{"blog_url":"https://blog.jbs.co.jp/","version":"1.0","title":"Trend Micro Deep Security \u306e\u5c0e\u5165\u3068\u30a2\u30c3\u30d7\u30b0\u30ec\u30fc\u30c9(\u5c0e\u5165\u7de8)","categories":["Deep Security","tech"],"url":"https://blog.jbs.co.jp/entry/2023/02/22/085745","provider_name":"Hatena Blog","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fblog.jbs.co.jp%2Fentry%2F2023%2F02%2F22%2F085745\" title=\"Trend Micro Deep Security \u306e\u5c0e\u5165\u3068\u30a2\u30c3\u30d7\u30b0\u30ec\u30fc\u30c9(\u5c0e\u5165\u7de8) - JBS Tech Blog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","author_name":"jbs_tanim","blog_title":"JBS Tech Blog","description":"\u672c\u8a18\u4e8b\u3067\u306f\u3001Trend Micro Deep Security\uff08\u4ee5\u4e0b\u3001Deep Security\uff09 \u3092\u5c0e\u5165\u3059\u308b\u624b\u9806\u306b\u3064\u3044\u3066\u7d39\u4ecb\u3057\u307e\u3059\u3002Deep Security\u306e\u5c0e\u5165\u306f\u6982\u8981\u7de8\u3068\u5c0e\u5165\u7de8\u306e2\u90e8\u69cb\u6210\u306b\u3057\u3066\u3044\u307e\u3059\u3002\u5c0e\u5165\u7de8\u3067\u306f\u3001Deep Security\u3092vSphere\u74b0\u5883\u4e0a\u306b\u69cb\u7bc9\u3059\u308b\u6d41\u308c\u3092\u8a18\u3057\u307e\u3059\u3002","published":"2023-02-22 08:57:45","width":"100%","provider_url":"https://hatena.blog","image_url":"https://cdn.user.blog.st-hatena.com/default_entry_og_image/158660714/1667527455467771","type":"rich","height":"190","author_url":"https://blog.hatena.ne.jp/jbs_tanim/"}