00e8mes informatiques.","og_url":"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/it-audit-and-reporting\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-07-22T19:16:55+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/it-audit-and-reporting\/","url":"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/it-audit-and-reporting\/","name":"Audit de s\u00e9curit\u00e9 et rapport de conformit\u00e9 | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/fr\/#website"},"datePublished":"2019-04-16T21:10:41+00:00","dateModified":"2020-07-22T19:16:55+00:00","description":"Les solutions int\u00e9gr\u00e9es de CyberArk aident les entreprises \u00e0 r\u00e9pondre aux obligations d'audit et de conformit\u00e9 pour toutes les demandes de conformit\u00e9 des syst\u00e8mes informatiques.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/it-audit-and-reporting\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/it-audit-and-reporting\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/it-audit-and-reporting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Solutions de s\u00e9curit\u00e9 des identit\u00e9s","item":"https:\/\/www.cyberark.com\/fr\/solutions\/"},{"@type":"ListItem","position":3,"name":"Audit et conformit\u00e9 r\u00e9glementaire","item":"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/"},{"@type":"ListItem","position":4,"name":"Audit et reporting IT"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/fr\/#website","url":"https:\/\/www.cyberark.com\/fr\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/fr\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=51930"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51930\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/52009"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=51930"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=51930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}