´Ý¹È¾ðÊó¥·¥¹¥Æ¥à¥º¡¢Â¿Í×ÁÇǧ¾Ú¤òÊݸ¤ëITDR¥½¥ê¥å¡¼¥·¥ç¥ó
´Ý¹È¾ðÊó¥·¥¹¥Æ¥à¥º¤Ï(°Ê²¼Î¬¡¢MSYS)11·î30Æü¡¢¥¤¥¹¥é¥¨¥ë¤Î¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£´ë¶È¡¢Silverfort¼Ò¤Î¿Í×ÁÇǧ¾Ú¤òÊݸ¤ëITDR(Identity Threat Detection and Response)¥½¥ê¥å¡¼¥·¥ç¥ó¤Î¼è¤ê°·¤¤³«»Ï¤òȯɽ¤·¤¿¡£ITDR¤Ï¡¢»ñ»ºÊݸî¤Î´ÑÅÀ¤«¤éID¿¯³²¤¬È¯À¸¤¹¤ë¤³¤È¤òÁ°Äó¤ËID´ÉÍý¥í¥°¾ðÊó¤ò¼ý½¸¤·°Û¾ï¥¢¥¯¥»¥¹¡¢Áàºî¤Ê¤É¤ò´Æ»ë¡¦¸¡ÃΤ·¡¢»ö°Æ¤¬È¯À¸¤·¤¿¾ì¹ç¤Ï¿×®¤ËÂн褷Èï³²¤òºÇ¾®¸Â¤ËÍÞ¤¨¤ë¤Ù¤¯¡¢¹Í°Æ¤µ¤ì¤¿¥½¥ê¥å¡¼¥·¥ç¥ó¡£
Silverfort ITDR(¸ø¼°Web¥µ¥¤¥È)
MSYS¤¬ÈÎÇäÂåÍýŹ·ÀÌó¤òÄù·ë¤¹¤ëSilverfort¼Ò¤Ï¡¢ÁÏÀß¼Ô¤¬¥¤¥¹¥é¥¨¥ë¹ñËÉ·³¤ÎÀº±Ô¥µ¥¤¥Ð¡¼ÉôÂâ½Ð¿È¥á¥ó¥Ð¡¼¤Ç¸Ç¤á¤é¤ì¤Æ¤ª¤ê¡¢okta¤äexabeam¡¢Microsoft¡¢splunk¾¶È³¦¤Î¼çÍפÊIAM(Identity and Access Management)¡¢¥¢¥¤¥Ç¥ó¥Æ¥£¥Æ¥£¥»¥¥å¥ê¥Æ¥£¡¢¶¼°ÒÊݸî¥Ù¥ó¥À¡¼¤È¥Æ¥¯¥Î¥í¥¸¡¼¥Ñ¡¼¥È¥Ê¡¼¤È¤·¤ÆÄó·È¤·¤Æ¤¤¤ë¡£MSYS¤Ï¡¢¤¹¤Ç¤ËÄ󶡤ò¹Ô¤Ã¤Æ¤¤¤ë¥ê¥â¡¼¥È¥¢¥¯¥»¥¹¥½¥ê¥å¡¼¥·¥ç¥ó¤äIAM¥½¥ê¥å¡¼¥·¥ç¥ó¤ÈÁȤ߹ç¤ï¤»¤Æ¡¢ID¿¯³²¤Î¶¼°ÒÄ㸺¤òÌܻؤ¹¡£¥¤¥ó¥¿¡¼¥Í¥Ã¥È¾å¤ÇID¤ä¥Ñ¥¹¥ï¡¼¥É¤Ê¤É¥æ¡¼¥¶¡¼Ç§¾Ú¤ËÍѤ¤¤é¤ì¤ë¥¯¥ì¥Ç¥ó¥·¥ã¥ë¾ðÊó¤ÎÊݸî¤Ï¡¢Â¿Í×ÁÇǧ¾Ú¤ÎÉáµÚ¤Ë¤è¤ê°ÂÁ´À¤¬¸þ¾å¤·¤Æ¤¤¤ë¤¬¡¢¹¶·â¼Ô¤Ï¥Þ¥ë¥¦¥§¥¢¤ò³èÍѤ·¤¿É¸Åª·¿¹¶·â¤ò¤Ï¤¸¤áÍÍ¡¹¤Ê¹¶·â¼êË¡¤òÍѤ¤¤Æ¥»¥¥å¥ê¥Æ¥£¤ÎÆÍÇˤòÁÀ¤¤¡¢ID¿¯³²¤Ë¤è¤ë¾ðÊóϳ¤¨¤¤»ö°Æ¤âȯÀ¸¤·¤Æ¤¤¤ë¡£
MSYS¤¬ÈÎÇäÂåÍýŹ·ÀÌó¤òÄù·ë¤¹¤ëSilverfort¼Ò¤Ï¡¢ÁÏÀß¼Ô¤¬¥¤¥¹¥é¥¨¥ë¹ñËÉ·³¤ÎÀº±Ô¥µ¥¤¥Ð¡¼ÉôÂâ½Ð¿È¥á¥ó¥Ð¡¼¤Ç¸Ç¤á¤é¤ì¤Æ¤ª¤ê¡¢okta¤äexabeam¡¢Microsoft¡¢splunk¾¶È³¦¤Î¼çÍפÊIAM(Identity and Access Management)¡¢¥¢¥¤¥Ç¥ó¥Æ¥£¥Æ¥£¥»¥¥å¥ê¥Æ¥£¡¢¶¼°ÒÊݸî¥Ù¥ó¥À¡¼¤È¥Æ¥¯¥Î¥í¥¸¡¼¥Ñ¡¼¥È¥Ê¡¼¤È¤·¤ÆÄó·È¤·¤Æ¤¤¤ë¡£MSYS¤Ï¡¢¤¹¤Ç¤ËÄ󶡤ò¹Ô¤Ã¤Æ¤¤¤ë¥ê¥â¡¼¥È¥¢¥¯¥»¥¹¥½¥ê¥å¡¼¥·¥ç¥ó¤äIAM¥½¥ê¥å¡¼¥·¥ç¥ó¤ÈÁȤ߹ç¤ï¤»¤Æ¡¢ID¿¯³²¤Î¶¼°ÒÄ㸺¤òÌܻؤ¹¡£¥¤¥ó¥¿¡¼¥Í¥Ã¥È¾å¤ÇID¤ä¥Ñ¥¹¥ï¡¼¥É¤Ê¤É¥æ¡¼¥¶¡¼Ç§¾Ú¤ËÍѤ¤¤é¤ì¤ë¥¯¥ì¥Ç¥ó¥·¥ã¥ë¾ðÊó¤ÎÊݸî¤Ï¡¢Â¿Í×ÁÇǧ¾Ú¤ÎÉáµÚ¤Ë¤è¤ê°ÂÁ´À¤¬¸þ¾å¤·¤Æ¤¤¤ë¤¬¡¢¹¶·â¼Ô¤Ï¥Þ¥ë¥¦¥§¥¢¤ò³èÍѤ·¤¿É¸Åª·¿¹¶·â¤ò¤Ï¤¸¤áÍÍ¡¹¤Ê¹¶·â¼êË¡¤òÍѤ¤¤Æ¥»¥¥å¥ê¥Æ¥£¤ÎÆÍÇˤòÁÀ¤¤¡¢ID¿¯³²¤Ë¤è¤ë¾ðÊóϳ¤¨¤¤»ö°Æ¤âȯÀ¸¤·¤Æ¤¤¤ë¡£