æšå¹Ž11æã«ãŠã£ãºã»ãã¥ã¢ã®ã«ã³ããªãŒãããŒãžã£ãŒã«å°±ä»»ããè€å²¡å¥æ°ãæ¬çš¿ã§ã¯ã就任åŸã®æ³ãããä»åŸã®æ¥æ¬åžå Žã«ãããæœçã«ã€ããŠåæ°ã®ã€ã³ã¿ãã¥ãŒããäŒãããã
ãŠã£ãºã»ãã¥ã¢ã¯ãæã£ã以äžã«ããžãã¹ãã§ããŠããã
--ãããŸã§ã®çµæŽã«ã€ããŠæããŠãã ããããŸããã«ã³ããªãŒãããŒãžã£ãŒã«å°±ä»»ããææã¯ãããã§ããããïŒ
è€å²¡æ°(以äžãæ¬ç§°ç¥)ïŒå€§åŠåæ¥åŸã«IBMã§åæ°å¹Žãå¶æ¥ãšããŠè£œé æ¥ãæ åœããŸããããã®åŸãã¢ãããŒã©(çŸåšã¯ã¢ãããŒã©ã»ã¢ããªãã£ãšã¢ãããŒã©ã»ãœãªã¥ãŒã·ã§ã³ãºã«åå²)ãCA Technologiesã§ã¯å人æ å ±ä¿è·æ³ãå¶å®ããã倧æéè¡ãªã©ã«ã»ãã¥ãªãã£é¢é£ã®ãœãããŠã§ã¢ãå°å ¥ããŠããŸããã
ãã®éãã»ãã¥ãªãã£ã«é¢å¿ãæã¡å§ãããã§ãã¯ã»ãã€ã³ãã»ãœãããŠã§ã¢ã»ãã¯ãããžãŒãºããœããã¯ãŠã©ãŒã«ã§ããããã«ã³ããªãŒãããŒãžã£ãŒãã«ã¹ãã«ã¹ããŒã§ã¯ç€Ÿé·ãåããŸãããã»ãã¥ãªãã£æ¥çã«ã¯20幎ã»ã©ããŸãã
ãããŸã§æ¬§å·ã®äŒæ¥ã§åããŠãããšããçµç·¯ãããããšãå人çã«ã¯æã£ã以äžã«ããªãããžãã¹ãã§ããŠãããšæããŠããŸãããèªç¥åºŠã¯ãããŸã§ãªãã®ããªãšæããŸãããšã¯èšããããŒãããŒã¯å€ããSMBã®ããŒã±ããã§ã¯ã·ã§ã¢ã¯æã£ãŠããŸãã
--ãèªèº«ã®ããã·ã§ã³ãšããŠã¯ãã©ã®ããã«èããŠããŸããïŒ
è€å²¡ïŒããããã§ã¯ãåŸæ¥å¡ã200人ïœ3000äººèŠæš¡ããããããŒã±ãããšå®çŸ©ããŠããŸãããçŸåšã®é¡§å®¢ããŒã¹ã¯100人以äžã®äŒæ¥ãå€ãã§ãã
æ¥æ¬ã«ããããããããŒã±ããã®äŒæ¥ã§ã¯ã»ãã¥ãªãã£ã®æµžéçãä»åœãšæ¯ã¹ããšããŸã ãŸã äœãç¶æ³ã§ãããããŠãå€ãã®äŒæ¥ã§ã»ãã¥ãªãã£æ åœè ã確ä¿ã§ããŠãããããããã¯ããå°å ¥ããŠã广ãåãããªãã£ãããéçšãåãããªãã£ããããŠããŸãã
å€åœãããã»ãã¥ãªãã£ã¬ãã«ã®åäžã«ã€ããŠèšåãããŠãããäŸãã°ãµãã©ã€ãã§ãŒã³1ã€ãšã£ãŠãäžå°äŒæ¥ãå€ãååšããŠããŸãã
ãŠã£ãºã»ãã¥ã¢ã¯ãCo- Security(å ±åã»ãã¥ãªãã£)ããæ²ããŠãã»ãã¥ãªãã£ãã³ããŒã®èŠç¹ã§æ¯æŽããŠããŸãããäžå°äŒæ¥ã®ITç°å¢ãæ¯ããŠããã®ã¯ããŒãããŒã§ãã
ããŒãããŒã¯é¡§å®¢äŒæ¥ã®ã»ãã¥ãªãã£ã ãã§ãªãããããã¯ãŒã¯ããµãŒããPCãªã©ãè«ãè² ã£ãŠããããšããã现ããç¶æ³ãææ¡ããŠããŸãã
ãã®ãããªããšãããåœç€Ÿã®ã»ãã¥ãªãã£ã®ç¥èŠãšãããŒããŒãææ¡ããŠããã客ããŸã®ç°å¢ãåãããŠãäžå°äŒæ¥ãã»ãã¥ãªãã£ã®åŽé¢ã§æ¯æŽããããšãã§ãããšèããŠããŸãã
--ã©ã³ãµã ãŠã§ã¢ã®è åšãããäžã§æ¥æ¬äŒæ¥ã«å¯ŸããŠãã©ã®ãããªè²¢ç®ãã§ãããšèããŠããŸããïŒ
è€å²¡ïŒWithSecureã§ã¯æ¬§å·ãå«ããŠãäžçäžã®è åšæ å ±ãå¹ åºãæã£ãŠããŸãã倧æäŒæ¥ã§ã¯ã»ãã¥ãªãã£å¯Ÿçã¯é²ãã§ããŸãããååäŒç€Ÿãé¢é£äŒç€Ÿãçãã±ãŒã¹ãå¢ããŠããŠããŸãããã®ãããåœç€Ÿã¯è åšæ å ±ãæäŸãããããªããžãã¹ã®ããŒã¹ã¯åå䌞ã³ããããããŸãã
æ¥æ¬ã®SOC(Security Operation Center)ã¯ãã»ãã¥ãªãã£ã®ã¬ã€ãã©ã€ã³ã¯ç±³åœã«å¯ããŠããåŸåããããã®ã®ãäŸãã°çšéã®èãæ¹ãã¯ã¬ãžããã«ãŒãã®æ±ºæžæ¹æ³ãªã©ãããŸããŸãªé¢ã§æ¬§å·ã®èãæ¹ãåãå ¥ããŠããŸãã
ããããããšãããSOCã®äºæ¥è ãªã©ã«ãåœç€Ÿãæã€è åšæ å ±ãæäŸããæ¯æŽã§ããé åã¯ãããšèããŠããŸãã
äžçªã®èª²é¡ã¯èªç¥åºŠã®åäž
--ãšã³ã·ã¹ãã ã®èãæ¹ã«ã€ããŠæããŠãã ããã
è€å²¡ïŒã»ãŒã«ã¹ã®ããŒãããŒã¯å€ãã販売ãã£ãã«ãå¢ãããããšèããŠããŸãã販売ãã£ãã«ãå¢ããæ¹æ³ãšããŠã¯ããŸã ãããŠããªããã£ã¹ããªãã¥ãŒã¿ãŒãšã®åæ¥ãèããŠããŸãã
åœç€Ÿã®è£œå䟡å€ãçè§£ããããŒãããŒã®ã客ããŸã«å£²ãããŒãããŒã¯å€ãããŸããããŸã ãªãŒãã§ããŠããªãããŒãããŒãæ°å€ãããŸãã
ãã®ããã颿±åã ãã§ãªãæ¥æ¬å šåœ47éœéåºçã®è²©å£²åºã«å¯ŸããŠãªãŒãããããã«ãã£ã¹ããªãã¥ãŒã¿ãŒã«ååãããã ããªããã販売åºãå¢ãããšããããšã1ã€æããããŸãããããŠãæ¥æ¬èªã§ã®ãµãŒãã¹æäŸãäºå®ããŠããŸãã
MSP(Managed Service Provider)/MSSP(Managed Security Service Provider)ããŒãããŒã«ãã販売ããŒãããŒãžã®ãµãŒãã¹ããžãã¹æ¯æŽãè¡ããŸããããã«ã¯å¶æ¥ããšã³ãžãã¢ã®å¢å¡ã䌎ããã®ã«ãªããŸãã
--çŸç¶ã®èª²é¡ã¯äœããããŸããïŒãŸããæ¥æ¬åžå Žã®å±æã«ã€ããŠã¯ãããã§ããããã
è€å²¡ïŒäžçªã®èª²é¡ã¯èªç¥åºŠã®åäžã§ããããšãã»ãã¥ã¢ãç¥ã£ãŠããŠããŠã£ãºã»ãã¥ã¢(â»)ãšãªããšãç¥ããªã人ã¯å€ããããããŸããã
â»ç·šééšæ³šïŒ2022幎3æã«BtoBåããšBtoCåãã«å瀟åããBtoBã¯WithSecure(ãŠã£ãºã»ãã¥ã¢)ãBtoCã¯F-Secure(ãšãã»ãã¥ã¢)ãšããŠäºæ¥ãå±éããŠããã
ãã®ãããèªç¥ãããæŽ»åã«åãçµã¿ãåºå宣äŒã ãã§ã¯ãªããä»ãåãã®ããã»ãã¥ãªãã£æ¥çã®æ¹ã ã«ãšãã³ãžã§ãªã¹ãã«ãªã£ãŠããã ããããªæŽ»åãèããŠããŸããç§èªèº«ã衚ã«åºãп޻åããŠããã€ããã§ãã
ããã«ãè åšæ å ±ã¯ã©ã®äŒæ¥ã§ã欲ãããããåæã§ã¬ããŒããåºããŠèªç¥æ¡å€§ã«ã€ãªãããã°ãšæããŸããæ¥å¹Ž1æã«ããŒãããŒããã°ã©ã ãå±éããŸãã
ãããã®æŽ»åãé²ããŠããããã«ãä»å¹Žã¯æºåã®å¹Žã«ãªããŸããéé¡ããŒã¹ã§å幎æ¯äºæ¡æé·ãç®æããŠãããå®çŸã«åããŠããŸããŸãªåãçµã¿ãè¡ããŸãã
äŸãã°ãEPP(Endpoint Protection Platform)ãEDR(Endpoint Detection and Response)ãªã©ãšã³ããã€ã³ãä¿è·ã®ãWithSecure Elements Cloudãã«ãåœç€Ÿã®ã»ãã¥ãªãã£ãšãã¹ããŒããElements EDRã§çæããããæ€ç¥ã«é¢ããã¬ããŒãããã³æ¯æ£çã®ã¢ããã€ã¹ãæäŸãã24æé365æ¥ã®ç¶ç¶çãªã¢ãã¿ãªã³ã°ãµãŒãã¹ãCo monitoringããçµã¿åãããŠãæ°ããã»ãã¥ãªãã£ãªãã¬ãŒã·ã§ã³ã®ã¹ã¿ã³ããŒãã«ããããšèããŠããŸãã
å€éšã«å§èšãããšã³ã¹ããããããããäžå°äŒæ¥ã§ã¯åãå ¥ãããããµãŒãã¹ã ãšæããŸãããŸããè匱æ§ç®¡çã®åžå Žã«ãã©ãŒã«ã¹ããã¢ã¿ãã¯ãµãŒãã§ã¹ç®¡çããããªã¹ã¯ã«å¯ŸããŠå æ¬çãªç®¡çãè¡ããè匱æ§ã®çºèŠãããªã©ãæææ±ºå®ãæ¯æŽãããExposure Managementããæ¥å¹ŽåŸåã«æ¥æ¬äŒæ¥ã«æäŸããŠãããŸãã

