Solution
Strengthen your governance
IAM
Control my
onboarding workflows
Automate the creation of
user accesses
Features
Connectors
Resources
Articles
Cas d'usage
Évènements
À propos
Documentation
Pricing
Request a demo
Login
30-day trial
Sitemap
Main pages
Articles
Onboarding et offboarding IT : guide stratégique pour sécuriser le cycle de vie des collaborateurs
Les 10 vulnérabilités les plus courantes détectées lors d'un audit de code
How Chateauform automated its identity management while keeping control of its accesses
NIS2 without IAM? Mission impossible.
SSO and IAM: confusion undermines access security
What are the best IAM solutions in 2025?
Company mergers: the strategic (and all too often underestimated) role of the IT manager
From manual headaches to fluid management: Youzer at the service of firefighters
Why IAM has become a strategic imperative for cybersecurity
Identity management: granting access to third parties without compromising the security of information systems
Dstny takes up the challenge of growth by optimizing the management of its user accounts
Recertifying user accounts: how a French transport company rose to the challenge ahead of the 2024 Olympic Games
Automating HR processes with EDM: a lever for efficiency
Optimize your Active Directory: A complete guide to cleaning up inactive accounts
IT Offboarding: Best Practices for Ensuring Data Security
Identity Lifecycle Management: the key to security and productivity
What is identity and access automation?
Proxiserve automates its 1000 arrivals and departures of temporary workers and service providers
How to effectively protect your application against cyberattacks?
NIS 2 regulation, let's take stock of the issues, obligations and sanctions
The Basque Country community is abandoning its paper forms for automated onboarding.
Cybersecurity: 2023 review and data to watch for 2024
IT onboarding: key points for success
Atoll fully automates its onboardings and offboardings.
A transport player saves time on the supervision of its application accounts
Bring ROI to your IAM project: concrete arguments
7 best practices for identity and access management
How EM Normandie now onboards its students without friction
Self-Service Password Reset: The key to enhanced productivity at work
Automate your account deprovisioning process
Shadow IT: The challenges of using unregulated software
What is application account provisioning?
Why is securing identities a key issue for overall company security?
How did Sewan streamline and automate its user movements?
Create your IT request validation workflows in 6 steps
Understanding approval workflows in 2 minutes
Automate IT resource request approval workflows
How did Skill&You save time and improve reliability in its audits?
Why is having a good offboarding process essential?
Centralize users when you have multiple HR sources
Identity governance and administration: the key to effective management
License management: a challenge for the IT department
Why are ghost accounts dangerous?
Know your users!
Understanding IT entitlement management
What is Privileged Access Management?
How to create a single user repository?
What is IAM, Identity and Access Management?
How to automate your entitlement management with an IAM tool?
Account sharing = danger!
I don't need an identity and access management solution; I manage it myself!
How did BTP Consultants restructure and automate its onboarding and offboarding process?
From HR to IT: the painful journey of a new user
Active Directory: How to grant access to non-technical users?
10 points for successful entitlement management
What risks do you take by not implementing entitlement management?
5 good reasons why you'll love MFA/2FA
IT Onboarding: Steps to Follow for a Successful Integration
How to use HR data to configure application access accounts?
How to create your user repository
How to connect my HRIS and my Active Directory?
Software to perform a review of accounts and entitlements
Simplify IT hardware inventory management
SSO, Single Sign-On: obvious choice or bad idea?
What is a ghost account and how to detect them on your Active Directory
When telecommuting rhymes with a multitude of software
Shadow IT and former users: The IT manager's nightmare
That moment when cybersecurity depends on a post-it note
How to automate user accounts on Active Directory?
The 10 most repetitive actions performed by the IT department that can be automated!
Understanding Active Directory and its operation with an IAM
How to identify the applications used in your company
Is an offboarding process really necessary?
HR and IT: An on-again, off-again relationship!
What role does the manager play in access management?
How does a Fintech company secure its users' access?
The Landes SDIS (Fire and Rescue Service) successfully manages a large user flow.
Identity and Access Management: What is it?
7 criteria for an identity and access management solution that suits you
The 7 pitfalls to avoid when choosing your IAM solution
Succeeding with your IAM project: everything you need to know!
HR and IT Onboarding, why it's crucial to do both
Manage departures: the hacker is your former user.
How to manage accounts shared between users?