½ÃÀ庸°í¼­
»óǰÄÚµå
1322943

¼¼°èÀÇ XDR(Extended Detection and Response) ¼ºÀå ±âȸ

Global Extended Detection and Response (XDR) Growth Opportunities

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: Frost & Sullivan | ÆäÀÌÁö Á¤º¸: ¿µ¹® 46 Pages | ¹è¼Û¾È³» : 1-2ÀÏ (¿µ¾÷ÀÏ ±âÁØ)

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

µ¶º¸ÀûÀÎ °¡½Ã¼º, ÅëÇÕ ¹× ÀÚµ¿È­¸¦ ÅëÇØ Á¶Á÷ÀÇ º¸¾È ż¼¸¦ °­È­Çϰí ÁøÈ­ÇÏ´Â À§Çù ȯ°æ¿¡ ´ëÇÑ ³»¼ºÀ» °­È­ÇÕ´Ï´Ù.

XDR(Extended Detection and Response)Àº ´Ù¾çÇÑ º¸¾È ÄÁÆ®·ÑÀÇ µ¥ÀÌÅ͸¦ ÅëÇÕÇÏ¿© º¸¾È ÆÀÀÌ Á¾ÇÕÀûÀ¸·Î À§ÇùÀ» ŽÁö, Á¶»ç ¹× ´ëÀÀÇÒ ¼ö ÀÖµµ·Ï Áö¿øÇÏ´Â º¥´õ µ¶¸³ÀûÀÎ ¼Ö·ç¼ÇÀ¸·Î, XDRÀÇ ¼¼ °¡Áö ÇÙ½É ¾à¼ÓÀº ±³Â÷ ŽÁö ¹× ´ëÀÀ, ÀÇ¹Ì ÀÖ´Â ÀÚµ¿È­, Ÿ»ç¿ÍÀÇ ÅëÇÕÀÔ´Ï´Ù.

º¸¾È º¥´õµéÀº XDR¿¡ ´ëÇØ ¸î °¡Áö Á¢±Ù ¹æ½ÄÀ» ÃëÇϰí ÀÖÀ¸¸ç, °³¹æÇü(Ÿ»ç¿ÍÀÇ ÅëÇÕ, °³¹æÇü ¾ÆÅ°ÅØÃ³, À¯¿¬¼º °­Á¶), ³×ÀÌÆ¼ºê(º¥´õÀÇ ÀÚü º¸¾È ½ºÅðúÀÇ ³×ÀÌÆ¼ºê ÅëÇÕ Á¦°ø¿¡ ÁßÁ¡À» µÒ), ÇÏÀ̺긮µå(ÇÏÀ̺긮µå ³×ÀÌÆ¼ºê ÅëÇÕ¿¡ ÁßÁ¡À» µÎ¸é¼­ µÎ °¡Áö Á¢±Ù ¹æ½ÄÀ» °áÇÕÇÏ¿© °í°´ÀÌ ¼±ÅÃÇÒ ¼ö ÀÖµµ·Ï ÇÔ) Áß Çϳª·Î ºÐ·ùµË´Ï´Ù.

XDRÀº ´Ù¾çÇÑ ¼Ö·ç¼Ç Ä«Å×°í¸®ÀÇ ÁøÈ­ÀÇ °á°úÀ̸ç, ´Ù¾çÇÑ ºÐ¾ß¿Í ¹è°æÀ» °¡Áø º¥´õµéÀÌ XDR ±â´ÉÀ» °®Ãá Á¦Ç°À» °³¹ßÇϰí ÀÖ½À´Ï´Ù. ÀÌ ºÐ¾ßÀÇ ÀϺΠ±â¾÷µéÀº EDR(¿£µåÆ÷ÀÎÆ® ŽÁö ¹× ´ëÀÀ) ¼Ö·ç¼Ç¿¡¼­ Ãâ¹ßÇØ ÀÌ¹Ì °­·ÂÇÑ Å½Áö ¹× ´ëÀÀ ±â¹Ý¿¡ ÅëÇÕ°ú ÀÚµ¿È­¸¦ Ãß°¡ÇØ °­È­Çß½À´Ï´Ù. ¶Ç ´Ù¸¥ ±â¾÷µéÀº SOAR(º¸¾È ¿ÀÄɽºÆ®·¹À̼Ç, ÀÚµ¿È­ ¹× ´ëÀÀ) ¼Ö·ç¼ÇÀ» µ¥ÀÌÅÍ ¼öÁý ¹× ¿ø°Ý ÃøÁ¤À¸·Î È®ÀåÇϰųª À§Çù ÀÎÅÚ¸®Àü½º Ç÷§Æû¿¡ ŽÁö ¹× ´ëÀÀ ±â´ÉÀ» Ãß°¡Çϱ⵵ ÇÕ´Ï´Ù. °æÀï»çµéÀº °¢±â ´Ù¸¥ ½ºÅ丮¸¦ °¡Áö°í ÀÖÀ¸¸ç, XDR¿¡ ´ëÇÑ Á¢±Ù ¹æ½Äµµ ´Ù¸¨´Ï´Ù.

2³â Àü¸¸ ÇØµµ XDRÀº ±× ¾à¼ÓÀ» Á¦´ë·Î ÀÌÇàÇÏÁö ¸øÇß½À´Ï´Ù. ML ¾Ë°í¸®Áò, ¾Ö³Î¸®Æ½½º Ȱ¿ë, AI, ±×¸®°í XDRÀÇ ¿¹Ãø ´É·ÂÀº ºÒ°ú ¸î³â¸¸¿¡ Å©°Ô Çâ»óµÇ¾î ÇöÀç ¸¹Àº ¼Ö·ç¼ÇÀÌ Ç÷¹ÀÌºÏ ÀÌ»óÀÇ °ÍÀ» »ç¿ëÇÏ¿© ÀÌ ¹®Á¦¸¦ ÇØ°áÇϰí ÀÖ½À´Ï´Ù.

XDRÀÇ ÇöÀç ¼º°ø°ú ³ôÀº äÅ÷ü, ¸ÅÃâ ¼ºÀåÀº ÀÌ ¼Ö·ç¼ÇÀÇ ´É·Â°ú »çÀ̹ö º¸¾È ½ÃÀåÀÇ ¿©·¯ ¹®Á¦Á¡À» ÇØ°áÇϰí ÀÖ´Ù´Â °ÍÀ» Áõ¸íÇϰí ÀÖ½À´Ï´Ù. Á¶Á÷Àº °¡½Ã¼º, ÅëÇÕ, ºÐ¼®, À¯¿¬¼º, ÀÚµ¿È­°¡ ÇÊ¿äÇϸç, XDRÀº ÀÌ·¯ÇÑ ¿ä±¸ »çÇ×À» ÃæÁ·ÇÒ ¼ö ÀÖ´Â ´É·ÂÀ¸·Î °æÀïÀÌ Ä¡¿­ÇÑ »çÀ̹ö º¸¾È ºÐ¾ß¿¡¼­ ¹øÃ¢ÇÏ°í ¼º°øÇϰí ÀÖ½À´Ï´Ù. º¸¾ÈÀ» Á¦°øÇϱâ À§ÇØ Àü·«À» ¾÷µ¥ÀÌÆ®Çϰí ÀÖÁö¸¸, ½ÃÀåÀÇ ¼ö¸¹Àº ¼ºÀå ±âȸ¸¦ Ȱ¿ëÇϱâ À§ÇÑ °­È­, ÅõÀÚ ¹× Çõ½ÅÀÇ ¿©Áö´Â ¿©ÀüÈ÷ ³²¾Æ ÀÖ½À´Ï´Ù.

¸ñÂ÷

Àü·«Àû °úÁ¦

  • ¿Ö ¼ºÀåÀÌ ¾î·Á¿öÁö°í Àִ°¡?
  • The Strategic Imperative 8(TM)
  • XDR ¾÷°èÀÇ Àü·«Àû °úÁ¦ : ÁÖ¿ä 3°³ Ç׸ñÀÇ ¿µÇâ
  • Growth Pipeline Engine(TM)¸¦ ¿òÁ÷ÀÌ´Â ¼ºÀå ±âȸ

¼ºÀå ±âȸ ºÐ¼®

  • °³¿ä
  • ÁÖ¿ä Àå·¡¼º
  • ÁøÈ­
  • ºÐ¼® ¹üÀ§
  • ÁÖ¿ä °æÀï»ç
  • ¼ºÀå ÁöÇ¥
  • ¼ºÀå ÃËÁø¿äÀÎ
  • ¼ºÀå ¾ïÁ¦¿äÀÎ
  • ¿¹ÃøÀÇ ÀüÁ¦Á¶°Ç
  • ¸ÅÃâ ¿¹Ãø
  • Áö¿ªº° ¸ÅÃâ ¿¹Ãø
  • ±â¾÷ ±Ô¸ðº° ¸ÅÃâ ¿¹Ãø
  • ¾÷°èº° ¸ÅÃâ ¿¹Ãø
  • ¸ÅÃâ°ú ¿¹Ãø ºÐ¼®
  • °¡°Ý µ¿Çâ°ú ¿¹Ãø ºÐ¼®
  • °æÀï ȯ°æ

¼ºÀå ±âȸ

  • ¼ºÀå ±âȸ 1 - XDRÀ» °£¼ÒÈ­ÇÏ¿© äÅ÷üÀ» ³ôÀÌ°í »çÀ̹ö º¸¾È ÀÎÀç ºÎÁ· ¹®Á¦ ÇØ°á
  • ¼ºÀå ±âȸ 2 - XDRÀ» ÇÏÀ̺긮µåÈ­ÇÏ°í °³¹æÇÏ¿© ³×ÀÌÆ¼ºê ÅëÇÕ¿¡ ´ëÇÑ ÀÇÁ¸µµ¸¦ ³·Ãã
  • ¼ºÀå ±âȸ 3- ½áµåÆÄƼ ÅëÇÕÀ» °­È­ÇÏ¿© ³×ÀÌÆ¼ºê ÅëÇÕÀÇ ´Ü¼ø¼ºÀ» ´É°¡ÇÏ´Â ¼öÁØ Çâ»ó
  • ¼ºÀå ±âȸ 4 - Çù¾÷ »ç·Ê ¹× ±â´ÉÀ» Æ÷ÇÔÇÏ¿© XDRÀÇ °¡Ä¡ Áõ´ë
  • ¼ºÀå ±âȸ 5- ÀÚµ¿È­ ±â´ÉÀÇ Áö¼ÓÀûÀÎ °³¹ß ¹× Ãß°¡

CISOÀ» À§ÇÑ ÅëÂû

  • XDR´Â SIEM³ª SOAR¿Í ¾î¶»°Ô ´Ù¸¥°¡?
  • XDR¿¡ÀÇ ´Ù¾çÇÑ Á¢±Ù °ËÅä

´ÙÀ½ ´Ü°è

  • ´ÙÀ½ ´Ü°è
  • ¿Ö Áö±Ý Frost & SullivanÀΰ¡?
  • º°Áö ¸®½ºÆ®
  • ¸éÃ¥»çÇ×
LSH 23.08.21

Unparalleled Visibility, Integration, and Automation will Enhance Organizations' Security Posture and Increase their Resilience in an Evolving Threat Landscape

XDR is a vendor-agnostic solution that aggregates data from a wide range of security controls and enables security teams to holistically detect, investigate, and respond to threats. XDR's 3 core promises are cross-layered detection and response, meaningful automation, and third-party integration.

Security vendors take several approaches to XDR, which can be classified as Open (focused on third-party integration, open architecture, and flexibility), Native (focused on providing native integration with the vendor's own security stack), or Hybrid (combining both approaches with a smaller focus on native integration, allowing customers to decide).

XDR is the result of different solution categories' evolution: vendors from diverse areas and backgrounds have developed their products with XDR functionality. Some companies in this space started their journey with an endpoint detection and response (EDR) solution, adding integration and automation to their already robust detection and response base to enhance it. Others augmented their security orchestration, automation, and response (SOAR) solutions with data ingestion and telemetry or added detection and response to their threat intelligence platforms. Each competitor has a different story and a different approach to XDR.

Only 2 years ago, XDR was underdelivering on its promises. Solutions mainly lacked meaningful automation, third-party integration, or both. ML algorithms, analytics usage, AI, and XDR's predictive capabilities improved drastically in only a few years, and many solutions now tackle this issue with much more than just playbooks.

XDR's current success, high adoption, and revenue growth are testament to the solution's capabilities and how they address many pain points in the cybersecurity market. Organizations need visibility, integration, analytics, flexibility, and automation, and XDR's ability to address these demands allows it to thrive and flourish in the extremely competitive cybersecurity space. While XDR vendors have updated their strategies to offer more competitive solutions and deliver high-end security to their customers, there is still room for enhancements, investments, and innovation to leverage the numerous growth opportunities in the market.

Table of Contents

Strategic Imperatives

  • Why is it Increasingly Difficult to Grow?
  • The Strategic Imperative 8™
  • The Impact of the Top Three Strategic Imperatives on the XDR Industry
  • Growth Opportunities Fuel the Growth Pipeline Engine™

Growth Opportunity Analysis

  • Overview
  • Key Promises
  • Evolution
  • Scope of Analysis
  • Key Competitors
  • Growth Metrics
  • Growth Drivers
  • Growth Restraints
  • Forecast Assumptions
  • Revenue Forecast
  • Revenue Forecast by Region
  • Revenue Forecast by Company Size
  • Revenue Forecast by Industry Vertical
  • Revenue Forecast Analysis
  • Pricing Trends and Forecast Analysis
  • Competitive Environment

Growth Opportunity Universe

  • Growth Opportunity 1-Simplifying XDR to Increase Adoption and Counter the Lack of Cybersecurity Talent
  • Growth Opportunity 2-Hybridizing and Opening Up XDR to Make it Less Reliant on Native Integration
  • Growth Opportunity 3-Enhancing Third-party Integration to Rival Native Integration Simplicity
  • Growth Opportunity 4-Including Collaborative Practices and Features to Multiply XDR's Value
  • Growth Opportunity 5-Continuing the Development and Addition of Automation Features

Insights for CISOs

  • How is XDR Different from SIEM and SOAR?
  • Considering Different Approaches to XDR

Next Steps

  • Your Next Steps
  • Why Frost, Why Now?
  • List of Exhibits
  • Legal Disclaimer
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦