{"id":67,"date":"2015-03-10T06:50:55","date_gmt":"2015-03-09T21:50:55","guid":{"rendered":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/industry\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/"},"modified":"2018-09-27T12:18:34","modified_gmt":"2018-09-27T03:18:34","slug":"enterprise-security-lessons-from-the-public-sector","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/","title":{"rendered":"\u516c\u7684\u6a5f\u95a2\u304b\u3089\u5b66\u3076\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u9762\u306e\u77e5\u8b58"},"content":{"rendered":"

\u516c\u7684\u6a5f\u95a2\u306b\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u554f\u984c\u89e3\u6c7a\u306e\u30ce\u30a6\u30cf\u30a6\u304c\u84c4\u7a4d\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u6700\u65b0\u306e\u30db\u30ef\u30a4\u30c8\u30da\u30fc\u30d1\u30fc\u3067\u3001\u30d2\u30f3\u30c8\u3092\u3054\u7d39\u4ecb\u3057\u307e\u3059\u3002<\/strong><\/p>\n

\"enterprise-security-lessons-from-the-public-sector\"<\/p>\n

 <\/p>\n

\u4e16\u9593\u4e00\u822c\u306e\u901a\u5ff5\u3067\u306f\u3001\u516c\u7684\u6a5f\u95a2\u306f\u73fe\u4ee3\u7684\u306a\u4f01\u696d\u304b\u3089\u5b66\u3079\u308b\u70b9\u304c\u591a\u3044\u3068\u3044\u3046\u3053\u3068\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u304c\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30d9\u30b9\u30c8 \u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306b\u3064\u3044\u3066\u306f\u3001\u305d\u306e\u7acb\u5834\u304c\u9006\u8ee2\u3059\u308b\u5834\u5408\u304c\u3042\u308a\u307e\u3059\u3002\u3053\u306e\u5341\u6570\u5e74\u306e\u9593\u306b\u5168\u56fd\u7684\u30fb\u5730\u57df\u7684\u306a\u591a\u6570\u306e\u8105\u5a01\u306b\u53d6\u308a\u7d44\u3093\u3067\u304d\u305f\u6700\u524d\u7dda\u306e\u516c\u7684\u6a5f\u95a2\u304b\u3089\u3001\u4f01\u696d\u304c\u5b66\u3079\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u9762\u306e\u8cb4\u91cd\u306a\u77e5\u8b58\u306f\u5c11\u306a\u304f\u3042\u308a\u307e\u305b\u3093\u3002<\/p>\n

\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u306e\u65b0\u3057\u3044\u30db\u30ef\u30a4\u30c8 \u30da\u30fc\u30d1\u30fc\u300c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u5fdc\u306e\u90fd\u5e02\u6226\u7565\u3092\u69cb\u7bc9\u3059\u308b (\u82f1\u8a9e)<\/a>\u300d\u3067\u306f\u3001\u5730\u65b9\u81ea\u6cbb\u4f53\u306e\u9996\u9577\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5f37\u5316\u3059\u308b\u305f\u3081\u306b\u63a1\u7528\u3057\u3066\u3044\u308b\u3001\u5b9f\u7528\u7684\u306a\u30c6\u30af\u30cb\u30c3\u30af\u3084\u6226\u7565\u3092\u7d39\u4ecb\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u30ec\u30dd\u30fc\u30c8\u306b\u306f\u3001\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u304c\u56fd\u3084\u5730\u65b9\u81ea\u6cbb\u4f53\u306e\u6a5f\u95a2\u3068\u306e\u9023\u643a\u3067\u57f9\u3063\u3066\u304d\u305f\u9577\u5e74\u306b\u308f\u305f\u308b\u7d4c\u9a13\u306b\u57fa\u3065\u304f 7 \u3064\u306e\u30b9\u30c6\u30c3\u30d7\u304c\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002\u4f01\u696d\u306f\u3053\u308c\u3092\u5229\u7528\u3057\u3001\u516c\u7684\u6a5f\u95a2\u3084\u4eba\u53e3\u306e\u591a\u3044\u591a\u6570\u306e\u90fd\u5e02\u306b\u9069\u7528\u3067\u304d\u308b\u3088\u3046\u306a\u3001\u5909\u9769\u7684\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30d7\u30ed\u30b0\u30e9\u30e0\u3092\u4f5c\u6210\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"

\u516c\u7684\u6a5f\u95a2\u306b\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u554f\u984c\u89e3\u6c7a\u306e\u30ce\u30a6\u30cf\u30a6\u304c\u84c4\u7a4d\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u6700\u65b0\u306e\u30db\u30ef\u30a4\u30c8\u30da\u30fc\u30d1\u30fc\u3067\u3001\u30d2\u30f3\u30c8\u3092\u3054\u7d39\u4ecb\u3057\u307e\u3059\u3002<\/p>\n","protected":false},"author":223,"featured_media":429,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[48],"post_tag":[],"content-type":[],"coauthors":[12,76],"class_list":["post-67","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government"],"yoast_head":"\n\u516c\u7684\u6a5f\u95a2\u304b\u3089\u5b66\u3076\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u9762\u306e\u77e5\u8b58 - \u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u696d\u754c\u5225\u306e\u8a18\u4e8b<\/title>\n<meta name=\"description\" content=\"\u516c\u7684\u6a5f\u95a2\u306b\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u554f\u984c\u89e3\u6c7a\u306e\u30ce\u30a6\u30cf\u30a6\u304c\u84c4\u7a4d\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u6700\u65b0\u306e\u30db\u30ef\u30a4\u30c8\u30da\u30fc\u30d1\u30fc\u3067\u3001\u30d2\u30f3\u30c8\u3092\u3054\u7d39\u4ecb\u3057\u307e\u3059\u3002\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u516c\u7684\u6a5f\u95a2\u304b\u3089\u5b66\u3076\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u9762\u306e\u77e5\u8b58 - \u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u696d\u754c\u5225\u306e\u8a18\u4e8b\" \/>\n<meta property=\"og:description\" content=\"\u516c\u7684\u6a5f\u95a2\u306b\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u554f\u984c\u89e3\u6c7a\u306e\u30ce\u30a6\u30cf\u30a6\u304c\u84c4\u7a4d\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u6700\u65b0\u306e\u30db\u30ef\u30a4\u30c8\u30da\u30fc\u30d1\u30fc\u3067\u3001\u30d2\u30f3\u30c8\u3092\u3054\u7d39\u4ecb\u3057\u307e\u3059\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/\" \/>\n<meta property=\"og:site_name\" content=\"\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u696d\u754c\u5225\u306e\u8a18\u4e8b\" \/>\n<meta property=\"article:published_time\" content=\"2015-03-09T21:50:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-09-27T03:18:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-content\/uploads\/sites\/12\/2016\/02\/enterprise-security-lessons-from-the-public-sector_gridimage.png\" \/>\n\t<meta property=\"og:image:width\" content=\"290\" \/>\n\t<meta property=\"og:image:height\" content=\"125\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"\u30dd\u30fc\u30eb \u30cb\u30b3\u30e9\u30b9 (Paul Nicholas), \u30af\u30ea\u30b9\u30c6\u30a3\u30f3 \u30b0\u30c3\u30c9\u30a6\u30a3\u30f3 (Cristin Goodwin)\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u30dd\u30fc\u30eb \u30cb\u30b3\u30e9\u30b9 (Paul Nicholas), \u30af\u30ea\u30b9\u30c6\u30a3\u30f3 \u30b0\u30c3\u30c9\u30a6\u30a3\u30f3 (Cristin Goodwin)\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"<1 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/author\/%e3%83%9d%e3%83%bc%e3%83%ab-%e3%83%8b%e3%82%b3%e3%83%a9%e3%82%b9-paul-nicholas-%e3%82%af%e3%83%aa%e3%82%b9%e3%83%86%e3%82%a3%e3%83%b3-%e3%82%b0%e3%83%83%e3%83%89%e3%82%a6%e3%82%a3%e3%83%b3-cristi\/\",\"@type\":\"Person\",\"@name\":\"\u30dd\u30fc\u30eb \u30cb\u30b3\u30e9\u30b9 (Paul Nicholas)\"},{\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/author\/%e3%82%af%e3%83%aa%e3%82%b9%e3%83%86%e3%82%a3%e3%83%b3-%e3%82%b0%e3%83%83%e3%83%89%e3%82%a6%e3%82%a3%e3%83%b3-cristin-goodwin\/\",\"@type\":\"Person\",\"@name\":\"\u30af\u30ea\u30b9\u30c6\u30a3\u30f3 \u30b0\u30c3\u30c9\u30a6\u30a3\u30f3 (Cristin Goodwin)\"}],\"headline\":\"\u516c\u7684\u6a5f\u95a2\u304b\u3089\u5b66\u3076\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u9762\u306e\u77e5\u8b58\",\"datePublished\":\"2015-03-09T21:50:55+00:00\",\"dateModified\":\"2018-09-27T03:18:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/\"},\"wordCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-content\/uploads\/sites\/12\/2016\/02\/enterprise-security-lessons-from-the-public-sector_gridimage.png\",\"articleSection\":[\"\u653f\u5e9c\u30fb\u516c\u5171\u6a5f\u95a2\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/\",\"url\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/\",\"name\":\"\u516c\u7684\u6a5f\u95a2\u304b\u3089\u5b66\u3076\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u9762\u306e\u77e5\u8b58 - \u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u696d\u754c\u5225\u306e\u8a18\u4e8b\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-content\/uploads\/sites\/12\/2016\/02\/enterprise-security-lessons-from-the-public-sector_gridimage.png\",\"datePublished\":\"2015-03-09T21:50:55+00:00\",\"dateModified\":\"2018-09-27T03:18:34+00:00\",\"description\":\"\u516c\u7684\u6a5f\u95a2\u306b\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u554f\u984c\u89e3\u6c7a\u306e\u30ce\u30a6\u30cf\u30a6\u304c\u84c4\u7a4d\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u6700\u65b0\u306e\u30db\u30ef\u30a4\u30c8\u30da\u30fc\u30d1\u30fc\u3067\u3001\u30d2\u30f3\u30c8\u3092\u3054\u7d39\u4ecb\u3057\u307e\u3059\u3002\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-content\/uploads\/sites\/12\/2016\/02\/enterprise-security-lessons-from-the-public-sector_gridimage.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-content\/uploads\/sites\/12\/2016\/02\/enterprise-security-lessons-from-the-public-sector_gridimage.png\",\"width\":290,\"height\":125},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u516c\u7684\u6a5f\u95a2\u304b\u3089\u5b66\u3076\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u9762\u306e\u77e5\u8b58\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/\",\"name\":\"\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u696d\u754c\u5225\u306e\u8a18\u4e8b\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/#organization\",\"name\":\"\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u696d\u754c\u5225\u306e\u8a18\u4e8b\",\"url\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-content\/uploads\/sites\/12\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-content\/uploads\/sites\/12\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u696d\u754c\u5225\u306e\u8a18\u4e8b\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u516c\u7684\u6a5f\u95a2\u304b\u3089\u5b66\u3076\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u9762\u306e\u77e5\u8b58 - \u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u696d\u754c\u5225\u306e\u8a18\u4e8b","description":"\u516c\u7684\u6a5f\u95a2\u306b\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u554f\u984c\u89e3\u6c7a\u306e\u30ce\u30a6\u30cf\u30a6\u304c\u84c4\u7a4d\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u6700\u65b0\u306e\u30db\u30ef\u30a4\u30c8\u30da\u30fc\u30d1\u30fc\u3067\u3001\u30d2\u30f3\u30c8\u3092\u3054\u7d39\u4ecb\u3057\u307e\u3059\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/","og_locale":"en_US","og_type":"article","og_title":"\u516c\u7684\u6a5f\u95a2\u304b\u3089\u5b66\u3076\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u9762\u306e\u77e5\u8b58 - \u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u696d\u754c\u5225\u306e\u8a18\u4e8b","og_description":"\u516c\u7684\u6a5f\u95a2\u306b\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u554f\u984c\u89e3\u6c7a\u306e\u30ce\u30a6\u30cf\u30a6\u304c\u84c4\u7a4d\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u6700\u65b0\u306e\u30db\u30ef\u30a4\u30c8\u30da\u30fc\u30d1\u30fc\u3067\u3001\u30d2\u30f3\u30c8\u3092\u3054\u7d39\u4ecb\u3057\u307e\u3059\u3002","og_url":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/","og_site_name":"\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u696d\u754c\u5225\u306e\u8a18\u4e8b","article_published_time":"2015-03-09T21:50:55+00:00","article_modified_time":"2018-09-27T03:18:34+00:00","og_image":[{"width":290,"height":125,"url":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-content\/uploads\/sites\/12\/2016\/02\/enterprise-security-lessons-from-the-public-sector_gridimage.png","type":"image\/png"}],"author":"\u30dd\u30fc\u30eb \u30cb\u30b3\u30e9\u30b9 (Paul Nicholas), \u30af\u30ea\u30b9\u30c6\u30a3\u30f3 \u30b0\u30c3\u30c9\u30a6\u30a3\u30f3 (Cristin Goodwin)","twitter_card":"summary_large_image","twitter_misc":{"Written by":"\u30dd\u30fc\u30eb \u30cb\u30b3\u30e9\u30b9 (Paul Nicholas), \u30af\u30ea\u30b9\u30c6\u30a3\u30f3 \u30b0\u30c3\u30c9\u30a6\u30a3\u30f3 (Cristin Goodwin)","Est. reading time":"<1 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/author\/%e3%83%9d%e3%83%bc%e3%83%ab-%e3%83%8b%e3%82%b3%e3%83%a9%e3%82%b9-paul-nicholas-%e3%82%af%e3%83%aa%e3%82%b9%e3%83%86%e3%82%a3%e3%83%b3-%e3%82%b0%e3%83%83%e3%83%89%e3%82%a6%e3%82%a3%e3%83%b3-cristi\/","@type":"Person","@name":"\u30dd\u30fc\u30eb \u30cb\u30b3\u30e9\u30b9 (Paul Nicholas)"},{"@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/author\/%e3%82%af%e3%83%aa%e3%82%b9%e3%83%86%e3%82%a3%e3%83%b3-%e3%82%b0%e3%83%83%e3%83%89%e3%82%a6%e3%82%a3%e3%83%b3-cristin-goodwin\/","@type":"Person","@name":"\u30af\u30ea\u30b9\u30c6\u30a3\u30f3 \u30b0\u30c3\u30c9\u30a6\u30a3\u30f3 (Cristin Goodwin)"}],"headline":"\u516c\u7684\u6a5f\u95a2\u304b\u3089\u5b66\u3076\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u9762\u306e\u77e5\u8b58","datePublished":"2015-03-09T21:50:55+00:00","dateModified":"2018-09-27T03:18:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/"},"wordCount":1,"publisher":{"@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-content\/uploads\/sites\/12\/2016\/02\/enterprise-security-lessons-from-the-public-sector_gridimage.png","articleSection":["\u653f\u5e9c\u30fb\u516c\u5171\u6a5f\u95a2"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/","url":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/","name":"\u516c\u7684\u6a5f\u95a2\u304b\u3089\u5b66\u3076\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u9762\u306e\u77e5\u8b58 - \u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u696d\u754c\u5225\u306e\u8a18\u4e8b","isPartOf":{"@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-content\/uploads\/sites\/12\/2016\/02\/enterprise-security-lessons-from-the-public-sector_gridimage.png","datePublished":"2015-03-09T21:50:55+00:00","dateModified":"2018-09-27T03:18:34+00:00","description":"\u516c\u7684\u6a5f\u95a2\u306b\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u554f\u984c\u89e3\u6c7a\u306e\u30ce\u30a6\u30cf\u30a6\u304c\u84c4\u7a4d\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u6700\u65b0\u306e\u30db\u30ef\u30a4\u30c8\u30da\u30fc\u30d1\u30fc\u3067\u3001\u30d2\u30f3\u30c8\u3092\u3054\u7d39\u4ecb\u3057\u307e\u3059\u3002","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/#primaryimage","url":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-content\/uploads\/sites\/12\/2016\/02\/enterprise-security-lessons-from-the-public-sector_gridimage.png","contentUrl":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-content\/uploads\/sites\/12\/2016\/02\/enterprise-security-lessons-from-the-public-sector_gridimage.png","width":290,"height":125},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"\u516c\u7684\u6a5f\u95a2\u304b\u3089\u5b66\u3076\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u9762\u306e\u77e5\u8b58"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/#website","url":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/","name":"\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u696d\u754c\u5225\u306e\u8a18\u4e8b","description":"","publisher":{"@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/#organization","name":"\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u696d\u754c\u5225\u306e\u8a18\u4e8b","url":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-content\/uploads\/sites\/12\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-content\/uploads\/sites\/12\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u696d\u754c\u5225\u306e\u8a18\u4e8b"},"image":{"@id":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-json\/wp\/v2\/posts\/67","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-json\/wp\/v2\/users\/223"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-json\/wp\/v2\/comments?post=67"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-json\/wp\/v2\/posts\/67\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-json\/wp\/v2\/media\/429"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-json\/wp\/v2\/media?parent=67"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-json\/wp\/v2\/categories?post=67"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=67"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=67"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=67"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}