è¿å¹ŽããŒããã©ã¹ãã»ãã¥ãªãã£ã泚ç®ãããŠããããã®çç±ã¯ãåŸæ¥ã®å¢çåã»ãã¥ãªãã£ã¢ãã«ã§ã¯ããã¯ãçŸä»£ã®å€æ§ãªè åšã«å¯Ÿæããããªãããšã«ããããã¬ã¯ãŒã¯ã®æ®åãã¯ã©ãŠããµãŒãã¹ã®å¢å ãæè»ããããåŸæ¥ã®ã¢ãã«ã«ã¯éçãèŠãå§ããŠããã®ã ããã®ãããªèæ¯ãèžãŸãããŒããã©ã¹ãã»ãã¥ãªãã£ã¯ã誰ãä¿¡é Œããªãããšããåæã®äžã§èšèšãããŠããã
æ¬çš¿ã§ã¯ããŒããã©ã¹ãã»ãã¥ãªãã£ã®åºæ¬çãªæŠå¿µãå°å ¥ã¹ããããé¢é£ããæè¡èŠçŽ ã«ã€ããŠè©³ãã解説ããã
ãŒããã©ã¹ãã»ãã¥ãªãã£ãšã¯
ãŒããã©ã¹ãã»ãã¥ãªãã£ãšã¯ã2010幎代ããååšãã2020幎代ã«å ¥ã£ãŠæ¥éã«æ³šç®ãéãå§ããã»ãã¥ãªãã£ã¢ãã«ã§ãããåŸæ¥åã»ãã¥ãªãã£ã¯ãããã¯ãŒã¯ã®å¢çãå®ãããšãéèŠããŠããã®ã«å¯ŸãããŒããã©ã¹ãã§ã¯ããä¿¡é Œããªããåžžã«æ€èšŒããããåºæ¬ååãšããå éšãšå€éšã®åºå¥ãªãå šãŠã®ã¢ã¯ã»ã¹ãå³å¯ã«ç®¡çãç¶ããã
äŸãã°ãå€éšãã瀟å ãããã¯ãŒã¯ãžã®ã¢ã¯ã»ã¹ããã床ã«ãã·ã¹ãã ã«ç»é²ããã端æ«ãã©ãããã端æ«ããŠã€ã«ã¹ã«ææããŠããªããã©ããã確èªãããšãã£ãå ·åã ã
ãªãœãŒã¹åäœã§ã®ã»ãã¥ãªãã£ãéèŠããããã倿§åãããµã€ããŒæ»æãå éšã®è åšã«å¯ŸããŠã广çã«æ©èœããããšãæåŸ ã§ããããã ããè åšå¯Ÿçã®åºæ¬ã¯å€å±€é²åŸ¡ã§ããããŒããã©ã¹ã以å€ã®å¯Ÿçãåæ§ã«éèŠã§ããããšã«ã¯çæãããã
åŸæ¥åã»ãã¥ãªãã£ãšã®éã
åŸæ¥åã»ãã¥ãªãã£ãšã¯ãäžè¬ã«ãå¢çåã»ãã¥ãªãã£ããšãåŒã°ããäŒæ¥ã®å éšãããã¯ãŒã¯ãå€éšããã®è åšããå®ãããã«ãã¡ã€ã¢ãŠã©ãŒã«ãVPNã䜿çšããã¢ãããŒãã§ããããã®ã¢ãããŒãã§ã¯ãäžåºŠå éšã«å ¥ã£ãã¢ã¯ã»ã¹ã¯æ¯èŒçä¿¡é Œãããå éšã®éä¿¡ã«å¯Ÿããç£èŠãçãã«ãªãããšãå€ãã
äžæ¹ããŒããã©ã¹ãã»ãã¥ãªãã£ã¯ãå šãŠã®ã¢ã¯ã»ã¹ãçãããããããªãœãŒã¹ãããã€ã¹ã«å¯ŸããŠç¶ç¶çãªç£èŠãšæ€èšŒãè¡ãããããã¯ãŒã¯ã®å å€ãåãããå šãŠã®ã¢ã¯ã»ã¹ãæ€èšŒããä¿¡é Œãåè©äŸ¡ããããšã§ãæ»æãæŒæŽ©ã«ãããªã¹ã¯ãäœæžããã
åŸæ¥åã»ãã¥ãªãã£ã§ã¯ãäž»ã«å€éšããã®æ»æãé²ãããšãéèŠãããããŒããã©ã¹ãã»ãã¥ãªãã£ã¯ãå éšã®è åšãæ¢ç¥ã®è匱æ§ã«å¯ŸããŠãäžå šã®å¯Ÿçãè¬ããããšãæ±ããããããŒããã©ã¹ãã»ãã¥ãªãã£ã¯ãããå æ¬çã§åçãªã»ãã¥ãªãã£å¯Ÿçã ãšèšããã ããã
ãªãä»ããŒããã©ã¹ããæ³šç®ãããã®ã - ã¯ã©ãŠãã®æ®åãšæ»æã®é«åºŠå
ãŒããã©ã¹ããæ³šç®ãããèæ¯ã«ã¯ã倧ãã2ã€ã®çç±ããããããããã«ã€ããŠèª¬æãããã
ãã¬ã¯ãŒã¯ãšã¯ã©ãŠããµãŒãã¹ã®æ®å
ãŸãããã¬ã¯ãŒã¯ã®æ®åãã¯ã©ãŠããµãŒãã¹ã®å©çšå¢å ãæãããããç¹ã«è¿å¹Žããªã¢ãŒãã¯ãŒã¯ãæ¥éã«æ¡å€§ããåŸæ¥å¡ã瀟å€ãã瀟å ãããã¯ãŒã¯ã«ã¢ã¯ã»ã¹ããæ©äŒãå¢ããããŸããã¯ã©ãŠãç°å¢ã§ã¯ããŒã¿ã®æåšãå€å²ã«ãããããããããã¯ãŒã¯ã®å¢çãææ§ã«ãªã£ãŠããããã®ããããããã¯ãŒã¯å¢çã®é²åŸ¡ã«éãã眮ãåŸæ¥ã®å¢çåã»ãã¥ãªãã£ã§ã¯ååãªå®å šæ§ã®æ ä¿ãé£ãããªã£ãŠããã®ã ã
ãµã€ããŒæ»æã®é«åºŠå
è¿å¹Žã®ãµã€ããŒæ»æã¯ããŸããŸãé«åºŠåã»å·§åŠåããŠãããæšçåæ»æãã©ã³ãµã ãŠã§ã¢ã®æå£ã¯æ¥ã é²åããŠãããäŒæ¥ãçµç¹ã«ãšã£ãŠé倧ãªè åšãšãªã£ãŠãããããããç¶æ³ã®ä»ãäžæ£ã¢ã¯ã»ã¹ãããŒã¿æŒæŽ©ãé²ãããã«ãäŒæ¥ã«ã¯ãã匷åºãªã»ãã¥ãªãã£å¯Ÿçãå¿ èŠãšãªãã
ãããã¯ãŒã¯å å€ãåããåžžã«âçãâãŒããã©ã¹ãã»ãã¥ãªãã£ã¯ããã®ãããªæ°ããªè åšã«å¯Ÿå¿ããããã«éçºãããã¢ãããŒãã§ãããã倿®µéã®èªèšŒãçµãŠåããŠã¢ã¯ã»ã¹ãèš±å¯ããããšã§ãäžæ£ãªã¢ã¯ã»ã¹ãåãããªã¹ã¯ãäœæžããããšããçºæ³ã ã
ãŒããã©ã¹ããšã¯ - ãã®åºæ¬åå
ããã§ã¯ããŒããã©ã¹ãã®æŠå¿µã«ãããåºæ¬ååã«ã€ããŠè§£èª¬ããŠãããã
ãŸãããŒããã©ã¹ãã®ç¬¬äžååã¯ã決ããŠä¿¡çšããªããå¿ ãæ€èšŒãããã§ããããŠãŒã¶ãŒãããã€ã¹ãã©ãã«äœçœ®ããŠãããã«é¢ä¿ãªããæç€ºçãªèªèšŒãšæ¿èªãåžžã«è¡ãããšãåºæ¬ãšãããããã«ãããå éšã®æ»æãäžæ£ã¢ã¯ã»ã¹ãé²ãããšãã§ããã
次ã«ããæå°æš©éã®ååãããããå©çšè ã«å¿ èŠæäœéã®ã¢ã¯ã»ã¹æš©éã®ã¿ãä»äžããããšã§ãäžäžãã¢ã«ãŠã³ãã䟵害ãããŠã被害ãæå°éã«æãããããšããèãæ¹ã ãç¹å®ã®æ¥åã«å¿ èŠãªããŒã¿ã ãã«ã¢ã¯ã»ã¹ãèš±å¯ããä»ã®ããŒã¿ã«ã¯ã¢ã¯ã»ã¹ã§ããªãããã«ãããšãã£ã察å¿ãããã«åœããã
ãããŠæåŸã«ãç¶ç¶çãªç£èŠãšåæãã§ããããããã¯ãŒã¯ãã·ã¹ãã ã®ååãåžžã«ç£èŠããç°åžžãæ€ç¥ããéã«ã¯å³åº§ã«å¯Ÿå¿ãããäŸãã°ããªã¢ã«ã¿ã€ã ã§ãã°ã®è§£æãè¡ããç°åžžãªã¢ã¯ã»ã¹ãã¿ãŒã³ãèŠã€ãåºããšãã£ãå ·åã ãããã«ãããæœåšçãªè åšãæ©æã«çºèŠãã察çãè¬ããããšãã§ããã
以äžã®ååã«åºã¥ããŠããŒããã©ã¹ãã¯ã»ãã¥ãªãã£ãªã¹ã¯ãå€§å¹ ã«äœæžããçµç¹å šäœã®ã»ãã¥ãªãã£ã¬ãã«ãåäžãããã®ã§ããã
èªèšŒãšã¢ã¯ã»ã¹ç®¡ç
èªèšŒãšã¢ã¯ã»ã¹ç®¡çã¯ããŒããã©ã¹ãã»ãã¥ãªãã£ã®äž»èŠãªèŠçŽ ã§ãããåŸæ¥ã®ã»ãã¥ãªãã£ã¢ãã«ã§ã¯å éšãããã¯ãŒã¯å ã®å©çšè ã«å¯Ÿããä¿¡é Œãåæã§ãã£ããããŒããã©ã¹ãã§ã¯ããããã¢ã¯ã»ã¹ãæ€èšŒãç¶ããããšãæ±ãããããäŸãã°ãå©çšè ããããã¯ãŒã¯ã«ã¢ã¯ã»ã¹ãã床ã«å€èŠçŽ èªèšŒïŒMFAïŒMulti-Factor AuthenticationïŒãé©çšããã¢ã¯ã»ã¹æš©éã现ãã管çããããšã§ãäžæ£ãªã¢ã¯ã»ã¹ãæªç¶ã«é²ããšãã£ãå ·åã ã
ãŸããåçããªã·ãŒã掻çšããããšã§å©çšè ã®è¡åãç£èŠããç°åžžãæ€åºãããå Žåã¯ã¢ã¯ã»ã¹ã鮿ãããã远å èªèšŒãèŠæ±ãããããããšãæå¹ã§ããããã ãããªã¢ã«ã¿ã€ã ã§ã®å¯Ÿå¿ã«ã¯5åãã10åã®é å»¶ãçããå¯èœæ§ãããç¹ã«ã¯æ³šæãããã
ããŒã¿ä¿è·ãšç£èŠ
ãŒããã©ã¹ãã»ãã¥ãªãã£ã§ã¯ãããŒã¿ä¿è·ãšç£èŠãéåžžã«éèŠã§ãããããŒã¿ã«å¯Ÿããå šãŠã®ã¢ã¯ã»ã¹ãæ€èšŒããä¿¡é Œã§ããªããã®ãšããŠæ±ãããšãåºæ¬ã ãããŒã¿ã®æå·åãã¢ã¯ã»ã¹æš©éã®å³å¯ãªç®¡çãç¶ç¶çãªç£èŠã¯å¯Ÿçã®äžäŸã ãææ°ã®æè¡ã掻çšãããªã¢ã«ã¿ã€ã ã§ç°åžžãæ€ç¥ããããšã§ãå€éšããã®æ»æã ãã§ãªãå éšã®è åšã«ããããŒã¿æŒæŽ©ã®ãªã¹ã¯ãæå°éã«æããããšãã§ããã
ãŒããã©ã¹ãã®å°å ¥ã¢ãããŒã
ãŒããã©ã¹ãã»ãã¥ãªãã£ã®å°å ¥ã¯ãäœç³»çãã€èšç»çã«é²ããå¿ èŠããããåºæ¬çãªèãæ¹ã¯ã以äžã®éãã ã
å°å
¥æé 1ïŒã»ãã¥ãªãã£è©äŸ¡
ãŒããã©ã¹ãã»ãã¥ãªãã£ã®å°å
¥ã«ãããŠãæåã«è¡ãã¹ãã¯çŸç¶ã®ææ¡ïŒã»ãã¥ãªãã£è©äŸ¡ïŒã§ããããã®è©äŸ¡ã§ã¯ãçŸè¡ã®ã»ãã¥ãªãã£ç¶æ
ã詳现ã«ãã§ãã¯ããæœåšçãªè匱æ§ããªã¹ã¯ãæç¢ºã«ããããã®ããããŸãã¯åãšã³ããã€ã³ãããããã¯ãŒã¯ãã¯ã©ãŠãç°å¢ã®çŸæ³ãåæããã»ãã¥ãªãã£ããªã·ãŒã«å¯Ÿããéµå®åºŠã確èªããã
å°å
¥æé 2ïŒã»ãã¥ãªãã£ããªã·ãŒã®çå®
次ã«ãå
šãŠã®ã¢ã¯ã»ã¹ãªã¯ãšã¹ãã®æ€èšŒãæå°æš©éååã®é©çšãåºæ¬æ¹éãšãããã»ãã¥ãªãã£ããªã·ãŒãçå®ãããå
·äœçã«ã¯ãäŒæ¥å
å€ã®ãŠãŒã¶ãŒãšããã€ã¹ã®ã¢ã¯ã»ã¹æš©éã峿 Œã«ç®¡çããå¿
èŠæå°éã®ã¢ã¯ã»ã¹ã®ã¿ãèš±å¯ããããªã·ãŒãå®ããããšã«ãªãããŸããããªã·ãŒã¯äžåºŠçå®ããŠçµäºã§ã¯ãªããææ°ã®ã»ãã¥ãªãã£ãªã¹ã¯ã«è¿
éã«å¯Ÿå¿ããããã«ã宿çãªèŠçŽããšã¢ããããŒããè¡ãå¿
èŠãããã
å°å
¥æé 3ïŒæè¡ã®éžå®ãšå®è£
æè¡ã®éžå®ãšå®è£
ã¯ããŒããã©ã¹ãã»ãã¥ãªãã£å°å
¥ã®äžã§æãéèŠãªããã»ã¹ã§ãããäŒæ¥ã¯ãèªç€Ÿã®ã»ãã¥ãªãã£èŠä»¶ã«é©ããæè¡ãéžå®ããªããã°ãªããªãããœãªã¥ãŒã·ã§ã³ãšããŠã¯ããšã³ããã€ã³ãä¿è·ãã©ãããã©ãŒã ïŒEPPïŒEndpoint Protection PlatformïŒãããšã³ããã€ã³ãæ€åºã»å¿çïŒEDRïŒEndpoint Detection and ResponseïŒããããŠãŒããã©ã¹ããããã¯ãŒã¯ã¢ã¯ã»ã¹ïŒZTNAïŒZero Trust Network AccessïŒãªã©ã®å©çšãæ€èšããããšã«ãªãã
次ã«ãéžå®ããæè¡ã®å®è£ ãã§ãŒãºã«é²ããããã§ã¯ãåæè¡ã®ã€ã³ãã°ã¬ãŒã·ã§ã³ãšã·ã¹ãã å šäœã®é£æºãéèŠãšãªããé©åãªæè¡ãéžå®ãã广çã«å®è£ ããããšã§ããŒããã©ã¹ãã®ååãå ·äœåã§ããå æ¬çãªã»ãã¥ãªãã£äœå¶ãæ§ç¯ããããšãå¯èœã«ãªãã
ãšã³ããã€ã³ãã»ãã¥ãªãã£ã®åŒ·å - ãœãªã¥ãŒã·ã§ã³ãèãã
å éšã»å€éšãåããâçãâãŒããã©ã¹ãã»ãã¥ãªãã£ã§ã¯ããšã³ããã€ã³ãã»ãã¥ãªãã£ã®åŒ·åãéèŠã ããšã³ããã€ã³ããšã¯ãäŒæ¥ãããã¯ãŒã¯ã®æ«ç«¯ã«äœçœ®ããããã€ã¹ã端æ«ãæãããããã¯å€ãã®ãµã€ããŒæ»æã®æšçãšãªãããã®ããããŸãã¯EPPïŒEndpoint Protection PlatformïŒã®å°å ¥ã«ãã£ãŠåºæ¬çãªé²åŸ¡ãåºããããšãæå¹ã§ãããç°åžžãªæåãçŽ æ©ãæ€ç¥ããäœå¶ãæŽããããã«ã䜵ããŠEDRïŒEndpoint Detection and ResponseïŒã®å©çšãæ€èšã®äœå°ãããããšã³ããã€ã³ãã»ãã¥ãªãã£ã®åŒ·åã¯ãå šäœã®ã»ãã¥ãªãã£äœå¶ã®å ç¢æ§ãé«ããéµãšãªãã
以äžã§ã¯ãããããã®ãœãªã¥ãŒã·ã§ã³ã«ã€ããŠèª¬æããã
EPPïŒEndpoint Protection PlatformïŒã®å°å ¥
EPPã¯ããšã³ããã€ã³ãã§ã®ãã«ãŠã§ã¢æ€åºãææé²æ¢ãè¡ãããšã§ãäŒæ¥ãããã¯ãŒã¯ã®ã»ãã¥ãªãã£ã匷åãããæ¢ç¥ã®ãã«ãŠã§ã¢ã®æ€åºã«ã¯ããã«ãŠã§ã¢ã®ç¹åŸŽãšãåä¿¡ããããŒã¿ãç §äŒãããã¿ãŒã³ãããã³ã°ãæå¹ã ãããã®æ¹æ³ã§ã¯æªç¥ã®ãã«ãŠã§ã¢ã«ã¯å¯Ÿå¿ã§ããªãããã®å¯ŸçãšããŠãAIãæ¯ãèãæ€ç¥ãªã©ã掻çšããæ€åºãè¡ãNGAVïŒNext Generation Anti-VirusïŒãšãããœãããŠã§ã¢ãç»å ŽããŠããã
EDRïŒEndpoint Detection and ResponseïŒã®å©çš
EDRã¯ããªã¢ã«ã¿ã€ã ã§ãšã³ããã€ã³ãã®ç°åžžè¡åãç£èŠãããã°ãã¡ã¿ããŒã¿ãåéããããšã§ãæ»æã®å åãæ©æã«çºèŠããŠç®¡çè ã«éç¥ãããéç¥ãåãã管çè ã¯è©²åœç«¯æ«ãéé¢ããåéãããæ å ±ãåæãããããšã§æªæã®ããããã°ã©ã ã®é§é€ãšåŸ©æ§ã宿œããããšã«ãªããããã«ãããäžäžãã«ãŠã§ã¢ã«äŸµå ¥ãããéã被害ãæå°éã«æããããã
ãããã¯ãŒã¯ã»ãã¥ãªãã£ã®åŒ·å
åŸæ¥ã®å¢çåã»ãã¥ãªãã£ã¢ãã«ãšç°ãªãããŒããã©ã¹ãã§ã¯ãããã¯ãŒã¯å éšã®ãã©ãã£ãã¯ã察象ãšããããããã现ããªã»ãã¥ãªãã£ç®¡çãæ±ãããããå ·äœçãªææ³ã以äžã«æããã
ãŒããã©ã¹ããããã¯ãŒã¯ã¢ã¯ã»ã¹ã®æ§ç¯
ãŒããã©ã¹ããããã¯ãŒã¯ã¢ã¯ã»ã¹ïŒZTNAïŒZero Trust Network AccessïŒã®æ§ç¯ã¯ããŒããã©ã¹ãã»ãã¥ãªãã£ã®äžå¿çèŠçŽ ã§ãããZTNAã¯ãåŸæ¥ã®VPNãšã¯ç°ãªãããŠãŒã¶ãŒãããã€ã¹ã®ã¢ã¯ã»ã¹ãåžžã«æ€èšŒããããšã§ãæªæ¿èªã®ã¢ã¯ã»ã¹ãé²ãããšãå¯èœã§ããã
ZTNAã«é¢ããŠã¯ãã¯ã©ãŠãããŒã¹ã®ãœãªã¥ãŒã·ã§ã³ã掻çšããããšãå€ãããŸããããã€ã¹èªèšŒããŠãŒã¶ãŒèªèšŒãå€èŠçŽ èªèšŒïŒMFAïŒMulti-Factor AuthenticationïŒãçµã¿åãããããšã§ãããé«åºŠãªã»ãã¥ãªãã£ã確ä¿ãããã
ãã®äžé£ã®ããã»ã¹ã¯ãäŒæ¥ã®ã»ãã¥ãªãã£ããªã·ãŒãšé£æºããããšã§å¹æçã«éçšã§ããã
ãããã¯ãŒã¯åé¢ãšæå·å
ãããã¯ãŒã¯åé¢ã¯ããŒããã©ã¹ãã»ãã¥ãªãã£ã®åºæ¬æŠç¥ã®äžã€ã§ãããå éšãããã¯ãŒã¯ãè€æ°ã®ã»ã°ã¡ã³ãã«åããããšã«ãããæ»æè ãã·ã¹ãã å šäœã«ã¢ã¯ã»ã¹ãããªã¹ã¯ãæå°éã«æããããšããèãæ¹ã ãåã»ã°ã¡ã³ãéã®éä¿¡ã¯å³å¯ã«ç®¡çãããèš±å¯ãããããã€ã¹ããŠãŒã¶ãŒã®ã¿ãã¢ã¯ã»ã¹ã§ããããã«ãããããã«æå·åæè¡ãçšããããšã§ãããŒã¿ã®æ©å¯æ§ãä¿è·ã§ããã
ãŒããã©ã¹ããããããã¡ãªãã
ãŒããã©ã¹ãã»ãã¥ãªãã£ã¯ãåŸæ¥ã®å¢çåã»ãã¥ãªãã£ã«æ¯ã¹ãŠå€ãã®ã¡ãªãããããããŸãããããã¯ãŒã¯å šäœã«å¯Ÿãã现ããã¢ã¯ã»ã¹å¶åŸ¡ã«ãããã»ãã¥ãªãã£ãªã¹ã¯ã®å€§å¹ ãªäœæžãå¯èœã ãæ¬¡ã«ããã¬ã¯ãŒã¯ç°å¢ã§ãé«ãã»ãã¥ãªãã£ã確ä¿ããåŸæ¥å¡ãã©ãããã§ãå®å šã«æ¥åãéè¡ã§ããããã®ä»ã«ããç¶ç¶çãªç£èŠãšæ€èšŒã容æã«ãªããè¿ éãªå¯Ÿå¿ãå¯èœãšãªãããšããŒããã©ã¹ãã®å€§ããªã¡ãªããã§ããã
ã»ãã¥ãªãã£ãªã¹ã¯ã®äœæž
å éšãããã¯ãŒã¯ãå€éšã®è åšããå®ãããšã«éãã眮ãåŸæ¥åã»ãã¥ãªãã£ã¢ãã«ã§ã¯ãå éšããã®æ»æã«å¯Ÿããè匱æ§ããã£ããäžæ¹ããŒããã©ã¹ãã§ã¯ãå šãŠã®ã¢ã¯ã»ã¹ã«å¯ŸããŠå³å¯ãªèªèšŒãšç£èŠãè¡ãããã®ãããå éšè åšãåæè åšã®çºçãè¿ éã«æ€ç¥ãã被害ãæå°éã«æããããšãã§ããããŸãããããã¯ãŒã¯ã®åé¢ãæå·åã®åŸ¹åºã«ãããããŒã¿ã®çé£ãæ¹ç«ã®ãªã¹ã¯ãäœæžã§ããã
ãã¬ã¯ãŒã¯ç°å¢ã§ã®å®å¿æ
ãŒããã©ã¹ãã»ãã¥ãªãã£ã§ã¯å šãŠã®ã¢ã¯ã»ã¹ãæ€èšŒãããŠãŒã¶ãŒã«å¿ èŠæäœéã®ã¢ã¯ã»ã¹æš©éãä»äžããããããªã¢ãŒãã¯ãŒã¯äžã§ãé«åºŠãªã»ãã¥ãªãã£ãä¿ããããçµæçã«ã瀟å€ããã®ã¢ã¯ã»ã¹ãå®å šã«è¡ããããããã¬ã¯ãŒã¯ç°å¢ã«ãããçç£æ§ã®åäžãæåŸ ã§ããã ããã
ãŒããã©ã¹ãã®ãã¡ãªãããšéçšã®èª²é¡
ãŒããã©ã¹ãã»ãã¥ãªãã£ã¯å é²çã§å¹æçãªã¢ãããŒãã ããå°å ¥ã«ã¯ããã€ãã®ãã¡ãªãããšèª²é¡ãååšããã
ã³ã¹ãã®åé¡ - 補åå°å ¥ãšãã¬ãŒãã³ã°
ãŒããã©ã¹ãã»ãã¥ãªãã£ã®å°å ¥ã«ã¯å€ãã®äŒæ¥ã§ã³ã¹ãé¢ã®èª²é¡ãååšãããç¹ã«ãå°èŠæš¡ãªäŒæ¥ã§ã¯ã»ãã¥ãªãã£å¯Ÿçã«éãããäºç®ããå²ãåœãŠãããªãããããŒããã©ã¹ãã»ãã¥ãªãã£ã®å°å ¥ãé£ããå Žåããããæ°ãããœãªã¥ãŒã·ã§ã³ã®è³Œå ¥ããœãããŠã§ã¢ã®ã©ã€ã»ã³ã¹ã«å ããæ¢åã·ã¹ãã ãšã®çµ±åãåŸæ¥å¡ã®ãã¬ãŒãã³ã°ãªã©ã®ã³ã¹ãããããããã ããŒããã©ã¹ãã®å°å ¥ã«ããã£ãŠã¯ãããããããšãçè§£ããæ®µéçã«å°å ¥ãé²ããå¿ èŠãããã
éçšã®è€éã
ãŒããã©ã¹ãã»ãã¥ãªãã£ã®å°å ¥ã«ã¯å€ãã®ã¡ãªãããããäžæ¹ã§ãéçšã®è€éãã課é¡ãšãªãããŸãããŒããã©ã¹ãã¯å šãŠã®ãã©ãã£ãã¯ãåžžã«æ€èšŒããå¿ èŠããããããé«åºŠãªç£èŠäœå¶ãæŽåããé©åãªããŒã«ãçšæããªããã°ãªããªããããã«ãåçš®ããã€ã¹ããŠãŒã¶ãŒã®èªèšŒæç¶ããé »ç¹ã«å¿ èŠãšãªããããéçšè² è·ãå¢å€§ããããšãèããããããããŠãã»ãã¥ãªãã£ããªã·ãŒã®ç¶ç¶çãªèŠçŽããšé©çšãè¡ãå¿ èŠããããIT管çè ã«ã¯é«ãå°éç¥èãšã¹ãã«ãæ±ããããã
ãŒããã©ã¹ãã»ãã¥ãªãã£ã®å±æ
ãã§ã«æ³šç®ãéããŠãããŒããã©ã¹ãã»ãã¥ãªãã£ã ããä»åŸããã®éèŠæ§ã¯ãŸããŸãé«ãŸã£ãŠããããšãäºæ³ããããæ¬çš¿ã§ãç¹°ãè¿ãè¿°ã¹ãŠããããã«ããã¬ã¯ãŒã¯ã®æ®åãã¯ã©ãŠããµãŒãã¹ã®æ¡å€§ã«äŒŽããäŒæ¥ã«ãããŠãããã¯ãŒã¯å¢çãè¶ ããã»ãã¥ãªãã£å¯Ÿçã¯ãã¯ãäžå¯æ¬ ã ã
ãŒããã©ã¹ãã»ãã¥ãªãã£ã¯ãäºæž¬çãªè åšæ€åºããªã¢ã«ã¿ã€ã ã®ãªã¹ã¯è©äŸ¡ãç®æããŠãããåŸæ¥ã®ææ³ã倧ããé²åãããå¯èœæ§ããããåææè³ã®ã³ã¹ããéçšã®è€éãã課é¡ã§ã¯ããããé·æçã«èŠãŠãããããäŒæ¥ãç¶ç¶çã«æé·ããŠããäžã§å¿ é ã®ã»ãã¥ãªãã£å¯Ÿçã®äžã€ã ãšèšããã ããã
ã»ãã¥ãªãã£é¢é£ã®æ³šç®ãã¯ã€ãããŒããŒ
æ±äºåæãèŠæ®ããæ¬¡äžä»£ã®ã»ãã¥ãªãã£å¯Ÿçïœãã€ã¯ãã»ã°ã¡ã³ããŒã·ã§ã³æè¡ãšã¯ïœSASEãå°å ¥ããçµç¹ãçŽé¢ãã課é¡ãšã¯ããªãSWGãCASBã®æ©èœãæå€§éã«çãããªãã®ã
ã»ãã¥ãªãã£ã確ä¿ããããã®ãã³ã57ãå ¬éããããããååãªé²åŸ¡äœå¶ãæ·ããŠããã«ã¯
èªæ²»äœãæ¥åã§ã¯ã©ãŠããµãŒãã¹ãå©çšããã«ããããæ±ããããã»ãã¥ãªãã£å¯Ÿçãšã¯
ã»ãã¥ãªãã£ã®åºæ¬ãç¥ã! ãªã¹ã¹ã¡èšäº
ã©ã³ãµã ãŠã§ã¢ã«ã©ã察å¿ãã¹ãããå®è·µæ¹æ³ãã¬ã¯ãã£ãŒããã«ãŠã§ã¢å¯Ÿçã¬ã€ããææçµè·¯ããªã¹ã¯ãäºé²çãæå
EDRãMDRãXDRãšã¯? æŒãããŠããããã»ãã¥ãªãã£ã®ããŒã¯ãŒãã解説
ãšã³ããã€ã³ãã»ãã¥ãªãã£ã®åºæ¬ã解説 - ãªã¹ã¯ãæžããããã«ãã¹ãããšãšã¯
ãŒããã©ã¹ããåºæ¬ãã解説! â誰ãä¿¡é Œããªãâã»ãã¥ãªãã£ãšã¯?
ãããã¯ãŒã¯ã»ãã¥ãªãã£ãé«ããã«ã¯? æŒãããŠããããSASEã®åºæ¬
ã»ãã¥ãªãã£åŒ·åã®ããã«ç¥ã£ãŠãããããµã€ããŒæ»æ - ååãšå¯Ÿç
ç¥ã£ãŠãããããµã€ããŒæ»æ - ååãšå¯Ÿç
æ å ±è³ç£ãå®ãããã«å¿ èŠãªãããã¯ãŒã¯ã»ãã¥ãªãã£ã®åºæ¬
ä»ãè£œé æ¥ãèããã¹ãã»ãã¥ãªãã£å¯Ÿçãšã¯?
ã©ã³ãµã ãŠã§ã¢å¯Ÿçã®åºç€ç¥è - ææçµè·¯ã察çãçºèŠåŸã®å¯Ÿå¿
AIãæªçšãããµã€ããŒæ»æã«ããã«å¯ŸåŠãã¹ãã
ãã£ãã·ã³ã°æ»æãšã¯ - äž»ãªææ³ããªã¹ã¯ãææ°ã®å¯Ÿçæ¹æ³ã埳䞞æ°ã解説
OWASP Top 10ããã²ãè§£ããªã¹ã¯ãå°éå®¶ã解説 - Webã»ãã¥ãªãã£æ åœè å¿ èŠ!
OWASP Top 10 for LLM ApplicationsããèŠããLLMã«ãããã»ãã¥ãªãã£ãªã¹ã¯ãšã¯
DDoSæ»æãšã¯ - æ»æææ³ãã察çãŸã§ãã»ãã¥ãªãã£ã®å°éå®¶ã解説
