{"id":1930,"date":"2023-10-30T17:28:40","date_gmt":"2023-10-30T16:28:40","guid":{"rendered":"http:\/\/ipsip.eu\/?page_id=1930"},"modified":"2024-11-07T16:50:47","modified_gmt":"2024-11-07T15:50:47","slug":"pam-bastion","status":"publish","type":"page","link":"https:\/\/ipsip.eu\/en\/pam-bastion\/","title":{"rendered":"Cybers\u00e9curit\u00e9 &#8211; PAM \/ BASTION"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"1930\" class=\"elementor elementor-1930\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8969ded elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"8969ded\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;shape_divider_bottom&quot;:&quot;opacity-tilt&quot;}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 2600 131.1\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M0 0L2600 0 2600 69.1 0 0z\"\/>\n\t<path class=\"elementor-shape-fill\" style=\"opacity:0.5\" d=\"M0 0L2600 0 2600 69.1 0 69.1z\"\/>\n\t<path class=\"elementor-shape-fill\" style=\"opacity:0.25\" d=\"M2600 0L0 0 0 130.1 2600 69.1z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-96f685d elementor-invisible\" data-id=\"96f685d\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-289eaa7 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"289eaa7\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1><strong>PAM \/ BASTION<\/strong><\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a23c5f9 elementor-widget elementor-widget-text-editor\" data-id=\"a23c5f9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>PAM or Privileged Access Management is a security solution which helps to manage privileged access to systems and applications. It allows organizations to control all user actions including who can access what and how the navigation is used.<\/p><p>BASTION is a security solution specifically designed and configured to protect your systems and applications against critical attacks. It is deployed from an external network and serves as a unique access point for authorized users and applications.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a5ecd14 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"a5ecd14\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-narrow\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-0d67034 elementor-invisible\" data-id=\"0d67034\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:10}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ec47bd elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"4ec47bd\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/#contact\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">I need this solution<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-52bfab6 elementor-invisible\" data-id=\"52bfab6\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-df1ca6b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no elementor-invisible\" data-id=\"df1ca6b\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-a0d5938 elementor-invisible\" data-id=\"a0d5938\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ebb5d3 elementor-widget elementor-widget-image\" data-id=\"2ebb5d3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2023\/10\/shield-check-2-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-870\" alt=\"IoT Supervision\" srcset=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2023\/10\/shield-check-2-150x150.png 150w, https:\/\/ipsip.eu\/wp-content\/uploads\/2023\/10\/shield-check-2-12x12.png 12w, https:\/\/ipsip.eu\/wp-content\/uploads\/2023\/10\/shield-check-2.png 256w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d146d0b elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"d146d0b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><span style=\"color: #051347;\"><b>Monitoring to protect the future of your network starts now<\/b><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7add030 elementor-widget elementor-widget-text-editor\" data-id=\"7add030\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To excel; rest easy and let our experts monitor your network security on a 24\/7 basis.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7aaed7a elementor-align-center elementor-widget elementor-widget-button\" data-id=\"7aaed7a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/noc\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fb2d3bb elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"fb2d3bb\" data-element_type=\"section\" id=\"savoir\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2c3fb2f\" data-id=\"2c3fb2f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd33b3d elementor-widget elementor-widget-heading\" data-id=\"dd33b3d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why are PAM and BASTION important ?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2eb769 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"b2eb769\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Regarding regulatory compliance, the use of a bastion and a Privileged Access Manager can respond to certain requirements including personal data protection and data system security. Nevertheless, these tools are not sufficient to ensure regulatory compliance. It is necessary to implement a global security policy and to respect current regulations in the field of information security.<\/p><p>Regarding regulatory compliance, the use of a bastion and a Privileged Access Manager can help meet certain requirements, such as the protection of personal data and the security of information systems. However, it's important to note that these tools alone are not sufficient to ensure regulatory compliance. It is necessary to establish a comprehensive security policy and adhere to the regulations in force in the field of IT security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b229ced elementor-align-center elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"b229ced\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"\/#contact\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get advice<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0caa960 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"0caa960\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5c7afdd\" data-id=\"5c7afdd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2cc2db9 elementor-widget elementor-widget-heading\" data-id=\"2cc2db9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>PAM &amp; BASTION, the protection for criticial systems<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4d7891 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"e4d7891\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Implementing a bastion and a Privileged Access Manager reinforces the security of the IT system by restricting access to sensitive resources to only authorized users. The bastion is used as a unique and secure entry point for system administrators and privileged users, while the Privileged Access Manager controls and monitors access to sensible resources.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9793f28\" data-id=\"9793f28\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5050cbe elementor-section-full_width elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no elementor-invisible\" data-id=\"5050cbe\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e39fa41 elementor-invisible\" data-id=\"e39fa41\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-db00c95 elementor-widget elementor-widget-image\" data-id=\"db00c95\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2023\/10\/shield-check-2-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-870\" alt=\"IoT Supervision\" srcset=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2023\/10\/shield-check-2-150x150.png 150w, https:\/\/ipsip.eu\/wp-content\/uploads\/2023\/10\/shield-check-2-12x12.png 12w, https:\/\/ipsip.eu\/wp-content\/uploads\/2023\/10\/shield-check-2.png 256w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49f874e elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"49f874e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><span style=\"color: #051347;\"><b>24\/7 monitoring for your network<\/b><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a88917 elementor-widget elementor-widget-text-editor\" data-id=\"2a88917\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We continuously monitor the performance, service continuity and the integration of your IT infrastructure 24 hours a day, 7 days per week.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-445dae4 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"445dae4\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"\/noc\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a824a3b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"a824a3b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;shape_divider_top&quot;:&quot;opacity-tilt&quot;,&quot;shape_divider_bottom&quot;:&quot;opacity-tilt&quot;}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 2600 131.1\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M0 0L2600 0 2600 69.1 0 0z\"\/>\n\t<path class=\"elementor-shape-fill\" style=\"opacity:0.5\" d=\"M0 0L2600 0 2600 69.1 0 69.1z\"\/>\n\t<path class=\"elementor-shape-fill\" style=\"opacity:0.25\" d=\"M2600 0L0 0 0 130.1 2600 69.1z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 2600 131.1\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M0 0L2600 0 2600 69.1 0 0z\"\/>\n\t<path class=\"elementor-shape-fill\" style=\"opacity:0.5\" d=\"M0 0L2600 0 2600 69.1 0 69.1z\"\/>\n\t<path class=\"elementor-shape-fill\" style=\"opacity:0.25\" d=\"M2600 0L0 0 0 130.1 2600 69.1z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-166f196\" data-id=\"166f196\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fbee3e8 elementor-widget elementor-widget-text-editor\" data-id=\"fbee3e8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Do you want to explore other options ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1b1471e elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"1b1471e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3044cd3\" data-id=\"3044cd3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca47774 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"ca47774\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-fire\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01f98bf elementor-widget elementor-widget-text-editor\" data-id=\"01f98bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>FIREWALL<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d92b2c2 elementor-widget elementor-widget-text-editor\" data-id=\"d92b2c2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Security for physical and virtual infrastructures, on-site or in the cloud.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ef5348 elementor-align-center elementor-mobile-align-center elementor-absolute elementor-widget elementor-widget-button\" data-id=\"9ef5348\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"\/firewall\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a1530fc\" data-id=\"a1530fc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0aafa06 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"0aafa06\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fab fa-creative-commons-share\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c529a8d elementor-widget elementor-widget-text-editor\" data-id=\"c529a8d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>NDR<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7308dd7 elementor-widget elementor-widget-text-editor\" data-id=\"7308dd7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity strategies enable timely detection and response to network-based threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74c3ff8 elementor-align-center elementor-mobile-align-center elementor-absolute elementor-widget elementor-widget-button\" data-id=\"74c3ff8\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"\/ndr\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7a437cf elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"7a437cf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b8ef2f6\" data-id=\"b8ef2f6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e7e51a4 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"e7e51a4\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fab fa-searchengin\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-150ddc9 elementor-widget elementor-widget-text-editor\" data-id=\"150ddc9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Domain protection<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1aa9449 elementor-widget elementor-widget-text-editor\" data-id=\"1aa9449\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Attacks prevention: malicious domain names are blacklisted as upon detection.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cb9327 elementor-align-center elementor-mobile-align-center elementor-absolute elementor-widget elementor-widget-button\" data-id=\"5cb9327\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"\/protection-noms-domaine\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ddf0133\" data-id=\"ddf0133\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2fdf955 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"2fdf955\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-lightbulb\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1f2e22 elementor-widget elementor-widget-text-editor\" data-id=\"e1f2e22\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>XDR<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a281b0d elementor-widget elementor-widget-text-editor\" data-id=\"a281b0d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity strategy, focusing on endpoints, enables timely detection and response to threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e87d235 elementor-align-center elementor-mobile-align-center elementor-absolute elementor-widget elementor-widget-button\" data-id=\"e87d235\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"\/xdr\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5fd574c elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"5fd574c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2fea3b9 elementor-invisible\" data-id=\"2fea3b9\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c2e4a50 elementor-widget elementor-widget-text-editor\" data-id=\"c2e4a50\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Are you ready to take your security to the next level ?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cea3b4b elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"cea3b4b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\" class=\" translation-block\"><b>Contact us right from today to transform your vision into tailored technological reality.<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be929e2 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"be929e2\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"\/#contact\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get in touch with IPSIP<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-69ec9b5 elementor-invisible\" data-id=\"69ec9b5\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-05a966a premium-lottie-svg elementor-widget elementor-widget-premium-lottie\" data-id=\"05a966a\" data-element_type=\"widget\" data-settings=\"{&quot;lottie_file&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/ipsip.eu\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/04640dab-dcdb-4f3c-acf4-7615dd82ca3d-2.json&quot;,&quot;id&quot;:625,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;&quot;,&quot;source&quot;:&quot;library&quot;}}\" data-widget_type=\"premium-lottie.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"premium-lottie-animation\" data-lottie-url=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2023\/05\/04640dab-dcdb-4f3c-acf4-7615dd82ca3d-2.json\" data-lottie-loop=\"true\" data-lottie-reverse=\"\" data-lottie-hover=\"\" data-lottie-speed=\"0.7\" data-lottie-render=\"svg\" data-lottie-delay=\"\">\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>PAM \/ BASTION Le PAM, ou Privileged Access Management, est une solution de s\u00e9curit\u00e9 qui permet de g\u00e9rer les acc\u00e8s privil\u00e9gi\u00e9s aux syst\u00e8mes et aux applications. Il permet de contr\u00f4ler qui a acc\u00e8s \u00e0 quoi et comment cet acc\u00e8s est utilis\u00e9. Le BASTION est une solution de s\u00e9curit\u00e9 permettant de prot\u00e9ger les syst\u00e8mes et les applications critiques. Il est g\u00e9n\u00e9ralement d\u00e9ploy\u00e9 \u00e0 l&rsquo;ext\u00e9rieur du r\u00e9seau d&rsquo;entreprise, et il sert de point d&rsquo;acc\u00e8s unique pour les utilisateurs et les applications autoris\u00e9s. J&rsquo;ai besoin de cette solution La supervision commence maintenant pour prot\u00e9ger l&rsquo;avenir de votre r\u00e9seau Pour aller plus loin, confiez-nous la s\u00e9curit\u00e9 de votre r\u00e9seau avec une surveillance 24h\/24 et 7j\/7 En savoir + Pourquoi le PAM et le BASTION sont-ils importants ? Le PAM et le BASTION sont importants pour la s\u00e9curit\u00e9 des syst\u00e8mes et des applications critiques. Ils permettent de prot\u00e9ger les acc\u00e8s privil\u00e9gi\u00e9s, souvent utilis\u00e9s par les pirates pour lancer des attaques. Il existe de nombreuses solutions de PAM et de BASTION disponibles sur le march\u00e9. Il est important de choisir une solution r\u00e9pondant \u00e0 vos besoins sp\u00e9cifiques. En ce qui concerne la conformit\u00e9 r\u00e9glementaire, l&rsquo;utilisation d&rsquo;un bastion et d&rsquo;un Privileged Access Manager peut aider \u00e0 r\u00e9pondre \u00e0 certaines exigences telles que la protection des donn\u00e9es personnelles et la s\u00e9curit\u00e9 des syst\u00e8mes d&rsquo;information. Cependant, il est important de noter que ces outils ne suffisent pas \u00e0 eux seuls pour garantir la conformit\u00e9 r\u00e9glementaire. Il est n\u00e9cessaire de mettre en place une politique de s\u00e9curit\u00e9 globale et de respecter les r\u00e9glementations en vigueur dans le domaine de la s\u00e9curit\u00e9 informatique. J&rsquo;ai besoin de conseils PAM &amp; BASTION, la protection des syst\u00e8mes critiques Mettre en place un bastion et un Privileged Access Manager permet de renforcer la s\u00e9curit\u00e9 du syst\u00e8me d&rsquo;information en limitant l&rsquo;acc\u00e8s aux ressources sensibles uniquement aux utilisateurs autoris\u00e9s. Le bastion sert de point d&rsquo;entr\u00e9e unique et s\u00e9curis\u00e9 pour les administrateurs syst\u00e8me et les utilisateurs \u00e0 privil\u00e8ges, tandis que le Privileged Access Manager permet de contr\u00f4ler et de surveiller l&rsquo;acc\u00e8s aux ressources sensibles. Supervision 24\/7 pour votre r\u00e9seau Nous supervisons les performances, la continuit\u00e9 de service et l&rsquo;int\u00e9grit\u00e9 de votre infrastructure IT en continu, 24h\/24, 7j\/7. En savoir + Voulez-vous explorer d&rsquo;autres options ? FIREWALL S\u00e9curit\u00e9 des infrastructures physiques, virtuelles, sur site ou dans le cloud. D\u00e9couvrir NDR D\u00e9tection des menaces, r\u00e9ponses et s\u00e9curisation des r\u00e9seaux. D\u00e9couvrir Protection des noms de domaine Anticipation des attaques : les noms de domaines malveillants sont blacklist\u00e9s d\u00e8s leurs cr\u00e9ations. D\u00e9couvrir XDR D\u00e9tection des menaces, r\u00e9ponses et s\u00e9curisation des postes de travail. D\u00e9couvrir Alors, \u00eates-vous pr\u00eat \u00e0 passer au niveau sup\u00e9rieur de la s\u00e9curit\u00e9 ? Contactez-nous d\u00e8s aujourd&rsquo;hui pour transformer votre vision en une r\u00e9alit\u00e9 technologique sur mesure. Je prends contact avec IPSIP<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1930","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PAM \/ BASTION - IPSIP Group<\/title>\n<meta name=\"description\" content=\"Renforcez la s\u00e9curit\u00e9 de votre infrastructure en g\u00e9rant efficacement les acc\u00e8s privil\u00e9gi\u00e9s et en s\u00e9curisant les points d&#039;acc\u00e8s sensibles.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ipsip.eu\/en\/pam-bastion\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PAM \/ BASTION - IPSIP Group\" \/>\n<meta property=\"og:description\" content=\"Renforcez la s\u00e9curit\u00e9 de votre infrastructure en g\u00e9rant efficacement les acc\u00e8s privil\u00e9gi\u00e9s et en s\u00e9curisant les points d&#039;acc\u00e8s sensibles.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ipsip.eu\/en\/pam-bastion\/\" \/>\n<meta property=\"og:site_name\" content=\"Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\/7, solutions IT\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-07T15:50:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2023\/10\/shield-check-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"256\" \/>\n\t<meta property=\"og:image:height\" content=\"256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/pam-bastion\\\/\",\"url\":\"https:\\\/\\\/ipsip.eu\\\/pam-bastion\\\/\",\"name\":\"PAM \\\/ BASTION - IPSIP Group\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/pam-bastion\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/pam-bastion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ipsip.eu\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/shield-check-2-150x150.png\",\"datePublished\":\"2023-10-30T16:28:40+00:00\",\"dateModified\":\"2024-11-07T15:50:47+00:00\",\"description\":\"Renforcez la s\u00e9curit\u00e9 de votre infrastructure en g\u00e9rant efficacement les acc\u00e8s privil\u00e9gi\u00e9s et en s\u00e9curisant les points d'acc\u00e8s sensibles.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ipsip.eu\\\/pam-bastion\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/pam-bastion\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ipsip.eu\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/shield-check-2-150x150.png\",\"contentUrl\":\"https:\\\/\\\/ipsip.eu\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/shield-check-2-150x150.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/#website\",\"url\":\"https:\\\/\\\/ipsip.eu\\\/\",\"name\":\"Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\\\/7, solutions IT\",\"description\":\"Make IT Easy\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ipsip.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PAM \/ BASTION - IPSIP Group","description":"Renforcez la s\u00e9curit\u00e9 de votre infrastructure en g\u00e9rant efficacement les acc\u00e8s privil\u00e9gi\u00e9s et en s\u00e9curisant les points d'acc\u00e8s sensibles.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ipsip.eu\/en\/pam-bastion\/","og_locale":"en_GB","og_type":"article","og_title":"PAM \/ BASTION - IPSIP Group","og_description":"Renforcez la s\u00e9curit\u00e9 de votre infrastructure en g\u00e9rant efficacement les acc\u00e8s privil\u00e9gi\u00e9s et en s\u00e9curisant les points d'acc\u00e8s sensibles.","og_url":"https:\/\/ipsip.eu\/en\/pam-bastion\/","og_site_name":"Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\/7, solutions IT","article_modified_time":"2024-11-07T15:50:47+00:00","og_image":[{"width":256,"height":256,"url":"https:\/\/ipsip.eu\/wp-content\/uploads\/2023\/10\/shield-check-2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ipsip.eu\/pam-bastion\/","url":"https:\/\/ipsip.eu\/pam-bastion\/","name":"PAM \/ BASTION - IPSIP Group","isPartOf":{"@id":"https:\/\/ipsip.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ipsip.eu\/pam-bastion\/#primaryimage"},"image":{"@id":"https:\/\/ipsip.eu\/pam-bastion\/#primaryimage"},"thumbnailUrl":"https:\/\/ipsip.eu\/wp-content\/uploads\/2023\/10\/shield-check-2-150x150.png","datePublished":"2023-10-30T16:28:40+00:00","dateModified":"2024-11-07T15:50:47+00:00","description":"Renforcez la s\u00e9curit\u00e9 de votre infrastructure en g\u00e9rant efficacement les acc\u00e8s privil\u00e9gi\u00e9s et en s\u00e9curisant les points d'acc\u00e8s sensibles.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ipsip.eu\/pam-bastion\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ipsip.eu\/pam-bastion\/#primaryimage","url":"https:\/\/ipsip.eu\/wp-content\/uploads\/2023\/10\/shield-check-2-150x150.png","contentUrl":"https:\/\/ipsip.eu\/wp-content\/uploads\/2023\/10\/shield-check-2-150x150.png"},{"@type":"WebSite","@id":"https:\/\/ipsip.eu\/#website","url":"https:\/\/ipsip.eu\/","name":"Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\/7, solutions IT","description":"Make IT Easy","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ipsip.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/pages\/1930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/comments?post=1930"}],"version-history":[{"count":61,"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/pages\/1930\/revisions"}],"predecessor-version":[{"id":8009,"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/pages\/1930\/revisions\/8009"}],"wp:attachment":[{"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/media?parent=1930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}