{"id":67408,"date":"2017-06-22T08:29:44","date_gmt":"2017-06-22T12:29:44","guid":{"rendered":"https:\/\/www.cyberark.com\/%e5%88%86%e6%9e%90%e3%81%a8%e8%84%85%e5%a8%81%e3%81%ae%e6%a4%9c%e5%87%ba\/"},"modified":"2019-08-29T16:41:41","modified_gmt":"2019-08-29T20:41:41","slug":"analytics-and-threat-detection","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/ja\/solutions\/analytics-and-threat-detection\/","title":{"rendered":"Analytics and Threat Detection"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/CYB_GEN_Hero_2880x1536.jpg) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero-section&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-hero-header&#8221;][vc_column_inner el_class=&#8221;cyb-hero-header-text&#8221;][vc_custom_heading text=&#8221;ANALYTICS AND THREAT DETECTION&#8221; font_container=&#8221;tag:h1|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=&#8221;.vc_custom_1538590410438{padding-top: 2rem !important;padding-bottom: 2rem !important;}&#8221;][vc_column_text]<\/p>\n<h4>Detect and respond to the most critical threats<\/h4>\n<p>Attackers are typically able to roam around a breached environment for more than a year before being detected. With attackers spending so much time freely and anonymously navigating the IT environment, security teams need to shift their focus inside the network and implement tools that help detect cyber attacks earlier in the lifecycle.<\/p>\n<p>CyberArk solutions help organizations detect and respond to the most critical risks with targeted threat analytics, focused on privileged account activity. Once attackers have access to privileged accounts, they are able to do irreparable damage by modifying system configurations, taking control of financial transactions, stealing confidential data, and disrupting business operations. CyberArk offers a threat detection solution that detects and alerts on anomalous privileged account and user behavior. Using patent-pending algorithms built-in to the solution, highly accurate and immediately actionable intelligence is delivered to security teams, enabling them to respond directly to potential threats.<\/p>\n<p>Key benefits:<\/p>\n<ul>\n<li>Dramatically shorten an attacker\u2019s window of opportunity and reduce damage with accurate and prioritized real-time alerting on in-progress attacks<\/li>\n<li>Rapidly detect attacks with analysis based on customized algorithms, eliminating the dependence on prior knowledge of attack signatures or sandboxing<\/li>\n<li>Adapt threat detection to a changing environment with self-learning algorithms that continuously adjust the baseline behavior profiles as the environment evolves<\/li>\n<li>Continuously monitor with zero footprint session recording on target machines for forensic insight into malicious, command-level activity<\/li>\n<li>Enable security operations and incident response teams to accelerate remediation with immediate access to detailed information about the attack<\/li>\n<li>Enhance effectiveness of SIEM systems by enabling incident response teams to <a href=\"https:\/\/www.cyberark.com\/products\/privileged-account-security-solution\/privileged-threat-analytics\/\">identify anomalous privileged activities<\/a> and prioritize incidents that involve critical accounts<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/CYB_GEN_Hero_2880x1536.jpg) !important;background-position: center !i&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":67730,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-67408","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Enterprise Cyber Attack Threat Detection and Analytics | CyberArk<\/title>\n<meta name=\"description\" content=\"CyberArk solutions help organizations detect and respond to the most critical risks with targeted threat analytics, focused on privileged account activity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/ja\/solutions\/analytics-and-threat-detection\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analytics and Threat Detection\" \/>\n<meta property=\"og:description\" content=\"CyberArk solutions help organizations detect and respond to the most critical risks with targeted threat analytics, focused on privileged account activity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/ja\/solutions\/analytics-and-threat-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-29T20:41:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"2\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/ja\/solutions\/analytics-and-threat-detection\/\",\"url\":\"https:\/\/www.cyberark.com\/ja\/solutions\/analytics-and-threat-detection\/\",\"name\":\"Enterprise Cyber Attack Threat Detection and Analytics | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/ja\/#website\"},\"datePublished\":\"2017-06-22T12:29:44+00:00\",\"dateModified\":\"2019-08-29T20:41:41+00:00\",\"description\":\"CyberArk solutions help organizations detect and respond to the most critical risks with targeted threat analytics, focused on privileged account activity.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/ja\/solutions\/analytics-and-threat-detection\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/ja\/solutions\/analytics-and-threat-detection\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/ja\/solutions\/analytics-and-threat-detection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/ja\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\",\"item\":\"https:\/\/www.cyberark.com\/ja\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Analytics and Threat Detection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/ja\/#website\",\"url\":\"https:\/\/www.cyberark.com\/ja\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/ja\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/ja\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/ja\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/ja\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.cyberark.com\/ja\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/ja\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Enterprise Cyber Attack Threat Detection and Analytics | CyberArk","description":"CyberArk solutions help organizations detect and respond to the most critical risks with targeted threat analytics, focused on privileged account activity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/ja\/solutions\/analytics-and-threat-detection\/","og_locale":"ja_JP","og_type":"article","og_title":"Analytics and Threat Detection","og_description":"CyberArk solutions help organizations detect and respond to the most critical risks with targeted threat analytics, focused on privileged account activity.","og_url":"https:\/\/www.cyberark.com\/ja\/solutions\/analytics-and-threat-detection\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2019-08-29T20:41:41+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/ja\/solutions\/analytics-and-threat-detection\/","url":"https:\/\/www.cyberark.com\/ja\/solutions\/analytics-and-threat-detection\/","name":"Enterprise Cyber Attack Threat Detection and Analytics | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/ja\/#website"},"datePublished":"2017-06-22T12:29:44+00:00","dateModified":"2019-08-29T20:41:41+00:00","description":"CyberArk solutions help organizations detect and respond to the most critical risks with targeted threat analytics, focused on privileged account activity.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/ja\/solutions\/analytics-and-threat-detection\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/ja\/solutions\/analytics-and-threat-detection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/ja\/solutions\/analytics-and-threat-detection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/ja\/"},{"@type":"ListItem","position":2,"name":"\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3","item":"https:\/\/www.cyberark.com\/ja\/solutions\/"},{"@type":"ListItem","position":3,"name":"Analytics and Threat Detection"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/ja\/#website","url":"https:\/\/www.cyberark.com\/ja\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/ja\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.cyberark.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/pages\/67408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/comments?post=67408"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/pages\/67408\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/pages\/67730"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/media?parent=67408"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/product_category?post=67408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}