Solution
Renforcer ma gouvernance
IAM
Maîtriser mes workflows
d'onboarding
Automatiser la création des
accès de mes utilisateurs
Features
Connectors
Resources
Article
Newsletter
Évènements
Podcast
Emploi
Documentation
Pricing
Réserver une démo
Se connecter
Essai 30 jours
Site map
Main pages
Articles
Fusion d’entreprises : le rôle stratégique (et trop souvent sous-estimé) du responsable IT
D’un casse-tête manuel à une gestion fluide : Youzer au service des sapeurs-pompiers
Pourquoi l’IAM est devenu un impératif stratégique pour la cybersécurité
Gestion des Identités : accorder des accès aux tiers sans compromettre la sécurité des systèmes d'information
Dstny relève le défi de la croissance en optimisant la gestion de ses comptes utilisateurs
Recertification des comptes utilisateurs : comment une entreprise de transport française a relevé le défi avant les JOP 2024
Automatiser les processus RH avec la GED : un levier pour l'efficacité
Optimisez votre Active Directory : Guide complet pour nettoyer les comptes inactifs
Offboarding Informatique : Les Meilleures Pratiques pour Assurer la Sécurité de vos Données
L'Identity Lifecycle Management : clé de la sécurité et de la productivité
What is identity and access automation?
Proxiserve automates its 1,000 arrivals and departures of temporary workers and service providers
How can you effectively protect your application against cyber attacks?
The NIS 2 regulation: an update on the issues, obligations and penalties
The Pays Basque community leaves its paper files behind for automated onboarding
Cybersecurity: 2023 assessment and data to watch out for in 2024
IT onboarding: key points for success
Atoll, fully automates onboarding and offboarding
A transport company saves time monitoring its application accounts
Bring ROI to your IAM project: concrete arguments
7 best practices in identity and access management
How EM Normandie now boards its students without friction
Self-Service Password Reset: the key to enhanced productivity at work
Automate your account deprovisioning process
Shadow IT: the challenges of unregulated software use
What is application account provisioning?
Why is identity security a key factor in overall corporate security?
How has Sewan made its user movements more reliable and automated?
Create your IT request validation circuits in 6 steps
Understanding validation circuits in 2 min
Automate validation cycles for IT resource requests
How did Skill&You save time and improve the reliability of its audits?
Why is a good offboarding process essential?
Centralize your users when you have several HR sources
Identity governance and administration: the key to effective management
License management: a challenge for the IT department
Why are ghost accounts dangerous?
Know your users!
Understanding IT authorization management
What is privileged account management?
How do you create a single user repository?
What is IAM (Identity and Access Management)?
How to automate authorization management with an IAM tool?
Account sharing = danger!
I don't need an identity and access management solution: I manage!
How did BTP Consultants restructure and automate its onboarding and offboarding processes?
From HR to IT: the painful journey of a new user
Active Directory: how to give access to non-technical users?
10 points to achieve smooth authorization management
What risks do you run by not managing authorizations?
5 good reasons why you will love the MFA/2FA
Onboarding IT: steps to follow for a successful integration
How can HR data be used to set up application access accounts?
How to create your user repository
How do I connect my HRIS and my Active Directory?
Software to review accounts and authorisations
Simplify your IT inventory management
SSO, Single Sign-On: obvious or a bad idea?
What is a ghost account and how to detect them in your Active Directory
When teleworking means a lot of software
Shadow IT and legacy users: the nightmare of CIOs
That moment when cybersecurity is a post-it note
How to automate user accounts in Active Directory?
The 10 most repetitive actions performed by IT departments that can be automated!
Understanding Active Directory and how it works with IAM
How to identify the applications used in your company
Is an offboarding process really necessary?
HR and IT: I love you, I love you not!
What role does the manager play in access management?
How does a fintech player secure user access?
SDIS des Landes successfully manages a large user flow
Identity and access management: what is it?
7 criteria for an identity and access management solution that's right for you
7 pitfalls to avoid when choosing an IAM solution
Making a success of your AMI project: everything you need to know!
Onboarding HR and IT, why it's crucial to do both
Managing departures: the hacker is your former user
How to manage shared accounts between users?