EDRへの依存からレジリエンス構築へ:ネットワークとエンドポイント間のギャップを解消する

エンドポイント中心型のセキュリティを見直す

攻撃開始点に可視性が及ばない理由

EDRやXDRはエンドポイントを保護しますが、今日の攻撃者はそこで攻撃をやめることはありません。攻撃者はクラウド、ネットワーク、OTシステム、管理されていないデバイスなど、エンドポイントエージェントが到達できないところを移動します。

本書では、テレメトリーの統合によりこれらのギャップを埋め、エンドポイントデータとネットワークデータの融合を通じて、より高速な検知、より詳細な調査、そして真のレジリエンスを実現する方法を解説します。

本書では次について知ることができます:

  • エンドポイントのみの防御では致命的な水平移動やクラウドベースの攻撃が見逃されてしまう理由
  • ネットワークテレメトリーとプロセスデータを組み合わせることで、偽陽性を削減し調査時間を短縮する方法
  • EDR/XDRをすり抜けた攻撃の例、およびテレメトリーの統合により明らかになった事象

より強力なSOCを構築し、レジリエンスを高めましょう。本書をダウンロードしその方法をご確認ください。

White Paper

Webinar

EDRへの依存からレジリエンス構築へ:ネットワークとエンドポイント間のギャップを解消する

EDRへの依存からレジリエンス構築へ:ネットワークとエンドポイント間のギャップを解消する

EDRへの依存からレジリエンス構築へ:ネットワークとエンドポイント間のギャップを解消する

エンドポイント中心型のセキュリティを見直す

攻撃開始点に可視性が及ばない理由

EDRやXDRはエンドポイントを保護しますが、今日の攻撃者はそこで攻撃をやめることはありません。攻撃者はクラウド、ネットワーク、OTシステム、管理されていないデバイスなど、エンドポイントエージェントが到達できないところを移動します。

本書では、テレメトリーの統合によりこれらのギャップを埋め、エンドポイントデータとネットワークデータの融合を通じて、より高速な検知、より詳細な調査、そして真のレジリエンスを実現する方法を解説します。

本書では次について知ることができます:

  • エンドポイントのみの防御では致命的な水平移動やクラウドベースの攻撃が見逃されてしまう理由
  • ネットワークテレメトリーとプロセスデータを組み合わせることで、偽陽性を削減し調査時間を短縮する方法
  • EDR/XDRをすり抜けた攻撃の例、およびテレメトリーの統合により明らかになった事象

より強力なSOCを構築し、レジリエンスを高めましょう。本書をダウンロードしその方法をご確認ください。

No Details required

Download now

Thanks, your request has been received
A member of our team will be in touch with you shortly.
Oops! Something went wrong while submitting the form.
The information provided in this document is intended for general informational purposes only and should not be construed as legal advice. For specific advice related to compliance with NIS2 or other legal matters, please consult with your legal, professional or regulatory advisors. Darktrace makes no warranties or representations regarding the accuracy, reliability, or completeness of the information provided and accepts no responsibility for any errors or omissions. This document may contain links to external websites or resources for additional information. Darktrace does not endorse or assume responsibility for the content, privacy practices, or any other aspect of these external sites.

Gartner, Magic Quadrant for Email Security Platforms, Max Taggett, Nikul Patel, Franz Hinner, Deepak Mishra, 16 December 2024Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. GARTNER is a registered trademark and service mark of Gartner and Magic Quadrant and Peer Insights are a registered trademark, of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

Disclaimer:

Gartner, Magic Quadrant for Network Detection and Response, Thomas Lintemuth, Esraa ElTahawy, John Collins, Charanpal Bhogal, Nahim Fazal, 29 May 2025

Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

GARTNER is a registered trademark and service mark of Gartner and Magic Quadrant and Peer Insights are a registered trademark, of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent

Gartner, Gartner® Magic Quadrant™ for Email Security Platforms, Max Taggett, Nikul Patel, 3 December 2025

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Magic Quadrant is a registered trademark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation.

Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Darktrace.

This white paper includes

This resource includes

This case study includes

This data sheet includes

10,000
Darktraceのお客様
このリソースを共有する