japan users group
15 TopicsAccess Control in the New Mobile, Hybrid World
There is a brave new world dawning for the corporate world. There are many ânew normsâ â and a gold rush of new opportunities, but also new challenges with which they come â streaking like lightning throughout organizations. The workforce of today and into the future is, and will continue to be mobile. Consider that according to analyst IDC, 37 percent of the worldwide workforce will be mobile by the end of 2015. Thatâs about 1.3 billion mobile workers, worldwide â not to mention there will be two or more times as many mobile devices as mobile workers! â by the end of this calendar year! Then, consider this: According to Orange Business Services, 55 percent of worldwide business IP traffic will be mobile business Internet traffic by 2018. Mobility is here, and itâs here to stay. (In the Asia Pacific region, IDC anticipates the bring your own device (BYOD) market will continue its robust growth. There were an estimated 155 million smartphones and over 4 million tablets in use supporting BYOD initiatives across the region last year (2014), with year-on-year growth of 40.4 percent and 62.7 percent, respectively. And, thatâs not even considering the burgeoning area of wearable devices, either.) As the mobile workforce accelerates like a rocket into the stratosphere, cascading torrents of smartphones, tablets, and wearables across organizations in its wake, the number of cloud- and SaaS-based applications used within organizations is also skyrocketing at a breakneck pace. According to a recent study sponsored by SkyHigh Networks, there are on average 759 cloud services in use by todayâs organizations. The most puzzling piece isnât the magnitude of in use cloud apps and services. Instead, its that, according to a Cloud Security Alliance study, most organization IT teams believe they have fewer than 50 cloud-based apps in use. That means that over 700 cloud apps and services on average are in use within enterprises â but no one (but the user) has control over those apps and services, and any corporate information shared with them! The problem is, you cannot defend what you donât know about! Finally, the last piece of the ânew normâ puzzle for organizations is the hybrid network, an eclectic mix of data center and cloud-based apps and data, with a stew of hosted private, public and cloud infrastructures. According to analyst Gartner, âwhile actual hybrid cloud computing deployments are rare, nearly three-fourths of large enterprises expect to have hybrid deployments by 2015.â Consider that a mobile workforce will drive infrastructure changes, needed to address a more diverse device ecosystem. Then consider that infrastructure addressing mobility requires greater investment in cloud-based apps and services to support that expanding device ecosystem. So, as you can see, the future of the network fabric for the foreseeable future will be hybrid. So, with a ânew normâ of mobility, cloud, and hybrid networks, how can organizations address network, application, and data accessibility? With so many new devices that are mobile and are under limited corporate control, and applications and data scattered about the network and in various clouds and SaaS deployments, how can an enterprise be assured of fast, appropriate, authenticated and authorized access? With so many variables, there is one constant that remains: Identity. The user â and their identity â is, arguably, the ânew perimeterâ for the enterprise, today and onward. As the traditional network perimeter has been broken, fragmented, and in many instances shattered into many pieces, identity has become the new perimeter. As applications, data, and even networks move faster toward the cloud, and the user-controlled, BYOD-driven mobile ecosystem expands exponentially, corporate control has become more difficult, dispersed, and dependent on others â and many times, thatâs the security uninformed and apathetic user. User identity, though, never changes. And, backed by authentication, authorization, and accounting (AAA), identity is now the first line of defense for secure corporate access. But, identity is just the tip of the spear for controlling the new parameters of access. The context of a userâs access request, and their environment at the time of access request, follow identity; inarguably, they have as much to do with securing appropriate access as identity. The ability to address the 5 wâs and 1 h (who, what, when, where, why, and how) assures, enhances, and differentiates secure access to networks, clouds, applications and data â wherever they may reside and however they are comprised. Insuring user identity is efficiently, securely shared between networks, clouds, applications, and data â wherever they live â is now a necessity. Yet, there are challenges: Identity silos, on-premise identity with cloud- and SaaS-based apps and data, and user password fatigue leading to weak user names and passwords â which are easily compromised. Thatâs where building an identity bridge comes in. Federation builds a trusted chain of user identity between two entities â networks, clouds, applications, etc. â through industry standards, such as SAML. The cumbersome duplication and insertion of identity directories becomes unnecessary. Identity and access is controlled by an enterprise, with authentication occurring between the enterprise, and cloud and SaaS providers. Instant user authentication and its termination is centralized and under enterprise control. Identity federation delivers access visibility and control together. Leveraging identity for access control, and building identity bridges are now imperative for organizations, as applications move outside the enterprise domain, the workforce and their devices are more mobile and leave the enterprises in droves, and the enterprise domain, too, has moved. Itâs the ânew normâ.293Views0likes1CommentSDNã®ç®çã¯ã©ã¡ãã§ããïŒãèªååããããããã¯ãŒã¯ããšããããã¯ãŒã¯ã®èªååã
Please find the English language post, by Lori MacVittie, from which this was adapted here. ãã®2ã€ã«ã¯éãããããŸãããããŠããã®éãã¯ãŠãŒã¶ãã©ã®ãããªæè¡ãéžæãããã«å€§ããªåœ±é¿ãäžããããšã«ãªãã®ã§éèŠã§ããSDNããåããŠã¡ãžã£ãŒãªæè¡ãšããŠç»å Žãã2012幎ã®Interop㧠ã¯å€§ããªæåŸ ããã£ãŠè¿ããããŸããããããããã®æåŸ ã¯æ¬¡ç¬¬ã«åŒ±ãŸã£ãŠããããšã«ãªããŸãããã®çç±ã¯ãã³ã³ãããŒã©ã®å¯çšæ§ãæ¡åŒµæ§ã®ç¢ºä¿ããã³ã㌠éã®çžäºæ¥ç¶æ§ããããŒããŒãã«ã®æ¡åŒµæ§ãªã©æè¡çãªå¶éãèªèããããã§ãããŸãããããã¯ãŒã¯ã®æ¥ç¶æ§ãæäŸããã¬ã€ã€ãŒ 2-3ãããã¢ããªã±ãŒã·ã§ã³ã®å¯çšæ§ã»å®å šæ§ã»é«éæ§ãå®çŸããäžäœã®ã¬ã€ã€ãŒ 4-7ã®çµ±å管çã«æ¬ ããŠããäºã課é¡ãšããŠèªèãããŸããã ããããOpenFlowããããã¯ãŒã¯ã®ã³ã¢ãã£ãã£åã«ã€ããŠãããããšéšãããŠããåœæããSDNã ããããã¡ãªããã®äžã€ãšããŠãèªååããæããããŠããŸãããäžè¬çã«ããããã¯ãŒã¯ã¯ã³ã³ãããŒã«ãã¬ãŒã³ãšããŒã¿ãã¬ãŒã³éã®å¯æ¥ãªçµã³ã€ãã«ãã£ãŠå¶çŽãåããŠãããå¹ççãªç®¡çãã¹ã±ãŒã«ãã§ããªããšèããããŠããŸãããããã«ã€ããŠã¯ç¢ºãã«æ£ãããšèšããŸãã OpenFlowæ¹åŒã®SDNã¯ããèªååããããããã¯ãŒã¯ãåãã®ã€ã³ãã©æ§ç¯ã«ãã©ãŒã«ã¹ããããšããŠããŸããã€ãŸãã管çè ãååã«ææ¡æžã¿ã®æå®ã®ã«ãŒã«ã«åºã¥ããŠããã±ããããã©ã¯ãŒãã£ã³ã°ããŠã¢ããªã±ãŒã·ã§ã³ã®èŠæ±ã«å¿ããããšããŠããŸããäžæ¹ã§ãããéçšãéèŠããæ¹åŒã®SDNããããŸããããã¯ããããã¯ãŒã¯ã®èªååãã«ãã©ãŒã«ã¹ããããšããŠããŸããåè ïŒOpenFlowæ¹åŒïŒã¯ããã±ããã®ãã©ã¯ãŒãã£ã³ã°ã«ãŒã«ãè¿ éã«ãããã¯ãŒã¯æ©åšã«ãã£ãŒãããäºã«æ³šåããŠãããåŸè ïŒéçšãéèŠããæ¹åŒïŒã¯ãã³ã³ãã£ã®ã¥ã¬ãŒã·ã§ã³ãéçšããã»ã¹ã®è¿ éæ§ã«æ³šåããŠããŸãã ãããã¯ãŒã¯ããã€ã¹ããšã«èšå®æ¹æ³ãç°ãªãã¢ãã«ã§ã¯ãè€éæ§ãå¢ãã®ã§éçšé¢ã«åœ±é¿ãåãã§ããŸããŸããã€ãŸãã次äžä»£ã®ãã¯ãããžã«ãã£ãŠéçºãããã¢ããªã±ãŒã·ã§ã³ããã®èŠæ±ã«ããããã¯ãŒã¯ãµãŒãã¹ã®æäŸã¹ããŒããæåŸ ãããåºæºã«éããŠããªããšããããšã§ããåºæ¬çã«ãåŸæ¥ã®ãããã¯ãŒã¯ã¢ãã«ã¯ãµãŒãã¹ãããããžã§ãã³ã°ããã¹ããŒãã«æéããããäžããšã©ãŒãçºçãããããã¢ããªã±ãŒã·ã§ã³ã®èŠä»¶ã«ãŸã£ãããã©ãŒã«ã¹ããŠããŸããã ããã«å¯ŸãããªãŒãã³äžã€æšæºåãããAPIãããã°ã©ãã³ã°å¯èœãªã€ã³ã¿ãŒãã§ã€ã¹ãçµç±ããããããã¯ãŒã¯ã®èªååãã¯ããããã¯ãŒã¯ãµãŒãã¹ã®èªåããããžã§ãã³ã°ãå®çŸããŸããããããã¯ãŒã¯ã®èªåå èªååãã®ç®æšã¯ãããŠã³ã¿ã€ã ã®çºçãã³ã¹ãã®å¢å€§ãã¹ãã«ã®é«ããšã³ãžãã¢ã«ããé·æéã®çšŒåãªã©ã®åå ãšãªãéçšäžã®åé¡ã解決ããããšã«ãããŸãã ãŸããOpenFlowæ¹åŒã®SDNãã¢ããªã±ãŒã·ã§ã³ã«ãšã£ãŠã¹ããŒããã«ãªãããã¯ãŒã¯ãµãŒãã¹ãåŠçããäžã§ã¹ã±ãŒã«ã§ããªãããšãç¶æ³ãè€éã«ããŠããŸããã¹ããŒããã«ãªãããã¯ãŒã¯ãµãŒãã¹ã«ã¯ãã¹ããŒããã«ãã¡ã€ã¢ãŠã©ãŒã«ãã¢ããªã±ãŒã·ã§ã³è² è·åæ£ãWebã¢ããªã±ãŒã·ã§ã³ãã¡ã€ã¢ãŠã©ãŒã«ããªã¢ãŒãã¢ã¯ã»ã¹ãIDã®èå¥ãWebããã©ãŒãã³ã¹æé©åãªã©ãå«ãŸããŸãããããã®ãµãŒãã¹ã¯ããã®æ©èœãå®çŸããããã«ãã±ããããŒã¿ãå®å šã«è§£æããå¿ èŠããããããå¿ ç¶çã«ããŒã¿ãæµãããã¹äžã«åžžé§ããå¿ èŠããããŸãããµãŒãã¹ãã§ã€ãã³ã°ãå©çšããŠã¹ããŒãã¬ã¹ãµãŒãã¹ãšã¹ããŒããã«ãµãŒãã¹ã®äž¡æ¹ã«å¯Ÿå¿ããã¢ãŒããã¯ãã£ã¢ãã«ãå®çŸããããšã¯å¯èœã§ãããè€éã«ãªã£ãŠããŸããŸãã ããã§åé¡ãšãªãã®ã¯ãSDNã«ããäœãéæãããã®ãããšããããšã§ããã©ã®ãããªç®çãæã¡ãã©ã®ããã«ããŠææã枬å®ããã®ããæ確ã«ããå¿ èŠããããŸãããããã®è³ªåã«çããããšãã§ããã°ãã©ã¡ãã®SDNã®ææ³ãæ€èšãã¹ãã§ãããããããæ確ã«ç解ã§ããŸã323Views0likes0CommentsHappy F5 Day! #iamf5
Happy F5 Day! #iamf5 Itâs been a big year for us since last F5 day, so we have a lot of celebrate! Cue the cake and ice cream (seriously, weâve got them in all of our offices around the globe today). Our entrance into the cloud services delivery space with Silverline was met with rave reviews; Silverline DDoS mitigation was named âProduct of the Weekâ by Network World. We continued to build on our existing strengths, recognized as âLeaderâ in Gartnerâs Magic Quadrant for ADCs for the eight consecutive year and earning a âRecommendedâ status for our BIG-IP ASM from NSS Labs. Our partner ecosystem continued to flourish, and F5 became a VCE Technology partner, with our ADCs achieving Vblock Ready certification to enable orchestrated service capabilities across converged IT systems. And thatâs just the tip of the iceberg of what we accomplished this year! Of course, F5 Day is not just about celebrating our successes, itâs also about celebrating and thanking all the people of F5! Weâre extremely proud of what weâve achieved together, and even more proud that weâve done it while keeping our F5 team spirit. Those of us in the company can feel this day in and day out, but it was still nice to have it validated this year by Glassdoor, who honored F5 as a Best Place to Work based on employee reviews â #4 among all large companies in the US. And today we celebrate our communities as well: F5 teams around the world are taking time out today give back to society and contribute to charity and community organizations. Once again, Happy F5 Day! Hereâs to another great year ahead!282Views0likes0CommentsSSLéä¿¡ã®ã¢ã¯ãã£ãã»ã¹ã¿ã³ãã€ã®ãã§ã€ã«ãªãŒãåãæ¿ããå¯çšæ§ãå€§å¹ ã«åŒ·åïŒ
æå€ãšç¥ãããŠããªãSSLéä¿¡åé·åã®èª²é¡ãæ¥çã§åããŠF5ã解決 ã¢ããªã±ãŒã·ã§ã³ã»ããªããªã»ã³ã³ãããŒã©ïŒADCïŒãå©çšããéãå€ãã®ãŠãŒã¶æ§ã¯ããã¯ã¢ããå«ããŠ2å°æ§æã§å°å ¥ãããŠããããšæããŸããçŸåšã§ã¯éä¿¡æ©åšã®å°å ¥åœ¢æ ãšããŠåé·æ§æã¯äžè¬çã§ãéä¿¡äžå ·åæã«ã¯ã¢ã¯ãã£ãæ©ããã¹ã¿ã³ãã€æ©ã«åãæ¿ããããã§ãããããã§éèŠãªã®ã¯ãã®ãåãæ¿ãã£ãããšãã«ããã€ã³ãã¯ãããŠãŒã¶ã«äžããªãäºã«ãªããŸãã ãã®ããã®ææ³ãšããŠã³ãã¯ã·ã§ã³ãã©ãŒãªã³ã°ãšãããã®ããããŸãããã®ã³ãã¯ã·ã§ã³åææè¡ã«ãããåãæ¿ãã£ãåŸãåãæ¿ããåã®ã»ãã·ã§ã³æ å ±ãè€è£œïŒãã©ãŒãªã³ã°ïŒãããŠãŒã¶ãžã®åœ±é¿ããªããããšãåºæ¥ãŸããéåžžãWebã§äžçªå€ã䜿ãããŠããProtocolã§ããHTTPã®å Žåã¯ã³ãã¯ã·ã§ã³ããã©ãŒããªããŠãTCPã®åéã§ãŠãŒã¶ãžã®åœ±é¿ã¯æå°éã«ãããŸããäžæ¹ãFTPãTelnetãªã©ã®é·æéç¶ç¶ããéä¿¡ã«ãããŠã³ãã¯ã·ã§ã³ãã©ãŒã¯äœ¿ãããŠããŸããããããæè¿ã®TrendãšããŠã¯HTTPã®å Žåã§ãéä¿¡ã¯é·æéç¶ç¶ããã±ãŒã¹ã¯å¢ããŠãããã³ãã¯ã·ã§ã³ãã©ãŒã®å¿ èŠæ§ãåºãŠããŸãã å®ã¯ãä»ãŸã§ãã®ãã©ãŒãªã³ã°ãã»ãã¥ã¢ãªéä¿¡ãããã³ã«ã§ããSSLã«å¯ŸããŠæäŸããã®ã¯éåžžã«é£æ床ãé«ããL4-L7éä¿¡ã®èšèšã§èª²é¡ãšãªã£ãŠããŸãããããããSSLãšããã°ãçŸåšã¯Google, Facebookãªã©ã®ãµãŒãã¹ããŸããªã³ã©ã€ã³ã·ã§ããã³ã°ãåç»ããªã³ã©ã€ã³ãã³ãã³ã°ãªã©ãèããŠã¿ããšå©çšãããŠããªããµãŒãã¹ãæ¢ãã®ãé£ããã»ã©äžè¬çã«ãªã£ãŠããŠããŸããSSLéä¿¡ã®ã³ãã¯ã·ã§ã³ãããã¯ã¢ããã«åãæ¿ãããã³ã«ãã©ãŒãªã³ã°ãã§ããªããšã©ããªãããäŸãã°ãã³ãã³ã°ã ãšããªã³ã©ã€ã³æ ªååŒãæäœäžã«äžæãããå床ãã°ã€ã³ãèŠæ±ãããå¯èœæ§ããããŸããååŒå 容次第ã§ã¯ãµãŒãã¹å©çšè ã®åããæ倱ã¯ç倧ã§ãããŸãããªã³ã©ã€ã³ã²ãŒã ã§ãåæ§ã§ããäŸãã°ãªã³ã©ã€ã³æ Œéã²ãŒã ã§åããåã£ãŠããæŠããäžæãããã²ãŒã ãããçŽãã«ãªã£ããšããŸãããããã²ãŒã ã§ããããŠãŒã¶ã®æºè¶³åºŠã®äœäžã¯é¿ããããŸããã ãŸããªããF5ã¯åŸæ¥å°é£ã ã£ãSSLéä¿¡ã®ã³ãã¯ã·ã§ã³ãã©ãŒãªã³ã°ãå®çŸã§ããææ°çããªãªãŒã¹ããŸããçŸåšãADCãœãªã¥ãŒã·ã§ã³ãšããŠã¯F5ã®ã¿ãæäŸãããã®ãšãªããŸããSSLéä¿¡ã䜿ã£ããµãŒãã¹æäŸåºç€ã®æ§ç¯ã«å¯ŸããŠé«ãå¯çšæ§ãããããç°¡åã«å°å ¥ã§ãã â ãããªãææ¡ãç®æããŠéçºãé²ããŠãããŸãã å ·äœçãªæäŸéå§ææã«ã€ããŠã¯ãæ¯éåŒç€Ÿæ åœå¶æ¥ã販売代çåºã«ãåãåããé ããã°å¹žãã§ã1KViews0likes0Commentsã¢ããªã±ãŒã·ã§ã³ããªããªã¯ãã€ããªããã¢ãã«ãž
Please find the English language post, by Lori MacVittie, from which this was adaptedhere. âã¯ã©ãŠãã¯ãåžå Žã«æµžéâ æãããŠæ¬åœã«ããèšããã®ã§ãããã? äžã®äžã«åºåã£ãŠããã¬ããŒããè¡šé¢çã«èªã¿åãã°ãã¯ã©ãŠãã¯å€ãã®äŒæ¥ã§å°å ¥æžã¿ãšããçµæã«ãªã£ãŠããŸãã ããããå°ãæãäžããŠããŒã¿ã確èªãããšãå šãéã£ãã¹ããŒãªãŒãçºèŠããããšãã§ããŸãããŠãŒã¶äŒæ¥ã®80%ïŒèª¿æ»ããŒã¿ãå ã«æŠç®ããæ°å€ïŒãã¯ã©ãŠããå°å ¥ããŠããŸãããã¢ããªã±ãŒã·ã§ã³ãã¯ã©ãŠãåããå²åã¯éåžžã«äœãããšãåãããŸãã äŸãã°ãF5ãè¡ã£ããã¢ããªã±ãŒã·ã§ã³ã®ã¯ã©ãŠã移è¡ãã«é¢ãã調æ»ã§ã¯ãã¢ããªã±ãŒã·ã§ã³ã®ã¯ã©ãŠã移è¡ã«ãããŠ50%以äžãšåçããäŒæ¥ã¯ãå šäœã®58%ãšãªããŸãããå šãŠã®ã¢ããªã±ãŒã·ã§ã³ãã¯ã©ãŠããžç§»è¡ã§ããŠããäŒæ¥ã®å²åã¯ã©ãã§ããããããã£ãã®6%以äžã§ããTata consulting瀟ã«ãã調æ»å ±åæž ã2014 survey on the adoption of cloud applicationsãã§ã¯ãå¹³åãããšãäŒæ¥ã¢ããªã±ãŒã·ã§ã³ã®24%ãã¯ã©ãŠãã«ç§»è¡ãããŠãããšããçµæã§ããåœç¶ãç¶æ³ã¯åäŒæ¥ã«ãã£ãŠç°ãªãã§ããããããããªãããäŒæ¥ãã¯ã©ãŠãããŸã ãå®å šã«ã䜿ãããªããŠããªãããããã¯ããã«äœ¿ãããªãç¶æ³ã«ã¯ãªãããšã¯èšãããšæããŸãã ãã®ç¶æ³ã¯ãäžèšã®ïŒç¹ã瀺åããŠããŸãã 1. ã¯ã©ãŠããžç§»è¡å¯èœãªå€ãã®ã¢ããªã±ãŒã·ã§ã³ã¯ãäŒæ¥å ã«äŸç¶ãšããŠååšããŠããã 2. ãã€ããªããã¯ã©ãŠããæåã®éµãæ¡ãã äžèš 2ç¹ã¯ãRightScale瀟ãå®æœãã2014幎ã«ã¯ã©ãŠãã«é¢ãã調æ»ã2014 State of the Cloud SurveyããšåèŽãããã®ã§ããã調æ»å¯Ÿè±¡äŒæ¥ã®74%ããã€ããªããã¯ã©ãŠããæ²ãããã®å 50%ã®äŒæ¥ããã©ã€ããŒãã¯ã©ãŠããšãããªãã¯ã¯ã©ãŠãäž¡æ¹ããã§ã«å©çšããŠããããšãæããã«ãªã£ãŠããŸãã ããã¯ãITéšéãCIOãå€ãããªããã°ãªããªããšããããšãæå³ããŠããŸããããããã¯ãã€ããªããã¯ã©ãŠãç°å¢ã«é©ããããŒã¿ã»ã³ã¿ã®éå¶ã«å€ããŠããå¿ èŠããããŸãã ã€ãŸããäŒæ¥ã¯åã«ã¯ã©ãŠããæ¡çšããã ãã§ã¯äžååã§ãããåãããŠã¯ã©ãŠããžã®ç§»è¡æ¹æ³ã«ã€ããŠãèãå§ããªããã°ãããŸãããäŒæ¥ã¯ããã¢ããªã±ãŒã·ã§ã³ãã¯ã©ãŠãäžãžç§»è¡ããããã¢ããªã±ãŒã·ã§ã³ã¯ãªã³ãã¬ãã¹ç°å¢ã«æ®ãããã®ä»ãSaaSãžç§»è¡ãããšãã£ããã€ããªãããªã¢ãããŒããåãç¶ããã§ããããããã¯ãã¢ããªã±ãŒã·ã§ã³ãé 眮ãããå Žæã®å€æ§åãæå³ããŠããŸãã ãŸããã¯ã©ã€ã¢ã³ããµã€ãã®ç¶æ³ãå€æ§åãé²ãã§ããŸããç§ãã¡ã¯å€æ§ãªéçšåœ¢æ ã®ãŠãŒã¶ãæ§ã ãªããã€ã¹ç«¯æ«ãèªåè»ãã¹ããŒãã¡ãŒã¿ãŒçã®ç©ãšããäŸç¶ãããããå€ãã®ã¯ã©ã€ã¢ã³ããã¢ããªã±ãŒã·ã§ã³ãµãŒãã¹ã䜿ãå§ããŠããŸãããã®å€æ§åã«ããããµãŒãã¹ãã¯ã©ã€ã¢ã³ãã«ãã£ããã€ããæ¹æ³ã¯æŽã«è€éã«ãªãç¶ããŠè¡ããŸãã ãã®ãããªè€éã«ãªãç¶ããŠããç¶æ³ã§ãã¢ããªã±ãŒã·ã§ã³ããã åã«ã¯ã©ãŠããžç§»è¡ããŠèµ°ããããšããã¢ãããŒãã ãã§ã¯æåãæã«ããããšã¯ã§ããŸãããäŸãã°ãã¯ã©ã€ã¢ã³ãã¯ã€ã³ã¿ãŒããããçµç±ããŠçŽæ¥ã¯ã©ãŠãã®ãµãŒãã¹ã«ã¢ã¯ã»ã¹ããçµè·¯ããã©ãã®ã§ããããŸã§éããªã³ãã¬ãã¹ç°å¢ã®ããŒã¿ã»ã³ã¿ã«ã¢ã¯ã»ã¹ã³ã³ãããŒã«ããªã·ãŒãä¿æããŠããã¢ãããŒãã§ã¯ãã¯ã©ãŠãäžã«ãããµãŒãã¹ãžã®ã¢ã¯ã»ã¹ã«ã³ã³ãããŒã«ãé©å¿ããããšã¯éåžžã«é£ãããŸããŸãããŸããããã©ãŒãã³ã¹ã«ã倧ããªæªåœ±é¿ãäžããŠããŸããŸããåãããã«ãã¢ããªã±ãŒã·ã§ã³ãã¯ã©ãŠãäžã«ãã¹ããããŠããå Žåãã¢ããªã±ãŒã·ã§ã³ã®ããã©ãŒãã³ã¹ãåäžããããµãŒãã¹ããªã³ãã¬ãã¹ç°å¢ã®ããŒã¿ã»ã³ã¿ã§å±éããã¢ãããŒãã§ã¯ãã¯ã©ã€ã¢ã³ããã€ã³ã¿ãŒããããçµç±ããŠçŽæ¥ã¯ã©ãŠãã®ãµãŒãã¹ã«ã¢ã¯ã»ã¹ãããã©ãã£ãã¯ã«ã¯ããã©ãŒãã³ã¹åäžã®ãµãŒãã¹ãé©çšã§ããªããããããã©ãŒãã³ã¹ãåäžããŸããã ã€ãŸããã¢ããªã±ãŒã·ã§ã³ã®ã¯ã©ãŠã移è¡ãæåãããçºã«ã¯ããªã³ãã¬ãã¹ç°å¢ãšåæ§ã¢ããªã±ãŒã·ã§ã³ã®å¯çšæ§ã»å®å šæ§ã»é«éæ§ãšãã£ãéæ©èœèŠä»¶ãã¯ã©ãŠãç°å¢ã§ãåæã«æ€èšããå¿ èŠããããŸãã ãã®å¯çšæ§ã»å®å šæ§ã»é«éæ§ãã¯ã©ã€ã¢ã³ãããã¢ããªã±ãŒã·ã§ã³ãžã®ã¢ã¯ã»ã¹çµè·¯äžã®ãããã¯ãŒã¯ã§å®çŸããçºã«ãã¬ã€ã€ãŒ4 -7ã®ãã¯ãããžãŒã䜿ãããŸããããŒããã©ã³ãµããã¡ã€ã¢ãŠã©ãŒã«ãWAFãåºåè² è·åæ£è£ 眮çãšãã圢æ ã§è£œååãããŠãããç±³IT倧æã¢ããã€ã¶ãªäŒç€Ÿã¬ãŒãããŒç€Ÿã¯ãããã®è£œåãã¢ããªã±ãŒã·ã§ã³ããªããªã³ã³ãããŒã©ãŒãšåŒãã§ããŸãã ã€ãŸããã¯ã©ãŠã移è¡ãæåãããçºã«ã¯ã¢ããªã±ãŒã·ã§ã³ããªããªãã¯ã©ãŠãã«é©åãªåœ¢æ ã§é 眮ããŠããå¿ èŠããããŸããã§ã¯ãåŸæ¥ã®ãªã³ãã¬ãã¹ç°å¢ã§æäŸãããŠããã¢ããªã±ãŒã·ã§ã³ããªããªã®ãµãŒãã¹ãã¯ã©ãŠãäžã®ã¢ããªã±ãŒã·ã§ã³ãžé©çšããã«ã¯ã©ã®ããã«ã¢ãããŒãããŠããã®ãé©åãªã®ã§ããããïŒãã®çããå°ãåºãçºã«ã¯ããµãŒãã¹ã®ç¹æ§ã«åãããŠããŠãŒã¶ã®è¿ãã«ããã¹ããµãŒãã¹ãšã¢ããªã±ãŒã·ã§ã³ã®è¿ãã«ããã¹ããµãŒãã¹ãååšããäºãç解ããŠããå¿ èŠããããŸããã·ã³ã°ã«ãµã€ã³ãªã³ãWebã»ãã¥ãªãã£ã®ã²ãŒããŠã§ã€ãåºåè² è·åæ£ïŒGSLBïŒã°ããŒãã«ãµãŒãã»ããŒããã©ã³ã·ã³ã°ïŒã¯ãŠãŒã¶ã®è¿ãã«ããã¹ããµãŒãã¹ã§ããSSLæ埩å·åãããŒããã©ã³ã·ã³ã°ããŠã§ãã¢ããªã±ãŒã·ã§ã³ã»ãã¡ã€ã¢ãŠã©ãŒã«ã¯ã¢ããªã±ãŒã·ã§ã³ã®è¿ãã«ååšãã¹ããµãŒãã¹ã§ããããããã¢ããªã±ãŒã·ã§ã³ãã¯ã©ãŠãäžã«ããããŠãŒã¶ãæ§ã ãªå Žæã«ããå Žåããããå®çŸããã®ã¯ç°¡åãªäºã§ã¯ãããŸããã CDNïŒã³ã³ãã³ãã»ããªããªã»ãããã¯ãŒã¯ïŒãåºçŸããã³ã³ãã³ãããŠãŒã¶ãžè¿ã¥ãã¢ããªã±ãŒã·ã§ã³ã®ã¬ã¹ãã³ã¹ã¿ã€ã ãæ¹åããã®ãšåæ§ã«ãã¢ããªã±ãŒã·ã§ã³ã®å¯çšæ§ãå®å šæ§ãé«éæ§ãåäžããã¢ããªã±ãŒã·ã§ã³ããªããªãã¢ããªã±ãŒã·ã§ã³ãšãŠãŒã¶ã«ãšã£ãŠæé©ãªå Žæã«é 眮ããã«ã¯ããã€ããªããã¯ã©ãŠãã®ã¢ãããŒããšãããå®çŸããæ°ããã¢ãã«ãå¿ èŠãšãªã£ãŠããã§ãããã ããããã¯ãã¯ã©ãŠãã ãã§ãªããããŒã¿ã»ã³ã¿ããã®ä»å šãŠã«ãããŠããã€ããªãããäž»æµãšãªã£ãŠè¡ãã§ãããã F5ãããã¯ãŒã¯ã¹ã«ã€ã㊠F5ãããã¯ãŒã¯ã¹ã¯ãã¢ããªã±ãŒã·ã§ã³é åããµããŒããããœãªã¥ãŒã·ã§ã³ãããã€ãã§ããããŠãŒã¶ãå©çšè ãå Žæãæéãåããã¢ããªã±ãŒã·ã§ã³ãæäŸããããã«ãã¯ã©ãŠããããŒã¿ã»ã³ã¿ãSDNãªã©ã®ç°å¢ã容æã«ç®¡çããããã®ãµããŒããæäŸããŠããŸãã ãªãŒãã³ãã€æ¡åŒµæ§ã®é«ããã¬ãŒã ã¯ãŒã¯ãæå 端ã®ãã¯ãããžãããŒã¿ã»ã³ã¿åãã®ãªãŒã±ã¹ãã¬ãŒã·ã§ã³ããŒã«ãªã©ãæäŸããå¹ åºãããŒãããŒãšã³ã·ã¹ãã ãšã®åæ¥ã«ãããF5ãœãªã¥ãŒã·ã§ã³ã¯ããŸããŸãªITé åã«æ¡çšãããŠããŸããF5ã®ãœãªã¥ãŒã·ã§ã³ãããŒãããŒãšã³ã·ã¹ãã ã«ããããŠãŒã¶ã¯é·æã«ããã£ãŠèªç€Ÿã®ããŒãºã«æé©ãªã€ã³ãã©ã¹ãã©ã¯ãã£ã»ã¢ãã«ãæ§ç¯ããããšãã§ããŸããã°ããŒãã«äŒæ¥ããµãŒãã¹ãããã€ããå®å ¬åºãªã©ãF5ã®ãœãªã¥ãŒã·ã§ã³ãå°å ¥ããã¯ã©ãŠããã»ãã¥ãªãã£ãã¢ããªãã£ãªã©ã®ITã®èª²é¡ã解決ããŠããŸããæ¥æ¬ã§ã¯2000幎ã®èšç«ä»¥æ¥ã販売ããµããŒããªã©ããããŒãããŒãéããŠæäŸããŠããŸãã F5ã«ã€ããŠãã詳ããç¥ãããæ¹ã¯http://f5networks.co.jp/ãã芧ãã ããããŸãããã€ãã¿ãŒã«ãŠ@F5Japanã®ã¢ã«ãŠã³ãããææ°æ å ±ãçºä¿¡ããŠãããŸãã®ã§ãæ¯éãã©ããŒãã ããã182Views0likes0CommentsWhatâs new in 2015: consumer hyperawareness, public services going digital, and a shift in the way we view clouds
Like all of us here at F5, I love technology and how it shapes virtually every aspect of the world today â creating opportunities, advancing knowledge, and connecting people. In 2014 alone, weâve seen wearables transition from novelty to mainstream technology, the market for drones take off, big data make big strides from hype to reality, smartphones prices drop as low as US$50, new eCommerce records set in China on singles day and in the US on Black Friday, and much, much more. Weâve also seen some negative superlatives as well, with unprecedented zero-day vulnerabilities like Heartbleed and Shellshock, ever more sophisticated hacks and attacks, and DDoS attacks of a scale and complexity never seen before. Itâs been a fascinating year for geeks and technologists like us (and probably you!). Now weâre into the final month of the year, itâs time look forward all that awaits us in 2015. After lots of lively debate and discussion here in the F5 offices, weâve identified these major trends that we predict will have a huge impact on technology, business, and government â as well as end-users, consumers, and citizens â in the coming year. Let us know what you think! The rise ofâconsumer hyperawareness' Understanding what drives their customers has become a given for any organization interested in success, and in 2015 it will become more critical than ever as businesses fight for competitive advantage with more data about consumers and increased abilities to draw insights from them. We call this new level of customer knowledge âconsumer hyperawareness,â and it will change how organizations deliver and tailor products, services, and support, allowing them to identify and meet consumer needs with previously unimagined precision â creating benefits for businesses and consumers alike. The timing is perfect: network ubiquity, processing power and analytics solutions are now capable of making it happen. And the social media revolution has made people more comfortable than ever about volunteering information and enjoying a rich mix of benefits for doing so. A tipping point for digital delivery of public services Citizens are becoming increasingly connected and tech-savvy at exponential rates, and theyâre starting to demand from their governments the same level of convenience and speed they get from businessesâ online service. In response, we expect to see governments move quickly from dipping their toes into providing public services digitally to diving in full force! The shift may be helped by increased comfort of people to share information and handle transactions, even sensitive ones, online.After all, if people are already sharing what they are eating on Facebook, perhaps theyâd be equally quick to, for example, complete a government survey on the subject, which may well help health authorities take steps to improve nutrition or reduce obesity. The benefits will even extend to schools as governments are able to better personalize education based on data garnered from students and their work. Of course, security will still remain and big issue with this shift in mind, and identity theft will be a key area to protect against as people extend their presences online as citizens and consumers. Not all clouds are created equal For years, the IT industry has been on fire with the idea of getting businesses to move their technology into the cloud â replacing, and in many cases replicating, existing physical data centers with a cloud-based equivalent. However, there has been less focus on efficiency, which can leave some enterprises with OPEX bills as big, or bigger, than the CAPEX they are trying to eliminate. In the coming year, expect to see increased interest in cloud optimization and more enterprises adopting a âCloud Firstâ strategy in many business-technology decisions. In emerging markets in particular, we anticipate rapid and opportunistic adoption of exciting and powerful new technologies and business models that leap frog generations and drive innovation.263Views0likes0Commentsæ°ãããŠã§ããããã³ã«HTTP 2.0ã«ãã¡æ©ã察å¿ããããã®ãã²ãŒããŠã§ã€ããšããèãæ¹
HTTPããSPDYããããŠããããHTTP2.0ãž â é²åãããŠã§ããµãŒãã¹æé©ãªææ°ã®ãŠã§ãã®ãããã³ã«å°å ¥ãèŠæ®ããæ§ã ãªåãçµã¿ãå§ãŸã£ãŠããŸã ã¢ããªã±ãŒã·ã§ã³ãããã€ã¹ããµã€ããŒã»ãã¥ãªãã£ã®é²åã¯ç®ãŸããããé²ãã§ããŸãããã€ã³ã¿ãŒãããã®å€§éšåã®éä¿¡ãæ ãéä¿¡ãããã³ã«ãHTTPãã¯å®ã¯å代ããããŸã倧ããªé²åãéããŠããªã â ããã¯æå€ãšç¥ãããŠããªãçŸå®ã§ãã ã€ã³ã¿ãŒãããæšæºåå£äœã§ããIETFã®è³æã«ãããšãå代ã®HTTP 1.0ãæšæºåãããã®ã1996幎ããããŠãã®æ¬¡äžä»£çã§ããHTTP1.1ãæšæºåãããã®ã1997幎ã§ããããã¯ãGoogleãšããäŒç€ŸãçãŸããåã®è©±ã§ãããŸããæ¥æ¬ã§äžäžã颚é¡ããimodeãµãŒãã¹ãå§ãŸãåã®ã¿ã€ãã³ã°ã§ããããŸããããã«é·ãéãã®ä»æ§ã倧ããå€ãã£ãŠããªãããå®æé ãããšæããŸãããŸãããã®åŸã埡åç¥ã®éãã€ã³ã¿ãŒãããã¯ççºçã«æ®åãããã©ãã£ãã¯éãå¢å ã®äžéã蟿ã£ãŠããŸãã 2015幎ã«HTTP2.0ã®ä»æ§ã¯IETFã«ãã£ãŠæšæºåãããäºå®ã§ããããã«å€ãã®äŒæ¥ã®çŸå Žã§å°å ¥ãé²ããšã¯èãã«ãããã®ã®ãèšå€§ãªã¢ã¯ã»ã¹æ°ãç¶ç¶çã«ç¶ãã¢ããªã±ãŒã·ã§ã³ããµãŒãã¹ã®ã€ã³ãã©ã§ã¯ãã®æ©æµãããå€ãåãããããååãã«æ€èšããã¢ãããŒã·ã§ã³ã«ã¯ãªããšäºæ³ãããŠããŸãã æ°å¹ŽåãHTTP 2.0ã®å身ã§ããSPDYã®å°å ¥ãå§ãŸã£ãéã«ããã¡æ©ã移è¡ãœãªã¥ãŒã·ã§ã³ããææ¡ããã®ãF5ãããã¯ãŒã¯ã¹ã§ãããF5ã®ã»ãã¥ã¢ãã€å®å®ããADCãµãŒãã¹ãšãBIG-IPã«ããã²ãŒããŠã§ã€æ©èœã¯ãèªç€ŸãµãŒãã¹ã®ã€ã³ãã©ãSPDYã«å¯Ÿå¿ãããã«ããããæ倧ã®å°å ¥éå£ãšãªãããµãŒãåŽã®SPDY察å¿äœæ¥ããéçŽãããããšã§ã¹ã ãŒãºãªç§»è¡ãå®çŸã§ããã®ã§ãã å®ã¯ãã®SPDYã²ãŒããŠã§ã€ãšãèšãã¹ãèãæ¹ã¯ãæ¿å€ããããžãã¹ç°å¢ã«æè»ã«å¯Ÿå¿ããã€ã³ãã©ãæ§ç¯ããã®ã«ADCãæ§ã ãªå Žé¢ã§è²¢ç®ãã奜äŸãªã®ã§ããå€ãã¯ADCã§SSLã³ãã¯ã·ã§ã³ã®çµç«¯ãšããã©ãŒãã³ã¹åäžãåè¿°ã®SPDYããããŠä»åã®HTTP2.0ãæè¡ã¯éãã©ãæ ¹å¹¹ãšãªãã¢ãããŒãã¯äžè²«ããŠããŸããæ°ã·ã¹ãã ãžã®ç§»è¡ãæ¥åãšãªã£ããšãã«ãITèšåã®å€§æãããªå€æŽã¯ã³ã¹ããæéã人å¡ã倧ããªãã®ã«ãªããã¡ã§ããBIG-IPã«ããHTTP 2.0ã²ãŒããŠã§ã€ãšããä»å 䟡å€ã«ãã£ãŠãå°ãªãæè³ã§çŽ æ©ãã€ã³ãã©ãHTTP 2.0ã«å¯Ÿå¿ããããªã¯ãšã¹ãæ°ã®æ倧å€ãªã©ã®ç®¡çããªã¯ãšã¹ãåªå é äœä»ãçãã§ããããã«ãªããŸãã ãã®ADCãªãã§ã¯ã®ä»å 䟡å€ãF5ã¯ãŠãŒã¶æ§ãšå ±ã«é«ãç¶ããŠãããŸãããããŠãF5ã®ãœãªã¥ãŒã·ã§ã³ãã䜿ãã®ãŠãŒã¶æ§ã¯å°æ¥çãŸããæ°ããæè¡ãžã®å¯Ÿå¿ãæ°ã¥ããªããã¡ã«æºåã§ããŠããã®ãããããŸããã F5ã®BIG-IPã¯HTTP 2.0ã®ææ°çã®ãã©ããã«å¯Ÿå¿ãã圢ã§early accessïŒæ©ææ€èšŒããã°ã©ã ïŒãå®æœããŠãããæšæºåãããæç¹ã§General AvailabilityïŒäžè¬åãæäŸéå§ïŒãäºå®ããŠãããŸãã For the English version of this article, please go here.427Views0likes0Commentsã»ãã¥ãªãã£ã¯ããã»ã¹ã§ãã
æšä»ã®æ°èèšäºã«ãããŠãæ¯æãã·ã¹ãã ãå«ããIT補åãã¢ããªã±ãŒã·ã§ã³ã®å€ããååãªã»ãã¥ãªãã£æ©èœãæããŠããªããšããèŠåããããŸãããçç±ãšããŠããŸãã»ãã¥ãªãã£ã¯åŸä»ããšããèãããããšããããšãäºã€ç®ã«ã¯ã»ãã¥ãªãã£ã®å°éç¥èãæã£ã人ã¯ããã¶ã€ã³ããããã®è£œåãŸãã¯ã¢ããªã±ãŒã·ã§ã³ã®å®æœã«é¢ãã£ãŠããªããšããããšãæããããŠããŸãã F5ã¯ãã»ãã¥ãªãã£ãããã»ã¹ïŒéçšïŒãšæãããã®ããã«ç®¡çãããã¹ãã§ãããšèããŠããŸããçµç¹ã®äžã§ã»ãã¥ãªãã£ãšã³ã³ãã©ã€ã¢ã³ã¹ãæ©èœãããããã®ããªã·ãŒãç¯ãã»ãã¥ãªãã£ã®å°é家ã«ã¯éèŠãªåœ¹å²ããããŸãããããšåæ§ã«ããœãããŠã§ã¢ãéçºããããã°ã©ããŒã«ãéèŠãªåœ¹å²ããããŸãããäºã€ã®åœ¹å²ã¯æ§è³ªãéããŸãã ããžãã¹ã¢ããªã±ãŒã·ã§ã³ã«ãããã»ãã¥ãªãã£ããªã·ãŒã®æ±ºå®ã¯ããœãããŠã§ã¢ãšã³ãžãã¢ã«å§ããããã¹ãã§ã¯ãããŸããããªããªãã圌ãã¯ã»ãã¥ãªãã£ã®å°é家ã§ã¯ãªãããã§ãããã®ãããå å®ãªæ¹æ³ãšããŠã¯ããœãããŠã§ã¢ããã°ã©ããŒããã»ãã¥ãªãã£ããªã·ãŒã®ã³ãŒãã£ã³ã°äœæ¥ã®è² æ ãæžãããä¿¡é Œã§ããã»ãã¥ãªãã£ãœãªã¥ãŒã·ã§ã³ãããã§ãã·ã§ãã«ã«èšããšããããšã§ãã ã€ãŸããã»ãã¥ãªãã£ããšã³ãããŒãšã³ãã®ããã»ã¹ã§ãããšèªèããããã€ã¹ã§ãããã¢ã¯ã»ã¹ã§ããããããã¯ãŒã¯ãã¢ããªã±ãŒã·ã§ã³ãããŒã¿ã®ä¿åã§ãããäŒæ¥ãšãŠãŒã¶ãŒéã§äº€æµããããšãªã¢ã«ã¯ã©ãã«ã§ãã»ãã¥ãªãã£ç®¡çã®ããªã·ãŒãå¿ èŠã§ããããããã®ããŒãã®è€éæ§ãèæ ®ãããšãããã€ãã®ã»ãã¥ãªãã£ã®æžå¿µãå ±æã®ãœãªã¥ãŒã·ã§ã³ã«ãŸãšããæ¹ãããå ŽåããããŸããèŠã¯ããã®ãããªæ¹æ³ã§ã»ãã¥ãªãã£ããã»ã¹ãç°¡çŽ åããããšã¯ãã³ã³ãµã«ã¿ã³ããããžãã¹ã®äžçã§äœ¿ã âBPRâ (business process re-engineering: ããžãã¹ããã»ã¹ã»ãªãšã³ãžãã¢ãªã³ã°)ã®ãããªãã®ã§ããCFOïŒæé«è²¡å責任è ïŒã®èŠ³ç¹ãããããšãéå¶é¢ãããè³æ¬é¢ããèŠãŠããããã¯è«å€§ãªã³ã¹ãåæžã«ã€ãªãããŸãã äŸãã°ãã¢ããªã±ãŒã·ã§ã³ã»ãã¥ãªãã£ã®å Žåããã¬ã³ããªã®ã¯ãã¢ããªã±ãŒã·ã§ã³ããªããªã³ã³ãããŒã©ãŒ(ADCs)ã®äžã«ã»ãã¥ãªãã£æ©èœãçµã¿èŸŒãããšã§ããADCsã¯ããšããšãã¢ããªã±ãŒã·ã§ã³ãå®å šã«ãšã³ããŠãŒã¶ã«å±ãããã«èšèšãããŠããŸããä»æ¥ã®æèã§ã¯ãADCsã¯ã¢ããªã±ãŒã·ã§ã³ã®ããã®ã²ãŒãããŒããŒã®ãããªåœ¹å²ãæãããŸããæš©éã®ãªãã¢ã¯ã»ã¹ãé²ããOpen Web Application Security Project (OWASP)â»ã«ããå®çŸ©ããããããªè€éãªã¢ããªã±ãŒã·ã§ã³ã¬ãã«ã«å¯Ÿããæ»æãé²åŸ¡ããããšãã§ããŸãã ããããç¶æ³ã¯ããã«è€éã«ãªã£ãŠããŠããŠãCIOïŒæé«æ å ±è²¬ä»»è ïŒã¯ãä»ã®èª²é¡ã«ãçŽé¢ããŠããŸããè¿å¹Žã®è¥ãåŸæ¥å¡ã¯ãåŸæ¥å¡ãšããŠã®æš©å©ã䞻匵ããèŠæ±ãå€ããªã£ãŠããŠããŸããèªããéžæããããã€ã¹ïŒã¿ãã¬ãããã¹ããŒããã©ã³çïŒãèªç±ã«éžæããŠä»äºãããããšãã圌ãã®èŠæ±ã«å¿ãã€ã€ãèªèº«ã®SNSãšè·å Žã§ã®ãããã¯ãŒã¯ãã·ãŒã ã¬ã¹ã«åãæ¿ããããšãã圌ãã®èŠæã«ãçããªããã°ãªããŸãããCIOã«ãšã£ãŠã®èª²é¡ãšã¯ãè åšã®å¢å ãšè€éåãåã«ãããã«ããŠäŒæ¥ã®è³ç£ãå®ãããšããããšã§ããå ããŠãCIOã¯ã³ã¹ã管çã®ããã«ã¯ã©ãŠããç©æ¥µçå©çšããããšèããŠããŸãããã®ãããªCIOã®åžæãšã»ãã¥ãªãã£äžã®é æ ®ãäž¡ç«ããããšã¯é£ããã管çäžèœãªç¶æ³ã«é¥ãå¯èœæ§ããããŸãã ãã®ç¶æ³ã«å¿ èŠãªã®ã¯ããŠãŒã¶ãŒã®æ¶è²»è¡åã«å ããŠäŒæ¥ã¢ããªã±ãŒã·ã§ã³ãç解ãããœãªã¥ãŒã·ã§ã³ã§ããå ããŠããŠãŒã¶ãŒã®äœ¿çšç°å¢ãžã®åœ±é¿ãæå°éã«ãšã©ãã€ã€ãäŒæ¥ã®ã»ãã¥ãªãã£ããªã·ãŒãå®æœããããšãå¿ èŠãšãªããŸããF5ã¯ã»ãã¥ãªãã£ãä¿¡é Œã®ããžãã¹ã ãšèããŠããŸããæ£ããããã»ã¹ãšããªã·ãŒãæã£ããã³ããŒãéžæããããšãéåžžã«éèŠã§ããããªã·ãŒãšããã»ã¹ãå¿ èŠãªãœãªã¥ãŒã·ã§ã³ã決å®ããã®ã§ãã£ãŠããã®éã§ã¯ãªãã®ã§ãã â»Open Web Application Security Project (OWASP): ãŠã§ãã¢ããªã±ãŒã·ã§ã³ã»ãã¥ãªãã£ããšããŸã課é¡ã解決ããããšãç®çãšãããåœéçãªãªãŒãã³ãªã³ãã¥ããã£http://appsecapac.org/2014/owasp-appsec-apac-2014/about-owasp/ã For an English version of this post, please click here.165Views0likes0Commentsã¢ãžã¢-倪平æŽå°åã«ãããã¯ã©ãŠãã®ç¶æ³ - 第äºéš
ãã®èšäºã¯The state of the APAC cloud â Part 5 (https://devcentral.f5.com/s/articles/the-state-of-the-apac-cloud-part-5)ã®æèš³çã§ãã ãã®ããã°ãã¹ãã¯ã¢ãžã¢ã»å€ªå¹³æŽå°åã®ã¯ã©ãŠãã«é¢ããäžé£ã®èšäºã®ç¬¬äžéšã§ããã¢ãžã¢ã»å€ªå¹³æŽå°åºã®ã¯ã©ãŠãã®ç¶æ³ãã©ã®ããã«äœ¿çšãããŠããããå©çšã劚ããŠãããã®ãã€ãããŒã·ã§ã³ã®ããã®ã¯ã©ãŠãã®æŽ»çšæ¹æ³çãå«ãŸããŠããŸãã ãããŸã§ã®èšäºã§ã¯ãã¢ãžã¢ã»å€ªå¹³æŽå°åã«ãããã¯ã©ãŠãã®ç¶æ³(第äžéšïŒããŸãäŒæ¥ã®ã¯ã©ãŠãå©çšäºäŸ(第äºéš)ã«ã€ããŠèå¯ããŠããŸãããç¹ã«éèæ¥çã«ã€ããŠã¯è©³ãã説æããŠããŸã(第äžéšã第åéš)ãä»åã®ç¬¬äºéšã§ã¯ãã¯ã©ãŠãã®äŒæ¥ãããŒã·ã§ã³åµåºã«ããã圹å²ã«ã€ããŠèå¯ããŸãã 倧äŒæ¥ããããŸã§çŠç¹ã眮ããŠããã®ã¯ãæ¥åã®æå¹æ§ã§ãããããããITã®æ®åã«ãããã©ã®äŒæ¥ãããããçšåºŠåãã¹ã¿ãŒãã©ã€ã³ã«ç«ã€ããšãã§ããããã«ãªã£ãããšã§ãã€ãããŒã·ã§ã³ãããäŒæ¥éã®éããçãäžã§ã®äž»ãªçŠç¹ãšãªã£ãŠããŸããããã®ãããªæ代ã®äžã§ãã¯ã©ãŠããã€ãããŒã·ã§ã³åµåºãåŸæŒããã匷åãªãšã³ãžã³ãšãªãåŸãŸãããªãã§ããããã ã¯ã©ãŠãã«ãããããã€ã®èªåå åžžã«çºå±ãç¶ããŠããäŒæ¥ã«ãšã£ãŠããããã€ã¡ã³ãã¯ã倧ããªãªãœãŒã¹ã®æå ¥ãå¿ èŠãšããå¯èœæ§ããããŸããããã§ãäºãããã±ãŒãžåãããçµ±åã³ã³ãã³ããå©çšããã¯ã©ãŠããœãªã¥ãŒã·ã§ã³ãæšæºããŒã¹ã®ã¢ããªã±ãŒã·ã§ã³ã»ããã°ã©ãã³ã°ã»ã€ã³ã¿ãŒãã§ãŒã¹ããŸãç¬èªã®ã¢ããªã±ãŒã·ã§ã³ã»ããªããªã»ãã³ãã¬ãŒãã«ãã£ãŠãã®åé¡ã解決ããããšãã§ããŸãããã®çµæãšããŠãæé«æ å ±è²¬ä»»è (CIO)ã¯ãã¯ãè€éãªãªãã¬ãŒã·ã§ã³ããã»ã¹ã調æŽããå¿ èŠããªããªããããé«ãå¹çæ§ããããããšãšãã«ã䌎ããªã¹ã¯ãäœäžãããããšãã§ããŸããF5ãããã¯ãŒã¯ã¹ã®ãããªãã³ããŒã¯ããã«äžæ©é²ãã§ããããã¯ãŒã¯ã®ç®¡çèœåãšãµãŒããŒã®ä»®æ³åãçµ±åããŠããŸããããã«ããããããã€ã®è€éæ§ãæžå°ãããå¹çæ§ãšçç£æ§ãé«ããŸãã ã¯ã©ãŠãã«ããäºåè² æ ã®é€å» ã¯ã©ãŠãã掻çšããITã€ã³ãã©ã®äžéšãå€æ³šããããšã«ãã£ãŠãCIOã¯éå¶è² æ ãæŽã«æžããããšãã§ããŸããäžã«ã¯ãã€ã³ãã©å šäœãå€æ³šããããšã«ãããã€ã³ãã©ç®¡çã人æäžè¶³ãšãã£ãå¿é ãšã¯ç¡çžã«ãªã£ãäŒæ¥ããããŸãããã®ç¶æ³äžã§ã®CIOã®åœ¹å²ã¯ãèªç€Ÿãšå€æ³šå äŒæ¥ãåãäºæ¥ç®æšã§äžèŽããŠããããåžžã«ç¢ºèªããå€æ³šå äŒæ¥ãšã®è¯ãé¢ä¿ãæ§ç¯ããããšã®ã¿ã«ãªããŸããããã«ãããäŒæ¥ã®å éšITããŒã ãäºåäœæ¥ãã解æŸããããšãã§ãã圌ãã¯ã€ãããŒã·ã§ã³åµåºã«éäžããããšãã§ããŸãã ã¯ã©ãŠãã«ããã³ã©ãã¬ãŒã·ã§ã³ã®å®çŸ ã€ãããŒã·ã§ã³ã¯å€ãã®å Žå人ãšäººãšã®ååã®çµæã«ãããçã¿åºãããŸããè€æ°ã®ããã€ã¹ãç°ãªããã±ãŒã·ã§ã³ã«è·šãååé¢ä¿ãå®çŸããã¯ã©ãŠãã掻çšããããšã§ãã€ãããŒã·ã§ã³ã®å¹æãäœåã«ãã§ããŸããForbes Insightã®èª¿æ»ã«ãããšãã¯ã©ãŠãæ¯æè ã®å€ãã¯ãã¯ã©ãŠããå©çšããããšã«ããåªããååé¢ä¿ãå®çŸãããã€ãããŒã·ã§ã³ãåµåºããçŽ æŽãããæ©äŒãçµéšããŠããŸãã ã¯ã©ãŠãã«ããCIOïŒæé«æ å ±è²¬ä»»è ïŒãšä»ã®çµå¶å¹¹éš(CEO,COO CFOç)ã®å¢çç·ã®æé€ ITãæ°äž»åããã¯ã©ãŠããå©çšããããšã«ãã£ãŠãä»ã®éšéãšITã«é¢ããè² æ ãåæ ããããšãå¯èœãšãªããŸãããCMOïŒæé«ããŒã±ãã£ã³ã°è²¬ä»»è ïŒãCOOïŒæé«å·è¡è²¬ä»»è ïŒãæ°ããã¯ã©ãŠããµãŒãã¹ã掻çšããããšãã§ããããã«ãªãããã¯ãæé«æ å ±è²¬ä»»è (CIO)ã®ã¿ãITã®å°é家ãšããæ代ã¯çµãããŸãããããã«ãããä»ã®çµå¶å¹¹éšãšCIOãšã®åãæ¹ãå€åããäŒæ¥å ã§ITã€ãããŒã·ã§ã³ãèµ·ããããšãå¯èœãšãªã£ãã®ã§ãããŸããCIOãå é²çãªITæŠç¥å®¶ãšããŠãé·æçãªçµå¶ç®æšãšåèŽããäžæ žããã»ã¹ã競äºåã®ããå·®å¥åèŠå ã«çŠç¹ãããŠãããšãã§ããããã«ãªããŸãã ã¯ã©ãŠãã®äžã§ããã¢ãžã¢ã»å€ªå¹³æŽå°åã§ã¯ããã©ã€ããŒãã¯ã©ãŠãããæãæ¡çšãããŠããŸãããã¯ã©ãŠããžã®ç§»è¡ã«ãããã¢ãžã¢ã®CIOã¯ITãžã®æè³ã«ããæŠç¥çã«ãªã£ãŠããŸãããããããæ¢åã®ããããŠæ°èŠã®æ¥åãã¢ããªã±ãŒã·ã§ã³ã«ãããªãã¯ã¯ã©ãŠãã掻çšããããšã«ãã£ãŠãCIOãITããŒã ã¯æŽã«å€§ããªæ©äŒãçã¿åºãããšãã§ããŸãããããã¯ãæ¥ã ã®ç®¡çã®ããã«äœ¿ãããŠãã人çè³æºãæžããå¯èœæ§ãç§ããŠããŸãã ããæŠç¥çã«ãªãããšãäŒæ¥ãé²ãã¹ãæ£ããæ¹åã§ãã競åä»ç€Ÿããåªäœã«ç«ã€ããã«ãITã€ãããŒã·ã§ã³ãžã®äŸå床ãçã é«ãŸã£ãŠãããITäŒæ¥ã¯ä»ãæè¡çãªã¢ããã€ã¹ãæäŸããäžã§ç¹æ®ãªããžã·ã§ã³ã«äœçœ®ããŠããŸããããããäŒæ¥ããŸããèªèº«ãã€ãããŒã·ã§ã³åµåºãžã®ãšã³ãžã³ãžãšå€åãããããã«ãITæ§é ã®ãããã€ãç¶æãå¹çåãžã®å ±ãããªãäœæ¥ãæé€ããåªåãããå¿ èŠããããŸãããã®åé¡ã®è§£æ±ºçã¯ãã¯ã©ãŠãã«ãããšèšããã§ãããã242Views0likes0Commentsã¢ãžã¢-倪平æŽå°åã«ãããã¯ã©ãŠãã®ç¶æ³ - 第äžéš
ãã®èšäºã¯The State of the APAC cloud â Part 3 (https://devcentral.f5.com/s/articles/the-state-of-the-apac-cloud-part-3) ã®æèš³çã§ãã ãã®ããã°ãã¹ãã¯ã¢ãžã¢ã»å€ªå¹³æŽå°åã®ã¯ã©ãŠãã«é¢ããäžé£ã®èšäºã®ç¬¬äžéšã§ããã¢ãžã¢ã»å€ªå¹³æŽå°åºã®ã¯ã©ãŠãã®ç¶æ³ãã©ã®ããã«äœ¿çšãããŠããããå©çšã劚ããŠãããã®ãã€ãããŒã·ã§ã³ã®ããã®ã¯ã©ãŠãã®æŽ»çšæ¹æ³çãå«ãŸããŠããŸããéèã»ã¯ã¿ãŒã«ãããã¯ã©ãŠãã«ã€ããŠãèå¯ããŸãã åå第äºéšã§ã¯ãã¢ãžã¢ã»å€ªå¹³æŽã«ãããã¯ã©ãŠãã®çŸæ³ãæãäžããå®éã«äŒæ¥ãããã«ã¯ã©ãŠããå©çšããŠããããèå¯ããŸãããä»åã®èšäºã«ãããŠã¯ãéèæ¥çãã©ã®ããã«ã¯ã©ãŠããæããŠããããåæããŠãããŸãããŸããåæ¥çã«ãããã¯ã©ãŠãæŠç¥ã«ã€ããŠãã話ãããŸãã éèæ¥çã«ãããŠæãéèŠãªãã®ã¯ä¿¡çšã§ããä¿¡çšã倱ãã°ãéèæ©é¢ã¯æ¥åãéè¡ããããšã¯ã§ããŸãããéå»äœå¹Žã«ãããããæ¿åºã¯å€ãã®èŠå¶ãæ³åŸãå°å ¥ããä¿¡çšåŒ·åãšãéèæ©é¢ã®é¡§å®¢ã®ä¿è·ã«åªããŠããŸããããã®çµæãããŒã¿äº€æãããŒã¿ã®ãã©ã€ãã·ãŒåé¡ã«å¯ŸããèŠå¶ã«ãããå€ãã®éèæ©é¢ããªã³ãã¬ãã¹ã®ãã©ãããã©ãŒã ããã¯ã©ãŠãç°å¢ã«ç§»è¡ããã®ãèºèºããŠããŸããã éèæ©é¢ãã¯ã©ãŠããå©çšããäžã§3ã€ã®é害ãååšããŸãïŒ èŠå¶ ã¢ãžã¢ãå«ããäžçäžã«ãããŠãã¯ã©ãŠãã®æ¡çšã¯å¢å ããŠããŸãããããŒã¿ã»ãã¥ãªãã£ãããã³ã³ã³ãã©ã€ã¢ã³ã¹ã®éµå®èŠä»¶ããéèæ©é¢ã®ã¯ã©ãŠãå©çšã劚ããŠããŸããç¹ã«éèæ©é¢ã®ããŒã¿ã¯ãç±³åœã®äžå ŽäŒæ¥äŒèšæ¹é©ããã³ãµãŒãã³ã¹ã»ãªã¯ã¹ãªãŒæ³(Sarbanes-Oxley)ãã°ã©ã ã»ãªãŒãã»ãã©ã€ãªãŒæ³(Gramm-Leach-Bliley Act)ããŸããè±åœã®ããŒã¿ä¿è·æ³(Data Protection Act)ã®ãããªæ³èŠå¶ã«å®ããããŠããããã«ãå®å šãã€ãã¢ã¯ã»ã¹å¶åŸ¡ããªãããŠããå¿ èŠããããŸããååœã®èŠå¶åœå±ã顧客ããŒã¿ãèªåœå ã§ç®¡çããããæ±ããŠããŸãããã®ãããèŠå¶ãèŠçŽãããªãéãã顧客ããŒã¿ã«é¢ããããã»ã¹ã¯ãã¯ã©ãŠãã«ç§»è¡ããããã«ãããŸãããããããªãããéèæ©é¢ã®å€ããã顧客ããŒã¿ã«é¢äžããªãããã»ã¹ã«ãããŠã¯ã©ãŠãã®å©çšãè©äŸ¡ãå§ããŠããä»ãæ¢ã«ã¯ã©ãŠããè©Šéšçšã«å©çšãããããµãŒãã¹éå¶ãã€ãããŒã·ã§ã³ã«å©çšããŠããéèæ©é¢ãååšããŸãã å®å šæ§ã«é¢ããèªè éè¡ã«ãšã£ãŠãã»ãã¥ãªãã£ã¯æéèŠèª²é¡ã§ããæ£ããèšå®ãããã°ãã¯ã©ãŠããå®å šã§ãããã€ã³ã¿ãŒãããã¯å®å®æ§ã«æ¬ ãããšããèªèã«ãããå€ãã®éèæ©é¢ãã¯ã©ãŠãã®å©çšã«äºã®è¶³ãèžãã§ããŸãããã®ãããªèªèã¯ãæéãšãšãã«å€åãããšæãããŸãããã¯ã©ãŠããããŒã¹ã«ããéè¡ã«å¯ŸããŠã顧客ã®äžå®æãç¡ããªããŸã§ã¯ãŸã ãã°ããæããã§ããããããããŠãããã¡ã«ããã§ã«å€ãã®éèæ©é¢ããæè»æ§ãšçµè²»åæžãå®çŸãããããªãã¯ã¯ã©ãŠãã®å©ç¹ã䜵ãæã¡ãããå®å šã«èšèšããããã©ã€ããŒãã¯ã©ãŠããæ§ç¯ããŠããŸãã ã¯ã©ãŠã移è¡ã®ã³ã¹ã éèæ©é¢ã«ãšã£ãŠãããŠã³ã¿ã€ã ã¯èŽåœçã§ããäŸãäžç¬ã§ãã£ãŠããããŠã³ã¿ã€ã ã¯ãè«å€§ãªæ倱ãä¿¡çšã®å€±å¢ãæœåšç顧客ã®åªå€±ãã¡ãã£ã¢ãžã®ãã¬ãã£ããªé²åºãæå³ããŸããã¯ã©ãŠããžã®ç§»è¡ã«ã¯ãå€ãã®åŽåãå¿ èŠãšããŸãããã®ãããéèæ©é¢ã®å€ãããã®ç§»è¡ã«äŒŽããªã¹ã¯ã«æ éã«ãªããããåŸãŸããããŸããæ代é ãã«ãªã£ãã·ã¹ãã ã®å©çšãšãïŒæ³éµå®ã®ç®çã§ä¿ç®¡ãããŠããïŒèšå€§ãªããŒã¿ãäºæ ãããè€éã«ããŠããŸããèŠå¶ã«ãããå šãŠã®ã¢ããªã±ãŒã·ã§ã³ãããã»ã¹ãã¯ã©ãŠãã«ç§»è¡ããããšã¯ã§ããŸããããã®ãããéè¡ã¯ãã©ã®ããã»ã¹ãã¯ã©ãŠãã«ç§»è¡ããããšãã§ããçŸåšã®ããŒã¿ã»ã³ã¿ãŒãžã®å®å šã§ä¿¡é Œã§ããæ¥ç¶ãç¶æã§ããããšããããšãåæãã段éçã«èšç»ãå®è¡ã«ç§»ããªããã°ãªããŸãããã¯ã©ãŠã移è¡ãžã®ããŒã«ã¯ãããã«æ¹åãããããå æ¬çã«ãªã£ãŠããŠãããããããã¯å®çŸå¯èœã«ãªã£ãŠããŠããŸããå°æ¥ãèŠæ®ããéèæ©é¢ã¯ãã¹ã ãŒãºã«ã¯ã©ãŠã移è¡ãã§ãããããã¯ã©ãŠããè©Šéšçšã«å©çšããŠããŸãã äžèš3ã€ã®é害ãåå ã§ãå€ãã®éèæ©é¢ããäž»ã«ãã©ã€ããŒãã¯ã©ãŠããžç§»è¡ããŠããŸããããã®ãã©ã€ããŒãã¯ã©ãŠããžã®ç§»è¡ã¯ãæ¿åºã«ããæäœèªå·±è³æ¬èŠä»¶ã®å¢å ãšã³ã³ãã©ã€ã¢ã³ã¹è²»çšã®å¢å ã«ã€ããçµè²»åæžã®æ¹æ³ã暡玢ããŠããéèæ©é¢ã«ããçœåŒãããŠããŸããããã©ã€ããŒãã¯ã©ãŠãã¯ãå€ãã®éèæ©é¢ã掻çºãªããžãã¹éèŠã«å¿ãã€ã€ãããããã®ç®æšãéæã§ããããæå©ãããŠããŸãã 次åã®èšäºã§ã¯ãã¢ãžã¢ã»å€ªå¹³æŽå°åã®éèæ¥çã«ããã5ã€ã®ã¯ã©ãŠãå©çšäºäŸãã玹ä»ããããšæããŸãã160Views0likes0Comments