{"id":37584,"date":"2023-12-14T11:39:58","date_gmt":"2023-12-14T10:39:58","guid":{"rendered":"https:\/\/www.wallix.com\/?p=37584"},"modified":"2026-02-10T14:02:12","modified_gmt":"2026-02-10T13:02:12","slug":"cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/fr\/blogpost\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\/","title":{"rendered":"Cybers\u00e9curit\u00e9 et sant\u00e9 : Le r\u00f4le crucial du PAM"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_two_third  avia-builder-el-first   container_wrap fullsize'  ><div  class='avia-slideshow av-lq52f43q-9cc1d2055acddcc055ada8ee60bdddf9 avia-slideshow-entry_without_sidebar av_slideshow_full avia-slide-slider av-slideshow-ui av-control-default av-slideshow-manual av-loop-once av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 56.25%;'><li  class='avia-slideshow-slide av-lq52f43q-9cc1d2055acddcc055ada8ee60bdddf9__0  slide-1 slide-odd'><div data-rel='slideshow-1' class='avia-slide-wrap '   ><img decoding=\"async\" fetchpriority=\"high\" class=\"wp-image-13313 avia-img-lazy-loading-not-13313\"  src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/01\/healthcare-it-equipment-cybersecurity-e1728036395921.jpg\" width=\"752\" height=\"423\" title='healthcare-it-equipment-cybersecurity' alt='healthcare-it-equipment-cybersecurity'  itemprop=\"thumbnailUrl\"   \/><\/div><\/li><li  class='avia-slideshow-slide av-lq52f43q-9cc1d2055acddcc055ada8ee60bdddf9__1  slide-2 slide-even'><div data-rel='slideshow-1' class='avia-slide-wrap '  title='A neon blue filament forming a digital shield, a symbol of digital security.' ><img decoding=\"async\" fetchpriority=\"high\" class=\"wp-image-77602 avia-img-lazy-loading-not-77602\"  src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/12\/AdobeStock_1279291061-1210x423.jpeg\" width=\"1210\" height=\"423\" title='Healthcare security in digital world. Abstract design featuring medical icons, shield symbol. Data protection, patient privacy, secure network concepts, software confidentiality, encryption tech. Pro' alt='A neon blue filament forming a digital shield, a symbol of digital security.'  itemprop=\"thumbnailUrl\"   \/><\/div><\/li><\/ul><div class='avia-slideshow-arrows avia-slideshow-controls' ><a href='#prev' class='prev-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='left-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Pr\u00e9c\u00e9dent\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-1' aria-describedby='av-svg-desc-1' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-1'>Pr\u00e9c\u00e9dent<\/title>\n<desc id='av-svg-desc-1'>Pr\u00e9c\u00e9dent<\/desc>\n<path d=\"M14.464 27.84q0.832 0.832 0 1.536-0.832 0.832-1.536 0l-12.544-12.608q-0.768-0.768 0-1.6l12.544-12.608q0.704-0.832 1.536 0 0.832 0.704 0 1.536l-11.456 11.904z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Pr\u00e9c\u00e9dent<\/span><\/a><a href='#next' class='next-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Suivant\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-2' aria-describedby='av-svg-desc-2' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-2'>Suivant<\/title>\n<desc id='av-svg-desc-2'>Suivant<\/desc>\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Suivant<\/span><\/a><\/div><div class='avia-slideshow-dots avia-slideshow-controls'><a href='#1' class='goto-slide active' >1<\/a><a href='#2' class='goto-slide ' >2<\/a><\/div><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-37584'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1\">\n#top .flex_column_table.av-equal-height-column-flextable.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\nmargin-top:-600px;\nmargin-bottom:0;\n}\n.flex_column.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1 av_two_third  avia-builder-el-1  el_after_av_slideshow_full  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lq52g8v9-7a63bd724cebf3a1c73da9552497df8f\">\n#top .av-special-heading.av-lq52g8v9-7a63bd724cebf3a1c73da9552497df8f{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lq52g8v9-7a63bd724cebf3a1c73da9552497df8f .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lq52g8v9-7a63bd724cebf3a1c73da9552497df8f .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lq52g8v9-7a63bd724cebf3a1c73da9552497df8f av-special-heading-h1 blockquote modern-quote  avia-builder-el-2  el_before_av_post_metadata  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Cybers\u00e9curit\u00e9 et sant\u00e9 : Pourquoi le PAM doit \u00eatre une priorit\u00e9<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<div  class='av-post-metadata-container av-av_post_metadata-36bcf33e90f22125c019c70beb35c7b9 av-metadata-container-align-left  avia-builder-el-3  el_after_av_heading  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\">by<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/author\/alex\/\"  rel=\"author\">WALLIX<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-post-metadata-modified-date\" >10 F\u00e9vrier 2026<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-category\"><span class=\"av-metadata-before av-metadata-before-categories\">in<\/span><span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/\" >BLOGPOST<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/gestion-des-acces-a-privileges-fr\/\" >GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/sante-fr-2\/\" >SANT\u00c9<\/a><\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-av_hr-bca31578670ae9d408d6d6d291fc57a6 hr-default  avia-builder-el-4  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-lq52hi7f-c3632d72ad3727355eaa42b3777e3fe6 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Les \u00e9v\u00e9nements de 2020 ont d\u00e9montr\u00e9 que les organismes de sant\u00e9 doivent travailler dans un contexte de changement constant. En plus des changements dans le paysage de la sant\u00e9 publique, ils doivent \u00e9galement se pr\u00e9parer \u00e0 l&rsquo;\u00e9volution des menaces de cybers\u00e9curit\u00e9.<\/p>\n<p>Qu&rsquo;il s&rsquo;agisse d&rsquo;une menace interne, d&rsquo;un piratage externe ou de la n\u00e9gligence d&rsquo;un employ\u00e9, toutes les menaces list\u00e9es ci-dessous repr\u00e9sentent des risques s\u00e9rieux pour les organismes de sant\u00e9 :<\/p>\n<ul>\n<li>Logiciels malveillants et ransomware<\/li>\n<li>Attaques DDoS<\/li>\n<li>Violations de donn\u00e9es personnelles<\/li>\n<li>Phishing<\/li>\n<\/ul>\n<p>Le milieu de la sant\u00e9 n&rsquo;est pas le seul \u00e0 devoir prot\u00e9ger les donn\u00e9es sensibles contre ces menaces. Cependant, la nature de ce secteur en fait une cible de premier plan qui a beaucoup \u00e0 perdre en cas d\u2019attaque. Ce blog explore les raisons de cette r\u00e9alit\u00e9 et explique \u00e9galement pourquoi la gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM) est la meilleure forme de d\u00e9fense.<\/p>\n<h2><strong><span style=\"color: #f4813a;\">Pourquoi les hackers ciblent-ils les organismes de sant\u00e9 ?<\/span><\/strong><\/h2>\n<p>Comme tous les secteurs, la sant\u00e9 a d\u00fb s&rsquo;adapter \u00e0 l&rsquo;\u00e8re du num\u00e9rique. L&rsquo;utilisation des donn\u00e9es \u00e9lectroniques de sant\u00e9 personnelles (ePHI) s&rsquo;est accrue et les progr\u00e8s technologiques ont \u00e9t\u00e9 rapides. Les terminaux mobiles et les portails web en libre-service ont apport\u00e9 de la commodit\u00e9 aux patients. Et si l&rsquo;on tient compte de la migration du stockage des donn\u00e9es des patients dans le cloud et de l&rsquo;augmentation du nombre d&rsquo;appareils IoT, on commence \u00e0 dresser le tableau d&rsquo;un r\u00e9seau complexe et connect\u00e9.<\/p>\n<p>Ces avanc\u00e9es technologiques ont toutes le pouvoir de transformer les soins de sant\u00e9 pour le mieux. Mais elles entrainent aussi une large augmentation de la surface d&rsquo;attaque pour les hackers. Malheureusement, les h\u00f4pitaux disposent souvent de logiciels obsol\u00e8tes et non support\u00e9s, et souffrent d&rsquo;une p\u00e9nurie de comp\u00e9tences en cybers\u00e9curit\u00e9. Cela augmente leur attrait pour les pirates informatiques.<\/p>\n<p>Les enjeux sont \u00e9lev\u00e9s lorsqu&rsquo;il s&rsquo;agit de violations de donn\u00e9es dans le secteur de la sant\u00e9. La confidentialit\u00e9 des patients est depuis longtemps un pilier central de la m\u00e9decine, ce qui rend ces donn\u00e9es particuli\u00e8rement sensibles. Et les organismes de sant\u00e9 traitent ces donn\u00e9es sensibles \u00e0 grande \u00e9chelle. Les dossiers des patients ont une grande valeur sur le dark web et le march\u00e9 noir : un dossier m\u00e9dical peut rapporter autant que des donn\u00e9es de carte de cr\u00e9dit vol\u00e9es.<\/p>\n<h3><span style=\"color: #f4813a;\"><strong>Le co\u00fbt des failles de s\u00e9curit\u00e9 pour les organismes de sant\u00e9<\/strong><\/span><\/h3>\n<p>Les organismes de sant\u00e9 qui investissent dans une cybers\u00e9curit\u00e9 avanc\u00e9e ont beaucoup \u00e0 gagner. Selon une \u00e9tude de l&rsquo;<a href=\"https:\/\/www-03.ibm.com\/press\/us\/en\/pressrelease\/52643.wss\" target=\"_blank\" rel=\"noopener\">Institut Ponemon<\/a>, une violation de donn\u00e9es dans le secteur de la sant\u00e9 co\u00fbte en moyenne 380 dollars par dossier. C&rsquo;est plus de 2,5 fois la moyenne mondiale, tous secteurs confondus. Cependant, la nature du secteur de la sant\u00e9 signifie que les ramifications peuvent aller au-del\u00e0 des pertes financi\u00e8res et des atteintes \u00e0 la vie priv\u00e9e.<\/p>\n<p>Dans le monde de la sant\u00e9, les pertes de donn\u00e9es peuvent entrainer une v\u00e9ritable question de vie ou de mort. La perte de notes m\u00e9dicales ou de l&rsquo;acc\u00e8s \u00e0 une unit\u00e9 d&rsquo;\u00e9quipement vital peut avoir de graves cons\u00e9quences pour un patient. Des recherches men\u00e9es par l&rsquo;Universit\u00e9 de Floride ont montr\u00e9 que les violations de donn\u00e9es augmentaient le taux de mortalit\u00e9 dans un h\u00f4pital. La n\u00e9cessit\u00e9 de reformer le personnel, de mettre \u00e0 niveau les logiciels et d&rsquo;apporter d&rsquo;autres changements op\u00e9rationnels peut d\u00e9tourner l&rsquo;attention port\u00e9e aux soins des patients.<\/p>\n<p>De plus, les organismes de sant\u00e9 peuvent encourir de lourdes sanctions en cas de non-respect des r\u00e9glementations en mati\u00e8re de s\u00e9curit\u00e9, telles que le RGPD, HIPAA, et HITECH. Le contr\u00f4le des acc\u00e8s \u00e0 privil\u00e8ges est un \u00e9l\u00e9ment cl\u00e9 des mesures de s\u00e9curit\u00e9 attendues. La gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM) offre le moyen le plus efficace de se conformer aux r\u00e9glementations et de prot\u00e9ger les organismes de sant\u00e9 contre les violations massives de donn\u00e9es.<\/p>\n<h3><span style=\"color: #f4813a;\"><strong>Comment le PAM peut prot\u00e9ger les organismes de sant\u00e9<\/strong><\/span><\/h3>\n<p>La surveillance et l&rsquo;audit de l&rsquo;acc\u00e8s aux syst\u00e8mes peuvent \u00eatre un vrai d\u00e9fi avec le roulement des employ\u00e9s et les grandes quantit\u00e9s de syst\u00e8mes et de donn\u00e9es \u00e0 priivl\u00e8ges. Le nombre et la nature distribu\u00e9e des utilisateurs au sein d&rsquo;un organisme de sant\u00e9 rendent difficile leur gestion et leur surveillance efficaces. Plus un syst\u00e8me est grand et complexe, plus il faut d&rsquo;utilisateurs \u00e0 privil\u00e8ges. Les utilisateurs \u00e0 privil\u00e8ges peuvent comprendre :<\/p>\n<ul>\n<li>Des employ\u00e9s<\/li>\n<li>Des fournisseurs externes<\/li>\n<li>H\u00e9bergeurs Cloud<\/li>\n<li>Utilisateurs de machines automatis\u00e9es<\/li>\n<li>Des contractants tiers<\/li>\n<\/ul>\n<p>Un syst\u00e8me de gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM) tel que <strong>WALLIX Bastion <\/strong>s\u00e9curise les comptes \u00e0 privil\u00e8ges et permet aux organismes de sant\u00e9 de se prot\u00e9ger de mani\u00e8re proactive. Le contr\u00f4le des acc\u00e8s \u00e0 privil\u00e8ges limite les mouvements qu&rsquo;un pirate peut effectuer une fois qu&rsquo;il est entr\u00e9 sur le r\u00e9seau. Cela r\u00e9duit consid\u00e9rablement leur capacit\u00e9 \u00e0 se d\u00e9placer lat\u00e9ralement dans ce r\u00e9seau et \u00e0 acc\u00e9der aux syst\u00e8mes sensibles.<\/p>\n<p>Avec les bonnes pratiques de s\u00e9curisation des acc\u00e8s \u00e0 privil\u00e8ges, la capacit\u00e9 d&rsquo;un hacker \u00e0 \u00e9lever ses privil\u00e8ges et \u00e0 acc\u00e9der \u00e0 des informations confidentielles telles que les dossiers des patients sera consid\u00e9rablement r\u00e9duite.<\/p>\n<h3><span style=\"color: #f4813a;\"><strong>Il est temps d&rsquo;investir dans le PAM !<\/strong><\/span><\/h3>\n<p>De nombreux h\u00f4pitaux ont \u00e9t\u00e9 victimes de divers syst\u00e8mes de cryptage de fichiers et d&rsquo;extorsion de donn\u00e9es. Par exemple, l&rsquo;attaque par ransomware <a href=\"https:\/\/www.england.nhs.uk\/wp-content\/uploads\/2018\/02\/lessons-learned-review-wannacry-ransomware-cyber-attack-cio-review.pdf\" target=\"_blank\" rel=\"noopener\">WannaCry de 2017<\/a> a plong\u00e9 le NHS britannique dans le chaos. Des milliers d&rsquo;ordinateurs hospitaliers et d&rsquo;\u00e9quipements de diagnostic ont \u00e9t\u00e9 d\u00e9tourn\u00e9s, obligeant les m\u00e9decins \u00e0 reporter manuellement les r\u00e9sultats de laboratoire et \u00e0 annuler pr\u00e8s de 20000 rendez-vous.<\/p>\n<p>Dans d&rsquo;autres cas, les dossiers des patients ont fait l&rsquo;objet de fuites publiques, ont \u00e9t\u00e9 pr\u00e9sum\u00e9s compromis, crypt\u00e9s et m\u00eame supprim\u00e9s. Les m\u00e9thodes d&rsquo;attaque de ces incidents de piratage sont vari\u00e9es et il n&rsquo;existe pas de solution unique au probl\u00e8me. Cependant, de nombreuses attaques reposent sur un acc\u00e8s Administrateur pour \u00eatre ex\u00e9cut\u00e9es &#8211; et ces attaques sont rendues beaucoup plus difficiles avec un syst\u00e8me PAM en place.<\/p>\n<p><strong>WALLIX Bastion<\/strong> offre une surveillance, un enregistrement et une isolation complets de toutes les sessions d&rsquo;utilisateurs \u00e0 privil\u00e8ges. Cela contribue \u00e0 la conformit\u00e9 r\u00e9glementaire en donnant aux organismes de sant\u00e9 une preuve document\u00e9e et v\u00e9rifiable de leurs efforts pour prot\u00e9ger l&rsquo;acc\u00e8s \u00e0 privil\u00e8ges. Lorsque le comportement des utilisateurs \u00e0 privil\u00e8ges est surveill\u00e9 et g\u00e9r\u00e9 par un syst\u00e8me de PAM, les donn\u00e9es des organismes de sant\u00e9 deviennent plus s\u00fbres. C&rsquo;est pourquoi la PAM doit devenir une priorit\u00e9 !<\/p>\n<p><span style=\"color: #f37300;\"><strong>Apprenez-en plus sur la s\u00e9curisation des acc\u00e8s \u00e0 privil\u00e8ges des organismes de sant\u00e9 avec WALLIX Bastion.<\/strong><\/span><\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36\">\n#top .flex_column_table.av-equal-height-column-flextable.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\nmargin-top:-600px;\nmargin-bottom:0;\n}\n.flex_column.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36 av_one_third  avia-builder-el-6  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-av_social_share-0a73d8854da5c7c5d5ad87c7877e27c0 av-social-sharing-box-default  avia-builder-el-7  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Partager cet article<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Partager sur X\" href='https:\/\/twitter.com\/share?text=Cybers%C3%A9curit%C3%A9%20et%20sant%C3%A9%20%3A%20Le%20r%C3%B4le%20crucial%20du%20PAM&#038;url=https:\/\/www.wallix.com\/fr\/?p=37584' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager sur X'><span class='avia_hidden_link_text'>Partager sur X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Partager sur LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Cybers%C3%A9curit%C3%A9%20et%20sant%C3%A9%20%3A%20Le%20r%C3%B4le%20crucial%20du%20PAM&#038;url=https:\/\/www.wallix.com\/fr\/blogpost\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager sur LinkedIn'><span class='avia_hidden_link_text'>Partager sur LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Partager par Mail\" href='mailto:?subject=Cybers%C3%A9curit%C3%A9%20et%20sant%C3%A9%20%3A%20Le%20r%C3%B4le%20crucial%20du%20PAM&#038;body=https:\/\/www.wallix.com\/fr\/blogpost\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager par Mail'><span class='avia_hidden_link_text'>Partager par Mail<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-8  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-97d9f49f990ddcfd6e03daaeba0494be\">\n#top .av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-97d9f49f990ddcfd6e03daaeba0494be av-special-heading-h3 blockquote modern-quote  avia-builder-el-9  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >contenus associ\u00e9s<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-10  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-7b60af3a779ac8669615c90b07612884\">\n#top .av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-7b60af3a779ac8669615c90b07612884 av-special-heading-h3 blockquote modern-quote  avia-builder-el-12  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >ressources associ\u00e9es <\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-13  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":77602,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1640,1788,1729],"tags":[],"class_list":["post-37584","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","category-gestion-des-acces-a-privileges-fr","category-sante-fr-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybers\u00e9curit\u00e9 et sant\u00e9 : Le r\u00f4le crucial du PAM - WALLIX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/fr\/blogpost\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 et sant\u00e9 : Le r\u00f4le crucial du PAM - WALLIX\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/fr\/blogpost\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-14T10:39:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-10T13:02:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/12\/AdobeStock_1279291061-1030x589.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1030\" \/>\n\t<meta property=\"og:image:height\" content=\"589\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"Cybers\u00e9curit\u00e9 et sant\u00e9 : Le r\u00f4le crucial du PAM\",\"datePublished\":\"2023-12-14T10:39:58+00:00\",\"dateModified\":\"2026-02-10T13:02:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\\\/\"},\"wordCount\":2978,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/AdobeStock_1279291061-scaled.jpeg\",\"articleSection\":[\"BLOGPOST\",\"GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES\",\"SANT\u00c9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\\\/\",\"name\":\"Cybers\u00e9curit\u00e9 et sant\u00e9 : Le r\u00f4le crucial du PAM - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/AdobeStock_1279291061-scaled.jpeg\",\"datePublished\":\"2023-12-14T10:39:58+00:00\",\"dateModified\":\"2026-02-10T13:02:12+00:00\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/AdobeStock_1279291061-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/AdobeStock_1279291061-scaled.jpeg\",\"width\":2560,\"height\":1463,\"caption\":\"Healthcare security in digital world. Abstract design featuring medical icons, shield symbol. Data protection, patient privacy, secure network concepts, software confidentiality encryption tech. Pro\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 et sant\u00e9 : Le r\u00f4le crucial du PAM - WALLIX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/fr\/blogpost\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 et sant\u00e9 : Le r\u00f4le crucial du PAM - WALLIX","og_url":"https:\/\/www.wallix.com\/fr\/blogpost\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\/","og_site_name":"WALLIX","article_published_time":"2023-12-14T10:39:58+00:00","article_modified_time":"2026-02-10T13:02:12+00:00","og_image":[{"width":1030,"height":589,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/12\/AdobeStock_1279291061-1030x589.jpeg","type":"image\/jpeg"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"\u00c9crit par":"WALLIX","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"Cybers\u00e9curit\u00e9 et sant\u00e9 : Le r\u00f4le crucial du PAM","datePublished":"2023-12-14T10:39:58+00:00","dateModified":"2026-02-10T13:02:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\/"},"wordCount":2978,"publisher":{"@id":"https:\/\/www.wallix.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/12\/AdobeStock_1279291061-scaled.jpeg","articleSection":["BLOGPOST","GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES","SANT\u00c9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\/","url":"https:\/\/www.wallix.com\/fr\/blogpost\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\/","name":"Cybers\u00e9curit\u00e9 et sant\u00e9 : Le r\u00f4le crucial du PAM - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/12\/AdobeStock_1279291061-scaled.jpeg","datePublished":"2023-12-14T10:39:58+00:00","dateModified":"2026-02-10T13:02:12+00:00","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/fr\/blogpost\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/cybersecurite-et-sante-pourquoi-le-pam-doit-etre-une-priorite\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/12\/AdobeStock_1279291061-scaled.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/12\/AdobeStock_1279291061-scaled.jpeg","width":2560,"height":1463,"caption":"Healthcare security in digital world. Abstract design featuring medical icons, shield symbol. Data protection, patient privacy, secure network concepts, software confidentiality encryption tech. Pro"},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/fr\/#website","url":"https:\/\/www.wallix.com\/fr\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/fr\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/fr\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/37584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/comments?post=37584"}],"version-history":[{"count":15,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/37584\/revisions"}],"predecessor-version":[{"id":84153,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/37584\/revisions\/84153"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/media\/77602"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/media?parent=37584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/categories?post=37584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/tags?post=37584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}