{"id":31630,"date":"2026-04-17T10:51:23","date_gmt":"2026-04-17T10:51:23","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=31630"},"modified":"2026-04-17T10:51:23","modified_gmt":"2026-04-17T10:51:23","slug":"why-companies-ignore-physical-security-until-failure","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/why-companies-ignore-physical-security-until-failure\/","title":{"rendered":"\u306a\u305c\u4f01\u696d\u306f\u5931\u6557\u3059\u308b\u307e\u3067\u7269\u7406\u7684\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u7121\u8996\u3059\u308b\u306e\u304b\uff1f"},"content":{"rendered":"<p>NTT\u6771\u65e5\u672c\u306f\u3001\u591a\u304f\u306e\u4f01\u696d\u304c\u3072\u3063\u305d\u308a\u3068\u62b1\u3048\u3066\u3044\u308b\u76f2\u70b9\u3092\u3064\u3044\u306b\u544a\u767a\u3057\u307e\u3059\u30022026\u5e744\u670817\u65e5\u306b, <a href=\"https:\/\/www.ntt-east.co.jp\/\">\u682a\u5f0f\u4f1a\u793eNTT\u6771\u65e5\u672c<\/a> \u306f\u3001\u30b3\u30fc\u30c9\u3067\u306f\u306a\u304f\u30b1\u30fc\u30d6\u30eb\u3084\u30dd\u30fc\u30c8\u306b\u8d77\u56e0\u3059\u308b\u30ea\u30b9\u30af\u306b\u7126\u70b9\u3092\u5f53\u3066\u305f\u65b0\u3057\u3044\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3001\u300cBizDrive Physical Security\u300d\u3092\u767a\u8868\u3057\u307e\u3057\u305f\u3002.<\/p>\n<p>\u6700\u521d\u306e\u4e00\u624b\u306f\u30b7\u30f3\u30d7\u30eb\u3067\u3059\u304c\u3001\u91cd\u8981\u3067\u3059\u3002SMARTKEEPER Pro\u306e\u65e5\u672c\u72ec\u5360\u8ca9\u58f2\u3002USB\u3084LAN\u306a\u3069\u306e\u30dd\u30fc\u30c8\u3092\u7269\u7406\u7684\u306b\u30ed\u30c3\u30af\u3057\u3001\u8a31\u53ef\u3055\u308c\u3066\u3044\u306a\u3044\u30c7\u30d0\u30a4\u30b9\u304c\u63a5\u7d9a\u3067\u304d\u306a\u3044\u3088\u3046\u306b\u3059\u308b\u30c7\u30d0\u30a4\u30b9\u3002\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u7121\u52b9\u5316\u306a\u3057\u3002\u30dd\u30ea\u30b7\u30fc\u306e\u629c\u3051\u9053\u306a\u3057\u3002\u305f\u3060\u30cf\u30fc\u30c9\u7684\u306b\u9632\u3050\u3060\u3051\u3002.<\/p>\n<p>\u3068\u3044\u3046\u306e\u3082\u3001\u4f01\u696d\u306f\u9577\u5e74\u306b\u308f\u305f\u308a\u3001\u30eb\u30fc\u30eb\u3068\u4fe1\u983c\u306b\u3088\u3063\u3066\u7ba1\u7406\u3055\u308c\u308b\u7269\u7406\u7684\u30a2\u30af\u30bb\u30b9\u3092\u653e\u7f6e\u3057\u305f\u307e\u307e\u3001\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u306b\u57f7\u7740\u3057\u3066\u304d\u305f\u304b\u3089\u3067\u3059\u3002\u305d\u306e\u30ae\u30e3\u30c3\u30d7\u304c\u4eca\u3001\u4e0d\u6b63\u306aUSB\u304b\u3089\u306e\u30c7\u30fc\u30bf\u6f0f\u3048\u3044\u3084\u3001\u57fa\u672c\u7684\u306a\u63a5\u7d9a\u30a8\u30e9\u30fc\u306b\u3088\u308b\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u969c\u5bb3\u3068\u3057\u3066\u73fe\u308c\u3066\u3044\u307e\u3059\u3002\u7d4c\u6e08\u7523\u696d\u7701\u306e\u3088\u3046\u306a\u653f\u5e9c\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u3067\u3055\u3048\u3001\u7269\u7406\u7684\u7ba1\u7406\u306e\u5f37\u5316\u3092\u63a8\u9032\u3057\u3066\u3044\u307e\u3059\u3002.<\/p>\n<h4>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/sailpoint-and-aws-launch-ai-identity-security-alliance\/\" rel=\"bookmark\">\u30bb\u30a4\u30eb\u30dd\u30a4\u30f3\u30c8\u3068AWS\u3001AI\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u63d0\u643a\u3092\u958b\u59cb<\/a><\/h4>\n<p>\u3053\u3053\u3067\u91cd\u8981\u306a\u306e\u306f\u30c7\u30d0\u30a4\u30b9\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u30b7\u30d5\u30c8\u3067\u3059\u3002\u30dd\u30ea\u30b7\u30fc\u304c\u3042\u308b\u300d\u304b\u3089\u300c\u30c7\u30b6\u30a4\u30f3\u306b\u3088\u3063\u3066\u5f37\u5236\u3059\u308b\u300d\u3078\u3002\u76e3\u67fb\u8a3c\u8de1\u3001\u5236\u5fa1\u3055\u308c\u305f\u30a2\u30af\u30bb\u30b9\u30fb\u30ad\u30fc\u3001\u8907\u6570\u306e\u30a4\u30f3\u30bf\u30fc\u30d5\u30a7\u30a4\u30b9\u306b\u307e\u305f\u304c\u308b\u30b5\u30dd\u30fc\u30c8\u306b\u3088\u308a\u3001\u7269\u7406\u7684\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30b5\u30a4\u30d0\u30fc\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u304c\u6700\u7d42\u7684\u306b1\u3064\u306e\u30b7\u30b9\u30c6\u30e0\u3068\u3057\u3066\u6271\u308f\u308c\u308b\u3088\u3046\u306b\u306a\u308b\u3068\u3044\u3046\u3001\u3088\u308a\u5e83\u7bc4\u306a\u696d\u754c\u306e\u50be\u5411\u3092\u793a\u3057\u3066\u3044\u307e\u3059\u3002.<\/p>\n<p>\u6b63\u76f4\u306a\u3068\u3053\u308d\u3001\u9045\u304b\u3063\u305f\u3093\u3067\u3059\u3002.<\/p>","protected":false},"excerpt":{"rendered":"<p>NTT East is finally calling out a blind spot most enterprises quietly live with. On April 17, 2026, NTT East Corporation launched \u2018BizDrive Physical Security,\u2019 a new solution focused on risks that don\u2019t come from code, but from cables and ports. The first move is simple but telling. Exclusive distribution of SMARTKEEPER Pro in Japan. A device that physically locks USB, LAN, and other ports so unauthorized devices just cannot connect. No software override. No policy loophole. Just hard prevention. This matters because companies have spent years obsessing over cyber threats while leaving physical access controlled by rules and trust. That gap is now showing up as data leaks from [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":31670,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,184,211,237,1838,206,85],"tags":[12580,110,7413,12579,9528],"ppma_author":[572],"class_list":{"0":"post-31630","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-cybersecurity","9":"category-japan","10":"category-news","11":"category-quick-reads","12":"category-regional","13":"category-tech","14":"tag-bizdrive","15":"tag-cybersecurity","16":"tag-ntt-east-corporation","17":"tag-physical-security-solution","18":"tag-security-measures"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why Physical Security Is Ignored Until Damage Occurs<\/title>\n<meta name=\"description\" content=\"NTT East launches BizDrive Physical Security, addressing risks from physical infrastructure like cables often overlooked by enterprises.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/why-companies-ignore-physical-security-until-failure\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Physical Security Is Ignored Until Damage Occurs\" \/>\n<meta property=\"og:description\" content=\"NTT East launches BizDrive Physical Security, addressing risks from physical infrastructure like cables often overlooked by enterprises.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/why-companies-ignore-physical-security-until-failure\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-17T10:51:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Why-Companies-Ignore-Physical-Security-Until-Failure.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"ITBT StaffWriter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"ITBT StaffWriter\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Physical Security Is Ignored Until Damage Occurs","description":"NTT East launches BizDrive Physical Security, addressing risks from physical infrastructure like cables often overlooked by enterprises.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/why-companies-ignore-physical-security-until-failure\/","og_locale":"ja_JP","og_type":"article","og_title":"Why Physical Security Is Ignored Until Damage Occurs","og_description":"NTT East launches BizDrive Physical Security, addressing risks from physical infrastructure like cables often overlooked by enterprises.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/why-companies-ignore-physical-security-until-failure\/","og_site_name":"itbusinesstoday","article_published_time":"2026-04-17T10:51:23+00:00","og_image":[{"width":1201,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Why-Companies-Ignore-Physical-Security-Until-Failure.webp","type":"image\/webp"}],"author":"ITBT StaffWriter","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"ITBT StaffWriter","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"1\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/why-companies-ignore-physical-security-until-failure\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/why-companies-ignore-physical-security-until-failure\/"},"author":{"name":"ITBT StaffWriter","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15"},"headline":"Why Companies Ignore Physical Security Until Failure?","datePublished":"2026-04-17T10:51:23+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/why-companies-ignore-physical-security-until-failure\/"},"wordCount":210,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/why-companies-ignore-physical-security-until-failure\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Why-Companies-Ignore-Physical-Security-Until-Failure.webp","keywords":["BizDrive","cybersecurity","NTT East Corporation","physical security solution","Security measures"],"articleSection":["APAC","Cybersecurity","Japan","News","Quick Reads","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/why-companies-ignore-physical-security-until-failure\/","url":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/why-companies-ignore-physical-security-until-failure\/","name":"Why Physical Security Is Ignored Until Damage Occurs","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/why-companies-ignore-physical-security-until-failure\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/why-companies-ignore-physical-security-until-failure\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Why-Companies-Ignore-Physical-Security-Until-Failure.webp","datePublished":"2026-04-17T10:51:23+00:00","description":"NTT East launches BizDrive Physical Security, addressing risks from physical infrastructure like cables often overlooked by enterprises.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/why-companies-ignore-physical-security-until-failure\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/why-companies-ignore-physical-security-until-failure\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/why-companies-ignore-physical-security-until-failure\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Why-Companies-Ignore-Physical-Security-Until-Failure.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Why-Companies-Ignore-Physical-Security-Until-Failure.webp","width":1201,"height":800,"caption":"NTT East Corporation"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/why-companies-ignore-physical-security-until-failure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"Why Companies Ignore Physical Security Until Failure?"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15","name":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png90b3cb23d1d9c08733d969d29ea2d30d","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","caption":"ITBT StaffWriter"},"description":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc\u306f\u3001IT Business Today\u306e\u793e\u5185\u5bc4\u7a3f\u8005\u3067\u3001\u30bf\u30a4\u30e0\u30ea\u30fc\u306a\u30cb\u30e5\u30fc\u30b9\u3068QuickBytes\u306e\u914d\u4fe1\u3092\u62c5\u5f53\u3057\u3066\u3044\u307e\u3059\u3002IT\u3001\u30cf\u30a4\u30c6\u30af\u3001\u4f01\u696d\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u6700\u65b0\u52d5\u5411\u3092\u30ab\u30d0\u30fc\u3057\u3001\u7c21\u6f54\u3067\u30a4\u30f3\u30d1\u30af\u30c8\u306e\u3042\u308b\u6700\u65b0\u60c5\u5831\u3092\u8aad\u8005\u306b\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002","sameAs":["https:\/\/itbusinesstoday.com\/"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/itbt-staffwriter\/"}]}},"authors":[{"term_id":572,"user_id":7,"is_guest":0,"slug":"itbt-staffwriter","display_name":"ITBT StaffWriter","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/31630","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=31630"}],"version-history":[{"count":1,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/31630\/revisions"}],"predecessor-version":[{"id":31631,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/31630\/revisions\/31631"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/31670"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=31630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=31630"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=31630"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=31630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}