{"id":783,"date":"2022-03-31T07:01:06","date_gmt":"2022-03-31T07:01:06","guid":{"rendered":"https:\/\/www.almtoolbox.com\/fr\/blog\/?p=783"},"modified":"2022-05-12T12:40:45","modified_gmt":"2022-05-12T12:40:45","slug":"akeyless-customer-story-stash","status":"publish","type":"post","link":"https:\/\/www.almtoolbox.com\/fr\/blog\/akeyless-customer-story-stash\/","title":{"rendered":"T\u00e9moignage client : pourquoi Stash Company a choisi les solutions Akeyless"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Gavin Grisamore, the CISO of Stash (an American company from New York that deals with finance and investments) explains in the following recording why they chose the <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><i><span style=\"font-weight: 400;\">Secrets Management<\/span><\/i><span style=\"font-weight: 400;\"> and <\/span><i><span style=\"font-weight: 400;\">Secure Remote Access<\/span><\/i><span style=\"font-weight: 400;\"> solutions of Akeyless,<br \/>\n<\/span><span style=\"font-weight: 400;\">and how it also helps them implement remote access for their employees and how it <\/span><span style=\"font-weight: 400;\">resolves their \u201cZero Trust\u201d challenges.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Watch here (6 min.):<\/span><\/h3>\n<p>Gavin Grisamore, le CISO de Stash (une soci\u00e9t\u00e9 am\u00e9ricaine de New York qui s&#8217;occupe de la finance et des investissements) explique dans l&#8217;enregistrement suivant pourquoi ils ont choisi le<br \/>\nLes solutions de gestion des secrets et d&#8217;acc\u00e8s \u00e0 distance s\u00e9curis\u00e9 d&#8217;Akeyless,<br \/>\net comment cela les aide \u00e9galement \u00e0 mettre en \u0153uvre l&#8217;acc\u00e8s \u00e0 distance pour leurs employ\u00e9s et comment cela r\u00e9sout leurs d\u00e9fis \u00ab Zero Trust \u00bb.<\/p>\n<p>Regardez ici (6 min.):<\/p>\n<div style=\"padding: 56.25% 0 0 0; position: relative;\"><iframe style=\"position: absolute; top: 0; left: 0; width: 100%; height: 100%;\" title=\"stash-akeyless-case-study\" src=\"https:\/\/player.vimeo.com\/video\/692730690?h=9d87ddc08a&amp;badge=0&amp;autopause=0&amp;player_id=0&amp;app_id=58479\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<p><script src=\"https:\/\/player.vimeo.com\/api\/player.js\"><\/script><\/p>\n<p>Nous avons ajout\u00e9 des sous-titres\u00a0 pour votre convenance.<\/p>\n<p><u>Le texte int\u00e9gral est disponibleici\u00a0<\/u><\/p>\n<p>&nbsp;<\/p>\n<div class=\"alm-box\">Nous repr\u00e9sentons officiellement Akeyless en France et dans le monde, et nous sommes sp\u00e9cialis\u00e9s dans les solutions de l&#8217;entreprise et DevSecOps.<br \/>\nNous serons heureux de r\u00e9pondre \u00e0 vos questions concernant les solutions Akeyless, et de vous aider \u00e0 \u00e9valuer les produits et sa bonne implantation dans l&#8217;organisation.<br \/>\nPour plus de d\u00e9tails contactez-nous : <a href=\"mailto:akeyless@almtoolbox.com\" target=\"_blank\" rel=\"noopener\">akeyless@almtoolbox.com<\/a> ou par t\u00e9l\u00e9phone : +33 01 84 17 53 28<\/div>\n<h3>Lien utiles:<\/h3>\n<ul>\n<li>La solutiom <a href=\"https:\/\/www.almtoolbox.com\/fr\/akeyless-vault\" target=\"_blank\" rel=\"noopener\">Akeyless Vault<\/a><\/li>\n<li>La solution <a href=\"https:\/\/www.almtoolbox.com\/akeyless-remote-access\" target=\"_blank\" rel=\"noopener\">Akeyless Secure Remote Access<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Gavin Grisamore, the CISO of Stash (an American company from New York that deals with finance and investments) explains in the following recording why they chose the Secrets Management and Secure Remote Access solutions of Akeyless, and how it also helps them implement remote access for their employees and how it resolves their \u201cZero Trust\u201d&hellip; <a class=\"more-link\" href=\"https:\/\/www.almtoolbox.com\/fr\/blog\/akeyless-customer-story-stash\/\">Continue reading <span class=\"screen-reader-text\">T\u00e9moignage client : pourquoi Stash Company a choisi les solutions Akeyless<\/span> <span class=\"meta-nav\" aria-hidden=\"true\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[100,108,35,109,101],"tags":[],"class_list":["post-783","post","type-post","status-publish","format-standard","hentry","category-akeyless","category-case-studies","category-devsecops","category-remote-access","category-secrets-management"],"_links":{"self":[{"href":"https:\/\/www.almtoolbox.com\/fr\/blog\/wp-json\/wp\/v2\/posts\/783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.almtoolbox.com\/fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.almtoolbox.com\/fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/fr\/blog\/wp-json\/wp\/v2\/comments?post=783"}],"version-history":[{"count":6,"href":"https:\/\/www.almtoolbox.com\/fr\/blog\/wp-json\/wp\/v2\/posts\/783\/revisions"}],"predecessor-version":[{"id":808,"href":"https:\/\/www.almtoolbox.com\/fr\/blog\/wp-json\/wp\/v2\/posts\/783\/revisions\/808"}],"wp:attachment":[{"href":"https:\/\/www.almtoolbox.com\/fr\/blog\/wp-json\/wp\/v2\/media?parent=783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/fr\/blog\/wp-json\/wp\/v2\/categories?post=783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/fr\/blog\/wp-json\/wp\/v2\/tags?post=783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}