Verizon Data Breach Investigations Report (幎 Verizon ããŒã¿äŸµå®³èª¿æ»ã¬ããŒã)ã«ãããšã䟵害㮠85% ã«ã¯äœããã®ãã¥ãŒãã³ãšã©ãŒãé¢ä¿ããŠããŸããE ã¡ãŒã«ã¯äŸç¶ãšããŠãã人ãã®è匱æ§ãçãPeople-Centric ãªæ»æã«ãããŠæäžäœã®è åšãã¯ãã«ãšãªã£ãŠããŸãããŸããã©ã³ãµã ãŠã§ã¢ãããžãã¹ã¡ãŒã«è©æ¬º (BEC)ãã¡ãŒã«è©æ¬ºã¯ãçµç¹ã«äœçŸäžãã«ãã®æå®³ãäžããŠããŸãã
ã§ã¯ããã®ããã«æ¥éã«é«åºŠåãã€ã€ããå±éºãªè åšã«å¯ŸããŠãã©ã®ãããªæåçãããã§ããããïŒãã®çãã¯ãGartner ãæè¿å ¬éããã2021 Market Guide for Email Securityãã¬ããŒãã§åãäžããå 容ã«ãããŸãããã®ã¬ã€ãã§ãGartner ã¯ãã»ãã¥ãªãã£ã«ãããããªãŒããŒãã¡ãŒã« ã»ãã¥ãªã㣠ãœãªã¥ãŒã·ã§ã³ãéžå®ããéã«æ€èšãã¹ãæ©èœã®å æ¬çãªãªã¹ããæäŸããŠããŸãã
ãã«ãŒããã€ã³ãã®ã¡ãŒã« ã»ãã¥ãªãã£ãœãªã¥ãŒã·ã§ã³ãå©çšããŠãå å®ãã察çãã©ã®ããã«å¯èœã«ãªãã®ãã以äžã§èª¬æããŸãã
ãã«ãŒããã€ã³ãã¯ãGartner ãèšåããŠããæ©èœã«å¯Ÿå¿ã§ãããšèªè² ããŠããŸãã
ã¡ãŒã« ã»ãã¥ãªãã£ã¯ãã±ãŒãã®ããã«äœéãã®å±€ã§æ§æããå¿ èŠããããŸã
å³ 1ïŒææ°ã®ãGartner Market Guide for Email Securityãã§æŠèª¬ãããŠãã 5 ã€ã®ãããªèŠä»¶
ã¡ãŒã« ã»ãã¥ãªãã£ã«ãããŠãã£ãšãéèŠãªç¬¬ 1 ã®åŽé¢ã¯ã广ãçºæ®ããããã«è€æ°ã®å±€ãå¿ èŠã§ãããšããããšã§ããçŸåšã®è åšç¶æ³ã 1 ã€ã®å±€ã 1 ã€ã®è£œåã§è§£æ±ºã§ãããšæåŸ ããæä»£ã¯çµãããŸããã以äžã¯ãçŸåšã®åžå Žã«ãããã¡ãŒã« ã»ãã¥ãªãã£ã®å®çŸ©ã«ã€ããŠãGartner ãèšåããå 容ã§ãã
ãã¡ãŒã« ã»ãã¥ãªãã£ã¯ãã²ãŒããŠã§ã€ãã¡ãŒã«ã·ã¹ãã ããŠãŒã¶ãŒè¡åãã³ã³ãã³ã ã»ãã¥ãªãã£ã«å ãããµããŒãã®ããã®ããŸããŸãªããã»ã¹ããµãŒãã¹ãããã³ãã®åšèŸºã®ã»ãã¥ãªã㣠ã¢ãŒããã¯ãã£ã«ãŸã§åã³ãŸãã广çãªã¡ãŒã« ã»ãã¥ãªãã£ãå®çŸããã«ã¯ãå¿ èŠãªæ©èœãæ§æãåãã驿 Œãªè£œåãéžæããã ãã§ãªããé©åãªéçšæé ãå°å ¥ããããšãæ±ããããŸããã
ãã«ãŒããã€ã³ãããã®èãæ¹ã«åæããŠããŸããã ãããããéçšäžã®ææãæ¹åãããªã¹ã¯ãäœæžãããšãšãã«ãPeople-Centric ãªè åšã«å¯Ÿããé«ãå¯èŠæ§ãã客æ§ã«æäŸããããã®çµ±åçãªå€å±€ã¢ãããŒããæ§ç¯ããŠããã®ã§ãã
Gartner ã®ãããŒã±ããã»ã¬ã€ããã§è¿°ã¹ãããã¡ãŒã« ã»ãã¥ãªãã£ã«é¢ããèŠä»¶ã詳ããèå¯ãããã«ãŒããã€ã³ããã©ã®ããã«ã㊠Gartner ã®æšå¥šäºé ãå®çŸããŠããã®ãã確èªããŸãããã
ãã® 1ïŒBEC ããã³åŸæ¥ã®è åšã«å¯Ÿæããé«åºŠãªä¿è·ç
å®è¡ã容æã§ããã€ãæªæã®ãããã€ããŒããåã蟌ãŸããªãããäžè¬çã«æ€ç¥ãé£ãããšããçç±ãããããžãã¹ã¡ãŒã«è©æ¬º(BEC) æ»æãæ¥å¢ããŠããŸããæ¯æã ãã«ãŒããã€ã³ãã¯æ°çŸäžãã® BEC æ»æã顧客ã«å±ãã®ã黿¢ããŠããŸãã

å³ 2ïŒãã«ãŒããã€ã³ãã¯ãã£ãšãä¿¡é ŒãããŠãããã³ããŒã§ãããFortune 100ãFortune 1000ãããã³ Global 2000 ã«ã©ã³ã¯ã€ã³ããå€ãã®äŒæ¥ã§æ¡çšãããŠããããŒã±ãããªãŒããŒã§ãã
ã¡ãŒã« ã»ãã¥ãªãã£åãã®é«åºŠãªè
åšå¯Ÿçã«ãããŠããã«ãŒããã€ã³ããä¿¡é Œãã Fortune 100ãFortune 1000ãããã³ Global 2000 äŒæ¥ãå¢å ããŠããã®ã«ã¯çç±ããããŸããProofpoint Nexus Threat Graph ã¯ãE ã¡ãŒã«ãã¯ã©ãŠãããããã¯ãŒã¯ããã¡ã€ã³ããœãŒã·ã£ã«ã¡ãã£ã¢ããŠãŒã¶ãŒãããã³ãç·å¢ 100 åãè¶
ããè
åšã€ã³ããªãžã§ã³ã¹ ããŒã ããã® 1 å
ãè¶
ããããŒã¿ãã€ã³ããçµã¿åããããã®ã§ããã«ãŒããã€ã³ãã®å®çžŸãã广ãšèœåãåŒãåºãããšã«ãããæ°ããªè
åšã«è¿
éã«å¯ŸåŠããŸãã
Gartner ã¯ãåçµç¹ã«ä»¥äžã®ããã«åŒã³ãããŠããŸãã
ãäŒè©±å±¥æŽãåæããŠç°åžžãæ€ç¥ãã BEC 察çããE ã¡ãŒã«å ã®äžå¯©ãªãªã³ã¯ãåæããã³ã³ãã¥ãŒã¿ããžã§ã³ã§ã¯ããã·ã³ã©ãŒãã³ã° ããã³ AI ããŒã¹ã®ãã£ãã·ã³ã°å¯Ÿçæè¡ãé§äœ¿ããã¡ãŒã« ã»ãã¥ãªã㣠ãœãªã¥ãŒã·ã§ã³ãæ¢ãå¿ èŠããããŸããã

å³ 3ïŒBEC æ»æã®é»æ¢ã«æçšãªãã«ãŒããã€ã³ãã®ãã©ãããã©ãŒã æ©èœ
ãã«ãŒããã€ã³ãã¯ãå€§èŠæš¡ãªNexusAI æ€ç¥ãšã³ãžã³ã®äžéšãšããŠã20 幎以äžã«ããããæ©æ¢°åŠç¿ (ML) ã¢ã«ãŽãªãºã ã®æ¹è¯ãç¶ããŠããŸãã2021 å¹Žã®æ©ã段éã§ãSupernova ãšåã¥ãããŸã£ããæ°ããæ€ç¥ãã©ãããã©ãŒã ãçšãã Advanced BEC Defense ãç«ã¡äžããŸãããéåä¿¡ã²ãŒããŠã§ã€ ãã¬ã¡ããªããµãã©ã€ãã§ãŒã³ ãªã¹ã¯åæããã㊠Microsoft 365 ã Google Workspace ãã¯ãããšããã¯ã©ãŠãçç£æ§ãã©ãããã©ãŒã ããã® API ããŒã¿ã掻çšãããã®æ©èœãªããéåžžã«é«åºŠãªã¡ãŒã«è©æ¬ºã®æ»æãç確ã«çºèŠã§ããŸãããªãããã®æ©èœã¯ãã«ãŒããã€ã³ãã®é«åºŠãªã¡ãŒã« ã»ãã¥ãªãã£ã®ã©ã€ã»ã³ã¹ãã¹ãŠã«å«ãŸããŠããŸãã
æ©æ¢°åŠç¿ã人工ç¥èœ (AI) ãæ¥çã®æµè¡èªçååšã§ããäžæ¹ã§ãæ¬åœã«éèŠãªã®ã¯èšèã«ããããŒã±ãã£ã³ã°ããã广ã瀺ãçµæã®æ¹ã§ããã¡ãŒã« ã»ãã¥ãªãã£ã®ããŒã±ãããªãŒããŒã§ãããã«ãŒããã€ã³ãã®æ¯é¡ãªãåæã«ãããããå€ãã®ããŒã¿ãåŸãããããé«ã广ã«ã€ãªãããŸããå€ãã®ã¡ãŒã« ã»ãã¥ãªã㣠ãœãªã¥ãŒã·ã§ã³ãšã¯ç°ãªãããã«ãŒããã€ã³ãã¯ãBEC ã®æ€ç¥ã§äœã誀æ€ç¥çãå®çŸããŠãããããŒã ãã¡ãã»ãŒãžãéžå¥ãããã®ã¡ãã»ãŒãžãå®éã«æªæã®ãããã®ã§ãããã©ããã倿ããã®ã«äœèšãªæéãè²»ãããªãããã«ããŠããŸãã
ãããããã«ãŒããã€ã³ãã黿¢ããæ»æã¯ BEC ã ãã§ã¯ãããŸãããé«åºŠãªãµã³ãããã¯ã¹ãçšããŠãæªç¥ã®æ·»ä»ãã¡ã€ã«ã URL ãæ€æ»ããŸããæ»æè ã¯ããç¥ããããµãŒãã¹ãå©çšããŠæ€ç¥ãåé¿ããææ³ã䜿ãããã«ãªã£ãŠããŠãããäžã§ãæ£èŠã®ãã¡ã€ã«å ±æãµãŒãã¹ã®æªçšãå¢å ããŠããããšã確èªãããŠããããããã¹ãŠã®ãã¡ã€ã«å ±æ URL ãäºæž¬çã«ãµã³ãããã¯ã¹è§£æã宿œããŠããŸãããã«ãŒããã€ã³ãã®èª¿æ»ã«ãããšãé ä¿¡ãããæªæã®ãã URL ã®ãã¡ã忰以äžã Microsoft (OneDriveãSharePoint ãªã©) ããã®ãã®ã§ããã
ãã«ãŒããã€ã³ãã¯ãåã«æ·»ä»ãã¡ã€ã« (ãã®äžã® URL ãå«ã) ã ãã§ãªãããã¹ã¯ãŒãã§ä¿è·ãããŠããæ·»ä»ãã¡ã€ã«ãæ€æ»ããŸãããŸããURL ã®æžãæãããã¯ãªãã¯æã«åæããããªãããšã«ããããããããããã¯ãŒã¯ãããã€ã¹äžã®ãŠãŒã¶ãŒãä¿è·ããŸããããã«ãããé ä¿¡åŸã«æªæããã£ãŠèµ·åããã³ã³ãã³ãã«ãããªã¹ã¯ãäœæžããããšãã§ããŸãã
ãã® 2ïŒäžçäžã®å€ãã®çµç¹ãä¿¡é Œãã DMARC èªèšŒ
éèŠãªé²åŸ¡å±€ã§ããèªèšŒã¯ãBEC æ»æã黿¢ããçµç¹ã®ãã©ã³ããä¿è·ããããã«ã¯ãäžèŠããŠèŠåãã®ã€ããªãé¡äŒŒãã¡ã€ã³ãªã©ããã®æ»æã黿¢ããããã®æ å ±ãæäŸã§ãããããµããŒãããŸãã
Gartner ã¯ãåçµç¹ã«æ¬¡ã®å¿ èŠæ§ã蚎ããŠããŸãããDMARC ãå®è£ ãããã¡ã€ã³ã®ãªãããŸãæ»æã«å¯Ÿæã§ããå¿ èŠããããŸããããŸããæ¬¡ã®ææãããŠããŸãã
ãDMARC ã«ãããåŸæ¥å¡ãããŒãããŒãé¡§å®¢ãæšçãšãããŸã£ããåãååã®ãã¡ã€ã³ã®ãªãããŸãã黿¢ããããšã¯ã§ããŸãããçµç¹å ã®ãã¡ã€ã³ã®ãµã€ãºãæ°ã«ãã£ãŠã¯é£ãããªãå¯èœæ§ããããŸããDMARC ã®å®è£ ãç¶ç¶çç£èŠã®æ¯æŽã«ã¯ããããã§ãã·ã§ãã« ãµãŒãã¹ãå¿ èŠãšãªãããšãå°ãªããããŸãããã

å³ 4ïŒããŸããŸãªãã³ããŒã«ãã DMARC ã®å®è£ ã瀺ãã°ã©ã
ãã«ãŒããã€ã³ãã¯ãä»ã®ã©ã®ãã³ããŒãããå€ãã® Fortune 1000 äŒæ¥ã« DMARC ãå®è£ ããŠãããé«åºŠãªæ§æãå®çŸããã®ã«å¿ èŠãªå°éç¥èãåããŠããŸãã
ããããªãããçµç¹ã DMARC ãå®è£ ãããããšãã£ãŠãããã§çµãããšããããã§ã¯ãããŸããã
ãã® 3ïŒçµ±åãããã»ãã¥ãªãã£æèåäžãã¬ãŒãã³ã°
ãŸãGartner ã¯ããããŒã±ããã»ã¬ã€ããã®äžã§ãçµ±åãããã»ãã¥ãªãã£æèåäžãã¬ãŒãã³ã°ã®æŠå¿µã«ã€ããŠã次ã®ããã«èª¬æããŠããŸãã
ãã»ãã¥ãªãã£æèåäžãã¬ãŒãã³ã°ã®åŒ·åã«åœ¹ç«ã€ãã³ã³ããã¹ãèªèãããŒãå«ãã 補åãæ€èšããŠãã ããããŸãããŠãŒã¶ãŒæè²ã«æè³ãããšãšãã«ãäžè¬çã«ãªãããŸãæ»æã®æšçãšãªã財åããã³æ©å¯ããŒã¿ ãã©ã³ã¶ã¯ã·ã§ã³ã«é¢ããæšæºçãªéçšæé ãå°å ¥ããŸããããã
ãã«ãŒããã€ã³ãã¯ãæšçåæ»æã«å¯Ÿæããããã®ãŠãŒã¶ãŒæè²ã«é¢ããŠãæ¥çã®æå 端ãè¡ããŸãããã«ãŒããã€ã³ãã®ã¡ãŒã« ã»ãã¥ãªã㣠ãœãªã¥ãŒã·ã§ã³ã¯ãã»ãã¥ãªãã£æèåäžãã¬ãŒãã³ã°ãšå¯æ¥ã«é¢é£ã¥ããããŠãããæ¬¡ã®ããã«ãæšçãçµã£ã广çãªæè²ãæäŸããããšãã§ããŸãã
- Proofpoint TAP (Targeted Attack Protection) Guided Training ã®çµ±åã«ããããã®çµç¹ã§æãçãããŠããéèŠäººç©ã§ããVery Attacked People⢠ãå®éã«æªæããã¡ãŒã«ã®åœ±é¿ãåããŠãããŠãŒã¶ãŒããé¢é£ã®ããæè²ã«èªåç»é²ããããšãã§ããŸãã
- ãã«ãŒããã€ã³ãã®ã³ã³ãã³ãã¯ããã«ãŒããã€ã³ãã®è åšã€ã³ããªãžã§ã³ã¹ã«åºã¥ããŠãããå¹ åºãã³ã³ãã³ã ã©ã€ãã©ãªã®äžã§ãæšæºçãªéçšæé ã«å¯Ÿããããšããæ»æããããŠæ¬æ Œçãªæ»æãã£ã³ããŒã³ã®åŸåãææ¡ã§ããŸãã
- ãã«ãŒããã€ã³ãã®ã»ãã¥ãªãã£æèåäžãã¬ãŒãã³ã° ãœãªã¥ãŒã·ã§ã³ã§ã¯ãProofpoint Nexus Threat Graph ãšèªç€Ÿã®è åšæ€ç¥ã¹ã¿ãã¯ã䜿çšããããŠãŒã¶ãŒããå ±åãããã¡ãã»ãŒãžãåŸç¹åãããŠãŒã¶ãŒã«ããå ±åã®æ£ç¢ºæ§ã«é¢ããæ å ±ã確èªã§ããŸãã

å³ 5ïŒäžå¯©ãªã¡ãŒã«ã§ããããšãå ±åã§ããæ©èœãåãããHTML ããŒã¹ã®ãã«ãŒããã€ã³ã ã¡ãŒã«èŠåã¿ã°ã«ãããçµç¹ã®æèãåäžããããšãšãã«ãã¡ãŒã« ã»ãã¥ãªãã£äœå¶ãæ¹åããããšãå¯èœ
ãŸããã¡ãŒã« ã»ãã¥ãªã㣠ãµãŒãã¹ããå©çšã®ãã¹ãŠã®ã客æ§ã® E ã¡ãŒã«ã«ã¯ãäžå¯©ãªã¡ãŒã«ã§ããããšãå ±åã§ããæ©èœãåãããã³ã³ããã¹ããããã³ HTML ããŒã¹ã®ã¡ãŒã«èŠåã¿ã°ã衚瀺ãããããã«ãªãããããŠãŒã¶ãŒã¯ããã€ã¹ã«é¢ä¿ãªããå±éºæ§ã®é«ã E ã¡ãŒã«ã«é¢ããã³ã³ããã¹ããå ¥æããç°¡åã«å ±åããããšãã§ããŸãããŠãŒã¶ãŒãã¡ãã»ãŒãžãå ±åãããšããã«ãŒããã€ã³ãã¯ãããŒã ã«äžããéçšäžã®åœ±é¿ãäœæžããããã®åŒ·åãªã¡ãŒã« ã»ãã¥ãªã㣠ãªãŒã±ã¹ãã¬ãŒã·ã§ã³ããã³å¯Ÿå¿ããããªãäžæ¹ããŠãŒã¶ãŒã«ãã£ãŒãããã¯ããããªãããšã«ããããæ£ããå ±åãããããšã確èªãããå ±åãããã¡ãã»ãŒãžã®çš®é¡ãéç¥ããŸãã
ãã® 4ïŒæ¥åãåçã«æ¹åãã匷åãªèªååæ©èœãåãã mSOAR
ãã«ãŒããã€ã³ãã® mSOAR ãœãªã¥ãŒã·ã§ã³ã§ãã Proofpoint TRAP (Threat Response Auto-Pull) ã«ã¯ãäž»ã«ä»¥äžã® 2 ã€ã®ãŠãŒã¹ã±ãŒã¹ããããŸãã
- åä¿¡åŸã«ç¹å®ããã E ã¡ãŒã«ãæŠåšåããã E ã¡ãŒã«ãèªåçã«åé€
- ãŠãŒã¶ãŒããå ±åãããã¡ãã»ãŒãžã修埩
Gartner ã¯ãããŒã±ããã»ã¬ã€ããã®äžã§ãmSOAR ããŒã«ã«ã€ããŠä»¥äžã®ããã«è¿°ã¹ãŠããŸãã
ãE ã¡ãŒã«ãèªåçã«ååé¡ããåä¿¡ãã¬ã€ããåé€ããã®ããµããŒããã mSOAR ããŒã«ã«ããããŠãŒã¶ãŒããå ±åããã E ã¡ãŒã«ãåŠçãããããã«ãªããŸããããã«ãããå ±åããã E ã¡ãŒã«ã®åŠçã¯ç°¡çŽ åãããŸããã修埩ã¯äŸç¶ãšããŠããã ã§ããå¿æ®ºãããŠãã IT ã»ãã¥ãªã㣠ããŒã ãžã®è² æ ãšãªãå¯èœæ§ããããŸããã

å³ 6: ã€ã³ã·ãã³ã ã¬ã¹ãã³ã¹æéã®å€§å¹ ã«ãããå®çŸããããã«ãŒããã€ã³ãã«ããã¡ãŒã« ã»ãã¥ãªãã£åãæ€ç¥ã¢ã³ãµã³ãã«ã®æŠèŠ
IT ã»ãã¥ãªã㣠ããŒã ã®è² æ ã軜æžããããããã«ãŒããã€ã³ãã§ã¯ãProofpoint Nexus Threat Graph ã«ãããŠæ¥çããªãŒãããããŒã¿ããŒã¹ãšãèªç€Ÿã®é«åºŠãªæ€ç¥ã¹ã¿ãã¯ã掻çšããŠãããäžèšã®ãŠãŒã¹ã±ãŒã¹ã§ã¯ãæå€§ 90% è² æ ã軜æžããŠããŸãã
ã¡ãã»ãŒãžããã®æ€ç¥ã¢ã³ãµã³ãã«ããã¹ãŠééããããšã¯ãéé¢ (転éãããã¡ãŒã«ãé¡äŒŒã®ã¡ãã»ãŒãžãå«ã)ãã±ãŒã¹ã¯ããŒãºãããã«ã¯ãOktaãSailPointãCrowdStrikeãPalo Alto NetworksãVMware Carbon Black ãšãã£ããã¯ãããžãŒ ããŒãããŒãšçµ±åãããã¯ãŒã¯ãããŒãªã©ã次ã®ã¢ã¯ã·ã§ã³ãã¢ã¯ãã£ãåãããæ¥åãå¹çåã§ããŸãã
ãã®èªååã«ãããå éšãªãœãŒã¹ããã®ã³ã¹ããæ°åãã«åæžããããšãã§ããŸãããããå®çŸãããããå»çæ©é¢ã«ãããäŸã ãã®ãã¯ã€ãããŒããŒã§ãã²ã芧ãã ããã
ãã® 5ïŒProofpoint Information Protection ãã©ãããã©ãŒã ã®äžéšã§ãã Proofpoint Email DLP
ãã«ãŒããã€ã³ãã§ã¯ãããæ¬¡ã®ãããªè¡šçŸã䜿ã£ãŠããŸãããããŒã¿ãã²ãšãã§åæã«æµåºãããã¯ããªãããã¡ãŒã«ããŒã¿ã®ä¿è·ããã¡ãŒã« ã»ãã¥ãªãã£ãæ å ±ä¿è·ã®æ±ºå®çãªèŠçŽ ã§ãããšããã匷調ããŠãããããããšã¯ãããŸããã
仿¥ã§ã¯ãã¡ãŒã«ããŒã¿ã®ä¿è·ã¯ãã€ãŠãªãã»ã©éèŠã«ãªã£ãŠããŸããGartner ã¯ãããŒã±ããã»ã¬ã€ããã§ä»¥äžã®ããã«è¿°ã¹ãŠããŸãã
ãããŒãããŒã顧客㚠E ã¡ãŒã«ã§å ±æããæ©å¯ããŒã¿ãä¿è·ã远跡ã§ããããšã«å ããç·šéã§ããå¯èœæ§ãããããšã¯ããšãã«å¶å®ãçžæ¬¡ãèŠå¶ããã©ã€ãã·ãŒæ³ãªã©ãèžãŸãããšãããããŠéèŠã«ãªã£ãŠãããšèšããŸãããŸããE ã¡ãŒã«ãããšãã«å¶çºçãªããŒã¿æå€±ã®ããã«ãããŒã¿äŸµå®³ã®ãã£ãšãäžè¬çãªåå ã§ããç¶ããŠããŸããã

å³ 7ïŒProofpoint Information and Cloud Security ãã©ãããã©ãŒã ã®å®å šçã§ã¯ãçµç¹ã® People-Centric ãªãªã¹ã¯ãäœæžãã匷åãªæ©èœãæäŸããŸãã
ãã«ãŒããã€ã³ãã®æ å ±ã»ãã¥ãªã㣠ãã©ãããã©ãŒã ã®å®å šçã§ãã Proofpoint Email DLP (Data Loss Prevention) ããã³ Email Encryption ãœãªã¥ãŒã·ã§ã³ã¯ããããªãŠãŒã¹ã±ãŒã¹ãšããŠããããŠæçã§ãããæ å ±ä¿è·ãåäžããããã®æåã®ã¹ããããšãªã£ãŠããŸãããã«ãŒããã€ã³ãã®ãµãŒãã¹ã¯ã以äžãå¯èœã«ããŸãã
- ã¡ãŒã« ã»ãã¥ãªã㣠ãã©ãããã©ãŒã ã§ã¡ãŒã« DLP ãšæå·åãäžå çã«ç®¡çãå®è¡
- ããã«äžæ©èžã¿èŸŒãã§Proofpoint Information Protection ãã©ãããã©ãŒã ã®å®å šçã«çµ±åããã°ãææ°ã¢ãŒããã¯ãã£ã«ãããå éšè åšãã¯ã©ãŠã ã»ãã¥ãªãã£ãã³ã³ãã³ãã®æ€æ»ãªã©ã«å¯Ÿå¿ã§ããã³ã³ããã¹ãã«åºã¥ã People-Centric ãªå¯èŠåãå¯èœã«ãªããŸãã
5 ã€ã®äž»èŠãªãŠãŒã¹ã±ãŒã¹ãåãäžãããšããã§ãã©ãããã°ã客æ§ã®ããŒã ãã»ãã¥ãªãã£äœå¶ã«ããããã®éèŠãªèŠçŽ ã管çã§ããã®ããç°¡åã«åãäžããããšã«ããŸãããã
ãã«ãŒããã€ã³ãã®ã¡ãŒã« ã»ãã¥ãªãã£åããããŒãžã ãµãŒãã¹ãå°å ¥ããã°ãããã«å å®ãã察çãå¯èœã«
äžçäžã®æ å ±ã»ãã¥ãªãã£éšéã¯ã人å¡ã®äžè¶³ãšç¢ºä¿ã®åé¡ãæ±ããŠããŸããProofpoint Managed Services for Email Securityãå©çšããã°ãæé«ã®ãµãŒãã¹ãšãã¡ãŒã« ã»ãã¥ãªã㣠ãœãªã¥ãŒã·ã§ã³ã®çµã¿åããã«ãããé²åŸ¡ã·ã¹ãã ãæé©åã§ããã ãã§ãªããåªå ãµããŒããåããããšãã§ããŸãããŸãã«ããžãã¹ã®æåãä¿èšŒãããã®ã§ãã
ãã«ãŒããã€ã³ããç¶ç¶ããŠé¢äžããããšã«ãããçµç¹ã¯ãªã¹ã¯ãäœæžã§ãããšãšãã«ãæ¯é¡ãªãå¯èŠæ§ãæã«å ¥ããããšãã§ããŸãããŸããã¹ã¿ããã¯æ¥åã«ãã£ãšãé¢é£ããè åšããã®ä»ã®éèŠãªãããžã§ã¯ãã ãã«éäžããããšãã§ããŸãã
ãã²Gartner ã®ã¬ããŒããããŠã³ããŒãããã¡ãŒã« ã»ãã¥ãªã㣠ãœãªã¥ãŒã·ã§ã³ãéžå®ããéã«æ€èšãã¹ãããšã«ã€ããŠè©³ããã芧ãã ããã
Gartner, Market Guide for Email Security (E ã¡ãŒã«ã»ãã¥ãªãã£ã«é¢ããããŒã±ããã¬ã€ã), Mark Harris, Peter Firstbrook, 2021 幎 10 æ 7 æ¥
Gartner ã¯ã調æ»å ±åã§ç¹å®ã®ãã³ããŒã補åããµãŒãã¹ã«ã€ããŠç¹å¥ã«èšåããããšã¯ãããŸããããŸãããã£ãšãè©äŸ¡ã®é«ããã³ããŒãéžæããããã«æšå¥šããããšããããŸãããGartner ã®èª¿æ»å ±å㯠Gartner ã®èª¿æ»éšéã®èŠè§£ããŸãšãããã®ã§ãããå¿ ããã客芳çãªäºå®ãåæ ããŠãããšã¯éããŸãããGartner ã¯ãæ¬èª¿æ»ã®å 容ã«å¯ŸããŠãæç€ºãŸãã¯é»ç€ºãåãããç¹å®ã®ç¶æ³ãããã¯ç°å¢ã«å¯Ÿããæ£ç¢ºæ§ããã³é©åæ§ãäžåä¿èšŒããããŸããã
以äžã®å 責äºé ã远å ããŠãã ãããGARTNER ã¯ãç±³åœããã³å šäžçã«ããã Gartner, Inc. ããã³/ãŸãã¯ãã®é¢é£äŒç€Ÿã®ç»é²åæšããã³ãµãŒãã¹ããŒã¯ã§ãããGartner, Inc. ã®èš±å¯ãåŸãŠäœ¿çšãããŠããŸããAll rights reserved.
â»æ¬ããã°ã®æ å ±ã¯ãè±èªã«ããåæã2021 Gartner® Market Guide for Email Security: Proofpoint Lets You Have Your Cake and Eat It, Tooãã®ç¿»èš³ã§ããè±èªåæãšã®éã§å 容ã®éœéœ¬ãããå Žåã«ã¯ãè±èªåæãåªå ããŸãã
