{"id":187030,"date":"2023-12-06T16:22:30","date_gmt":"2023-12-06T21:22:30","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/government\/"},"modified":"2025-09-22T14:33:28","modified_gmt":"2025-09-22T18:33:28","slug":"government","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/ja\/solutions\/government\/","title":{"rendered":"\u653f\u5e9c"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 int-hero-noimg blue-gradient&#8221;][vc_column width=&#8221;5\/6&#8243; el_class=&#8221;column-1&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h1>\u3042\u3089\u3086\u308b\u30ec\u30d9\u30eb\u306e\u653f\u5e9c\u6a5f\u95a2\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3092\u4fdd\u8b77<\/h1>\n<p><\/p>\n<h2>\u3044\u3064\u3067\u3082\u3001\u3069\u3053\u3067\u3082\u3001\u3069\u306e\u3088\u3046\u306a\u30c7\u30d0\u30a4\u30b9\u304b\u3089\u3067\u3082\u3001\u81ea\u52d5\u7684\u306b\u5b89\u5168\u306b\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u307e\u3059\u3002\u52b9\u7387\u6027\u3068\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u3092\u512a\u5148\u3059\u308b\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8 \u30a2\u30d7\u30ed\u30fc\u30c1\u3067\u3001\u3042\u3089\u3086\u308b\u30ec\u30d9\u30eb\u306e\u653f\u5e9c\u6a5f\u95a2\u306e\u6a5f\u5bc6\u30c7\u30fc\u30bf\u3068\u91cd\u8981\u30a4\u30f3\u30d5\u30e9\u3092\u4fdd\u8b77\u3057\u307e\u3059\u3002<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=&#8221;\u30c7\u30e2\u3092\u7533\u3057\u8fbc\u3080&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; custom_onclick=&#8221;true&#8221; link=&#8221;url:%23form|&#8221; el_class=&#8221;cybv2-button-transp-green&#8221; custom_onclick_code=&#8221;data-scroll-class&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/addressing-zero-trust-for-government-the-role-of-identity-security\">\u30db\u30ef\u30a4\u30c8\u30da\u30fc\u30d1\u30fc\u3092\u8aad\u3080<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-vt&#8221; css=&#8221;.vc_custom_1611617874123{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;head-box&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\uff1a\u52b9\u7387\u7684\u306a\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u5b9f\u88c5\u306e\u57fa\u790e<\/h3>\n<p>\u300c\u6c7a\u3057\u3066\u4fe1\u983c\u305b\u305a\u3001\u5e38\u306b\u691c\u8a3c\u3059\u308b\u300d\u3068\u3044\u3046\u539f\u5247\u306f\u3001\u591a\u6570\u306e\u30a8\u30f3\u30c8\u30ea\u30fc \u30dd\u30a4\u30f3\u30c8\u306b\u3088\u3063\u3066\u3082\u305f\u3089\u3055\u308c\u308b\u8106\u5f31\u6027\u306e\u7ba1\u7406\u3092\u81ea\u52d5\u5316\u3059\u308b\u3053\u3068\u3067\u6210\u308a\u7acb\u3061\u307e\u3059\u3002CyberArk \u306e\u5305\u62ec\u7684\u306a <a href=\"https:\/\/www.cyberark.com\/ja\/products\/\">Identity Security Platform<\/a> \u306f\u3001<a href=\"https:\/\/www.cyberark.com\/ja\/solutions\/zero-trust\/\"> \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f53\u5236\u3092\u5f37\u5316\u3057\u3001\u691c\u8a3c\u30d7\u30ed\u30bb\u30b9\u3092\u5408\u7406\u5316\u3059\u308b\u3053\u3068\u3067<\/a>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8 \u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u3092\u5f37\u5316\u3057\u3001\u653f\u5e9c\u6a5f\u95a2\u306e\u696d\u52d9\u5168\u4f53\u306e\u751f\u7523\u6027\u3092\u9ad8\u3081\u3001\u30a8\u30e9\u30fc\u3092\u524a\u6e1b\u3057\u307e\u3059\u3002[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-143134\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\" alt=\"\u30ea\u30b9\u30af\" width=\"300\" height=\"259\" \/><\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>\u30d7\u30ed\u30a2\u30af\u30c6\u30a3\u30d6\u306b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u81ea\u52d5\u5316\u3057\u3066\u30ea\u30b9\u30af\u3092\u4f4e\u6e1b<\/h4>\n<p>\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u3092\u81ea\u52d5\u5316\u3059\u308b\u3053\u3068\u3067\u3001\u653f\u5e9c\u6a5f\u95a2\u5168\u4f53\u3067\u30ea\u30b9\u30af\u3092\u6700\u5c0f\u9650\u306b\u6291\u3048\u3001\u904b\u7528\u3092\u52b9\u7387\u5316\u3067\u304d\u307e\u3059\u3002[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-129953\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/4_Secretsicon-01.svg\" alt=\"\u53d6\u308a\u7d44\u307f\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>\u6700\u9069\u5316\u3055\u308c\u305f\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u5236\u5fa1\u3067\u653b\u6483\u3092\u5c01\u3058\u8fbc\u3081\u308b<\/h4>\n<p>\u6226\u7565\u7684\u306a\u7279\u6a29\u5236\u5fa1\u3092\u81ea\u52d5\u5316\u3057\u3066\u3001\u653b\u6483\u3092\u9632\u304e\u3001\u696d\u52d9\u306e\u4e2d\u65ad\u3092\u6700\u5c0f\u9650\u306b\u6291\u3048\u307e\u3059\u3002[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-143628\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/Compliance_test-01.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u5bfe\u5fdc\u30d7\u30ed\u30bb\u30b9\u3092\u7c21\u7d20\u5316<\/h4>\n<p>NIST\u3001NERC\u3001FIPS \u306a\u3069\u306e\u91cd\u8981\u306a\u6a19\u6e96\u306e\u8981\u4ef6\u3092\u7c21\u5358\u306b\u6e80\u305f\u3057\u3001\u624b\u52d5\u306e\u8ca0\u8377\u3092\u524a\u6e1b\u3059\u308b\u5408\u7406\u5316\u3055\u308c\u305f\u30d7\u30ed\u30bb\u30b9\u3092\u5b9f\u73fe\u3057\u307e\u3059\u3002[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-199824 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/digital-health.svg\" alt=\"\u30c7\u30b8\u30bf\u30eb\u533b\u7642\u30a2\u30a4\u30b3\u30f3\" width=\"40\" height=\"46\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>\u30e2\u30c0\u30ca\u30a4\u30bc\u30fc\u30b7\u30e7\u30f3\u306e\u63a8\u9032<\/h4>\n<p>\u9ad8\u5ea6\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u306f\u3001\u653f\u5e9c\u6a5f\u95a2\u306e IT \u306e\u30e2\u30c0\u30ca\u30a4\u30bc\u30fc\u30b7\u30e7\u30f3\u3092\u63a8\u9032\u3057\u3001\u5927\u5e45\u306a\u30b3\u30b9\u30c8\u524a\u6e1b\u3068\u904b\u7528\u306e\u52b9\u7387\u5316\u3092\u4fc3\u9032\u3057\u307e\u3059\u3002[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_talk_to_an_expert&#8221; css=&#8221;.vc_custom_1608677118624{background-color: #061b2b !important;}&#8221;][vc_column el_class=&#8221;text-center&#8221;][vc_column_text el_class=&#8221;extra-space&#8221;]<\/p>\n<h2>\u9023\u90a6\u653f\u5e9c\u6a5f\u95a2\u306e\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3078\u306e\u5bfe\u5fdc<\/h2>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section9_text&#8221;]\u3042\u3089\u3086\u308b\u30c7\u30d0\u30a4\u30b9\u304b\u3089\u3059\u3079\u3066\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306b\u5b89\u5168\u306b\u30a2\u30af\u30bb\u30b9\u3057\u3001\u9023\u90a6\u653f\u5e9c\u6a5f\u95a2\u306e\u6a5f\u5bc6\u30c7\u30fc\u30bf\u3084\u30a4\u30f3\u30d5\u30e9\u3092\u4fdd\u8b77\u3057\u307e\u3059\u3002[\/vc_column_text][vc_btn title=&#8221;\u8a73\u7d30\u3092\u78ba\u8a8d&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; align=&#8221;center&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fja%2Fsolutions%2Ffederal%2F|&#8221; el_class=&#8221;cybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-top&#8221;][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_column_text el_class=&#8221;text-md-center head-box&#8221;]<\/p>\n<h3>CyberArk \u306b\u3088\u308b\u898f\u5236\u304a\u3088\u3073\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u6a19\u6e96\u3078\u306e\u6e96\u62e0<\/h3>\n<p>CyberArk \u306f\u3001\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30b0\u30ed\u30fc\u30d0\u30eb \u30ea\u30fc\u30c0\u30fc\u3067\u3042\u308a\u3001\u4e16\u754c\u4e2d\u3067 8,000 \u793e\u4ee5\u4e0a\u306e\u9867\u5ba2\u304b\u3089\u4fe1\u983c\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u307e\u305f\u3001NIAP \u8a8d\u5b9a\u30d7\u30ed\u30d0\u30a4\u30c0\u30fc\u3067\u3042\u308a\u3001DoD UC APL \u306b\u767b\u9332\u3055\u308c\u3001\u7c73\u9678\u8ecd\u304b\u3089\u63d0\u4f9b\u3055\u308c\u308b Networthiness \u8a8d\u8a3c (CoN) \u3092\u5f97\u3066\u3044\u307e\u3059\u3002<a href=\"https:\/\/www.cyberark.com\/ja\/blueprint\/\">CyberArk Blueprint<\/a> \u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u306b\u5f93\u3044\u3001\u52b9\u679c\u7684\u306a\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30ed\u30fc\u30c9\u30de\u30c3\u30d7\u3092\u8a2d\u8a08\u3057\u3001\u4e3b\u8981\u306a\u898f\u5236\u306b\u5bfe\u5fdc\u3057\u307e\u3059\u3002[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad-top featured-integrations&#8221;][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fpublic-sector-government%2Faddressing-the-australian-essential-eight-cyber-security-maturity-model|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143175\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/acsc-featured-grey.jpg\" alt=\"ACSC\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/acsc-featured-grey.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/acsc-featured-grey-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/acsc-featured-grey-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u8c6a\u5dde \u2013 ACSC Essential Eight<\/h4>\n<p>CyberArk Identity Security Platform \u304c Essential Eight \u306e\u30ea\u30b9\u30af\u7ba1\u7406\u6226\u7565\u3092\u3069\u306e\u3088\u3046\u306b\u30b5\u30dd\u30fc\u30c8\u3057\u3066\u3044\u308b\u304b\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\/addressing-the-australian-essential-eight-cyber-security-maturity-model\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fgetting-ready-for-nis2|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-180886 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-star.jpg\" alt=\"FED \u30ed\u30b4\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-star.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-star-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-star-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>EU &#8211; NIS2 \u6307\u4ee4<\/h4>\n<p>NIS2 \u304c\u5fa1\u793e\u306e\u4e8b\u696d\u306b\u3069\u306e\u3088\u3046\u306a\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u304b\u3001\u3069\u306e\u3088\u3046\u306b\u6e96\u5099\u3067\u304d\u308b\u304b\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/getting-ready-for-nis2\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fpublic-sector-government%2Fcybersecurity-in-a-digitalised-world|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-143183 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/ncsc-featured.jpg\" alt=\"nscs\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/ncsc-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/ncsc-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/ncsc-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u82f1\u56fd \u2013 NCSC (\u56fd\u5bb6\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bb\u30f3\u30bf\u30fc )  CAF<\/h4>\n<p>CyberArk \u306e\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u5229\u7528\u3057\u3066\u82f1\u56fd\u653f\u5e9c\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u306e\u76ee\u6a19\u3092\u9054\u6210\u3059\u308b\u65b9\u6cd5\u306e\u8a73\u7d30\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\/cybersecurity-in-a-digitalised-world\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fblog%2Fcisa-cpg-report-ids-top-cybersecurity-steps-for-smb-critical-infrastructure-entities|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143231\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cisa-featured-grey.jpg\" alt=\"CISA\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cisa-featured-grey.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cisa-featured-grey-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cisa-featured-grey-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u7c73\u56fd \u2013 CISA (\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u793e\u4f1a\u57fa\u76e4\u5b89\u5168\u4fdd\u969c\u5e81) CPG<\/h4>\n<p>CISA \u304c\u57fa\u672c\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u306e\u5171\u901a\u9805\u306b\u3064\u3044\u3066\u793a\u3057\u305f Cross-Sector Cybersecurity Performance Goals (CPG) \u306e\u9054\u6210\u306b\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u304c\u3069\u306e\u3088\u3046\u306b\u5f79\u7acb\u3064\u304b\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/blog\/cisa-cpg-report-ids-top-cybersecurity-steps-for-smb-critical-infrastructure-entities\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fsolution-briefs%2Fdepartment-of-homeland-security-s-continuous-diagnostics-and-mitigation-cdm-phase-2-privilege-management-requirements|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143191\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/dhs-featured.jpg\" alt=\"dhs\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/dhs-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/dhs-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/dhs-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u7c73\u56fd \u2013 DHS (\u56fd\u571f\u5b89\u5168\u4fdd\u969c\u7701) CDM<\/h4>\n<p>\u7c73\u56fd\u9023\u90a6\u653f\u5e9c\u6a5f\u95a2\u306b\u304a\u3051\u308b\u7279\u6a29\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u306e\u5f79\u5272\u3068\u3001\u3053\u306e\u5f79\u5272\u304c CDM \u30d7\u30ed\u30b0\u30e9\u30e0\u306e 2 \u3064\u306e\u30d5\u30a7\u30fc\u30ba\u3078\u306e\u5bfe\u5fdc\u306b\u3069\u306e\u3088\u3046\u306b\u5f79\u7acb\u3064\u306e\u304b\u306b\u3064\u3044\u3066\u3001\u8a73\u7d30\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\" https:\/\/www.cyberark.com\/resources\/solution-briefs\/department-of-homeland-security-s-continuous-diagnostics-and-mitigation-cdm-phase-2-privilege-management-requirements \">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fpress%2Fcyberark-achieves-fedramp-high-authorization%2F%20|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-180895 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-ramp.jpg\" alt=\"FedRAMP \u30ed\u30b4\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-ramp.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-ramp-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-ramp-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>FedRAMP\u00ae High \u8a8d\u8a3c<\/h4>\n<p>CyberArk \u306e\u4e3b\u8981\u306a SaaS \u88fd\u54c1\u3001 CyberArk Endpoint Privilege Manager\u3001 CyberArk Workforce Identity\u3001 FedRAMP High \u8a8d\u8a3c\u306e\u53d6\u5f97\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u539f\u5247\u306b\u6cbf\u3063\u305f\u7c73\u56fd\u9023\u90a6\u653f\u5e9c\u6a5f\u95a2\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u5f37\u5316\u306b\u3064\u3044\u3066\u3054\u89a7\u304f\u3060\u3055\u3044\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/press\/cyberark-achieves-fedramp-high-authorization\/\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-180868 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fips-140-2.jpg\" alt=\"Fips 140 \u30ed\u30b4\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fips-140-2.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fips-140-2-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fips-140-2-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u7c73\u56fd &#8211; FIPS 140 &#8211; 2<\/h4>\n<p>CyberArk PAM &#8211; FIPS \u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u3068\u691c\u51fa\u6a5f\u80fd\u306e\u5411\u4e0a\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/product-announcements-blog\/cyberark-privileged-access-manager-self-hosted-v13-0-release-fips-compliance-and-improved-discovery\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fprotecting-the-grid-addressing-nerc-cip-requirements-for-securing-privileged-access|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143199\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nerc-featured.jpg\" alt=\"NERC\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nerc-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nerc-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nerc-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u7c73\u56fd \u2013 NERC CIP<\/h4>\n<p>CyberArk \u306e\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u304c\u3053\u308c\u3089\u306e NERC CIP \u8981\u4ef6\u306b\u3069\u306e\u3088\u3046\u306b\u5bfe\u5fdc\u3057\u3066\u3044\u308b\u304b\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/protecting-the-grid-addressing-nerc-cip-requirements-for-securing-privileged-access\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Faddressing-the-department-of-defenses-zero-trust-framework-with-the-cyberark-identity-security-platform%20|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-180859 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/us-fed-3-recovered.jpg\" alt=\"\u56fd\u9632\u7701\u30ed\u30b4\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/us-fed-3-recovered.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/us-fed-3-recovered-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/us-fed-3-recovered-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>DoD \u30bc\u30ed\u30c8\u30e9\u30b9\u30c8 \u30ac\u30a4\u30c9\u30e9\u30a4\u30f3<\/h4>\n<p>\u7c73\u56fd\u9632\u7dcf\u7701\u306e\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8 \u30ea\u30d5\u30a1\u30ec\u30f3\u30b9 \u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306b\u6e96\u62e0\u3059\u308b\u305f\u3081\u306b\u3001\u9023\u90a6\u6a5f\u95a2\u304c CyberArk \u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u3069\u306e\u3088\u3046\u306b\u6d3b\u7528\u3067\u304d\u308b\u304b\u306b\u3064\u3044\u3066\u306e\u6280\u8853\u30ec\u30d3\u30e5\u30fc\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/addressing-the-department-of-defenses-zero-trust-framework-with-the-cyberark-identity-security-platform\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Faddressing-zero-trust-for-government-the-role-of-identity-security%20|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143215\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured.jpg\" alt=\"NIST\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u7c73\u56fd &#8211; NIST SP 800-171<\/h4>\n<p>\u3053\u308c\u306b\u306f\u3001\u7ba1\u7406\u5bfe\u8c61\u306e\u975e\u6a5f\u5bc6\u60c5\u5831\u306e\u4fdd\u8b77\u306b\u95a2\u3059\u308b\u30ac\u30a4\u30c0\u30f3\u30b9\u3092\u6301\u3064\u9023\u90a6\u8acb\u8ca0\u696d\u8005\u304c\u542b\u307e\u308c\u3001\u7279\u6a29\u7684\u30a2\u30af\u30bb\u30b9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b NIST 800-171 \u8981\u4ef6\u306b\u5bfe\u5fdc\u3057\u3066\u3044\u307e\u3059\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/addressing-the-nist-sp-800-171-cui-requirements-with-cyberark\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fhome%2Fput-privileged-access-management-at-the-core-of-nist-zero-trust-architecture|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143215\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured.jpg\" alt=\"NIST\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u7c73\u56fd &#8211; NIST SP 800-207<\/h4>\n<p>\u7279\u6a29\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u3092 NIST \u306e\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8 \u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u4e2d\u6838\u3068\u3057\u3066\u8003\u3048\u307e\u3059\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\" https:\/\/www.cyberark.com\/resources\/home\/put-privileged-access-management-at-the-core-of-nist-zero-trust-architecture\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fpublic-sector-government%2Fmapping-cyberark-solutions-to-ksa-nca-ecc|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143207\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nca-featured.jpg\" alt=\"NCA\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nca-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nca-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nca-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u30b5\u30a6\u30b8\u30a2\u30e9\u30d3\u30a2 \u2013 NCA (\u56fd\u5bb6\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5e81) ECC<\/h4>\n<p>\u30b5\u30a6\u30b8\u30a2\u30e9\u30d3\u30a2\u738b\u56fd\u306e\u56fd\u5bb6\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5e81\u304c\u793a\u3057\u3066\u3044\u308b\u91cd\u8981\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7ba1\u7406\u306e\u8981\u4ef6\u3092\u6e80\u305f\u3059\u305f\u3081\u306b\u3001CyberArk \u304c\u3069\u306e\u3088\u3046\u306b\u5f79\u7acb\u3064\u304b\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\/mapping-cyberark-solutions-to-ksa-nca-ecc\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-181863 size-medium\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso-27017-big-300x122.jpg\" alt=\"iso-27017\" width=\"300\" height=\"122\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso-27017-big-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso-27017-big-150x61.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso-27017-big.jpg 742w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>ISO 27018<\/h4>\n<p>\u3053\u306e\u56fd\u969b\u306b\u5e83\u304f\u63a1\u7528\u3055\u308c\u3066\u3044\u308b\u898f\u683c\u306f\u30af\u30e9\u30a6\u30c9 \u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u74b0\u5883\u306b\u304a\u3051\u308b\u500b\u4eba\u8b58\u5225\u60c5\u5831 (PII) \u306e\u4fdd\u8b77\u306b\u7126\u70b9\u3092\u5f53\u3066\u3066\u3044\u307e\u3059\u3002CyberArk \u306f\u3001\u3053\u308c\u3089\u306e ISO \u898f\u683c\u3092\u9075\u5b88\u3057\u3001\u6a19\u6e96\u30c7\u30fc\u30bf \u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3068\u900f\u660e\u6027\u3068\u8aac\u660e\u8cac\u4efb\u306e\u7dad\u6301\u306b\u512a\u5148\u7684\u306b\u53d6\u308a\u7d44\u3093\u3067\u3044\u308b\u3053\u3068\u3092\u5b9f\u8a3c\u3057\u3066\u3044\u307e\u3059\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/ja\/trust\/compliance\/\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-189789 size-medium\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-300x122.png\" alt=\"DORA\" width=\"300\" height=\"122\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-300x122.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-150x61.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora.png 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>DORA<\/h4>\n<p>\u30c7\u30b8\u30bf\u30eb \u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3 \u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u6cd5 (DORA) \u306f\u3001EU \u306e\u91d1\u878d\u6a5f\u95a2\u304c\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306b\u5bfe\u3059\u308b\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u3092\u5411\u4e0a\u3055\u305b\u308b\u3053\u3068\u3092\u76ee\u7684\u3068\u3057\u3066\u3044\u307e\u3059\u3002\u5168\u4f53\u3068\u3057\u3066\u3001DORA \u306f\u60c5\u5831\u901a\u4fe1\u30c6\u30af\u30ce\u30ed\u30b8\u30fc (ICT) \u306e\u4fdd\u8b77\u306b\u91cd\u70b9\u3092\u7f6e\u3044\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u6cd5\u5f8b\u306f\u91d1\u878d\u6a5f\u95a2\u3060\u3051\u3067\u306f\u306a\u304f\u3001\u91d1\u878d\u6a5f\u95a2\u306b ICT \u30b7\u30b9\u30c6\u30e0\u3068\u30b5\u30fc\u30d3\u30b9\u3092\u63d0\u4f9b\u3059\u308b\u30b5\u30fc\u30c9\u30d1\u30fc\u30c6\u30a3\u306b\u3082\u9069\u7528\u3055\u308c\u307e\u3059\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/hybrid-and-multi-cloud-security\/dora-compliance-an-identity-security-guidebook\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-189780 size-medium\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-eu-1-300x122.png\" alt=\"\" width=\"300\" height=\"122\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-eu-1-300x122.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-eu-1-150x61.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-eu-1.png 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>DoDIN APL<\/h4>\n<p>CyberArk Privileged Access Manager Self-Hosted \u306f\u3001\u56fd\u9632\u7701 (DoD) \u306e\u9867\u5ba2\u5411\u3051\u306e\u4fe1\u983c\u3067\u304d\u308b\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3068\u3057\u3066\u516c\u5f0f\u306b\u767b\u9332\u3055\u308c\u3066\u3044\u307e\u3059\u3002CyberArk PAM Self-Hosted \u306f DoD \u60c5\u5831\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u627f\u8a8d\u88fd\u54c1\u30ea\u30b9\u30c8 (DoDIN APL) \u306b\u767b\u9332\u3055\u308c\u3066\u304a\u308a\u3001DoD \u306e\u4ed5\u69d8\u3092\u6e80\u305f\u3057\u3066\u3044\u307e\u3059\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/ja\/trust\/compliance\/\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fpress%2Fcyberark-achieves-qc1-certification-from-italian-national-cybersecurity-agency%2F%20|title:%E8%A9%B3%E7%B4%B0%E3%82%92%E7%A2%BA%E8%AA%8D|&#8221; el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215804\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/acn-logo.jpg\" alt=\"acn logo\" width=\"300\" height=\"122\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/acn-logo.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/acn-logo-150x61.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;tiny&#8221;]<\/p>\n<h4>Italy: QC1 Certification from Italian National Cybersecurity Agency (ACN)<\/h4>\n<p>CyberArk SaaS products are now available in the ACN marketplace to any government organization in Italy looking to consume or deploy cloud-based services.[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/press\/cyberark-achieves-qc1-certification-from-italian-national-cybersecurity-agency\/\">Learn More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; column_link=&#8221;url:https%3A%2F%2Finvestors.cyberark.com%2Fnews%2Fnews-details%2F2025%2FCyberArk-Achieves-Cloud-Service-Provider-Security-Standard-Certification-From-Dubai-Electronic-Security-Center%2Fdefault.aspx|title:%E8%A9%B3%E7%B4%B0%E3%82%92%E7%A2%BA%E8%AA%8D|&#8221; el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215822\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/DESC-Logo.jpg\" alt=\"dubai logo\" width=\"300\" height=\"122\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;tiny&#8221;]<\/p>\n<h4>UAE &#8211; CSP Security Standard Certification from DESC<\/h4>\n<p>CyberArk receives Cloud Service Provider certification from Dubai Electronic Security Center (DESC).[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/investors.cyberark.com\/news\/news-details\/2025\/CyberArk-Achieves-Cloud-Service-Provider-Security-Standard-Certification-From-Dubai-Electronic-Security-Center\/default.aspx\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_talk_to_an_expert&#8221; css=&#8221;.vc_custom_1608677118624{background-color: #061b2b !important;}&#8221;][vc_column el_class=&#8221;text-center&#8221;][vc_column_text el_class=&#8221;extra-space&#8221;]<\/p>\n<h2>\u30aa\u30fc\u30b9\u30c8\u30e9\u30ea\u30a2\u306e\u91cd\u8981\u306a\u30a4\u30f3\u30d5\u30e9\u30b9\u30c8\u30e9\u30af\u30c1\u30e3\u306e\u73fe\u5728\u3068\u5c06\u6765\u306e\u4fdd\u8b77<\/h2>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section9_text&#8221;]<span class=\"TextRun SCXW70713111 BCX0\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW70713111 BCX0\">\u30aa\u30fc\u30b9\u30c8\u30e9\u30ea\u30a2\u306e\u91cd\u8981\u30a4\u30f3\u30d5\u30e9\u30b9\u30c8\u30e9\u30af\u30c1\u30e3\u306b\u5bfe\u3059\u308b\u7834\u58ca\u5de5\u4f5c\u3001<\/span><span class=\"NormalTextRun SCXW70713111 BCX0\">\u30b9\u30d1\u30a4\u6d3b\u52d5<\/span><span class=\"NormalTextRun SCXW70713111 BCX0\">\u3001\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306a\u3069\u3001\u56fd\u5bb6\u5b89\u5168\u4fdd\u969c\u4e0a\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30ea\u30b9\u30af\u7ba1\u7406\u306e\u8a73\u7d30\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002<\/span><\/span>[\/vc_column_text][vc_btn title=&#8221;\u7d9a\u304d\u3092\u8aad\u3080&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; align=&#8221;center&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fcritical-infrastructure-australia%2F|&#8221; el_class=&#8221;cybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2-pad cybv2 cybv2-background-oval tour&#8221;][vc_column][vc_row_inner el_class=&#8221;cyb-center&#8221;][vc_column_inner el_class=&#8221;cyb-pad-btm&#8221;][vc_column_text el_class=&#8221;left-mobile&#8221;]<\/p>\n<h3>\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306b\u5bfe\u3059\u308b\u591a\u5c64\u9632\u5fa1\u6226\u7565\u306e\u5c0e\u5165<\/h3>\n<p>\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f53\u5236\u3092\u5f37\u5316\u3057\u3001\u52d5\u7684\u306a\u8105\u5a01\u306b\u3055\u3089\u3055\u308c\u308b\u6a5f\u4f1a\u3092\u6e1b\u3089\u3057\u307e\u3059\u3002[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=&#8221;square&#8221; active_section=&#8221;1&#8243; css_animation=&#8221;none&#8221;][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;\u7279\u6a29\u30a2\u30af\u30bb\u30b9\u306e\u4fdd\u8b77&#8221; tab_id=&#8221;privileged-access&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>\u7279\u6a29\u30a2\u30af\u30bb\u30b9\u306e\u4fdd\u8b77<\/h4>\n<p>\u9577\u5e74\u306b\u308f\u305f\u308b\u9ad8\u30ec\u30d9\u30eb\u306e\u7279\u6a29\u30a2\u30af\u30bb\u30b9\u304b\u3089\u3001\u3088\u308a\u30c0\u30a4\u30ca\u30df\u30c3\u30af\u3067\u30b8\u30e3\u30b9\u30c8\u30a4\u30f3\u30bf\u30a4\u30e0\u306e\u7ba1\u7406\u8005\u30a2\u30af\u30bb\u30b9\u65b9\u5f0f\u3078\u3068\u79fb\u884c\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u4e07\u304c\u4e00\u3001\u7279\u6a29\u30a2\u30ab\u30a6\u30f3\u30c8\u304c\u60aa\u610f\u306e\u3042\u308b\u884c\u70ba\u8005\u306b\u72d9\u308f\u308c\u305f\u5834\u5408\u3001\u653b\u6483\u5bfe\u8c61\u9818\u57df\u3068\u7206\u767a\u534a\u5f84\u3092\u5c0f\u3055\u304f\u3059\u308b\u305f\u3081\u306b\u3001\u30b9\u30bf\u30c3\u30d5\u3084\u8acb\u8ca0\u696d\u8005\u3078\u306e\u30a2\u30af\u30bb\u30b9\u306f\u6700\u5c0f\u9650\u306e\u6a29\u9650\u3067\u8a31\u53ef\u3055\u308c\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/ja\/products\/privileged-access\/\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119610\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1.png\" alt=\"Amazon WorkSpaces \u306e\u4fdd\u8b77\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306e\u4fdd\u8b77&#8221; tab_id=&#8221;secure-endpoints&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306e\u4fdd\u8b77<\/h4>\n<p>\u4fb5\u5bb3\u3055\u308c\u305f\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306f\u3001\u653b\u6483\u8005\u304c\u5f37\u529b\u306a\u8a8d\u8a3c\u3092\u56de\u907f\u3059\u308b\u305f\u3081\u306b\u4f7f\u7528\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u305d\u306e\u305f\u3081\u3001\u627f\u8a8d\u3055\u308c\u305f\u30d7\u30ed\u30bb\u30b9\u306e\u307f\u304c\u8a8d\u8a3c\u60c5\u5831\u30b9\u30c8\u30a2\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u3088\u3046\u306b\u5236\u5fa1\u3059\u308b\u3053\u3068\u304c\u4e0d\u53ef\u6b20\u3067\u3059\u3002\u3053\u308c\u306f\u3001\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306b\u304a\u3051\u308b\u6700\u5c0f\u7279\u6a29\u306e\u539f\u5247\u306e\u5c0e\u5165\u3068\u30ed\u30fc\u30ab\u30eb\u7ba1\u7406\u8005\u6a29\u9650\u306e\u524a\u9664\u3068\u3044\u3046\u57fa\u672c\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u30cf\u30a4\u30b8\u30fc\u30f3\u306b\u57fa\u3065\u3044\u3066\u3044\u307e\u3059\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/ja\/products\/endpoint-privilege-security\/\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119618\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2.png\" alt=\"\u6700\u5c0f\u7279\u6a29\u306e\u539f\u5247\u306e\u9069\u7528\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3 \u30a2\u30af\u30bb\u30b9\u306e\u4fdd\u8b77&#8221; tab_id=&#8221;secure-application-access&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>\u5b89\u5168\u306a\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3 \u30a2\u30af\u30bb\u30b9<\/h4>\n<p>\u5f37\u529b\u306a\u9069\u5fdc\u578b\u8a8d\u8a3c\u3068\u7d99\u7d9a\u7684\u306a\u627f\u8a8d\u3068\u8a8d\u53ef\u306f\u3001\u30b9\u30bf\u30c3\u30d5\u306e\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3078\u306e\u30a2\u30af\u30bb\u30b9\u3092\u4fdd\u8b77\u3059\u308b\u305f\u3081\u306e\u57fa\u76e4\u3068\u306a\u308a\u307e\u3059\u3002\u3053\u306e\u3088\u3046\u306b\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u5236\u5fa1\u304b\u3089\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u5236\u5fa1\u3078\u306e\u79fb\u884c\u306f\u3001\u3088\u308a\u826f\u3044\u30e6\u30fc\u30b6\u30fc \u30a8\u30af\u30b9\u30da\u30ea\u30a8\u30f3\u30b9\u3092\u751f\u307f\u51fa\u3057\u3001\u751f\u7523\u6027\u3092\u5411\u4e0a\u3055\u305b\u307e\u3059\u3002\u60aa\u610f\u306e\u3042\u308b\u653b\u6483\u8005\u3092\u963b\u6b62\u3057\u306a\u304c\u3089\u3001\u30b9\u30bf\u30c3\u30d5\u306b\u6a29\u9650\u3092\u4e0e\u3048\u307e\u3059\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/ja\/products\/access-management\/\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119626\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3.png\" alt=\"\u5f37\u56fa\u306a\u8a8d\u8a3c\u3092\u6709\u52b9\u306b\u3059\u308b\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;\u4eba\u4ee5\u5916\u306e\u30a2\u30af\u30bb\u30b9\u8981\u6c42\u306e\u4fdd\u8b77&#8221; tab_id=&#8221;secure-non-human-access-requests&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>\u4eba\u4ee5\u5916\u306e\u30a2\u30af\u30bb\u30b9\u8981\u6c42\u306e\u4fdd\u8b77<\/h4>\n<p>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u300c\u4f55\u3082\u4fe1\u7528\u305b\u305a\u3001\u5e38\u306b\u691c\u8a3c\u3059\u308b\u300d\u3068\u3044\u3046\u539f\u5247\u306f\u3001\u4eba\u4ee5\u5916\u306e\u30de\u30b7\u30f3\u306a\u3069\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306b\u3082\u9069\u7528\u3057\u306a\u3051\u308c\u3070\u306a\u308a\u307e\u305b\u3093\u3002\u30cd\u30c3\u30c8\u30ef\u30fc\u30af \u30ea\u30bd\u30fc\u30b9\u3078\u306e\u30a2\u30af\u30bb\u30b9\u3092\u6c42\u3081\u308b\u3053\u308c\u3089\u306e\u30de\u30b7\u30f3 \u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u304b\u3089\u306e\u547c\u3073\u51fa\u3057\u306f\u3059\u3079\u3066\u4fdd\u8b77\u3055\u308c\u3001DevOps \u30d1\u30a4\u30d7\u30e9\u30a4\u30f3\u5168\u4f53\u3067\u30b7\u30fc\u30af\u30ec\u30c3\u30c8\u304c\u9069\u5207\u306b\u7ba1\u7406\u3055\u308c\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/ja\/products\/secrets-management\/\">\u8a73\u7d30\u3092\u78ba\u8a8d<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119733\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecureBotsandVirtualAgents-1.png\" alt=\"\u4eba\u4ee5\u5916\u306e\u30a2\u30af\u30bb\u30b9\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecureBotsandVirtualAgents-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecureBotsandVirtualAgents-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecureBotsandVirtualAgents-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cyb-pad-btm&#8221;][vc_column width=&#8221;2\/3&#8243; el_class=&#8221;text-center&#8221; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_column_text]<\/p>\n<h2>\u5c0e\u5165\u4e8b\u4f8b<\/h2>\n<p>\u5927\u624b\u4f01\u696d\u3084\u653f\u5e9c\u6a5f\u95a2\u304c CyberArk \u3092\u6d3b\u7528\u3057\u3066\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u6210\u529f\u3055\u305b\u305f\u4e8b\u4f8b\u3092\u3054\u78ba\u8a8d\u304f\u3060\u3055\u3044\u3002[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cyb-pad-btm&#8221;][vc_column][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0iY3VzdG9tZXJfc3RvcnkiIHBvc3RzX3Blcl9wYWdlPSI0IiBjb2x1bW5zX2xhcmdlPSIzIiBzaG93X2F1dGhvcj0iZmFsc2UiIHNob3dfZXhjZXJwdD0iZmFsc2UiIHBvczFfaWQ9IjEzMTA4NiIgcG9zMl9pZD0iMTI4MzE0IiBwb3MzX2lkPSIxMjg0NTAiIHBvczRfaWQ9IjEzNTYyMSJd[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_full_width_resource\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_title\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5 style=\"text-align: center;\">\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3:<br \/>\n\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30c8\u306a\u7279\u6a29\u5236\u5fa1\u3092\u4e2d\u5fc3\u306b<\/h5>\n<p><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section5_container\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_center   new_hpstyle_section5_gart_img\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"Professional woman with glasses standing confidently against a dark background with a glowing triangular frame\" title=\"gartner-300x300\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1-100x100.jpg 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>2025 \u5e74 Gartner\u00ae MagicQuadrant\u2122 \u306e\u7279\u6a29\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u90e8\u9580<\/h4>\n<p><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container  cybv2-button-solid cyb-button-hpstyle_section5 vc_btn3-inline\"  >\n\t<a class=\"vc_btn3-color-grey\" href=\"https:\/\/lp.cyberark.com\/gartner-mq-pam-2025-ja.html\" title=\"\" target=\"_blank\">\u30ec\u30dd\u30fc\u30c8\u306e\u8868\u793a<\/a><\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources&#8221; css=&#8221;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_column_text el_class=&#8221;no-break&#8221;]<\/p>\n<h3>\u95a2\u9023\u30ea\u30bd\u30fc\u30b9\u3092\u898b\u308b<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\">\u5168\u3066\u306e\u30ea\u30bd\u30fc\u30b9\u3092\u8868\u793a<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8221;][vc_column el_class=&#8221;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8221;.vc_custom_1691480099229{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;new_hpstyle_section8_uberflip&#8221;]PCEtLSBVYmVyZmxpcCBFbWJlZGRlZCBIdWIgV2lkZ2V0IC0tPjxicj48YnI+ICA8ZGl2IGlkPSJVZkVtYmVkZGVkSHViMTY5MTQ4MDA2NDk3MSI+PC9kaXY+PGJyPjxicj4gIDxzY3JpcHQ+DQogIHdpbmRvdy5fdWZIdWJDb25maWcgPSB3aW5kb3cuX3VmSHViQ29uZmlnIHx8IFtdOw0KICB3aW5kb3cuX3VmSHViQ29uZmlnLnB1c2goew0KICAgICdjb250YWluZXJzJzp7J2FwcCc6JyNVZkVtYmVkZGVkSHViMTY5MTQ4MDA2NDk3MSd9LA0KICAgICdjb2xsZWN0aW9uJzogJzExMjA3OTIxJywNCiAgICAnb3BlbkxpbmsnOmZ1bmN0aW9uKHVybCl7DQogICAgICB3aW5kb3cudG9wLmxvY2F0aW9uLmhyZWY9dXJsOw0KICAgIH0sDQogICAgJ2xhenlsb2FkZXInOnsNCiAgICAgICdpdGVtRGlzcGxheUxpbWl0JzoyMCwNCiAgICAgICdtYXhUaWxlc1BlclJvdyc6NCwNCiAgICAgICdtYXhJdGVtc1RvdGFsJzogMA0KICAgIH0sDQogICAgJ3RpbGVTaXplJzogJ2xhcmdlJywNCiAgICAnZW5hYmxlUGFnZVRyYWNraW5nJzpmYWxzZSwNCiAgICAnYmFzZVVybCc6ICdodHRwczovL3d3dy5jeWJlcmFyay5jb20vcmVzb3VyY2VzLycsDQogICAgJ2ZpbGVzVXJsJzogJ2h0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9yZXNvdXJjZXMvJywNCiAgICAnZ2VuZXJhdGVkQXRVVEMnOiAnMjAyMy0wOC0wOCAwNzozNDowMCcsDQogIH0pOw0KICA8L3NjcmlwdD48YnI+PGJyPiAgPHNjcmlwdD4oZnVuY3Rpb24oZCx0LHUpIHsNCiAgICBmdW5jdGlvbiBsb2FkKCl7DQogICAgICB2YXIgcz1kLmNyZWF0ZUVsZW1lbnQodCk7cy5zcmM9dTtkLmJvZHkuYXBwZW5kQ2hpbGQocyk7DQogICAgfQ0KICAgIGlmICh3aW5kb3cuYWRkRXZlbnRMaXN0ZW5lcikgew0KICAgICAgd2luZG93LmFkZEV2ZW50TGlzdGVuZXIoJ2xvYWQnLGxvYWQsZmFsc2UpOw0KICAgIH0NCiAgICBlbHNlIGlmICh3aW5kb3cuYXR0YWNoRXZlbnQpIHsNCiAgICAgIHdpbmRvdy5hdHRhY2hFdmVudCgnb25sb2FkJyxsb2FkKTsNCiAgICB9DQogICAgZWxzZXsNCiAgICAgIHdpbmRvdy5vbmxvYWQ9bG9hZDsNCiAgICB9DQogIH0oZG9jdW1lbnQsJ3NjcmlwdCcsJ2h0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9yZXNvdXJjZXMvaHVic0Zyb250L2VtYmVkX2NvbGxlY3Rpb24nKSk7DQogIDwvc2NyaXB0Pjxicj4gIDwhLS0gL0VuZCBVYmVyZmxpcCBFbWJlZGRlZCBIdWIgV2lkZ2V0IC0tPg==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_id=&#8221;form&#8221;][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1690896313684{background-color: #f7f7f7 !important;}&#8221; el_class=&#8221;cybv2 cybv2-pad-top hv-cta&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;left-clmn&#8221;][vc_column_text]<\/p>\n<h2>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3078\u306e\u65c5\u3092\u59cb\u3081\u307e\u3057\u3087\u3046<\/h2>\n<p>\n[\/vc_column_text][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3068\u6700\u5c0f\u7279\u6a29\u3092\u5f37\u5316\u3057\u3001\u30c7\u30d0\u30a4\u30b9\u3068\u74b0\u5883\u5168\u4f53\u3067\u4eba\u3068\u30de\u30b7\u30f3\u306e\u30a2\u30af\u30bb\u30b9\u3092\u30b7\u30fc\u30e0\u30ec\u30b9\u306b\u4fdd\u8b77\u3057\u307e\u3059\u3002[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30c8\u306a\u7279\u6a29\u5236\u5fa1\u3092\u3042\u3089\u3086\u308b\u5f62\u5f0f\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306b\u9069\u7528\u3059\u308b\u3053\u3068\u3067\u3001\u653b\u6483\u3092\u9694\u96e2\u3057\u3066\u963b\u6b62\u3057\u3001\u91cd\u8981\u306a\u8cc7\u7523\u3092\u4fdd\u8b77\u3057\u3001\u9069\u5207\u306a\u6642\u9593\u3060\u3051\u30a2\u30af\u30bb\u30b9\u3092\u8a31\u53ef\u3057\u307e\u3059\u3002<br \/>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]\u30b7\u30fc\u30e0\u30ec\u30b9\u3067\u30ce\u30fc\u30b3\u30fc\u30c9\u306e\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u7d71\u5408\u3068\u30ef\u30fc\u30af\u30d5\u30ed\u30fc\u306b\u3088\u308a\u3001\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3 \u30e9\u30a4\u30d5\u30b5\u30a4\u30af\u30eb\u306e\u7ba1\u7406\u3092\u81ea\u52d5\u5316\u3057\u3001\u904e\u5270\u306a\u30a2\u30af\u30bb\u30b9\u6a29\u9650\u3092\u6392\u9664\u3057\u307e\u3059\u3002 [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]\u30ea\u30a2\u30eb\u30bf\u30a4\u30e0\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3092\u901a\u3058\u3066\u8105\u5a01\u3092\u7d99\u7d9a\u7684\u306b\u76e3\u8996\u3057\u3001\u30ea\u30b9\u30af\u306b\u57fa\u3065\u3044\u3066\u5bfe\u5fdc\u3092\u8abf\u6574\u3057\u307e\u3059\u3002\u307e\u305f\u3001\u30ea\u30a2\u30eb\u30bf\u30a4\u30e0\u306e\u4fee\u5fa9\u30aa\u30d7\u30b7\u30e7\u30f3\u3092\u6d3b\u7528\u3067\u304d\u307e\u3059\u3002[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8221;106859&#8243; img_size=&#8221;full&#8221; el_class=&#8221;d-none d-md-block&#8221;][\/vc_column][vc_column width=&#8221;1\/12&#8243; css=&#8221;.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;right-clmn cybv2-form&#8221;][vc_column_text el_class=&#8221;bold&#8221;]<\/p>\n<h4>\u30c7\u30e2\u3092\u7533\u3057\u8fbc\u3080<\/h4>\n<p>\n[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iNDUzMyIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS90aGFuay15b3UtcmVxdWVzdC1kZW1vLyJd[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":67730,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-187030","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u653f\u5e9c | CyberArk<\/title>\n<meta name=\"description\" content=\"\u3044\u3064\u3067\u3082\u3001\u3069\u3053\u3067\u3082\u3001\u3069\u306e\u3088\u3046\u306a\u30c7\u30d0\u30a4\u30b9\u304b\u3089\u3067\u3082\u3001\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306b\u5b89\u5168\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u307e\u3059\u3002\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3067\u3001\u3042\u3089\u3086\u308b\u30ec\u30d9\u30eb\u306e\u653f\u5e9c\u6a5f\u95a2\u306e\u6a5f\u5bc6\u30c7\u30fc\u30bf\u3068\u91cd\u8981\u306a\u30a4\u30f3\u30d5\u30e9\u3092\u4fdd\u8b77\u3057\u307e\u3059\u3002\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/government\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u653f\u5e9c\" \/>\n<meta property=\"og:description\" content=\"\u3044\u3064\u3067\u3082\u3001\u3069\u3053\u3067\u3082\u3001\u3069\u306e\u3088\u3046\u306a\u30c7\u30d0\u30a4\u30b9\u304b\u3089\u3067\u3082\u3001\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306b\u5b89\u5168\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u307e\u3059\u3002\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3067\u3001\u3042\u3089\u3086\u308b\u30ec\u30d9\u30eb\u306e\u653f\u5e9c\u6a5f\u95a2\u306e\u6a5f\u5bc6\u30c7\u30fc\u30bf\u3068\u91cd\u8981\u306a\u30a4\u30f3\u30d5\u30e9\u3092\u4fdd\u8b77\u3057\u307e\u3059\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/government\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-22T18:33:28+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"11\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/government\/\",\"name\":\"\u653f\u5e9c | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\",\"datePublished\":\"2023-12-06T21:22:30+00:00\",\"dateModified\":\"2025-09-22T18:33:28+00:00\",\"description\":\"\u3044\u3064\u3067\u3082\u3001\u3069\u3053\u3067\u3082\u3001\u3069\u306e\u3088\u3046\u306a\u30c7\u30d0\u30a4\u30b9\u304b\u3089\u3067\u3082\u3001\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306b\u5b89\u5168\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u307e\u3059\u3002\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3067\u3001\u3042\u3089\u3086\u308b\u30ec\u30d9\u30eb\u306e\u653f\u5e9c\u6a5f\u95a2\u306e\u6a5f\u5bc6\u30c7\u30fc\u30bf\u3068\u91cd\u8981\u306a\u30a4\u30f3\u30d5\u30e9\u3092\u4fdd\u8b77\u3057\u307e\u3059\u3002\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/government\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u653f\u5e9c\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u653f\u5e9c | CyberArk","description":"\u3044\u3064\u3067\u3082\u3001\u3069\u3053\u3067\u3082\u3001\u3069\u306e\u3088\u3046\u306a\u30c7\u30d0\u30a4\u30b9\u304b\u3089\u3067\u3082\u3001\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306b\u5b89\u5168\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u307e\u3059\u3002\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3067\u3001\u3042\u3089\u3086\u308b\u30ec\u30d9\u30eb\u306e\u653f\u5e9c\u6a5f\u95a2\u306e\u6a5f\u5bc6\u30c7\u30fc\u30bf\u3068\u91cd\u8981\u306a\u30a4\u30f3\u30d5\u30e9\u3092\u4fdd\u8b77\u3057\u307e\u3059\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/government\/","og_locale":"ja_JP","og_type":"article","og_title":"\u653f\u5e9c","og_description":"\u3044\u3064\u3067\u3082\u3001\u3069\u3053\u3067\u3082\u3001\u3069\u306e\u3088\u3046\u306a\u30c7\u30d0\u30a4\u30b9\u304b\u3089\u3067\u3082\u3001\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306b\u5b89\u5168\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u307e\u3059\u3002\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3067\u3001\u3042\u3089\u3086\u308b\u30ec\u30d9\u30eb\u306e\u653f\u5e9c\u6a5f\u95a2\u306e\u6a5f\u5bc6\u30c7\u30fc\u30bf\u3068\u91cd\u8981\u306a\u30a4\u30f3\u30d5\u30e9\u3092\u4fdd\u8b77\u3057\u307e\u3059\u3002","og_url":"https:\/\/www.cyberark.com\/solutions\/government\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-09-22T18:33:28+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"11\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/government\/","url":"https:\/\/www.cyberark.com\/solutions\/government\/","name":"\u653f\u5e9c | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg","datePublished":"2023-12-06T21:22:30+00:00","dateModified":"2025-09-22T18:33:28+00:00","description":"\u3044\u3064\u3067\u3082\u3001\u3069\u3053\u3067\u3082\u3001\u3069\u306e\u3088\u3046\u306a\u30c7\u30d0\u30a4\u30b9\u304b\u3089\u3067\u3082\u3001\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306b\u5b89\u5168\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u307e\u3059\u3002\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3067\u3001\u3042\u3089\u3086\u308b\u30ec\u30d9\u30eb\u306e\u653f\u5e9c\u6a5f\u95a2\u306e\u6a5f\u5bc6\u30c7\u30fc\u30bf\u3068\u91cd\u8981\u306a\u30a4\u30f3\u30d5\u30e9\u3092\u4fdd\u8b77\u3057\u307e\u3059\u3002","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/government\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/government\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/government\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"\u653f\u5e9c"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/pages\/187030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/comments?post=187030"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/pages\/187030\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/pages\/67730"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/media?parent=187030"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/product_category?post=187030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}