Solution
Renforcer ma gouvernance
IAM
Maîtriser mes workflows
d'onboarding
Automatiser la création des
accès de mes utilisateurs
Features
Connectors
Resources
Articles
Newsletter
Évènements
Podcast
Emploi
Documentation
Pricing
Request a demo
Se connecter
Essai 30 jours
Sitemap
Main pages
Articles
Comment Chateauform a automatisé la gestion de ses identités tout en gardant la main sur ses accès
NIS2 sans IAM ? Mission quasi impossible.
SSO et IAM : une confusion qui fragilise la sécurité des accès
Quelles sont les meilleures solutions IAM en 2025 ?
Fusion d’entreprises : le rôle stratégique (et trop souvent sous-estimé) du responsable IT
D’un casse-tête manuel à une gestion fluide : Youzer au service des sapeurs-pompiers
Pourquoi l’IAM est devenu un impératif stratégique pour la cybersécurité
Gestion des Identités : accorder des accès aux tiers sans compromettre la sécurité des systèmes d'information
Dstny relève le défi de la croissance en optimisant la gestion de ses comptes utilisateurs
Recertification des comptes utilisateurs : comment une entreprise de transport française a relevé le défi avant les JOP 2024
Automatiser les processus RH avec la GED : un levier pour l'efficacité
Optimisez votre Active Directory : Guide complet pour nettoyer les comptes inactifs
Offboarding Informatique : Les Meilleures Pratiques pour Assurer la Sécurité de vos Données
L'Identity Lifecycle Management : clé de la sécurité et de la productivité
What is identity and access automation?
Proxiserve automates its 1000 arrivals and departures of temporary workers and service providers
How to effectively protect your application against cyberattacks?
NIS 2 regulation, let's take stock of the issues, obligations and sanctions
The Basque Country community is abandoning its paper forms for automated onboarding.
Cybersecurity: 2023 review and data to watch for 2024
IT onboarding: key points for success
Atoll fully automates its onboardings and offboardings.
A transport player saves time on the supervision of its application accounts
Bring ROI to your IAM project: concrete arguments
7 best practices for identity and access management
How EM Normandie now onboards its students without friction
Self-Service Password Reset: The key to enhanced productivity at work
Automate your account deprovisioning process
Shadow IT: The challenges of using unregulated software
What is application account provisioning?
Why is securing identities a key issue for overall company security?
How did Sewan streamline and automate its user movements?
Create your IT request validation workflows in 6 steps
Understanding approval workflows in 2 minutes
Automate IT resource request approval workflows
How did Skill&You save time and improve reliability in its audits?
Why is having a good offboarding process essential?
Centralize users when you have multiple HR sources
Identity governance and administration: the key to effective management
License management: a challenge for the IT department
Why are ghost accounts dangerous?
Know your users!
Understanding IT entitlement management
What is Privileged Access Management?
How to create a single user repository?
What is IAM, Identity and Access Management?
How to automate your entitlement management with an IAM tool?
Account sharing = danger!
I don't need an identity and access management solution; I manage it myself!
How did BTP Consultants restructure and automate its onboarding and offboarding process?
From HR to IT: the painful journey of a new user
Active Directory: How to grant access to non-technical users?
10 points for successful entitlement management
What risks do you take by not implementing entitlement management?
5 good reasons why you'll love MFA/2FA
IT Onboarding: Steps to Follow for a Successful Integration
How to use HR data to configure application access accounts?
How to create your user repository
How to connect my HRIS and my Active Directory?
Software to perform a review of accounts and entitlements
Simplify IT hardware inventory management
SSO, Single Sign-On: obvious choice or bad idea?
What is a ghost account and how to detect them on your Active Directory
When telecommuting rhymes with a multitude of software
Shadow IT and former users: The IT manager's nightmare
That moment when cybersecurity depends on a post-it note
How to automate user accounts on Active Directory?
The 10 most repetitive actions performed by the IT department that can be automated!
Understanding Active Directory and its operation with an IAM
How to identify the applications used in your company
Is an offboarding process really necessary?
HR and IT: An on-again, off-again relationship!
What role does the manager play in access management?
How does a Fintech company secure its users' access?
The Landes SDIS (Fire and Rescue Service) successfully manages a large user flow.
Identity and Access Management: What is it?
7 criteria for an identity and access management solution that suits you
The 7 pitfalls to avoid when choosing your IAM solution
Succeeding with your IAM project: everything you need to know!
HR and IT Onboarding, why it's crucial to do both
Manage departures: the hacker is your former user.
How to manage accounts shared between users?