{"id":68257,"date":"2017-05-11T16:34:41","date_gmt":"2017-05-11T08:34:41","guid":{"rendered":"http:\/\/www.i-sprint.com\/2017-top25-cyber-security-companies\/"},"modified":"2023-04-28T09:53:58","modified_gmt":"2023-04-28T01:53:58","slug":"2017-top25-cyber-security-companies","status":"publish","type":"post","link":"https:\/\/www.i-sprint.com\/ja\/2017-top25-cyber-security-companies\/","title":{"rendered":"I-SPRINT NAMED AS 2017 TOP 25 CYBER SECURITY TECHNOLOGY COMPANIES"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><h2 style=\"text-align: center;\">i-SPRINT \u304c 2017 \u5e74\u30c8\u30c3\u30d7 25 \u306e\u30b5\u30a4\u30d0\u30fc \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u4f01\u696d\u306b\u9078\u3070\u308c\u308b<\/h2>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator\" style=\"margin-left: auto;margin-right: auto;margin-bottom:50px;width:100%;max-width:100px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color7);border-color:var(--awb-color7);border-top-width:4px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div>\n<div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><a href=\"http:\/\/www.i-sprint.com\/wp-content\/uploads\/2017\/05\/APACCIOOUTLOOK17_Logo.jpg\" class=\"fusion-lightbox\" data-rel=\"iLightbox[4acf50252013febf650]\" data-title=\"APACCIOOUTLOOK17_Logo\" title=\"APACCIOOUTLOOK17_Logo\"><img decoding=\"async\" width=\"298\" height=\"96\" alt=\"APACCIOOUTLOOK17_Logo\" src=\"http:\/\/www.i-sprint.com\/wp-content\/uploads\/2017\/05\/APACCIOOUTLOOK17_Logo.jpg\" class=\"img-responsive wp-image-67736\" srcset=\"https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2017\/05\/APACCIOOUTLOOK17_Logo-200x64.jpg 200w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2017\/05\/APACCIOOUTLOOK17_Logo.jpg 298w\" sizes=\"(max-width: 800px) 100vw, 298px\" loading=\"lazy\" \/><\/a><\/span><\/div><\/div><br><div class=\"fusion-text fusion-text-2\"><div align=\"justify\">\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p><em><strong>\u30b7\u30f3\u30ac\u30dd\u30fc\u30eb\u30012017 \u5e74 5 \u6708 11 \u65e5<\/strong>\u00a0<\/em>\u2013 i-Sprint Innovations \u306f\u3001\u6700\u9ad8\u306e ID\u3001\u8a8d\u8a3c\u60c5\u5831\u3001\u304a\u3088\u3073\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3 \u30d7\u30ed\u30d0\u30a4\u30c0\u30fc\u3067\u3042\u308a\u3001APAC CIO Outlook \u306e 2017 \u5e74 5 \u6708\u7248\u306b\u30012017 \u5e74\u00a0<a href=\"http:\/\/cyber-security.apacciooutlook.com\/vendors\/top-25-cyber-security-technology-companies-2017-rid-92.html\">\u30b5\u30a4\u30d0\u30fc \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u4f01\u696d\u306e\u4e0a\u4f4d 25 \u793e<\/a>\u3068\u3057\u3066\u63b2\u8f09\u3055\u308c\u307e\u3057\u305f\u3002<\/p>\n<p><a href=\"http:\/\/cyber-security.apacciooutlook.com\/vendors\/top-25-cyber-security-technology-companies-2017-rid-92.html\">2017 \u5e74\u306e Cyber\u200b\u200b Security Technology Companies \u306e\u4e0a\u4f4d 25 \u793e\u306e\u30ea\u30b9\u30c8\u306f\u3001<\/a>\u00a0APAC\u00a0\u00a0\u00a0CIO Outlook \u306b\u3088\u308b\u3082\u306e\u3067\u3059\u3002\u3053\u306e\u30ea\u30b9\u30c8\u306f\u3001\u6b21\u4e16\u4ee3\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30a4\u30f3\u30d5\u30e9\u30b9\u30c8\u30e9\u30af\u30c1\u30e3\u306e\u69cb\u7bc9\u306b\u5411\u3051\u3066\u30d3\u30b8\u30cd\u30b9\u3092\u30ea\u30fc\u30c9\u3059\u308b\u6700\u524d\u7dda\u306b\u3044\u308b\u4f01\u696d\u3092\u660e\u3089\u304b\u306b\u3057\u307e\u3059\u3002<\/p>\n<p>i-Sprint \u306f\u3001\u3053\u306e\u30c8\u30c3\u30d7 25 \u30ea\u30b9\u30c8\u306b\u63b2\u8f09\u3055\u308c\u305f\u3053\u3068\u3092\u5149\u6804\u306b\u601d\u3044\u307e\u3059\u3002\u3053\u308c\u306f\u3001i-Sprint \u306e 2 \u756a\u76ee\u306e\u30b5\u30a4\u30d0\u30fc \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u306e\u4e0a\u5834\u5b9f\u7e3e\u3067\u3059\u3002I-Sprint \u306f\u3001Cyber\u200b\u200bsecurity Venture \u306e\u00a0<a href=\"http:\/\/cybersecurityventures.com\/cybersecurity-500-list\/\">Cyber\u200b\u200bsecurity 500 \u30ea\u30b9\u30c8\u306e<\/a>50 \u4f4d\u306b\u3082\u63b2\u8f09\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>APAC CIO Outlook \u30ea\u30b9\u30c8\u306e\u8a73\u7d30\u306b\u3064\u3044\u3066\u306f\u3001\u00a0<a href=\"http:\/\/cyber-security.apacciooutlook.com\/vendors\/top-25-cyber-security-technology-companies-2017-rid-92.html\">\u3053\u3053\u3092\u30af\u30ea\u30c3\u30af<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<p><a href=\"http:\/\/www.i-sprint.com\/uploads\/i-Sprint_WriteUp_APACCIOOutlook.pdf\">i-Sprint \u306b\u95a2\u3059\u308b APAC CIO Outlook \u306e\u8a18\u4e8b\u3092\u8868\u793a\u3059\u308b\u306b\u306f\u3001\u3053\u3053\u3092\u30af\u30ea\u30c3\u30af<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u00a0\u3002<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Top 25 Cyber Security Technology Companies 2017 listing is by APAC CIO Outlook.<\/p>\n","protected":false},"author":2,"featured_media":67736,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","footnotes":""},"categories":[167],"tags":[],"class_list":["post-68257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-press-ja-2"],"_links":{"self":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/68257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/comments?post=68257"}],"version-history":[{"count":5,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/68257\/revisions"}],"predecessor-version":[{"id":84161,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/68257\/revisions\/84161"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media\/67736"}],"wp:attachment":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media?parent=68257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/categories?post=68257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/tags?post=68257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}