![]() |
½ÃÀ庸°í¼
»óǰÄÚµå
1398858
¼¼°è Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀÌ¼Ç º¸È£ Ç÷§ÆûÀÇ ¼ºÀå ±âȸGlobal Cloud-native Application Protection Platform Growth Opportunities |
Äڵ忡¼ Ŭ¶ó¿ìµå º¸¾È¿¡ ´ëÇÑ ¿ä±¸°¡ ³ô¾ÆÁö¸é¼ CNAPPÀÇ ¼ºÀå ÀáÀç·Âµµ ³ô¾ÆÁý´Ï´Ù.
Ŭ¶ó¿ìµå ¼ºñ½ºÀÇ µµÀÔ°ú º¹À⼺Àº ƯÈ÷ ¸ÖƼ Ŭ¶ó¿ìµå ȯ°æ¿¡¼ ´õ¿í °¡¼Óȵǰí ÀÖ½À´Ï´Ù. Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀÌ¼Ç º¸È£ Ç÷§Æû(CNAPP)Àº ÆÐÄ¡¿öÅ© ¼Ö·ç¼ÇÀÌ ¾Æ´Ñ ÅëÇÕµÈ ¶óÀÌÇÁ»çÀÌŬ º¸¾ÈÀÇ Çʿ伺À» °Á¶Çϰí ÀÖÀ¸¸ç, CNAPP¸¦ ÅëÇØ ±âÁ¸¿¡´Â »çÀϷηΠÀÛ¾÷ÇÏ´ø º¸¾È, Ç÷§Æû, °³¹ß ¹× °³¹ßÆÀ µî ´Ù¾çÇÑ ÆÀ °£ÀÇ Çù¾÷À» °ÈÇÒ ¼ö ÀÖ½À´Ï´Ù. º¸¾ÈÆÀ, Ç÷§ÆûÆÀ, °³¹ßÆÀ µîÀÇ ÆÀ Çù¾÷À» °ÈÇÒ ¼ö ÀÖ°Ô ÇØÁÝ´Ï´Ù. Ŭ¶ó¿ìµå ȯ°æÀÇ º¯È¿Í Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀÌ¼Ç °³¹ß ÇÁ·Î¼¼½ºÀÇ Æ¯¼ºÀ¸·Î ÀÎÇØ »ý»ê¼º, ¿ëµµ º¹¿ø·Â ¹× ºñÁî´Ï½º ¹Îø¼ºÀ» ³ôÀ̱â À§ÇØ ÀÌ·¯ÇÑ ÆÀµéÀÌ Çù·ÂÇØ¾ß ÇÕ´Ï´Ù.
´Ù¾çÇÑ Ç÷§Æû°ú ÀÎÇÁ¶ó¿¡ ¼·Î ´Ù¸¥ º¸¾È ±ÔÄ¢°ú Á¤Ã¥À» Àû¿ëÇÏ´Â Æ÷ÀÎÆ® ¼Ö·ç¼ÇÀ» µµÀÔÇϸé Àü¹ÝÀûÀÎ ¿î¿µ È¿À²¼º, ÃÖÁ¾»ç¿ëÀÚ °æÇè, ºñÁî´Ï½º ¼º°ú°¡ ÀúÇϵǰí, º¸¾È Á¤Ã¥ Àû¿ëÀÌ È¯°æ °£¿¡ Àϰü¼º ¾øÀÌ Àû¿ëµÇ¾î °ü¸® ¿À¹öÇìµå ¹× º¸¾È °ÝÂ÷°¡ ¹ß»ýÇÒ ¼ö ÀÖ½À´Ï´Ù. °ü¸® ¿À¹öÇìµå ¹× º¸¾È °ÝÂ÷¸¦ Áõ°¡½Ãų ¼ö ÀÖ½À´Ï´Ù.
±× °á°ú, Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀ̼ÇÀÇ ¶óÀÌÇÁ»çÀÌŬ Àü¹Ý¿¡ °ÉÃÄ ´õ ³ªÀº ¸®½ºÅ© °ü¸®¿Í º¸¾È º¸È£¸¦ À§ÇØ ¸ðµç º¸¾È ±â´ÉÀ» ´ÜÀÏ Ç÷§Æû¿¡ ÅëÇÕÇÏ¿© ¸ðµç Ŭ¶ó¿ìµå ÀÎÇÁ¶ó, ¿öÅ©·Îµå ¹× ¿ÀǼҽº ¼ÒÇÁÆ®¿þ¾î ¸ðµç Ŭ¶ó¿ìµå ÀÎÇÁ¶ó, ¿öÅ©·Îµå, ¿ÀǼҽº ¼ÒÇÁÆ®¿þ¾î¿¡ °ÉÃÄ À§ÇèÀ» ÃÖ¼ÒÈÇÏ°í º¸È£ ¹üÀ§¸¦ ±Ø´ëÈÇØ¾ß ÇÕ´Ï´Ù. À̸¦ À§Çؼ´Â ÄÄÇöóÀ̾𽺠¹× º¸¾È Á¡°Ë ÇÁ·Î¼¼½º¸¦ ÀÚµ¿ÈÇϰí, ½Ç¼ö°¡ ¹ß»ýÇϱ⠽¬¿î ÀÎÀû °³ÀÔ¿¡ ´ëÇÑ ÀÇÁ¸µµ¸¦ ÁÙ¿© º¸¾È ¼º°ú¸¦ ³ô¿©¾ß ÇÕ´Ï´Ù.
ÇÊ¿äÇÑ ¸ðµç º¸¾È ±â´ÉÀ» ÅëÇÕÇÑ ÅëÇÕ Å¬¶ó¿ìµå º¸¾È Ç÷§ÆûÀÎ CNAPP´Â º¸¾È ¹× ÄÄÇöóÀ̾𽺠ÇÁ·Î¼¼½º¸¦ °£¼ÒÈÇϰí ÀÚµ¿ÈÇÏ¿© Á¶Á÷ÀÌ À§Çè ¹× ±âŸ º¸¾È ¹®Á¦¸¦ °ü¸®ÇÒ ¼ö ÀÖµµ·Ï Áö¿øÇÑ´Ù, Æ÷ÀÎÆ® ¼Ö·ç¼ÇÀ» Á¦°ÅÇÒ ¼ö ÀÖ´Â ±âȸ¸¦ Á¦°øÇÏ¿© ±â¾÷ÀÌ ½Ã°£°ú °ü¸® ºñ¿ëÀ» Àý°¨ÇÏ°í º¥´õ °ü¸®¸¦ ÁÙÀÏ ¼ö ÀÖµµ·Ï Áö¿øÇÕ´Ï´Ù.
CNAPP´Â ½ÃÇÁÆ® ·¹ÇÁÆ® º¸¾È ¸ðµ¨À» ÃËÁøÇÏ¿© ±â¾÷ÀÌ Ãʱ⠴ܰèºÎÅÍ °³¹ß ÇÁ·Î¼¼½º¿¡ º¸¾ÈÀ» ÅëÇÕÇÒ ¼ö ÀÖµµ·Ï ÇÔÀ¸·Î½á ÇÁ·Î´ö¼Ç ȯ°æ¿¡¼ ¼³Á¤ ¿À·ù, Ãë¾àÁ¡ µîÀÇ ¹®Á¦¸¦ ¼öÁ¤ÇÏ°í º¹±¸ÇÏ´Â µ¥ µå´Â À§Çè°ú ½Ã°£À» ÁÙÀÏ ¼ö ÀÖ½À´Ï´Ù.
Increasing Requirements for Code to Cloud Security Drive CNAPP Growth Potential
Cloud services adoption and complexity are accelerating, particularly in multi-cloud environments. Cloud-native application protection platform (CNAPP) emphasizes the need for unified life cycle security rather than patchwork solutions. CNAPP enables organizations to increase team collaboration, including security, platform, and development teams, which traditionally work in silos. Changes in the cloud environment and the nature of the cloud-native application development process require these teams to work together to increase their productivity, application resiliency, and business agility.
Deploying point solutions in different platforms and infrastructures with various security rules and policies will reduce overall operational efficiency, end-user experiences, and business outcomes and increase management overheads and security gaps, as the application of security policies may not be consistent across environments.
As a result, it is necessary to converge all security capabilities into a single platform for better risk management and security protection of the cloud-native applications throughout their life cycle to minimize the risks and maximize the protection coverage across all cloud infrastructures, workloads, open-source software, and artifacts. This requires organizations to automate compliance and security checking processes to reduce the reliance on human intervention, which is error-prone, and increase positive security outcomes.
CNAPP, an integrated cloud security platform consolidating all necessary security capabilities, simplifies and automates security and compliance processes to help organizations manage risks and other security issues. It provides an opportunity to eliminate point solutions, enabling companies to save time and management costs and reduce vendor management.
CNAPP facilitates the shift-left security model, which enables organizations to integrate security into the development process in the early phases, reducing risks and time to fix and remediate issues, such as misconfigurations and vulnerabilities in production.