![]() |
½ÃÀ庸°í¼
»óǰÄÚµå
1630564
¼¼°èÀÇ ¿ÜºÎ °ø°Ý ´ë»ó Áö¿ª °ü¸®(EASM) ºÎ¹®(2024-2029³â)External Attack Surface Management (EASM) Sector, Global, 2024-2029 |
¿ÜºÎ °ø°Ý ´ë»ó ¿µ¿ªÀÇ ±ÞÁõÀ¸·Î EASM ¼Ö·ç¼ÇÀÇ º¯È Ã˱¸
EASMÀÇ Çʿ伺Àº ÄÄÇöóÀ̾𽺳ª ¿¢¼¿·Î µðÁöÅÐ ÀÚ»êÀ» ¼öµ¿À¸·Î ÃßÀûÇÏ´Â ³°Àº °üÇàÀ» ³Ñ¾î ÀÌÁ¦´Â Çö´ë »çÀ̹ö º¸¾ÈÀÇ ±âº» ¿ä¼Ò·Î ÀÚ¸® Àâ°í ÀÖ½À´Ï´Ù. Ŭ¶ó¿ìµå ¸¶À̱׷¹À̼Ç, IoT, AI, ¿ø°Ý ±Ù¹« µî µðÁöÅÐ ÀüȯÀÌ °¡¼ÓÈµÇ¸é¼ Á¶Á÷ÀÇ µðÁöÅÐ ½ÇÀû´Â Àü·Ê ¾ø´Â ¼Óµµ·Î È®ÀåµÇ°í ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ È®ÀåÀº ITÀÇ º¹À⼺ ¹× Ÿ»ç º¥´õ¿¡ ´ëÇÑ ÀÇÁ¸µµ¿Í ÇÔ²² ´õ ±¤¹üÀ§ÇÑ °ø°Ý º¤ÅÍ¿¡ ´ëÇÑ Ãë¾à¼ºÀ» ¾ß±âÇϰí ÀÖ½À´Ï´Ù. °ø°ÝÀÚµéÀÌ µµ¸ÞÀÎ, ¸ð¹ÙÀÏ ¾Û, ¼Ò¼È ¹Ìµð¾î ÇÁ·ÎÆÄÀÏ, °ø±Þ¸Á µî ³ëÃâµÈ ÀÚ»êÀÇ ¾àÁ¡À» ³ë¸®°í ÇÇ½Ì °ø°Ý, µ¥ÀÌÅÍ À¯Ãâ, Á¦3ÀÚ Ä§ÇØÀÇ À§ÇèÀÌ Áõ°¡ÇÔ¿¡ µû¶ó ±âÁ¸ÀÇ °æ°è ±â¹Ý º¸¾È¸¸À¸·Î´Â ´õ ÀÌ»ó ÃæºÐÇÏÁö ¾Ê½À´Ï´Ù.
º¸¾È¿¡ ´ëÇÑ ¼Ò±ØÀûÀÎ Á¢±Ù ¹æ½ÄÀº ÀçÁ¤ÀûÀ¸·Î Áö¼Ó °¡´ÉÇÏÁö ¾ÊÀ¸¸ç, ÇöÀç Æò±ÕÀûÀÎ Ä§ÇØ »ç°í·Î ÀÎÇØ Á¶Á÷Àº »ç°Ç ´ç 445¸¸ ´Þ·¯(ÇÑÈ ¾à 4¾ï 7,000¸¸ ¿ø)ÀÇ ºñ¿ëÀ» ºÎ´ãÇϰí ÀÖ´Ù(IBM, 2023³â). EASMÀº »õ·Î¿î À§Çù¿¡ ´ëÇÑ Áß¿äÇÑ °¡½Ã¼ºÀ» Á¦°øÇϰí, ½Ç½Ã°£À¸·Î ¹æ¾î¸¦ °ÈÇÔÀ¸·Î½á Á¶Á÷ÀÌ ±âÁ¸ÀÇ °æ°è¸¦ ³Ñ¾î µðÁöÅÐ ÀÚ»êÀ» º¸È£ÇÒ ¼ö ÀÖµµ·Ï µµ¿ÍÁÝ´Ï´Ù. µðÁöÅÐ ÀÚ»êÀ» º¸È£Çϱâ À§ÇÑ Á¾ÇÕÀûÀÎ Á¢±Ù ¹æ½ÄÀ» ÃëÇÒ ¼ö ÀÖµµ·Ï Áö¿øÇÕ´Ï´Ù.
±×µ¿¾È EASMÀº Ãë¾àÁ¡ °ü¸®(VM), ÀÚµ¿ º¸¾È °ËÁõ(ASV), »çÀ̹ö À§Çù ÀÎÅÚ¸®Àü½º(CTI), µðÁöÅÐ ¸®½ºÅ© º¸È£(DRP)¿Í °°Àº °ü·Ã ºÐ¾ß¿Í ºÐ¸®µÇ¾î ¿î¿µµÇ¾î ¿Ô½À´Ï´Ù. ±×·¯³ª ÀÌ·¯ÇÑ ºÐ¾ß´Â ÇöÀç º¸´Ù ÅëÇÕÀûÀ̰í È¿°úÀûÀÎ ¸®½ºÅ© °ü¸®¸¦ À§ÇÑ ÅëÇÕ º¸¾È Ç÷§ÆûÀ» Çü¼ºÇϱâ À§ÇØ ¼ö·ÅµÇ°í ÀÖ½À´Ï´Ù.
EASM ½ÃÀåÀº ¿ÜºÎ °ø°Ý ´ë»ó ¿µ¿ªÀÇ ±Þ°ÝÇÑ Áõ°¡¿Í AIÀÇ ¹ßÀü¿¡ ÈûÀÔ¾î ºü¸£°Ô ¼ºÀåÇϰí ÀÖ½À´Ï´Ù. ÇöÀç EASM µµÀÔÀº ºÏ¹Ì°¡ ÁÖµµÇϰí À¯·´°ú Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«(EMEA)°¡ ±Ù¼ÒÇÑ Â÷ÀÌ·Î ±× µÚ¸¦ ÀÕ°í ÀÖÀ¸¸ç, ¾Æ½Ã¾ÆÅÂÆò¾ç(APAC)°ú ¶óƾ¾Æ¸Þ¸®Ä«(LATAM)¿¡¼µµ °ý¸ñÇÒ ¸¸ÇÑ ¼ºÀåÀÌ ¿¹»óµÇ°í ÀÖ½À´Ï´Ù. ±ÝÀ¶, Á¤ºÎ, ±â¼ú µî ¸®½ºÅ©°¡ ³ô°í ±ÔÁ¦°¡ ±î´Ù·Î¿î ºÐ¾ß´Â ¾ö°ÝÇÑ ±ÔÁ¦ ¿ä°Ç°ú »çÀ̹ö À§Çù¿¡ ´ëÇÑ ³ëÃâµµ°¡ ³ô¾Æ EASM ¼Ö·ç¼Ç µµÀÔÀ» ÁÖµµÇϰí ÀÖ½À´Ï´Ù.
°á·ÐÀûÀ¸·Î, EASMÀº Á¾ÇÕÀûÀÌ°í »çÀü ¿¹¹æÀûÀÎ »çÀ̹ö º¸¾È¿¡ ÀÖ¾î ÇʼöÀûÀÎ ¿ªÇÒÀ» ¼öÇàÇÑ´Ù´Â ÀνÄÀÌ È®»êµÊ¿¡ µû¶ó »ó´çÇÑ ¼ºÀå¼¼¸¦ º¸ÀÏ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. ÀÌ·¯ÇÑ ¼ö¿ä¸¦ ÃËÁøÇÏ´Â °ÍÀº ´Ù¾çÇÑ »ê¾÷ ºÐ¾ßÀÇ ´Ù¾çÇÑ º¸¾È ¿ä±¸¿Í ¼¼°èÈµÈ µðÁöÅÐ ¿ì¼± °æÁ¦°¡ °¡Á®¿À´Â º¹ÀâÇÑ °úÁ¦ÀÔ´Ï´Ù.
The Proliferation of External Attack Surface is Driving Transformational Growth in EASM Solutions
The need for EASM has expanded well beyond compliance and the outdated practice of manually tracking digital assets in Excel; it is now a foundational element of modern cybersecurity. As digital transformation accelerates-through cloud migration, IoT, AI, and remote work-organizations' digital footprints are growing at unprecedented rates. This expansion, coupled with rising IT complexity and reliance on third-party vendors, has created vulnerabilities across a wider range of attack vectors. Traditional perimeter-based security is no longer sufficient as attackers increasingly target weaknesses in exposed assets like domains, mobile apps, social media profiles, and supply chains, raising the risks of phishing attacks, data breaches, and third-party compromises.
A reactive approach to security is financially unsustainable, with the average breach now costing organizations $4.45 million per incident (IBM, 2023). Proactively managing external risks, including misconfigurations and third-party vulnerabilities, is essential to minimize revenue losses, operational disruptions, and brand damage. EASM allows organizations to take a comprehensive approach to secure digital assets beyond traditional perimeters by providing crucial visibility into emerging threats and reinforcing defenses in real time.
Historically, EASM operated separately from related fields like vulnerability management (VM), automated security validation (ASV), cyber threat intelligence (CTI), and digital risk protection (DRP). However, these areas are converging now to form integrated security platforms that deliver more cohesive and effective risk management.
The EASM market is experiencing rapid growth, driven by the proliferation of external attack surfaces and advances in AI. North America currently leads in EASM adoption, followed closely by Europe and the Middle East and Africa (EMEA), with notable growth potential in Asia-Pacific (APAC) and Latin America (LATAM). High-risk and highly regulated sectors like finance, government, and technology are leading adopters of EASM solutions due to stringent regulatory requirements and heightened exposure to cyber threats.
In conclusion, EASM is poised for substantial growth as organizations increasingly recognize its essential role in comprehensive, proactive cybersecurity. This demand is fueled by the diverse security needs of various industries and the intricate challenges presented by a globalized, digital-first economy.
Analyst: Martin Naydenov