ãã«ãŒããã€ã³ããæ»æãã§ãŒã³ãæã¡åãæ¥çåã®ã€ãããŒã·ã§ã³ãçºè¡š
æ°ããçµ±åãœãªã¥ãŒã·ã§ã³ã¯ããããå€ãã®æ»æãäºåã«æ€ç¥ãããæŒããããã¢ã€ãã³ãã£ãã£ã«ãã圱é¿ã®å®éåãããããŒã¿æå€±ã«å¯Ÿå¿ããé²è·å¹çã®åäžãã«ãããè åšãã¢ã€ãã³ãã£ãã£ãããŒã¿ã«ãŸãããçµç¹ã®æãéèŠãªå Žé¢ã§çŽé¢ããé倧ãªãªã¹ã¯ã解決
2023幎9æ6æ¥ïŒç±³åœã«ãªãã©ã«ãã¢å·ãµããŒããŒã«ïŒãã¥ãŒãšãŒã¯å·ãã¥ãŒãšãŒã¯ ïŒ -- ãµã€ããŒã»ãã¥ãªãã£ãšã³ã³ãã©ã€ã¢ã³ã¹åéã®ãªãŒãã£ã³ã° ã«ã³ãããŒã§ãããã«ãŒããã€ã³ã(æ¬ç€ŸïŒç±³åœã«ãªãã©ã«ãã¢å·) ã¯ã幎次ã«ã³ãã¡ã¬ã³ã¹ãProofpoint Protect 2023ãã§ãçµç¹ã®çµæžçæå€±ã®äž»ãªåå ã§ããããžãã¹ã¡ãŒã«è©æ¬ºïŒBECïŒããã©ã³ãµã ãŠã§ã¢æ»æãããŒã¿æŒãããŸã§ãçµç¹ãçŸåšçŽé¢ããŠããæå€§ã®ãªã¹ã¯ã«å¯ŸåŠããæ¥çåã®ã€ãããŒã·ã§ã³ãçºè¡šããŸãããä»åçºè¡šãããçµ±åãœãªã¥ãŒã·ã§ã³ã¯ããProofpoint AegisïŒè åšé²è·ãã©ãããã©ãŒã ïŒããIdentity Threat DefenseïŒã¢ã€ãã³ãã£ãã£è åšæ€ç¥ãã©ãããã©ãŒã ïŒããProofpoint SigmaïŒæ å ±é²è·ãã©ãããã©ãŒã ïŒãã®åãã©ãããã©ãŒã ã«ãŸããããæ»æãã§ãŒã³ã®æãéèŠãªæ®µéã§è åšã黿¢ããŸãããã«ãŒããã€ã³ãã®AIïŒäººå·¥ç¥èœïŒãšMLïŒæ©æ¢°åŠç¿ïŒã掻çšããæ°ããªã€ãããŒã·ã§ã³ã¯ãæ¥çã§æãå æ¬çãªããŒã¿ã»ããã®1ã€ã§ããæ°å ä»¶ã®è åšæŽ»åãæ€ç¥ããããšã§ããããŸã§ã«ç¡ãå¯èŠæ§ãæè»æ§ã奥深ããã»ãã¥ãªãã£æ åœè ã«æäŸããçµç¹ã®æ»æå¯Ÿè±¡é åå šäœã§é«åºŠãªæµå¯Ÿå¢åãæ€ç¥ããé²è·ããŸãã
AIïŒäººå·¥ç¥èœïŒãšMLïŒæ©æ¢°åŠç¿ïŒã¯ãæ£ç¢ºãªæ€ç¥çãéçšå¹çãèªååãããé²è·ãå®çŸããããã«ã匷åºãªæ€ç¥ã¢ãã«ãšå¿ å®åºŠã®é«ãããŒã¿ãã€ãã©ã€ã³ãå¿ èŠãšããŸãããã«ãŒããã€ã³ãã®ã客æ§ã¯ãã¡ãŒã«ãã¯ã©ãŠããã¢ãã€ã«ã³ã³ãã¥ãŒãã£ã³ã°ã«ãŸããããæå€§ãã€æã倿§ãªã°ããŒãã«ãµã€ããŒã»ãã¥ãªãã£ããŒã¿ãã€ãã©ã€ã³ããã¡ãªãããåŸãŠããŸãããã«ãŒããã€ã³ãã¯æ¯å¹Žã2å 8,000åé以äžã®ã¹ãã£ã³ãããã¡ãŒã«ã¡ãã»ãŒãžã17å ã®ã¹ãã£ã³ãããURLã1å 3,000åã®ã¹ãã£ã³ãããSMSããã³MMSã4,600äžäººã®DLPãšã³ããŠãŒã¶ãŒããœãŒã¹ãšããæ¯é¡ãªãéã®ããŒã¿ãåæããŠããŸãã
åæäŸµå®³ã®é²æ¢
ã¡ãŒã«ã¯ã䟵害ãæåã«å°ãæ»æãã¯ãã«ã®ç¬¬äžäœã§ããProofpoint AegisïŒè åšé²è·ãã©ãããã©ãŒã ïŒã¯ãããžãã¹ã¡ãŒã«è©æ¬ºïŒBECïŒãã©ã³ãµã ãŠã§ã¢æ»æãæŠåšåãããURLãã¯ã¬ãã³ã·ã£ã«ãã£ãã·ã³ã°ã®ããã®å€èŠçŽ èªèšŒïŒMFAïŒåé¿ãªã©ãçŸåšã®é«åºŠãªæ»æãè§£é€ããå¯äžã®AI/ML (人工ç¥èœã𿩿¢°åŠç¿)ãæèŒããã¯ã©ãŠãããŒã¹ã®è åšé²è·ãã©ãããã©ãŒã ã§ãããProofpoint Aegis: è åšé²è·ãã©ãããã©ãŒã ãã®æ°ããæ©èœåŒ·åã¯ä»¥äžã®éãã§ãïŒ
- æ¥çåãLLM ããŒã¹ã®ã¡ãŒã«é
ä¿¡åã®è
åšæ€ç¥ïŒ
ãã«ãŒããã€ã³ãã¯ãProofpoint CLEAR ãœãªã¥ãŒã·ã§ã³ ã«BERTå€§èŠæš¡èšèªã¢ãã«ïŒLLMïŒãå®è£ ããããšã§ããœãŒã·ã£ã«ãšã³ãžãã¢ãªã³ã°æ»æã«ããè¢«å®³ãæªç¶ã«é²ãããšãã§ããŸããããã¯ãæ¥çåã®åä¿¡ãã¬ã€ã«ã¡ãŒã«ãé ä¿¡ããåã«æ€ç¥ã»é²æ¢ãããœãªã¥ãŒã·ã§ã³ã§ãã
äžçäžã®23äžãè¶ ããçµç¹ã«ããããã«ãŒããã€ã³ãã®ãã¬ã¡ããªãŒã«ãããšãã¡ãŒã«ãåä¿¡ãã¬ã€ã«é ä¿¡ããåã®ä¿è·ãéåžžã«éèŠãªã®ã¯ãé ä¿¡åŸã®æ€ç¥ã§ã¯æé ãã«ãªãããšãå€ãããã§ããæªæã®ããURLã®ã¯ãªãã¯ã¯7ä»¶ã«1ä»¶ã»ã©ãã¡ãŒã«åä¿¡åŸ1å以å ã«çºçããŠãããBECãžã®è¿ä¿¡ã®3åã®1以äžã¯5å以å ã«çºçããŠããŸãããŠãŒã¶ãŒãæ»æã®é€é£ã«ãªãå¯èœæ§ããããããã®çãæéæ ã¯ãæªæã®ããæ»æããŠãŒã¶ãŒã®åä¿¡ãã¬ã€ã«å°éããåã«ãããã¯ããããšã®éèŠæ§ã匷調ããŠããŸã
ãã®LLMããŒã¹ã®æ€ç¥ã¯ãåŸæ¥ããäœæãããŠãããã®ãšçæAIã䜿çšããŠäœæããããã®ã®äž¡æ¹ã«ãããŠãçæAIãäœæããæªæã®ããã¡ãã»ãŒãžã®æ€ç¥ã«é«ãææãäžããŠããããšãå®èšŒãããŠããŸãããã«ãŒããã€ã³ãã¯ãChatGPTãWormGPTããã®ä»ã®çæAIãäœæããæªæã®ããã³ã³ãã³ãã䜿çšããŠããã«ãŒããã€ã³ãã®ã¢ãã«ããã¬ãŒãã³ã°ããŠããŸãã
- ãããã¯ãããè
åšã«å¯Ÿããå¯èŠæ§ã®åŒ·åïŒ
æšå¹ŽãäŒæ¥ã¯ BEC ã«ãã 27 åãã«ä»¥äžã®æå®³ã被ããŸããâ»ïŒãããã¯ã©ã³ãµã ãŠã§ã¢æ»æã«ããæå®³ã®çŽ 80 åã«çžåœããŸãã第3ååæããã¯ãæšçåæ»æå¯Ÿç補åã§ããProofpoint TAP(Targeted Attack ProtectionïŒããã·ã¥ããŒãã«æ°ãããµããªã远å ãããæ°ããLLMããŒã¹ã®æ€ç¥æ©èœã«ãã£ãŠæ€ç¥ãããè åšãå«ããProofpointãå®è¡ããBECæ€ç¥ã«é¢ãã説æã匷åãããŸãããã®æ°ãããµããªã«ã¯ãè åšãBECæ»æã§ãããšå€æãããçç±ãšãããã«å¯Ÿå¿ãã察å¿ã¹ã±ãžã¥ãŒã«ãèšèŒããããããã»ãã¥ãªãã£æ åœè ãè åšåæãçµå¶é£ãžã®å ±åã«è²»ããæéãççž®ãããŸãã
Attack Path RiskïŒæ»æçµè·¯ã®ãªã¹ã¯ãå¶åŸ¡ããã¢ã€ãã³ãã£ãã£è åšããé²è·
ãµã€ããŒæ»æã®äžççãªå¢å ã¯ãæ»æè ããã®æŠè¡ãšçŠç¹ãã¢ã€ãã³ãã£ãã£ããŒã¹ã®æ»æã«ç§»ãããšã«ãã£ãŠå¯èœãšãªããæšå¹Žã¯84ïŒ ã®çµç¹ãã¢ã€ãã³ãã£ãã£é¢é£ã«ããã䟵害ã«éããŸããâ»ïŒãæ»æè ãæåã«ãã¹ãã«äŸµå ¥ãããšãããããæçµçãªã¿ãŒã²ããã«ãªãããšã¯ã»ãšãã©ãããŸãããããã®ä»£ããã«ãæ»æè ã¯ç¹æš©ããšã¹ã«ã¬ãŒããããç¹æš©ã¯ã¬ãã³ã·ã£ã«ãæªçšããããã«ç°å¢å šäœãã©ãã©ã«ã ãŒãã¡ã³ãïŒæšªæ¹åã«ç§»åïŒããŸãã
Proofpoint AegisïŒè åšé²è·ãã©ãããã©ãŒã ïŒãšIdentity Threat DefenseïŒã¢ã€ãã³ãã£ãã£è åšæ€ç¥ãã©ãããã©ãŒã ïŒã®éã§ãæ»æãã§ãŒã³å šäœã«ãããåžå ŽããªãŒãããããŒã¿ãçµ±åããããšã«ãããã»ãã¥ãªãã£æ åœè ã¯ããã«ãŒããã€ã³ãã®æ°æ©èœã§ããAttack Path Risk ã䜿çšããŠãç¹æš©IDã®ä¹±çšãã©ãã©ã«ã ãŒãã¡ã³ãã®ããã«åŸæ¥å¡ã®IDã䟵害ãããå Žåã®ã©ã³ãµã ãŠã§ã¢æ»æãããŒã¿æŒããã®æ»æçµè·¯ã®æ°ãçè§£ããããšãã§ããŸãããã®æ©èœã¯ããã«ãŒããã€ã³ãã®TAPããã·ã¥ããŒãå ã§ç¬¬4ååæã«å©çšã§ããããã«ãªããçµç¹ãProofpoint Aegiså°å ¥ã®éã«Identity Threat Defenseã远å ããå Žåã¯ãã¢ããªã¹ããè¿ éã«ä¿®åŸ©ãšé©å¿å¶åŸ¡ã®åªå é äœã決å®ã§ããããã«ãªããŸãã
Misdirected EmailïŒèª€éä¿¡ã¡ãŒã«ãé²ããæ å ±æŒãããé²è·
Proofpoint SigmaïŒæ å ±é²è·ãã©ãããã©ãŒã ïŒã¯ãã³ã³ãã³ãã®åé¡ãè åšã®ãã¬ã¡ããªãŒããã£ãã«ããŸããã ãŠãŒã¶ãŒã®æ¯ãèããçµ±åããã¯ã©ãŠããã€ãã£ããªã€ã³ã¿ãŒãã§ãŒã¹ã§ããŒã¿æå€±ãšå éšè åšã黿¢ããå¯äžã®æ å ±ä¿è·ãã©ãããã©ãŒã ã§ãããã«ãŒããã€ã³ãã¯ãäžçæå€§ã®å éšè åšç®¡çïŒITMïŒã®ãããã€ããŒã§ãããäžç第2äœã®ããŒã¿æå€±é²æ¢å¯ŸçïŒDLPïŒã®ãã³ããŒã§ã売äžé«ã§ãäžç第2äœãšãªã£ãŠããŸãâ»ïŒãProofpoint Sigmaã¯ãå šäžçã§5,000以äžã®é¡§å®¢ãš4,600äžäººä»¥äžã®ãŠãŒã¶ãŒã«å°å ¥ãããæ¯æ450åä»¶ã®æŽ»åãåæããFortune 100äŒæ¥ã®çŽåæ°ããä¿¡é ŒãåŸãŠããŸãã
ãŠãŒã¶ãŒã®è¡åç°åžžæ€ç¥ãšã³ã³ãã³ãã¹ãã£ã³çšã®MLïŒæ©æ¢°åŠç¿ïŒã掻çšãããã«ãŒããã€ã³ãã®æ°ãã Misdirected Email ãœãªã¥ãŒã·ã§ã³ã¯ã第4ååæã«æäŸããããŠãŒã¶ãŒã誀ã£ãŠã¡ãŒã«ããã¡ã€ã«ãééã£ãåä¿¡è ã«éä¿¡ããããšã§ããŒã¿æå€±ã€ã³ã·ãã³ããåŒãèµ·ããå¯èœæ§ãé²ããŸãã
Proofpoint Security AssistantïŒçæAIããŒã¹ã®åæã«ãããæ»æãã§ãŒã³å šäœã«ãããè åšã®åŒ·åãªç¥èŠãæäŸ
ãã«ãŒããã€ã³ãã¯ã23äžãè¶ ããã°ããŒãã«äŒæ¥ãäžå°äŒæ¥ã150ã®ISPããã³ã¢ãã€ã«ãããã¯ãŒã¯ãããã€ããŒããæãèšå€§ãªé¡§å®¢ã»ããããã®ãã¬ã¡ããªãŒã«åºã¥ããç¬èªã®AIãšMLã«ããã€ãããŒã·ã§ã³ãç¶ç¶ããŠæäŸããŠããŸããProtect 2023ã§åããŠãã¬ãã¥ãŒãããProofpoint Security Assistantã¯ãæ°ããçæAIãŠãŒã¶ãŒã€ã³ã¿ãŒãã§ãŒã¹ã§ãã¢ããªã¹ããèªç¶èšèªã§è³ªåãããã«ãŒããã€ã³ãã®ãã©ãããã©ãŒã å šäœã«ãããäœå ãã®éçŽãããããŒã¿ãã€ã³ãã«åºã¥ããŠãå®çšçãªç¥èŠãšæšå¥šäºé ãåãåãããšãã§ããŸãã
DLP SOCã¢ããªã¹ãã¯ã第4ååæã«Proofpoint SigmaïŒæ å ±é²è·ãã©ãããã©ãŒã ïŒã«ãããŠãã¯ãããžãŒãã¬ãã¥ãŒãšããŠå©çšã§ããããã«ãªããäŸãã°ããäœè ãã«ãã£ãŠãæ å ±çªåã®è©Šã¿ããªãããŠãããã©ããã衚瀺ããŠãã ããããããŠã©ã®DLPã³ã³ãããŒã«ã远å ãã¹ããæç€ºããŠãã ããããšãã£ã質åãæããããããšãã§ããŸããä»åŸããã«ãŒããã€ã³ãã®çæAIããŒã¹ã®ã€ã³ã¿ãŒãã§ãŒã¹ã¯ãProofpoint AegisïŒè åšé²è·ãã©ãããã©ãŒã ïŒãšIdentity Threat DefenseïŒã¢ã€ãã³ãã£ãã£è åšæ€ç¥ãã©ãããã©ãŒã ïŒã«ãæ¡åŒµãããŸããã»ãã¥ãªãã£æ åœè ã¯ããã©ã³ãµã ãŠã§ã¢ããŒã¹ã®ããŒã¿æŒããã«ã€ãªããæ»æçµè·¯ãæãå€ãæã€äž»èŠãªVAPïŒVery Attacked PeopleïŒã衚瀺ããŠãã ããããšãã£ã質åãããããšã§ãè åšã«é¢ãã匷åºãªç¥èŠãåŸãããšãã§ããããã«ãªããŸãã
çæAIãžã®è²¬ä»»ããã¢ãããŒã
顧客ããŒã¿ã®å®å šæ§ããã©ã€ãã·ãŒãã»ãã¥ãªãã£ã¯ããã«ãŒããã€ã³ãã«ãšã£ãŠæãéèŠã§ãã ãã«ãŒããã€ã³ãã¯ãåçæAIããŒã«ãåœç€Ÿã®äŒæ¥çå¿µã«æºæ ããŠãããã©ããã峿 Œã«è©äŸ¡ããŠããŸããäŸãã°ãçæAIããŒã«ã¯ç€Ÿå ã§å±éãããããŒãžã§ã³ã䜿çšããŠãããLLMãããã€ããŒããã«ãŒããã€ã³ãã®ä¿æããããŒã¿ã䜿çšããŠã¢ãã«ããã¬ãŒãã³ã°ããããšã¯èš±å¯ããŠããŸããã
ãã«ãŒããã€ã³ãç±³åœæ¬ç€Ÿã®ãµã€ããŒã»ãã¥ãªãã£æŠç¥æ åœå¯ç€Ÿé·ãRyan KalemberïŒã©ã€ã¢ã³ã»ã«ã¬ã³ããŒïŒã¯æ¬¡ã®ããã«è¿°ã¹ãŠããŸãããæ»æãã§ãŒã³ã®éèŠãªéšåã¯ã人ãäžå¿ãšããã¢ãããŒããªãã«ã¯å¹æçã«å¯ŸåŠããããšã¯ã§ããŸããããã«ãŒããã€ã³ãã¯ãã»ãã®ã©ã®ãµã€ããŒã»ãã¥ãªãã£äŒæ¥ãããå€ãã®äººã®ã³ãã¥ãã±ãŒã·ã§ã³ãåæããããšã§ãã¡ãŒã«è©æ¬ºãã©ã³ãµã ãŠã§ã¢æ»æãããŒã¿çªåããã®ä»ã®éèŠãªãªã¹ã¯ã«å¯Ÿããæ»æãã§ãŒã³å šäœã«ããã£ãŠãæ»æè ã®ãã¬ã€ããã¯ãç Žå£ããæ¥çåã®ã€ãããŒã·ã§ã³ãæäŸããããšãã§ããŸãã
â»ïŒïŒåç
§: FBI IC3 2022 Internet Crime Report (ã€ã³ã¿ãŒãããç¯çœªã¬ããŒã)
â»ïŒïŒåç
§ïŒãã¯ã€ãããŒããŒïŒ2022 TRENDS IN SECURING DIGITAL IDENTITIES
â»ïŒïŒåç
§ïŒGartner Research - Market Share: All Software Markets, Worldwide, 2022
ãã«ãŒããã€ã³ãã®åãœãªã¥ãŒã·ã§ã³ã®è©³çްã«ã€ããŠã¯ã以äžã®ãªã³ã¯ããã芧ãã ããã
- Proofpoint Aegis PlatformïŒè
åšé²è·ãã©ãããã©ãŒã ïŒïŒ
https://www.proofpoint.com/jp/products/aegis - Proofpoint Identity Threat Defense PlatformïŒã¢ã€ãã³ãã£ãã£è åšæ€ç¥ãã©ãããã©ãŒã ïŒïŒhttps://www.proofpoint.com/jp/products/identity-threat-detection-response
- Proofpoint SigmaïŒæ
å ±é²è·ãã©ãããã©ãŒã ïŒïŒ
https://www.proofpoint.com/jp/products/sigma
ç¡æãã¢ã®ãäºçŽã¯ïŒ
https://www.proofpoint.com/jp/free-demo-request
Microsoft365ãŠãŒã¶ãŒåãç¡æã®ç°¡æã¢ã»ã¹ã¡ã³ãã®ãäºçŽã¯ïŒ
https://www.proofpoint.com/jp/learn-more/email-rapid-risk-assessment
Proofpoint | ãã«ãŒããã€ã³ãã«ã€ããŠ
Proofpoint, Inc.ã¯ããµã€ããŒã»ãã¥ãªãã£ã®ã°ããŒãã« ãªãŒãã£ã³ã° ã«ã³ãããŒã§ããçµç¹ã®æå€§ã®è³ç£ã§ããããåæã«æå€§ã®ãªã¹ã¯ãšããªãããã人ããå®ãããšã«çŠç¹ãããŠãŠããŸããProofpointã¯ãã¯ã©ãŠãããŒã¹ã®çµ±åãœãªã¥ãŒã·ã§ã³ã«ãã£ãŠãäžçäžã®äŒæ¥ãæšçåæ»æãªã©ã®ãµã€ããŒæ»æããããŒã¿ãå®ãããããŠããããã®ãŠãŒã¶ãŒããµã€ããŒæ»æã«å¯ŸããŠããã«åŒ·åãªå¯ŸåŠèœåãæãŠãããæ¯æŽããŠããŸãããŸããFortune 100äŒæ¥ã®85%ãå«ãããŸããŸãªèŠæš¡ã®äŒæ¥ãããã«ãŒããã€ã³ãã®ãœãªã¥ãŒã·ã§ã³ãå©çšããŠãããã¡ãŒã«ãã¯ã©ãŠãããœãŒã·ã£ã«ã¡ãã£ã¢ãWebé¢é£ã®ã»ãã¥ãªãã£ã®ãªã¹ã¯ããã³ã³ã³ãã©ã€ã¢ã³ã¹ã®ãªã¹ã¯ãäœæžããããæ¯æŽããŠããŸãã
詳现㯠www.proofpoint.com/jp ã«ãŠã確èªãã ããã
© Proofpoint, Inc. Proofpointã¯ç±³åœåã³ãã®ä»ã®åœã ã«ãããProofpoint, Inc.ã®åæšã§ããæ¬ããã¥ã¡ã³ãã«èšèŒãããŠããäŒç€Ÿåã補ååããµãŒãã¹åã¯ãäžè¬ã«å瀟ã®ç»é²åæšãŸãã¯åæšã§ããæ¬ããã¥ã¡ã³ãã®èšèŒå 容ã補ååã³ãµãŒãã¹ã®ä»æ§ã¯äºåãªã倿ŽãããããšããããŸãã