{"id":38579,"date":"2023-12-26T17:09:16","date_gmt":"2023-12-26T16:09:16","guid":{"rendered":"https:\/\/www.wallix.com\/?p=38579"},"modified":"2025-08-22T10:49:26","modified_gmt":"2025-08-22T09:49:26","slug":"acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/fr\/blogpost\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\/","title":{"rendered":"Acc\u00e8s \u00e0 privil\u00e8ges et gestion des vuln\u00e9rabilit\u00e9s : Qualys et WALLIX"},"content":{"rendered":"<div class='flex_column_table av-m4151vmp-e4ff402499a38a103dc90264ff224de2 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4151vmp-e4ff402499a38a103dc90264ff224de2\">\n#top .flex_column_table.av-equal-height-column-flextable.av-m4151vmp-e4ff402499a38a103dc90264ff224de2{\nmargin-top:00px;\nmargin-bottom:0;\n}\n.flex_column.av-m4151vmp-e4ff402499a38a103dc90264ff224de2{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-m4151vmp-e4ff402499a38a103dc90264ff224de2{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-m4151vmp-e4ff402499a38a103dc90264ff224de2 av_two_third  avia-builder-el-0  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lqmjjljm-f97fe99acfb5996270ec20e63feacae2\">\n#top .av-special-heading.av-lqmjjljm-f97fe99acfb5996270ec20e63feacae2{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lqmjjljm-f97fe99acfb5996270ec20e63feacae2 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lqmjjljm-f97fe99acfb5996270ec20e63feacae2 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lqmjjljm-f97fe99acfb5996270ec20e63feacae2 av-special-heading-h1 blockquote modern-quote  avia-builder-el-1  el_before_av_textblock  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Acc\u00e8s \u00e0 privil\u00e8ges et gestion des vuln\u00e9rabilit\u00e9s : Qualys et WALLIX<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lqmjlbl5-be6ffff5663d34aa1e912cb2580ef237\">\n#top .av_textblock_section.av-lqmjlbl5-be6ffff5663d34aa1e912cb2580ef237 .avia_textblock{\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-lqmjlbl5-be6ffff5663d34aa1e912cb2580ef237 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>La complexit\u00e9 est l&rsquo;ennemie de la cybers\u00e9curit\u00e9 ; mais elle est in\u00e9vitable. M\u00eame dans les organisations relativement petites, diff\u00e9rentes personnes exploitent et administrent diff\u00e9rents syst\u00e8mes IT tout en prot\u00e9geant les soci\u00e9t\u00e9s de diff\u00e9rentes menaces.<\/p>\n<p>Tout probl\u00e8me est potentiellement un probl\u00e8me d\u00e9multipli\u00e9. <strong>Comment veiller \u00e0 la s\u00e9curit\u00e9 de tout et de tous dans cet environnement ?<\/strong><\/p>\n<p>Aucune solution de s\u00e9curit\u00e9 ne peut tout faire \u00e0 elle seule. Les professionnels de la cyber\u00e9curit\u00e9 ont bien compris que c\u2019est la combinaison de diff\u00e9rents outils de s\u00e9curit\u00e9 qui offre la meilleure d\u00e9fense en profondeur contre diversit\u00e9 des menaces. Par exemple, une solution PAM est souvent associ\u00e9e \u00e0 des syst\u00e8mes SIEM tels que Splunk ou \u00e0 des gestionnaires d\u2019identit\u00e9s tels que RSA.<\/p>\n<p>Cet article s\u2019int\u00e9resse \u00e0 une autre association extr\u00eamement fructueuse : l\u2019int\u00e9gration des solutions de gestion des acc\u00e8s \u00e0 privil\u00e8ges ou PAM (pour Privileged Access Management) \u00e0 des syst\u00e8mes de gestion des vuln\u00e9rabilit\u00e9s en g\u00e9n\u00e9ral, et celle de WALLIX \u00e0 Qualys en particulier.<\/p>\n<h2>Qu\u2019est-ce qu\u2019un syst\u00e8me de gestion des vuln\u00e9rabilit\u00e9s ?<\/h2>\n<p>Chaque actif IT est vuln\u00e9rable, d\u2019une fa\u00e7on ou d\u2019une autre. Parfois, ces vuln\u00e9rabilit\u00e9s sont des failles de s\u00e9curit\u00e9 natives, qui sont r\u00e9v\u00e9l\u00e9es seulement lorsque des personnes habiles d\u00e9couvrent comment les exploiter \u2013 par exemple, un moyen cach\u00e9 d\u2019obtenir un acc\u00e8s \u00ab root \u00bb sur un serveur Windows. D\u2019autres fois, c\u2019est un utilisateur qui, involontairement ou non, provoquera une vuln\u00e9rabilit\u00e9 en laissant un port ouvert sur un pare-feu, par exemple. <strong>Des mises \u00e0 jour syst\u00e8me peuvent \u00e9galement \u00eatre \u00e0 l\u2019origine de nouvelles vuln\u00e9rabilit\u00e9s.<\/strong><\/p>\n<p>Toute vuln\u00e9rabilit\u00e9 \u00e9tant un incident de s\u00e9curit\u00e9 potentiel, les responsables s\u00e9curit\u00e9 ont \u00e0 pr\u00e9sent recours \u00e0 des syst\u00e8mes de gestion des vuln\u00e9rabilit\u00e9s pour rep\u00e9rer les faiblesses de l\u2019\u00e9cosyst\u00e8me IT, afin de pouvoir y rem\u00e9dier rapidement. Qualys, par exemple, leur donne la possibilit\u00e9 d\u2019identifier les h\u00f4tes et les applications web pirat\u00e9s. La solution est capable de v\u00e9rifier si les m\u00e9canismes de contr\u00f4le requis, tels que le renforcement des mots de passe et les strat\u00e9gies d\u2019acc\u00e8s aux donn\u00e9es ont bien \u00e9t\u00e9 impl\u00e9ment\u00e9s sur les syst\u00e8mes. Qualys peut \u00e9galement tester les configurations syst\u00e8me vis-\u00e0-vis des \u00ab golden images \u00bb ou des standards de r\u00e9f\u00e9rence tels que l\u2019USGCB (United States Government Configuration Baseline). \u00c0 partir de ces types de processus, Qualys peut automatiquement identifier, marquer et organiser les actifs, et les s\u00e9lectionner dynamiquement pour l\u2019analyse et le reporting.<\/p>\n<p><strong>Qualys permet ensuite aux \u00e9quipes de s\u00e9curit\u00e9 de surveiller les vuln\u00e9rabilit\u00e9s, et aide les administrateurs \u00e0 prioriser leurs interventions.<\/strong> Le syst\u00e8me centralise \u00e9galement la collecte de fichiers d\u2019\u00e9valuation, fournissant ainsi des donn\u00e9es exploitables en termes de s\u00e9curit\u00e9 aux syst\u00e8mes SIEM, aux solutions de gouvernance, aux pare-feu, etc.<\/p>\n<p>Enfin, Qualys peut identifier les correctifs n\u00e9cessaires. En outre, il analyse les syst\u00e8mes en continu \u00e0 la recherche d\u2019autres vuln\u00e9rabilit\u00e9s. Afin de b\u00e9n\u00e9ficier d\u2019une vision interactive sur l\u2019ensemble du r\u00e9seau, Qualys automatise la g\u00e9n\u00e9ration de questionnaires pour les employ\u00e9s, les fournisseurs et les partenaires.<\/p>\n<h2>Solutions de gestion des acc\u00e8s \u00e0 privil\u00e8ges et syst\u00e8mes de gestion des vuln\u00e9rabilit\u00e9s<\/h2>\n<p>Aussi performants que soient les outils de d\u00e9tection des vuln\u00e9rabilit\u00e9s tels que Qualys, ils sont encore plus efficaces lorsqu\u2019ils sont associ\u00e9s \u00e0 une solution de gestion des acc\u00e8s \u00e0 privil\u00e8ges. Une solution de PAM implique le recours \u00e0 des outils et \u00e0 des pratiques visant \u00e0 pr\u00e9server l\u2019organisation des mauvais usages, accidentels ou d\u00e9lib\u00e9r\u00e9s, des acc\u00e8s \u00e0 privil\u00e8ges. Elle offre des moyens simples et s\u00e9curis\u00e9s d\u2019autoriser et de surveiller tous les acc\u00e8s \u00e0 privil\u00e8ges aux syst\u00e8mes critiques. <strong>Une solution de PAM autorise et r\u00e9voque les privil\u00e8ges d\u2019acc\u00e8s sur l\u2019ensemble des syst\u00e8mes, m\u00eame h\u00e9t\u00e9rog\u00e8nes, et cr\u00e9e une trace d\u2019audit inalt\u00e9rable de toute session avec droits d\u2019acc\u00e8s privil\u00e9gi\u00e9s.<\/strong><\/p>\n<p>Une solution gestion des acc\u00e8s \u00e0 privil\u00e8ges compl\u00e8te le syst\u00e8me de gestion des vuln\u00e9rabilit\u00e9s \u2013 et permet de r\u00e9pondre aux questions essentielles qui se posent lorsqu\u2019une faille est d\u00e9couverte :<\/p>\n<ul>\n<li><span style=\"color: #f4913a;\"><strong>Qui est \u00e0 l\u2019origine du probl\u00e8me ?<\/strong><\/span><\/li>\n<li><span style=\"color: #f4913a;\"><strong>Qui peut r\u00e9soudre le probl\u00e8me ?<\/strong><\/span><\/li>\n<li><span style=\"color: #f4913a;\"><strong>En cas d\u2019incident, que s\u2019est-il pass\u00e9, quand, comment, et qui est responsable ?<\/strong><\/span><\/li>\n<\/ul>\n<p>En collaborant, une solution de PAM et un syst\u00e8me de d\u00e9tection des vuln\u00e9rabilit\u00e9s accroissent significativement leurs capacit\u00e9s respectives. Si par exemple le syst\u00e8me de d\u00e9tection des vuln\u00e9rabilit\u00e9s identifie une faille sur un serveur, la solution de PAM est capable de fournir un rapport sur les activit\u00e9s des utilisateurs \u00e0 privil\u00e8ges susceptibles d\u2019\u00eatre \u00e0 l\u2019origine de la faille. La solution de PAM peut \u00e9galement r\u00e9v\u00e9ler, dans un rapport de session d\u00e9taill\u00e9, pr\u00e9cis\u00e9ment ce qui a \u00e9t\u00e9 fait pour provoquer la vuln\u00e9rabilit\u00e9.<\/p>\n<p>Imaginez le sc\u00e9nario suivant : un utilisateur \u00e0 privil\u00e8ges provoque accidentellement une vuln\u00e9rabilit\u00e9 sur un h\u00f4te. Ou bien cette vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 provoqu\u00e9e volontairement par une personne malveillante s\u2019\u00e9tant appropri\u00e9 des droits d\u2019acc\u00e8s non autoris\u00e9s. Le syst\u00e8me de gestion des vuln\u00e9rabilit\u00e9s identifie le probl\u00e8me ; la solution de PAM, quant \u00e0 elle, identifie le(s) responsable(s) et r\u00e9v\u00e8le ce qui s\u2019est pass\u00e9. Une fois le probl\u00e8me r\u00e9solu, la solution de PAM peut \u00e9galement fournir au syst\u00e8me de gestion des vuln\u00e9rabilit\u00e9s une piste d\u2019audit de la session d\u2019intervention.<\/p>\n<p>Si l\u2019intervention survient suffisamment rapidement, non seulement une faille sera \u00e9vit\u00e9e, mais il sera possible d\u2019identifier l\u2019utilisateur \u00e0 l\u2019origine de la vuln\u00e9rabilit\u00e9, et\/ou la personne malveillante qui aura tent\u00e9 de l\u2019exploiter.<\/p>\n<h2>Int\u00e9gration de Qualys et de WALLIX<\/h2>\n<p>WALLIX et Qualys peuvent \u00eatre associ\u00e9s pour cr\u00e9er une solution hautement compl\u00e9mentaire de gestion des acc\u00e8s \u00e0 privil\u00e8ges et de d\u00e9tection des vuln\u00e9rabilit\u00e9s.<\/p>\n<ul>\n<li><span style=\"color: #f4913a;\"><strong>Le Bastion de WALLIX combine de formidables capacit\u00e9s de PAM \u00e0 une grande simplicit\u00e9 d\u2019installation et d\u2019utilisation<\/strong><\/span><\/li>\n<li><span style=\"color: #f4913a;\"><strong>Le Bastion de WALLIX est l\u00e9ger, et constitue une solution de PAM fiable et intelligente, parfaitement compatible avec<\/strong><\/span><\/li>\n<li><span style=\"color: #f4913a;\"><strong>Qualys et WALLIX permettent tous deux des d\u00e9ploiements aussi bien dans le cloud que sur site<\/strong><\/span><\/li>\n<\/ul>\n<p>En associant les capacit\u00e9s de WALLIX et de Qualys, les responsables s\u00e9curit\u00e9 peuvent d\u00e9tecter les vuln\u00e9rabilit\u00e9s sur l\u2019ensemble de l\u2019environnement IT et y rem\u00e9dier rapidement.<\/p>\n<p><strong>Si vous souhaitez assister \u00e0 une d\u00e9mo ou en savoir plus sur la fa\u00e7on dont Qualys et WALLIX s\u2019int\u00e8grent et se compl\u00e8tent mutuellement, <a href=\"https:\/\/www.wallix.com\/fr\/toutes-les-ressources\/regarder-la-demo\/\" target=\"_blank\" rel=\"noopener\">cliquez ici<\/a>.<\/strong><\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4ibuwvn-15f5f704b9a878a57164a65477797381\">\n#top .flex_column_table.av-equal-height-column-flextable.av-4ibuwvn-15f5f704b9a878a57164a65477797381{\nmargin-top:00px;\nmargin-bottom:0;\n}\n.flex_column.av-4ibuwvn-15f5f704b9a878a57164a65477797381{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-4ibuwvn-15f5f704b9a878a57164a65477797381{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-4ibuwvn-15f5f704b9a878a57164a65477797381 av_one_third  avia-builder-el-3  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-3rqm6gj-2877f74b2d0c3d4462c0a2f409185029 av-social-sharing-box-default  avia-builder-el-4  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Partager cet article<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Partager sur X\" href='https:\/\/twitter.com\/share?text=Acc%C3%A8s%20%C3%A0%20privil%C3%A8ges%20et%20gestion%20des%20vuln%C3%A9rabilit%C3%A9s%20%3A%20Qualys%20et%20WALLIX&#038;url=https:\/\/www.wallix.com\/fr\/?p=38579' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager sur X'><span class='avia_hidden_link_text'>Partager sur X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Partager sur LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Acc%C3%A8s%20%C3%A0%20privil%C3%A8ges%20et%20gestion%20des%20vuln%C3%A9rabilit%C3%A9s%20%3A%20Qualys%20et%20WALLIX&#038;url=https:\/\/www.wallix.com\/fr\/blogpost\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager sur LinkedIn'><span class='avia_hidden_link_text'>Partager sur LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Partager par Mail\" href='mailto:?subject=Acc%C3%A8s%20%C3%A0%20privil%C3%A8ges%20et%20gestion%20des%20vuln%C3%A9rabilit%C3%A9s%20%3A%20Qualys%20et%20WALLIX&#038;body=https:\/\/www.wallix.com\/fr\/blogpost\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager par Mail'><span class='avia_hidden_link_text'>Partager par Mail<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3dkz4mr-55f809837d6821935e7b850a112aaf88\">\n#top .hr.hr-invisible.av-3dkz4mr-55f809837d6821935e7b850a112aaf88{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-3dkz4mr-55f809837d6821935e7b850a112aaf88 hr-invisible  avia-builder-el-5  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2z4uuk3-aa1af6e4af557a2d12bc3245c2a831c5\">\n#top .av-special-heading.av-2z4uuk3-aa1af6e4af557a2d12bc3245c2a831c5{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-2z4uuk3-aa1af6e4af557a2d12bc3245c2a831c5 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-2z4uuk3-aa1af6e4af557a2d12bc3245c2a831c5 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-2z4uuk3-aa1af6e4af557a2d12bc3245c2a831c5 av-special-heading-h3 blockquote modern-quote  avia-builder-el-6  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >contenus associ\u00e9s<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2njbk0j-07103015cce526efa5f95ef60d845281\">\n#top .hr.hr-invisible.av-2njbk0j-07103015cce526efa5f95ef60d845281{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2njbk0j-07103015cce526efa5f95ef60d845281 hr-invisible  avia-builder-el-7  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1sk4isz-b1e65419a2de843d7ebb99023d09caa0\">\n#top .av-special-heading.av-1sk4isz-b1e65419a2de843d7ebb99023d09caa0{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1sk4isz-b1e65419a2de843d7ebb99023d09caa0 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1sk4isz-b1e65419a2de843d7ebb99023d09caa0 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-1sk4isz-b1e65419a2de843d7ebb99023d09caa0 av-special-heading-h3 blockquote modern-quote  avia-builder-el-9  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >ressources associ\u00e9es <\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-148qw2b-3fcb51aedb318da6710df2ef4ca9267e\">\n#top .hr.hr-invisible.av-148qw2b-3fcb51aedb318da6710df2ef4ca9267e{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-148qw2b-3fcb51aedb318da6710df2ef4ca9267e hr-invisible  avia-builder-el-10  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":10871,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1640],"tags":[],"class_list":["post-38579","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Acc\u00e8s \u00e0 privil\u00e8ges et gestion des vuln\u00e9rabilit\u00e9s : Qualys et WALLIX - WALLIX<\/title>\n<meta name=\"description\" content=\"Aujourd&#039;hui, le nombre d&#039;endpoints a augment\u00e9 dramatiquement. D\u00e9couvrez comment les prot\u00e9ger au plus vite !\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/fr\/blogpost\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Acc\u00e8s \u00e0 privil\u00e8ges et gestion des vuln\u00e9rabilit\u00e9s : Qualys et WALLIX - WALLIX\" \/>\n<meta property=\"og:description\" content=\"Aujourd&#039;hui, le nombre d&#039;endpoints a augment\u00e9 dramatiquement. D\u00e9couvrez comment les prot\u00e9ger au plus vite !\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/fr\/blogpost\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-26T16:09:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-22T09:49:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/09\/privileged-access-management-and-vulnerability-systems.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"901\" \/>\n\t<meta property=\"og:image:height\" content=\"594\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"Acc\u00e8s \u00e0 privil\u00e8ges et gestion des vuln\u00e9rabilit\u00e9s : Qualys et WALLIX\",\"datePublished\":\"2023-12-26T16:09:16+00:00\",\"dateModified\":\"2025-08-22T09:49:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\\\/\"},\"wordCount\":2669,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/privileged-access-management-and-vulnerability-systems.jpeg\",\"articleSection\":[\"BLOGPOST\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\\\/\",\"name\":\"Acc\u00e8s \u00e0 privil\u00e8ges et gestion des vuln\u00e9rabilit\u00e9s : Qualys et WALLIX - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/privileged-access-management-and-vulnerability-systems.jpeg\",\"datePublished\":\"2023-12-26T16:09:16+00:00\",\"dateModified\":\"2025-08-22T09:49:26+00:00\",\"description\":\"Aujourd'hui, le nombre d'endpoints a augment\u00e9 dramatiquement. D\u00e9couvrez comment les prot\u00e9ger au plus vite !\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/privileged-access-management-and-vulnerability-systems.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/privileged-access-management-and-vulnerability-systems.jpeg\",\"width\":901,\"height\":594},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Acc\u00e8s \u00e0 privil\u00e8ges et gestion des vuln\u00e9rabilit\u00e9s : Qualys et WALLIX - WALLIX","description":"Aujourd'hui, le nombre d'endpoints a augment\u00e9 dramatiquement. D\u00e9couvrez comment les prot\u00e9ger au plus vite !","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/fr\/blogpost\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\/","og_locale":"fr_FR","og_type":"article","og_title":"Acc\u00e8s \u00e0 privil\u00e8ges et gestion des vuln\u00e9rabilit\u00e9s : Qualys et WALLIX - WALLIX","og_description":"Aujourd'hui, le nombre d'endpoints a augment\u00e9 dramatiquement. D\u00e9couvrez comment les prot\u00e9ger au plus vite !","og_url":"https:\/\/www.wallix.com\/fr\/blogpost\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\/","og_site_name":"WALLIX","article_published_time":"2023-12-26T16:09:16+00:00","article_modified_time":"2025-08-22T09:49:26+00:00","og_image":[{"width":901,"height":594,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/09\/privileged-access-management-and-vulnerability-systems.jpeg","type":"image\/jpeg"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"\u00c9crit par":"WALLIX","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"Acc\u00e8s \u00e0 privil\u00e8ges et gestion des vuln\u00e9rabilit\u00e9s : Qualys et WALLIX","datePublished":"2023-12-26T16:09:16+00:00","dateModified":"2025-08-22T09:49:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\/"},"wordCount":2669,"publisher":{"@id":"https:\/\/www.wallix.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/09\/privileged-access-management-and-vulnerability-systems.jpeg","articleSection":["BLOGPOST"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\/","url":"https:\/\/www.wallix.com\/fr\/blogpost\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\/","name":"Acc\u00e8s \u00e0 privil\u00e8ges et gestion des vuln\u00e9rabilit\u00e9s : Qualys et WALLIX - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/09\/privileged-access-management-and-vulnerability-systems.jpeg","datePublished":"2023-12-26T16:09:16+00:00","dateModified":"2025-08-22T09:49:26+00:00","description":"Aujourd'hui, le nombre d'endpoints a augment\u00e9 dramatiquement. D\u00e9couvrez comment les prot\u00e9ger au plus vite !","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/fr\/blogpost\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/acces-a-privileges-et-gestion-des-vulnerabilites-qualys-et-wallix\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/09\/privileged-access-management-and-vulnerability-systems.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/09\/privileged-access-management-and-vulnerability-systems.jpeg","width":901,"height":594},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/fr\/#website","url":"https:\/\/www.wallix.com\/fr\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/fr\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/fr\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/38579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/comments?post=38579"}],"version-history":[{"count":10,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/38579\/revisions"}],"predecessor-version":[{"id":76766,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/38579\/revisions\/76766"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/media\/10871"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/media?parent=38579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/categories?post=38579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/tags?post=38579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}