{"id":385259,"date":"2021-01-13T08:59:08","date_gmt":"2021-01-13T16:59:08","guid":{"rendered":"https:\/\/blog.webex.com\/uncategorized-ja\/webex%ef%bc%9a-%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e3%81%a8%e6%96%b0%e3%81%97%e3%81%84%e3%83%84%e3%83%bc%e3%83%ab%e3%81%b8%e3%81%ae%e6%ba%96%e6%8b%a0%e3%81%ae%e6%a8%99%e6%ba%96\/"},"modified":"2021-01-13T08:59:08","modified_gmt":"2021-01-13T16:59:08","slug":"webex%ef%bc%9a-%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e3%81%a8%e6%96%b0%e3%81%97%e3%81%84%e3%83%84%e3%83%bc%e3%83%ab%e3%81%b8%e3%81%ae%e6%ba%96%e6%8b%a0%e3%81%ae%e6%a8%99%e6%ba%96","status":"publish","type":"post","link":"https:\/\/blog.webex.com\/ja\/collaboration\/video-conferencing\/webex%ef%bc%9a-%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e3%81%a8%e6%96%b0%e3%81%97%e3%81%84%e3%83%84%e3%83%bc%e3%83%ab%e3%81%b8%e3%81%ae%e6%ba%96%e6%8b%a0%e3%81%ae%e6%a8%99%e6%ba%96\/","title":{"rendered":"Webex\uff1a \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u65b0\u3057\u3044\u30c4\u30fc\u30eb\u3078\u306e\u6e96\u62e0\u306e\u6a19\u6e96\u3092\u8a2d\u5b9a\u3057\u3066\u3001\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3068\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u5b89\u5168\u3067\u5b89\u5168\u306b\u4fdd\u3064"},"content":{"rendered":"<h2><span><br \/>\n  <strong>\u65b0\u3057\u3044\u30c4\u30fc\u30eb\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9 <\/strong><br \/>\n<\/span><\/h2>\n<p>COVID-19\u306b\u3088\u308a\u30c7\u30b8\u30bf\u30eb\u5909\u9769\u306e\u30bf\u30a4\u30e0\u30e9\u30a4\u30f3\u3092\u52a0\u901f\u5316\u3057\u3001\u6280\u8853\u306e\u63a1\u7528\u3092\u4f55\u5e74\u304b\u3089\u6570\u9031\u9593\u3084\u6570\u304b\u6708\u306b\u7e2e\u5c0f\u3057\u305f\u306e\u3082\u7591\u554f\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002 McKinsey\u306b\u3088\u308b\u6700\u8fd1\u306e\u8abf\u67fb\u306b\u3088\u308b\u3068\u3001\u30ea\u30e2\u30fc\u30c8\u4f5c\u696d\u304a\u3088\u3073\u30b3\u30e9\u30dc\u30ec\u30fc\u30b7\u30e7\u30f3\u6280\u8853\u306e\u5c0e\u5165\u306b\u5fc5\u8981\u306a\u6642\u9593\u306f43\u3068\u3044\u3046\u8981\u56e0\u306b\u3088\u3063\u3066\u52a0\u901f\u3055\u308c\u3001454\u4eba\u306b\u5bfe\u3057\u306610.5\u65e5\u3092\u8981\u3057\u305f\u3002 \u3055\u3089\u306b\u300193%\u306e\u7d44\u7e54\u3067\u306f\u30ea\u30e2\u30fc\u30c8\u30ef\u30fc\u30af\u3068\u30b3\u30e9\u30dc\u30ec\u30fc\u30b7\u30e7\u30f3\u306e\u63a1\u7528\u304c\u8fc5\u901f\u306b\u884c\u304d\u300154%\u304c\u300c\u5909\u5316\u304c\u5b9f\u73fe\u3059\u308b\u3068\u4fe1\u3058\u3066\u3044\u307e\u3059\u300d\u3068\u8a00\u3063\u3066\u3044\u307e\u3059\u3002<sup>(1)<\/sup> \u30d2\u30f3\u30c8\u3092\u3059\u3050\u306b\u904e\u304e\u307e\u3057\u305f\u3002\u540c\u6642\u306b\u3001\u5c06\u6765\u306b\u5408\u3063\u305f\u30cf\u30a4\u30d6\u30ea\u30c3\u30c9\u30ef\u30fc\u30af\u30e2\u30c7\u30eb\u306e\u7ba1\u7406\u3092\u691c\u7d22\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u3053\u306e\u65b0\u3057\u3044\u4e16\u754c\u306f\u3001\u30b3\u30e9\u30dc\u30ec\u30fc\u30b7\u30e7\u30f3\u30a8\u30b3\u30b7\u30b9\u30c6\u30e0\u3092\u901a\u3058\u3066\u57fa\u790e\u30b9\u30ec\u30c3\u30c9\u3068\u3057\u3066\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u4fdd\u6301\u3059\u308b\u3001\u3068\u3044\u3046\u8003\u3048\u65b9\u306e\u5fc5\u8981\u6027\u3092\u9ad8\u3081\u3064\u5316\u3057\u3066\u3044\u307e\u3059\u3002 Cisco IT \u306b\u304a\u3051\u308b\u4ee5\u524d\u306e\u5f79\u5272\u3067\u306f\u300114\u4e07\u4eba\u3092\u8d85\u3048\u308b\u5f93\u696d\u54e1\u3068\u30d1\u30fc\u30c8\u30ca\u30fc\u306e\u30b3\u30e9\u30dc\u30ec\u30fc\u30b7\u30e7\u30f3\u30a4\u30f3\u30d5\u30e9\u30b9\u30c8\u30e9\u30af\u30c1\u30e3\u306b\u62c5\u5f53\u3059\u308b\u30c1\u30fc\u30e0\u3092\u7ba1\u7406\u3057\u307e\u3057\u305f\u3002 \u3053\u306e\u7d4c\u9a13\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3001\u30c7\u30fc\u30bf\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3001\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u304c\u3044\u304b\u306b\u91cd\u8981\u304b\u306b\u3064\u3044\u3066\u3001\u79c1\u306b\u5bfe\u3057\u3066\u7d99\u7d9a\u7684\u306b\u8a8d\u8b58\u3092\u793a\u3057\u307e\u3057\u305f\u3002 \u3053\u306e\u5e45\u5e83\u3044\u74b0\u5883\u3092\u7ba1\u7406\u3059\u308b\u30ea\u30fc\u30c0\u30fc\u3068\u3057\u3066\u3001\u518d\u30a2\u30af\u30c6\u30a3\u30d6\u3067\u7a4d\u6975\u7684\u306a\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u6709\u3059\u308b\u3053\u3068\u306f\u3001\u30c7\u30fc\u30bf\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30b3\u30e9\u30dc\u30ec\u30fc\u30b7\u30e7\u30f3\u3092\u30d7\u30e9\u30a4\u30d9\u30fc\u30c8\u306b\u7dad\u6301\u3057\u3001\u4f01\u696d\u306e\u50cd\u304d\u65b9\u306b\u95a2\u3059\u308b\u30e6\u30fc\u30b6\u30fc\u3092\u30b5\u30dd\u30fc\u30c8\u3059\u308b\u3053\u3068\u304c\u6210\u529f\u3059\u308b\u4e0a\u3067\u91cd\u8981\u3067\u3059\u3002<\/p>\n<p>\u73fe\u5728\u3001\u79c1\u3068 Webex \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u304a\u3088\u3073\u30a4\u30f3\u30d5\u30e9\u30b9\u30c8\u30e9\u30af\u30c1\u30e3\u306e\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u30c1\u30fc\u30e0\u306f\u3001Webex \u306e\u30c7\u30d0\u30a4\u30b9\u3068\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u7d20\u6674\u3089\u3057\u3044\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u3092\u30b5\u30dd\u30fc\u30c8\u3059\u308b\u57fa\u790e\u5c64\u3092\u63a8\u9032\u3057\u3066\u3044\u307e\u3059\u3002 \u5f53\u793e\u306e mantra \u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u30dd\u30fc\u30c8\u30d5\u30a9\u30ea\u30aa\u5168\u4f53\u306b\u5e83\u304f\u666e\u53ca\u3055\u305b\u308b\u4e00\u65b9\u3067\u3001\u30e6\u30fc\u30b6\u30fc\u3068\u7ba1\u7406\u8005\u304c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30cb\u30fc\u30ba\u3092\u7a4d\u6975\u7684\u306b\u7ba1\u7406\u3059\u308b\u305f\u3081\u306e\u30c4\u30fc\u30eb\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3067\u3057\u305f\u3002 \u5f53\u793e\u3067\u306f\u3001\u53ef\u80fd\u306a\u9650\u308a\u554f\u984c\u304c\u8d77\u3053\u308b\u524d\u306b\u3001\u554f\u984c\u3092\u9632\u3050\u30e1\u30ab\u30cb\u30ba\u30e0\u3067\u7d44\u7e54\u3092\u53d6\u308a\u4ed8\u3051\u7df4\u7fd2\u3057\u307e\u3057\u305f\u3002 Webex \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3001\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3001\u7ba1\u7406\u3001\u30a4\u30f3\u30b5\u30a4\u30c8\u306f\u3001\u3053\u306e\u8907\u96d1\u3055\u3092\u7ba1\u7406\u3057\u3001\u4e0d\u5fc5\u8981\u306a\u30ea\u30b9\u30af\u304b\u3089\u4f1a\u793e\u3092\u5b89\u5168\u306b\u4fdd\u3064\u306e\u306b\u5f79\u7acb\u3061\u307e\u3059\u3002<\/p>\n<p>Webex \u3067\u306f\u3001 <a href=\"https:\/\/www.webex.com\/unified-homepage-081220201.html?adobe_mc_sdid=SDID%3D46C37EAE10770465-200B03E2CB7057D8%7CMCORGID%3DB8D07FF4520E94C10A490D4C%40AdobeOrg%7CTS%3D1608084818&#038;adobe_mc_ref=https%3A%2F%2Fwww.google.com%2F\">\u30c7\u30fc\u30bf\u3092<\/a> \u5b89\u5168\u306b\u3057\u3001\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3092\u4fdd\u8b77\u3057\u3001\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u306e\u8ab2\u984c\u306b\u5bfe\u5fdc\u3059\u308b\u305f\u3081\u306b\u5f79\u7acb\u3064\u3001\u8907\u6570\u306e\u65b9\u6cd5\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<h2><span><br \/>\n  <strong>\u30a8\u30f3\u30c9\u30c4\u30fc\u30a8\u30f3\u30c9\u6697\u53f7\u5316<\/strong><br \/>\n<\/span><\/h2>\n<p>Webex \u3067\u306e\u6a5f\u5bc6\u6027\u306e\u9ad8\u3044\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u304c\u5897\u3048\u308b\u306b\u5f93\u3044\u3001\u8ee2\u9001\u4e2d\u3001\u4f7f\u7528\u4e2d\u3001\u4fdd\u5b58\u4e2d\u306e\u30c7\u30fc\u30bf\u304c\u6697\u53f7\u5316\u3055\u308c\u308b\u6a19\u6e96\u30d9\u30fc\u30b9\u306e\u6697\u53f7\u30e2\u30c7\u30eb\u4e0a\u306e\u30a8\u30f3\u30c9\u30c4\u30fc\u30a8\u30f3\u30c9\u6697\u53f7\u5316\u3092\u5f37\u5316\u3057\u307e\u3059\u3002 \u3053\u306e\u300c\u30bc\u30ed\u4fe1\u983c\u300d\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30e2\u30c7\u30eb\u306f\u3001\u9867\u5ba2\u304c\u5f15\u304d\u7d9a\u304d\u6697\u53f7\u5316\u30ad\u30fc\u306e\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\u3092\u6301\u3061\u7d9a\u3051\u3001\u30b7\u30b9\u30b3\u304c\u30c7\u30fc\u30bf\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u306a\u3044\u4e8b\u3092\u610f\u5473\u3057\u307e\u3059\u3002 Webex Room \u30b7\u30b9\u30c6\u30e0\u306f\u30a8\u30f3\u30c9\u30c4\u30fc\u30a8\u30f3\u30c9\u6697\u53f7\u5316\u3055\u308c\u3001\u5f53\u793e\u306f\u3001\u5358\u4e00\u306e\u696d\u754c\u6a19\u6e96\u306e\u6697\u53f7\u5316\u30d7\u30ed\u30c8\u30b3\u30eb\u306b\u57fa\u3065\u3044\u3066\u3001\u30b5\u30fc\u30c9\u30d1\u30fc\u30c6\u30a3\u7aef\u672b\u306e\u30a8\u30f3\u30c9\u30c4\u30fc\u30a8\u30f3\u30c9\u6697\u53f7\u5316\u3092\u4fdd\u8b77\u3059\u308b\u65b9\u6cd5\u3092\u69cb\u7bc9\u3057\u3066\u3044\u307e\u3059\u3002 \u305d\u3057\u3066\u3001\u8b70\u4e8b\u4e8b\u3068\u9332\u753b\u306f\u6700\u7d42\u7684\u306b\u6697\u53f7\u5316\u3055\u308c\u307e\u3059\u3002 \u30b7\u30b9\u30b3\u306fGoogle\u3001Cloudflare\u3001Facebook\u3001Google\u3001\u304a\u3088\u3073 Wire\u306e\u6a5f\u80fd\u3068\u5171\u306b\u3053\u306e\u53d6\u308a\u7d44\u307f\u3092\u30ea\u30fc\u30c9\u3057\u3066\u3044\u307e\u3059\u3002 \u3055\u3089\u306b\u3001\u30e6\u30fc\u30b6\u30fc\u306f\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u304c\u30a4\u30f3\u30bf\u30fc\u30d5\u30a7\u30a4\u30b9\u306b\u8868\u793a\u3055\u308c\u308b\u30a2\u30a4\u30b3\u30f3\u3067\u30a8\u30f3\u30c9\u30c4\u30fc\u30a8\u30f3\u30c9\u6697\u53f7\u5316\u3055\u308c\u3066\u3044\u308b\u306e\u304b\u77e5\u308b\u3088\u3046\u306b\u306a\u308a\u307e\u3059\u3002<\/p>\n<p><a href=\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2021\/01\/Radhi-End-to-end-encryption.png\"><br \/>\n  <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-350329 size-full\" src=\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2021\/01\/Radhi-End-to-end-encryption.png\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2021\/01\/Radhi-End-to-end-encryption-300x150.png 300w, https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2021\/01\/Radhi-End-to-end-encryption.png 600w\" alt=\"Emhi-\u30a8\u30f3\u30c9\u30c4\u30fc\u30a8\u30f3\u30c9\u6697\u53f7\u5316\" width=\"600\" height=\"300\" \/><br \/>\n<\/a><\/p>\n<p>Webex \u306f E2E \u30bb\u30ad\u30e5\u30a2 ID \u3092\u8ffd\u52a0\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u306f\u3001\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u53c2\u52a0\u8005\u3092\u507d\u88c5\u3057\u3088\u3046\u3068\u3059\u308b\u4eba\u3092\u30d6\u30ed\u30c3\u30af\u3059\u308b\u305f\u3081\u306b\u8a8d\u8a3c\u30ec\u30a4\u30e4\u30fc\u3092\u8ffd\u52a0\u3057\u307e\u3059\u3002 \u3053\u306e\u300c\u30b9\u30d7\u30fc\u30d5\u30a3\u30f3\u30b0\u8a3c\u660e\u300d\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u306f\u3001e\u30b3\u30de\u30fc\u30b9\u3068\u30bb\u30ad\u30e5\u30a2\u306a\u30b3\u30f3\u30c6\u30f3\u30c4\u304c\u30a6\u30a7\u30d6\u30d6\u30e9\u30a6\u30b6\u7d4c\u7531\u3067\u63d0\u4f9b\u3055\u308c\u308b\u65b9\u6cd5\u3068\u4f3c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u3059\u3079\u3066\u306eWebex Teams\u6697\u53f7\u5316\u304c\u30c7\u30d5\u30a9\u30eb\u30c8\u3067\u30a8\u30f3\u30c9\u30c4\u30fc\u30a8\u30f3\u30c9\u306b\u8a2d\u5b9a\u3055\u308c\u3001\u30b5\u30fc\u30d0\u30fc\u306b\u306f\u6697\u53f7\u5316\u30c7\u30fc\u30bf\u3060\u3051\u304c\u8868\u793a\u3055\u308c\u307e\u3059\u3002 Webex \u306e E2E \u6697\u53f7\u5316\u306e\u5c06\u6765\u306b\u3064\u3044\u3066\u8a73\u7d30\u3092\u8aad\u3080\u306b\u306f\u3001\u30db\u30ef\u30a4\u30c8 \u30da\u30fc\u30d1\u30fc\u3092\u304a <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collaboration\/webex-security.html\">\u8aad\u307f\u304f\u3060\u3055\u3044<\/a>\u3002<\/p>\n<h2><span><br \/>\n  <strong>\u7d44\u7e54\u306e\u4fdd\u8b77&#8230;\u81ea\u5206\u81ea\u8eab\u304b\u3089<\/strong><br \/>\n<\/span><\/h2>\n<p>\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e0a\u306e\u9055\u53cd\u306f\u3001\u591a\u304f\u306e\u5834\u5408\u3001\u30e6\u30fc\u30b6\u30fc\u3068\u3057\u3066\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u306e\u7d50\u679c\u3067\u3059\u3002 Webex \u3067\u306f\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u306e\u6a5f\u5bc6\u6027\u3092\u9ad8\u3081\u3060\u3051\u3067\u306a\u304f\u3001\u30e6\u30fc\u30b6\u30fc\u306e\u30c8\u30e9\u30d6\u30eb\u3092\u89e3\u6c7a\u3059\u308b\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3082\u7528\u610f\u3057\u3066\u3044\u307e\u3059\u3002 \u5171\u6709\u3059\u3079\u304d\u3067\u306f\u306a\u3044\u30d5\u30a1\u30a4\u30eb\u3092\u8aa4\u3063\u3066\u5171\u6709\u3059\u308b\u3001\u4ed6\u306e\u30e6\u30fc\u30b6\u30fc\u306b\u3059\u3079\u304d\u3067\u306f\u306a\u3044\u30e1\u30c3\u30bb\u30fc\u30b8\u3092\u9001\u4fe1\u3059\u308b\u300d\u3001\u307e\u305f\u306f\u300c\u4e0d\u8981\u306a\u30b9\u30da\u30fc\u30b9\u306b\u306f\u306a\u3044\u300d\u3068\u8a00\u3063\u3066\u3044\u308b\u304b\u3069\u3046\u304b\u3002 \u3053\u308c\u3089\u306e\u4e00\u822c\u7684\u306a\u9593\u9055\u3044\u306f\u3001Webex \u304c\u7a4d\u6975\u7684\u306b\u89e3\u6c7a\u3059\u308b\u306e\u306b\u5f79\u7acb\u3061\u307e\u3059\u3002<\/p>\n<h2><span>\u58c1<\/span><\/h2>\n<p>\u58c1\u306e\u58c1\u306b\u3088\u308a\u3001Webex\u7ba1\u7406\u8005\u306f\u6700\u59275 Webex Teams\u306e\u7570\u306a\u308b\u30b0\u30eb\u30fc\u30d7\u306e\u305f\u3081\u306b\u3001\u3059\u3079\u3066\u306e\u5bfe\u8a71\u3092\u7981\u6b62\u3067\u304d\u307e\u3059\u3002 \u5f7c\u3089\u306f\u9867\u5ba2\u306e\u7ba1\u7406\u3055\u308c\u305f\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u306b\u57fa\u3065\u3044\u3066\u304a\u308a\u3001Active Directory\u3055\u308c\u305f\u30b0\u30eb\u30fc\u30d7\u304c\u30b3\u30e9\u30dc\u30ec\u30fc\u30b7\u30e7\u30f3\u3092\u9632\u6b62\u3059\u308b\u306e\u306b\u5f79\u7acb\u3061\u307e\u3059\u3002 \u3053\u306e\u64cd\u4f5c\u306b\u3088\u308a\u3001\u3053\u308c\u3089\u306e\u5236\u9650\u3055\u308c\u305f\u30b0\u30eb\u30fc\u30d7\u306f\u30b9\u30da\u30fc\u30b9\u306b\u4e92\u3044\u3092\u62db\u5f85\u3057\u305f\u308a\u3001\u4f1a\u8a71\u3092\u958b\u59cb\u3057\u305f\u308a\u3067\u304d\u307e\u305b\u3093\u3002 \u305f\u3060\u3057\u3001\u7d44\u7e54\u306e\u6b8b\u308a\u306e\u30e6\u30fc\u30b6\u30fc\u3068\u4f5c\u696d\u3092\u7d99\u7d9a\u3067\u304d\u307e\u3059\u3002<\/p>\n<p><a href=\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2021\/01\/Radhi-ethical-walls.png\"><br \/>\n  <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-350332\" src=\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2021\/01\/Radhi-ethical-walls.png\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" srcset=\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2021\/01\/Radhi-ethical-walls-300x150.png 300w, https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2021\/01\/Radhi-ethical-walls-768x384.png 768w, https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2021\/01\/Radhi-ethical-walls.png 800w\" alt=\"\u30c7\u30ea\u30fc- \u4e00\u90e8\u306e\u58c1\" width=\"600\" height=\"300\" \/><br \/>\n<\/a><\/p>\n<p>\u3053\u308c\u3092\u3069\u306e\u3088\u3046\u306b\u3057\u3066\u4f7f\u7528\u3067\u304d\u307e\u3059\u304b? \u4f8b\u3092\u6b21\u306b\u793a\u3057\u307e\u3059\u3002 \u5927\u898f\u6a21\u306a\u9280\u884c\u3067\u306f\u3001\u6295\u8cc7\u9280\u884c\u3084\u4f1a\u793e\u306e\u8abf\u67fb\u30a2\u30ca\u30ea\u30b9\u30c8\u306f\u3001\u76f8\u4e92\u306b\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u3057\u3066\u3001\u8208\u5473\u306e\u885d\u7a81\u3092\u907f\u3051\u308b\u5fc5\u8981\u306f\u306a\u3044\u3002 Webex \u3092\u4f7f\u7528\u3059\u308b\u3068\u3001Webex \u306f Webex Control Hub<a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/conferencing\/webex-control-hub\/index.html\">\u3067\u5b9a\u7fa9\u3055\u308c\u3066\u3044\u308b\u7c21\u5358\u306a\u30eb\u30fc\u30eb\u306b\u57fa\u3065\u3044\u3066 Webex  <\/a>\u304c\u81ea\u52d5\u7684\u306b\u30d6\u30ed\u30c3\u30af\u3057\u3001\u8ab0\u3068\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u3092\u53d6\u308b\u3079\u304d\u304b\u3092\u5fc3\u914d\u3059\u308b\u5fc5\u8981\u306f\u3042\u308a\u307e\u305b\u3093\u3002<\/p>\n<h2><span><br \/>\n  <strong>\u30ea\u30a2\u30eb\u30bf\u30a4\u30e0\u306e\u30c7\u30fc\u30bf\u640d\u5931\u306e\u9632\u6b62<\/strong><br \/>\n<\/span><\/h2>\n<p>\u30ea\u30a2\u30eb\u30bf\u30a4\u30e0\u306e Data Loss Prevention (DLP) \u306b\u3088\u308a\u3001IT \u7ba1\u7406\u8005\u306f\u6a5f\u5bc6\u30c7\u30fc\u30bf\u304c\u30e6\u30fc\u30b6\u30fc\u3001\u793e\u5185\u3001\u5916\u90e8\u306b\u3088\u3063\u3066\u30a2\u30af\u30bb\u30b9\u3055\u308c\u308b\u306e\u3092\u9632\u3050\u3053\u3068\u304c\u53ef\u80fd\u3067\u3059\u3002 \u3053\u308c\u3089\u306e\u6a5f\u80fd\u306f Cisco Cloudlock \u3067\u5f37\u5316\u3055\u308c\u307e\u3059 (\u30d1\u30fc\u30c8\u30ca\u30fc \u30a8\u30b3\u30b7\u30b9\u30c6\u30e0\u306b\u62e1\u5f35\u3055\u308c\u305f\u6a5f\u80fd\u3067): \u30e6\u30fc\u30b6\u30fc\u306f\u3001\u8a71\u3055\u308c\u308b\u3001\u5171\u6709\u3055\u308c\u3066\u3044\u308b\u3001\u307e\u305f\u306f\u8868\u793a\u3055\u308c\u308b\u304b\u3069\u3046\u304b\u306b\u95a2\u95a2\u4fc2\u306a\u3044\u3001Data Loss Prevention (DLP) \u30b7\u30b9\u30c6\u30e0\u306e\u30b3\u30f3\u30c6\u30f3\u30c4\u306b\u30d5\u30e9\u30b0\u3092\u4ed8\u3051\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\n<p>\u3053\u306e\u6a5f\u80fd\u306b\u3088\u308a\u3001\u7ba1\u7406\u8005\u306f\u3001\u6a5f\u5bc6\u30c7\u30fc\u30bf\u304c\u30ea\u30a2\u30eb\u30bf\u30a4\u30e0\u3067\u30b9\u30da\u30fc\u30b9\u306b\u8ee2\u9001\u3055\u308c\u308b\u306e\u3092\u9632\u3050\u3053\u3068\u304c\u53ef\u80fd\u306b\u306a\u308a\u307e\u3059\u3002 \u4f8b\u3048\u3070\u3001\u7ba1\u7406\u8005\u306f\u3001\u5951\u7d04\u793e\u54e1\u306a\u3069\u3001\u7279\u5b9a\u306e\u30b0\u30eb\u30fc\u30d7\u306b\u5bfe\u3057\u3066\u30d5\u30a1\u30a4\u30eb\u3078\u306e\u30a2\u30af\u30bb\u30b9\u3092\u30d6\u30ed\u30c3\u30af\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002 \u3042\u308b\u3044\u306f\u3001\u5f93\u696d\u54e1\u304c\u793e\u5916\u306e\u30d5\u30a1\u30a4\u30eb\u3092\u5171\u6709\u3057\u305f\u308a\u3001\u5171\u6709\u3057\u305f\u308a\u3057\u305f\u304f\u306a\u3044\u5834\u5408\u304c\u3042\u308a\u307e\u3059\u3002 \u307e\u305f\u306f\u3001\u5171\u6709\u3092\u7d5e\u308a\u8fbc\u3080\u306a\u3069\u3001\u30a2\u30af\u30bb\u30b9\u306b\u57fa\u3065\u3044\u3066\u5171\u6709\u3092\u5236\u9650\u3057\u3066\u3001\u4f01\u696d\u306e VPN \u63a5\u7d9a\u3067\u306e\u307f\u53ef\u80fd\u3067\u3059\u3002 Webex \u3092\u4f7f\u7528\u3059\u308b\u3068\u3001\u554f\u984c\u304c\u751f\u307f\u51fa\u3055\u308c\u308b\u524d\u306b\u3001\u30e6\u30fc\u30b6\u30fc\u306b\u3053\u308c\u3089\u306e\u30d7\u30ed\u30b0\u30e9\u30e0\u3092\u8a2d\u5b9a\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\n<p>\u6709\u52b9\u306a\u5834\u5408\u3001\u30b7\u30b9\u30c6\u30e0\u306f\u9055\u53cd\u304a\u3088\u3073\u9055\u53cd\u3092\u5206\u6790\u3057\u3001\u5bfe\u5fdc\u3067\u304d\u307e\u3059\u3002 \u9055\u53cd\u884c\u70ba\u306b\u3088\u3063\u3066\u547c\u3073\u51fa\u3055\u308c\u305f\u5834\u5408\u3001\u30b7\u30b9\u30c6\u30e0\u306f\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30dd\u30fc\u30c8\u3092 Webex Control Hub \u3067\u8868\u793a\u53ef\u80fd\u306a\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30dd\u30fc\u30c8\u3092\u4f5c\u6210\u3057\u3001\u7121\u52b9\u306a\u30b9\u30d4\u30fc\u30ab\u30fc\u3068\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u30aa\u30d5\u30a3\u30b5\u30fc\u3092\u30e1\u30fc\u30eb\u8a18\u9332\u3092\u9001\u4fe1\u3057\u307e\u3059\u3002 \u3053\u308c\u306f\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u81ea\u5206\u304c\u884c\u3063\u305f\u9593\u9055\u3044\u3092\u7406\u89e3\u3057\u3001\u5c06\u6765\u3092\u3088\u308a\u826f\u304f\u884c\u3044\u3001\u4f1a\u793e\u306b\u30ea\u30b9\u30af\u3092\u4e0e\u3048\u308b\u306e\u306b\u5f79\u7acb\u3061\u307e\u3059\u3002 \u3055\u3089\u306b\u3001\u30b9\u30da\u30fc\u30b9\u306e\u8ab0\u304c\u6240\u6709\u3057\u3066\u3044\u308b\u304b\u306b\u304b\u304b\u308f\u3089\u305a\u3001\u3069\u306e\u30e6\u30fc\u30b6\u30fc (\u5185\u90e8\u307e\u305f\u306f\u5916\u90e8) \u306e\u30e6\u30fc\u30b6\u30fc\u306b\u3088\u3063\u3066\u3001\u6a5f\u5bc6\u30c7\u30fc\u30bf\u304c\u30b9\u30da\u30fc\u30b9\u306e\u30e6\u30fc\u30b6\u30fc\u306b\u30ea\u30a2\u30eb\u30bf\u30a4\u30e0\u3067\u9001\u4fe1\u3055\u308c\u308b\u306e\u3092\u9632\u3050\u30a4\u30f3\u30e9\u30a4\u30f3 DLP \u6a5f\u80fd\u3092\u6301\u3064\u4e88\u5b9a\u3067\u3059\u3002<\/p>\n<h2><span><br \/>\n  <strong>\u9589\u3058\u4e2d<\/strong><br \/>\n<\/span><\/h2>\n<p>\u3067\u3059\u304b\u3089\u3001\u5f15\u304d\u7d9a\u304d Webex \u304c\u4fe1\u983c\u3092\u4fdd\u3061\u3001\u975e\u516c\u958b\u3067\u5fc5\u8981\u306a\u60c5\u5831\u3092\u5171\u6709\u3057\u3066\u3044\u304f\u4e2d\u3001Webex \u306f\u5f15\u304d\u7d9a\u304d\u5f0a\u793e\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u304a\u3088\u3073\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u6a5f\u80fd\u3092\u9032\u5316\u3055\u305b\u3001\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3068\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u5b89\u5168\u306b\u4fdd\u3061\u307e\u3059\u3002<\/p>\n<blockquote>\n<h3><a href=\"https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collaboration\/webex-security.html\">\u5fc5\u8981\u306a\u60c5\u5831\u3092\u898b\u3064\u3081\u3001\u5fc5\u8981\u306a\u60c5\u5831\u3092\u898b\u3064 <\/a><\/h3>\n<\/blockquote>\n<p><strong>\u30ea\u30bd\u30fc\u30b9<\/strong>  <a href=\"https:\/\/www.mckinsey.com\/business-functions\/strategy-and-corporate-finance\/our-insights\/how-covid-19-has-pushed-companies-over-the-technology-tipping-point-and-transformed-business-forever\">[1] COVID-19<\/a><strong><\/strong>  <a href=\"https:\/\/blogs.cisco.com\/collaboration\/welcome-to-the-all-new-webex\">  \u304c\u4f01\u696d\u306b\u6280\u8853\u306e\u30d2\u30f3\u30c8\u30dd\u30a4\u30f3\u30c8\u3092\u62bc\u3057\u4e0a\u3052\u3001\u30d3\u30b8\u30cd\u30b9\u3092\u5b8c\u5168\u306b\u5909\u9769\u3057\u305f\u65b9\u6cd5\u8a73\u7d30\u8a73\u7d30WebexCollaboration<\/a>  <a href=\"https:\/\/blogs.cisco.com\/collaboration\/collaboration-a-key-driver-for-digital-transformation-and-the-cisco-story\">\u306b\u6b53\u8fce\u3057\u307e\u3059: \u30c7\u30b8\u30bf\u30eb\u5909\u9769\u306e\u4e3b\u8981\u306a\u4fc3\u9032\u8005\u304a\u3088\u3073 Cisco \u30b9\u30c8\u30fc\u30ea\u30fc<\/a>  <a href=\"https:\/\/blogs.cisco.com\/collaboration\/cisco-collaboration-flex-plan-now-includes-cisco-calling-plans-and-better-together-security-collaboration-offers\">Cisco \u30b3\u30e9\u30dc\u30ec\u30fc\u30b7\u30e7\u30f3 \u30d5\u30ec\u30c3\u30af\u30b9 \u30d7\u30e9\u30f3\u306b\u306f\u3001Cisco \u901a\u8a71\u30d7\u30e9\u30f3\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 + \u30b3\u30e9\u30dc\u30ec\u30fc\u30b7\u30e7\u30f3 \u30b5\u30fc\u30d3\u30b9\u3092\u4e00\u7dd2\u306b\u8ffd\u52a0\u3057\u307e\u3057\u305f<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u3059\u3079\u3066\u306e\u65b0\u3057\u3044 Webex \u304c\u30c7\u30fc\u30bf\u306e\u5b89\u5168\u3001\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u306e\u4fdd\u8b77\u3001\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u306e\u8ab2\u984c\u3078\u306e\u5bfe\u51e6\u306b\u5f79\u7acb\u3064\u53d6\u308a\u7d44\u307f\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002<\/p>\n","protected":false},"author":5419,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[8018,1498],"tags":[8481,3907,14965],"class_list":["post-385259","post","type-post","status-publish","format-standard","hentry","category-collaboration","category-video-conferencing","tag-cisco-cloudlock-ja","tag-data-loss-prevention","tag-webex-control-hub"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Webex\uff1a \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u65b0\u3057\u3044\u30c4\u30fc\u30eb\u3078\u306e\u6e96\u62e0\u306e\u6a19\u6e96\u3092\u8a2d\u5b9a\u3057\u3066\u3001\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3068\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u5b89\u5168\u3067\u5b89\u5168\u306b\u4fdd\u3064 | Webex Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webex\uff1a \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u65b0\u3057\u3044\u30c4\u30fc\u30eb\u3078\u306e\u6e96\u62e0\u306e\u6a19\u6e96\u3092\u8a2d\u5b9a\u3057\u3066\u3001\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3068\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u5b89\u5168\u3067\u5b89\u5168\u306b\u4fdd\u3064 | Webex Blog\" \/>\n<meta property=\"og:description\" content=\"\u3059\u3079\u3066\u306e\u65b0\u3057\u3044 Webex \u304c\u30c7\u30fc\u30bf\u306e\u5b89\u5168\u3001\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u306e\u4fdd\u8b77\u3001\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u306e\u8ab2\u984c\u3078\u306e\u5bfe\u51e6\u306b\u5f79\u7acb\u3064\u53d6\u308a\u7d44\u307f\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"Webex Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-13T16:59:08+00:00\" \/>\n<meta name=\"author\" content=\"Radhika Chagarlamudi\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"Radhika Chagarlamudi\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/\"},\"author\":{\"name\":\"Radhika Chagarlamudi\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/39822513d5108378a6d7fa6d587c7d92\"},\"headline\":\"Webex\uff1a \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u65b0\u3057\u3044\u30c4\u30fc\u30eb\u3078\u306e\u6e96\u62e0\u306e\u6a19\u6e96\u3092\u8a2d\u5b9a\u3057\u3066\u3001\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3068\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u5b89\u5168\u3067\u5b89\u5168\u306b\u4fdd\u3064\",\"datePublished\":\"2021-01-13T16:59:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/\"},\"wordCount\":65,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2021\/01\/Radhi-End-to-end-encryption.png\",\"keywords\":[\"Cisco Cloudlock\",\"Data Loss Prevention\",\"Webex Control Hub\"],\"articleSection\":[\"\u30b3\u30e9\u30dc\u30ec\u30fc\u30b7\u30e7\u30f3\",\"\u30d3\u30c7\u30aa\u4f1a\u8b70\"],\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/\",\"url\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/\",\"name\":\"Webex\uff1a \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u65b0\u3057\u3044\u30c4\u30fc\u30eb\u3078\u306e\u6e96\u62e0\u306e\u6a19\u6e96\u3092\u8a2d\u5b9a\u3057\u3066\u3001\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3068\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u5b89\u5168\u3067\u5b89\u5168\u306b\u4fdd\u3064 | Webex Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.webex.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2021\/01\/Radhi-End-to-end-encryption.png\",\"datePublished\":\"2021-01-13T16:59:08+00:00\",\"author\":{\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/39822513d5108378a6d7fa6d587c7d92\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/#primaryimage\",\"url\":\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2021\/01\/Radhi-End-to-end-encryption.png\",\"contentUrl\":\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2021\/01\/Radhi-End-to-end-encryption.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.webex.com\/ja\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webex\uff1a \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u65b0\u3057\u3044\u30c4\u30fc\u30eb\u3078\u306e\u6e96\u62e0\u306e\u6a19\u6e96\u3092\u8a2d\u5b9a\u3057\u3066\u3001\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3068\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u5b89\u5168\u3067\u5b89\u5168\u306b\u4fdd\u3064\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.webex.com\/es\/#website\",\"url\":\"https:\/\/blog.webex.com\/es\/\",\"name\":\"Webex Blog\",\"description\":\"Webex by Cisco powers collaboration through industry-leading video conferencing, cloud calling and contact center solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.webex.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/39822513d5108378a6d7fa6d587c7d92\",\"name\":\"Radhika Chagarlamudi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0fed2bc7510f3a563900ef9cf0ccb143a49bf3d6e731b7e9580fc0ddab542924?s=96&d=wp_user_avatar&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0fed2bc7510f3a563900ef9cf0ccb143a49bf3d6e731b7e9580fc0ddab542924?s=96&d=wp_user_avatar&r=g\",\"caption\":\"Radhika Chagarlamudi\"},\"description\":\"Known for spearheading innovation that accelerates business outcomes, Radhi Chagarlamudi leads the Webex Platform &amp; Infrastructure Engineering team at Cisco. She and her team oversee the strategy, build, and operation of the Webex Cloud. Collectively, their work in user experience, engineering, and product management drive the innovation and delivery of features and tools across the platform, including Webex Control Hub, Webex analytics platform, and common core services. Radhi is passionate about building high performing teams and has led multiple complex initiatives, including Cisco\u2019s Data Center transformation to software-defined infrastructure and an AIOps foundation. In her current role, she leads a global team whose charter is to grow the Webex Cloud Platform into new markets supporting innovative ways of working and learning. In her personal life, Radhi is an active community volunteer using her passion for collaboration, inclusion, and diversity to lead regional STEM programs through Cisco\u2019s Connected Women\u2019s affinity group, and her membership at the Orchid Giving Circle at the Texas Women\u2019s Foundation, which provides large community grants supporting social change and services for the North Texas Asian community. She holds an electrical and systems engineering bachelor\u2019s degree from Carleton University and an engineering management master\u2019s degree from Southern Methodist University. Radhi resides in Texas and enjoys spending time outdoors with her husband and two children. An avid hiker and global traveler, she often spends her family holidays exploring mountain summits.\",\"url\":\"https:\/\/blog.webex.com\/ja\/contributors\/radhikachagarlamudi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Webex\uff1a \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u65b0\u3057\u3044\u30c4\u30fc\u30eb\u3078\u306e\u6e96\u62e0\u306e\u6a19\u6e96\u3092\u8a2d\u5b9a\u3057\u3066\u3001\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3068\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u5b89\u5168\u3067\u5b89\u5168\u306b\u4fdd\u3064 | Webex Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/","og_locale":"ja_JP","og_type":"article","og_title":"Webex\uff1a \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u65b0\u3057\u3044\u30c4\u30fc\u30eb\u3078\u306e\u6e96\u62e0\u306e\u6a19\u6e96\u3092\u8a2d\u5b9a\u3057\u3066\u3001\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3068\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u5b89\u5168\u3067\u5b89\u5168\u306b\u4fdd\u3064 | Webex Blog","og_description":"\u3059\u3079\u3066\u306e\u65b0\u3057\u3044 Webex \u304c\u30c7\u30fc\u30bf\u306e\u5b89\u5168\u3001\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u306e\u4fdd\u8b77\u3001\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u306e\u8ab2\u984c\u3078\u306e\u5bfe\u51e6\u306b\u5f79\u7acb\u3064\u53d6\u308a\u7d44\u307f\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002","og_url":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/","og_site_name":"Webex Blog","article_published_time":"2021-01-13T16:59:08+00:00","author":"Radhika Chagarlamudi","twitter_misc":{"\u57f7\u7b46\u8005":"Radhika Chagarlamudi"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/#article","isPartOf":{"@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/"},"author":{"name":"Radhika Chagarlamudi","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/39822513d5108378a6d7fa6d587c7d92"},"headline":"Webex\uff1a \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u65b0\u3057\u3044\u30c4\u30fc\u30eb\u3078\u306e\u6e96\u62e0\u306e\u6a19\u6e96\u3092\u8a2d\u5b9a\u3057\u3066\u3001\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3068\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u5b89\u5168\u3067\u5b89\u5168\u306b\u4fdd\u3064","datePublished":"2021-01-13T16:59:08+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/"},"wordCount":65,"commentCount":0,"image":{"@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2021\/01\/Radhi-End-to-end-encryption.png","keywords":["Cisco Cloudlock","Data Loss Prevention","Webex Control Hub"],"articleSection":["\u30b3\u30e9\u30dc\u30ec\u30fc\u30b7\u30e7\u30f3","\u30d3\u30c7\u30aa\u4f1a\u8b70"],"inLanguage":"ja","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/","url":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/","name":"Webex\uff1a \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u65b0\u3057\u3044\u30c4\u30fc\u30eb\u3078\u306e\u6e96\u62e0\u306e\u6a19\u6e96\u3092\u8a2d\u5b9a\u3057\u3066\u3001\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3068\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u5b89\u5168\u3067\u5b89\u5168\u306b\u4fdd\u3064 | Webex Blog","isPartOf":{"@id":"https:\/\/blog.webex.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/#primaryimage"},"image":{"@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2021\/01\/Radhi-End-to-end-encryption.png","datePublished":"2021-01-13T16:59:08+00:00","author":{"@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/39822513d5108378a6d7fa6d587c7d92"},"breadcrumb":{"@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/#primaryimage","url":"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2021\/01\/Radhi-End-to-end-encryption.png","contentUrl":"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2021\/01\/Radhi-End-to-end-encryption.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/webex-setting-the-standard-for-security-and-compliance-with-new-tools-to-keep-your-meetings-and-content-safe-and-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.webex.com\/ja\/"},{"@type":"ListItem","position":2,"name":"Webex\uff1a \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u65b0\u3057\u3044\u30c4\u30fc\u30eb\u3078\u306e\u6e96\u62e0\u306e\u6a19\u6e96\u3092\u8a2d\u5b9a\u3057\u3066\u3001\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3068\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u5b89\u5168\u3067\u5b89\u5168\u306b\u4fdd\u3064"}]},{"@type":"WebSite","@id":"https:\/\/blog.webex.com\/es\/#website","url":"https:\/\/blog.webex.com\/es\/","name":"Webex Blog","description":"Webex by Cisco powers collaboration through industry-leading video conferencing, cloud calling and contact center solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.webex.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Person","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/39822513d5108378a6d7fa6d587c7d92","name":"Radhika Chagarlamudi","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0fed2bc7510f3a563900ef9cf0ccb143a49bf3d6e731b7e9580fc0ddab542924?s=96&d=wp_user_avatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0fed2bc7510f3a563900ef9cf0ccb143a49bf3d6e731b7e9580fc0ddab542924?s=96&d=wp_user_avatar&r=g","caption":"Radhika Chagarlamudi"},"description":"Known for spearheading innovation that accelerates business outcomes, Radhi Chagarlamudi leads the Webex Platform &amp; Infrastructure Engineering team at Cisco. She and her team oversee the strategy, build, and operation of the Webex Cloud. Collectively, their work in user experience, engineering, and product management drive the innovation and delivery of features and tools across the platform, including Webex Control Hub, Webex analytics platform, and common core services. Radhi is passionate about building high performing teams and has led multiple complex initiatives, including Cisco\u2019s Data Center transformation to software-defined infrastructure and an AIOps foundation. In her current role, she leads a global team whose charter is to grow the Webex Cloud Platform into new markets supporting innovative ways of working and learning. In her personal life, Radhi is an active community volunteer using her passion for collaboration, inclusion, and diversity to lead regional STEM programs through Cisco\u2019s Connected Women\u2019s affinity group, and her membership at the Orchid Giving Circle at the Texas Women\u2019s Foundation, which provides large community grants supporting social change and services for the North Texas Asian community. She holds an electrical and systems engineering bachelor\u2019s degree from Carleton University and an engineering management master\u2019s degree from Southern Methodist University. Radhi resides in Texas and enjoys spending time outdoors with her husband and two children. An avid hiker and global traveler, she often spends her family holidays exploring mountain summits.","url":"https:\/\/blog.webex.com\/ja\/contributors\/radhikachagarlamudi\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.webex.com\/ja\/wp-json\/wp\/v2\/posts\/385259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.webex.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.webex.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.webex.com\/ja\/wp-json\/wp\/v2\/users\/5419"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.webex.com\/ja\/wp-json\/wp\/v2\/comments?post=385259"}],"version-history":[{"count":0,"href":"https:\/\/blog.webex.com\/ja\/wp-json\/wp\/v2\/posts\/385259\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.webex.com\/ja\/wp-json\/wp\/v2\/media?parent=385259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.webex.com\/ja\/wp-json\/wp\/v2\/categories?post=385259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.webex.com\/ja\/wp-json\/wp\/v2\/tags?post=385259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}