{"id":38551,"date":"2023-12-26T16:48:21","date_gmt":"2023-12-26T15:48:21","guid":{"rendered":"https:\/\/www.wallix.com\/?p=38551"},"modified":"2025-11-18T09:19:36","modified_gmt":"2025-11-18T08:19:36","slug":"commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/fr\/blogpost\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\/","title":{"rendered":"Commerce de d\u00e9tail en danger : d\u00e9fis et solutions en mati\u00e8re de cybers\u00e9curit\u00e9"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_two_third  avia-builder-el-first   container_wrap fullsize'  ><div  class='avia-slideshow av-lqmit6xv-b3ec4c5f92a112001485178bfd051086 avia-slideshow-entry_without_sidebar av_slideshow_full avia-slide-slider av-slideshow-ui av-control-default av-slideshow-manual av-loop-once av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 65.785381026439%;'><li  class='avia-slideshow-slide av-lqmit6xv-b3ec4c5f92a112001485178bfd051086__0  av-single-slide slide-1 slide-odd'><div data-rel='slideshow-1' class='avia-slide-wrap '   ><img decoding=\"async\" fetchpriority=\"high\" class=\"wp-image-6553 avia-img-lazy-loading-not-6553\"  src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam.jpg\" width=\"643\" height=\"423\" title='retail_cybersecurity_risk_pam' alt=''  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam.jpg 1920w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam-300x197.jpg 300w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam-1024x674.jpg 1024w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam-768x505.jpg 768w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam-1536x1010.jpg 1536w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam-380x250.jpg 380w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam-760x500.jpg 760w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam-320x211.jpg 320w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam-640x421.jpg 640w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam-480x316.jpg 480w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam-960x632.jpg 960w\" sizes=\"(max-width: 643px) 100vw, 643px\" \/><\/div><\/li><\/ul><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-38551'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1\">\n#top .flex_column_table.av-equal-height-column-flextable.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\nmargin-top:-600px;\nmargin-bottom:0;\n}\n.flex_column.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1 av_two_third  avia-builder-el-1  el_after_av_slideshow_full  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lqmisnae-83b19a0e7726175a69f8b650f6c2e644\">\n#top .av-special-heading.av-lqmisnae-83b19a0e7726175a69f8b650f6c2e644{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lqmisnae-83b19a0e7726175a69f8b650f6c2e644 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lqmisnae-83b19a0e7726175a69f8b650f6c2e644 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lqmisnae-83b19a0e7726175a69f8b650f6c2e644 av-special-heading-h1 blockquote modern-quote  avia-builder-el-2  el_before_av_post_metadata  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Commerce de d\u00e9tail en danger : d\u00e9fis et solutions en mati\u00e8re de cybers\u00e9curit\u00e9<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<div  class='av-post-metadata-container av-av_post_metadata-36bcf33e90f22125c019c70beb35c7b9 av-metadata-container-align-left  avia-builder-el-3  el_after_av_heading  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\">by<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/author\/alex\/\"  rel=\"author\">WALLIX<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-post-metadata-modified-date\" >18 Novembre 2025<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-category\"><span class=\"av-metadata-before av-metadata-before-categories\">in<\/span><span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/\" >BLOGPOST<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/gestion-des-acces-a-privileges-fr\/\" >GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/transformation-digitale-2\/\" >TRANSFORMATION DIGITALE<\/a><\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-av_hr-bca31578670ae9d408d6d6d291fc57a6 hr-default  avia-builder-el-4  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-lqmiuhpn-7e1b547b59cf0ced87a0ac898a85bf99 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Qu\u2019il s\u2019agisse d\u2019un g\u00e9ant multinational tel qu\u2019Amazon ou d\u2019une entreprise plus r\u00e9gionalis\u00e9e comme Safeway, les syst\u00e8mes de vente au d\u00e9tail sont omnipr\u00e9sents dans le monde entier. Mais les cyberattaques sont tout aussi omnipr\u00e9sentes &#8211; et bon nombre de ces attaques visent directement les syst\u00e8mes de vente au d\u00e9tail : 64 % des d\u00e9taillants signalent chaque mois une tentative d\u2019attaque.<\/p>\n<p>Un certain nombre de facteurs font des syst\u00e8mes de vente au d\u00e9tail des cibles attrayantes pour les pirates informatiques. Heureusement, il existe \u00e9galement des dispositifs de s\u00e9curit\u00e9 efficaces contre ces attaques.<\/p>\n<h3><span style=\"color: #f37300;\"><strong>L\u2019\u00e9tat de la technologie dans le commerce de d\u00e9tail<\/strong><\/span><\/h3>\n<p>L\u2019une des principales raisons pour lesquelles les pirates informatiques ciblent fr\u00e9quemment les syst\u00e8mes de vente au d\u00e9tail se trouve dans la technologie mixte qui les compose. Ainsi, il est courant qu\u2019un syst\u00e8me de vente au d\u00e9tail utilise une combinaison de technologies anciennes et nouvelles &#8211; anciens syst\u00e8mes de point de vente (PDV) et caisses enregistreuses au d\u00e9but du processus, par exemple &#8211; avec des syst\u00e8mes bas\u00e9s sur le cloud alimentant le commerce \u00e9lectronique, la logistique et les syst\u00e8mes administratifs en aval.<\/p>\n<p>L\u2019\u00e9tat technologique mixte de la vente au d\u00e9tail est en partie motiv\u00e9 par la volont\u00e9 de l\u2019industrie de fournir des points de contact omnicanaux aux consommateurs. Autrement dit, il existe un besoin imp\u00e9rieux de commodit\u00e9 pour le client, qu\u2019il soit en magasin ou en ligne. Ainsi, les d\u00e9taillants tardent \u00e0 mettre \u00e0 niveau des \u00e9l\u00e9ments tels que les caisses enregistreuses et les syst\u00e8mes de point de vente, \u00e0 la fois parce que le client les conna\u00eet bien, mais aussi parce que le personnel du magasin les ma\u00eetrise aussi et peut se charger efficacement d\u2019un grand nombre de clients en magasin. Cependant, le revers de la m\u00e9daille est que les d\u00e9taillants reconnaissent aussi la n\u00e9cessit\u00e9 d\u2019offrir aux consommateurs une commodit\u00e9 en ligne et ont donc \u00e9galement mis en place des nouvelles technologies telles que le commerce \u00e9lectronique dans leurs op\u00e9rations. Ensemble, ces anciens et nouveaux syst\u00e8mes r\u00e9pondent aux objectifs en mati\u00e8re d\u2019efficacit\u00e9 et d\u2019\u00e9volutivit\u00e9 des d\u00e9taillants, mais ils pr\u00e9sentent \u00e9galement de multiples vecteurs d\u2019attaque potentiels pour les pirates informatiques.<\/p>\n<h3><span style=\"color: #f37300;\"><strong>Cyber-(in)s\u00e9curit\u00e9 dans le commerce de d\u00e9tail<\/strong><\/span><\/h3>\n<p>Les cyberattaques contre le secteur du commerce de d\u00e9tail sont une pr\u00e9occupation constante : Depuis le premier trimestre 2018, des attaques r\u00e9ussies contre des grands d\u00e9taillants, notamment Best Buy, Macy\u2019s, Sears et Under Armour, ont toutes \u00e9t\u00e9 rapport\u00e9es. De telles attaques sont co\u00fbteuses : Le co\u00fbt moyen du piratage d\u2019un site de commerce \u00e9lectronique est de 4 millions de dollars, avec un prix moyen de 172 dollars par ensemble de donn\u00e9es. Et ces co\u00fbts sont en hausse de 29 % depuis 2013 &#8211; \u00e9tant donn\u00e9 que les Big Data ne cessent de cro\u00eetre, les co\u00fbts associ\u00e9s \u00e0 une attaque r\u00e9ussie devraient \u00e9galement continuer \u00e0 augmenter.<\/p>\n<p>Outre les technologies mixtes inh\u00e9rentes au secteur de la vente au d\u00e9tail, il existe \u00e9galement plusieurs autres raisons pour lesquelles <strong>le commerce de d\u00e9tail est particuli\u00e8rement vuln\u00e9rable aux attaques<\/strong>.<\/p>\n<ul>\n<li>Les donn\u00e9es clients ont souvent une valeur \u00e9lev\u00e9e car elles contiennent des informations telles que des num\u00e9ros de carte de cr\u00e9dit, des num\u00e9ros de t\u00e9l\u00e9phone, des questions et r\u00e9ponses de s\u00e9curit\u00e9, etc. et sont donc recherch\u00e9es par les pirates informatiques.<\/li>\n<li>Le taux de roulement du personnel est traditionnellement \u00e9lev\u00e9, ce qui signifie qu\u2019en l\u2019absence d\u2019une gestion adapt\u00e9e, il existe aussi un taux \u00e9lev\u00e9 d\u2019acc\u00e8s \u00e0 des syst\u00e8mes via des comptes d\u2019acc\u00e8s \u00e0 privil\u00e8ges qui ne devraient pas exister mais qui sont bel et bien pr\u00e9sents.<\/li>\n<li>La pr\u00e9dominance des syst\u00e8mes de commerce \u00e9lectronique signifie qu\u2019il existe une application frontale accessible au public qui est connect\u00e9e aux syst\u00e8mes critiques en arri\u00e8re-plan.<\/li>\n<li>Chacun des fournisseurs et sous-traitants devant acc\u00e9der au syst\u00e8me est un vecteur d\u2019attaque potentiel.<\/li>\n<li>Les solutions automatis\u00e9es d\u2019entreposage et de logistique de l\u2019IoT fournissent \u00e9galement un grand nombre de points d\u2019entr\u00e9e potentiels dans un syst\u00e8me de vente au d\u00e9tail.<\/li>\n<\/ul>\n<h3><span style=\"color: #f37300;\"><strong>Simplification de la s\u00e9curit\u00e9 de la vente au d\u00e9tail<\/strong><\/span><\/h3>\n<p>Les risques \u00e9voqu\u00e9s ci-dessus mettent en \u00e9vidence, directement ou indirectement, la n\u00e9cessit\u00e9 d\u2019une gestion solide des acc\u00e8s \u00e0 privil\u00e8ges. Les acc\u00e8s \u00e0 privil\u00e8ges d\u00e9signent les types d\u2019acc\u00e8s aux ressources du syst\u00e8me qui n\u00e9cessitent des autorisations \u00e9lev\u00e9es, comme la possibilit\u00e9 d\u2019interroger les serveurs de bases de donn\u00e9es, par exemple, ou m\u00eame de les voir dans le r\u00e9seau en premier lieu.<\/p>\n<p>La gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM) s\u2019assure \u00e0 son tour que les utilisateurs sans autorisations \u00e9lev\u00e9es ne puissent pas acc\u00e9der aux ressources privil\u00e9gi\u00e9es &#8211; et que les utilisateurs disposant d\u2019un acc\u00e8s \u00e0 privil\u00e8ges ne voient que les ressources qui leur sont n\u00e9cessaires et appropri\u00e9es, et dans certaines circonstances \u00e9galement (par exemple, l\u2019heure et le lieu).<\/p>\n<p>\u00c9tant donn\u00e9 que de nombreux risques de cybers\u00e9curit\u00e9 inh\u00e9rents au commerce de d\u00e9tail sont li\u00e9s \u00e0 un acc\u00e8s \u00e0 privil\u00e8ges, une solution PAM solide couvrant l\u2019ensemble du syst\u00e8me le rend beaucoup plus s\u00e9curis\u00e9 qu\u2019il ne le serait autrement et simplifie cette s\u00e9curit\u00e9 dans le processus. Pour ce faire, cette solution n\u2019accorde que des privil\u00e8ges appropri\u00e9s, mais elle les r\u00e9voque \u00e9galement lorsqu\u2019ils ne sont plus adapt\u00e9s. Voici comment une solution PAM doit g\u00e9rer chacun des risques d\u00e9crits ci-dessus :<\/p>\n<ul>\n<li>Les attaques via un point d\u2019acc\u00e8s public tel qu\u2019une connexion d\u2019e-commerce sont arr\u00eat\u00e9es avant qu\u2019elles ne puissent causer des dommages syst\u00e9miques ou se propager, car le syst\u00e8me PAM n\u2019accorde jamais \u00e0 ces utilisateurs un acc\u00e8s \u00e0 privil\u00e8ges au syst\u00e8me.<\/li>\n<li>Les comptes utilisateurs obsol\u00e8tes sont d\u00e9couvrables et les informations d\u2019identification privil\u00e9gi\u00e9es sont facilement (ou automatiquement) annul\u00e9es, ce qui emp\u00eache les pirates informatiques de r\u00e9ussir leurs attaques via des comptes d\u2019employ\u00e9s caducs.<\/li>\n<li>Les tiers tels que les fournisseurs et sous-traitants ne peuvent voir que les syst\u00e8mes qui leur sont utiles et ne peuvent pas \u00ab rebondir \u00bb sur des syst\u00e8mes sans rapport. Par exemple, un fournisseur peut se voir accorder un acc\u00e8s \u00e0 privil\u00e8ges \u00e0 une certaine fonctionnalit\u00e9 logistique mais il ne conna\u00eetra pas les autres \u00e9l\u00e9ments du syst\u00e8me et n\u2019aura encore moins acc\u00e8s \u00e0 celui-ci. Ou encore, un sous-traitant peut se voir accorder un acc\u00e8s \u00e0 privil\u00e8ges pour travailler sur un serveur, mais uniquement \u00e0 un moment donn\u00e9 et pour une dur\u00e9e d\u00e9termin\u00e9e. Dans les deux cas, m\u00eame si un pirate informatique disposait d\u2019un login tiers, il ne pourrait toujours pas causer de dommages importants car la solution PAM emp\u00eacherait tout acc\u00e8s ult\u00e9rieur.<\/li>\n<li>Une solution PAM solide s\u00e9curise \u00e9galement les \u00e9l\u00e9ments de machine \u00e0 machine (M2M) au sein d\u2019un syst\u00e8me. Ainsi, m\u00eame si un pirate informatique prend le contr\u00f4le d\u2019un p\u00e9riph\u00e9rique IoT dans un entrep\u00f4t automatis\u00e9, par exemple, la solution PAM n\u2019a pas accord\u00e9 d\u2019acc\u00e8s \u00e0 privil\u00e8ges \u00e0 ce p\u00e9riph\u00e9rique. Le pirate ne peut donc pas s\u2019en servir comme plate-forme \u00e0 partir de laquelle il peut poursuivre ses exploits.<\/li>\n<\/ul>\n<p>Pour s\u00e9curiser davantage le syst\u00e8me, une solution PAM compl\u00e8te devrait \u00eatre capable de surveiller en temps r\u00e9el toute activit\u00e9 de session \u00e0 privil\u00e8ges mais aussi de mettre automatiquement fin aux sessions suspectes ou d\u2019alerter un administrateur (ou les deux).<\/p>\n<h4><strong><span style=\"color: #f37300;\">Simplification de la conformit\u00e9 \u00e0 la r\u00e9glementation en mati\u00e8re de commerce de d\u00e9tail<\/span><\/strong><\/h4>\n<p>Le secteur du commerce de d\u00e9tail est soumis \u00e0 un grand nombre de r\u00e8glements diff\u00e9rents auxquels les entreprises doivent se conformer &#8211; PCI DSS, GDPR, NIST et SOX &#8211; pour n\u2019en citer que quelques-uns. Et outre les capacit\u00e9s de surveillance des sessions, si la solution PAM enregistre \u00e9galement chaque session et permet de la consulter, il existe toujours une piste d\u2019audit pour faciliter le respect de tous ces r\u00e8glements. De plus, les sessions enregistr\u00e9es sont \u00e9galement utiles pour les examens de s\u00e9curit\u00e9 ainsi que pour la formation des membres de l\u2019\u00e9quipe de s\u00e9curit\u00e9.<\/p>\n<h2><strong>Activit\u00e9 risqu\u00e9e : Webinar sur la cybers\u00e9curit\u00e9 dans le commerce de d\u00e9tail<\/strong><\/h2>\n<p>La cybers\u00e9curit\u00e9 dans le secteur du commerce de d\u00e9tail est compliqu\u00e9e, mais une solution reposant sur une gestion des acc\u00e8s \u00e0 privil\u00e8ges ne doit pas l\u2019\u00eatre. Pour en savoir plus sur le sujet, n\u2019oubliez pas de regarder le webinar d\u2019o\u00f9 est tir\u00e9 ce qui pr\u00e9c\u00e8de, <strong><a href=\"https:\/\/www.gotostage.com\/channel\/b5128e77e2444deaad2952f398bb8a30\/recording\/83ebb345012b4c04b07310c9445f528f\/watch\" target=\"_blank\" rel=\"noopener\"><em>Activit\u00e9 risqu\u00e9e : Cybers\u00e9curit\u00e9 dans le commerce de d\u00e9tail<\/em><\/a><\/strong>, pr\u00e9sent\u00e9 par Eric GAUDIN, expert en cybers\u00e9curit\u00e9 chez WALLIX. Eric aborde tous les sujets ci-dessus, donne son propre point de vue bas\u00e9 sur des ann\u00e9es d\u2019exp\u00e9rience dans l\u2019industrie de la cybers\u00e9curit\u00e9 et raconte ensuite l\u2019histoire (vraie !) d\u2019un grand d\u00e9taillant d\u2019articles de sport qui a utilis\u00e9 le WALLIX Bastion pour am\u00e9liorer sensiblement sa cybers\u00e9curit\u00e9.<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36\">\n#top .flex_column_table.av-equal-height-column-flextable.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\nmargin-top:-600px;\nmargin-bottom:0;\n}\n.flex_column.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36 av_one_third  avia-builder-el-6  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-av_social_share-0a73d8854da5c7c5d5ad87c7877e27c0 av-social-sharing-box-default  avia-builder-el-7  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Partager cet article<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Partager sur X\" href='https:\/\/twitter.com\/share?text=Commerce%20de%20d%C3%A9tail%20en%20danger%20%3A%20d%C3%A9fis%20et%20solutions%20en%20mati%C3%A8re%20de%20cybers%C3%A9curit%C3%A9&#038;url=https:\/\/www.wallix.com\/fr\/?p=38551' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager sur X'><span class='avia_hidden_link_text'>Partager sur X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Partager sur LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Commerce%20de%20d%C3%A9tail%20en%20danger%20%3A%20d%C3%A9fis%20et%20solutions%20en%20mati%C3%A8re%20de%20cybers%C3%A9curit%C3%A9&#038;url=https:\/\/www.wallix.com\/fr\/blogpost\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager sur LinkedIn'><span class='avia_hidden_link_text'>Partager sur LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Partager par Mail\" href='mailto:?subject=Commerce%20de%20d%C3%A9tail%20en%20danger%20%3A%20d%C3%A9fis%20et%20solutions%20en%20mati%C3%A8re%20de%20cybers%C3%A9curit%C3%A9&#038;body=https:\/\/www.wallix.com\/fr\/blogpost\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager par Mail'><span class='avia_hidden_link_text'>Partager par Mail<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-8  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-97d9f49f990ddcfd6e03daaeba0494be\">\n#top .av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-97d9f49f990ddcfd6e03daaeba0494be av-special-heading-h3 blockquote modern-quote  avia-builder-el-9  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >contenus associ\u00e9s<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-10  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-7b60af3a779ac8669615c90b07612884\">\n#top .av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-7b60af3a779ac8669615c90b07612884 av-special-heading-h3 blockquote modern-quote  avia-builder-el-12  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >ressources associ\u00e9es <\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-13  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":6553,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1640,1788,1685],"tags":[],"class_list":["post-38551","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","category-gestion-des-acces-a-privileges-fr","category-transformation-digitale-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Commerce de d\u00e9tail en danger : d\u00e9fis et solutions en mati\u00e8re de cybers\u00e9curit\u00e9 - WALLIX<\/title>\n<meta name=\"description\" content=\"La cybers\u00e9curit\u00e9 dans le secteur de la vente au d\u00e9tail est compliqu\u00e9e - mais une solution PAM ne doit pas l&#039;\u00eatre. Plus d&#039;informations ici !\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/fr\/blogpost\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Commerce de d\u00e9tail en danger : d\u00e9fis et solutions en mati\u00e8re de cybers\u00e9curit\u00e9 - WALLIX\" \/>\n<meta property=\"og:description\" content=\"La cybers\u00e9curit\u00e9 dans le secteur de la vente au d\u00e9tail est compliqu\u00e9e - mais une solution PAM ne doit pas l&#039;\u00eatre. Plus d&#039;informations ici !\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/fr\/blogpost\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-26T15:48:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T08:19:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1263\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"Commerce de d\u00e9tail en danger : d\u00e9fis et solutions en mati\u00e8re de cybers\u00e9curit\u00e9\",\"datePublished\":\"2023-12-26T15:48:21+00:00\",\"dateModified\":\"2025-11-18T08:19:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\\\/\"},\"wordCount\":3360,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/retail_cybersecurity_risk_pam.jpg\",\"articleSection\":[\"BLOGPOST\",\"GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES\",\"TRANSFORMATION DIGITALE\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\\\/\",\"name\":\"Commerce de d\u00e9tail en danger : d\u00e9fis et solutions en mati\u00e8re de cybers\u00e9curit\u00e9 - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/retail_cybersecurity_risk_pam.jpg\",\"datePublished\":\"2023-12-26T15:48:21+00:00\",\"dateModified\":\"2025-11-18T08:19:36+00:00\",\"description\":\"La cybers\u00e9curit\u00e9 dans le secteur de la vente au d\u00e9tail est compliqu\u00e9e - mais une solution PAM ne doit pas l'\u00eatre. Plus d'informations ici !\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/retail_cybersecurity_risk_pam.jpg\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/retail_cybersecurity_risk_pam.jpg\",\"width\":1920,\"height\":1263},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Commerce de d\u00e9tail en danger : d\u00e9fis et solutions en mati\u00e8re de cybers\u00e9curit\u00e9 - WALLIX","description":"La cybers\u00e9curit\u00e9 dans le secteur de la vente au d\u00e9tail est compliqu\u00e9e - mais une solution PAM ne doit pas l'\u00eatre. Plus d'informations ici !","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/fr\/blogpost\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"Commerce de d\u00e9tail en danger : d\u00e9fis et solutions en mati\u00e8re de cybers\u00e9curit\u00e9 - WALLIX","og_description":"La cybers\u00e9curit\u00e9 dans le secteur de la vente au d\u00e9tail est compliqu\u00e9e - mais une solution PAM ne doit pas l'\u00eatre. Plus d'informations ici !","og_url":"https:\/\/www.wallix.com\/fr\/blogpost\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\/","og_site_name":"WALLIX","article_published_time":"2023-12-26T15:48:21+00:00","article_modified_time":"2025-11-18T08:19:36+00:00","og_image":[{"width":1920,"height":1263,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam.jpg","type":"image\/jpeg"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"\u00c9crit par":"WALLIX","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"Commerce de d\u00e9tail en danger : d\u00e9fis et solutions en mati\u00e8re de cybers\u00e9curit\u00e9","datePublished":"2023-12-26T15:48:21+00:00","dateModified":"2025-11-18T08:19:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\/"},"wordCount":3360,"publisher":{"@id":"https:\/\/www.wallix.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam.jpg","articleSection":["BLOGPOST","GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES","TRANSFORMATION DIGITALE"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\/","url":"https:\/\/www.wallix.com\/fr\/blogpost\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\/","name":"Commerce de d\u00e9tail en danger : d\u00e9fis et solutions en mati\u00e8re de cybers\u00e9curit\u00e9 - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam.jpg","datePublished":"2023-12-26T15:48:21+00:00","dateModified":"2025-11-18T08:19:36+00:00","description":"La cybers\u00e9curit\u00e9 dans le secteur de la vente au d\u00e9tail est compliqu\u00e9e - mais une solution PAM ne doit pas l'\u00eatre. Plus d'informations ici !","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/fr\/blogpost\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/commerce-de-detail-en-danger-defis-et-solutions-en-matiere-de-cybersecurite\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam.jpg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/retail_cybersecurity_risk_pam.jpg","width":1920,"height":1263},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/fr\/#website","url":"https:\/\/www.wallix.com\/fr\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/fr\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/fr\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/38551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/comments?post=38551"}],"version-history":[{"count":4,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/38551\/revisions"}],"predecessor-version":[{"id":80490,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/38551\/revisions\/80490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/media\/6553"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/media?parent=38551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/categories?post=38551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/tags?post=38551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}