{"id":768,"date":"2024-12-05T17:32:52","date_gmt":"2024-12-05T21:32:52","guid":{"rendered":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/zero-trust-security\/"},"modified":"2025-10-01T06:08:32","modified_gmt":"2025-10-01T10:08:32","slug":"zero-trust-security","status":"publish","type":"resource","link":"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/","title":{"rendered":"What does Zero Trust Security mean for you"},"content":{"rendered":"<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"What does Zero Trust Security mean for you\" src=\"https:\/\/player.vimeo.com\/video\/1123501051?h=a77968a541&amp;dnt=1&amp;app_id=122963\" width=\"500\" height=\"281\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture; clipboard-write; encrypted-media; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<div class=\"wp-block-group alignwide sag-cards-row sag-cards-row-icons has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"border-top-color:var(--wp--preset--color--gray);border-top-width:2px;border-right-style:none;border-right-width:0px;border-bottom-style:none;border-bottom-width:0px;border-left-style:none;border-left-width:0px;margin-top:var(--wp--preset--spacing--xl);padding-bottom:var(--wp--preset--spacing--l)\">\n<h2 class=\"wp-block-heading alignwide\" style=\"margin-top:48px;margin-bottom:var(--wp--preset--spacing--m)\">\u3053\u3061\u3089\u3082\u3054\u89a7\u304f\u3060\u3055\u3044<\/h2>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-f7d19e04 wp-block-columns-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--m)\">\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/lightbulb-icon.png\" alt=\"\u96fb\u7403\u30a2\u30a4\u30b3\u30f3\" class=\"wp-image-186\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">\u3064\u306a\u304c\u308a\u7d9a\u3051\u308b<\/h4>\n\n\n\n<p class=\"translation-block\"><span class=\"nowrap\">Software AG<\/span> Tech Community\u306b\u53c2\u52a0\u3057\u3066\u3001Adabas &amp; Natural\u306b\u95a2\u3059\u308b\u6700\u65b0\u60c5\u5831\u3092\u30d5\u30a9\u30ed\u30fc\u3057\u307e\u3057\u3087\u3046\u3002<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--1\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/techcommunity.softwareag.com\" target=\"_blank\" rel=\"noreferrer noopener\">Tech Community\u306f\u3053\u3061\u3089<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/laptop-icon.png\" alt=\"\u30e9\u30c3\u30d7\u30c8\u30c3\u30d7\u30a2\u30a4\u30b3\u30f3\" class=\"wp-image-188\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">\u65b0\u7740\u60c5\u5831\u3092\u898b\u308b<\/h4>\n\n\n\n<p class=\"translation-block\">\u6700\u65b0\u306e\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u3092\u767a\u898b\u3057\u3001\u30a6\u30a7\u30d3\u30ca\u30fc\u3092\u8996\u8074\u3057\u3001<span class=\"nowrap\">Adabas &amp; Natural<\/span>\u304c2050\u5e74\u4ee5\u964d\u3082\u5bfe\u5fdc\u3067\u304d\u308b\u7406\u7531\u3092\u3054\u78ba\u8a8d\u304f\u3060\u3055\u3044\u3002<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--2\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/ja\/adabas-natural\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u8a73\u7d30\u306f\u3053\u3061\u3089<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/globe-icon.png\" alt=\"\u5730\u7403\u5100\u30a2\u30a4\u30b3\u30f3\" class=\"wp-image-189\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">\u30e6\u30fc\u30b6\u30fc\u30b0\u30eb\u30fc\u30d7<\/h4>\n\n\n\n<p>\u4e16\u754c\u5404\u5730\u306e\u30e6\u30fc\u30b6\u30fc\u3068\u3064\u306a\u304c\u308c\u308b\u30e6\u30fc\u30b6\u30fc\u30b0\u30eb\u30fc\u30d7\u306b\u305c\u3072\u3054\u53c2\u52a0\u3057\u307e\u305b\u3093\u304b\u3002<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--3\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/ja\/developer\/usergroup\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u8a73\u7d30\u306f\u3053\u3061\u3089<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-left-aligned pre-footer-cta has-purple-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--l);padding-top:var(--wp--preset--spacing--xxl);padding-bottom:var(--wp--preset--spacing--xxl)\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading alignfull has-text-align-left has-grande-font-size has-white-color has-text-color has-link-color has-large-font-size wp-elements-8d14b3c8d74d3e927a8f9d7fa42e533b\">\u30b3\u30a2\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3092\u9577\u671f\u7a3c\u50cd\u3055\u305b\u305f\u3044\u3068\u304a\u8003\u3048\u3067\u3059\u304b\uff1f<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-e04203c2fbc13876bd23d5f3081c4d1d translation-block\">\u30ec\u30ac\u30b7\u30fc\u30b7\u30b9\u30c6\u30e0\u4e0a\u3067\u69cb\u7bc9\u3057\u3001\u6700\u65b0\u306eDevOps\u74b0\u5883\u3067\u958b\u767a\u3092\u30b9\u30d4\u30fc\u30c9\u30a2\u30c3\u30d7\u3057\u307e\u305b\u3093\u304b\uff1fAdabas &amp; Natural\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3092\u30e2\u30c0\u30ca\u30a4\u30ba\u3057\u3066\u3001\u30b3\u30b9\u30c8\u3092\u524a\u6e1b\u3057\u3001\u30cf\u30a4\u30d6\u30ea\u30c3\u30c9\u30af\u30e9\u30a6\u30c9\u3092\u63a1\u7528\u3057\u307e\u3057\u3087\u3046\u3002<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-dark-bg-primary is-style-dark-bg-primary--4\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/ja\/contact\/\">\u304a\u554f\u3044\u5408\u308f\u305b\u306f\u3053\u3061\u3089<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-dark-bg-transparent is-style-dark-bg-transparent--5\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/ja\/free-trials\/\">\u7121\u6599\u30c8\u30e9\u30a4\u30a2\u30eb<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons alignwide is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--6\"><a class=\"wp-block-button__link has-white-color has-text-color has-link-color has-text-align-left wp-element-button\" href=\"https:\/\/discover.softwareag.com\/free-it-health-checks.html\">\u7121\u6599IT\u30d8\u30eb\u30b9\u30c1\u30a7\u30c3\u30af\u3092\u7533\u3057\u8fbc\u3080<\/a><\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>You\u2019ve heard the buzz! More and more organizations are mandating Zero Trust as the new security architecture. What does this mean for you? We explain the principles and components of Zero Trust as well as highlight various capabilities that can be brought to bear to support Zero Trust in an Adabas &#038;<\/p>","protected":false},"featured_media":764,"template":"","product":[66],"resource-industry":[],"resource-topic":[78],"resource-type":[36],"resource-subdirectory":[64],"class_list":["post-768","resource","type-resource","status-publish","has-post-thumbnail","hentry","product-adabas-natural","resource-topic-security","resource-type-video","resource-subdirectory-adabas-natural"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What does Zero Trust Security mean for you<\/title>\n<meta name=\"description\" content=\"You\u2019ve heard the buzz! More and more organizations are mandating Zero Trust as the new security architecture. What does this mean for you? We explain the principles and components of Zero Trust as well as highlight various capabilities that can be brought to bear to support Zero Trust in an Adabas &amp;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What does Zero Trust Security mean for you\" \/>\n<meta property=\"og:description\" content=\"You\u2019ve heard the buzz! More and more organizations are mandating Zero Trust as the new security architecture. What does this mean for you? We explain the principles and components of Zero Trust as well as highlight various capabilities that can be brought to bear to support Zero Trust in an Adabas &amp;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Software AG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SoftwareAG\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-01T10:08:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What does Zero Trust Security mean for you\" \/>\n<meta name=\"twitter:site\" content=\"@softwareag\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/\",\"url\":\"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/\",\"name\":\"What does Zero Trust Security mean for you\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/r-ray-wang-video-thumbnail-06.svg\",\"datePublished\":\"2024-12-05T21:32:52+00:00\",\"dateModified\":\"2025-10-01T10:08:32+00:00\",\"description\":\"You\u2019ve heard the buzz! More and more organizations are mandating Zero Trust as the new security architecture. What does this mean for you? We explain the principles and components of Zero Trust as well as highlight various capabilities that can be brought to bear to support Zero Trust in an Adabas &\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/#primaryimage\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/r-ray-wang-video-thumbnail-06.svg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/r-ray-wang-video-thumbnail-06.svg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwareag.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/www.softwareag.com\/br\/resources\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What does Zero Trust Security mean for you\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"name\":\"Software AG\",\"description\":\"Software AG&#039;s digital transformation solutions &amp; services\",\"publisher\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\"},\"alternateName\":\"SAG\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwareag.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\",\"name\":\"Software AG\",\"alternateName\":\"SAG\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"width\":800,\"height\":450,\"caption\":\"Software AG\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SoftwareAG\",\"https:\/\/x.com\/softwareag\",\"https:\/\/www.linkedin.com\/company\/software-ag\",\"https:\/\/www.youtube.com\/user\/SOFTWAREAG\"],\"description\":\"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"501\",\"maxValue\":\"1000\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What does Zero Trust Security mean for you","description":"You\u2019ve heard the buzz! More and more organizations are mandating Zero Trust as the new security architecture. What does this mean for you? We explain the principles and components of Zero Trust as well as highlight various capabilities that can be brought to bear to support Zero Trust in an Adabas &","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/","og_locale":"ja_JP","og_type":"article","og_title":"What does Zero Trust Security mean for you","og_description":"You\u2019ve heard the buzz! More and more organizations are mandating Zero Trust as the new security architecture. What does this mean for you? We explain the principles and components of Zero Trust as well as highlight various capabilities that can be brought to bear to support Zero Trust in an Adabas &","og_url":"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/","og_site_name":"Software AG","article_publisher":"https:\/\/www.facebook.com\/SoftwareAG","article_modified_time":"2025-10-01T10:08:32+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"What does Zero Trust Security mean for you","twitter_site":"@softwareag","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/","url":"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/","name":"What does Zero Trust Security mean for you","isPartOf":{"@id":"https:\/\/www.softwareag.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/#primaryimage"},"image":{"@id":"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/r-ray-wang-video-thumbnail-06.svg","datePublished":"2024-12-05T21:32:52+00:00","dateModified":"2025-10-01T10:08:32+00:00","description":"You\u2019ve heard the buzz! More and more organizations are mandating Zero Trust as the new security architecture. What does this mean for you? We explain the principles and components of Zero Trust as well as highlight various capabilities that can be brought to bear to support Zero Trust in an Adabas &","breadcrumb":{"@id":"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/#primaryimage","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/r-ray-wang-video-thumbnail-06.svg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/r-ray-wang-video-thumbnail-06.svg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwareag.com\/ja\/resources\/adabas-natural\/zero-trust-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwareag.com\/de\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/www.softwareag.com\/br\/resources\/"},{"@type":"ListItem","position":3,"name":"What does Zero Trust Security mean for you"}]},{"@type":"WebSite","@id":"https:\/\/www.softwareag.com\/en\/#website","url":"https:\/\/www.softwareag.com\/en\/","name":"Software AG","description":"Software AG\u306e\u30c7\u30b8\u30bf\u30eb\u30c8\u30e9\u30f3\u30b9\u30d5\u30a9\u30fc\u30e1\u30fc\u30b7\u30e7\u30f3\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\uff06\u30b5\u30fc\u30d3\u30b9","publisher":{"@id":"https:\/\/www.softwareag.com\/en\/#organization"},"alternateName":"SAG","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwareag.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.softwareag.com\/en\/#organization","name":"Software AG","alternateName":"SAG","url":"https:\/\/www.softwareag.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","width":800,"height":450,"caption":"Software AG"},"image":{"@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SoftwareAG","https:\/\/x.com\/softwareag","https:\/\/www.linkedin.com\/company\/software-ag","https:\/\/www.youtube.com\/user\/SOFTWAREAG"],"description":"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"501","maxValue":"1000"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/resource\/768","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/types\/resource"}],"version-history":[{"count":4,"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/resource\/768\/revisions"}],"predecessor-version":[{"id":2493,"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/resource\/768\/revisions\/2493"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/media\/764"}],"wp:attachment":[{"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/media?parent=768"}],"wp:term":[{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/product?post=768"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/resource-industry?post=768"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/resource-topic?post=768"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/resource-type?post=768"},{"taxonomy":"resource-subdirectory","embeddable":true,"href":"https:\/\/www.softwareag.com\/ja\/wp-json\/wp\/v2\/resource-subdirectory?post=768"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}