{"id":7253,"date":"2025-03-05T12:39:26","date_gmt":"2025-03-05T12:39:26","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=7253"},"modified":"2025-05-06T09:32:15","modified_gmt":"2025-05-06T09:32:15","slug":"opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response\/","title":{"rendered":"\u30aa\u30fc\u30d7\u30f3\u30c6\u30ad\u30b9\u30c8\u3001AI\u3092\u6d3b\u7528\u3057\u305f\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u767a\u8868\uff1aOpenText Core \u8105\u5a01\u691c\u77e5\u3068\u5bfe\u5fdc"},"content":{"rendered":"<p>\u30aa\u30fc\u30d7\u30f3\u30c6\u30ad\u30b9\u30c8\uff08\u672c\u793e\uff1a\u6771\u4eac\u90fd\u5343\u4ee3\u7530\u533a\uff09\u306f\u3001\u300cOpenText\u2122 Core Threat Detection and Response\u300d\u306e\u63d0\u4f9b\u3092\u958b\u59cb\u3057\u307e\u3057\u305f\u3002\u3053\u306e\u5148\u9032\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c4\u30fc\u30eb\u306f\u3001AI\u3092\u6d3b\u7528\u3057\u3001\u3088\u308a\u512a\u308c\u305f\u8105\u5a01\u691c\u77e5\u3092\u5b9f\u73fe\u3057\u307e\u3059\u3002\u4ee3\u8868\u53d6\u7de0\u5f79\u793e\u9577\u306f\u30c7\u30cb\u30b9\u4e09\u6d66\u3002OpenText Cloud Editions 25.2\u306b\u306f\u3001\u3053\u306e\u65b0\u3057\u3044\u30b5\u30fc\u30d3\u30b9\u304c\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u306f\u3001\u4f01\u696d\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5f37\u5316\u306b\u5bfe\u3059\u308b\u540c\u793e\u306e\u53d6\u308a\u7d44\u307f\u3092\u793a\u3059\u3082\u306e\u3067\u3059\u3002\u3053\u308c\u306f\u3001\u4eca\u65e5\u306e\u5909\u5316\u3059\u308b\u30b5\u30a4\u30d0\u30fc\u74b0\u5883\u306b\u304a\u3044\u3066\u3001\u793e\u5185\u5916\u306e\u8105\u5a01\u304b\u3089\u4fdd\u8b77\u3059\u308b\u305f\u3081\u306b\u91cd\u8981\u3067\u3059\u3002<\/p>\n<p>\u30aa\u30fc\u30d7\u30f3\u30c6\u30ad\u30b9\u30c8\u306f\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u306b\u6ce8\u529b\u3057\u3066\u3044\u307e\u3059\u3002\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c4\u30fc\u30eb\u3092\u62e1\u5f35\u3057\u3001\u9ad8\u5ea6\u306a\u8105\u5a01\u306e\u63a2\u7d22\u3001\u691c\u51fa\u3001\u5bfe\u5fdc\u6a5f\u80fd\u3092\u642d\u8f09\u3057\u3066\u3044\u307e\u3059\u3002OpenText Core Threat Detection and Response \u306f\u3001\u4f01\u696d\u304c\u653b\u6483\u304b\u3089\u5b89\u5168\u306a\u72b6\u614b\u3092\u7dad\u6301\u3067\u304d\u308b\u3088\u3046\u652f\u63f4\u3057\u307e\u3059\u3002\u5de7\u5999\u306aM2M\u306e\u8105\u5a01\u306b\u5bfe\u3059\u308b\u8010\u6027\u3092\u5f37\u5316\u3057\u307e\u3059\u3002<\/p>\n<p>\u3053\u306e\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306fMicrosoft Azure\u4e0a\u3067\u52d5\u4f5c\u3057\u307e\u3059\u3002Microsoft Defender for Endpoint\u3001Microsoft Entra ID\u3001Microsoft Security Copilot\u3068\u30b9\u30e0\u30fc\u30ba\u306b\u9023\u643a\u3057\u307e\u3059\u3002\u3053\u306e\u7d71\u5408\u306b\u3088\u308a\u3001\u8105\u5a01\u3092\u8fc5\u901f\u306b\u767a\u898b\u3057\u3001\u4fee\u6b63\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u653b\u6483\u306b\u3088\u308b\u88ab\u5bb3\u3092\u672a\u7136\u306b\u9632\u3050\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u30aa\u30fc\u30d7\u30f3\u30c6\u30ad\u30b9\u30c8\u306e\u8105\u5a01\u7d71\u5408\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306f\u3001\u9060\u9694\u6e2c\u5b9a\u30c7\u30fc\u30bf\u306e\u53ce\u96c6\u3068\u8abf\u67fb\u3092\u652f\u63f4\u3057\u307e\u3059\u3002\u591a\u304f\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c4\u30fc\u30eb\u3001\u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u3068\u9023\u643a\u3057\u307e\u3059\u3002\u3053\u308c\u3089\u306f\u3059\u3079\u3066\u3001OpenText Core Threat Detection and Response \u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u306b\u9069\u5408\u3057\u307e\u3059\u3002<\/p>\n<h4><strong>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/kela-strengthens-sysmexs-global-security-with-comprehensive-cyber-threat-solutions\/\" rel=\"bookmark\">KELA\u793e\u3001\u5305\u62ec\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3067\u30b7\u30b9\u30e1\u30c3\u30af\u30b9\u306e\u30b0\u30ed\u30fc\u30d0\u30eb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5f37\u5316<\/a><\/strong><\/h4>\n<p>\u65b0\u3057\u3044 OpenText Cybersecurity Cloud \u306f\u3001\u3044\u304f\u3064\u304b\u306e\u5206\u91ce\u306b\u304a\u3051\u308b\u91cd\u8981\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u554f\u984c\u306b\u53d6\u308a\u7d44\u3093\u3067\u3044\u307e\u3059\u3002\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3068\u30c7\u30fc\u30bf\u4fdd\u8b77\u3001\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3068\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528\u3001\u30c7\u30b8\u30bf\u30eb\u30d5\u30a9\u30ec\u30f3\u30b8\u30c3\u30af\u306a\u3069\u3067\u3059\u3002\u30aa\u30fc\u30d7\u30f3\u30c6\u30ad\u30b9\u30c8\u306f\u3001\u4e16\u754c\u4e2d\u30677,500\u793e\u3092\u8d85\u3048\u308b\u4f01\u696d\u9867\u5ba2\u306b\u30b5\u30fc\u30d3\u30b9\u3092\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002\u3042\u3089\u3086\u308b\u898f\u6a21\u306e\u30d3\u30b8\u30cd\u30b9\u3092\u4fdd\u8b77\u3059\u308b\u9ad8\u5ea6\u306a\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u4f01\u696d\u306f\u5916\u90e8\u306e\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u306b\u6ce8\u76ee\u3057\u304c\u3061\u3067\u3059\u3002\u3057\u304b\u3057\u3001\u30a4\u30f3\u30b5\u30a4\u30c0\u30fc\u30ea\u30b9\u30af\u306f\u4f9d\u7136\u3068\u3057\u3066\u5927\u304d\u306a\u554f\u984c\u3067\u3059\u3002\u3053\u306e\u3088\u3046\u306a\u30ea\u30b9\u30af\u306f\u3001\u60aa\u610f\u3001\u904e\u5931\u3001\u307e\u305f\u306f\u30af\u30ec\u30c7\u30f3\u30b7\u30e3\u30eb\u306e\u76d7\u96e3\u304b\u3089\u751f\u3058\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002\u3053\u308c\u3089\u306e\u30ea\u30b9\u30af\u306f\u30b3\u30b9\u30c8\u304c\u304b\u304b\u308a\u3001\u7ba1\u7406\u3082\u56f0\u96e3\u3067\u3059\u3002Ponemon\u3068Sullivan\u306b\u3088\u308b\u300c2023 Cost of Insider Risks Global Report\u300d\u306b\u3088\u308b\u3068\u3001\u30a4\u30f3\u30b5\u30a4\u30c0\u30fc\u30fb\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306b\u3088\u3063\u3066\u4f01\u696d\u304c\u88ab\u308b\u30b3\u30b9\u30c8\u306f\u3001\u6bce\u5e74\u7d04$1,620\u4e07\u30c9\u30eb\u306b\u4e0a\u308a\u307e\u3059\u3002\u3053\u306e\u72b6\u6cc1\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u4eba\u6750\u4e0d\u8db3\u306b\u3088\u3063\u3066\u3055\u3089\u306b\u8907\u96d1\u5316\u3057\u3066\u304a\u308a\u3001\u591a\u304f\u306e\u4f01\u696d\u306f\u4e88\u9632\u7684\u306a\u9632\u5fa1\u30e1\u30ab\u30cb\u30ba\u30e0\u304c\u306a\u3044\u307e\u307e\u8106\u5f31\u306a\u72b6\u614b\u306b\u7f6e\u304b\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p><a href=\"https:\/\/www.opentext.com\/ja-jp\">\u30aa\u30fc\u30d7\u30f3\u30c6\u30ad\u30b9\u30c8<\/a> Core Threat Detection and Response \u306f\u3001\u4f01\u696d\u304c\u65b0\u305f\u306a\u8105\u5a01\u306b\u5bfe\u51e6\u3067\u304d\u308b\u3088\u3046\u652f\u63f4\u3057\u307e\u3059\u3002\u305d\u306e\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u30b5\u30fc\u30d3\u30b9\u3068\u30c4\u30fc\u30eb\u30ad\u30c3\u30c8\u306b\u3088\u308a\u3001\u5148\u624b\u3092\u6253\u3064\u3053\u3068\u304c\u5bb9\u6613\u306b\u306a\u308a\u307e\u3059\u3002\u30aa\u30fc\u30d7\u30f3\u30c6\u30ad\u30b9\u30c8\u306f\u3001AI\u5206\u6790\u3068\u81ea\u52d5\u5316\u3092\u6d3b\u7528\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u306b\u3088\u308a\u3001\u4eca\u65e5\u306e\u5909\u5316\u3059\u308b\u8105\u5a01\u306e\u72b6\u6cc1\u306b\u304a\u3044\u3066\u3001\u4f01\u696d\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5f37\u5316\u3057\u3001\u30ea\u30b9\u30af\u3092\u4f4e\u6e1b\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>","protected":false},"excerpt":{"rendered":"<p>OpenText, located in Chiyoda-ku, Tokyo, has launched OpenText\u2122 Core Threat Detection and Response. This advanced cybersecurity tool uses AI for better threat detection. Dennis Miura is the President and CEO. OpenText Cloud Editions 25.2 now includes this new offering. It shows the company\u2019s dedication to boosting enterprise security. This is important for protecting against internal and external threats in today\u2019s changing cyber landscape. OpenText focuses on innovation. It has expanded its cybersecurity tools to include advanced threat hunting, detection, and response features. OpenText Core Threat Detection and Response helps organizations stay safe from attacks. It boosts resilience against clever machine-to-machine threats. The solution runs on Microsoft Azure. It works smoothly [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":7254,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,184,211,237,206,85],"tags":[1217,1902,110,1904,1903],"ppma_author":[572],"class_list":{"0":"post-7253","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-cybersecurity","9":"category-japan","10":"category-news","11":"category-regional","12":"category-tech","13":"tag-ai-powered","14":"tag-cloud-edition-25-2","15":"tag-cybersecurity","16":"tag-opentext","17":"tag-threat-detection"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OpenText Unveils AI Cybersecurity Solution, OpenText Core<\/title>\n<meta name=\"description\" content=\"OpenText has launched OpenText Core Threat Detection and Response. This advanced cybersecurity tool uses AI for better threat detection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OpenText Unveils AI Cybersecurity Solution, OpenText Core\" \/>\n<meta property=\"og:description\" content=\"OpenText has launched OpenText Core Threat Detection and Response. This advanced cybersecurity tool uses AI for better threat detection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-05T12:39:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-06T09:32:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/03\/OpenText-launches-next-generation-OpenText-Cybersecurity-Cloud-with-AI-driven-threat-detection-and-response-capabilities.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"ITBT StaffWriter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"ITBT StaffWriter\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u30aa\u30fc\u30d7\u30f3\u30c6\u30ad\u30b9\u30c8\u3001AI\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u300cOpenText Core\u300d\u3092\u767a\u8868","description":"\u30aa\u30fc\u30d7\u30f3\u30c6\u30ad\u30b9\u30c8\u306f\u3001OpenText Core Threat Detection and Response\u3092\u767a\u8868\u3057\u307e\u3057\u305f\u3002\u3053\u306e\u5148\u9032\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c4\u30fc\u30eb\u306f\u3001\u3088\u308a\u512a\u308c\u305f\u8105\u5a01\u691c\u77e5\u306e\u305f\u3081\u306bAI\u3092\u4f7f\u7528\u3057\u3066\u3044\u307e\u3059\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response\/","og_locale":"ja_JP","og_type":"article","og_title":"OpenText Unveils AI Cybersecurity Solution, OpenText Core","og_description":"OpenText has launched OpenText Core Threat Detection and Response. This advanced cybersecurity tool uses AI for better threat detection.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response\/","og_site_name":"itbusinesstoday","article_published_time":"2025-03-05T12:39:26+00:00","article_modified_time":"2025-05-06T09:32:15+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/03\/OpenText-launches-next-generation-OpenText-Cybersecurity-Cloud-with-AI-driven-threat-detection-and-response-capabilities.webp","type":"image\/webp"}],"author":"ITBT StaffWriter","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"ITBT StaffWriter","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response\/"},"author":{"name":"ITBT StaffWriter","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15"},"headline":"OpenText Unveils AI-Powered Cybersecurity Solution: OpenText Core Threat Detection and Response","datePublished":"2025-03-05T12:39:26+00:00","dateModified":"2025-05-06T09:32:15+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response\/"},"wordCount":359,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/03\/OpenText-launches-next-generation-OpenText-Cybersecurity-Cloud-with-AI-driven-threat-detection-and-response-capabilities.webp","keywords":["\u200b\u200bAI-powered","cloud edition 25.2","cybersecurity","OpenText","threat detection"],"articleSection":["APAC","Cybersecurity","Japan","News","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response\/","url":"https:\/\/itbusinesstoday.com\/tech\/opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response\/","name":"\u30aa\u30fc\u30d7\u30f3\u30c6\u30ad\u30b9\u30c8\u3001AI\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u300cOpenText Core\u300d\u3092\u767a\u8868","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/03\/OpenText-launches-next-generation-OpenText-Cybersecurity-Cloud-with-AI-driven-threat-detection-and-response-capabilities.webp","datePublished":"2025-03-05T12:39:26+00:00","dateModified":"2025-05-06T09:32:15+00:00","description":"\u30aa\u30fc\u30d7\u30f3\u30c6\u30ad\u30b9\u30c8\u306f\u3001OpenText Core Threat Detection and Response\u3092\u767a\u8868\u3057\u307e\u3057\u305f\u3002\u3053\u306e\u5148\u9032\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c4\u30fc\u30eb\u306f\u3001\u3088\u308a\u512a\u308c\u305f\u8105\u5a01\u691c\u77e5\u306e\u305f\u3081\u306bAI\u3092\u4f7f\u7528\u3057\u3066\u3044\u307e\u3059\u3002.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/03\/OpenText-launches-next-generation-OpenText-Cybersecurity-Cloud-with-AI-driven-threat-detection-and-response-capabilities.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/03\/OpenText-launches-next-generation-OpenText-Cybersecurity-Cloud-with-AI-driven-threat-detection-and-response-capabilities.webp","width":1200,"height":800,"caption":"OpenText"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/opentext-unveils-ai-powered-cybersecurity-solution-opentext-core-threat-detection-and-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"OpenText Unveils AI-Powered Cybersecurity Solution: OpenText Core Threat Detection and Response"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15","name":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png90b3cb23d1d9c08733d969d29ea2d30d","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","caption":"ITBT StaffWriter"},"description":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc\u306f\u3001IT Business Today\u306e\u793e\u5185\u5bc4\u7a3f\u8005\u3067\u3001\u30bf\u30a4\u30e0\u30ea\u30fc\u306a\u30cb\u30e5\u30fc\u30b9\u3068QuickBytes\u306e\u914d\u4fe1\u3092\u62c5\u5f53\u3057\u3066\u3044\u307e\u3059\u3002IT\u3001\u30cf\u30a4\u30c6\u30af\u3001\u4f01\u696d\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u6700\u65b0\u52d5\u5411\u3092\u30ab\u30d0\u30fc\u3057\u3001\u7c21\u6f54\u3067\u30a4\u30f3\u30d1\u30af\u30c8\u306e\u3042\u308b\u6700\u65b0\u60c5\u5831\u3092\u8aad\u8005\u306b\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002","sameAs":["https:\/\/itbusinesstoday.com\/"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/itbt-staffwriter\/"}]}},"authors":[{"term_id":572,"user_id":7,"is_guest":0,"slug":"itbt-staffwriter","display_name":"ITBT StaffWriter","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/7253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=7253"}],"version-history":[{"count":2,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/7253\/revisions"}],"predecessor-version":[{"id":10928,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/7253\/revisions\/10928"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/7254"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=7253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=7253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=7253"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=7253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}