{"id":88991,"date":"2022-11-14T11:41:33","date_gmt":"2022-11-14T09:41:33","guid":{"rendered":"https:\/\/www.evidian.com\/?page_id=88991"},"modified":"2023-04-09T09:49:01","modified_gmt":"2023-04-09T07:49:01","slug":"quels-sont-les-outils-et-solutions-de-cybersecurite-iam","status":"publish","type":"page","link":"https:\/\/www.evidian.com\/fr\/documentations\/quels-sont-les-outils-et-solutions-de-cybersecurite-iam\/","title":{"rendered":"Quels sont les outils et solutions de cybers\u00e9curit\u00e9 IAM\u00a0?"},"content":{"rendered":"<div id=\"pl-88991\"  class=\"panel-layout\" ><div id=\"pg-88991-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-88991-0\" ><div id=\"pgc-88991-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-88991-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-88991-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h1 style=\"color:white;\">Quels sont les outils et solutions de cybers\u00e9curit\u00e9 IAM\u00a0?<\/h1>\n<h2 style=\"color:white;\">91 fournisseurs d'IAM ont \u00e9t\u00e9 \u00e9valu\u00e9s pour la protection de votre entreprise contre les cyberattaques par des utilisateurs non autoris\u00e9s<\/h2>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-88991-1\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-88991-1\" ><div id=\"pgc-88991-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-88991-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"82820\" class=\"insert-page insert-page-82820 \"><div id=\"pl-82820\"  class=\"panel-layout\" ><div id=\"pg-82820-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-82820-0\" ><div id=\"pgc-82820-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-82820-0-0-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-82820\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/fr\/societe\/contacter-evidian\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tNous contacter &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-82820-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-82820-0-1-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-82820\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/fr\/societe\/essai-gratuit\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tEssai gratuit &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-82820-0-2\"  class=\"panel-grid-cell\" ><div id=\"panel-82820-0-2-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-82820\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/fr\/societe\/demande-de-demonstration\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tDemander une d\u00e9mo &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-82820-0-3\"  class=\"panel-grid-cell\" ><div id=\"panel-82820-0-3-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-82820\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/fr\/societe\/obtenez-un-prix\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tObtenez un prix &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-88991-2\"  class=\"panel-grid panel-has-style\" ><div class=\"product-title panel-row-style panel-row-style-for-88991-2\" ><div id=\"pgc-88991-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-88991-2-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-ed91a830b9d9-82820 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"1.5\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\tL'IAM (Identity and Access Management) est un outil essentiel pour la cybers\u00e9curit\u00e9\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-88991-3\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-88991-3\" ><div id=\"pgc-88991-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-88991-3-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3>Quels sont les outils de cybers\u00e9curit\u00e9 IAM\u00a0?<\/h3>\n<p>Les outils de cybers\u00e9curit\u00e9 IAM doivent identifier, authentifier et autoriser les utilisateurs, tout en refusant les utilisateurs non autoris\u00e9s.<\/p>\n<p>Comme les utilisateurs changent souvent de r\u00f4le dans une entreprise, ces outils doivent \u00e9galement s'assurer que les utilisateurs ont les droits d'acc\u00e8s n\u00e9cessaires pour leur m\u00e9tier et pas plus. L'absence de gestion du cycle de vie des utilisateurs (arriv\u00e9e, changement de r\u00f4le, d\u00e9part) ou le manque de workflows d'approbation contribuent \u00e0 des privil\u00e8ges d'acc\u00e8s excessifs, exposant une entreprise \u00e0 des attaques d'utilisateurs internes.<\/p>\n<p>Avec la conformit\u00e9 r\u00e9glementaire comme <a href=\"https:\/\/www.soxlaw.com\/\" target=\"_blank\" rel=\"noopener\">SOX<\/a>, <a href=\"https:\/\/www.hhs.gov\/hipaa\/index.html\" target=\"_blank\" rel=\"noopener\">HIPAA<\/a>, <a href=\"https:\/\/www.bis.org\/bcbs\/basel3.htm\" target=\"_blank \" rel=\"noopener\">B\u00e2le\u00a0III<\/a>, <a href=\"https:\/\/www.pcisecuritystandards.org\/\" target=\"_blank\" rel=\"noopener\">PCI<\/a> et <a href=\"https:\/\/gdpr.eu\/\" target=\"_blank\" rel=\"noopener\">GDPR<\/a>, les entreprises sont confront\u00e9es \u00e0 davantage d'audits et d'examens de conformit\u00e9. Les outils de cybers\u00e9curit\u00e9 IAM doivent collecter des donn\u00e9es pour les rapports obligatoires et \u00e9galement d\u00e9tecter les comportements anormaux des utilisateurs.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-88991-3-1\"  class=\"panel-grid-cell\" ><div id=\"panel-88991-3-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3>Quelles sont les solutions de cybers\u00e9curit\u00e9 IAM\u00a0?<\/h3>\n<p><a href=\"https:\/\/isg-one.com\/who-we-are\" target=\"_blank\" rel=\"noopener\">ISG, une soci\u00e9t\u00e9 de conseil de premier plan<\/a> a fourni un rapport de recherche comparant 91\u00a0fournisseurs de solutions et de services de cybers\u00e9curit\u00e9 IAM, leurs forces, leurs d\u00e9fis et leurs diff\u00e9renciateurs concurrentiels.<\/p>\n<p>Dans ce <a href=\"#quadrant\" rel=\"noopener\">quadrant de la cybers\u00e9curit\u00e9 IAM<\/a>, sur les 91\u00a0entreprises \u00e9valu\u00e9es pour cette \u00e9tude, 23 se sont qualifi\u00e9es pour ce quadrant, cinq \u00e9tant identifi\u00e9es comme leaders.<\/p>\n<p>Les solutions de cybers\u00e9curit\u00e9 IAM sont tr\u00e8s demand\u00e9es car les clients adoptent une <a href=\"\/pdf\/wp-iam-zero-trust.pdf\" target=\"_blank\" rel=\"noopener\">approche \"z\u00e9ro confiance\" \u00e0 la s\u00e9curit\u00e9<\/a>. La confiance z\u00e9ro n'est pas seulement un mot \u00e0 la mode, mais la nouvelle norme\u00a0: \"Ne jamais faire confiance, toujours v\u00e9rifier\".<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-88991-4\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-88991-4\" ><div id=\"pgc-88991-4-0\"  class=\"panel-grid-cell\" ><div id=\"panel-88991-4-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"88262\" class=\"insert-page insert-page-88262 \"><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-88991-5\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-88991-5\" ><div id=\"pgc-88991-5-0\"  class=\"panel-grid-cell\" ><div id=\"panel-88991-5-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"6\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"89060\" class=\"insert-page insert-page-89060 \"><div id=\"pl-89060\"  class=\"panel-layout\" ><div id=\"pg-89060-0\"  class=\"panel-grid panel-has-style\" ><div class=\"product-title panel-row-style panel-row-style-for-89060-0\" ><div id=\"pgc-89060-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-0-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-74628e590a2c-89060 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"1.5\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\t<a name=\"all-products\"><\/a>Produits Evidian - Prot\u00e9gez votre entreprise des cyberattaques par des utilisateurs non autoris\u00e9s\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-89060-1\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-89060-1\" ><div id=\"pgc-89060-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"users-cloud\"><\/div>\n<h3  style=\"text-align: center; color: #ff5269;\"><a href=\"https:\/\/www.evidian.com\/fr\/produits\/idaas-identity-and-access-management-as-a-service\/\" target=\"_blank\" rel=\"noopener\">Orbion\u00a0<\/a><\/h3>\n<p style=\"text-align: center;\">Evidian s'occupe de tout ce qui concerne votre gestion des identit\u00e9s et des acc\u00e8s avec Orbion (Identit\u00e9 en tant que service)<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/www.evidian.com\/fr\/produits\/idaas-identity-and-access-management-as-a-service\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89060-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-1-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"users\"><\/div>\n<h3 style=\"text-align: center; color: #00a397;\"><a href=\"https:\/\/www.evidian.com\/fr\/produits\/identity-governance-and-administration-pour-la-gestion-des-identites-des-habilitations-et-des-acces\/\" target=\"_blank\" rel=\"noopener\">Identity Governance and Administration<\/a><\/h3>\n<p style=\"text-align: center;\">G\u00e9rez les acc\u00e8s et les autorisations de tous vos utilisateurs dans votre entreprise<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/www.evidian.com\/fr\/produits\/identity-governance-and-administration-pour-la-gestion-des-identites-des-habilitations-et-des-acces\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89060-1-2\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-1-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"lock-web\"><\/div>\n<h3 style=\"text-align: center; color: #b88d00;\"><a href=\"https:\/\/www.evidian.com\/fr\/produits\/web-sso\/\" target=\"_blank\" rel=\"noopener\">Web Access Manager<\/a><\/h3>\n<p style=\"text-align: center;\">Passerelle pour les applications Web avec SSO, authentification multifacteur, f\u00e9d\u00e9ration d'identit\u00e9<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/www.evidian.com\/fr\/produits\/web-sso\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89060-1-3\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-1-3-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"report\"><\/div>\n<h3 style=\"text-align: center; color: #a375ff;\"><a href=\"https:\/\/www.evidian.com\/fr\/produits\/evidian-identity-analytics-and-intelligence\/\" target=\"_blank\" rel=\"noopener\">Analytics<\/a><\/h3>\n<p style=\"text-align: center;\">Surveillance et rapports d\u00e9taill\u00e9s pour la conformit\u00e9 r\u00e9glementaire<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/www.evidian.com\/fr\/produits\/evidian-identity-analytics-and-intelligence\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-89060-2\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-89060-2\" ><div id=\"pgc-89060-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">Authentication Manager<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"lock-mfa\"><\/div>\n<h3 style=\"text-align: center; color: #ff5269;\"><a href=\"https:\/\/www.evidian.com\/fr\/produits\/authentification-manager\/\" target=\"_blank\" rel=\"noopener\">Authentication Manager<\/a><\/h3>\n<p style=\"text-align: center;\">Authentification multifacteur &amp; sans mot de passe sur les PCs Windows d'une entreprise<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/www.evidian.com\/fr\/produits\/authentification-manager\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89060-2-1\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-2-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"6\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"sso\"><\/div>\n<h3 style=\"text-align: center; color: #00a397;\"><a href=\"https:\/\/www.evidian.com\/fr\/produits\/evidian-enterprise-sso-authentification-unique\/\" target=\"_blank\" rel=\"noopener\">Enterprise Single Sign-On (SSO)<\/a><\/h3>\n<p style=\"text-align: center;\">Acc\u00e8s s\u00e9curis\u00e9 aux applications m\u00e9tiers et web sur les PCs &amp; mobiles avec le SSO<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/www.evidian.com\/fr\/produits\/evidian-enterprise-sso-authentification-unique\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89060-2-2\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-2-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"7\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"settings\"><\/div>\n<h3 style=\"text-align: center; color: #b88d00;\"><a href=\"https:\/\/www.evidian.com\/fr\/produits\/self-service-password-reset-sspr-pour-un-acces-durgence\/\" target=\"_blank\" rel=\"noopener\">Self Service\u00a0Password Reset (SSPR)<\/a><\/h3>\n<p style=\"text-align: center;\">R\u00e9initialisez les mots de passe Windows en ligne ou hors ligne<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/www.evidian.com\/fr\/produits\/self-service-password-reset-sspr-pour-un-acces-durgence\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89060-2-3\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-2-3-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"8\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"load-balancing\"><\/div>\n<h3 style=\"text-align: center; color: #a375ff;\"><a href=\"https:\/\/www.evidian.com\/fr\/produits\/haute-disponibilite-logiciel-clustering-application\/\" target=\"_blank\" rel=\"noopener\">SafeKit<\/a><\/h3>\n<p style=\"text-align: center;\">Logiciel de haute disponibilit\u00e9 pour les applications critiques<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/www.evidian.com\/fr\/produits\/haute-disponibilite-logiciel-clustering-application\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-89060-3\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-89060-3\" ><div id=\"pgc-89060-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-3-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"9\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h4 style=\"text-align: center;\"><a href=\"https:\/\/eviden.com\/fr-fr\/solutions\/securite-numerique\/\" target=\"_blank\" rel=\"noopener\">En savoir plus les solutions de s\u00e9curit\u00e9 num\u00e9rique d'Eviden &gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-88991-6\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-88991-6\" ><div id=\"pgc-88991-6-0\"  class=\"panel-grid-cell\" ><div id=\"panel-88991-6-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"7\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"88001\" class=\"insert-page insert-page-88001 \"><div id=\"pl-88001\"  class=\"panel-layout\" ><div id=\"pg-88001-0\"  class=\"panel-grid panel-has-style\" ><div class=\"product-title panel-row-style panel-row-style-for-88001-0\" ><div id=\"pgc-88001-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-88001-0-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-d4827573a77b-88001 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"1.5\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\tDocuments\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><div id=\"panel-88001-0-0-1\" class=\"so-panel widget widget_sow-button\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-64053071d55b-88001\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/flyers-iam-authentication-sso-web-sso-ha\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tBrochures &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88001-0-0-2\" class=\"so-panel widget widget_sow-button\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-64053071d55b-88001\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/white-papers-iam-authentication-sso-web-sso-ha\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tLivres blancs &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88001-0-0-3\" class=\"so-panel widget widget_sow-button\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-64053071d55b-88001\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/case-studies-iam-authentication-sso-web-sso-ha\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\t\u00c9tudes de cas &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88001-0-0-4\" class=\"so-panel widget widget_sow-button\" data-index=\"4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-64053071d55b-88001\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/videos-iam-authentication-sso-web-sso\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tVid\u00e9os &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88001-0-0-5\" class=\"so-panel widget widget_sow-button\" data-index=\"5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-64053071d55b-88001\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/tutorials\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tTutoriels &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88001-0-0-6\" class=\"so-panel widget widget_sow-button panel-last-child\" data-index=\"6\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-1fe5cba41710-88001\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/white-papers-iam-authentication-sso-web-sso-ha\/#analysts\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tAnalystes &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-88001-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-88001-0-1-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child\" data-index=\"7\" ><div id=\"pl-w67f7ade017b06\"  class=\"panel-layout\" ><div id=\"pg-w67f7ade017b06-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-w67f7ade017b06-0\" ><div id=\"pgc-w67f7ade017b06-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w67f7ade017b06-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"video-container\"><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/ULOuwwAqsIM?cc_lang_pref=en&amp;cc_load_policy=1\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-w67f7ade017b06-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-w67f7ade017b06-0-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"video-container\"><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/S5wozZSbyv0?si=wOJU3wuKYQXxvp1C\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-w67f7ade017b06-1\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-w67f7ade017b06-1\" ><div id=\"pgc-w67f7ade017b06-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w67f7ade017b06-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"video-container\"><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/gCb34XsUe-8?cc_lang_pref=fr&amp;cc_load_policy=1\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-w67f7ade017b06-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-w67f7ade017b06-1-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"video-container\"><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/Dx0viurJC4g\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"panel-88001-0-1-1\" class=\"so-panel widget widget_sow-button panel-last-child\" data-index=\"8\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-a4b98c5e5321-88001\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/fr\/documentations\/webinars-iam-sso-authentication-sspr-ha\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tWebinaire &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-88001-0-2\"  class=\"panel-grid-cell\" ><div id=\"panel-88001-0-2-0\" class=\"so-panel widget widget_sow-headline panel-first-child\" data-index=\"9\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-eb0b4f3610f3-88001 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"1.5\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\tSolutions\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><div id=\"panel-88001-0-2-1\" class=\"so-panel widget widget_sow-button\" data-index=\"10\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-5814dc63a0e1-88001\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/fr\/sante\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tSant\u00e9 &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88001-0-2-2\" class=\"so-panel widget widget_sow-button\" data-index=\"11\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-5814dc63a0e1-88001\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/fr\/finance\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tFinance &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88001-0-2-3\" class=\"so-panel widget widget_sow-button\" data-index=\"12\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-5814dc63a0e1-88001\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/fr\/gouvernement\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tGouvernement &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88001-0-2-4\" class=\"so-panel widget widget_sow-button\" data-index=\"13\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-5814dc63a0e1-88001\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/enterprise\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tIndustrie &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88001-0-2-5\" class=\"so-panel widget widget_sow-button\" data-index=\"14\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-5814dc63a0e1-88001\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/fr\/telecommunications\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tT\u00e9l\u00e9coms &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88001-0-2-6\" class=\"so-panel widget widget_sow-button panel-last-child\" data-index=\"15\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-1fe5cba41710-88001\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/fr\/solutions\/#app\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tApplications &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-88991-7\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-88991-7\" ><div id=\"pgc-88991-7-0\"  class=\"panel-grid-cell\" ><div id=\"panel-88991-7-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"8\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"82820\" class=\"insert-page insert-page-82820 \"><div id=\"pl-82820\"  class=\"panel-layout\" ><div id=\"pg-82820-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-82820-0\" ><div id=\"pgc-82820-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-82820-0-0-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-82820\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/fr\/societe\/contacter-evidian\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tNous contacter &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-82820-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-82820-0-1-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-82820\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/fr\/societe\/essai-gratuit\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tEssai gratuit &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-82820-0-2\"  class=\"panel-grid-cell\" ><div id=\"panel-82820-0-2-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-82820\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/fr\/societe\/demande-de-demonstration\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tDemander une d\u00e9mo &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-82820-0-3\"  class=\"panel-grid-cell\" ><div id=\"panel-82820-0-3-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-82820\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/fr\/societe\/obtenez-un-prix\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tObtenez un prix &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"Quels sont les outils et solutions de cybers\u00e9curit\u00e9 IAM\u00a0? 91 fournisseurs d'IAM ont \u00e9t\u00e9 \u00e9valu\u00e9s pour la protection de votre entreprise contre les cyberattaques par des utilisateurs non autoris\u00e9s","protected":false},"author":80,"featured_media":0,"parent":4712,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-full-screen.php","meta":{"_acf_changed":false,"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"class_list":["post-88991","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Quels sont les outils et solutions de cybers\u00e9curit\u00e9 IAM\u00a0? - Evidian<\/title>\n<meta name=\"description\" content=\"91 fournisseurs IAM ont \u00e9t\u00e9 \u00e9valu\u00e9s pour la protection de votre entreprise contre les cyberattaques par des utilisateurs non autoris\u00e9s.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.evidian.com\/fr\/documentations\/quels-sont-les-outils-et-solutions-de-cybersecurite-iam\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quels sont les outils et solutions de cybers\u00e9curit\u00e9 IAM\u00a0?\" \/>\n<meta property=\"og:description\" content=\"91 fournisseurs IAM ont \u00e9t\u00e9 \u00e9valu\u00e9s pour la protection de votre entreprise contre les cyberattaques par des utilisateurs non autoris\u00e9s.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.evidian.com\/fr\/documentations\/quels-sont-les-outils-et-solutions-de-cybersecurite-iam\/\" \/>\n<meta property=\"og:site_name\" content=\"Evidian\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-09T07:49:01+00:00\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/documentations\\\/quels-sont-les-outils-et-solutions-de-cybersecurite-iam\\\/\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/documentations\\\/quels-sont-les-outils-et-solutions-de-cybersecurite-iam\\\/\",\"name\":\"Quels sont les outils et solutions de cybers\u00e9curit\u00e9 IAM\u00a0? - Evidian\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/#website\"},\"datePublished\":\"2022-11-14T09:41:33+00:00\",\"dateModified\":\"2023-04-09T07:49:01+00:00\",\"description\":\"91 fournisseurs IAM ont \u00e9t\u00e9 \u00e9valu\u00e9s pour la protection de votre entreprise contre les cyberattaques par des utilisateurs non autoris\u00e9s.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/documentations\\\/quels-sont-les-outils-et-solutions-de-cybersecurite-iam\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.evidian.com\\\/fr\\\/documentations\\\/quels-sont-les-outils-et-solutions-de-cybersecurite-iam\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/documentations\\\/quels-sont-les-outils-et-solutions-de-cybersecurite-iam\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Evidian\",\"item\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Documentations\",\"item\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/documents\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quels sont les outils et solutions de cybers\u00e9curit\u00e9 IAM\u00a0?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/\",\"name\":\"Evidian\",\"description\":\"Set in menu above: SEO\\\/SEO Settings\\\/Title &amp; Metas\\\/Home\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/#organization\",\"name\":\"Evidian\",\"alternateName\":\"Evidian\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/evidian-new-blue-1.png\",\"contentUrl\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/evidian-new-blue-1.png\",\"width\":734,\"height\":200,\"caption\":\"Evidian\"},\"image\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/eviden-cybersecurity\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJKPuw2SDVNYUjZEJyLbIAA\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Quels sont les outils et solutions de cybers\u00e9curit\u00e9 IAM\u00a0? - Evidian","description":"91 fournisseurs IAM ont \u00e9t\u00e9 \u00e9valu\u00e9s pour la protection de votre entreprise contre les cyberattaques par des utilisateurs non autoris\u00e9s.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.evidian.com\/fr\/documentations\/quels-sont-les-outils-et-solutions-de-cybersecurite-iam\/","og_locale":"fr_FR","og_type":"article","og_title":"Quels sont les outils et solutions de cybers\u00e9curit\u00e9 IAM\u00a0?","og_description":"91 fournisseurs IAM ont \u00e9t\u00e9 \u00e9valu\u00e9s pour la protection de votre entreprise contre les cyberattaques par des utilisateurs non autoris\u00e9s.","og_url":"https:\/\/www.evidian.com\/fr\/documentations\/quels-sont-les-outils-et-solutions-de-cybersecurite-iam\/","og_site_name":"Evidian","article_modified_time":"2023-04-09T07:49:01+00:00","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.evidian.com\/fr\/documentations\/quels-sont-les-outils-et-solutions-de-cybersecurite-iam\/","url":"https:\/\/www.evidian.com\/fr\/documentations\/quels-sont-les-outils-et-solutions-de-cybersecurite-iam\/","name":"Quels sont les outils et solutions de cybers\u00e9curit\u00e9 IAM\u00a0? - Evidian","isPartOf":{"@id":"https:\/\/www.evidian.com\/fr\/#website"},"datePublished":"2022-11-14T09:41:33+00:00","dateModified":"2023-04-09T07:49:01+00:00","description":"91 fournisseurs IAM ont \u00e9t\u00e9 \u00e9valu\u00e9s pour la protection de votre entreprise contre les cyberattaques par des utilisateurs non autoris\u00e9s.","breadcrumb":{"@id":"https:\/\/www.evidian.com\/fr\/documentations\/quels-sont-les-outils-et-solutions-de-cybersecurite-iam\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.evidian.com\/fr\/documentations\/quels-sont-les-outils-et-solutions-de-cybersecurite-iam\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.evidian.com\/fr\/documentations\/quels-sont-les-outils-et-solutions-de-cybersecurite-iam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Evidian","item":"https:\/\/www.evidian.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Documentations","item":"https:\/\/www.evidian.com\/fr\/documents\/"},{"@type":"ListItem","position":3,"name":"Quels sont les outils et solutions de cybers\u00e9curit\u00e9 IAM\u00a0?"}]},{"@type":"WebSite","@id":"https:\/\/www.evidian.com\/fr\/#website","url":"https:\/\/www.evidian.com\/fr\/","name":"Evidian","description":"Set in menu above: SEO\/SEO Settings\/Title &amp; Metas\/Home","publisher":{"@id":"https:\/\/www.evidian.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.evidian.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.evidian.com\/fr\/#organization","name":"Evidian","alternateName":"Evidian","url":"https:\/\/www.evidian.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.evidian.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.evidian.com\/wp-content\/uploads\/2024\/01\/evidian-new-blue-1.png","contentUrl":"https:\/\/www.evidian.com\/wp-content\/uploads\/2024\/01\/evidian-new-blue-1.png","width":734,"height":200,"caption":"Evidian"},"image":{"@id":"https:\/\/www.evidian.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/showcase\/eviden-cybersecurity\/","https:\/\/www.youtube.com\/channel\/UCJKPuw2SDVNYUjZEJyLbIAA"]}]}},"_links":{"self":[{"href":"https:\/\/www.evidian.com\/fr\/wp-json\/wp\/v2\/pages\/88991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.evidian.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.evidian.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.evidian.com\/fr\/wp-json\/wp\/v2\/users\/80"}],"replies":[{"embeddable":true,"href":"https:\/\/www.evidian.com\/fr\/wp-json\/wp\/v2\/comments?post=88991"}],"version-history":[{"count":0,"href":"https:\/\/www.evidian.com\/fr\/wp-json\/wp\/v2\/pages\/88991\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.evidian.com\/fr\/wp-json\/wp\/v2\/pages\/4712"}],"wp:attachment":[{"href":"https:\/\/www.evidian.com\/fr\/wp-json\/wp\/v2\/media?parent=88991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}