{"id":532,"date":"2025-06-01T22:25:00","date_gmt":"2025-06-02T02:25:00","guid":{"rendered":"https:\/\/www.softwareag.com\/?p=532"},"modified":"2026-03-17T14:14:49","modified_gmt":"2026-03-17T18:14:49","slug":"encryption-companies-and-authorities-report-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.softwareag.com\/ja\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","title":{"rendered":"\u6697\u53f7\u5316\u306b\u3088\u308a\u3001\u4f01\u696d\u3084\u5f53\u5c40\u306f\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306e\u5831\u544a\u7fa9\u52d9\u3092\u514d\u308c\u308b"},"content":{"rendered":"<p>\u4f01\u696d\u3084\u516c\u7684\u6a5f\u95a2\u306f\u3001\u5927\u91cf\u306e\u30c7\u30fc\u30bf\u3092\u4fdd\u5b58\u30fb\u51e6\u7406\u3059\u308b\u305f\u3081\u306b\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u306b\u4f9d\u5b58\u3057\u3066\u3044\u308b\u3002\u3053\u308c\u3089\u306e\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u306f\u901a\u5e38\u3001\u8ca1\u52d9\u30c7\u30fc\u30bf\uff08\u7d0d\u7a0e\u8a18\u9332\u3001\u9280\u884c\u53e3\u5ea7\u3001\u30af\u30ec\u30b8\u30c3\u30c8\u30ab\u30fc\u30c9\uff09\u3001\u500b\u4eba\u30c7\u30fc\u30bf\uff08\u81ea\u5b85\u4f4f\u6240\u3001\u4eba\u4e8b\u30d5\u30a1\u30a4\u30eb\uff09\u3001\u88fd\u54c1\u30c7\u30fc\u30bf\u306a\u3069\u3001\u30d3\u30b8\u30cd\u30b9\u30af\u30ea\u30c6\u30a3\u30ab\u30eb\u3067\u6a5f\u5bc6\u6027\u306e\u9ad8\u3044\u60c5\u5831\u3092\u7ba1\u7406\u3057\u3066\u3044\u308b\u3002\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u306f\u901a\u5e38\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3084\u30a6\u30a7\u30d6\u30b5\u30fc\u30d3\u30b9\u3068\u7d71\u5408\u3055\u308c\u3066\u3044\u308b\u305f\u3081\u3001\u793e\u5185\u5916\u306e\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u306b\u5bfe\u3057\u3066\u8106\u5f31\u306a\u307e\u307e\u3067\u3042\u308b\u3002<\/p>\n\n\n\n<p>\u591a\u304f\u306eCIO\u3084IT\u30ea\u30fc\u30c0\u30fc\u306f\u3001\u81ea\u793e\u306eIT\u30a4\u30f3\u30d5\u30e9\u306f\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u304b\u3089\u5341\u5206\u306b\u4fdd\u8b77\u3055\u308c\u3066\u3044\u308b\u3068\u8003\u3048\u3066\u3044\u308b\u3002\u30de\u30eb\u30c1\u30ec\u30d9\u30eb\u30fb\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u3001\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30fb\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3001\u4fb5\u5165\u691c\u77e5\u30fb\u9632\u5fa1\u30b7\u30b9\u30c6\u30e0\uff08IPS\uff09(1) \u306a\u3069\u306f\u3001\u8aa4\u3063\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u611f\u899a\u3092\u4e0e\u3048\u3066\u3044\u308b\u3002\u591a\u304f\u306e\u4eba\u304c\u8a8d\u8b58\u3057\u3066\u3044\u306a\u3044\u306e\u306f\u3001\u6700\u5927\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30b9\u30af\u306f\u3001\u3053\u308c\u3089\u306e\u30b7\u30b9\u30c6\u30e0\u3092\u4f7f\u7528\u3057\u3066\u3044\u308b\u5f93\u696d\u54e1\u3084\u95a2\u4fc2\u8005\u306e\u5185\u90e8\u304b\u3089\u3082\u305f\u3089\u3055\u308c\u308b\u3053\u3068\u304c\u591a\u3044\u3068\u3044\u3046\u3053\u3068\u3067\u3059\u3002<\/p>\n\n\n\n<p>\u5f93\u696d\u54e1\u3084\u95a2\u4fc2\u8005\u304c\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30e1\u30fc\u30eb\u3084\u6b3a\u779e\u7684\u306a\u793e\u5916\u96fb\u8a71\u306e\u990c\u98df\u306b\u306a\u308a\u3001\u7121\u610f\u8b58\u306e\u3046\u3061\u306b\u60aa\u610f\u306e\u3042\u308b\u30ea\u30f3\u30af\u3092\u30af\u30ea\u30c3\u30af\u3057\u305f\u308a\u3001\u6a5f\u5bc6\u60c5\u5831\u3092\u90e8\u5916\u8005\u3068\u5171\u6709\u3057\u305f\u308a\u3059\u308b\u3053\u3068\u304c\u3088\u304f\u3042\u308b\u3002\u3053\u308c\u306f\u3001\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30e1\u30fc\u30eb\u3084\u96fb\u8a71\u306e\u767a\u4fe1\u8005\u304c\u8105\u5a01\u3068\u3057\u3066\u8a8d\u8b58\u3055\u308c\u306a\u304f\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u304c\u539f\u56e0\u3067\u3042\u308b\u3053\u3068\u304c\u591a\u3044\u3002AI\u3092\u99c6\u4f7f\u3057\u305f\u6b3a\u779e\u306e\u9032\u5316\u306b\u3088\u308a\u3001\u4ee5\u4e0b\u306e\u3053\u3068\u304c\u307e\u3059\u307e\u3059\u96e3\u3057\u304f\u306a\u3063\u3066\u3044\u308b\u3002<br>\u8105\u5a01\u3092\u7279\u5b9a\u3059\u308b\u3002\u30b9\u30c8\u30ec\u30b9\u3084\u6642\u9593\u7684\u30d7\u30ec\u30c3\u30b7\u30e3\u30fc\u306f\u5224\u65ad\u529b\u306e\u6b20\u5982\u3092\u62db\u304d\u3001\u5f93\u696d\u54e1\u306f\u30b3\u30b9\u30c8\u306e\u304b\u304b\u308b\u30df\u30b9\u3092\u72af\u3057\u3084\u3059\u304f\u306a\u308b\u3002<\/p>\n\n\n\n<p>\u305d\u306e\u7d50\u679c\u3001\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306f\u6210\u529f\u3057\u7d9a\u3051\u3066\u3044\u308b\u3002\u6b27\u5dde\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u95a2\uff08ENISA\uff09\u306e\u6700\u8fd1\u306e\u8abf\u67fb(2)\u3067\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u5c02\u9580\u5bb6\u305f\u3061\u304c\u3001\u7279\u306b\u6b27\u5dde\u9023\u5408\uff08EU\uff09\u306e\u4f01\u696d\u3084\u5f53\u5c40\u304c\u904e\u53bb12\u30ab\u6708\u9593\u306b\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306e\u6a19\u7684\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u660e\u3089\u304b\u306b\u3057\u3066\u3044\u308b\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1-1024x538.jpg\" alt=\"\" class=\"wp-image-598\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1-1024x538.jpg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1-300x158.jpg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1-768x403.jpg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>EU\u304a\u3088\u3073\u5168\u4e16\u754c\u3067\u306e\u767a\u751f\u4ef6\u6570\uff082023\u5e747\u6708\uff5e2024\u5e746\u6708\uff09<\/p>\n\n\n\n<p>An analysis of individual sectors reveals that the public sector is particularly hard hit, accounting for 19% of attacks, followed by the transport sector (11%) and banking and finance (9%). This is not surprising\u2014many still remember the high-profile cyberattacks targeting the German Bundestag, municipalities, university hospitals, Dutch law enforcement, and Spanish citizens and authorities.<sup>(3-8)<\/sup><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2-1024x538.jpg\" alt=\"\" class=\"wp-image-599\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2-1024x538.jpg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2-300x158.jpg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2-768x403.jpg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>\u5f71\u97ff\u3092\u53d7\u3051\u308b\u30bb\u30af\u30bf\u30fc - \u516c\u5171\u90e8\u9580\u304c\u6700\u3082\u5f71\u97ff\u3092\u53d7\u3051\u308b\uff01\uff082023\u5e747\u6708\uff5e2024\u5e746\u6708\uff09<\/p>\n\n\n\n<p>\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u3092\u30ab\u30c6\u30b4\u30ea\u30fc\u5225\u306b\u5206\u985e\u3059\u308b\u3068\u3001\u4e3b\u306b\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u306b\u5bfe\u3059\u308b\u76f4\u63a5\u306e\u8105\u5a01\u306f45%\u3067\u3001\u305d\u306e\u3046\u306119%\u304c\u30c7\u30fc\u30bf\u4fb5\u5bb3\u300126%\u304c\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u653b\u6483\u3067\u3042\u308b\u3002 <sup>(2)<\/sup>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3-1024x538.jpg\" alt=\"\" class=\"wp-image-600\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3-1024x538.jpg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3-300x158.jpg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3-768x403.jpg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>\u8105\u5a01\u306e\u30bf\u30a4\u30d7\u5225\u5206\u6790<\/p>\n\n\n\n<p class=\"translation-block\">Under Article 32 of the <strong>GDPR<\/strong><sup>(9)<\/sup> (Security of Processing) the following is required: \u201c\u2026the controller and the processor shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk.\u201d<\/p>\n\n\n\n<p>\u5177\u4f53\u7684\u306b\u306f\u3001\u300c\u500b\u4eba\u60c5\u5831\u306e\u4eee\u540d\u5316\u30fb\u6697\u53f7\u5316\u300d\u304c\u6709\u52b9\u306a\u624b\u6bb5\u3067\u3042\u308b\u3068\u3057\u3066\u3044\u308b\u3002&nbsp;<\/p>\n\n\n\n<p class=\"translation-block\">Additionally, the <strong>German Federal Office for Information Security<\/strong> (BSI) also recommends encryption as a key strategy to minimize the risk of IT operations in its <strong>BSI Standards<sup>(10)<\/sup> 200-1 to 200-4.<\/strong><\/p>\n\n\n\n<p class=\"translation-block\">Under <strong>Article 33<\/strong> of the <strong>GDPR<\/strong><sup>(9)<\/sup> (Notification of a personal data breach to the supervisory authority), companies are required to notify a personal data breach to the supervisory authority within 72 hours of becoming aware of the breach. The data controller must notify the relevant supervisory authority in accordance with Article 55 unless the break is unlikely to risk individuals\u2019 rights. If the notification is delayed beyond 72 hours, an explanation for the delay must be provided.<\/p>\n\n\n\n<p>&nbsp;\u660e\u78ba\u306a\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u304c\u3042\u308b\u306b\u3082\u304b\u304b\u308f\u3089\u305a\u3001IT\u306e\u4e16\u754c\u3067\u306fGDPR\u306e\u5831\u544a\u8981\u4ef6\u306e\u6b63\u3057\u3044\u9069\u7528\u306b\u95a2\u3057\u3066\u4e0d\u78ba\u5b9f\u6027\u304c\u6b8b\u3063\u3066\u3044\u308b\u3002<\/p>\n\n\n\n<p class=\"translation-block\">To clarify this, the <strong>European Data Protection Board<\/strong> (EDPB) has developed guidelines<sup>(11)<\/sup>, including case studies.<\/p>\n\n\n\n<p class=\"translation-block\">In \u201c<strong>CASE No. 01: Ransomware with proper backup and without exfiltration<\/strong>,\u201d the following scenario is described:<\/p>\n\n\n\n<p>&nbsp;\u300c\u3042\u308b\u5c0f\u3055\u306a\u88fd\u9020\u4f1a\u793e\u306e\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30fc\u30fb\u30b7\u30b9\u30c6\u30e0\u304c\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u653b\u6483\u306b\u3055\u3089\u3055\u308c\u3001\u30b7\u30b9\u30c6\u30e0\u306b\u4fdd\u5b58\u3055\u308c\u3066\u3044\u305f\u30c7\u30fc\u30bf\u304c\u6697\u53f7\u5316\u3055\u308c\u305f\u3002\u30c7\u30fc\u30bf\u7ba1\u7406\u8005\u306f\u9759\u6b62\u6642\u306e\u6697\u53f7\u5316\u3092\u4f7f\u7528\u3057\u3066\u3044\u305f\u305f\u3081\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306b\u3088\u3063\u3066\u30a2\u30af\u30bb\u30b9\u3055\u308c\u305f\u30c7\u30fc\u30bf\u306f\u3059\u3079\u3066\u3001\u6700\u5148\u7aef\u306e\u6697\u53f7\u5316\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u3092\u4f7f\u7528\u3057\u3066\u6697\u53f7\u5316\u3055\u308c\u305f\u5f62\u3067\u4fdd\u5b58\u3055\u308c\u3066\u3044\u305f\u3002\u3064\u307e\u308a\u3001\u653b\u6483\u8005\u306f\u5fa9\u53f7\u5316\u30ad\u30fc\u306b\u30a2\u30af\u30bb\u30b9\u3059\u308b\u3053\u3068\u3082\u3001\u305d\u308c\u3092\u9593\u63a5\u7684\u306b\u4f7f\u7528\u3059\u308b\u3053\u3068\u3082\u3067\u304d\u307e\u305b\u3093\u3067\u3057\u305f\u3002\u7d50\u679c\u3068\u3057\u3066\u3001\u653b\u6483\u8005\u306f\u6697\u53f7\u5316\u3055\u308c\u305f\u500b\u4eba\u30c7\u30fc\u30bf\u306b\u3057\u304b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u306a\u304b\u3063\u305f\u3002\"<\/p>\n\n\n\n<p>&nbsp;\u5fc5\u8981\u306a\u63aa\u7f6e\u306f\u3001\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u306b\u63b2\u8f09\u3055\u308c\u3066\u3044\u308b\u8868\u306b\u8a18\u8f09\u3055\u308c\u3066\u3044\u308b\uff1a<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"342\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-1024x342.jpg\" alt=\"\" class=\"wp-image-601\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-1024x342.jpg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-300x100.jpg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-768x256.jpg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-1536x513.jpg 1536w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400.jpg 1990w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>\u5fc5\u8981\u306a\u63aa\u7f6e\u306f\u4ee5\u4e0b\u306e\u3088\u3046\u306b\u6b63\u5f53\u5316\u3055\u308c\u308b\uff1a<\/p>\n\n\n\n<p>\u300c\u3053\u306e\u4f8b\u3067\u306f\u3001\u653b\u6483\u8005\u306f\u500b\u4eba\u30c7\u30fc\u30bf\u306b\u30a2\u30af\u30bb\u30b9\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u3001\u6697\u53f7\u5316\u3055\u308c\u305f\u500b\u4eba\u30c7\u30fc\u30bf\u3092\u542b\u3080\u6697\u53f7\u6587\u306e\u6a5f\u5bc6\u6027\u304c\u640d\u306a\u308f\u308c\u305f\u3002\u3057\u304b\u3057\u3001\u6d41\u51fa\u3057\u305f\u53ef\u80fd\u6027\u306e\u3042\u308b\u30c7\u30fc\u30bf\u306f\u3001\u5c11\u306a\u304f\u3068\u3082\u5f53\u5206\u306e\u9593\u306f\u3001\u72af\u4eba\u306b\u3088\u3063\u3066\u8aad\u307f\u53d6\u3089\u308c\u305f\u308a\u4f7f\u7528\u3055\u308c\u305f\u308a\u3059\u308b\u3053\u3068\u306f\u306a\u3044\u3002\u30c7\u30fc\u30bf\u7ba1\u7406\u8005\u304c\u4f7f\u7528\u3057\u305f\u6697\u53f7\u5316\u6280\u8853\u306f\u3001\u6700\u5148\u7aef\u306e\u6280\u8853\u306b\u9069\u5408\u3057\u3066\u3044\u308b\u3002\u5fa9\u53f7\u5316\u30ad\u30fc\u306f\u6f0f\u6d29\u3057\u3066\u304a\u3089\u305a\u3001\u304a\u305d\u3089\u304f\u4ed6\u306e\u624b\u6bb5\u3067\u89e3\u8aad\u3059\u308b\u3053\u3068\u3082\u3067\u304d\u306a\u3044\u3002\u305d\u306e\u7d50\u679c\u3001\u81ea\u7136\u4eba\u306e\u6a29\u5229\u3068\u81ea\u7531\u306b\u5bfe\u3059\u308b\u6a5f\u5bc6\u4fdd\u6301\u306e\u30ea\u30b9\u30af\u306f\u3001\u6697\u53f7\u5316\u3055\u308c\u305f\u30c7\u30fc\u30bf\u304c\u5c06\u6765\u7684\u306b\u89e3\u8aad\u53ef\u80fd\u306b\u306a\u308b\u3088\u3046\u306a\u6697\u53f7\u89e3\u8aad\u306e\u9032\u6b69\u304c\u306a\u3044\u9650\u308a\u3001\u6700\u5c0f\u9650\u306b\u6291\u3048\u3089\u308c\u308b\u3002\"<\/p>\n\n\n\n<p><strong>&nbsp;\u3053\u306e\u305f\u3081\u3001\u540c\u793e\u306f\u5f53\u5c40\u3084\u88ab\u5bb3\u3092\u53d7\u3051\u305f\u500b\u4eba\u3078\u306e\u5831\u544a\u7fa9\u52d9\u304c\u306a\u304b\u3063\u305f\u3002<\/strong><\/p>\n\n\n\n<p>IT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u3092\u5b9f\u65bd\u3059\u308b\u305f\u3081\u306e\u30b3\u30b9\u30c8\u3068\u3001\u8a55\u5224\u3001\u58f2\u4e0a\u3001\u9867\u5ba2\u306e\u4fe1\u983c\u3092\u5931\u3046\u53ef\u80fd\u6027\u3092\u6bd4\u8f03\u3059\u308c\u3070\u3001\u7a4d\u6975\u7684\u306a\u6295\u8cc7\u306e\u30e1\u30ea\u30c3\u30c8\u306f\u3059\u3050\u306b\u660e\u3089\u304b\u306b\u306a\u308b\u3002<\/p>\n\n\n\n<p>&nbsp;\u30aa\u30f3\u30e9\u30a4\u30f3\u30fb\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3084\u30bd\u30fc\u30b7\u30e3\u30eb\u30e1\u30c7\u30a3\u30a2\u3092\u901a\u3058\u3066\u77ac\u6642\u306b\u30cb\u30e5\u30fc\u30b9\u304c\u62e1\u6563\u3059\u308b\u4eca\u65e5\u306e\u30cf\u30a4\u30d1\u30fc\u30b3\u30cd\u30af\u30c6\u30c3\u30c9\u30fb\u30ef\u30fc\u30eb\u30c9\u306b\u304a\u3044\u3066\u3001\u7d44\u7e54\u306f\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306b\u3088\u308b\u9577\u671f\u7684\u306a\u30c0\u30e1\u30fc\u30b8\u3092\u904e\u5c0f\u8a55\u4fa1\u3057\u3066\u306f\u306a\u3089\u306a\u3044\u3002<\/p>\n\n\n\n<p class=\"translation-block\">To mitigate risks, Software AG strongly recommends that its customers implement <strong>encryption<\/strong><sup>(12) <\/sup>and <strong>auditing<\/strong><sup>(12)<\/sup> for our Adabas databases to keep IT risks at a minimum. Both measures complement each other and form the optimal technology mix to protect against attacks and unwanted internal and external data leaks.<\/p>\n\n\n\n<p><sub>(1) <a href=\"https:\/\/www.gartner.com\/reviews\/market\/intrusion-prevention-systems\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.gartner.com\/reviews\/market\/intrusion-prevention-systems<\/a><\/sub><br><sub>(2) <a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2024\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2024<\/a><\/sub><br><sub>(3) <a href=\"https:\/\/www.auswaertiges-amt.de\/en\/newsroom\/news\/hacker-attack-bundestag-2345580\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.auswaertiges-amt.de\/en\/newsroom\/news\/hacker-attack-bundestag-2345580<\/a><\/sub><br><sub>(4) <a href=\"https:\/\/www.dw.com\/en\/germany-cybercrime-by-foreign-actors-rose-by-28-in-2023\/a-69065980\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.dw.com\/en\/germany-cybercrime-by-foreign-actors-rose-by-28-in-2023\/a-69065980<\/a><\/sub><br><sub>(5) <a href=\"https:\/\/www.heise.de\/en\/news\/After-cyber-attack-Suedwestfalen-IT-wants-to-reform-itself-profoundly-10188167.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.heise.de\/en\/news\/After-cyber-attack-Suedwestfalen-IT-wants-to-reform-itself-profoundly-10188167.html<\/a><\/sub><br><sub>(6) <a href=\"https:\/\/www.bbc.com\/news\/technology-54204356\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.bbc.com\/news\/technology-54204356<\/a><\/sub><br><sub>(7) <a href=\"https:\/\/www.dutchnews.nl\/2024\/09\/police-leak-leaves-data-of-62000-officers-in-hands-of-hackers\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.dutchnews.nl\/2024\/09\/police-leak-leaves-data-of-62000-officers-in-hands-of-hackers\/<\/a><\/sub><br><sub>(8) <a href=\"https:\/\/www.statista.com\/topics\/7011\/cyber-crime-in-spain\/#topicOverview\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.statista.com\/topics\/7011\/cyber-crime-in-spain\/#topicOverview<\/a><\/sub><br><sub>(9) <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679<\/a><\/sub><br><sub>(10) <a href=\"https:\/\/www.bsi.bund.de\/EN\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/IT-Grundschutz\/it-grundschutz_node.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.bsi.bund.de\/EN\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/IT-Grundschutz\/it-grundschutz_node.html<\/a><\/sub><br><sub>(11) <a href=\"https:\/\/www.edpb.europa.eu\/our-work-tools\/our-documents\/guidelines\/guidelines-012021-examples-regarding-personal-data-breach_en\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.edpb.europa.eu\/our-work-tools\/our-documents\/guidelines\/guidelines-012021-examples-regarding-personal-data-breach_en<\/a><\/sub><br><sub>(12) <a href=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/ebook-adabas-maximize-security-en.pdf.sagdownload.inline.1669044425901.pdf\" data-no-translation>https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/ebook-adabas-maximize-security-en.pdf.sagdownload.inline.1669044425901.pdf<\/a><\/sub><\/p>\n\n\n\n<p><a href=\"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/maximize-security-of-adabas-data\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u8a73\u7d30\u306f\u3053\u3061\u3089<\/a><\/p>\n\n\n\n<div class=\"wp-block-jetpack-related-posts\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">\u95a2\u9023\u8a18\u4e8b<\/h2>\n<\/div>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Companies and public authorities rely on databases to store and process large amounts of data. These databases typically manage business-critical and highly sensitive information, such as [&hellip;]<\/p>","protected":false},"author":9,"featured_media":537,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[44],"tags":[],"product":[66],"class_list":["post-532","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","product-adabas-natural"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Database Security: Protecting Sensitive Information | Software AG<\/title>\n<meta name=\"description\" content=\"Explore the importance of database security in protecting sensitive information from internal and external cyberthreats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softwareag.com\/ja\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Database Security: Protecting Sensitive Information\" \/>\n<meta property=\"og:description\" content=\"Learn the essentials of database security and how to protect sensitive information from internal and external threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwareag.com\/ja\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Software AG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SoftwareAG\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-02T02:25:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-17T18:14:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SoftwareAG Staff Writer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Database Security: Protecting Sensitive Information\" \/>\n<meta name=\"twitter:description\" content=\"Explore database security and learn how internal threats can compromise sensitive information and business-critical data.\" \/>\n<meta name=\"twitter:creator\" content=\"@softwareag\" \/>\n<meta name=\"twitter:site\" content=\"@softwareag\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SoftwareAG Staff Writer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\"},\"author\":{\"@type\":\"Person\",\"@id\":\"https:\/\/www.softwareag.com\/ja\/#person-softwareag-staff-writer\",\"name\":\"SoftwareAG Staff Writer\"},\"headline\":\"Encryption relieves companies and authorities of the obligation to report cyberattacks\",\"datePublished\":\"2025-06-02T02:25:00+00:00\",\"dateModified\":\"2026-03-17T18:14:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\"},\"wordCount\":983,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\",\"url\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\",\"name\":\"Database Security: Protecting Sensitive Information | Software AG\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\",\"datePublished\":\"2025-06-02T02:25:00+00:00\",\"dateModified\":\"2026-03-17T18:14:49+00:00\",\"description\":\"Explore the importance of database security in protecting sensitive information from internal and external cyberthreats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwareag.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption relieves companies and authorities of the obligation to report cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"name\":\"Software AG\",\"description\":\"Software AG&#039;s digital transformation solutions &amp; services\",\"publisher\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\"},\"alternateName\":\"SAG\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwareag.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\",\"name\":\"Software AG\",\"alternateName\":\"SAG\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"width\":800,\"height\":450,\"caption\":\"Software AG\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SoftwareAG\",\"https:\/\/x.com\/softwareag\",\"https:\/\/www.linkedin.com\/company\/software-ag\",\"https:\/\/www.youtube.com\/user\/SOFTWAREAG\"],\"description\":\"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"501\",\"maxValue\":\"1000\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/person\/01b3bf721a70a667820cd608911526e7\",\"name\":\"Josh Smith\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g\",\"caption\":\"Josh Smith\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Database Security: Protecting Sensitive Information | Software AG","description":"Explore the importance of database security in protecting sensitive information from internal and external cyberthreats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softwareag.com\/ja\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","og_locale":"ja_JP","og_type":"article","og_title":"Database Security: Protecting Sensitive Information","og_description":"Learn the essentials of database security and how to protect sensitive information from internal and external threats.","og_url":"https:\/\/www.softwareag.com\/ja\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","og_site_name":"Software AG","article_publisher":"https:\/\/www.facebook.com\/SoftwareAG","article_published_time":"2025-06-02T02:25:00+00:00","article_modified_time":"2026-03-17T18:14:49+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","type":"image\/jpeg"}],"author":"SoftwareAG Staff Writer","twitter_card":"summary_large_image","twitter_title":"Database Security: Protecting Sensitive Information","twitter_description":"Explore database security and learn how internal threats can compromise sensitive information and business-critical data.","twitter_creator":"@softwareag","twitter_site":"@softwareag","twitter_misc":{"Written by":"SoftwareAG Staff Writer","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/"},"author":{"@type":"Person","@id":"https:\/\/www.softwareag.com\/ja\/#person-softwareag-staff-writer","name":"SoftwareAG Staff Writer"},"headline":"Encryption relieves companies and authorities of the obligation to report cyberattacks","datePublished":"2025-06-02T02:25:00+00:00","dateModified":"2026-03-17T18:14:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/"},"wordCount":983,"commentCount":0,"publisher":{"@id":"https:\/\/www.softwareag.com\/en\/#organization"},"image":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","articleSection":["Security"],"inLanguage":"ja","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","url":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","name":"Database Security: Protecting Sensitive Information | Software AG","isPartOf":{"@id":"https:\/\/www.softwareag.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","datePublished":"2025-06-02T02:25:00+00:00","dateModified":"2026-03-17T18:14:49+00:00","description":"Explore the importance of database security in protecting sensitive information from internal and external cyberthreats.","breadcrumb":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwareag.com\/de\/"},{"@type":"ListItem","position":2,"name":"Encryption relieves companies and authorities of the obligation to report cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.softwareag.com\/en\/#website","url":"https:\/\/www.softwareag.com\/en\/","name":"Software AG","description":"Software AG\u306e\u30c7\u30b8\u30bf\u30eb\u30c8\u30e9\u30f3\u30b9\u30d5\u30a9\u30fc\u30e1\u30fc\u30b7\u30e7\u30f3\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\uff06\u30b5\u30fc\u30d3\u30b9","publisher":{"@id":"https:\/\/www.softwareag.com\/en\/#organization"},"alternateName":"SAG","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwareag.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.softwareag.com\/en\/#organization","name":"Software AG","alternateName":"SAG","url":"https:\/\/www.softwareag.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","width":800,"height":450,"caption":"Software AG"},"image":{"@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SoftwareAG","https:\/\/x.com\/softwareag","https:\/\/www.linkedin.com\/company\/software-ag","https:\/\/www.youtube.com\/user\/SOFTWAREAG"],"description":"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"501","maxValue":"1000"}},{"@type":"Person","@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/person\/01b3bf721a70a667820cd608911526e7","name":"Josh Smith","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g","caption":"Josh Smith"}}]}},"_links":{"self":[{"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/posts\/532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/comments?post=532"}],"version-history":[{"count":11,"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/posts\/532\/revisions"}],"predecessor-version":[{"id":6409,"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/posts\/532\/revisions\/6409"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/media\/537"}],"wp:attachment":[{"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/media?parent=532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/categories?post=532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/tags?post=532"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/product?post=532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}