{"id":163182,"date":"2022-06-08T17:35:17","date_gmt":"2022-06-09T00:35:17","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=163182"},"modified":"2022-06-08T17:35:17","modified_gmt":"2022-06-09T00:35:17","slug":"forrester-wave-cybersecurity-incident-response-services","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2022\/06\/forrester-wave-cybersecurity-incident-response-services\/?lang=ja","title":{"rendered":"Forrester Wave&#x2122;\u3067Unit 42\u306eIR\u30b5\u30fc\u30d3\u30b9\u304c\u300c\u512a\u826f\u30d9\u30f3\u30c0\u30fc\u300d\u8a55\u4fa1"},"content":{"rendered":"<h3><strong><em>\u300c\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u304cIR\u5e02\u5834\u306b\u53c2\u5165...\u300d <\/em><\/strong><\/h3>\n<h3><strong><em>\u2013 <\/em><\/strong>The Forrester Wave&#x2122;: Cybersecurity Incident Response Services, Q1 2022<\/h3>\n<p>\u300cThe Forrester Wave&#x2122;: Cybersecurity Incident Response Services, Q1 2022\u300d\u306b\u304a\u3044\u3066\u3001\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306f\u300c\u6700\u3082\u91cd\u8981\u300d\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30a4\u30f3\u30b7\u30c7\u30f3\u30c8 \u30ec\u30b9\u30dd\u30f3\u30b9 \u30d7\u30ed\u30d0\u30a4\u30c0\u306e1\u793e\u3068\u3057\u3066\u8a8d\u3081\u3089\u308c\u308b\u3068\u3068\u3082\u306b\u3001\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30c1\u30fc\u30e0\u300cUnit 42\u300d\u304c\u512a\u826f\u30d9\u30f3\u30c0\u30fc\u306b\u9078\u51fa\u3055\u308c\u307e\u3057\u305f\u3002Unit 42\u304c\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8 \u30ec\u30b9\u30dd\u30f3\u30b9 \u30a2\u30ca\u30ea\u30b9\u30c8 \u30ec\u30dd\u30fc\u30c8\u3067\u8a00\u53ca\u3055\u308c\u305f\u306e\u3082\u3001\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30b5\u30fc\u30d3\u30b9 \u30ec\u30dd\u30fc\u30c8\u3067\u8a00\u53ca\u3055\u308c\u305f\u306e\u3082\u4eca\u56de\u304c\u521d\u3081\u3066\u3067\u3059\u3002\u4eca\u56de\u306e\u8a55\u4fa1\u306f\u3001\u8105\u5a01\u60c5\u5831\u306b\u57fa\u3065\u304f\u5f0a\u793e\u306e\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8 \u30ec\u30b9\u30dd\u30f3\u30b9 \u30a2\u30d7\u30ed\u30fc\u30c1\u3068\u3001\u5e02\u5834\u306b\u304a\u3051\u308b\u6025\u6210\u9577\u304c\u8a8d\u3081\u3089\u308c\u305f\u7d50\u679c\u3060\u3068\u8003\u3048\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>Forrester\u306f24\u306e\u57fa\u6e96\u306b\u57fa\u3065\u304f\u8a55\u4fa1\u3067\u3001\u4e3b\u8981\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8 \u30ec\u30b9\u30dd\u30f3\u30b9 \u30d7\u30ed\u30d0\u30a4\u30c013\u793e\u3092\u8abf\u67fb\u30fb\u5206\u6790\u30fb\u63a1\u70b9\u3057\u307e\u3057\u305f\u3002\u305d\u306e\u4e2d\u3067Unit 42\u306f\u300cForrester\u306e\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u304b\u3089\u9ad8\u3044\u77e5\u540d\u5ea6\u3092\u7372\u5f97\u3057\u3066\u3044\u308b\u300d\u70b9\u304c\u7279\u5fb4\u3067\u3001\u300c\u904e\u53bb12\u304b\u6708\u306e\u9593\u306b100\u4ef6\u4ee5\u4e0a\u306e\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30b9\u30dd\u30f3\u30b9\u6848\u4ef6\u3067\u30e1\u30a4\u30f3\u306e\u8abf\u67fb\u8005\u3068\u3057\u3066\u6d3b\u52d5\u300d\u3057\u3001\u300c\u30b5\u30a4\u30d0\u30fc\u4fdd\u967a\u4f1a\u793e\u306e\u59d4\u8a17\u5148\u30fb\u7167\u4f1a\u5148\u306b\u767b\u9332\u300d\u3055\u308c\u3066\u3044\u308bIR\u30d7\u30ed\u30d0\u30a4\u30c0\u3068\u8a55\u4fa1\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>Unit 42\u306f\u300c\u30af\u30e9\u30a6\u30c9\u74b0\u5883\u300d\u306b\u52a0\u3048\u3066\u300c\u5b9f\u884c\u30ed\u30fc\u30c9\u30de\u30c3\u30d7\u300d\u3068\u300c\u30c6\u30af\u30ce\u30ed\u30b8\u300d\u306e\u57fa\u6e96\u3067\u6e80\u70b9\u3092\u7372\u5f97\u3057\u307e\u3057\u305f\u3002\u307e\u305f\u3001\u300cIR\u30ea\u30c6\u30a4\u30ca\u30fc\u4f53\u5236\u300d\u3001\u300c\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3078\u306e\u5099\u3048\u300d\u3001\u300c\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30b7\u30df\u30e5\u30ec\u30fc\u30b7\u30e7\u30f3\u300d\u3001\u300c\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30b9\u30dd\u30f3\u30b9\u300d\u3001\u300c\u5fa9\u65e7\u300d\u3001\u300c\u30a8\u30b3\u30b7\u30b9\u30c6\u30e0\u3068\u306e\u5354\u529b\u300d\u3001\u300c\u7523\u696d\u7528\u5236\u5fa1\u30b7\u30b9\u30c6\u30e0\u74b0\u5883\u300d\u3001\u300c\u30ec\u30b9\u30dd\u30f3\u30b9\u306e\u30ea\u30fc\u30c0\u30fc\u30b7\u30c3\u30d7\u3068\u30c1\u30fc\u30e0\u69cb\u6210\u300d\u3001\u300c\u6280\u8853\u8abf\u67fb\u54e1\u306e\u5c02\u9580\u6027\u300d\u3001\u300cIR\u4eba\u6750\u7ba1\u7406\u300d\u3001\u300c\u6307\u6a19\u300d\u3001\u300c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u696d\u754c\u3078\u306e\u8ca2\u732e\u300d\u3067\u3082\u4ed6\u793e\u3068\u540c\u7b49\u306e\u30b9\u30b3\u30a2\u3092\u7372\u5f97\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>Forrester\u306f\u4ee5\u4e0b\u306e\u80fd\u529b\u3092\u6301\u3064\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30a4\u30f3\u30b7\u30c7\u30f3\u30c8 \u30ec\u30b9\u30dd\u30f3\u30b9 \u30b5\u30fc\u30d3\u30b9\u306e\u30d7\u30ed\u30d0\u30a4\u30c0\u3092\u63a2\u3059\u3053\u3068\u3092\u9867\u5ba2\u306b<a href=\"http:\/\/start.paloaltonetworks.com\/forrester-wave-incident-response\">\u63a8\u5968<\/a>\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<ul>\n<li>\u300c\u9867\u5ba2\u3092\u6700\u60aa\u306e\u72b6\u6cc1\u306b\u5099\u3048\u3055\u305b\u3001\u671f\u9593\u4e2d\u306f\u5e38\u306b\u4fdd\u967a\u306b\u5b88\u3089\u308c\u305f\u72b6\u614b\u306b\u3057\u3001...<\/li>\n<li>\u6cd5\u898f\u5236\u74b0\u5883\u3092\u6b63\u78ba\u306b\u628a\u63e1\u3057\u3066\u304a\u308a...[\u304b\u3064\u3001]<\/li>\n<li>\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30b9\u30dd\u30f3\u30b9\u3092\u9577\u671f\u7684\u306b\u30b5\u30dd\u30fc\u30c8\u3059\u308b\u300d<\/li>\n<\/ul>\n<h2>\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8 \u30ec\u30b9\u30dd\u30f3\u30b9 \u30b5\u30fc\u30d3\u30b9\u306b\u5bfe\u3059\u308b\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306eUnit 42\u306e\u30a2\u30d7\u30ed\u30fc\u30c1<\/h2>\n<p>Forrester\u304c\u63a8\u5968\u3059\u308b\u5185\u5bb9\u306f\u3001Unit 42\u304c\u9867\u5ba2\u3068\u5354\u529b\u3059\u308b\u969b\u306e\u30a2\u30d7\u30ed\u30fc\u30c1\u3068\u5b8c\u5168\u306b\u4e00\u81f4\u3057\u3066\u3044\u308b\u3068\u8003\u3048\u307e\u3059\u30021\u5e74\u307b\u3069\u524d\u3001\u5f0a\u793e\u306e<a href=\"https:\/\/unit42.paloaltonetworks.com\/\">\u4e16\u754c\u7684\u306b\u77e5\u3089\u308c\u308b\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30c1\u30fc\u30e0<\/a>\u3068\u30012020\u5e74\u5f8c\u534a\u306eCrypsis\u306e\u8cb7\u53ce\u306b\u3088\u3063\u3066\u5f0a\u793e\u306b\u52a0\u308f\u3063\u305f\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30b9\u30dd\u30f3\u30c0\u30fc\u3068\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30ea\u30b9\u30af \u30b3\u30f3\u30b5\u30eb\u30bf\u30f3\u30c8\u304b\u3089\u6210\u308b\u512a\u79c0\u306a\u30c1\u30fc\u30e0\u304c\u5408\u4f75\u3057\u307e\u3057\u305f\u3002\u305d\u306e\u7d50\u679c\u751f\u307e\u308c\u305f<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2021\/04\/threat-intelligence-and-incident-response\/\">\u65b0\u751fUnit 42<\/a>\u306f\u300170\u4ee5\u4e0a\u306e\u30b5\u30a4\u30d0\u30fc\u4fdd\u967a\u4f1a\u793e\u306b\u627f\u8a8d\u3055\u308c\u305f\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8 \u30ec\u30b9\u30dd\u30f3\u30b9 \u30d7\u30ed\u30d0\u30a4\u30c0\u3068\u3057\u3066\u6d3b\u52d5\u3057\u3066\u3044\u307e\u3059\u3002\u307e\u305f\u3001150\u4ee5\u4e0a\u306e\u56fd\u969b\u7684\u306a\u6cd5\u5f8b\u4e8b\u52d9\u6240\u306b\u30d1\u30fc\u30c8\u30ca\u30fc\u3068\u3057\u3066\u9078\u3070\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>Unit 42\u306f\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306e\u4e00\u54e1\u3068\u3057\u3066\u3001\u81ea\u793e\u306e\u5148\u9032\u7684\u306a\u30c6\u30af\u30ce\u30ed\u30b8\u3092\u6d3b\u7528\u3057\u3001\u4fe1\u983c\u3055\u308c\u308b\u30a2\u30c9\u30d0\u30a4\u30b6\u30fc\u3068\u3057\u3066\u306e\u5f79\u5272\u3092\u679c\u305f\u3057\u3066\u3044\u307e\u3059\u3002\u8d77\u3053\u308a\u3046\u308b\u8105\u5a01\u306b\u5bfe\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5236\u5fa1\u306e\u8a55\u4fa1\u3068\u30c6\u30b9\u30c8\u3001\u8105\u5a01\u60c5\u5831\u306b\u57fa\u3065\u304f\u30a2\u30d7\u30ed\u30fc\u30c1\u306e\u5c0e\u5165\u3092\u901a\u3058\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u3068\u8a08\u753b\u306e\u5909\u9769\u3001\u5b9f\u969b\u306b\u767a\u751f\u3059\u308b\u3042\u3089\u3086\u308b\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306b\u5bfe\u3059\u308b\u3001\u5f71\u97ff\u3092\u53d7\u3051\u308b\u74b0\u5883\u3092\u554f\u308f\u306a\u3044\u52b9\u679c\u7684\u304b\u3064\u975e\u5e38\u306b\u9ad8\u901f\u306a\u30ec\u30b9\u30dd\u30f3\u30b9\u3092\u4e16\u754c\u4e2d\u306e\u7d44\u7e54\u304c\u5b9f\u73fe\u3067\u304d\u308b\u3088\u3046\u652f\u63f4\u3057\u3066\u3044\u308b\u306e\u3067\u3059\u3002<\/p>\n<p>\u5177\u4f53\u4f8b\u3068\u3057\u3066Forrester\u30ec\u30dd\u30fc\u30c8\u306e\u8a18\u8ff0\u3092\u5f15\u7528\u3057\u307e\u3057\u3087\u3046\u3002\u300c\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306fASM\u30d9\u30f3\u30c0\u30fc\u300cXpanse\u300d\u306e\u8cb7\u53ce\u3092\u6226\u7565\u7684\u306b\u6d3b\u7528\u3057\u3001\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306b\u5bfe\u3059\u308b\u6e96\u5099\u3001\u8abf\u67fb\u3001\u5c01\u3058\u8fbc\u3081\u306e\u6d3b\u52d5\u3092\u660e\u77ad\u306b\u53ef\u8996\u5316\u3059\u308b\u80fd\u529b\u3092\u7372\u5f97\u3057\u307e\u3057\u305f...\u3055\u3089\u306b\u3001Unit 42\u306f\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306ePrisma Cloud\u3001Cortex XDR\u3001Xpanse\u653b\u6483\u5bfe\u8c61\u9818\u57df\u7ba1\u7406\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u5229\u7528\u3057\u3066\u3001\u5305\u62ec\u7684\u306a\u30af\u30e9\u30a6\u30c9 \u30a4\u30f3\u30b7\u30c7\u30f3\u30c8 \u30ec\u30b9\u30dd\u30f3\u30b9\u3092\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u300d<\/p>\n<p>Unit 42\u306f\u5f0a\u793e\u306e\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8 \u30ec\u30b9\u30dd\u30f3\u30b9 \u30b5\u30fc\u30d3\u30b9\u3068\u30b5\u30a4\u30d0\u30fc\u30ea\u30b9\u30af\u7ba1\u7406\u30b5\u30fc\u30d3\u30b9\u5168\u4f53\u306e\u5909\u9769\u306b\u6df1\u304f\u95a2\u4e0e\u3057\u3066\u3044\u307e\u3059\u3002\u305d\u3057\u3066\u3001\u4e16\u754c\u4e2d\u306eCISO\u306b\u9078\u3070\u308c\u308b\u6226\u7565\u7684\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d1\u30fc\u30c8\u30ca\u30fc\u3068\u3057\u3066\u304a\u5f79\u306b\u7acb\u3066\u308b\u3088\u3046\u5168\u4e16\u754c\u306b\u30b5\u30fc\u30d3\u30b9\u3092\u5c55\u958b\u3059\u308b\u4e2d\u3067\u3001\u5404\u5730\u57df\u306e\u4eba\u6750\u3001\u8a2d\u5099\u3001\u696d\u754c\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u3078\u306e\u3055\u3089\u306a\u308b\u6295\u8cc7\u3092\u7d99\u7d9a\u3057\u3066\u307e\u3044\u308a\u307e\u3059\u3002<\/p>\n<h3><strong>\u304a\u554f\u3044\u5408\u308f\u305b<\/strong><\/h3>\n<p>\u73fe\u5728\u4fb5\u5bb3\u3092\u53d7\u3051\u3066\u3044\u308b\u5834\u5408\u3084\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u5f71\u97ff\u3092\u53d7\u3051\u3066\u3044\u308b\u304b\u3082\u3057\u308c\u306a\u3044\u3068\u611f\u3058\u308b\u5834\u5408\u306f\u3001<a href=\"https:\/\/start.paloaltonetworks.com\/contact-unit42.html\">Unit 42\u307e\u3067\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044<\/a>\u3002\u30c1\u30fc\u30e0\u30e1\u30f3\u30d0\u30fc\u304c\u3054\u76f8\u8ac7\u306b\u5fdc\u3058\u307e\u3059\u3002Unit 42\u306e\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8 \u30ec\u30b9\u30dd\u30f3\u30b9 \u30c1\u30fc\u30e0\u306f24\u6642\u9593\u3001\u90317\u65e5\u3001365\u65e5\u5bfe\u5fdc\u53ef\u80fd\u3067\u3059\u3002\u307e\u305f\u3001\u30b5\u30a4\u30d0\u30fc\u4fdd\u967a\u3084\u6cd5\u5f8b\u76f8\u8ac7\u30b5\u30fc\u30d3\u30b9\u306b\u52a0\u5165\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u306f\u3001Unit 42\u3092\u6307\u540d\u3057\u3066\u5bfe\u5fdc\u3092\u4f9d\u983c\u3067\u304d\u307e\u3059\u3002\u307e\u305f\u3001<a href=\"https:\/\/www.paloaltonetworks.com\/unit42\/proactive-assessments\">\u4e88\u9632\u8a55\u4fa1<\/a>\u3092\u304a\u7533\u8fbc\u307f\u3044\u305f\u3060\u304f\u3068\u3068\u3082\u306b\u3001<a href=\"https:\/\/origin-www.paloaltonetworks.com\/resources\/datasheets\/unit42-retainer\">Unit 42 Retainer<\/a>\u30b5\u30fc\u30d3\u30b9\u3092\u5229\u7528\u3057\u3066\u5f0a\u793e\u30c1\u30fc\u30e0\u3092\u30b9\u30d4\u30fc\u30c9\u30c0\u30a4\u30e4\u30eb\u306b\u767b\u9332\u3059\u308b\u3053\u3068\u3067\u3001\u4e88\u9632\u7684\u306a\u5bfe\u7b56\u3092\u53d6\u308a\u5165\u308c\u308b\u3053\u3068\u3082\u53ef\u80fd\u3067\u3059\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u300c\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u304cIR\u5e02\u5834\u306b\u53c2\u5165...\u300d \u2013 The Forrester Wave&#x2122;: Cybersecurity Incident Response Services, Q1 2022 \u300cThe Forrester Wave&#x2122;: Cybersecurity Incident Response Services, Q1 2022\u300d\u306b\u304a\u3044\u3066\u3001\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306f\u300c\u6700\u3082\u91cd\u8981\u300d\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30a4\u30f3\u30b7\u30c7\u30f3\u30c8 \u30ec\u30b9\u30dd\u30f3\u30b9 \u30d7\u30ed\u30d0\u30a4\u30c0\u306e1\u793e\u3068\u3057\u3066\u8a8d\u3081\u3089\u308c\u308b\u3068\u3068\u3082\u306b\u3001\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30c1\u30fc\u30e0\u300cUnit 42\u300d\u304c\u512a\u826f\u30d9\u30f3\u30c0\u30fc\u306b\u9078\u51fa\u3055\u308c\u307e\u3057\u305f\u3002Unit 42\u304c\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8 \u30ec\u30b9\u30dd\u30f3\u30b9 \u30a2\u30ca\u30ea\u30b9\u30c8 \u30ec\u30dd\u30fc\u30c8\u3067\u8a00\u53ca\u3055\u308c\u305f\u306e\u3082\u3001\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30b5\u30fc\u30d3\u30b9 \u30ec\u30dd\u30fc\u30c8\u3067\u8a00\u53ca\u3055\u308c\u305f\u306e\u3082\u4eca\u56de\u304c\u521d\u3081\u3066\u3067\u3059\u3002\u4eca\u56de\u306e\u8a55\u4fa1\u306f\u3001\u8105\u5a01\u60c5\u5831\u306b\u57fa\u3065\u304f\u5f0a\u793e\u306e\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8 \u30ec\u30b9\u30dd\u30f3\u30b9 \u30a2\u30d7\u30ed\u30fc\u30c1\u3068\u3001\u5e02\u5834\u306b\u304a\u3051\u308b\u6025\u6210\u9577\u304c\u8a8d\u3081\u3089\u308c\u305f\u7d50\u679c\u3060\u3068\u8003\u3048\u3066\u3044\u307e\u3059\u3002 &hellip;<\/p>\n","protected":false},"author":636,"featured_media":158718,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[7486,7124],"tags":[7951,7727,8688,7254],"coauthors":[7527],"class_list":["post-163182","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement-ja","category-products-and-services-ja","tag-forrester-wave-ja","tag-incident-response-ja","tag-the-forrester-wave-cybersecurity-incident-response-services-ja","tag-unit-42-ja","sec_ops_category-must","sec_ops_category-news-and-events-ja"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/04\/NetSec-Adhoc-Updated-Blog-Image-Resize-666009646.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/163182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=163182"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/163182\/revisions"}],"predecessor-version":[{"id":163183,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/163182\/revisions\/163183"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/158718"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=163182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=163182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=163182"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=163182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}