{"id":8743,"date":"2024-12-11T16:29:02","date_gmt":"2024-12-11T15:29:02","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=8715"},"modified":"2025-01-10T11:47:44","modified_gmt":"2025-01-10T11:47:44","slug":"sophos-excels-in-the-2024-mitre-attck-evaluations-enterprise","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/ja-jp\/2024\/12\/products\/sophos-excels-in-the-2024-mitre-attck-evaluations-enterprise\/","title":{"rendered":"\u30bd\u30d5\u30a9\u30b9\u30012024\u5e74 MITRE Engenuity\u2122 ATT&amp;CK\u00ae \u8a55\u4fa1: \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba\u3067\u512a\u79c0\u306a\u6210\u7e3e\u3092\u53ce\u3081\u308b"},"content":{"rendered":"<p><strong>\u672c\u8a18\u4e8b\u306e\u91cd\u8981\u30dd\u30a4\u30f3\u30c8:<\/strong> \u30bd\u30d5\u30a9\u30b9\u306f\u3001\u6700\u65b0\u306e\u300c2024 MITRE ATT&amp;CK Evaluations for Enterprise\u300d\u3067\u3001\u307e\u305f\u3082\u512a\u308c\u305f\u7d50\u679c\u3092\u9054\u6210\u3057\u307e\u3057\u305f\u3002\u4eca\u56de\u306e\u30e9\u30a6\u30f3\u30c9\u3067\u3001<a href=\"https:\/\/www.sophos.com\/ja-jp\/products\/extended-detection-and-response\" target=\"_blank\" rel=\"noopener\">Sophos XDR<\/a> \u306f\u6b21\u306e\u3088\u3046\u306a\u8a55\u4fa1\u3092\u5f97\u307e\u3057\u305f\u3002<\/p>\n<ul>\n<li>Windows \u3068 Linux \u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u653b\u6483\u30b7\u30ca\u30ea\u30aa\u306b\u304a\u3051\u308b\u653b\u6483\u6d3b\u52d5\u306e <strong>100%<\/strong> \u306b\u5bfe\u3057\u3066\u3001\u6700\u9ad8\u8a55\u4fa1 (\u300cTechnique\u300d) \u3092\u7372\u5f97<\/li>\n<li>3 \u3064\u306e\u5305\u62ec\u7684\u30b7\u30ca\u30ea\u30aa\u5168\u4f53\u3067\u306e\u8a08 <strong>80 \u4ef6\u306e\u653b\u6483\u6d3b\u52d5\u306e\u3046\u3061\u300178 \u4ef6<\/strong>\u306b\u5bfe\u3057\u3066\u6700\u9ad8\u8a55\u4fa1 (\u300cTechnique\u300d) \u3092\u7372\u5f97<\/li>\n<li><strong>\u8a08 80 \u4ef6\u306e\u653b\u6483\u6d3b\u52d5\u306e\u3046\u3061\u300179 \u4ef6<\/strong>\u306b\u5bfe\u3057\u3066\u300c\u5206\u6790\u30ab\u30d0\u30ec\u30c3\u30b8\u300d\u8a55\u4fa1\u3092\u7372\u5f97<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>19 \u306e EDR\/XDR \u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306b\u3064\u3044\u3066\u3001\u9ad8\u5ea6\u306a\u8105\u5a01\u30b0\u30eb\u30fc\u30d7\u306b\u3088\u308b\u60aa\u610f\u3042\u308b\u6d3b\u52d5\u3092\u6b63\u78ba\u306b\u8b58\u5225\u3057\u5831\u544a\u3059\u308b\u80fd\u529b\u3092\u8a55\u4fa1\u3059\u308b\u3001MITRE ATT&amp;CK<sup>\u00ae<\/sup> Evaluations for Enterprise \u306e\u7b2c 6 \u30e9\u30a6\u30f3\u30c9\u306e\u5f85\u671b\u306e\u7d50\u679c\u304c\u767a\u8868\u3055\u308c\u307e\u3057\u305f\u3002<\/p>\n<p>\u8a55\u4fa1\u306e\u6982\u8981\u306b\u3064\u3044\u3066\u306f\u3001\u3053\u3061\u3089\u306e\u77ed\u3044\u52d5\u753b\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002<\/p>\n<h2><strong><br \/>\nMITRE ATT&amp;CK<\/strong><sup>\u00ae<\/sup><strong> Evaluations \u3068\u306f\uff1f<\/strong><\/h2>\n<p>MITRE ATT&amp;CK\u00ae Evaluations \u306f\u3001\u696d\u754c\u3067\u6700\u3082\u8a55\u4fa1\u3055\u308c\u3066\u3044\u308b\u72ec\u7acb\u3057\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c6\u30b9\u30c8\u306e 1\u3064\u3067\u3059\u3002\u3053\u306e\u30c6\u30b9\u30c8\u3067\u306f\u3001\u5b9f\u969b\u306e\u653b\u6483\u30b0\u30eb\u30fc\u30d7\u304c\u4f7f\u7528\u3059\u308b\u6226\u8853\u3001\u624b\u6cd5\u3001\u624b\u9806 (TTP) \u3092\u30a8\u30df\u30e5\u30ec\u30fc\u30c8\u3057\u3001<a href=\"https:\/\/attack.mitre.org\/\" target=\"_blank\" rel=\"noopener\">MITRE ATT&amp;CK<sup>\u00ae<\/sup> Framework<\/a> \u306e\u8a00\u8a9e\u3068\u69cb\u9020\u306b\u5408\u308f\u305b\u305f\u5f62\u5f0f\u3067\u3001\u53c2\u52a0\u30d9\u30f3\u30c0\u30fc\u5404\u793e\u306e\u8105\u5a01\u3092\u691c\u51fa\u3001\u5206\u6790\u3001\u304a\u3088\u3073\u8aac\u660e\u3059\u308b\u80fd\u529b\u3092\u8a55\u4fa1\u3057\u307e\u3059\u3002<\/p>\n<p>ATT&amp;CK Evaluations \u306e\u7d50\u679c\u306e\u89e3\u91c8\u306f\u552f\u4e00\u7121\u4e8c\u306e\u3082\u306e\u3067\u306f\u306a\u304f\u3001\u307e\u305f\u3001\u7af6\u5408\u5206\u6790\u3092\u76ee\u7684\u3068\u3057\u305f\u3082\u306e\u3067\u3082\u3042\u308a\u307e\u305b\u3093\u3002\u305d\u306e\u7d50\u679c\u306f\u3001\u8a55\u4fa1\u3067\u89b3\u5bdf\u3055\u308c\u305f\u3082\u306e\u3067\u3042\u308a\u3001(\u4e00\u90e8\u306e\u30d9\u30f3\u30c0\u30fc\u304c\u671b\u3080\u3088\u3046\u306a) \u300c\u52dd\u8005\u300d\u3084\u300c\u30ea\u30fc\u30c0\u30fc\u300d\u3092\u6c7a\u5b9a\u3059\u308b\u3082\u306e\u3067\u3082\u3042\u308a\u307e\u305b\u3093\u3002<\/p>\n<p>\u5404\u30d9\u30f3\u30c0\u30fc\u306e\u30c4\u30fc\u30eb\u304c\u3069\u306e\u3088\u3046\u306b\u6a5f\u80fd\u3057\u3001\u3069\u306e\u3088\u3046\u306b\u52b9\u679c\u7684\u306b\u60c5\u5831\u3092\u30a2\u30ca\u30ea\u30b9\u30c8\u306b\u63d0\u793a\u3059\u308b\u304b\u306b\u306f\u5fae\u5999\u306a\u9055\u3044\u304c\u3042\u308a\u307e\u3059\u3002\u3069\u306e\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u304c\u30d1\u30fc\u30c8\u30ca\u30fc\u69d8\u3084\u305d\u306e\u30c1\u30fc\u30e0\u3001\u305d\u3057\u3066\u304a\u5ba2\u69d8\u306b\u3068\u3063\u3066\u6700\u9069\u304b\u3092\u6c7a\u5b9a\u3059\u308b\u4e0a\u3067\u3001\u500b\u3005\u306e\u30cb\u30fc\u30ba\u3084\u597d\u307f\u306f\u4ed6\u306e\u8981\u7d20\u3068\u540c\u3058\u304f\u3089\u3044\u91cd\u8981\u3067\u3059\u3002<\/p>\n<p><a href=\"https:\/\/www.sophos.com\/ja-jp\/products\/extended-detection-and-response\" target=\"_blank\" rel=\"noopener\">Sophos Extended Detection and Response (XDR) \u306e\u8a73\u7d30\u306f\u3053\u3061\u3089<\/a><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h2><strong>\u8a55\u4fa1\u306e\u6982\u8981<\/strong><\/h2>\n<p>\u4eca\u56de\u306f\u3001\u88fd\u54c1\u306b\u7126\u70b9\u3092\u5f53\u3066\u305f MITRE ATT&amp;CK Evaluations for Enterprise \u306e\u7b2c 6 \u30e9\u30a6\u30f3\u30c9\u3067\u3042\u308a\u3001<a href=\"https:\/\/www.sophos.com\/ja-jp\/products\/extended-detection-and-response\" target=\"_blank\" rel=\"noopener\">Sophos XDR<\/a> \u306a\u3069\u306e EDR ( Endpoint Detection and Response) \u88fd\u54c1\u304c\u3001\u5de7\u5999\u306a\u591a\u6bb5\u968e\u653b\u6483\u306b\u5bfe\u3059\u308b\u9632\u5fa1\u306b\u3069\u306e\u3088\u3046\u306b\u5f79\u7acb\u3064\u304b\u3092\u3088\u308a\u7406\u89e3\u3067\u304d\u308b\u3088\u3046\u306b\u3059\u308b\u3053\u3068\u3092\u76ee\u7684\u3068\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u4eca\u56de\u306e\u30e9\u30a6\u30f3\u30c9\u3067\u306f\u3001\u6b21\u306e 3 \u3064\u306e\u65e2\u77e5\u306e\u8105\u5a01\u30b0\u30eb\u30fc\u30d7\u304b\u3089\u7740\u60f3\u3092\u5f97\u305f\u52d5\u4f5c\u306b\u7126\u70b9\u304c\u5f53\u3066\u3089\u308c\u3066\u3044\u307e\u3057\u305f\u3002<\/p>\n<ul>\n<li><strong>\u671d\u9bae\u6c11\u4e3b\u4e3b\u7fa9\u4eba\u6c11\u5171\u548c\u56fd (\u5317\u671d\u9bae)<\/strong><br \/>\n\u3053\u306e\u8a55\u4fa1\u3067\u306f\u3001\u6bb5\u968e\u7684\u306a\u64cd\u4f5c\u3092\u901a\u3058\u3066 macOS \u3092\u6a19\u7684\u3068\u3059\u308b\u5317\u671d\u9bae\u306e\u653b\u6483\u884c\u52d5\u3092\u30a8\u30df\u30e5\u30ec\u30fc\u30c8\u3057\u3001\u6a29\u9650\u306e\u6607\u683c\u3084\u8a8d\u8a3c\u60c5\u5831\u306e\u7a83\u53d6\u306a\u3069\u3092\u7d44\u307f\u8fbc\u307f\u307e\u3057\u305f\u3002<\/li>\n<\/ul>\n<ul>\n<li><strong>CL0P \u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3068 LockBit \u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2<\/strong><br \/>\n\u3053\u306e\u8a55\u4fa1\u3067\u306f\u3001Windows \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3068 Linux \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3092\u6a19\u7684\u3068\u3059\u308b CL0P \u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3068 LockBit \u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3092\u4f7f\u7528\u3057\u305f\u30ad\u30e3\u30f3\u30da\u30fc\u30f3\u3067\u5e83\u304f\u898b\u3089\u308c\u308b\u52d5\u4f5c\u3092\u30a8\u30df\u30e5\u30ec\u30fc\u30c8\u3057\u3001\u6b63\u898f\u30c4\u30fc\u30eb\u306e\u60aa\u7528\u3084\u91cd\u8981\u306a\u30b5\u30fc\u30d3\u30b9\u306e\u7121\u52b9\u5316\u306a\u3069\u3092\u7d44\u307f\u8fbc\u307f\u307e\u3057\u305f\u3002<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><strong>\u53c2\u52a0\u30d9\u30f3\u30c0\u30fc<\/strong><\/h2>\n<p>\u4eca\u56de\u306e\u8a55\u4fa1\u30e9\u30a6\u30f3\u30c9\u306b\u306f\u3001\u4ee5\u4e0b\u306e EDR\/XDR \u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u30d9\u30f3\u30c0\u30fc 19 \u793e\u304c\u53c2\u52a0\u3057\u307e\u3057\u305f (\u30a2\u30eb\u30d5\u30a1\u30d9\u30c3\u30c8\u9806)\u3002<\/p>\n<p><strong> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8716\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2024\/12\/mitre-attack-evaluations-enterprise-2024-participants.png\" alt=\"\" width=\"640\" height=\"334\" \/><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>\u7d50\u679c\u306e\u8aad\u307f\u65b9<\/strong><\/h2>\n<p>\u8a55\u4fa1\u4e2d\u306b\u30a8\u30df\u30e5\u30ec\u30fc\u30c8\u3055\u308c\u305f\u5404\u653b\u6483\u6d3b\u52d5 (\u300c\u30b5\u30d6\u30b9\u30c6\u30c3\u30d7\u300d) \u306f\u3001\u4ee5\u4e0b\u306e\u3044\u305a\u308c\u304b\u306e\u8a55\u4fa1\u3092\u53d7\u3051\u307e\u3057\u305f\u3002\u3053\u308c\u306f\u3001\u8a55\u4fa1\u5bfe\u8c61\u306e\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u304c\u653b\u6483\u6d3b\u52d5\u3092\u691c\u51fa\u3001\u5206\u6790\u3001\u304a\u3088\u3073\u8aac\u660e\u3059\u308b\u80fd\u529b\u3092\u793a\u3059\u3082\u306e\u3067\u3001MITRE ATT&amp;CK\u00ae Framework \u306e\u8a00\u8a9e\u3068\u69cb\u9020\u306b\u5408\u308f\u305b\u3066\u4f5c\u6210\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<ul>\n<li><strong>\u8a72\u5f53\u306a\u3057 \u2014 \u300cmiss\u300d(\u5931\u6557):<\/strong>\u00a0\u653b\u6483\u6d3b\u52d5\u304c\u691c\u51fa\u3055\u308c\u306a\u304b\u3063\u305f\u3001\u307e\u305f\u306f\u30b5\u30d6\u30b9\u30c6\u30c3\u30d7\u306e\u8a55\u4fa1\u304c\u5b8c\u4e86\u3057\u306a\u304b\u3063\u305f\u3002<\/li>\n<li><strong>None:<\/strong>\u00a0\u30b5\u30d6\u30b9\u30c6\u30c3\u30d7\u306e\u5b9f\u884c\u306f<strong>\u6210\u529f<\/strong>\u3057\u305f\u304c\u3001\u63d0\u793a\u3055\u308c\u305f\u8a3c\u62e0\u304c\u6587\u66f8\u5316\u3055\u308c\u305f\u691c\u51fa\u57fa\u6e96\u3092\u6e80\u305f\u3055\u306a\u304b\u3063\u305f\u3001\u307e\u305f\u306f\u30ec\u30c3\u30c9\u30c1\u30fc\u30e0\u306e\u6d3b\u52d5\u3092\u793a\u3059\u8a3c\u62e0\u304c\u63d0\u793a\u3055\u308c\u306a\u304b\u3063\u305f\u3002<\/li>\n<li><strong>General:<\/strong>\u00a0\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u304c\u60aa\u610f\u306e\u3042\u308b\/\u4e0d\u5be9\u306a\u30a4\u30d9\u30f3\u30c8\u3092\u81ea\u5f8b\u7684\u306b\u691c\u51fa\u3057\u3001What (\u4f55\u3092)\u3001Where (\u3069\u3053\u3067)\u3001When (\u3044\u3064)\u3001Who (\u8ab0\u304c) \u3092\u5831\u544a\u3057\u305f\u3002<\/li>\n<li><strong>Tactic:<\/strong>\u00a0 \u300cGeneral\u300d\u8a55\u4fa1\u306e\u57fa\u6e96\u3092\u6e80\u305f\u3059\u3053\u3068\u306b\u52a0\u3048\u3001\u8a55\u4fa1\u5bfe\u8c61\u306e\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u304c\u653b\u6483\u8005\u306e\u6f5c\u5728\u7684\u610f\u56f3\u306b\u95a2\u3059\u308b\u60c5\u5831\u3082\u63d0\u4f9b\u3057\u3066\u3044\u308b\u3002\u300cWhy\u300d\u304c MITRE ATT&amp;CK \u306e\u6226\u8853\u306b\u4e00\u81f4\u3059\u308b\u3002<\/li>\n<li><strong>Technique \u2014 \u6700\u9ad8\u30e9\u30f3\u30af\u306e\u8a55\u4fa1: <\/strong>\u00a0\u300cTactic\u300d\u306e\u8a55\u4fa1\u57fa\u6e96\u3092\u6e80\u305f\u3059\u3053\u3068\u306b\u52a0\u3048\u3001\u8a55\u4fa1\u5bfe\u8c61\u306e\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u304c\u653b\u6483\u8005\u306e\u76ee\u6a19\u9054\u6210\u65b9\u6cd5\u306e\u8a73\u7d30\u3082\u8aac\u660e\u3057\u3066\u3044\u308b\u3002\u305d\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u304c\u3069\u306e\u3088\u3046\u306b\u5b9f\u884c\u3055\u308c\u305f\u304b (How)\u3002<\/li>\n<\/ul>\n<p>General\u3001Tactic\u3001Technique \u306b\u5206\u985e\u3055\u308c\u305f\u691c\u51fa\u306f\u3001\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u304c\u30c6\u30ec\u30e1\u30c8\u30ea\u3092\u5b9f\u7528\u7684\u306a\u8105\u5a01\u691c\u51fa\u306b\u5909\u63db\u3059\u308b\u80fd\u529b\u3092\u793a\u3059\u6307\u6a19\u3067\u3042\u308b\u300c<strong>\u5206\u6790\u30ab\u30d0\u30ec\u30c3\u30b8<\/strong>\u300d\u306e\u5b9a\u7fa9\u306b\u57fa\u3065\u3044\u3066\u30b0\u30eb\u30fc\u30d7\u5316\u3055\u308c\u307e\u3059\u3002<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h2><strong>\u30bd\u30d5\u30a9\u30b9\u304c\u4eca\u56de\u306e\u8a55\u4fa1\u3067\u6b8b\u3057\u305f\u7d50\u679c<\/strong><\/h2>\n<p>MITRE \u306f\u8a55\u4fa1\u671f\u9593\u4e2d\u3001\u5408\u8a08 16 \u306e\u30b9\u30c6\u30c3\u30d7\u3068 80 \u306e\u30b5\u30d6\u30b9\u30c6\u30c3\u30d7\u3067\u69cb\u6210\u3055\u308c\u308b\u30013 \u3064\u306e\u7570\u306a\u308b\u653b\u6483\u30b7\u30ca\u30ea\u30aa (\u5317\u671d\u9bae\u3001CL0P\u3001LockBit) \u3092\u5b9f\u884c\u3057\u307e\u3057\u305f\u3002<\/p>\n<p>Sophos XDR \u306f\u9a5a\u7570\u7684\u306a\u7d50\u679c\u3092\u6b8b\u3057\u3001\u4ee5\u4e0b\u306e\u6210\u679c\u3092\u9054\u6210\u3057\u307e\u3057\u305f\u3002<\/p>\n<ul>\n<li>Windows \u3068 Linux \u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u653b\u6483\u30b7\u30ca\u30ea\u30aa\u306b\u304a\u3051\u308b\u653b\u6483\u6d3b\u52d5\u306e <strong>100%<\/strong> \u306b\u5bfe\u3057\u3066\u3001\u6700\u9ad8\u8a55\u4fa1 (\u300cTechnique\u300d) \u3092\u7372\u5f97<\/li>\n<li>3 \u3064\u306e\u5305\u62ec\u7684\u30b7\u30ca\u30ea\u30aa\u5168\u4f53\u3067\u306e\u8a08 <strong>80 \u4ef6\u306e\u653b\u6483\u6d3b\u52d5\u306e\u3046\u3061\u300178 \u4ef6<\/strong>\u306b\u5bfe\u3057\u3066\u6700\u9ad8\u8a55\u4fa1 (\u300cTechnique\u300d) \u3092\u7372\u5f97<\/li>\n<li><strong>\u8a08 80 \u4ef6\u306e\u653b\u6483\u6d3b\u52d5\u306e\u3046\u3061\u300179 \u4ef6<\/strong>\u306b\u5bfe\u3057\u3066\u300c\u5206\u6790\u30ab\u30d0\u30ec\u30c3\u30b8\u300d\u8a55\u4fa1\u3092\u7372\u5f97<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u653b\u6483\u30b7\u30ca\u30ea\u30aa\u305d\u306e 1: \u5317\u671d\u9bae (macOS \u306e\u307f)<\/strong><br \/>\n\u5317\u671d\u9bae\u306f\u3001\u975e\u5e38\u306b\u5384\u4ecb\u306a\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u3068\u3057\u3066\u53f0\u982d\u3057\u3066\u304d\u3066\u304a\u308a\u3001macOS \u306b\u96c6\u4e2d\u7684\u306b\u72d9\u3046\u3053\u3068\u3067\u3001\u3055\u3089\u306b\u4fa1\u5024\u306e\u9ad8\u3044\u30b7\u30b9\u30c6\u30e0\u3092\u6a19\u7684\u306b\u3057\u3066\u4fb5\u5165\u3059\u308b\u80fd\u529b\u3092\u7372\u5f97\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u653b\u6483\u30b7\u30ca\u30ea\u30aa\u3067\u306f\u3001MITRE \u30c1\u30fc\u30e0\u306f\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u653b\u6483\u3067\u5f97\u305f\u30d0\u30c3\u30af\u30c9\u30a2\u3092\u4f7f\u7528\u3057\u3001\u7d9a\u3044\u3066\u5e38\u99d0\u5316\u3001\u63a2\u7d22\u3001\u304a\u3088\u3073\u8a8d\u8a3c\u60c5\u5831\u3078\u306e\u30a2\u30af\u30bb\u30b9\u3092\u884c\u3044\u3001\u7d50\u679c\u3068\u3057\u3066\u30b7\u30b9\u30c6\u30e0\u60c5\u5831\u3068 macOS \u30ad\u30fc\u30c1\u30a7\u30fc\u30f3\u30d5\u30a1\u30a4\u30eb\u3092\u53ce\u96c6\u3057\u3001\u5916\u90e8\u306b\u9001\u4fe1\u3057\u307e\u3057\u305f\u3002<\/p>\n<p>\u3053\u306e\u30b7\u30ca\u30ea\u30aa\u306f\u3001macOS \u306e\u307f\u3067\u5b9f\u884c\u3055\u308c\u308b 4 \u3064\u306e\u30b9\u30c6\u30c3\u30d7\u3068 21 \u306e\u30b5\u30d6\u30b9\u30c6\u30c3\u30d7\u3067\u69cb\u6210\u3055\u308c\u3066\u3044\u307e\u3057\u305f\u3002<\/p>\n<ul>\n<li><strong>Sophos XDR \u306f\u3001\u3053\u306e\u30b7\u30ca\u30ea\u30aa\u306e 21 \u306e\u30b5\u30d6\u30b9\u30c6\u30c3\u30d7\u306e\u3046\u3061 20 (95%) \u3092\u691c\u51fa\u3057\u3066\u3001\u512a\u308c\u305f\u300c\u5206\u6790\u300d\u30ab\u30d0\u30ec\u30c3\u30b8\u3092\u63d0\u4f9b\u3057\u307e\u3057\u305f\u3002<\/strong><\/li>\n<li><strong><strong>19 \u306e\u30b5\u30d6\u30b9\u30c6\u30c3\u30d7\u306b\u306f\u3001\u6700\u9ad8\u8a55\u4fa1\u3067\u3042\u308b\u300cTechnique\u300d\u30ec\u30d9\u30eb\u306e\u5206\u985e\u304c\u5272\u308a\u5f53\u3066\u3089\u308c\u307e\u3057\u305f\u3002<\/strong><\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>\u653b\u6483\u30b7\u30ca\u30ea\u30aa\u305d\u306e 2: CL0P \u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2 (Windows)<\/strong><br \/>\n2019\u5e74\u306b\u306f\u6d3b\u52d5\u3092\u958b\u59cb\u3057\u3066\u3044\u305f CL0P \u306f\u3001TA505 \u30b5\u30a4\u30d0\u30fc\u72af\u7f6a\u8005\u30b0\u30eb\u30fc\u30d7 (\u5225\u540d Snakefly) \u3068\u95a2\u9023\u306e\u3042\u308b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u3067\u3042\u308a\u3001\u30ed\u30b7\u30a2\u8a9e\u3092\u8a71\u3059\u30b0\u30eb\u30fc\u30d7\u306b\u3088\u3063\u3066\u904b\u7528\u3055\u308c\u3066\u3044\u308b\u3068\u8003\u3048\u3089\u308c\u3066\u3044\u307e\u3059\u3002MITRE \u30c1\u30fc\u30e0\u306f\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3092\u5b9f\u884c\u3059\u308b\u524d\u306b\u3001\u56de\u907f\u624b\u6cd5\u3001\u5e38\u99d0\u5316\u3001\u30a4\u30f3\u30e1\u30e2\u30ea\u30da\u30a4\u30ed\u30fc\u30c9\u3092\u4f7f\u7528\u3057\u3066\u3001\u63a2\u7d22\u3068\u5916\u90e8\u3078\u306e\u60c5\u5831\u9001\u4fe1\u3092\u5b9f\u884c\u3057\u307e\u3057\u305f\u3002<\/p>\n<p>\u3053\u306e\u30b7\u30ca\u30ea\u30aa\u306f\u3001Windows \u306e\u307f\u3067\u5b9f\u884c\u3055\u308c\u308b 4 \u3064\u306e\u30b9\u30c6\u30c3\u30d7\u3068 19 \u306e\u30b5\u30d6\u30b9\u30c6\u30c3\u30d7\u3067\u69cb\u6210\u3055\u308c\u3066\u3044\u307e\u3057\u305f\u3002<\/p>\n<ul>\n<li><strong><strong>Sophos XDR \u306f\u3001\u3053\u306e\u30b7\u30ca\u30ea\u30aa\u306e\u30b5\u30d6\u30b9\u30c6\u30c3\u30d7\u3092 100% \u691c\u51fa\u3057\u3001\u6700\u9ad8\u8a55\u4fa1\u3067\u3042\u308b\u300cTechnique\u300d\u30ec\u30d9\u30eb\u306e\u5b8c\u5168\u30ab\u30d0\u30ec\u30c3\u30b8\u3092\u63d0\u4f9b\u3057\u307e\u3057\u305f\u3002<\/strong><\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>\u653b\u6483\u30b7\u30ca\u30ea\u30aa\u305d\u306e 3: LockBit \u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2 (Windows \u304a\u3088\u3073 Linux)<\/strong><br \/>\nLockBit \u306f\u3001RaaS (\u30b5\u30fc\u30d3\u30b9\u3068\u3057\u3066\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2) \u3092\u30d9\u30fc\u30b9\u306b\u52d5\u4f5c\u3059\u308b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u4e9c\u7a2e\u3067\u3001\u305d\u306e\u5de7\u5999\u306a\u30c4\u30fc\u30eb\u3001\u6050\u559d\u65b9\u6cd5\u3001\u305d\u3057\u3066\u6df1\u523b\u306a\u5f71\u97ff\u3092\u3082\u305f\u3089\u3059\u653b\u6483\u3067\u60aa\u540d\u3092\u99b3\u305b\u3066\u3044\u307e\u3059\u3002MITRE \u30c1\u30fc\u30e0\u306f\u3001\u4fb5\u5bb3\u3055\u308c\u305f\u8a8d\u8a3c\u60c5\u5831\u3092\u4f7f\u7528\u3057\u3066\u30a2\u30af\u30bb\u30b9\u3057\u3001\u6700\u7d42\u7684\u306b\u306f\u4eee\u60f3\u30de\u30b7\u30f3\u3092\u505c\u6b62\u3055\u305b\u3001\u30d5\u30a1\u30a4\u30eb\u3092\u5916\u90e8\u306b\u9001\u4fe1\u3057\u3066\u6697\u53f7\u5316\u3059\u308b\u3001\u5916\u90e8\u9001\u4fe1\u30c4\u30fc\u30eb\u3068\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3092\u5c55\u958b\u3057\u307e\u3057\u305f\u3002<\/p>\n<p>\u3053\u306e\u30b7\u30ca\u30ea\u30aa\u306f\u3001Windows \u3068 Linux \u3067\u5b9f\u884c\u3055\u308c\u308b 8 \u3064\u306e\u30b9\u30c6\u30c3\u30d7\u3068 40 \u306e\u30b5\u30d6\u30b9\u30c6\u30c3\u30d7\u3067\u69cb\u6210\u3055\u308c\u3066\u3044\u307e\u3057\u305f\u3002<\/p>\n<ul>\n<li><strong>Sophos XDR \u306f\u3001\u3053\u306e\u30b7\u30ca\u30ea\u30aa\u306e\u30b5\u30d6\u30b9\u30c6\u30c3\u30d7\u3092 100% \u691c\u51fa\u3057\u3001\u6700\u9ad8\u8a55\u4fa1\u3067\u3042\u308b\u300cTechnique\u300d\u30ec\u30d9\u30eb\u306e\u5b8c\u5168\u30ab\u30d0\u30ec\u30c3\u30b8\u3092\u63d0\u4f9b\u3057\u307e\u3057\u305f\u3002<\/strong><\/li>\n<\/ul>\n<p><strong>\u8a73\u7d30\u306b\u3064\u3044\u3066\u306f\u3001<a href=\"https:\/\/www.sophos.com\/mitre\" target=\"_blank\" rel=\"noopener\">sophos.com\/mitre <\/a><\/strong><strong>\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002\u307e\u305f\u3001<a href=\"https:\/\/attackevals.mitre-engenuity.org\/results\/enterprise\" target=\"_blank\" rel=\"noopener\">MITRE \u306e Web \u30b5\u30a4\u30c8<\/a><\/strong><strong>\u3067\u306f\u3001\u3059\u3079\u3066\u306e\u7d50\u679c\u3092\u78ba\u8a8d\u3067\u304d\u307e\u3059\u3002<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h2><strong>\u30bd\u30d5\u30a9\u30b9\u88fd\u54c1\u3068\u4ed6\u793e\u88fd\u54c1\u306e\u7d50\u679c\u306e\u6bd4\u8f03<\/strong><\/h2>\n<p>\u5ff5\u306e\u305f\u3081\u304a\u4f1d\u3048\u3057\u3066\u304a\u304d\u307e\u3059\u304c\u3001ATT&amp;CK Evaluations \u306e\u7d50\u679c\u3092\u89e3\u91c8\u3059\u308b\u65b9\u6cd5\u306f\u4e00\u3064\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u53c2\u52a0\u30d9\u30f3\u30c0\u30fc\u304c\u4f5c\u6210\u3057\u305f\u3055\u307e\u3056\u307e\u306a\u30c1\u30e3\u30fc\u30c8\u3084\u30b0\u30e9\u30d5\u306a\u3069\u306e\u8996\u899a\u7684\u8cc7\u6599\u3067\u306f\u3001\u7d50\u679c\u304c\u7570\u306a\u308b\u65b9\u6cd5\u3067\u8868\u73fe\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u691c\u51fa\u306e\u8cea\u306f\u3001\u30a2\u30ca\u30ea\u30b9\u30c8\u304c\u8fc5\u901f\u304b\u3064\u52b9\u7387\u7684\u306b\u8abf\u67fb\u3068\u5bfe\u5fdc\u3092\u884c\u3048\u308b\u3088\u3046\u3001\u653b\u6483\u8005\u306e\u884c\u52d5\u306b\u95a2\u3059\u308b\u8a73\u7d30\u60c5\u5831\u3092\u63d0\u4f9b\u3059\u308b\u4e0a\u3067\u6975\u3081\u3066\u91cd\u8981\u3067\u3059\u3002\u3057\u305f\u304c\u3063\u3066\u3001ATT&amp;CK\u00ae Evaluations \u306e\u7d50\u679c\u3092\u6700\u3082\u6709\u52b9\u6d3b\u7528\u3059\u308b\u65b9\u6cd5\u306e 1 \u3064\u306f\u3001\u653b\u6483\u8005\u306e\u884c\u52d5\u306b\u95a2\u3059\u308b\u8a73\u7d30\u60c5\u5831\u3092\u63d0\u4f9b\u3059\u308b\u691c\u51fa\u7d50\u679c\u3092\u751f\u6210\u3057\u305f\u30b5\u30d6\u30b9\u30c6\u30c3\u30d7\u306e\u6570 (\u5206\u6790\u30ab\u30d0\u30ec\u30c3\u30b8) \u3068\u3001\u300cTechnique\u300d\u30ec\u30d9\u30eb\u306e\u5b8c\u5168\u306a\u30ab\u30d0\u30ec\u30c3\u30b8\u3092\u9054\u6210\u3057\u305f\u30b5\u30d6\u30b9\u30c6\u30c3\u30d7\u306e\u6570\u3092\u6bd4\u8f03\u3059\u308b\u3053\u3068\u3067\u3059\u3002<\/p>\n<figure style=\"width: 640px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-8717 size-full\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2024\/12\/mitre-attack-evaluations-enterprise-2024-vendor-comparison.png\" alt=\"\" width=\"640\" height=\"540\" \/><figcaption class=\"wp-caption-text\">MITRE \u306f\u3001ATT&amp;CK Evaluations \u306e\u53c2\u52a0\u30d9\u30f3\u30c0\u30fc\u3092\u30e9\u30f3\u30af\u4ed8\u3051\u3057\u305f\u308a\u3001\u8a55\u4fa1\u3057\u305f\u308a\u3059\u308b\u3053\u3068\u306f\u3042\u308a\u307e\u305b\u3093\u3002<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<h2><strong>MITRE ATT&amp;CK \u8a55\u4fa1\u306e\u7d50\u679c\u306e\u6d3b\u7528\u65b9\u6cd5<\/strong><\/h2>\n<p><a href=\"https:\/\/www.sophos.com\/ja-jp\/products\/endpoint-antivirus\/edr\" target=\"_blank\" rel=\"noopener\">EDR<\/a> \u307e\u305f\u306f <a href=\"https:\/\/www.sophos.com\/ja-jp\/products\/extended-detection-and-response\" target=\"_blank\" rel=\"noopener\">XDR<\/a> (Extended Detection and Response) \u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u691c\u8a0e\u3059\u308b\u969b\u306b\u306f\u3001\u691c\u8a3c\u6e08\u307f\u306e\u30ab\u30b9\u30bf\u30de\u30fc\u30ec\u30d3\u30e5\u30fc\u3084\u30a2\u30ca\u30ea\u30b9\u30c8\u8a55\u4fa1\u306a\u3069\u3001\u4fe1\u983c\u3067\u304d\u308b\u7b2c\u4e09\u8005\u306b\u3088\u308b\u8a55\u4fa1\u3068\u4f75\u305b\u3066\u3001ATT&amp;CK Evaluations \u306e\u7d50\u679c\u3092\u78ba\u8a8d\u3057\u3066\u304f\u3060\u3055\u3044\u3002\u6700\u8fd1\u306e\u7b2c\u4e09\u8005\u306b\u3088\u308b Sophos XDR \u306e\u8a55\u4fa1\u306b\u306f\u3001\u4ee5\u4e0b\u306e\u3088\u3046\u306a\u3082\u306e\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<ul>\n<li><a href=\"https:\/\/partnernews.sophos.com\/ja-jp\/2024\/09\/resources\/sophos-named-a-leader-in-the-2024-gartner-magic-quadrant-for-endpoint-protection-platforms\/\" target=\"_blank\" rel=\"noopener\">\u30bd\u30d5\u30a9\u30b9\u30012024 \u5e74 Gartner Magic Quadrant \u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u90e8\u9580\u306b\u304a\u3044\u3066\u300115 \u56de\u9023\u7d9a\u3067\u30ea\u30fc\u30c0\u30fc\u306e\u8a55\u4fa1\u3092\u7372\u5f97\u3002<\/a><\/li>\n<li><a href=\"https:\/\/news.sophos.com\/ja-jp\/2024\/09\/30\/the-power-of-the-platform-sophos-is-uniquely-recognized-in-the-g2-fall-2024-reports-jp\/\" target=\"_blank\" rel=\"noopener\">\u30bd\u30d5\u30a9\u30b9\u306f\u3001G2 Fall 2024 Grid Reports \u3067\u3001\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u3001\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u3001MDR\u3001XDR\u3001EDR \u306e\u5404\u90e8\u9580\u3067\u30ea\u30fc\u30c0\u30fc\u306e\u8a55\u4fa1\u3092\u7372\u5f97\u3057\u305f\u552f\u4e00\u306e\u30d9\u30f3\u30c0\u30fc\u3067\u3059\u3002<\/a><\/li>\n<li><a href=\"https:\/\/news.sophos.com\/ja-jp\/2024\/07\/04\/sophos-named-a-2024-gartner-peer-insights-customers-choice-for-network-firewalls-and-endpoint-protection-platforms-jp\/\" target=\"_blank\" rel=\"noopener\">\u30bd\u30d5\u30a9\u30b9\u306f\u30012024\u5e74\u306e Gartner\u00ae Peer Insights\u2122 \u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u90e8\u9580\u3067 Customers\u2019 Choice \u3092\u53d7\u8cde\u3057\u307e\u3057\u305f\u3002<\/a><\/li>\n<\/ul>\n<p>MITRE \u30dd\u30fc\u30bf\u30eb\u3067\u5404\u53c2\u52a0\u30d9\u30f3\u30c0\u30fc\u306e\u30c7\u30fc\u30bf\u3092\u53c2\u7167\u3059\u308b\u969b\u306b\u306f\u3001\u3054\u81ea\u8eab\u3001\u8cb4\u793e\u306e\u30c1\u30fc\u30e0\u3001\u305d\u3057\u3066\u304a\u5ba2\u69d8\u306b\u95a2\u9023\u3059\u308b\u4ee5\u4e0b\u306e\u8cea\u554f\u306b\u3064\u3044\u3066\u691c\u8a0e\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<ul>\n<li>\u8a55\u4fa1\u5bfe\u8c61\u3068\u306a\u3063\u305f\u305d\u306e\u30c4\u30fc\u30eb\u306f\u8105\u5a01\u306e\u7279\u5b9a\u306b\u5f79\u7acb\u3064\u304b\uff1f<\/li>\n<li>\u305d\u306e\u30c4\u30fc\u30eb\u306f\u3001\u81ea\u5206\u304c\u6b32\u3057\u3044\u60c5\u5831\u3092\u63d0\u793a\u3057\u3066\u304f\u308c\u308b\u304b\uff1f<\/li>\n<li>\u3053\u306e\u30c4\u30fc\u30eb\u3092\u4f7f\u3046\u306e\u306f\u8ab0\u304b\uff1fTier 3 \u306e\u30a2\u30ca\u30ea\u30b9\u30c8\u306a\u306e\u304b\u3001IT \u30b9\u30da\u30b7\u30e3\u30ea\u30b9\u30c8\u306a\u306e\u304b\u3001\u3042\u308b\u3044\u306f\u30b7\u30b9\u30c6\u30e0\u7ba1\u7406\u8005\u306a\u306e\u304b\u3002<\/li>\n<li>\u3053\u306e\u30c4\u30fc\u30eb\u306f\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u306b\u3069\u306e\u3088\u3046\u306b\u5f79\u7acb\u3064\u304b\uff1f<\/li>\n<li>\u305d\u308c\u305e\u308c\u306e\u30a4\u30d9\u30f3\u30c8\u3092\u76f8\u95a2\u3067\u304d\u308b\u304b\uff1f\u305d\u308c\u3089\u306e\u76f8\u95a2\u3092\u81ea\u52d5\u7684\u306b\u5b9f\u884c\u3067\u304d\u308b\u304b\uff1f\u305d\u308c\u3068\u3082\u624b\u52d5\u3067\u884c\u3046\u5fc5\u8981\u304c\u3042\u308b\u304b\uff1f<\/li>\n<li>EDR\/XDR \u30c4\u30fc\u30eb\u306f\u3001\u4ed6\u306e\u30d9\u30f3\u30c0\u30fc\u306e\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3082\u542b\u3081\u3001\u65e2\u5b58\u306e\u4ed6\u306e\u30c6\u30af\u30ce\u30ed\u30b8\u30fc (\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u3001\u30e1\u30fc\u30eb\u3001\u30af\u30e9\u30a6\u30c9\u3001\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306a\u3069) \u3068\u7d71\u5408\u3067\u304d\u308b\u304b\uff1f<\/li>\n<li>\u30c4\u30fc\u30eb\u3092\u81ea\u793e\u306e\u307f\u3067\u4f7f\u7528\u3059\u308b\u4e88\u5b9a\u306a\u306e\u304b\u3001\u305d\u308c\u3068\u3082 MDR (Managed Detection and Response) \u306e\u30b5\u30dd\u30fc\u30c8\u3092\u53d7\u3051\u308b\u4e88\u5b9a\u306a\u306e\u304b\uff1f<\/li>\n<\/ul>\n<h2><strong><br \/>\nMITRE ATT&amp;CK Evaluations \u306b\u53c2\u52a0\u3059\u308b\u7406\u7531<\/strong><\/h2>\n<p>MITRE ATT&amp;CK Evaluations \u306f\u3001\u5b9f\u74b0\u5883\u306e\u653b\u6483\u30b7\u30ca\u30ea\u30aa\u306e\u30a8\u30df\u30e5\u30ec\u30fc\u30b7\u30e7\u30f3\u304a\u3088\u3073\u7d50\u679c\u306e\u900f\u660e\u6027\u306b\u3088\u308a\u3001\u4e16\u754c\u3067\u6700\u3082\u9ad8\u304f\u8a55\u4fa1\u3055\u308c\u3066\u3044\u308b\u72ec\u7acb\u7cfb\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c6\u30b9\u30c8 1 \u3064\u3067\u3059\u3002\u30bd\u30d5\u30a9\u30b9\u306f\u3001\u696d\u754c\u5c48\u6307\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d9\u30f3\u30c0\u30fc\u3068\u3068\u3082\u306b\u3001\u3053\u308c\u3089\u306e\u8a55\u4fa1\u306b\u53c2\u52a0\u3059\u308b\u3053\u3068\u3092\u304a\u7d04\u675f\u3057\u307e\u3059\u3002\u79c1\u305f\u3061\u306f\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u3068\u3057\u3066\u3001\u5171\u901a\u306e\u6575\u306b\u5bfe\u3057\u3066\u56e3\u7d50\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u3088\u3046\u306a\u8a55\u4fa1\u306f\u3001\u5404\u793e\u304a\u3088\u3073\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u3092\u5f37\u5316\u3059\u308b\u3082\u306e\u3067\u3042\u308a\u3001\u79c1\u305f\u3061\u304c\u4fdd\u8b77\u3059\u308b\u7d44\u7e54\u306e\u5229\u76ca\u306b\u3064\u306a\u304c\u308a\u307e\u3059\u3002<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Sophos XDR \u306e\u8a73\u7d30\u60c5\u5831<\/strong><\/h2>\n<p>\u4eca\u56de\u306e\u8a55\u4fa1\u7d50\u679c\u306b\u3088\u308a\u3001\u30bd\u30d5\u30a9\u30b9\u304c\u696d\u754c\u3092\u30ea\u30fc\u30c9\u3059\u308b <a href=\"https:\/\/www.sophos.com\/ja-jp\/products\/endpoint-antivirus\/edr\" target=\"_blank\" rel=\"noopener\">Endpoint Detection and Response (EDR)<\/a> \u304a\u3088\u3073\u00a0<a href=\"https:\/\/www.sophos.com\/ja-jp\/products\/extended-detection-and-response\" target=\"_blank\" rel=\"noopener\">Extended Detection and Response (XDR)<\/a>\u00a0\u6a5f\u80fd\u306e\u30d7\u30ed\u30d0\u30a4\u30c0\u30fc\u3068\u3057\u3066\u3001\u4e16\u754c 43,000 \u4ee5\u4e0a\u306e\u7d44\u7e54\u306b\u8a8d\u3081\u3089\u308c\u3066\u3044\u308b\u3053\u3068\u304c\u3055\u3089\u306b\u8a3c\u660e\u3055\u308c\u307e\u3057\u305f\u3002<\/p>\n<p>\u30d1\u30fc\u30c8\u30ca\u30fc\u69d8\u306e\u55b6\u696d\u6d3b\u52d5\u306b\u3001\u30bd\u30d5\u30a9\u30b9\u30d1\u30fc\u30c8\u30ca\u30fc\u30dd\u30fc\u30bf\u30eb\u3067\u5165\u624b\u53ef\u80fd\u306a<a href=\"https:\/\/partners.sophos.com\/prm\/Japanese\/c\/selling-sophos-xdr\" target=\"_blank\" rel=\"noopener\">\u30bb\u30fc\u30eb\u30b9\/\u30de\u30fc\u30b1\u30c6\u30a3\u30f3\u30b0\u30ea\u30bd\u30fc\u30b9<\/a>\u3092\u3054\u6d3b\u7528\u304f\u3060\u3055\u3044\u3002<\/p>\n<p>\u3053\u306e\u30cb\u30e5\u30fc\u30b9\u3092\u304a\u5ba2\u69d8\u306b\u304a\u77e5\u3089\u305b\u3044\u305f\u3060\u304f\u5834\u5408\u306f\u3001\u30bd\u30d5\u30a9\u30b9\u304c\u4f5c\u6210\u3057\u305f<a href=\"https:\/\/partners.sophos.com\/prm\/English\/s\/assets?collectionId=20397&amp;renderMode=Collection&amp;q=MITRE%20AND%202024\" target=\"_blank\" rel=\"noopener\">\u8ca9\u4fc3\u7528\u30e1\u30fc\u30eb<\/a>\u3092\u3054\u81ea\u7531\u306b\u304a\u4f7f\u3044\u304f\u3060\u3055\u3044\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>EDR (\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u691c\u51fa\u30fb\u5bfe\u5fdc) \u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u5bfe\u8c61\u3068\u3057\u305f\u6700\u65b0\u306e ATT&amp;CK \u8a55\u4fa1\u306e\u7d50\u679c\u3092\u304a\u77e5\u3089\u305b\u3057\u307e\u3059\u3002<\/p>\n","protected":false},"author":8,"featured_media":3000008719,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2],"tags":[169,91,89,83],"coauthors":[178],"class_list":["post-8743","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-mitre-attck","tag-sophos-endpoint","tag-sophos-xdr","tag-third-party-reviews"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2024\/12\/featured-image-2024-MITRE-ATTCK-evaluations-enterprise.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/ja-jp\/wp-json\/wp\/v2\/posts\/8743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/ja-jp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/ja-jp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/ja-jp\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/ja-jp\/wp-json\/wp\/v2\/comments?post=8743"}],"version-history":[{"count":1,"href":"https:\/\/partnernews.sophos.com\/ja-jp\/wp-json\/wp\/v2\/posts\/8743\/revisions"}],"predecessor-version":[{"id":8744,"href":"https:\/\/partnernews.sophos.com\/ja-jp\/wp-json\/wp\/v2\/posts\/8743\/revisions\/8744"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/ja-jp\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/ja-jp\/wp-json\/wp\/v2\/media?parent=8743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/ja-jp\/wp-json\/wp\/v2\/categories?post=8743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/ja-jp\/wp-json\/wp\/v2\/tags?post=8743"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/ja-jp\/wp-json\/wp\/v2\/coauthors?post=8743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}