{"id":182558,"date":"2023-09-15T14:38:42","date_gmt":"2023-09-15T18:38:42","guid":{"rendered":"https:\/\/www.cyberark.com\/%e5%ae%89%e5%85%a8%e3%81%aa%e3%82%a2%e3%82%a4%e3%83%87%e3%83%b3%e3%83%86%e3%82%a3%e3%83%86%e3%82%a3\/"},"modified":"2025-04-29T03:49:36","modified_gmt":"2025-04-29T07:49:36","slug":"secureidentities","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/ja\/secureidentities\/","title":{"rendered":"\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306e\u4fdd\u8b77"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 hero dark&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243; offset=&#8221;vc_col-md-6&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h1>Intelligent Privilege Controls\u2122 \u3067\u3001\u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3092\u4fdd\u8b77<\/h1>\n<p><\/p>\n<h2>\u3053\u306e\u65b0\u3057\u3044\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u6642\u4ee3\u306b\u304a\u3044\u3066\u3001\u30d3\u30b8\u30cd\u30b9\u3092\u4fdd\u8b77\u3059\u308b\u552f\u4e00\u306e\u65b9\u6cd5\u306f\u3001\u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3092\u4fdd\u8b77\u3059\u308b\u3053\u3068\u3067\u3059\u3002\u200b<\/h2>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-2&#8243;][vc_column_text css=&#8221;&#8221;]    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_afgvh3zsms videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 v3 cybv2-pad overview-vt&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;head-box&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>\u3042\u3089\u3086\u308b\u30d3\u30b8\u30cd\u30b9\u3067\u4f7f\u7528\u3055\u308c\u308b \u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3092 \u78ba\u5b9f\u306b\u4fdd\u8b77\u3059\u308b\u3002<\/h3>\n<p>CyberArk \u306f\u3001\u8ca1\u52d9\u3084\u4eba\u4e8b\u62c5\u5f53\u8005\u304b\u3089\u3001\u30af\u30e9\u30a6\u30c9\u3067\u9867\u5ba2\u5411\u3051\u30a2\u30d7\u30ea\u3092\u69cb\u7bc9\u3059\u308b\u958b\u767a\u8005\u3001\u30d3\u30b8\u30cd\u30b9\u30af\u30ea\u30c6\u30a3\u30ab\u30eb\u306a\u30b7\u30b9\u30c6\u30e0\u3092\u7dad\u6301\u3059\u308b IT \u7ba1\u7406\u8005\u3001\u7121\u6570\u306e\u30de\u30b7\u30f3 \u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u307e\u3067\u3001\u3059\u3079\u3066\u306e\u30e6\u30fc\u30b6\u30fc\u3092 Intelligent Privilege Controls\u2122 \u306b\u3088\u3063\u3066\u4fdd\u8b77\u3057\u307e\u3059\u3002<\/p>\n<p>\u9ad8\u5ea6\u306a\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7ba1\u7406\u3092\u3059\u3079\u3066\u306e\u30e6\u30fc\u30b6\u30fc\u306b\u9069\u7528\u3067\u304d\u308b\u305f\u3081\u3001\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u304b\u3089\u30af\u30e9\u30a6\u30c9\u307e\u3067\u3001\u5fc5\u8981\u306b\u5fdc\u3058\u3066\u6a29\u9650\u3092\u81ea\u5f8b\u7684\u306b\u4ed8\u4e0e\u304a\u3088\u3073\u524a\u9664\u3057\u3001\u9069\u5207\u306a\u30e6\u30fc\u30b6\u30fc\u306e\u307f\u304c\u9069\u5207\u306a\u30bf\u30a4\u30df\u30f3\u30b0\u3067\u9069\u5207\u306a\u60c5\u5831\u306b\u30a2\u30af\u30bb\u30b9\u3059\u308b\u3053\u3068\u3092\u4fdd\u8a3c\u3057\u307e\u3059\u3002[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_single_image image=&#8221;196749&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad-btm&#8221;][vc_column width=&#8221;5\/6&#8243; el_class=&#8221;text-md-center heading pb-12&#8243; offset=&#8221;vc_col-md-offset-1 vc_col-sm-offset-1&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2>\u30e6\u30fc\u30b6\u30fc \u30a8\u30af\u30b9\u30da\u30ea\u30a8\u30f3\u30b9\u3092\u640d\u306a\u3046\u3053\u3068\u306a\u304f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5f37\u5316\u3057\u307e\u3059\u3002<\/h2>\n<p><\/p>\n<h5>IT \u74b0\u5883\u3068\u653b\u6483\u624b\u6cd5\u306e\u9032\u5316\u306b\u5408\u308f\u305b\u3066\u3001CyberArk \u306e\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30c8\u306a\u7279\u6a29\u7ba1\u7406\u306f\u3001\u3042\u3089\u3086\u308b\u7a2e\u985e\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3092\u4fdd\u8b77\u3057\u3001\u3069\u306e\u3088\u3046\u306a\u72b6\u6cc1\u3067\u3082\u3001\u304a\u5ba2\u69d8\u3068\u7d44\u7e54\u3092\u5b89\u5168\u306b\u4fdd\u3061\u307e\u3059\u3002CyberArk \u306b\u3088\u308b\u4fdd\u8b77\u306e\u4ed5\u7d44\u307f\uff1a\u200b\u200b<\/h5>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box text-center mb-10&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg\"><img decoding=\"async\" class=\"alignnone wp-image-196774 size-thumbnail\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg\" alt=\"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u306e\u6700\u524d\u7dda\u3078\" width=\"40px\" \/><\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>\u8a8d\u8a3c\u60c5\u5831\u3092\u5b89\u5168\u306b\u4fdd\u7ba1\u3057\u3066\u30ed\u30fc\u30c6\u30fc\u30b7\u30e7\u30f3\u3059\u308b\u3053\u3068\u3067\u8a8d\u8a3c\u60c5\u5831\u306e\u7a83\u53d6\u3092\u9632\u6b62<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box text-center mb-10&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Enable-Seamless-User-Access-icon.svg\"><img decoding=\"async\" class=\"alignnone wp-image-196765 size-thumbnail\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Enable-Seamless-User-Access-icon.svg\" alt=\"\u30b7\u30fc\u30e0\u30ec\u30b9\u306a\u30e6\u30fc\u30b6\u30fc\u30a2\u30af\u30bb\u30b9\u3092\u5b9f\u73fe \" width=\"40px\" \/><\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>\u30b8\u30e3\u30b9\u30c8\u30a4\u30f3\u30bf\u30a4\u30e0 \u30a2\u30af\u30bb\u30b9\u3068\u30bc\u30ed\u30b9\u30bf\u30f3\u30c7\u30a3\u30f3\u30b0\u7279\u6a29\u200b<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box text-center mb-10&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg\"><img decoding=\"async\" class=\"alignnone wp-image-196783 size-thumbnail\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg\" alt=\"\u512a\u308c\u305f\u67d4\u8edf\u6027\" width=\"40px\" \/><\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>\u30e9\u30c6\u30e9\u30eb\u30e0\u30fc\u30d6\u30e1\u30f3\u30c8\u306e\u9632\u6b62\u306e\u305f\u3081\u306e\u30bb\u30c3\u30b7\u30e7\u30f3\u306e\u5206\u96e2\u200b<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box text-center mb-10&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Endpoint.svg\"><img decoding=\"async\" class=\"alignnone wp-image-196792 size-thumbnail\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Endpoint.svg\" alt=\"\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\" width=\"40px\" \/><\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306b\u304a\u3051\u308b\u6700\u5c0f\u6a29\u9650\u306e\u539f\u5247\u306e\u9069\u7528\u3068\u7d99\u7d9a\u7684\u306a\u8a8d\u8a3c<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; disable_element=&#8221;yes&#8221; el_class=&#8221;cybv2 cyberark-blueprint dark&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section3_h4&#8243;]<\/p>\n<h3>\u3067\u306f\u3001\u4f55\u304b\u3089\u59cb\u3081\u308c\u3070\u3088\u3044\u306e\u3067\u3057\u3087\u3046\u304b\u3002<\/h3>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section3_text&#8221;]<\/p>\n<h4>\u30db\u30ef\u30a4\u30c8\u30da\u30fc\u30d1\u30fc\u300c\u73fe\u5728\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u57fa\u76e4\uff1a\u3042\u3089\u3086\u308b\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306b\u5bfe\u5fdc\u3059\u308b Intelligent Privilege Controls\u2122\u300d\u306f\u3001\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u518d\u8003\u3057\u3001\u7d44\u7e54\u304c\u69cb\u7bc9\u3057\u3066\u3044\u308b\u3059\u3079\u3066\u306e\u8cc7\u7523\u3084\u30c7\u30fc\u30bf\u3092\u4fdd\u8b77\u3059\u308b\u65b9\u6cd5\u306b\u95a2\u3059\u308b\u77e5\u898b\u3092\u63d0\u4f9b\u3057\u307e\u3059\u3002<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_btn title=&#8221;\u30db\u30ef\u30a4\u30c8\u30da\u30fc\u30d1\u30fc\u306e\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; align=&#8221;right&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-backbone-of-modern-security-intelligent-privilege-controls-for-every-identity|title:%E3%83%9B%E3%83%AF%E3%82%A4%E3%83%88%E3%83%9A%E3%83%BC%E3%83%91%E3%83%BC%E3%81%AE%E3%83%80%E3%82%A6%E3%83%B3%E3%83%AD%E3%83%BC%E3%83%89%20|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_full_width_resource&#8221;][vc_column][vc_row_inner el_class=&#8221;new_hpstyle_section5_container&#8221;][vc_column_inner][vc_single_image image=&#8221;202059&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section5_gart_img&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section5_text1&#8243;]<\/p>\n<h4>Required reading for modern security leaders.<\/h4>\n<p>\n[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section5_text2&#8243;]<\/p>\n<p style=\"text-align: left;\">The Identity Security Imperative is the ultimate guide for security leaders who want to sharpen their identity security strategies and build a resilient enterprise.<\/p>\n<p>\n[\/vc_column_text][vc_btn title=&#8221;Download Book&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Fthe-identity-security-imperative%3Futm_source%3Dcyberark%26utm_medium%3Dreferral%26utm_content%3Deb_the_identity_security_imperative%26utm_campaign%3Didentity_security%26cq_plac%3D%7Bplacement%7D%26cq_net%3D%7Bnetwork%7D%26cq_plt%3Dgp|title:Download%20the%20whitepaper|&#8221; el_class=&#8221;cybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 v3 cybv2-pad overview-vt&#8221;][vc_column width=&#8221;6\/12&#8243;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"cyb-br alignnone size-full wp-image-196801\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/neon-office.jpg\" alt=\"\u30aa\u30d5\u30a3\u30b9 \u30d3\u30eb\u306e\u30cd\u30aa\u30f3\" width=\"640\" height=\"350\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/neon-office.jpg 640w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/neon-office-300x164.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/neon-office-150x82.jpg 150w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243; el_class=&#8221;head-box&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>CyberArk \u304c\u9078\u3070\u308c\u308b\u7406\u7531<\/h3>\n<p>CyberArk \u306f\u3001\u696d\u754c\u306b\u95a2\u308f\u3089\u305a\u3001\u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3092\u5171\u901a\u306e\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3067\u4fdd\u8b77\u3059\u308b\u3053\u3068\u3067\u3001\u52b9\u7387\u7684\u3067\u52b9\u679c\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u5bb9\u6613\u306b\u5b9f\u73fe\u3067\u304d\u308b\u3088\u3046\u306b\u306a\u308b\u3068\u8003\u3048\u3066\u3044\u307e\u3059\u3002CyberArk \u306f\u7279\u6a29\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u306b\u304a\u3051\u308b\u30d1\u30a4\u30aa\u30cb\u30a2\u3067\u3042\u308a\u3001\u4f01\u696d\u306e IT \u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3092\u4fdd\u8b77\u3059\u308b\u3053\u3068\u3067\u3001\u6700\u3082\u91cd\u8981\u306a\u8cc7\u7523\u3078\u306e\u30a2\u30af\u30bb\u30b9\u3092\u4fdd\u8b77\u3057\u3066\u3044\u307e\u3059\u3002CORA AI \u3092\u642d\u8f09\u3057\u305f Identity Security Platform \u306b\u3088\u308a\u3001\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u5bfe\u3059\u308b\u65b0\u3057\u3044\u30a2\u30d7\u30ed\u30fc\u30c1\u304c\u53ef\u80fd\u3068\u306a\u308a\u3001\u91cd\u8981\u306a\u8cc7\u7523\u3084\u30c7\u30fc\u30bf\u3092\u4fdd\u8b77\u3067\u304d\u308b\u3088\u3046\u306b\u306a\u308a\u307e\u3059\u3002\u200b<\/p>\n<p>CyberArk \u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d5\u30a1\u30fc\u30b9\u30c8\u306e AI \u642d\u8f09\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3067\u3001\u9069\u5207\u306a\u30ec\u30d9\u30eb\u306e\u7279\u6a29\u7ba1\u7406\u3068\u30b8\u30e3\u30b9\u30c8\u30a4\u30f3\u30bf\u30a4\u30e0 \u30a2\u30af\u30bb\u30b9\u3092\u9069\u7528\u3057\u3001\u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3092\u4fdd\u8b77\u3059\u308b\u552f\u4e00\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f01\u696d\u3067\u3059\u3002CyberArk \u306f\u6570\u5341\u5e74\u306b\u308f\u305f\u3063\u3066\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306e\u4fdd\u8b77\u306b\u53d6\u308a\u7d44\u3093\u3067\u304a\u308a\u3001\u304a\u5ba2\u69d8\u304c\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306e\u8105\u5a01\u3092\u6050\u308c\u308b\u3053\u3068\u306a\u304f\u30d3\u30b8\u30cd\u30b9\u3092\u524d\u9032\u3055\u305b\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3088\u3046\u306b\u3001\u6bd4\u985e\u306e\u306a\u3044\u5c02\u9580\u77e5\u8b58\u3092\u57f9\u3063\u3066\u304d\u307e\u3057\u305f\u3002\u200b<\/p>\n<p>\u6700\u5c0f\u7279\u6a29\u306e\u539f\u5247\u3092\u9069\u7528\u3057\u3001\u3042\u3089\u3086\u308b\u30c7\u30d0\u30a4\u30b9\u3067\u30ef\u30fc\u30af\u30d5\u30a9\u30fc\u30b9\u306e\u751f\u7523\u6027\u3092\u5f37\u5316\u3057\u3001DevOps \u30d1\u30a4\u30d7\u30e9\u30a4\u30f3\u5168\u4f53\u3067\u8a8d\u8a3c\u60c5\u5831\u3092\u4fdd\u8b77\u3059\u308b\u305f\u3081\u306b\u3001\u696d\u754c\u3092\u30ea\u30fc\u30c9\u3059\u308b\u591a\u304f\u306e\u4f01\u696d\u304c CyberArk \u3092\u4fe1\u983c\u3057\u3066\u3044\u308b\u7406\u7531\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002\u202f\u200b[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 hero dark&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243; offset=&#8221;vc_col-md-6&#8243;][vc_co&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-182558","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306e\u4fdd\u8b77 | CyberArk<\/title>\n<meta name=\"description\" content=\"\u74b0\u5883\u304c\u62e1\u5927\u3057\u5909\u5316\u3057\u7d9a\u3051\u308b\u4e2d\u3067\u3001\u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u304c\u3042\u3089\u3086\u308b\u30a2\u30af\u30bb\u30b9 \u30dd\u30a4\u30f3\u30c8\u3067\u7d44\u7e54\u306e\u6700\u3082\u8cb4\u91cd\u306a\u30ea\u30bd\u30fc\u30b9\u3078\u306e\u5165\u53e3\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30c8\u306a\u7279\u6a29\u7ba1\u7406\u3092\u62e1\u5f35\u3059\u308b\u3053\u3068\u304c\u3001\u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3092\u771f\u306b\u5b89\u5168\u306b\u4fdd\u3064\u552f\u4e00\u306e\u65b9\u6cd5\u3067\u3059\u3002\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/secureidentities\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306e\u4fdd\u8b77\" \/>\n<meta property=\"og:description\" content=\"\u74b0\u5883\u304c\u62e1\u5927\u3057\u5909\u5316\u3057\u7d9a\u3051\u308b\u4e2d\u3067\u3001\u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u304c\u3042\u3089\u3086\u308b\u30a2\u30af\u30bb\u30b9 \u30dd\u30a4\u30f3\u30c8\u3067\u7d44\u7e54\u306e\u6700\u3082\u8cb4\u91cd\u306a\u30ea\u30bd\u30fc\u30b9\u3078\u306e\u5165\u53e3\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30c8\u306a\u7279\u6a29\u7ba1\u7406\u3092\u62e1\u5f35\u3059\u308b\u3053\u3068\u304c\u3001\u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3092\u771f\u306b\u5b89\u5168\u306b\u4fdd\u3064\u552f\u4e00\u306e\u65b9\u6cd5\u3067\u3059\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/secureidentities\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-29T07:49:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"3\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/secureidentities\/\",\"url\":\"https:\/\/www.cyberark.com\/secureidentities\/\",\"name\":\"\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306e\u4fdd\u8b77 | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/secureidentities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/secureidentities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg\",\"datePublished\":\"2023-09-15T18:38:42+00:00\",\"dateModified\":\"2025-04-29T07:49:36+00:00\",\"description\":\"\u74b0\u5883\u304c\u62e1\u5927\u3057\u5909\u5316\u3057\u7d9a\u3051\u308b\u4e2d\u3067\u3001\u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u304c\u3042\u3089\u3086\u308b\u30a2\u30af\u30bb\u30b9 \u30dd\u30a4\u30f3\u30c8\u3067\u7d44\u7e54\u306e\u6700\u3082\u8cb4\u91cd\u306a\u30ea\u30bd\u30fc\u30b9\u3078\u306e\u5165\u53e3\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30c8\u306a\u7279\u6a29\u7ba1\u7406\u3092\u62e1\u5f35\u3059\u308b\u3053\u3068\u304c\u3001\u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3092\u771f\u306b\u5b89\u5168\u306b\u4fdd\u3064\u552f\u4e00\u306e\u65b9\u6cd5\u3067\u3059\u3002\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/secureidentities\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/secureidentities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.cyberark.com\/secureidentities\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/secureidentities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306e\u4fdd\u8b77\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306e\u4fdd\u8b77 | CyberArk","description":"\u74b0\u5883\u304c\u62e1\u5927\u3057\u5909\u5316\u3057\u7d9a\u3051\u308b\u4e2d\u3067\u3001\u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u304c\u3042\u3089\u3086\u308b\u30a2\u30af\u30bb\u30b9 \u30dd\u30a4\u30f3\u30c8\u3067\u7d44\u7e54\u306e\u6700\u3082\u8cb4\u91cd\u306a\u30ea\u30bd\u30fc\u30b9\u3078\u306e\u5165\u53e3\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30c8\u306a\u7279\u6a29\u7ba1\u7406\u3092\u62e1\u5f35\u3059\u308b\u3053\u3068\u304c\u3001\u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3092\u771f\u306b\u5b89\u5168\u306b\u4fdd\u3064\u552f\u4e00\u306e\u65b9\u6cd5\u3067\u3059\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/secureidentities\/","og_locale":"ja_JP","og_type":"article","og_title":"\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306e\u4fdd\u8b77","og_description":"\u74b0\u5883\u304c\u62e1\u5927\u3057\u5909\u5316\u3057\u7d9a\u3051\u308b\u4e2d\u3067\u3001\u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u304c\u3042\u3089\u3086\u308b\u30a2\u30af\u30bb\u30b9 \u30dd\u30a4\u30f3\u30c8\u3067\u7d44\u7e54\u306e\u6700\u3082\u8cb4\u91cd\u306a\u30ea\u30bd\u30fc\u30b9\u3078\u306e\u5165\u53e3\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30c8\u306a\u7279\u6a29\u7ba1\u7406\u3092\u62e1\u5f35\u3059\u308b\u3053\u3068\u304c\u3001\u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3092\u771f\u306b\u5b89\u5168\u306b\u4fdd\u3064\u552f\u4e00\u306e\u65b9\u6cd5\u3067\u3059\u3002","og_url":"https:\/\/www.cyberark.com\/secureidentities\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-04-29T07:49:36+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"3\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/secureidentities\/","url":"https:\/\/www.cyberark.com\/secureidentities\/","name":"\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306e\u4fdd\u8b77 | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/secureidentities\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/secureidentities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg","datePublished":"2023-09-15T18:38:42+00:00","dateModified":"2025-04-29T07:49:36+00:00","description":"\u74b0\u5883\u304c\u62e1\u5927\u3057\u5909\u5316\u3057\u7d9a\u3051\u308b\u4e2d\u3067\u3001\u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u304c\u3042\u3089\u3086\u308b\u30a2\u30af\u30bb\u30b9 \u30dd\u30a4\u30f3\u30c8\u3067\u7d44\u7e54\u306e\u6700\u3082\u8cb4\u91cd\u306a\u30ea\u30bd\u30fc\u30b9\u3078\u306e\u5165\u53e3\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30c8\u306a\u7279\u6a29\u7ba1\u7406\u3092\u62e1\u5f35\u3059\u308b\u3053\u3068\u304c\u3001\u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3092\u771f\u306b\u5b89\u5168\u306b\u4fdd\u3064\u552f\u4e00\u306e\u65b9\u6cd5\u3067\u3059\u3002","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/secureidentities\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/secureidentities\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.cyberark.com\/secureidentities\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/secureidentities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306e\u4fdd\u8b77"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/pages\/182558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/comments?post=182558"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/pages\/182558\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/media?parent=182558"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/product_category?post=182558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}