ç»äžçãªã»ãã¥ãªãã£æèåäžããã°ã©ã ã®æä»£ã¯ãã¯ãéå»ã®ãã®ã§ãããã«ãŒããã€ã³ãã®State of the Phishã¬ããŒãã«ãããšãçµç¹ã®98%以äžãã»ãã¥ãªãã£æèåäžããã°ã©ã ãå°å ¥ããŠããŸããããããªããããŠãŒã¶ãŒã®68%ãããªã¹ã¯ãããããšãç¥ããªããããªã¹ã¯ã®ããè¡åãåã£ãŠãããšåçããŠããŸãã
ãŸã ãã«ãŒããã€ã³ãããå©çšã§ãªãæ¹ã ããæ¥ã è³ã«ãããã©ã¹ãã¬ãŒã·ã§ã³ãæãã°ããã®ãããªæ°åãããªãããŸããããããçµç¹ã¯ãç¶ç¶çãªæè²ããã°ã©ã ã宿œããŠãããã®ã®ããŠãŒã¶ãŒã®è¡åãæãŸããæ¹åãžãšæ¹åããã®ã«èŠåŽããŠããããã§ããçµç¹ãçŽé¢ããŠããäž»ãªèª²é¡ã®ããã€ãã¯ä»¥äžã®ãšããã§ãã
- çµç¹ã«æå€§ã®ãªã¹ã¯ããããããŠããã®ã誰ãªã®ããããããªã
- ã©ã®ãããªããªã·ãŒãè åšãè匱æ§ã«ã€ããŠãŠãŒã¶ãŒãæè²ãã¹ããªã®ããèšæ©å¿å€ã«æ±ºããããªã
- ããã°ã©ã ãç¶æããã®ã«ããŠãŒã¶ãŒã°ã«ãŒãã®æŽæ°ãã«ãªãã¥ã©ã ã®èª¿æŽãç¶ç¶çã«å¿ èŠã§ããããªãœãŒã¹ã«å€§ããªè² æ ãããã
ãããã®åé¡ã¯ãåŸæ¥ã®ã»ãã¥ãªãã£æèåäžã®æ ãè¶ ãããå æ¬çãªäººçãªã¹ã¯ç®¡çããã°ã©ã æ§ç¯ã®å¿ èŠæ§ãæµ®ãã³äžããããŠããŸãã
æåã«åãçµãã¹ãã¯ãé »ç¹ã«æšçã«ãããŠãããŠãŒã¶ãŒã°ã«ãŒãã«ãã©ãŒã«ã¹ããããšã§ããçµç¹å ã®ã»ãšãã©ã®ã»ãã¥ãªãã£åé¡ã®èŠå ãšãªã£ãŠããã®ã¯ãå€ãã®å ŽåãããããŠãŒã¶ãŒã§ãããããããŠãŒã¶ãŒåºæã®ããŒãºã«åãããŠæè²ããã°ã©ã ã調æŽããããšãã§ããã°ãåã ã®è匱æ§ãç·©åããããšãã§ããŸãããŸããä»åŸããããæ»æã«å¯ŸããŠå šäœã®é²åŸ¡ã匷åããããšãã§ããŸãã
ãã«ãŒããã€ã³ããæäŸããæ°ããã¯ãŒã¯ãããŒã¯ããããããŠãŒã¶ãŒã«ãã©ãŒã«ã¹ããå šäœçãªãªã¹ã¯ãå€§å¹ ã«äœæžããããã®ã§ãããã®èšäºã§ã¯ã人çãªã¹ã¯ç®¡çã«ãã©ãŒã«ã¹ããããšããªãéèŠãªã®ããèŠãŠãããŸãããŸããçµç¹ããããå®çŸããããã«ãã«ãŒããã€ã³ããã©ãã圹ã«ç«ã€ãããäŒãããŸãã
人çãªã¹ã¯ç®¡çãšã¯
人çãªã¹ã¯ç®¡çã¯ããµã€ããŒæ»æã®é²æ¢ãšå¯Ÿå¿ãèªååããæ¢åã®ã»ãã¥ãªã㣠ãã¹ããã©ã¯ãã£ã¹ãåºç€ãšããŠæ§ç¯ããããã人ããäžå¿ã«æ®ããç®¡çææ³ã§ãã人çãªã¹ã¯ç®¡çãœãªã¥ãŒã·ã§ã³ã®åºæ¬ã¯ãç¹å®ã®ç°å¢å ã«ãããŠãè€æ°ã®ã»ãã¥ãªãã£ããŒã«ã«ãŸããã£ãŠãŠãŒã¶ãŒã€ãã³ããã¢ã€ãã³ãã£ã㣠ã¢ã¯ãã£ããã£ãåã蟌ãããšãã§ããæ©èœã§ãããã®ãœãªã¥ãŒã·ã§ã³ã远跡ãããã®ã¯ä»¥äžã®ãšããã§ãã
- æ»æãªã¹ã¯ïŒãŠãŒã¶ãŒãæ»æãããå¯èœæ§
- è匱æ§ãªã¹ã¯ïŒæ»æãæåããå¯èœæ§
- æš©éãªã¹ã¯ïŒæ»æãçµç¹ã«ããããããæå®³
ç¶ããŠããã®ãœãªã¥ãŒã·ã§ã³ã¯å人ã®ç·åãªã¹ã¯ã¹ã³ã¢ãå®éåããŸããããããç¥èŠã«ãããäŒæ¥ãã»ãã¥ãªãã£ããŒã ã¯ä»¥äžã®ããšãå¯èœã«ãªããŸãã
- äž»ãªæšçã«ãããŠããå人ãŸãã¯ã°ã«ãŒããå¯èŠåããæåã®ä¿è·ãæäŸããããã®æŠç¥ãåªå å
- ãªã¹ã¯ã®ããè¡åãå³åº§ã«é²ãããã«æè¡çãªå¶åŸ¡ãä»å ¥ããããããŠãŒã¶ãŒã«ãªã¹ã¯ãšãã®åé¿æ¹æ³ãå©èšããæèçãªæ°ã¥ããæäŸãã
- ãªã¹ã¯ã®ãããŠãŒã¶ãŒãããŠãŒã¶ãŒã«åãããŠèª¿æŽãããæè²ã«ãªãã¥ã©ã ã«èªåçã«åå ããããŠãŒã¶ãŒèªèº«ãšäŒæ¥ãä»åŸã®ãµã€ããŒæ»æããå®ãããããµããŒã
- ãŠãŒã¶ãŒã®è¡åæ¹åç¶æ³ãç°¡åã«è¿œè·¡ããããžãã£ããªã»ãã¥ãªãã£æåãè²æ
Proofpoint Security Awareness å ã®æ°ãã Adaptive Threat and User-Risk Response WorkflowïŒè åšïŒãŠãŒã¶ãŒãªã¹ã¯é©å¿å察å¿ã¯ãŒã¯ãããŒïŒã¯ãããããåé¡ã«å¯ŸåŠããããã«èšèšãããŠããŸããäžèšã§èšããšããã®æ°ããã¯ãŒã¯ãããŒã«ã¯ããã«ãŒããã€ã³ãã®ããããé·æãã€ãŸã£ãŠããŸãã
Adaptive Threat and User-Risk Response Workflow
ãã®æ°ããã¯ãŒã¯ãããŒã«ã¯3ã€ã®äž»èŠæ©èœãçµ±åãããŠããŸããããã«ããã以äžãå¯èœã«ãªããŸãã
- ã¢ãããã£ãã°ã«ãŒãã䜿çšããProofpoint NPRE (Nexus People Risk Explorer)ãšProofpoint TAP (Targeted Attack Protection)ããäœæããããŠãŒã¶ãŒãªã¹ã¯ ãããã¡ã€ã«ãšã°ã«ãŒãã«åºã¥ããŠããŠãŒã¶ãŒã°ã«ãŒããåçã«äœæããã³ç®¡ç
- ãã«ãŒããã€ã³ãç¬èªã®è åšèª¿æ»ã«ãã远跡ãããTAPã«ããå ±åããããå®çŸ©æžã¿è åšãã¡ããªãŒã«åºã¥ãè åšããŒã¹ã®æè²ã«ãªãã¥ã©ã ãäœæ
- äºåã«äœæãããã¢ãããã£ãã°ã«ãŒãã®å¯Ÿè±¡ãšãªããŠãŒã¶ãŒã確èªããããããã®æ°ãããŠãŒã¶ãŒãã«ãªãã¥ã©ã ã«èªåçã«åå ããããé©å¿å課é¡ãæ§ç¯
ãã®é©å¿ååŠç¿ã¢ãããŒãã«ãããé »ç¹ã«æšçã«ãããŠããã°ã«ãŒãã«å¯Ÿããæè²ãåªå çã«è¡ãããŸããããã§ã¯ã管çè ã¯ããããããŠãŒã¶ãŒã«æãé¢é£æ§ã®é«ãè åšããªã¹ã¯ã«åãããŠã«ãªãã¥ã©ã ã調æŽã§ããããããŠãŒã¶ãŒ ãšã³ã²ãŒãžã¡ã³ããæå€§åããããšãã§ããŸãã
ããã¯ãè åšããŠãŒã¶ãŒãªã¹ã¯ãå®éåãã詳现ã«å¯èŠåããããšã§å®çŸãããŸãããããã®ç¥èŠã䜿çšããŠãé »ç¹ã«æšçã«ãããŠããã°ã«ãŒãåãã®æè²ã調æŽããããšãã§ããŸãã
è åšãšãŠãŒã¶ãŒãªã¹ã¯ãå®éåãã
ãã«ãŒããã€ã³ãã®ãŠãŒã¶ãŒãªã¹ã¯ ã°ã«ãŒããšãããã¡ã€ã«ã¯ããã®æ°ããã¯ãŒã¯ãããŒã®äžæ žã«ãããã®ã§ããããã«ã¯ãNPREãšTAPã§æäŸãããŠãããImminent TargetïŒç·æ¥ã®æšçïŒãšVery Attacked Peopleâ¢ã®ã°ã«ãŒããå«ãŸããŸãã

NPREãŠãŒã¶ãŒãªã¹ã¯ ã°ã«ãŒãã®äŸ

Very Attacked Peopleâ¢ãšè åšãã¡ããªãŒã®äŸ
NPREãšTAPã¯ã以äžã®ãããªè€æ°ã®èŠçŽ ãçµã¿åãããŠããŸãã
Attack RiskãšAttack Index
ãããã®ææšã¯ããŠãŒã¶ãŒã°ã«ãŒãããµã€ããŒæ»æã«ãã£ãŠæšçã«ãããå¯èœæ§ãè©äŸ¡ãããã®ã§ãããªã¹ã¯ãããã¡ã€ã«ãæ§æããèŠçŽ ã«ã¯ã以äžãªã©ãå«ãŸããŸãã
- ã¡ãã»ãŒãžæ»æä»¶æ°
- æ»æã®ã¿ã€ã
- æ»æè ã®å·§åŠã
- æ»æã®å€æ§æ§
- æ»ææšçã®æ¡æ£ãšéäž
è匱æ§ãªã¹ã¯
ãã®ææšã¯ããŠãŒã¶ãŒãžã®æ»æãæåããå¯èœæ§ãè©äŸ¡ãããã®ã§ããããã¯ããŠãŒã¶ãŒãšã°ã«ãŒãã«é¢ãã以äžã®æ å ±ãèæ ®ããŸãã
- ã»ãã¥ãªãã£æè²ãžã®åå
- ãã£ãã·ã³ã° ãã¹ã ããã©ãŒãã³ã¹
- ãµãŒãããŒã㣠ã¢ããªèªèšŒèŠæ±
- ã·ã£ããŒITã®äœ¿çš
- äžè²«æ§ã®ãªããŠãŒã¶ãŒäœçœ®æ å ±
- URLã¯ãªãã¯æäœ
- é åžãªã¹ãã®ã¡ã³ããŒå±æ§
- ã¯ã©ãŠãã¢ã«ãŠã³ã䟵害
- å éšãªã¹ã¯ã¢ã©ãŒã
- ãªã¹ã¯ã®ããããŒã¿ã®åãæ±ã
æš©éãªã¹ã¯
ãã®ææšã¯ãæ»æãããããããæœåšçãªæå®³ãè©äŸ¡ãããã®ã§ããããã¯ã以äžã®ãããªãŠãŒã¶ãŒã®ç¹æ§ãèæ ®ããŸãã
- ãŠãŒã¶ãŒãã£ã¬ã¯ããª/éšé/ã°ã«ãŒã/å人ã®ã¢ã€ãã³ãã£ãã£æš©é
- ã«ã¹ã¿ããŒå®çŸ©ã®ç¹æš©ã°ã«ãŒã
- é«åºŠãªæš©éããã€ã¢ã€ãã³ãã£ãã£ïŒäŸïŒãã¡ã€ã³ç®¡çè ïŒ
- Tier-Zeroãšã³ã¿ã€ãã«ã¡ã³ãïŒéèŠè³ç£ïŒãžã®é«ãªã¹ã¯æ»æãã¹ããã€ãŠãŒã¶ãŒ
ãããã®èŠçŽ ãåæããããšã«ãããäŒæ¥ã¯ãæããªã¹ã¯ã®é«ãå人ãšã°ã«ãŒãã«å¯Ÿããæè²é¢ãšã»ãã¥ãªãã£å¶åŸ¡é¢ã§ã®æŠç¥ãåªå åããããšãã§ããŸãã
é«ãªã¹ã¯ã°ã«ãŒãã«åããŠæè²ã調æŽãã
NPREãšTAPãæäŸããå¯èŠæ§ã«ããã管çè ã¯ã察象ã®ã°ã«ãŒãåãã«æè²ã調æŽããããšãã§ããŸãã管çè ã¯ãã°ã«ãŒããæãåããããè匱æ§ãŸãã¯è åšãäžå¿ãšããã«ãªãã¥ã©ã ãæäŸã§ããŸãã
äŸãã°ããæãã¯ãªãã¯æ°ã®å€ããŠãŒã¶ãŒããªã¹ã¯ã°ã«ãŒããšããŠããªã¹ã¯ã®é«ãã°ã«ãŒãåãã«æè²ã調æŽããããšãã§ããŸãããã®ãããªã°ã«ãŒãå ã§ã管çè ã¯ããåºåè©æ¬ºããããã³ãã³ã°åããã€ã®æšéЬããšãã£ããã°ã«ãŒããæšçã«ããããã«åºã䜿çšãããŠããè åšãå¯èŠåã§ããŸãã
ããããæ å ±ãšProofpoint Security Awarenessçµ±åã䜿çšããŠã管çè ã¯ä»¥äžã®ããšãå¯èœã§ãã
1. Proofpoint Security Awarenesså ã§ã¢ãããã£ã ã°ã«ãŒããæ§ç¯ïŒãã®ã°ã«ãŒãã¯ããæãã¯ãªãã¯æ°ã®å€ããŠãŒã¶ãŒããŠãŒã¶ãŒãªã¹ã¯ ã°ã«ãŒãããæšçã«ããããŠãŒã¶ãŒã«å¯ŸãçšããããŠãããåºåè©æ¬ºããããã³ãã³ã°ãããããã¯ãã¢ããªã©ã®äžäœã®è åšã«çŽæ¥é¢é£ãããã®ã§ãã

ããŠãŒã¶ãŒãªã¹ã¯ããšãè åšãã¡ããªãŒãã®æ¡ä»¶ãæå®ããã¢ãããã£ãã°ã«ãŒãã®æ§æ
2. ã³ã³ãã³ãæ€çŽ¢ãç°¡åïŒã³ã³ãã³ãã©ã€ãã©ãªã«ã¯ãTAPã远跡ããè åšãã¡ããªãŒã«åºã¥ããŠãäºåã«äœæãããæ€çŽ¢ãã£ã«ã¿ãå«ãŸããŸãã

ãè åšãã¡ããªãŒãã®ã³ã³ãã³ãã©ã€ãã©ãªæ€çŽ¢ãã£ã«ã¿ã®äŸ
3. 課é¡ãè¿ éã«äœæïŒãã¿ã³ã®ã¯ãªãã¯æäœã§ãç¹å®ã®æè²ã¢ãžã¥ãŒã«ãåè¿°ã®è åšã«é¢é£ãã課é¡ã調æŽããããšãã§ããŸãã

課é¡äœæã®æŠèŠ
4. æ°ããªã°ã«ãŒãã¡ã³ããŒãšããŠèªåçã«åå ïŒãã®æ©èœã«ããããæãã¯ãªãã¯æ°ã®å€ããŠãŒã¶ãŒãã«ãªã£ããŠãŒã¶ãŒãããåºåè©æ¬ºããããã³ãã³ã°ãããããã¯ãã¢ãã®è åšã«ãã£ãŠæšçã«ããããŠãŒã¶ãŒã¯ãäºåäœææžã¿ã®èª²é¡ã«èªåçã«è¿œå ãããŸãã

課é¡ã«æ°ãããŠãŒã¶ãŒãèªå远å ãããªãã·ã§ã³
çãçµã£ãã¢ãããŒãã®ã¡ãªãã
Adaptive Threat and User-Risk Response Workflowã¯ç»æçãªã¯ãŒã¯ãããŒã§ããããã«ããã以äžãå¯èœãšãªããŸãã
- ãªãœãŒã¹ã«åªå é äœãã€ããïŒæãè匱æ§ã®é«ãã°ã«ãŒãã«æåã«ãã©ãŒã«ã¹ããããšã§ããã¬ãŒãã³ã° ãªãœãŒã¹ããã广çã«å²ãåœãŠãããšãã§ããŸãã
- ãšã³ã²ãŒãžã¡ã³ããšèœåã®æå€§åããïŒæãé¢é£æ§ã®é«ãæè²ããŠãŒã¶ãŒã«æäŸã§ããã°ããŠãŒã¶ãŒã¯è åšã®ç¹å®ã«åœ¹ç«ã€ç¥èãšèœåã身ã«ã€ããããšãã§ããŸãã
- ããã¢ã¯ãã£ããªé²åŸ¡ã®èãæ¹ãä¿é²ããïŒæè²ã«ãã£ãŠåäžãããŠãŒã¶ãŒã¯ãäžå¯©ãªã¡ãŒã«ãã¢ã¯ãã£ããã£ããã ç¡èŠããã®ã§ã¯ãªãå ±åããå¯èœæ§ãé«ããªããŸãã
- 枬å®å¯èœãªãªã¹ã¯äœæžãå®çŸããïŒé«ãªã¹ã¯ã°ã«ãŒãã«çãçµãããšã§ãçµç¹ã¯ãæ»æãçºçããå¯èœæ§ãå€§å¹ ã«äœæžããããšãã§ããŸãã
人çãªã¹ã¯ã«å¯ŸããæŠãã«ããã倧ããªé²æ©
Proofpoint Security Awarenessã®Adaptive Threat and User-Risk Response Workflowã«ãããäŒæ¥å ã®é »ç¹ã«æšçã«ãããŠãããŠãŒã¶ãŒã°ã«ãŒãã詳现ã«å¯èŠåããããšãã§ããŸããããã«ãå æ¬çãªãªã¹ã¯ã¹ã³ã¢ãšããŠãŒã¶ãŒãæšçã«ããŠããè åšã®çš®é¡ã«åºã¥ããŠèª¿æŽãããæè²ãæäŸããããšãã§ããŸããããã«ãããç»äžçãªã»ãã¥ãªãã£æèåäžã¢ãã«ããæãåºããæ©èœãã人çãªã¹ã¯ç®¡çããã°ã©ã ãæ§ç¯ããæ©äŒãåŸãããŸãã
Proofpoint Security Awarenessã«ãããè åšã®äžæ©å ãè¡ãã人ã®ãã¡ã€ã¢ãŠã©ãŒã«ã匷åããããšãã§ããŸãããã«ãŒããã€ã³ãã®ãœãªã¥ãŒã·ã§ã³ã«ã€ããŠè©³ããã¯ãã²ãåãåãããã ããã