{"id":86115,"date":"2020-02-11T15:40:43","date_gmt":"2020-02-11T20:40:43","guid":{"rendered":"https:\/\/www.cyberark.com\/blueprint\/"},"modified":"2025-03-27T07:20:04","modified_gmt":"2025-03-27T11:20:04","slug":"blueprint","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/blueprint\/","title":{"rendered":"BluePrint"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-breadcrumb\u00a0\u00bb]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/fr\/services-support\/\"> Revenir \u00e0 la section Succ\u00e8s clients<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Cyberark Blueprint pour garantir la s\u00e9curit\u00e9 des identit\u00e9s<\/h1>\n<p><\/p>\n<h2>Un cadre de bonnes pratiques pour d\u00e9velopper un programme de s\u00e9curit\u00e9 des identit\u00e9s efficace.<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=\u00a0\u00bbDemander la bo\u00eete \u00e0 outils\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Ftry-buy%2Fblueprint-toolkit%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2&Prime;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_allzrp3jd7 videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-vt\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1611617874123{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Acc\u00e9l\u00e9rez votre parcours de s\u00e9curit\u00e9<\/h3>\n<p>Un programme de s\u00e9curit\u00e9 des identit\u00e9s permet aux entreprises de garantir la s\u00e9curit\u00e9 de leurs actifs les plus critiques, tout en renfor\u00e7ant leur agilit\u00e9. Or, la mise en place d\u2019un programme qui s\u00e9curise efficacement l\u2019\u00e9ventail croissant d\u2019identit\u00e9s et d\u2019environnements ainsi que leur acc\u00e8s peut para\u00eetre difficile \u00e0 r\u00e9aliser. Le CyberArk Blueprint a \u00e9t\u00e9 con\u00e7u en ce sens pour aider les entreprises \u00e0 mieux comprendre les attaques li\u00e9es aux identit\u00e9s, \u00e0 \u00e9valuer leur propre s\u00e9curit\u00e9, \u00e0 \u00e9tablir un plan pour r\u00e9duire de mani\u00e8re mesurable les risques et \u00e0 apprendre et \u00e0 appliquer les bonnes pratiques pour d\u00e9ployer des contr\u00f4les intelligents des privil\u00e8ges. Le Blueprint vous \u00e9vite de faire cavalier seul et vous accompagne tout au long de votre parcours, en vous aidant \u00e0 am\u00e9liorer plus rapidement votre performance en mati\u00e8re de s\u00e9curit\u00e9.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-126857\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/hat-icon.svg\" alt=\"R\u00e9duction de l\u2019empreinte de l\u2019entreprise\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Bonnes pratiques<\/h4>\n<p>Obtenez des conseils d\u2019experts sur les bonnes pratiques en mati\u00e8re de personnel, processus et technologies pour \u00e9tablir un programme de s\u00e9curit\u00e9 des identit\u00e9s efficace.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-133434\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/self-service-icon.svg\" alt=\"ic\u00f4ne de fl\u00e8che d\u2019ordinateur portable\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Libre-service<\/h4>\n<p>Acc\u00e9l\u00e9rez votre parcours de s\u00e9curit\u00e9 des identit\u00e9s gr\u00e2ce aux ressources en libre-service disponibles \u00e0 la demande.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-133442\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/ecosystem-icon.svg\" alt=\"ic\u00f4ne \u00e9cosyst\u00e8me\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>\u00c9cosyst\u00e8me<\/h4>\n<p>Centre de documentation comprenant des vid\u00e9os, des livres blancs, des articles de blog et des outils. [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-hz-no-hdr\u00a0\u00bb][vc_column el_class=\u00a0\u00bbtext-md-center\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Le fruit d\u2019une vaste exp\u00e9rience<\/h3>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-112176\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Accelarete-Business-Speed-Icons.svg\" alt=\"Acc\u00e9l\u00e9rez le d\u00e9veloppement de l\u2019entreprise\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>R\u00e9duction mesurable des risques<\/h4>\n<p>Le Blueprint vous permet d\u2019optimiser votre s\u00e9curit\u00e9 avec un minimum d\u2019effort, en vous aidant \u00e0 hi\u00e9rarchiser les initiatives cl\u00e9s qui \u00ab\u00a0font avancer les choses\u00a0\u00bb de mani\u00e8re mesurable. [\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-133450\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/battle-swords-icon.svg\" alt=\"ic\u00f4ne des le\u00e7ons apprises\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Le\u00e7ons tir\u00e9es sur le terrain<\/h4>\n<p>Le Blueprint est le fruit de notre exp\u00e9rience acquise en aidant des entreprises \u00e0 se r\u00e9tablir \u00e0 la suite de violations de grande ampleur, d\u2019\u00e9tudes pointues sur les menaces et de notre collaboration avec plus de 8\u00a0500\u00a0clients \u00e0 l\u2019\u00e9chelle mondiale.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-133458\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/brain-icon.svg\" alt=\"ic\u00f4ne des conseils normatifs\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Conseils normatifs pour toutes les identit\u00e9s<\/h4>\n<p>Le Blueprint nous permet de partager notre exp\u00e9rience par l\u2019interm\u00e9diaire d\u2019une approche normative visant \u00e0 s\u00e9curiser l\u2019\u00e9ventail complet des identit\u00e9s, qu\u2019il s\u2019agisse des employ\u00e9s, des technologies de l\u2019information, des d\u00e9veloppeurs ou des machines.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2-pad cybv2 cybv2-background-oval tour\u00a0\u00bb][vc_column][vc_row_inner el_class=\u00a0\u00bbcyb-center\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-pad-btm\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbleft-mobile\u00a0\u00bb]<\/p>\n<h3>Tirer le meilleur parti du Blueprint<\/h3>\n<p>Voici comment les entreprises tirent profit du CyberArk Blueprint pour avancer dans leur parcours. [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=\u00a0\u00bbsquare\u00a0\u00bb active_section=\u00a0\u00bb1&Prime; css_animation=\u00a0\u00bbnone\u00a0\u00bb][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbComprendre la cha\u00eene d\u2019attaque\u00a0\u00bb tab_id=\u00a0\u00bbchain\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Comprendre la cha\u00eene d\u2019attaque<\/h4>\n<p>Servez-vous du CyberArk Blueprint pour mieux comprendre la cha\u00eene d\u2019attaque des identit\u00e9s, savoir comment les cybercriminels exploitent les identit\u00e9s du personnel, des technologies de l\u2019information, des d\u00e9veloppeurs et des machines pour arriver \u00e0 leurs fins et d\u00e9couvrir comment vous pouvez pr\u00e9venir ces types d\u2019attaques. [\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/cyberark.my.site.com\/s\/article\/Understanding-the-Identity-Attack-Chain-with-the-CyberArk-Blueprint\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-133466\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/understand-the-attack-chain-tour.png\" alt=\"image d\u2019une attaque\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/understand-the-attack-chain-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/understand-the-attack-chain-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/understand-the-attack-chain-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/understand-the-attack-chain-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bb\u00c9valuez votre posture de s\u00e9curit\u00e9\u00a0\u00bb tab_id=\u00a0\u00bbassess\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>\u00c9valuez votre posture de s\u00e9curit\u00e9<\/h4>\n<p>Les \u00e9valuations de la s\u00e9curit\u00e9 sont essentielles \u00e0 la s\u00e9curit\u00e9 de l\u2019information. Utilisez le CyberArk Blueprint pour acc\u00e9l\u00e9rer vos initiatives de s\u00e9curit\u00e9, d\u00e9tecter les failles et les lacunes en mati\u00e8re de contr\u00f4le de s\u00e9curit\u00e9, et obtenir des informations sur votre posture de s\u00e9curit\u00e9 par rapport \u00e0 la d\u00e9finition des priorit\u00e9s, aux gammes de contr\u00f4les de s\u00e9curit\u00e9 et aux groupes technologiques.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/cyberark.my.site.com\/s\/article\/Assessing-Your-Security-Posture-with-the-Blueprint-Self-Assessment-Workbook\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-133474\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/assess-your-security-posture-tour.png\" alt=\"image de verrou\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/assess-your-security-posture-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/assess-your-security-posture-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/assess-your-security-posture-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/assess-your-security-posture-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbCr\u00e9ez votre feuille de route\u00a0\u00bb tab_id=\u00a0\u00bbroadmap\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Cr\u00e9ez votre feuille de route<\/h4>\n<p>Une feuille de route sert de guide fondamental pour vos initiatives de s\u00e9curit\u00e9, en vous permettant d\u2019ex\u00e9cuter un plan sp\u00e9cifique et de cibler de mani\u00e8re proactive les lacunes en mati\u00e8re de s\u00e9curit\u00e9. \u00c9tablissez de mani\u00e8re efficace un plan actionnable, mesurable et avec des priorit\u00e9s d\u00e9finies gr\u00e2ce au CyberArk Blueprint.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/cyberark.my.site.com\/s\/article\/Create-Your-Identity-Security-Roadmap-with-the-CyberArk-Blueprint\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-133490\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/roadmap-tour.png\" alt=\"feuille de route\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/roadmap-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/roadmap-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/roadmap-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/roadmap-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbFormation aux bonnes pratiques\u00a0\u00bb tab_id=\u00a0\u00bbeducation\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Formation aux bonnes pratiques<\/h4>\n<p>Les programmes efficaces ne se limitent pas \u00e0 de bons outils de s\u00e9curit\u00e9\u00a0: vous devez aussi obtenir les bons conseils en mati\u00e8re de personnel, processus et technologies. Prenez des d\u00e9cisions \u00e9clair\u00e9es lors de la planification, de l\u2019ex\u00e9cution et du d\u00e9ploiement des contr\u00f4les intelligents des privil\u00e8ges gr\u00e2ce aux conseils sur les bonnes pratiques fournis sur le CyberArk Success Blog.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/cyberark.my.site.com\/s\/success-blog\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-133482\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/best-practice-education-tour.png\" alt=\"image de chapeau de dipl\u00f4m\u00e9\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/best-practice-education-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/best-practice-education-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/best-practice-education-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/best-practice-education-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad int-hero\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1715090991235{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2&Prime;][vc_raw_html]PGRpdiBjbGFzcz0idmlkZW8td2luZG93Ij5bd2lzdGlhX3ZpZGVvIGlkPSIxZ3RqeG9zMGNjIl08L2Rpdj4=[\/vc_raw_html][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text]<\/p>\n<h3>Comprendre la cha\u00eene d\u2019attaque des identit\u00e9s<\/h3>\n<p>CyberArk Blueprint s\u2019appuie sur trois principes directeurs qui \u00e9tayent les recommandations relatives au contr\u00f4le de la s\u00e9curit\u00e9 et permettent de r\u00e9duire les risques courants li\u00e9s aux attaques ciblant les identit\u00e9s.[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_customer_stories vc_tta-o-non-responsive mt-12&Prime; css=\u00a0\u00bb.vc_custom_1714763180252{background-color: #ffffff !important;}\u00a0\u00bb][vc_column][vc_tta_tabs style=\u00a0\u00bbflat\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb color=\u00a0\u00bbwhite\u00a0\u00bb spacing=\u00a0\u00bb\u00a0\u00bb gap=\u00a0\u00bb20&Prime; alignment=\u00a0\u00bbcenter\u00a0\u00bb active_section=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbcybv2_customer_stories_tabs\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676900675{background-color: #ffffff !important;}\u00a0\u00bb][vc_tta_section title=\u00a0\u00bbCisco\u00a0\u00bb tab_id=\u00a0\u00bb1607742493330-265de97c-f2d9eb66-6bf8111f-e61f\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_icon vc_active\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_single_image image=\u00a0\u00bb185382&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbright\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0Nous sommes tr\u00e8s fiers de ce que nous avons accompli avec notre programme. Ces trois derni\u00e8res ann\u00e9es, CyberArk a \u00e9t\u00e9 d\u2019une grande aide pour Cisco\u00a0\u00bb. \u00c0 pr\u00e9sent, nous pr\u00e9voyons de faire \u00e9voluer notre plateforme de s\u00e9curit\u00e9 des identit\u00e9s CyberArk pour tirer parti des nouvelles solutions d\u00e9velopp\u00e9es par CyberArk.\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]<strong>Santosh\u00a0Prusty<\/strong>, Senior Leader, Enterprise Security Team, Cisco[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/customer-stories\/cisco\/\">Lire le t\u00e9moignage client<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbDCB Bank Limited\u00a0\u00bb tab_id=\u00a0\u00bb1714765172150-a555e50f-a6c7111f-e61f\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab2_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb190495&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbright\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0En nous associant \u00e0 CyberArk et en suivant le cadre CyberArk Blueprint, nous avons \u00e9t\u00e9 en mesure de d\u00e9velopper une strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s \u00e9volutive qui r\u00e9pond \u00e0 nos d\u00e9fis actuels et r\u00e9pondra \u00e0 ceux qui se poseront \u00e0 l\u2019avenir, compte tenu notamment de l\u2019acc\u00e9l\u00e9ration rapide de notre transformation num\u00e9rique.\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]<strong>Murali Mohan Rao Manduva,<\/strong> CTO, DCB Bank[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/dcb-bank\/\">Lire le t\u00e9moignage client<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbE-Global\u00a0\u00bb tab_id=\u00a0\u00bb1607742494008-8c0fb98b-2b6beb66-6bf8111f-e61f\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab3_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653503563{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb190504&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbright\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]L\u2019un des principaux avantages du partenariat avec CyberArk qui a permis \u00e0 E-Global de d\u00e9velopper sa strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s r\u00e9sidait dans le CyberArk Blueprint fourni par CyberArk. Ce cadre de bonnes pratiques est le fruit de l\u2019exp\u00e9rience et des connaissances acquises durant de nombreuses ann\u00e9es par CyberArk en mati\u00e8re de personnel, processus et technologies. E-Global a utilis\u00e9 le Blueprint pour analyser son alignement sur les bonnes pratiques en mati\u00e8re de s\u00e9curit\u00e9 des identit\u00e9s, puis planifier, personnaliser et cr\u00e9er la feuille de route optimale pour am\u00e9liorer sa posture de s\u00e9curit\u00e9.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]E-Global[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/e-global\/\">Lire le t\u00e9moignage client<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbEncora\u00a0\u00bb tab_id=\u00a0\u00bb1607742494616-60a6dced-32cfeb66-6bf8111f-e61f\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab4_icon\u00a0\u00bb][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_maintab_row\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbimage-column\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1607653481888{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb190513&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbright\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_left_image\u00a0\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00a0\u00bb width=\u00a0\u00bb1\/2&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text1 text\u00a0\u00bb]\u00ab\u00a0Les conseils de CyberArk avant l\u2019achat et son soutien pendant la mise en \u0153uvre ont \u00e9t\u00e9 exceptionnels. Depuis, CyberArk \u00e9change r\u00e9guli\u00e8rement avec nous pour faire le suivi du d\u00e9ploiement de la solution.\u00a0\u00bb[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section6_tab1_text2&Prime;]<strong>Krish Anand,<\/strong> CIO, Encora[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/encora\/\">Lire le t\u00e9moignage client<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][vc_raw_js]JTNDc2NyaXB0JTNFJTBBalF1ZXJ5JTI4ZG9jdW1lbnQlMjkucmVhZHklMjhmdW5jdGlvbiUyOCUyOSU3QiUwQSUyMCUyMCUyMCUyMCUyRiUyRkFkZCUyMEFjdGl2ZSUyMHRvJTIwdGFiJTIwb24lMjBwYWdlJTIwbG9hZCUwQSUyMCUyMCUyMCUyMCUyNHBhbmVscyUyMCUzRCUyMGpRdWVyeSUyOCUyNy5jeWJ2Ml9jdXN0b21lcl9zdG9yaWVzX3RhYnMlMjAudmNfdHRhLXBhbmVscyUyMC52Y190dGEtcGFuZWwlMjclMjklM0IlMEElMjAlMjAlMjAlMjAlMjR0YWJzJTIwJTNEJTIwalF1ZXJ5JTI4JTI3LmN5YnYyX2N1c3RvbWVyX3N0b3JpZXNfdGFicyUyMC52Y190dGEtdGFicy1saXN0JTIwLnZjX3R0YS10YWIlMjclMjklM0IlMEElMjAlMjAlMjAlMjB2YXIlMjBpbmRleCUyMCUzRCUyMDAlM0IlMEElMEElMjAlMjAlMjAlMjAlMkYlMkZBbGlnbiUyMFRhYnMlMjB3aXRoJTIwcGFuZWxzJTBBJTIwJTIwJTIwJTIwJTI0cGFuZWxzLmVhY2glMjhmdW5jdGlvbiUyOCUyOSU3QiUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMGpRdWVyeSUyOHRoaXMlMjkuaGFzQ2xhc3MlMjglMjd2Y19hY3RpdmUlMjclMjklM0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjByZXR1cm4lMjBmYWxzZSUzQiUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMGluZGV4JTJCJTJCJTNCJTBBJTIwJTIwJTIwJTIwJTdEJTI5JTBBJTIwJTIwJTIwJTIwdmFyJTIwbmV3SW5kZXglMjAlM0QlMjAwJTNCJTBBJTIwJTIwJTIwJTIwJTI0dGFicy5lYWNoJTI4ZnVuY3Rpb24lMjglMjklN0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjBpZiUyOGluZGV4JTIwJTNEJTNEJTIwbmV3SW5kZXglMjklN0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjBqUXVlcnklMjh0aGlzJTI5LmFkZENsYXNzJTI4JTI3dmNfYWN0aXZlJTI3JTI5JTNCJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTdEJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwbmV3SW5kZXglMkIlMkIlM0IlMEElMjAlMjAlMjAlMjAlN0QlMjklMEElN0QlMjklM0IlMEElM0MlMkZzY3JpcHQlM0U=[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime;][vc_column_text el_class=\u00a0\u00bbno-break\u00a0\u00bb]<\/p>\n<h3>Explorer les ressources connexes<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/blueprint\">Voir toutes les ressources<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column\u00a0\u00bb][vc_column el_class=\u00a0\u00bbnew_hpstyle_section8_col1&Prime;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00a0\u00bb.vc_custom_1660928639057{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section8_uberflip\u00a0\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1609868130755{background-color: #f7f7f7 !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top hv-cta\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb][vc_column_text]<\/p>\n<h2><b>Acc\u00e9l\u00e9rez votre parcours de s\u00e9curit\u00e9 des identit\u00e9s<\/b><\/h2>\n<p>\n[\/vc_column_text][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Comprenez la cha\u00eene d\u2019attaque commune et \u00e9tablissez une approche bas\u00e9e sur les risques et hi\u00e9rarchis\u00e9e[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Analysez votre posture de s\u00e9curit\u00e9, identifiez les lacunes en mati\u00e8re de contr\u00f4le de la s\u00e9curit\u00e9 et b\u00e9n\u00e9ficiez d\u2019une meilleure visibilit\u00e9[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Identifiez les bonnes pratiques pour favoriser l\u2019adoption au sein de votre personnel[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=\u00a0\u00bb113505&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb el_class=\u00a0\u00bbd-none d-md-block\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/12&Prime; css=\u00a0\u00bb.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbright-clmn cybv2-form\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbbold\u00a0\u00bb]<\/p>\n<h4>Demander la bo\u00eete \u00e0 outils<\/h4>\n<p>\n[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iODM0NSIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS90cnktYnV5L3RoYW5rLXlvdS1ibHVlcHJpbnQtdG9vbGtpdC8iXQ==[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-breadcrumb\u00a0\u00bb] Revenir \u00e0 la section Succ\u00e8s clients[\/vc_column_text][vc_column_text] Cyberark Blueprint pour garantir la s\u00e9curit\u00e9 des identit\u00e9s Un cadre de bonnes pratiques pour d\u00e9velopper un programme de s\u00e9curit\u00e9 des&#8230;<\/p>\n","protected":false},"author":125,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27776],"class_list":["post-86115","page","type-page","status-publish","hentry","product_category-identity-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CyberArk Blueprint pour la s\u00e9curit\u00e9 des identit\u00e9s | CyberArk<\/title>\n<meta name=\"description\" content=\"CyberArk Blueprint est un cadre de bonnes pratiques en mati\u00e8re de personnel, de processus et de technologies, essentielles \u00e0 la mise en \u0153uvre r\u00e9ussie d\u2019un programme de s\u00e9curit\u00e9 des identit\u00e9s.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/blueprint\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BluePrint\" \/>\n<meta property=\"og:description\" content=\"CyberArk Blueprint est un cadre de bonnes pratiques en mati\u00e8re de personnel, de processus et de technologies, essentielles \u00e0 la mise en \u0153uvre r\u00e9ussie d\u2019un programme de s\u00e9curit\u00e9 des identit\u00e9s.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/blueprint\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-27T11:20:04+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/blueprint\/\",\"url\":\"https:\/\/www.cyberark.com\/blueprint\/\",\"name\":\"CyberArk Blueprint pour la s\u00e9curit\u00e9 des identit\u00e9s | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/blueprint\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/blueprint\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/hat-icon.svg\",\"datePublished\":\"2020-02-11T20:40:43+00:00\",\"dateModified\":\"2025-03-27T11:20:04+00:00\",\"description\":\"CyberArk Blueprint est un cadre de bonnes pratiques en mati\u00e8re de personnel, de processus et de technologies, essentielles \u00e0 la mise en \u0153uvre r\u00e9ussie d\u2019un programme de s\u00e9curit\u00e9 des identit\u00e9s.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/blueprint\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/blueprint\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/blueprint\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/hat-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/hat-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/blueprint\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BluePrint\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CyberArk Blueprint pour la s\u00e9curit\u00e9 des identit\u00e9s | CyberArk","description":"CyberArk Blueprint est un cadre de bonnes pratiques en mati\u00e8re de personnel, de processus et de technologies, essentielles \u00e0 la mise en \u0153uvre r\u00e9ussie d\u2019un programme de s\u00e9curit\u00e9 des identit\u00e9s.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/blueprint\/","og_locale":"fr_FR","og_type":"article","og_title":"BluePrint","og_description":"CyberArk Blueprint est un cadre de bonnes pratiques en mati\u00e8re de personnel, de processus et de technologies, essentielles \u00e0 la mise en \u0153uvre r\u00e9ussie d\u2019un programme de s\u00e9curit\u00e9 des identit\u00e9s.","og_url":"https:\/\/www.cyberark.com\/blueprint\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-03-27T11:20:04+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/blueprint\/","url":"https:\/\/www.cyberark.com\/blueprint\/","name":"CyberArk Blueprint pour la s\u00e9curit\u00e9 des identit\u00e9s | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/blueprint\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/blueprint\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/hat-icon.svg","datePublished":"2020-02-11T20:40:43+00:00","dateModified":"2025-03-27T11:20:04+00:00","description":"CyberArk Blueprint est un cadre de bonnes pratiques en mati\u00e8re de personnel, de processus et de technologies, essentielles \u00e0 la mise en \u0153uvre r\u00e9ussie d\u2019un programme de s\u00e9curit\u00e9 des identit\u00e9s.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/blueprint\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/blueprint\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/blueprint\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/hat-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/hat-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/blueprint\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"BluePrint"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/86115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=86115"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/86115\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=86115"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=86115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}