{"id":16443,"date":"2025-06-24T10:45:12","date_gmt":"2025-06-24T10:45:12","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=16443"},"modified":"2025-06-24T10:45:12","modified_gmt":"2025-06-24T10:45:12","slug":"anchor-technologies-launches-censys-cyber-threat-tool","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/anchor-technologies-launches-censys-cyber-threat-tool\/","title":{"rendered":"\u30a2\u30f3\u30ab\u30fc\u30fb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30ba\u304c\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u30c4\u30fc\u30eb\u300cCensys\u300d\u3092\u767a\u8868"},"content":{"rendered":"<p><a href=\"https:\/\/anchor-u.com\/\">\u30a2\u30f3\u30ab\u30fc\u30c6\u30af\u30ce\u30ed\u30b8\u30fc<\/a> \u682a\u5f0f\u4f1a\u793e\u30bb\u30f3\u30b7\u30b9\u306f\u3001\u7c73\u56fdCensys Inc.\u304c\u958b\u767a\u3057\u305f\u300cCensys Platform\u300d\u30922025\u5e747\u6708\u3088\u308a\u6b63\u5f0f\u306b\u8ca9\u58f2\u958b\u59cb\u3057\u307e\u3059\u3002\u30bb\u30f3\u30b7\u30b9\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306f\u3001\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u4e0a\u306e\u6a5f\u5668\u3084\u30a6\u30a7\u30d6\u30b5\u30a4\u30c8\u3001\u8a3c\u660e\u66f8\u306a\u3069\u306e\u8cc7\u7523\u3092\u30b9\u30ad\u30e3\u30f3\u30fb\u5206\u6790\u3057\u3001\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u306e\u65e9\u671f\u767a\u898b\u3084\u30ea\u30b9\u30af\u7ba1\u7406\u3092\u652f\u63f4\u3057\u307e\u3059\u3002<\/p>\n<p>Censys\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306f\u3001IPv4\u304a\u3088\u3073\u65e2\u77e5\u306eIPv6\u30a2\u30c9\u30ec\u30b9\u7a7a\u9593\u5168\u4f53\u300165,535\u30dd\u30fc\u30c8\u3092\u30ab\u30d0\u30fc\u3057\u3001\u4e16\u754c\u6700\u5927\u306eX.509\u8a3c\u660e\u66f8\u306e\u30ea\u30dd\u30b8\u30c8\u30ea\u3092\u53ce\u5bb9\u3057\u3066\u3044\u307e\u3059\u3002Censys\u306f\u3001\u516c\u958b\u3055\u308c\u305f\u8cc7\u7523\u3001\u653b\u6483\u8005\u306e\u30a4\u30f3\u30d5\u30e9\u30b9\u30c8\u30e9\u30af\u30c1\u30e3\u3001\u9032\u5316\u3059\u308b\u653b\u6483\u624b\u6cd5\u3092\u30ea\u30a2\u30eb\u30bf\u30a4\u30e0\u3067\u53ef\u8996\u5316\u3057\u307e\u3059\u3002<\/p>\n<p>\u9ad8\u7cbe\u5ea6\u306e\u30c7\u30fc\u30bf\u3001AI\u3092\u99c6\u4f7f\u3057\u305f\u6d1e\u5bdf\u3001\u4f01\u696d\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u653b\u6483\u8005\u306e\u884c\u52d5\u3084\u50be\u5411\u306b\u95a2\u3059\u308b\u6df1\u3044\u77e5\u8b58\u3092\u7d44\u307f\u5408\u308f\u305b\u308b\u3053\u3068\u3067\u3001Censys\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c1\u30fc\u30e0\u304c\u65b0\u305f\u306a\u8105\u5a01\u3092\u5148\u53d6\u308a\u3057\u3001\u8fc5\u901f\u306b\u5bfe\u5fdc\u3067\u304d\u308b\u3088\u3046\u652f\u63f4\u3057\u307e\u3059\u3002<\/p>\n<h4>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/mitsui-secure-directions-launch-japans-first-ot-audit\/\" rel=\"bookmark\">\u4e09\u4e95\u7269\u7523\u3068\u30bb\u30ad\u30e5\u30a2\u30c7\u30a3\u30ec\u30af\u30b7\u30e7\u30f3\u3001\u65e5\u672c\u521d\u306eOT\u76e3\u67fb\u3092\u958b\u59cb<\/a><\/h4>\n<p>\u8fd1\u5e74\u3001\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306f\u591a\u69d8\u5316\u30fb\u5de7\u5999\u5316\u3057\u3066\u304a\u308a\u3001\u591a\u304f\u306e\u4f01\u696d\u3067\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528\u306e\u8ca0\u8377\u304c\u5897\u5927\u3057\u3066\u3044\u307e\u3059\u3002Censys Platform\u306f\u3001\u3053\u306e\u3088\u3046\u306a\u8ab2\u984c\u3092\u89e3\u6c7a\u3057\u3001\u696d\u52d9\u52b9\u7387\u5316\u3068\u30ea\u30b9\u30af\u306e\u53ef\u8996\u5316\u306e\u4e21\u7acb\u3092\u5b9f\u73fe\u3059\u308b\u305f\u3081\u306b\u958b\u767a\u3055\u308c\u307e\u3057\u305f\u3002<\/p>\n<p><strong>\u30bd\u30fc\u30b9 <a href=\"https:\/\/prtimes.jp\/main\/html\/rd\/p\/000000005.000111431.html\">PR\u30bf\u30a4\u30e0\u30ba<\/a><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Anchor Technologies Inc. will officially begin selling the &#8220;Censys Platform,&#8221; developed by US-based Censys Inc., in July 2025. The Censys Platform scans and analyzes assets such as devices, websites, and certificates on the Internet, supporting early detection of cyber threats and risk management. The Censys Platform covers the entire IPv4 and known IPv6 address space, 65,535 ports, and houses the world&#8217;s largest repository of X.509 certificates. Censys provides real-time visibility into exposed assets, attacker infrastructure, and evolving attack methods. Combining highly accurate data, AI-driven insights and deep knowledge of enterprise security and attacker behavior and trends, Censys helps security teams stay ahead of new threats and respond quickly. Also Read: [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16495,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,184,211,237,206,85],"tags":[5583,5582,1786,110,1685],"ppma_author":[205],"class_list":{"0":"post-16443","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-cybersecurity","9":"category-japan","10":"category-news","11":"category-regional","12":"category-tech","13":"tag-anchor-technologies","14":"tag-censys","15":"tag-cyber-threat","16":"tag-cybersecurity","17":"tag-threat-intelligence"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Anchor Technologies Starts Selling Censys Threat Platform<\/title>\n<meta name=\"description\" content=\"Anchor Technologies will offer the Censys Platform to enhance cyber threat detection through internet asset analysis and risk management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/anchor-technologies-launches-censys-cyber-threat-tool\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anchor Technologies Starts Selling Censys Threat Platform\" \/>\n<meta property=\"og:description\" content=\"Anchor Technologies will offer the Censys Platform to enhance cyber threat detection through internet asset analysis and risk management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/anchor-technologies-launches-censys-cyber-threat-tool\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-24T10:45:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/06\/Anchor-Technologies-begins-sales-of-cyber-threat-analysis-tool.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"NewsDesk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"NewsDesk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u30a2\u30f3\u30ab\u30fc\u30fb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30ba\u304cCensys\u8105\u5a01\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306e\u8ca9\u58f2\u3092\u958b\u59cb","description":"\u30a2\u30f3\u30ab\u30fc\u30fb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30ba\u306f\u3001\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u8cc7\u7523\u5206\u6790\u3068\u30ea\u30b9\u30af\u7ba1\u7406\u3092\u901a\u3058\u3066\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u306e\u691c\u77e5\u3092\u5f37\u5316\u3059\u308bCensys Platform\u3092\u63d0\u4f9b\u3057\u307e\u3059\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/anchor-technologies-launches-censys-cyber-threat-tool\/","og_locale":"ja_JP","og_type":"article","og_title":"Anchor Technologies Starts Selling Censys Threat Platform","og_description":"Anchor Technologies will offer the Censys Platform to enhance cyber threat detection through internet asset analysis and risk management.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/anchor-technologies-launches-censys-cyber-threat-tool\/","og_site_name":"itbusinesstoday","article_published_time":"2025-06-24T10:45:12+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/06\/Anchor-Technologies-begins-sales-of-cyber-threat-analysis-tool.webp","type":"image\/webp"}],"author":"NewsDesk","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"NewsDesk","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"1\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/anchor-technologies-launches-censys-cyber-threat-tool\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/anchor-technologies-launches-censys-cyber-threat-tool\/"},"author":{"name":"NewsDesk","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/d58d81f55e8acd257ab63d49fb4ea812"},"headline":"Anchor Technologies Launches Censys Cyber Threat Tool","datePublished":"2025-06-24T10:45:12+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/anchor-technologies-launches-censys-cyber-threat-tool\/"},"wordCount":167,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/anchor-technologies-launches-censys-cyber-threat-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/06\/Anchor-Technologies-begins-sales-of-cyber-threat-analysis-tool.webp","keywords":["Anchor Technologies","Censys","cyber threat","cybersecurity","threat Intelligence"],"articleSection":["APAC","Cybersecurity","Japan","News","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/anchor-technologies-launches-censys-cyber-threat-tool\/","url":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/anchor-technologies-launches-censys-cyber-threat-tool\/","name":"\u30a2\u30f3\u30ab\u30fc\u30fb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30ba\u304cCensys\u8105\u5a01\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306e\u8ca9\u58f2\u3092\u958b\u59cb","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/anchor-technologies-launches-censys-cyber-threat-tool\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/anchor-technologies-launches-censys-cyber-threat-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/06\/Anchor-Technologies-begins-sales-of-cyber-threat-analysis-tool.webp","datePublished":"2025-06-24T10:45:12+00:00","description":"\u30a2\u30f3\u30ab\u30fc\u30fb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30ba\u306f\u3001\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u8cc7\u7523\u5206\u6790\u3068\u30ea\u30b9\u30af\u7ba1\u7406\u3092\u901a\u3058\u3066\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u306e\u691c\u77e5\u3092\u5f37\u5316\u3059\u308bCensys Platform\u3092\u63d0\u4f9b\u3057\u307e\u3059\u3002.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/anchor-technologies-launches-censys-cyber-threat-tool\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/anchor-technologies-launches-censys-cyber-threat-tool\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/anchor-technologies-launches-censys-cyber-threat-tool\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/06\/Anchor-Technologies-begins-sales-of-cyber-threat-analysis-tool.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/06\/Anchor-Technologies-begins-sales-of-cyber-threat-analysis-tool.webp","width":1200,"height":800,"caption":"Anchor-Technologies"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/anchor-technologies-launches-censys-cyber-threat-tool\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"Anchor Technologies Launches Censys Cyber Threat Tool"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/d58d81f55e8acd257ab63d49fb4ea812","name":"\u30cb\u30e5\u30fc\u30b9\u30c7\u30b9\u30af","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png74f313ad3d6fa27a1eee85c30be63d03","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","caption":"NewsDesk"},"sameAs":["https:\/\/itbusinesstoday.com"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/newsdesk\/"}]}},"authors":[{"term_id":205,"user_id":4,"is_guest":0,"slug":"newsdesk","display_name":"NewsDesk","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/16443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=16443"}],"version-history":[{"count":1,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/16443\/revisions"}],"predecessor-version":[{"id":16444,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/16443\/revisions\/16444"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/16495"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=16443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=16443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=16443"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=16443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}