ãã®è¡šã«ã¯ãGDPR第28æ¡ç¬¬3é ïŒãŸãã¯è©²åœããå Žåããã®ä»ã®ããŒã¿ä¿è·æ³ã®åçã®èŠå®ïŒã«åºã¥ãå¿ èŠãšãããã顧客ã®å人ããŒã¿ã®åŠçã«é¢ããç¹å®ã®è©³çްãå«ãŸããŠããŸãã
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
Core Email Protection API (å¥åAdaptive Email Security)
ã¯ã©ãŠãããŒã¹ã®é»åã¡ãŒã«ä¿è·ãœãªã¥ãŒã·ã§ã³ã¯ãå®å šã«çµ±åãããè¡åAIã®ã¬ã€ã€ãŒãæ¡çšããã€ã³ããŠã³ãã®ããžãã¹é»åã¡ãŒã«ã®äŸµå®³ãã©ãã©ã«ãã£ãã·ã³ã°ã®æ€åºãšé²æ¢ãæ¯æŽãããšåæã«ããšã³ããŠãŒã¶ãŒãé»åã¡ãŒã«ãå®å šãã©ããã倿ããã®ã«åœ¹ç«ã€èŠåãããŒãç¬æã«æäŸããŸãã
è åšã¢ããªãã£ã¯ã¹ãé€ããå¥çŽæéïŒ35æ¥é
該åœããå Žåãã¡ãŒã«æ¬æã¯åŠçãã6ã¶æé
Applied Information Protection Services
Browser, E-mail Isolation and TAP URL Isolation
åŸæ¥å¡ãè«è² æ¥è
é»åã¡ãŒã«ã¢ãã¬ã¹ããŠãŒã¶ãŒãµã€ãã®ã¯ãããŒããã©ãŠã¶ã®å±¥æŽããã©ãŠã¶ã®ç»é²æ å ±ïŒããŒã¿ã»ã³ã¿ãŒã®æåšå°ããã©ãŠã¶ã®ãŠãŒã¶ãŒãšãŒãžã§ã³ãæååïŒ
Isolationã¯ããªã¯ãšã¹ãããããµã€ãããã¢ã¯ãã£ããªã³ã³ãã³ãããã¹ãŠåé€ããå®å šãªããŒãžã§ã³ã®ããŒãžããšã³ããŠãŒã¶ãŒã«ã¬ã³ããªã³ã°ããããšã§ãURLã®è åšããä¿è·ãããªã¢ãŒãWebããŒã¹ã®ãã©ãŠã¶ã§ããéé¢ããªã·ãŒã¯ãéé¢ããããŠãŒã¶ãŒãšURLãéé¢ãããç¶æ ã§èš±å¯ãããã³ã³ãã³ããšãŠãŒã¶ãŒã¢ã¯ã·ã§ã³ã決å®ããŸãã
Cloud Account Defenseã¯ãã客æ§ãã客æ§ã®ã¯ã©ãŠãã¢ã«ãŠã³ãåšèŸºã®çãããæŽ»åãæ€åºãã䟵害ãããã¯ã©ãŠãã¢ã«ãŠã³ããç¹å®ããã®ãæ¯æŽããŸãã
Cloud App Security Brokerã¯ãããªã·ãŒã䜿çšããŠãã客æ§ã®ã¯ã©ãŠãã¢ã«ãŠã³ãã«å«ãŸããã客æ§ã®æ©å¯ããŒã¿ãæ©å¯ããŒã¿ã®æå€±ã鲿¢ããŸããCASB IaaS Protection ã¯ã顧客㮠IaaS ãªãœãŒã¹ã®ç¹å®ãIaaS ã¹ãã¬ãŒãžå ã®æ©å¯ããŒã¿ã®ä¿è·ã顧客ã®ã¯ã©ãŠãã»ã¢ã«ãŠã³ããžã®äžæ£ãã°ã€ã³ã®ç£èŠãšåæ¢ãæ¯æŽããŸãã
Proofpoint Account Takeover Protection ã¯ãã¯ã©ãŠãã¢ã«ãŠã³ãã®ä¹ã£åãæ»æããã客æ§ã®ã¯ã©ãŠãã¢ã«ãŠã³ãã«ãŸã€ããäžå¯©ãªã¢ã¯ãã£ããã£ã®æ€åºãšä¿®åŸ©ãæ¯æŽããŸãã
ã³ã³ãããŒã©ãŒãéžæããä¿åæéã«åŸããæå€§366æ¥éãŸã§ä¿å
Threat AnalyticsããŒã¿ã¯åéåŸæå€§18ã¶æé
æ©å¯ãã¡ã€ã«ã®ãã¡ã€ã«ã¡ã¿ããŒã¿ã¯ãåéåŸ36ã¶æé
Cloud Threat Response (SaaS Version of TRAP)
åŸæ¥å¡ãè«è² æ¥è ã顧客ããã®ä»ã客æ§ã®äŒæ¥é»åã¡ãŒã«ã·ã¹ãã ãéããŠé»åã¡ãŒã«ãéåä¿¡ããå人
ãŠãŒã¶ãŒããå ±åãããé»åã¡ãŒã«ããã®å®å šãªã¡ãã»ãŒãžMIMEããŒã¿ã¯ãåŠçãã90æ¥ããšã«ã®ã¿ããŒãžãããŸãã
è åšå¯Ÿå¿ããŒã¿ã®ä¿æã¯ãã客æ§ã«ãã PhishAlarm / PhishAlarm Analyzer ã®äœ¿çšãæ¡ä»¶ãšããŸãã
Cloudmark Active FilterãAuthorityãContent CategoriesãInsight ServerãSender Intelligenceããã³
Cloudmark Spam Reporting Service
åŸæ¥å¡ãè«è² æ¥è ã顧客
ã¡ãŒã«ã¢ãã¬ã¹ãIPã¢ãã¬ã¹ãé»è©±çªå·ãå«ããã¡ãŒã«ãSMSãMMSãRCSã«é¢é£ä»ãããããã¬ã¡ããªãŒããŒã¿
Cloudmark補åã¯ã€ã³ããªãžã§ã³ããªè åšåæã掻çšããŠãã¡ãŒã«ããã³ã¢ãã€ã«ã¡ãã»ãŒãžã®ã»ãã¥ãªãã£ãã¹ãã ããã³ãã«ãŠã§ã¢ããä¿è·ããŸãã
åä¿¡è
ããæå®³ãªå¯èœæ§ããããšå ±åãããã¡ãã»ãŒãžã«ã€ããŠã¯30æ¥é
åä¿¡è
ããæå®³ã§ãªããšå ±åãããã¡ãã»ãŒãžã®30æ¥é
åä¿¡è
ããæå®³ãªå¯èœæ§ããããšå ±åãããã¡ãã»ãŒãžã«ã€ããŠã¯30æ¥é
åä¿¡è
ãæå®³ã§ãªããšå ±åããã¡ãã»ãŒãžã«ã€ããŠã¯30æ¥é
ãã®ä»ãã³ã³ãããŒã©ãŒã®åãæ±ºãã«ãã
Continuity
EFDã¯ã顧客ãã¡ã€ã³ã®Domain-based Message Authentication, Reporting & Conformance (DMARC)éèšã¬ããŒããšDMARCãã©ã¬ã³ãžãã¯ã¡ãã»ãŒãžãµã³ãã«ãã©ãã£ãã¯ãåŠçããéä¿¡è èªèšŒæ å ±ã«åºã¥ããŠéä¿¡è ã®ä¿¡é Œæ§ãè©äŸ¡ããèªèšŒãããŠããªããœãŒã¹ãèªèšŒãããŠããªããœãŒã¹ããéä¿¡ããããã©ãã£ãã¯ã匷調衚瀺ããŸãã
Cloudmarkãã©ã¬ã³ãžãã¯ããŒã¿ã¯åéåŸ30æ¥éä¿æ
DMARCãã©ã¬ã³ãžãã¯ããŒã¿ã¯åéåŸ90æ¥éä¿æ
DMARCã®éPIIéèšããŒã¿ã¯ãåæããã³å質管çã®ç®çã§ç¡æéã«ä¿æ
Email Protection Supernova Engine
Email Threat Defense
å¥çŽæéïŒ35æ¥éä¿æãããããŒã¿ã«ããŽãªãŒããã ããè
åšã¢ããªãã£ã¯ã¹ã¯åéåŸæå€§18ã¶æéä¿æã
é»åã¡ãŒã«æ¬æã¯ãåŠçãã6ã¶æéä¿æ
Proofpoint ã®ãã«ãããã³ãæ å ±ããã³ã¯ã©ãŠãã»ãã¥ãªãã£ã¹ãã¬ãŒãžã«ä¿åãããŸãã
Essentials
ã¢ãŒã«ã€ãæ©èœã䜿çšããå Žåã¯ãäžèšã®ãã¢ãŒã«ã€ãããåç §ããŠãã ããã
TAPãµã³ãããã¯ã¹ã䜿çšãããŠããå Žåã¯ã以äžã®ãTAPããåç §ããŠãã ããã
Misdirected Email Protection
æ°åãã¡ãŒã«ã¢ãã¬ã¹ãè åšåæã«å«ãŸããå人ããŒã¿
CASBãšTAPãææããNPREã®é¡§å®¢ã®ããã«ãã¯ã©ãŠãã¢ããªã±ãŒã·ã§ã³ã®äœ¿çšç¶æ³ãšãŠãŒã¶ãŒããŒã¿ãåéãããŸãã
PhishAlarmãã¿ã³ã§ãšã³ããŠãŒã¶ãŒããå ±åãããçãããé»åã¡ãŒã«ãã«ãŒãã£ã³ã°ããã³ã¹ãã£ã³ããŸããPhishAlarm Analyzerã¯ããªã¢ã«ã¿ã€ã ã§ãã£ãã·ã³ã°æ»æã®é«åºŠãªå¿çèå¥ãæäŸããŸãã
PhishAlarmãšPhishAlarm Analyzerãä»ããŠå ±åãããé»åã¡ãŒã«ã¯ãã¢ã¯ã»ã¹ãããåé¡ããããããã¯ããã«é¡§å®¢ã®ã¬ã¹ãã³ã¹ã»ããŒã ãå©çšã§ããããã«ãªããŸãã
Data Security Posture Management (DSPM)*
*DSPMããã«ãŒããã€ã³ãã®ãã¹ãåãœãªã¥ãŒã·ã§ã³ãšããŠå°å
¥ããå Žåã®ã¿é©çš
åŸæ¥å¡ãè«è² æ¥è ã顧客
ã¯ã©ãŠãã¢ã«ãŠã³ãå ã®ããŒã¿ã¹ãã¢ã®ãªã¹ãããã®ã¢ã¯ã»ã¹æš©éãä¿åãããŠããããŒã¿ã®ããŒã¿åé¡ãããŒã¿åé¡ãè¡ãã¹ãã¢å ã®ããŒã¿ãžã®åç §ïŒãã€ã³ã¿
IaaSãPaaSãSaaSããŸãã¯ãªã³ãã¬ã å ã«éæ¢ç¶æ ã§ä¿åãããŠãã顧客ããŒã¿ãã¹ãã£ã³ããæ©å¯æ å ±ïŒPIIãPHIãPCIãªã©ïŒãæ€åºããŸãã
Threat Response Auto-pull (TRAP) (Cloud Threat Responseã®ãªã³ãã¬ãã¹ç)
åŸæ¥å¡ãè«è² æ¥è ã顧客ããã®ä»ã客æ§ã®ç€Ÿå é»åã¡ãŒã«ã·ã¹ãã ãéããŠé»åã¡ãŒã«ãéåä¿¡ããå人
ååãã¡ãŒã«ã¢ãã¬ã¹ãã¡ãŒã«ã«å«ãŸãããã¹ãŠã®å人ããŒã¿
TRAPã¯ãäžèŠãªã¡ãŒã«ãåæããåé€ãããªãŒãã¡ãŒã·ã§ã³ãå«ãããªã³ãã¬ãã¹ã®ã€ã³ã·ãã³ã管çãã©ãããã©ãŒã ã§ãã
ã¯ããŒãºãããã€ã³ã·ãã³ãã®ä¿æã¯ã³ã³ãããŒã©ãŒã«ãã£ãŠç¢ºç«ããã ã¯ããŒãºãããã€ã³ã·ãã³ãã®ãã«ã¡ãã»ãŒãžMIMEããŒã¿ã¯30æ¥ããšã«ããŒãžããã
補å
Core Email Protection API (å¥åAdaptive Email Security)
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ã¯ã©ãŠãããŒã¹ã®é»åã¡ãŒã«ä¿è·ãœãªã¥ãŒã·ã§ã³ã¯ãå®å šã«çµ±åãããè¡åAIã®ã¬ã€ã€ãŒãæ¡çšããã€ã³ããŠã³ãã®ããžãã¹é»åã¡ãŒã«ã®äŸµå®³ãã©ãã©ã«ãã£ãã·ã³ã°ã®æ€åºãšé²æ¢ãæ¯æŽãããšåæã«ããšã³ããŠãŒã¶ãŒãé»åã¡ãŒã«ãå®å šãã©ããã倿ããã®ã«åœ¹ç«ã€èŠåãããŒãç¬æã«æäŸããŸãã
ä¿åæé
è åšã¢ããªãã£ã¯ã¹ãé€ããå¥çŽæéïŒ35æ¥é
該åœããå Žåãã¡ãŒã«æ¬æã¯åŠçãã6ã¶æé
補å
Applied Information Protection Services
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
Browser, E-mail Isolation and TAP URL Isolation
ããŒã¿äž»äœ
åŸæ¥å¡ãè«è² æ¥è
åŠçãããå人ããŒã¿ã®ã«ããŽãª
é»åã¡ãŒã«ã¢ãã¬ã¹ããŠãŒã¶ãŒãµã€ãã®ã¯ãããŒããã©ãŠã¶ã®å±¥æŽããã©ãŠã¶ã®ç»é²æ å ±ïŒããŒã¿ã»ã³ã¿ãŒã®æåšå°ããã©ãŠã¶ã®ãŠãŒã¶ãŒãšãŒãžã§ã³ãæååïŒ
åŠçã®å 容
Isolationã¯ããªã¯ãšã¹ãããããµã€ãããã¢ã¯ãã£ããªã³ã³ãã³ãããã¹ãŠåé€ããå®å šãªããŒãžã§ã³ã®ããŒãžããšã³ããŠãŒã¶ãŒã«ã¬ã³ããªã³ã°ããããšã§ãURLã®è åšããä¿è·ãããªã¢ãŒãWebããŒã¹ã®ãã©ãŠã¶ã§ããéé¢ããªã·ãŒã¯ãéé¢ããããŠãŒã¶ãŒãšURLãéé¢ãããç¶æ ã§èš±å¯ãããã³ã³ãã³ããšãŠãŒã¶ãŒã¢ã¯ã·ã§ã³ã決å®ããŸãã
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
Cloud Account Defenseã¯ãã客æ§ãã客æ§ã®ã¯ã©ãŠãã¢ã«ãŠã³ãåšèŸºã®çãããæŽ»åãæ€åºãã䟵害ãããã¯ã©ãŠãã¢ã«ãŠã³ããç¹å®ããã®ãæ¯æŽããŸãã
Cloud App Security Brokerã¯ãããªã·ãŒã䜿çšããŠãã客æ§ã®ã¯ã©ãŠãã¢ã«ãŠã³ãã«å«ãŸããã客æ§ã®æ©å¯ããŒã¿ãæ©å¯ããŒã¿ã®æå€±ã鲿¢ããŸããCASB IaaS Protection ã¯ã顧客㮠IaaS ãªãœãŒã¹ã®ç¹å®ãIaaS ã¹ãã¬ãŒãžå ã®æ©å¯ããŒã¿ã®ä¿è·ã顧客ã®ã¯ã©ãŠãã»ã¢ã«ãŠã³ããžã®äžæ£ãã°ã€ã³ã®ç£èŠãšåæ¢ãæ¯æŽããŸãã
Proofpoint Account Takeover Protection ã¯ãã¯ã©ãŠãã¢ã«ãŠã³ãã®ä¹ã£åãæ»æããã客æ§ã®ã¯ã©ãŠãã¢ã«ãŠã³ãã«ãŸã€ããäžå¯©ãªã¢ã¯ãã£ããã£ã®æ€åºãšä¿®åŸ©ãæ¯æŽããŸãã
ä¿åæé
ã³ã³ãããŒã©ãŒãéžæããä¿åæéã«åŸããæå€§366æ¥éãŸã§ä¿å
Threat AnalyticsããŒã¿ã¯åéåŸæå€§18ã¶æé
æ©å¯ãã¡ã€ã«ã®ãã¡ã€ã«ã¡ã¿ããŒã¿ã¯ãåéåŸ36ã¶æé
補å
Cloud Threat Response (SaaS Version of TRAP)
ããŒã¿äž»äœ
åŸæ¥å¡ãè«è² æ¥è ã顧客ããã®ä»ã客æ§ã®äŒæ¥é»åã¡ãŒã«ã·ã¹ãã ãéããŠé»åã¡ãŒã«ãéåä¿¡ããå人
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
ãŠãŒã¶ãŒããå ±åãããé»åã¡ãŒã«ããã®å®å šãªã¡ãã»ãŒãžMIMEããŒã¿ã¯ãåŠçãã90æ¥ããšã«ã®ã¿ããŒãžãããŸãã
è åšå¯Ÿå¿ããŒã¿ã®ä¿æã¯ãã客æ§ã«ãã PhishAlarm / PhishAlarm Analyzer ã®äœ¿çšãæ¡ä»¶ãšããŸãã
補å
Cloudmark Active FilterãAuthorityãContent CategoriesãInsight ServerãSender Intelligenceããã³
Cloudmark Spam Reporting Service
ããŒã¿äž»äœ
åŸæ¥å¡ãè«è² æ¥è ã顧客
åŠçãããå人ããŒã¿ã®ã«ããŽãª
ã¡ãŒã«ã¢ãã¬ã¹ãIPã¢ãã¬ã¹ãé»è©±çªå·ãå«ããã¡ãŒã«ãSMSãMMSãRCSã«é¢é£ä»ãããããã¬ã¡ããªãŒããŒã¿
åŠçã®å 容
Cloudmark補åã¯ã€ã³ããªãžã§ã³ããªè åšåæã掻çšããŠãã¡ãŒã«ããã³ã¢ãã€ã«ã¡ãã»ãŒãžã®ã»ãã¥ãªãã£ãã¹ãã ããã³ãã«ãŠã§ã¢ããä¿è·ããŸãã
ä¿åæé
åä¿¡è
ããæå®³ãªå¯èœæ§ããããšå ±åãããã¡ãã»ãŒãžã«ã€ããŠã¯30æ¥é
åä¿¡è
ããæå®³ã§ãªããšå ±åãããã¡ãã»ãŒãžã®30æ¥é
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
åä¿¡è
ããæå®³ãªå¯èœæ§ããããšå ±åãããã¡ãã»ãŒãžã«ã€ããŠã¯30æ¥é
åä¿¡è
ãæå®³ã§ãªããšå ±åããã¡ãã»ãŒãžã«ã€ããŠã¯30æ¥é
ãã®ä»ãã³ã³ãããŒã©ãŒã®åãæ±ºãã«ãã
補å
Continuity
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
EFDã¯ã顧客ãã¡ã€ã³ã®Domain-based Message Authentication, Reporting & Conformance (DMARC)éèšã¬ããŒããšDMARCãã©ã¬ã³ãžãã¯ã¡ãã»ãŒãžãµã³ãã«ãã©ãã£ãã¯ãåŠçããéä¿¡è èªèšŒæ å ±ã«åºã¥ããŠéä¿¡è ã®ä¿¡é Œæ§ãè©äŸ¡ããèªèšŒãããŠããªããœãŒã¹ãèªèšŒãããŠããªããœãŒã¹ããéä¿¡ããããã©ãã£ãã¯ã匷調衚瀺ããŸãã
ä¿åæé
Cloudmarkãã©ã¬ã³ãžãã¯ããŒã¿ã¯åéåŸ30æ¥éä¿æ
DMARCãã©ã¬ã³ãžãã¯ããŒã¿ã¯åéåŸ90æ¥éä¿æ
DMARCã®éPIIéèšããŒã¿ã¯ãåæããã³å質管çã®ç®çã§ç¡æéã«ä¿æ
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
Email Protection Supernova Engine
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
Email Threat Defense
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
å¥çŽæéïŒ35æ¥éä¿æãããããŒã¿ã«ããŽãªãŒããã ããè
åšã¢ããªãã£ã¯ã¹ã¯åéåŸæå€§18ã¶æéä¿æã
é»åã¡ãŒã«æ¬æã¯ãåŠçãã6ã¶æéä¿æ
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
Proofpoint ã®ãã«ãããã³ãæ å ±ããã³ã¯ã©ãŠãã»ãã¥ãªãã£ã¹ãã¬ãŒãžã«ä¿åãããŸãã
ä¿åæé
補å
Essentials
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ã¢ãŒã«ã€ãæ©èœã䜿çšããå Žåã¯ãäžèšã®ãã¢ãŒã«ã€ãããåç §ããŠãã ããã
TAPãµã³ãããã¯ã¹ã䜿çšãããŠããå Žåã¯ã以äžã®ãTAPããåç §ããŠãã ããã
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
Misdirected Email Protection
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
æ°åãã¡ãŒã«ã¢ãã¬ã¹ãè åšåæã«å«ãŸããå人ããŒã¿
CASBãšTAPãææããNPREã®é¡§å®¢ã®ããã«ãã¯ã©ãŠãã¢ããªã±ãŒã·ã§ã³ã®äœ¿çšç¶æ³ãšãŠãŒã¶ãŒããŒã¿ãåéãããŸãã
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
PhishAlarmãã¿ã³ã§ãšã³ããŠãŒã¶ãŒããå ±åãããçãããé»åã¡ãŒã«ãã«ãŒãã£ã³ã°ããã³ã¹ãã£ã³ããŸããPhishAlarm Analyzerã¯ããªã¢ã«ã¿ã€ã ã§ãã£ãã·ã³ã°æ»æã®é«åºŠãªå¿çèå¥ãæäŸããŸãã
PhishAlarmãšPhishAlarm Analyzerãä»ããŠå ±åãããé»åã¡ãŒã«ã¯ãã¢ã¯ã»ã¹ãããåé¡ããããããã¯ããã«é¡§å®¢ã®ã¬ã¹ãã³ã¹ã»ããŒã ãå©çšã§ããããã«ãªããŸãã
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
Data Security Posture Management (DSPM)*
*DSPMããã«ãŒããã€ã³ãã®ãã¹ãåãœãªã¥ãŒã·ã§ã³ãšããŠå°å
¥ããå Žåã®ã¿é©çš
ããŒã¿äž»äœ
åŸæ¥å¡ãè«è² æ¥è ã顧客
åŠçãããå人ããŒã¿ã®ã«ããŽãª
ã¯ã©ãŠãã¢ã«ãŠã³ãå ã®ããŒã¿ã¹ãã¢ã®ãªã¹ãããã®ã¢ã¯ã»ã¹æš©éãä¿åãããŠããããŒã¿ã®ããŒã¿åé¡ãããŒã¿åé¡ãè¡ãã¹ãã¢å ã®ããŒã¿ãžã®åç §ïŒãã€ã³ã¿
åŠçã®å 容
IaaSãPaaSãSaaSããŸãã¯ãªã³ãã¬ã å ã«éæ¢ç¶æ ã§ä¿åãããŠãã顧客ããŒã¿ãã¹ãã£ã³ããæ©å¯æ å ±ïŒPIIãPHIãPCIãªã©ïŒãæ€åºããŸãã
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
Threat Response Auto-pull (TRAP) (Cloud Threat Responseã®ãªã³ãã¬ãã¹ç)
ããŒã¿äž»äœ
åŸæ¥å¡ãè«è² æ¥è ã顧客ããã®ä»ã客æ§ã®ç€Ÿå é»åã¡ãŒã«ã·ã¹ãã ãéããŠé»åã¡ãŒã«ãéåä¿¡ããå人
åŠçãããå人ããŒã¿ã®ã«ããŽãª
ååãã¡ãŒã«ã¢ãã¬ã¹ãã¡ãŒã«ã«å«ãŸãããã¹ãŠã®å人ããŒã¿
åŠçã®å 容
TRAPã¯ãäžèŠãªã¡ãŒã«ãåæããåé€ãããªãŒãã¡ãŒã·ã§ã³ãå«ãããªã³ãã¬ãã¹ã®ã€ã³ã·ãã³ã管çãã©ãããã©ãŒã ã§ãã
ä¿åæé
ã¯ããŒãºãããã€ã³ã·ãã³ãã®ä¿æã¯ã³ã³ãããŒã©ãŒã«ãã£ãŠç¢ºç«ããã ã¯ããŒãºãããã€ã³ã·ãã³ãã®ãã«ã¡ãã»ãŒãžMIMEããŒã¿ã¯30æ¥ããšã«ããŒãžããã
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
補å
ããŒã¿äž»äœ
åŠçãããå人ããŒã¿ã®ã«ããŽãª
åŠçã®å 容
ä¿åæé
â»æ¬æ¥æ¬èªç¿»èš³çãšè±èªçãšã®éã«æå³ã®æµè§ŠãŸãã¯éœéœ¬ãããå Žåã¯ãè±èªçãåªå ãããŸãã
Proofpoint ã®è£œååŠçæ¥åã®å€æŽã«ã€ããŠéç¥ãåãåãããã«ç»é²ãã
以äžã®ãã©ãŒã ã«ããžãã¹çšã¡ãŒã«ã¢ãã¬ã¹ãå ¥åãããšãProofpoint ã®è£œååŠçæ¥åãªã¹ãã«å€æŽããã£ãéã«éç¥ãåãåãããšãã§ããŸãã倿Žãçºçããå Žåãå ¥åããã ããã¡ãŒã«ã¢ãã¬ã¹å®ã«ã¡ãŒã«ãéä¿¡ãããŸããã¡ãŒã«ã¢ãã¬ã¹ãéä¿¡ããããšã§ãProofpoint ããã®ã¢ãã¬ã¹ã䜿çšããŠãProofpoint ã®ãµãããã»ããµãŒãªã¹ãã®å€æŽã«é¢ããéç¥ãéä¿¡ããããšã«åæãããã®ãšã¿ãªãããŸãã
ãã€ã§ããã®ãªã¹ãã®é ä¿¡åæ¢ãåžæãããå Žåã¯ã以äžã®ãªã³ã¯ãã¯ãªãã¯ããŠãã ããã
Thank you for your submission.
© 2026 Proofpoint. All rights reserved. The content on this site is intended for informational purposes only.
æçµæŽæ° 2025/10/07.
ãã«ãŒããã€ã³ããã©ã¹ã
ãã«ãŒããã€ã³ãã¯ãããžã¿ã«ãšã³ã·ã¹ãã ã§é²åãç¶ããè åšããäŒæ¥ãå®ããæäŒããããŸãã