{"id":50153,"date":"2017-08-22T21:02:00","date_gmt":"2017-08-23T02:02:00","guid":{"rendered":"http:\/\/www.eagleeyenetworks.com\/security-analytics-jp\/"},"modified":"2021-04-22T09:30:46","modified_gmt":"2021-04-22T14:30:46","slug":"security-analytics","status":"publish","type":"post","link":"https:\/\/www.een.com\/ja\/blog\/security-analytics\/","title":{"rendered":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30ca\u30ea\u30c6\u30a3\u30af\u30b9"},"content":{"rendered":"<p>Eagle Eye Networks\u306f\u3001Eagle Eye \u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ab\u30e1\u30e9 VMS\u306e\u30e9\u30a4\u30f3\u30af\u30ed\u30b9\u3068\u4fb5\u5165\u691c\u77e5\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u89e3\u6790\u6a5f\u80fd\u3092\u30ea\u30ea\u30fc\u30b9\u3057\u307e\u3057\u305f\u3002\u3053\u308c\u3089\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u306b\u3088\u308a\u3001\u76e3\u8996\u753b\u50cf\u304c\u30ea\u30a2\u30eb\u30bf\u30a4\u30e0\u3067\u7d99\u7d9a\u7684\u306b\u89e3\u6790\u3055\u308c\u308b\u305f\u3081\u3001Eagle Eye \u306e\u304a\u5ba2\u69d8\u306b\u6ce8\u610f\u3084\u8b66\u544a\u3092\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\n<p>\u30ab\u30b9\u30bf\u30e0\u30a2\u30e9\u30fc\u30c8\u3092\u751f\u6210\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u305f\u3081\u3001\u3053\u308c\u3089\u306e\u30a2\u30ca\u30ea\u30c6\u30a3\u30af\u30b9\u306f\u3069\u306e\u30ab\u30e1\u30e9\u306b\u3082\u8ffd\u52a0\u3067\u304d\u307e\u3059\u3002<\/p>\n<p>\u3053\u308c\u3089\u306e\u6a5f\u80fd\u3092\u6709\u52b9\u306b\u3059\u308b\u65b9\u6cd5\u306e\u8a73\u7d30\u306b\u3064\u3044\u3066\u306f\u3001<a href=\"https:\/\/www.een.com\/ja\/blog\/enabling-analytics\/\">\u3053\u3061\u3089<\/a>\u3092\u30af\u30ea\u30c3\u30af\u3059\u308b\u304b\u3001\u30b5\u30dd\u30fc\u30c8\u30c1\u30fc\u30e0\uff08+ 1-512-473-0501\uff09\u306b\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044\u3002\u307e\u305f\u3001\u305d\u308c\u305e\u308c\u306e\u5177\u4f53\u7684\u306a\u89e3\u6790\u306e\u8a73\u7d30\u306b\u3064\u3044\u3066\u306f\u3001\u4e0b\u8a18\u3092\u3054\u89a7\u304f\u3060\u3055\u3044:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.een.com\/ja\/blog\/line-crossing-analytic\/\">\u30e9\u30a4\u30f3\u30af\u30ed\u30b9<\/a><\/li>\n<li><a href=\"https:\/\/www.een.com\/ja\/blog\/intrusion-detection-analytic\/\">\u4fb5\u5165\u691c\u77e5<\/a><\/li>\n<\/ul>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-34308\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image.png\" alt=\"\" width=\"503\" height=\"335\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image.png 952w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image-300x200.png 300w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image-100x67.png 100w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image-195x130.png 195w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image-200x134.png 200w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image-400x267.png 400w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image-600x401.png 600w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image-800x534.png 800w\" sizes=\"(max-width: 503px) 100vw, 503px\" \/><\/p>\n<p>\u304a\u554f\u3044\u5408\u308f\u305b<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Eagle Eye Networks\u306f\u3001Eagle Eye  &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/ja\/blog\/security-analytics\/\"> <span class=\"screen-reader-text\">\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30ca\u30ea\u30c6\u30a3\u30af\u30b9<\/span> \u3082\u3063\u3068\u8aad\u3080 &raquo;<\/a><\/p>\n","protected":false},"author":544,"featured_media":34308,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"19859,20236,20239,20891,20896,20899","_relevanssi_noindex_reason":"","footnotes":""},"categories":[450],"tags":[1288,1293,1384,1389],"class_list":["post-50153","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-video-surveillance-ja","tag-cloud-video-surveillance-ja","tag-security-camera-system-ja","tag-video-analytics-ja","tag-video-management-software-ja"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/ja\/wp-json\/wp\/v2\/posts\/50153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/ja\/wp-json\/wp\/v2\/users\/544"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/ja\/wp-json\/wp\/v2\/comments?post=50153"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/ja\/wp-json\/wp\/v2\/posts\/50153\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/ja\/wp-json\/wp\/v2\/media\/34308"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/ja\/wp-json\/wp\/v2\/media?parent=50153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/ja\/wp-json\/wp\/v2\/categories?post=50153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/ja\/wp-json\/wp\/v2\/tags?post=50153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}