{"id":32328,"date":"2026-05-04T12:46:02","date_gmt":"2026-05-04T12:46:02","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=32328"},"modified":"2026-05-04T12:46:02","modified_gmt":"2026-05-04T12:46:02","slug":"amiya-and-netchart-enhance-security-data-integration","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/amiya-and-netchart-enhance-security-data-integration\/","title":{"rendered":"\u7db2\u5c4b\u3068NetChart\u304c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30c7\u30fc\u30bf\u306e\u7d71\u5408\u3092\u5f37\u5316"},"content":{"rendered":"<p><span class=\"whitespace-normal\">\u682a\u5f0f\u4f1a\u793e\u7db2\u5c4b.<\/span> \u3068\u306e\u9023\u643a\u3092\u5f37\u5316\u3057\u3066\u3044\u307e\u3059\u3002 <span class=\"whitespace-normal\">\u30cd\u30c3\u30c8\u30c1\u30e3\u30fc\u30c8\u682a\u5f0f\u4f1a\u793e.<\/span> \u3068\u8ca9\u58f2\u4ee3\u7406\u5e97\u5951\u7d04\u3092\u7de0\u7d50\u3057\u307e\u3057\u305f\u3002\u305d\u306e\u76ee\u7684\u306f\u3001\u4e21\u793e\u304c\u4f01\u696d\u306b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u63d0\u4f9b\u3059\u308b\u65b9\u6cd5\u3092\u62e1\u5927\u3059\u308b\u3053\u3068\u3067\u3059\u3002\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30fb\u30ec\u30d9\u30eb\u3060\u3051\u3067\u306a\u304f\u3001\u30c7\u30fc\u30bf\u3084\u793e\u5185\u30b7\u30b9\u30c6\u30e0\u5168\u4f53\u306b\u308f\u305f\u3063\u3066\u3067\u3059\u3002.<\/p>\n<p>\u4eca\u56de\u306e\u5951\u7d04\u306b\u3088\u308a\u3001NetChart\u306f\u7db2\u5c4b\u88fd\u54c1\u306e\u30e9\u30a4\u30f3\u30ca\u30c3\u30d7\u3092\u62e1\u5145\u3057\u307e\u3059\u3002NetChart\u306f\u3059\u3067\u306bVerona\u3084Hypersonix\u306e\u3088\u3046\u306a\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c4\u30fc\u30eb\u3068\u9023\u643a\u3057\u3066\u3044\u307e\u3059\u3002\u305d\u3057\u3066\u4eca\u56de\u3001\u30ed\u30b0\u7ba1\u7406\u3068\u30c7\u30fc\u30bf\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u7279\u5316\u3057\u305fALog\u304c\u52a0\u308f\u308b\u3053\u3068\u306b\u306a\u308a\u307e\u3059\u3002\u3053\u308c\u306b\u3088\u308a\u3001\u4e21\u793e\u304c\u5171\u540c\u3067\u63d0\u4f9b\u3067\u304d\u308b\u7bc4\u56f2\u304c\u5909\u308f\u308a\u307e\u3059\u3002\u3082\u306f\u3084\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u4fdd\u8b77\u3059\u308b\u3060\u3051\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u30b7\u30b9\u30c6\u30e0\u5185\u90e8\u3067\u4f55\u304c\u8d77\u304d\u3066\u3044\u308b\u304b\u3092\u898b\u308b\u3053\u3068\u3082\u3067\u304d\u308b\u306e\u3067\u3059\u3002.<\/p>\n<p>\u80cc\u666f\u306f\u306f\u3063\u304d\u308a\u3057\u3066\u3044\u307e\u3059\u3002IT\u74b0\u5883\u306e\u5206\u6563\u5316\u304c\u9032\u3093\u3067\u3044\u307e\u3059\u3002\u30af\u30e9\u30a6\u30c9\u306e\u63a1\u7528\u306b\u3088\u308a\u3001\u30b7\u30b9\u30c6\u30e0\u306e\u69cb\u7bc9\u65b9\u6cd5\u3084\u5229\u7528\u65b9\u6cd5\u304c\u5909\u5316\u3057\u307e\u3057\u305f\u3002\u305d\u306e\u305f\u3081\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3078\u306e\u671f\u5f85\u3082\u5909\u5316\u3057\u3066\u3044\u307e\u3059\u3002\u4f01\u696d\u304c\u6c42\u3081\u3089\u308c\u308b\u306e\u306f\u3001\u901a\u4fe1\u7d4c\u8def\u306e\u5b89\u5168\u6027\u3060\u3051\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u5185\u90e8\u6d3b\u52d5\u3092\u8ffd\u8de1\u3057\u3001\u30ed\u30b0\u3092\u7ba1\u7406\u3057\u3001\u3044\u3064\u3067\u3082\u76e3\u67fb\u306b\u5bfe\u5fdc\u3067\u304d\u308b\u3088\u3046\u306b\u3059\u308b\u3053\u3068\u3082\u6c42\u3081\u3089\u308c\u3066\u3044\u307e\u3059\u3002\u305d\u3053\u3067\u3001\u4eca\u56de\u306e\u30d1\u30fc\u30c8\u30ca\u30fc\u30b7\u30c3\u30d7\u306e\u62e1\u5927\u304c\u9069\u3057\u3066\u3044\u308b\u306e\u3067\u3059\u3002.<\/p>\n<h4>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/keeper-security-apac-launches-ai-workflow-security-tool\/\" rel=\"bookmark\">Keeper Security APAC\u304cAI\u30ef\u30fc\u30af\u30d5\u30ed\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c4\u30fc\u30eb\u3092\u767a\u8868<\/a><\/h4>\n<p>\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30ec\u30d9\u30eb\u306e\u4fdd\u8b77\u3068\u30ed\u30b0\u5206\u6790\u3092\u7d44\u307f\u5408\u308f\u305b\u308b\u3053\u3068\u3067\u3001\u4f01\u696d\u306f\u74b0\u5883\u3092\u3088\u308a\u5b8c\u5168\u306b\u628a\u63e1\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u9001\u53d7\u4fe1\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u304b\u3089\u5185\u90e8\u52d5\u4f5c\u307e\u3067\u3002\u3053\u308c\u306f\u3001\u4e88\u9632\u3068\u5bfe\u5fdc\u306e\u4e21\u65b9\u306b\u5f79\u7acb\u3061\u307e\u3059\u3002\u4f55\u304b\u554f\u984c\u304c\u767a\u751f\u3057\u305f\u5834\u5408\u3001\u4f55\u304c\u8d77\u3053\u3063\u305f\u304b\u3092\u8ffd\u8de1\u3059\u308b\u3053\u3068\u304c\u5bb9\u6613\u306b\u306a\u308a\u307e\u3059\u3002.<\/p>\n<p>ALog\u306f\u307e\u305f\u3001\u30ed\u30b0\u7ba1\u7406\u306e\u969c\u58c1\u3092\u4f4e\u304f\u3057\u307e\u3059\u3002\u305d\u306e\u81ea\u52d5\u5206\u6790\u30fb\u30ec\u30dd\u30fc\u30c8\u6a5f\u80fd\u306b\u3088\u308a\u3001\u4f01\u696d\u306f\u6df1\u3044\u5c02\u9580\u77e5\u8b58\u304c\u306a\u304f\u3066\u3082\u52b9\u679c\u7684\u306a\u76e3\u8996\u3092\u958b\u59cb\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u305d\u306e\u305f\u3081\u3001\u904b\u7528\u8ca0\u8377\u304c\u8efd\u6e1b\u3055\u308c\u3001\u30b7\u30b9\u30c6\u30e0\u3092\u5e38\u306b\u898b\u76f4\u3059\u3053\u3068\u304c\u5bb9\u6613\u306b\u306a\u308a\u307e\u3059\u3002.<\/p>\n<p>\u4eca\u5f8c\u306b\u3064\u3044\u3066 <a href=\"https:\/\/www.amiya.co.jp\/\">\u7db2\u8c37<\/a> \u305d\u3057\u3066 <a href=\"https:\/\/www.ncj.co.jp\/\">\u30cd\u30c3\u30c8\u30c1\u30e3\u30fc\u30c8<\/a> \u306f\u3001ALog\u3092\u3088\u308a\u5e83\u7bc4\u306a\u30b5\u30fc\u30d3\u30b9\u306b\u7d71\u5408\u3059\u308b\u3053\u3068\u3092\u8a08\u753b\u3057\u3066\u3044\u307e\u3059\u3002\u88fd\u54c1\u958b\u767a\u3068\u5b9f\u969b\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u8a2d\u8a08\u3084\u904b\u7528\u3092\u7d44\u307f\u5408\u308f\u305b\u308b\u3053\u3068\u3067\u3001\u4f01\u696d\u304c\u65e5\u3005\u5b9f\u969b\u306b\u904b\u7528\u3067\u304d\u308b\u5b9f\u7528\u7684\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a2d\u5b9a\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u76ee\u6307\u3057\u3066\u3044\u307e\u3059\u3002.<\/p>","protected":false},"excerpt":{"rendered":"<p>Amiya Co., Ltd. has strengthened its collaboration with NetChart Inc. by signing a sales agency agreement. The goal is to expand how both companies deliver security solutions to enterprises. Not just at the network level, but across data and internal systems as well. Under this agreement, NetChart will extend its lineup of Amiya products. It already works with network security tools like Verona and Hypersonix. Now it will add ALog, which focuses on log management and data security. This changes the scope of what the two companies can offer together. It is no longer just about protecting traffic. It is about seeing what is happening inside systems too. The background [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":32365,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,184,211,237,206,85],"tags":[11412,110,12785,5412,11788],"ppma_author":[572],"class_list":{"0":"post-32328","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-cybersecurity","9":"category-japan","10":"category-news","11":"category-regional","12":"category-tech","13":"tag-amiya","14":"tag-cybersecurity","15":"tag-hypersonix","16":"tag-log-management","17":"tag-netchart"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Amiya, NetChart strengthen network security alliance<\/title>\n<meta name=\"description\" content=\"Amiya with NetChart via sales agency agreement to expand enterprise security solutions across networks, data, and internal systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/amiya-and-netchart-enhance-security-data-integration\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Amiya, NetChart strengthen network security alliance\" \/>\n<meta property=\"og:description\" content=\"Amiya with NetChart via sales agency agreement to expand enterprise security solutions across networks, data, and internal systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/amiya-and-netchart-enhance-security-data-integration\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-04T12:46:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Amiya-strengthens-security-business-collaboration-with-NetChart.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"ITBT StaffWriter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"ITBT StaffWriter\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Amiya, NetChart strengthen network security alliance","description":"Amiya with NetChart via sales agency agreement to expand enterprise security solutions across networks, data, and internal systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/amiya-and-netchart-enhance-security-data-integration\/","og_locale":"ja_JP","og_type":"article","og_title":"Amiya, NetChart strengthen network security alliance","og_description":"Amiya with NetChart via sales agency agreement to expand enterprise security solutions across networks, data, and internal systems.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/amiya-and-netchart-enhance-security-data-integration\/","og_site_name":"itbusinesstoday","article_published_time":"2026-05-04T12:46:02+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Amiya-strengthens-security-business-collaboration-with-NetChart.webp","type":"image\/webp"}],"author":"ITBT StaffWriter","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"ITBT StaffWriter","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/amiya-and-netchart-enhance-security-data-integration\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/amiya-and-netchart-enhance-security-data-integration\/"},"author":{"name":"ITBT StaffWriter","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15"},"headline":"Amiya and NetChart enhance security-data integration","datePublished":"2026-05-04T12:46:02+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/amiya-and-netchart-enhance-security-data-integration\/"},"wordCount":312,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/amiya-and-netchart-enhance-security-data-integration\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Amiya-strengthens-security-business-collaboration-with-NetChart.webp","keywords":["Amiya","cybersecurity","Hypersonix","Log management","NetChart"],"articleSection":["APAC","Cybersecurity","Japan","News","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/amiya-and-netchart-enhance-security-data-integration\/","url":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/amiya-and-netchart-enhance-security-data-integration\/","name":"Amiya, NetChart strengthen network security alliance","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/amiya-and-netchart-enhance-security-data-integration\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/amiya-and-netchart-enhance-security-data-integration\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Amiya-strengthens-security-business-collaboration-with-NetChart.webp","datePublished":"2026-05-04T12:46:02+00:00","description":"Amiya with NetChart via sales agency agreement to expand enterprise security solutions across networks, data, and internal systems.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/amiya-and-netchart-enhance-security-data-integration\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/amiya-and-netchart-enhance-security-data-integration\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/amiya-and-netchart-enhance-security-data-integration\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Amiya-strengthens-security-business-collaboration-with-NetChart.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Amiya-strengthens-security-business-collaboration-with-NetChart.webp","width":1200,"height":800,"caption":"Amiya"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/amiya-and-netchart-enhance-security-data-integration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"Amiya and NetChart enhance security-data integration"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15","name":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png90b3cb23d1d9c08733d969d29ea2d30d","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","caption":"ITBT StaffWriter"},"description":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc\u306f\u3001IT Business Today\u306e\u793e\u5185\u5bc4\u7a3f\u8005\u3067\u3001\u30bf\u30a4\u30e0\u30ea\u30fc\u306a\u30cb\u30e5\u30fc\u30b9\u3068QuickBytes\u306e\u914d\u4fe1\u3092\u62c5\u5f53\u3057\u3066\u3044\u307e\u3059\u3002IT\u3001\u30cf\u30a4\u30c6\u30af\u3001\u4f01\u696d\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u6700\u65b0\u52d5\u5411\u3092\u30ab\u30d0\u30fc\u3057\u3001\u7c21\u6f54\u3067\u30a4\u30f3\u30d1\u30af\u30c8\u306e\u3042\u308b\u6700\u65b0\u60c5\u5831\u3092\u8aad\u8005\u306b\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002","sameAs":["https:\/\/itbusinesstoday.com\/"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/itbt-staffwriter\/"}]}},"authors":[{"term_id":572,"user_id":7,"is_guest":0,"slug":"itbt-staffwriter","display_name":"ITBT StaffWriter","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/32328","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=32328"}],"version-history":[{"count":1,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/32328\/revisions"}],"predecessor-version":[{"id":32329,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/32328\/revisions\/32329"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/32365"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=32328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=32328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=32328"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=32328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}