{"id":233275,"date":"2023-10-04T09:13:59","date_gmt":"2023-10-04T07:13:59","guid":{"rendered":"https:\/\/www.evidian.com\/?page_id=233275"},"modified":"2023-10-04T16:39:29","modified_gmt":"2023-10-04T14:39:29","slug":"interview-david-leporini","status":"publish","type":"page","link":"https:\/\/www.evidian.com\/fr\/interview-david-leporini\/","title":{"rendered":"Interview David Leporini - Garantir les bons acc\u00e8s aux bonnes personnes"},"content":{"rendered":"<div id=\"pl-233275\"  class=\"panel-layout\" ><div id=\"pg-233275-0\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-233275-0\" data-stretch-type=\"full-stretched\" ><div id=\"pgc-233275-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-233275-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h1 style=\"color: black; font-size: 32px;\">Interview de David Leporini - Garantir les bons acc\u00e8s aux bonnes personnes<\/h1>\n<p style=\"color: black;\">Dans cette interview, David Leporini, directeur des produits Cyber IAM et directeur g\u00e9n\u00e9ral d'Evidian, \u00e9voque les changements majeurs affectant le march\u00e9 de la cybers\u00e9curit\u00e9 et l'approche d'Evidian en mati\u00e8re de gestion des identit\u00e9s et des acc\u00e8s (IAM).<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"color: black;\">Paru dans Informations Entreprise N\u00b0188 Octobre, Novembre, D\u00e9cembre 2023<\/h2>\n<p style=\"color: black;\">La gestion des identit\u00e9s et des acc\u00e8s devient la pierre angulaire des syst\u00e8mes d\u2019information modernes. Evidian, fleuron fran\u00e7ais de la technologie, allie expertise et innovation, au service d\u2019un monde en pleine mutation.<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-233275-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-0-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div class=\"panel-widget-style panel-widget-style-for-233275-0-1-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><img decoding=\"async\" src=\"https:\/\/www.evidian.com\/wp-content\/smush-webp\/2023\/10\/david-leporini.jpg.webp\" alt=\"David Leporini\" width=\"1031\" height=\"1038\"\/><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-233275-1\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-233275-1\" data-stretch-type=\"full-stretched\" ><div id=\"pgc-233275-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"2\" ><div class=\"panel-widget-style panel-widget-style-for-233275-1-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #000000;\"><strong>Informations Entreprise<\/strong> : Pouvez-vous nous \u00e9clairer sur les principaux changements qui ont affect\u00e9 le march\u00e9 de la cybers\u00e9curit\u00e9\u00a0?<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>David Leporini (Directeur Produits Cyber <\/strong><strong>IAM &amp; Directeur G\u00e9n\u00e9ral d\u2019Evidian)<\/strong> : L\u2019\u00e9volution du march\u00e9 de la gestion des identit\u00e9s et des acc\u00e8s est inexorablement boulevers\u00e9e par plusieurs dynamiques. La premi\u00e8re, \u00e0 ne pas n\u00e9gliger, est l\u2019impact de la pand\u00e9mie sur le monde professionnel. Le t\u00e9l\u00e9travail, d\u00e9j\u00e0 existant mais confidentiel en termes d\u2019\u00e9chelle, a connu une acc\u00e9l\u00e9ration sans pr\u00e9c\u00e9dent, obligeant les entreprises \u00e0 reconsid\u00e9rer leurs protocoles de s\u00e9curit\u00e9 en termes de connexions \u00e0 distance.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-233275-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-1-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div class=\"panel-widget-style panel-widget-style-for-233275-1-1-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #000000;\">Les entreprises s\u2019\u00e9taient structur\u00e9es autour d\u2019un p\u00e9rim\u00e8tre de s\u00e9curit\u00e9 interne, prot\u00e9g\u00e9 par des firewalls et des VPN. Mais cette conception a c\u00e9d\u00e9 la place \u00e0 des architectures plus complexes. D\u00e9sormais, employ\u00e9s et partenaires tiers doivent acc\u00e9der \u00e0 des applications professionnelles \u00e0 partir de localisations diverses, hors du r\u00e9seau interne de l\u2019entreprise, y compris par des voies qui ne transitent pas n\u00e9cessairement par ce r\u00e9seau. Cela introduit une complexit\u00e9 accrue dans la gestion des identit\u00e9s et des acc\u00e8s.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-233275-1-2\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-1-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"4\" ><div class=\"panel-widget-style panel-widget-style-for-233275-1-2-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #000000;\">De surcro\u00eet, le paysage r\u00e9glementaire se densifie. La Directive Europ\u00e9enne NIS 2, par exemple, \u00e9tend les exigences en mati\u00e8re de s\u00e9curit\u00e9, et rentrera en vigueur en France au plus tard en octobre 2024. Cette directive impose aux entreprises de formaliser davantage leurs politiques relatives \u00e0 l\u2019analyse des risques, d\u2019acc\u00e9l\u00e9rer le traitement et la divulgation des vuln\u00e9rabilit\u00e9s, et d\u2019am\u00e9liorer le traitement des incidents de s\u00e9curit\u00e9, en particulier la d\u00e9tection et la r\u00e9ponse aux incidents.<\/span><\/p>\n<p><span style=\"color: #000000;\">Concernant la souverainet\u00e9, notamment en France, il est ind\u00e9niable que le contr\u00f4le des donn\u00e9es rev\u00eat une importance cruciale. Le chiffrement est souvent \u00e9voqu\u00e9 comme m\u00e9canisme de premier ordre pour garantir cette souverainet\u00e9, mais il ne peut \u00eatre dissoci\u00e9 d\u2019un syst\u00e8me robuste de gestion des identit\u00e9s et des acc\u00e8s.<\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-233275-2\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-233275-2\" data-stretch-type=\"full-stretched\" ><div id=\"pgc-233275-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"5\" ><div class=\"panel-widget-style panel-widget-style-for-233275-2-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #000000;\"><strong>I.E\u00a0:<\/strong> Pourriez-vous \u00e9voquer les principaux d\u00e9fis et opportunit\u00e9s que vous identifiez dans l\u2019\u00e9volution actuelle du march\u00e9 de la gestion des identit\u00e9s et des acc\u00e8s ?<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>David Leporini\u00a0:<\/strong> Dans le paysage complexe de la gestion des identit\u00e9s et des acc\u00e8s au sein des syst\u00e8mes d\u2019information de l\u2019entreprise, deux grandes cat\u00e9gories de projets ont vu le jour. D\u2019une part, il y a le d\u00e9sir strat\u00e9gique de r\u00e9tablir la ma\u00eetrise int\u00e9grale sur les identit\u00e9s, qu\u2019il s\u2019agisse des employ\u00e9s, des consultants ou d\u2019autres partenaires qui interagissent avec les donn\u00e9es de l\u2019entreprise. En effet, les m\u00e9thodes ant\u00e9rieures, souvent manuelles et peu document\u00e9es, ont montr\u00e9 leurs limites.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-233275-2-1\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-2-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"6\" ><div class=\"panel-widget-style panel-widget-style-for-233275-2-1-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #000000;\">Dans cette optique, le r\u00f4le de solutions telles que les syst\u00e8mes de gouvernance des identit\u00e9s, notamment ceux bas\u00e9s sur l\u2019IGA (Identity Governance and Administration), est crucial. Ces syst\u00e8mes permettent la gestion automatis\u00e9e du cycle de vie des utilisateurs, des permissions et des r\u00f4les au sein de l\u2019entreprise. Ils offrent \u00e9galement des m\u00e9canismes d\u2019audit, de reporting et de tableau de bord pour une vue d\u2019ensemble.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-233275-2-2\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-2-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"7\" ><div class=\"panel-widget-style panel-widget-style-for-233275-2-2-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #000000;\">Ce type de d\u00e9marche n\u00e9cessite une coordination \u00e9troite avec toutes les fonctions de l\u2019entreprise. Les processus de ressources humaines, notamment en mati\u00e8re d\u2019arriv\u00e9es et de changements organisationnels, doivent \u00eatre parfaitement int\u00e9gr\u00e9s. De m\u00eame, il faut pr\u00eater une attention particuli\u00e8re aux mutations internes, aux int\u00e9grations de collaborateurs externes et \u00e0 l\u2019\u00e9volution des r\u00f4les et permissions au sein de l\u2019organisation. Certaines r\u00e9glementations imposent par ailleurs la s\u00e9paration des fonctions afin d\u2019\u00e9viter des conflits d\u2019int\u00e9r\u00eats ou des abus potentiels.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-233275-3\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-233275-3\" data-stretch-type=\"full-stretched\" ><div id=\"pgc-233275-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-3-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"8\" ><div class=\"panel-widget-style panel-widget-style-for-233275-3-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #000000;\"><strong>I.E\u00a0:<\/strong> Pourriez-vous nous \u00e9clairer sur la mani\u00e8re dont Evidian aborde la gestion des identit\u00e9s et des acc\u00e8s\u00a0?<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>David Leporini :<\/strong> La gestion rigoureuse des <\/span><span style=\"color: #000000;\">identit\u00e9s et des acc\u00e8s s\u2019av\u00e8re indispensable. <\/span><span style=\"color: #000000;\">Notre d\u00e9marche consiste d\u2019abord \u00e0 \u00e9tablir <\/span><span style=\"color: #000000;\">la politique de s\u00e9curit\u00e9 de l\u2019entreprise au <\/span><span style=\"color: #000000;\">tour de r\u00e8gles organisationnelles et op\u00e9ra<\/span><span style=\"color: #000000;\">tionnelles pr\u00e9cises qui encadrent la gestion <\/span><span style=\"color: #000000;\">des permissions. Nous d\u00e9veloppons ce que <\/span><span style=\"color: #000000;\">l\u2019on pourrait qualifier de \u00abworkflows d\u2019ap<\/span><span style=\"color: #000000;\">probation\u00bb pour r\u00e9glementer les acc\u00e8s sur <\/span><span style=\"color: #000000;\">des crit\u00e8res hi\u00e9rarchiques ou op\u00e9rationnels <\/span><span style=\"color: #000000;\">li\u00e9s \u00e0 des projets sp\u00e9cifiques.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-233275-3-1\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-3-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"9\" ><div class=\"panel-widget-style panel-widget-style-for-233275-3-1-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #000000;\">Notre syst\u00e8me, tel une tour de contr\u00f4le, mo<\/span><span style=\"color: #000000;\">d\u00e9lise ainsi l\u2019ensemble des processus de s\u00e9<\/span><span style=\"color: #000000;\">curit\u00e9 en rapport avec les autorisations d\u2019ac<\/span><span style=\"color: #000000;\">c\u00e8s au sein de l\u2019entreprise. Ce socle solide <\/span><span style=\"color: #000000;\">garantit qu\u2019\u00e0 tout instant, chaque utilisateur <\/span><span style=\"color: #000000;\">ait acc\u00e8s uniquement aux donn\u00e9es et appli<\/span><span style=\"color: #000000;\">cations strictement n\u00e9cessaires \u00e0 l\u2019exercice <\/span><span style=\"color: #000000;\">de ses fonctions. Une fois cette base \u00e9tablie, nous pouvons alors d\u00e9ployer des r\u00e8gles de <\/span><span style=\"color: #000000;\">s\u00e9curit\u00e9 suppl\u00e9mentaires pour renforcer les <\/span><span style=\"color: #000000;\">protocoles d\u2019authentification, conform\u00e9<\/span><span style=\"color: #000000;\">ment aux politiques de s\u00e9curit\u00e9.<\/span><\/p>\n<p><span style=\"color: #000000;\">Par ailleurs, il faut souligner que la gou<\/span><span style=\"color: #000000;\">vernance ne s\u2019arr\u00eate pas \u00e0 la mise en place <\/span><span style=\"color: #000000;\">de ces processus. Des audits r\u00e9guliers sont <\/span><span style=\"color: #000000;\">effectu\u00e9s pour contr\u00f4ler les acc\u00e8s et identi<\/span><span style=\"color: #000000;\">fier les \u00e9carts ou exceptions qui pourraient <\/span><span style=\"color: #000000;\">survenir. En fait, l\u2019exception est plut\u00f4t la <\/span><span style=\"color: #000000;\">r\u00e8gle dans notre milieu. Que ce soit un <\/span><span style=\"color: #000000;\">projet cr\u00e9ant des acc\u00e8s hors des processus <\/span><span style=\"color: #000000;\">habituels, ou des employ\u00e9s utilisant leurs <\/span><span style=\"color: #000000;\">propres \u00e9quipements, notre outil permet de <\/span><span style=\"color: #000000;\">surveiller et de ramener ces cas sous gou<\/span><span style=\"color: #000000;\">vernance.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-233275-3-2\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-3-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"10\" ><div class=\"panel-widget-style panel-widget-style-for-233275-3-2-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #000000;\">Ind\u00e9pendamment de ces revues, notre sys<\/span><span style=\"color: #000000;\">t\u00e8me peut g\u00e9n\u00e9rer des alertes en temps r\u00e9el <\/span><span style=\"color: #000000;\">en cas de non-conformit\u00e9 aux politiques <\/span><span style=\"color: #000000;\">de s\u00e9curit\u00e9 \u00e9tablies. Cela peut aller de l\u2019au<\/span><span style=\"color: #000000;\">thentification renforc\u00e9e pour des acc\u00e8s ex<\/span><span style=\"color: #000000;\">ternes \u00e0 l\u2019entreprise jusqu\u2019\u00e0 des m\u00e9canismes <\/span><span style=\"color: #000000;\">d\u2019identification sp\u00e9cifiques, pilot\u00e9s par nos <\/span><span style=\"color: #000000;\">politiques de s\u00e9curit\u00e9 globales.<\/span><\/p>\n<p><span style=\"color: #000000;\">Enfin, notre produit int\u00e8gre \u00e9galement des <\/span><span style=\"color: #000000;\">fonctionnalit\u00e9s analytiques permettant de <\/span><span style=\"color: #000000;\">g\u00e9n\u00e9rer des rapports r\u00e9guliers sur l\u2019appli<\/span><span style=\"color: #000000;\">cation des politiques en place, offrant ainsi <\/span><span style=\"color: #000000;\">une visibilit\u00e9 compl\u00e8te sur la conformit\u00e9 et <\/span><span style=\"color: #000000;\">les exceptions, et garantissant le maintien <\/span><span style=\"color: #000000;\">des standards de s\u00e9curit\u00e9 d\u00e9finis.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-233275-4\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-233275-4\" data-stretch-type=\"full-stretched\" ><div id=\"pgc-233275-4-0\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-4-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"11\" ><div class=\"panel-widget-style panel-widget-style-for-233275-4-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #000000;\"><strong>I.E\u00a0:<\/strong> Quelle est l\u2019\u00e9volution que vous observez dans les modes de d\u00e9ploiement\u00a0?<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>David Leporini :<\/strong> Indubitablement, l\u2019\u00e9volution du march\u00e9 de la gestion des identit\u00e9s et des acc\u00e8s est un sujet pr\u00e9pond\u00e9rant qui n\u00e9cessite de supporter plusieurs approches de d\u00e9ploiement et d\u2019exploitation.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-233275-4-1\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-4-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"12\" ><div class=\"panel-widget-style panel-widget-style-for-233275-4-1-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #000000;\">Historiquement, nos solutions ont \u00e9t\u00e9 d\u00e9ploy\u00e9es selon deux modalit\u00e9s essentielles. Premi\u00e8rement, le mod\u00e8le traditionnel o\u00f9 le client accueille la solution en ses propres infrastructures, g\u00e9rant d\u00e8s lors le produit en toute autonomie. C\u2019est une option qui, bien entendu, subsiste encore aujourd\u2019hui.<\/span><\/p>\n<p><span style=\"color: #000000;\">Deuxi\u00e8mement, un mod\u00e8le dans lequel le client opte pour un d\u00e9ploiement hors site, confiant la gestion du produit \u00e0 nos \u00e9quipes ou \u00e0 des h\u00e9bergeurs tiers, souvent en collaboration avec les \u00e9quipes de cybers\u00e9curit\u00e9 d\u2019Eviden, Groupe Atos. Cette m\u00e9thode a \u00e9galement fait ses preuves.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-233275-4-2\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-4-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"13\" ><div class=\"panel-widget-style panel-widget-style-for-233275-4-2-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #000000;\">Toutefois, une troisi\u00e8me voie s\u2019est fray\u00e9e un chemin au sein de notre gamme d\u2019offres au cours des derni\u00e8res ann\u00e9es. Il s\u2019agit du mod\u00e8le SaaS, qui permet aux entreprises de se concentrer sur l\u2019utilisation fonctionnelle de nos solutions sans les tracas inh\u00e9rents au d\u00e9ploiement et \u00e0 l\u2019h\u00e9bergement. Bien que ce mod\u00e8le ne soit pas universellement applicable \u2014 certains secteurs, notamment la d\u00e9fense et les infrastructures critiques, de meurent encore r\u00e9ticents \u2014 il est de plus en<\/span><br \/>\n<span style=\"color: #000000;\">plus pl\u00e9biscit\u00e9, notamment dans un mod\u00e8le de d\u00e9ploiement logiciel.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-233275-5\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-233275-5\" data-stretch-type=\"full-stretched\" ><div id=\"pgc-233275-5-0\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-5-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"14\" ><div class=\"panel-widget-style panel-widget-style-for-233275-5-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #000000;\"><strong>I.E :<\/strong> Comment Evidian s\u2019adapte-t-elle \u00e0 la dynamique des start-ups am\u00e9ricaines et aux innovations technologiques ?<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>David Leporini\u00a0:<\/strong> Notre march\u00e9 se caract\u00e9rise par une certaine maturit\u00e9, attest\u00e9e par des mouvements de consolidation, mais \u00e9galement par une effervescence continue, particuli\u00e8rement outre-Atlantique et en Isra\u00ebl, o\u00f9 les financements affluent vers les start-ups sp\u00e9cialis\u00e9es dans des th\u00e9matiques novatrices. Bien que les principes fondamentaux de la s\u00e9curit\u00e9 demeurent constants, les modalit\u00e9s d\u2019acc\u00e8s et d\u2019administration \u00e9voluent en raison des innovations technologiques, notamment l\u2019av\u00e8nement du cloud et des mod\u00e8les SaaS<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-233275-5-1\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-5-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"15\" ><div class=\"panel-widget-style panel-widget-style-for-233275-5-1-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #000000;\">Evidian, forte de plus de 900 clients actifs \u00e0 <\/span><span style=\"color: #000000;\">travers le monde, ne saurait demeurer im<\/span><span style=\"color: #000000;\">mobile face \u00e0 ce tableau changeant. Notre <\/span><span style=\"color: #000000;\">strat\u00e9gie s\u2019appuie autant sur l\u2019innovation <\/span><span style=\"color: #000000;\">que sur la fid\u00e9lisation de notre base ins<\/span><span style=\"color: #000000;\">tall\u00e9e. Nous nous investissons notamment <\/span><span style=\"color: #000000;\">dans des projets de R&amp;D financ\u00e9s \u00e0 l\u2019\u00e9chelle <\/span><span style=\"color: #000000;\">fran\u00e7aise et europ\u00e9enne, ax\u00e9s sur l\u2019exploita<\/span><span style=\"color: #000000;\">tion de l\u2019intelligence artificielle pour auto<\/span><span style=\"color: #000000;\">matiser davantage de processus, ou encore <\/span><span style=\"color: #000000;\">sur le d\u00e9veloppement des identit\u00e9s num\u00e9<\/span><span style=\"color: #000000;\">riques souveraines. Ces derni\u00e8res ouvrent <\/span><span style=\"color: #000000;\">la voie \u00e0 de nouveaux mod\u00e8les de contr\u00f4le <\/span><span style=\"color: #000000;\">des attributs d\u2019identit\u00e9s par les utilisateurs <\/span><span style=\"color: #000000;\">eux-m\u00eames.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-233275-5-2\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-5-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"16\" ><div class=\"panel-widget-style panel-widget-style-for-233275-5-2-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #000000;\"><strong>I.E :<\/strong> Quels sont les enjeux et les r\u00e9ussites d\u2019Evidian en termes de rayonnement international ?<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>David Leporini\u00a0:<\/strong> Il serait erron\u00e9 de pr\u00e9sumer que l\u2019anciennet\u00e9 d\u2019une entreprise fran\u00e7aise puisse constituer un frein \u00e0 son expansion internationale. Au contraire, nous avons l\u2019honneur de compter parmi nos clients une entit\u00e9 japonaise, un pays dans lequel nous avons d\u00e9ploy\u00e9 l\u2019une des plus vastes infrastructures en mati\u00e8re de gouvernance des identit\u00e9s. Il s\u2019agit d\u2019un partenariat de longue date avec Nippon Telegraph and Telephone, ou NTT, qui a vu le d\u00e9ploiement d\u2019une solution pour plus de 350 000 utilisateurs. Cette r\u00e9f\u00e9rence est indubitablement une carte de visite de premier ordre pour notre entreprise, surtout en Asie et au Japon.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-233275-6\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-233275-6\" ><div id=\"pgc-233275-6-0\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-6-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"17\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"89060\" class=\"insert-page insert-page-89060 \"><div id=\"pl-89060\"  class=\"panel-layout\" ><div id=\"pg-89060-0\"  class=\"panel-grid panel-has-style\" ><div class=\"product-title panel-row-style panel-row-style-for-89060-0\" ><div id=\"pgc-89060-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-0-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-74628e590a2c-89060 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"1.5\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\t<a name=\"all-products\"><\/a>Produits Evidian - Prot\u00e9gez votre entreprise des cyberattaques par des utilisateurs non autoris\u00e9s\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-89060-1\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-89060-1\" ><div id=\"pgc-89060-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"users-cloud\"><\/div>\n<h3  style=\"text-align: center; color: #ff5269;\"><a href=\"https:\/\/www.evidian.com\/fr\/produits\/idaas-identity-and-access-management-as-a-service\/\" target=\"_blank\" rel=\"noopener\">Orbion\u00a0<\/a><\/h3>\n<p style=\"text-align: center;\">Evidian s'occupe de tout ce qui concerne votre gestion des identit\u00e9s et des acc\u00e8s avec Orbion (Identit\u00e9 en tant que service)<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/www.evidian.com\/fr\/produits\/idaas-identity-and-access-management-as-a-service\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89060-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-1-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"users\"><\/div>\n<h3 style=\"text-align: center; color: #00a397;\"><a href=\"https:\/\/www.evidian.com\/fr\/produits\/identity-governance-and-administration-pour-la-gestion-des-identites-des-habilitations-et-des-acces\/\" target=\"_blank\" rel=\"noopener\">Identity Governance and Administration<\/a><\/h3>\n<p style=\"text-align: center;\">G\u00e9rez les acc\u00e8s et les autorisations de tous vos utilisateurs dans votre entreprise<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/www.evidian.com\/fr\/produits\/identity-governance-and-administration-pour-la-gestion-des-identites-des-habilitations-et-des-acces\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89060-1-2\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-1-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"lock-web\"><\/div>\n<h3 style=\"text-align: center; color: #b88d00;\"><a href=\"https:\/\/www.evidian.com\/fr\/produits\/web-sso\/\" target=\"_blank\" rel=\"noopener\">Web Access Manager<\/a><\/h3>\n<p style=\"text-align: center;\">Passerelle pour les applications Web avec SSO, authentification multifacteur, f\u00e9d\u00e9ration d'identit\u00e9<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/www.evidian.com\/fr\/produits\/web-sso\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89060-1-3\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-1-3-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"report\"><\/div>\n<h3 style=\"text-align: center; color: #a375ff;\"><a href=\"https:\/\/www.evidian.com\/fr\/produits\/evidian-identity-analytics-and-intelligence\/\" target=\"_blank\" rel=\"noopener\">Analytics<\/a><\/h3>\n<p style=\"text-align: center;\">Surveillance et rapports d\u00e9taill\u00e9s pour la conformit\u00e9 r\u00e9glementaire<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/www.evidian.com\/fr\/produits\/evidian-identity-analytics-and-intelligence\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-89060-2\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-89060-2\" ><div id=\"pgc-89060-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">Authentication Manager<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"lock-mfa\"><\/div>\n<h3 style=\"text-align: center; color: #ff5269;\"><a href=\"https:\/\/www.evidian.com\/fr\/produits\/authentification-manager\/\" target=\"_blank\" rel=\"noopener\">Authentication Manager<\/a><\/h3>\n<p style=\"text-align: center;\">Authentification multifacteur &amp; sans mot de passe sur les PCs Windows d'une entreprise<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/www.evidian.com\/fr\/produits\/authentification-manager\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89060-2-1\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-2-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"6\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"sso\"><\/div>\n<h3 style=\"text-align: center; color: #00a397;\"><a href=\"https:\/\/www.evidian.com\/fr\/produits\/evidian-enterprise-sso-authentification-unique\/\" target=\"_blank\" rel=\"noopener\">Enterprise Single Sign-On (SSO)<\/a><\/h3>\n<p style=\"text-align: center;\">Acc\u00e8s s\u00e9curis\u00e9 aux applications m\u00e9tiers et web sur les PCs &amp; mobiles avec le SSO<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/www.evidian.com\/fr\/produits\/evidian-enterprise-sso-authentification-unique\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89060-2-2\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-2-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"7\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"settings\"><\/div>\n<h3 style=\"text-align: center; color: #b88d00;\"><a href=\"https:\/\/www.evidian.com\/fr\/produits\/self-service-password-reset-sspr-pour-un-acces-durgence\/\" target=\"_blank\" rel=\"noopener\">Self Service\u00a0Password Reset (SSPR)<\/a><\/h3>\n<p style=\"text-align: center;\">R\u00e9initialisez les mots de passe Windows en ligne ou hors ligne<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/www.evidian.com\/fr\/produits\/self-service-password-reset-sspr-pour-un-acces-durgence\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89060-2-3\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-2-3-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"8\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"load-balancing\"><\/div>\n<h3 style=\"text-align: center; color: #a375ff;\"><a href=\"https:\/\/www.evidian.com\/fr\/produits\/haute-disponibilite-logiciel-clustering-application\/\" target=\"_blank\" rel=\"noopener\">SafeKit<\/a><\/h3>\n<p style=\"text-align: center;\">Logiciel de haute disponibilit\u00e9 pour les applications critiques<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/www.evidian.com\/fr\/produits\/haute-disponibilite-logiciel-clustering-application\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-89060-3\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-89060-3\" ><div id=\"pgc-89060-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-89060-3-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"9\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h4 style=\"text-align: center;\"><a href=\"https:\/\/eviden.com\/fr-fr\/solutions\/securite-numerique\/\" target=\"_blank\" rel=\"noopener\">En savoir plus les solutions de s\u00e9curit\u00e9 num\u00e9rique d'Eviden &gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-233275-7\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-233275-7\" ><div id=\"pgc-233275-7-0\"  class=\"panel-grid-cell\" ><div id=\"panel-233275-7-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"18\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"82820\" class=\"insert-page insert-page-82820 \"><div id=\"pl-82820\"  class=\"panel-layout\" ><div id=\"pg-82820-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-82820-0\" ><div id=\"pgc-82820-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-82820-0-0-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-82820\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/fr\/societe\/contacter-evidian\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tNous contacter &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-82820-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-82820-0-1-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-82820\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/fr\/societe\/essai-gratuit\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tEssai gratuit &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-82820-0-2\"  class=\"panel-grid-cell\" ><div id=\"panel-82820-0-2-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-82820\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/fr\/societe\/demande-de-demonstration\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tDemander une d\u00e9mo &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-82820-0-3\"  class=\"panel-grid-cell\" ><div id=\"panel-82820-0-3-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-82820\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/fr\/societe\/obtenez-un-prix\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tObtenez un prix &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"Interview de David Leporini - Garantir les bons acc\u00e8s aux bonnes personnes Dans cette interview, David Leporini, directeur des produits Cyber IAM et directeur g\u00e9n\u00e9ral d'Evidian, \u00e9voque les changements majeurs affectant le march\u00e9 de la cybers\u00e9curit\u00e9 et l'approche d'Evidian en mati\u00e8re de gestion des identit\u00e9s et des acc\u00e8s (IAM). &nbsp; &nbsp; Paru dans Informations Entreprise [&hellip;]","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"home-page-full-screen.php","meta":{"_acf_changed":false,"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"class_list":["post-233275","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Interview David Leporini - Garantir les bons acc\u00e8s aux bonnes personnes - Evidian<\/title>\n<meta name=\"description\" content=\"Interview de David Leporini, directeur des produits Cyber IAM et directeur g\u00e9n\u00e9ral d&#039;Evidian sur le march\u00e9 de la cybers\u00e9curit\u00e9\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Interview David Leporini - Garantir les bons acc\u00e8s aux bonnes personnes\" \/>\n<meta property=\"og:description\" content=\"Interview de David Leporini, directeur des produits Cyber IAM et directeur g\u00e9n\u00e9ral d&#039;Evidian sur le march\u00e9 de la cybers\u00e9curit\u00e9\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.evidian.com\/fr\/interview-david-leporini\/\" \/>\n<meta property=\"og:site_name\" content=\"Evidian\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-04T14:39:29+00:00\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/interview-david-leporini\\\/\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/interview-david-leporini\\\/\",\"name\":\"Interview David Leporini - Garantir les bons acc\u00e8s aux bonnes personnes - Evidian\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/interview-david-leporini\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/interview-david-leporini\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/david-leporini.jpg\",\"datePublished\":\"2023-10-04T07:13:59+00:00\",\"dateModified\":\"2023-10-04T14:39:29+00:00\",\"description\":\"Interview de David Leporini, directeur des produits Cyber IAM et directeur g\u00e9n\u00e9ral d'Evidian sur le march\u00e9 de la cybers\u00e9curit\u00e9\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/interview-david-leporini\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.evidian.com\\\/fr\\\/interview-david-leporini\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/interview-david-leporini\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/david-leporini.jpg\",\"contentUrl\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/david-leporini.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/interview-david-leporini\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Evidian\",\"item\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interview David Leporini - Garantir les bons acc\u00e8s aux bonnes personnes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/\",\"name\":\"Evidian\",\"description\":\"Set in menu above: SEO\\\/SEO Settings\\\/Title &amp; Metas\\\/Home\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/#organization\",\"name\":\"Evidian\",\"alternateName\":\"Evidian\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/evidian-new-blue-1.png\",\"contentUrl\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/evidian-new-blue-1.png\",\"width\":734,\"height\":200,\"caption\":\"Evidian\"},\"image\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/eviden-cybersecurity\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJKPuw2SDVNYUjZEJyLbIAA\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Interview David Leporini - Garantir les bons acc\u00e8s aux bonnes personnes - Evidian","description":"Interview de David Leporini, directeur des produits Cyber IAM et directeur g\u00e9n\u00e9ral d'Evidian sur le march\u00e9 de la cybers\u00e9curit\u00e9","robots":{"index":"noindex","follow":"follow"},"og_locale":"fr_FR","og_type":"article","og_title":"Interview David Leporini - Garantir les bons acc\u00e8s aux bonnes personnes","og_description":"Interview de David Leporini, directeur des produits Cyber IAM et directeur g\u00e9n\u00e9ral d'Evidian sur le march\u00e9 de la cybers\u00e9curit\u00e9","og_url":"https:\/\/www.evidian.com\/fr\/interview-david-leporini\/","og_site_name":"Evidian","article_modified_time":"2023-10-04T14:39:29+00:00","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.evidian.com\/fr\/interview-david-leporini\/","url":"https:\/\/www.evidian.com\/fr\/interview-david-leporini\/","name":"Interview David Leporini - Garantir les bons acc\u00e8s aux bonnes personnes - Evidian","isPartOf":{"@id":"https:\/\/www.evidian.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.evidian.com\/fr\/interview-david-leporini\/#primaryimage"},"image":{"@id":"https:\/\/www.evidian.com\/fr\/interview-david-leporini\/#primaryimage"},"thumbnailUrl":"https:\/\/www.evidian.com\/wp-content\/uploads\/2023\/10\/david-leporini.jpg","datePublished":"2023-10-04T07:13:59+00:00","dateModified":"2023-10-04T14:39:29+00:00","description":"Interview de David Leporini, directeur des produits Cyber IAM et directeur g\u00e9n\u00e9ral d'Evidian sur le march\u00e9 de la cybers\u00e9curit\u00e9","breadcrumb":{"@id":"https:\/\/www.evidian.com\/fr\/interview-david-leporini\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.evidian.com\/fr\/interview-david-leporini\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.evidian.com\/fr\/interview-david-leporini\/#primaryimage","url":"https:\/\/www.evidian.com\/wp-content\/uploads\/2023\/10\/david-leporini.jpg","contentUrl":"https:\/\/www.evidian.com\/wp-content\/uploads\/2023\/10\/david-leporini.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.evidian.com\/fr\/interview-david-leporini\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Evidian","item":"https:\/\/www.evidian.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Interview David Leporini - Garantir les bons acc\u00e8s aux bonnes personnes"}]},{"@type":"WebSite","@id":"https:\/\/www.evidian.com\/fr\/#website","url":"https:\/\/www.evidian.com\/fr\/","name":"Evidian","description":"Set in menu above: SEO\/SEO Settings\/Title &amp; Metas\/Home","publisher":{"@id":"https:\/\/www.evidian.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.evidian.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.evidian.com\/fr\/#organization","name":"Evidian","alternateName":"Evidian","url":"https:\/\/www.evidian.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.evidian.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.evidian.com\/wp-content\/uploads\/2024\/01\/evidian-new-blue-1.png","contentUrl":"https:\/\/www.evidian.com\/wp-content\/uploads\/2024\/01\/evidian-new-blue-1.png","width":734,"height":200,"caption":"Evidian"},"image":{"@id":"https:\/\/www.evidian.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/showcase\/eviden-cybersecurity\/","https:\/\/www.youtube.com\/channel\/UCJKPuw2SDVNYUjZEJyLbIAA"]}]}},"_links":{"self":[{"href":"https:\/\/www.evidian.com\/fr\/wp-json\/wp\/v2\/pages\/233275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.evidian.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.evidian.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.evidian.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.evidian.com\/fr\/wp-json\/wp\/v2\/comments?post=233275"}],"version-history":[{"count":0,"href":"https:\/\/www.evidian.com\/fr\/wp-json\/wp\/v2\/pages\/233275\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.evidian.com\/fr\/wp-json\/wp\/v2\/media?parent=233275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}