½ÃÀ庸°í¼­
»óǰÄÚµå
1288979

IDC PlanScape : ¼³°è¿¡ ÀÇÇÑ °¡Ä¡¿Í ½Å·Ú¸¦ ÃÖ´ëÈ­ÇÏ´Â »çÀ̹ö º¸¾È ¾ÆÅ°ÅØÃ³

IDC PlanScape: Cybersecurity Architecture to Maximize Value and Trust by Design

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IDC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 12 Pages | ¹è¼Û¾È³» : Áï½Ã¹è¼Û

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

ÀÌ IDC PlanScape¿¡¼­´Â »çÀ̹ö º¸¾È ¾ÆÅ°ÅØÃ³°¡ ¾î¶»°Ô °¡Ä¡¿¡ ¿µÇâÀ» ¹ÌÄ¡°í ¼³°è¸¦ ÅëÇÑ ½Å·Ú¸¦ ½ÇÇöÇÒ ¼ö ÀÖ´ÂÁö¿¡ ´ëÇØ ÀÚ¼¼È÷ ¼³¸íÇÕ´Ï´Ù. "»çÀ̹ö º¸¾È ¾ÆÅ°ÅØÃ³´Â Á¤Ã¼¼º, Ãë¾à¼º ¹× À§Çù °ü¸® °üÇà°ú µðÁöÅÐ »ýŰèÀÇ ½Å·Ú¶ó´Â ±¤¹üÀ§ÇÑ °¡Ä¡ÀÇ ±ÕÇüÀ» ¸ÂÃß°í ÀÖ½À´Ï´Ù"¶ó°í IDCÀÇ IT ÀÓ¿ø ÇÁ·Î±×·¥(IEP) ºñ»ó±Ù ¿¬±¸ ÀÚ¹®À§¿øÀÎ Elizabeth Calder´Â ¸»ÇÕ´Ï´Ù. "º¸¾È °æÁ¦ÇÐÀÇ ÀÌÁ¡À» ÅëÇÕÇÏ°í ´ÜÀ§ ºñ¿ë ±âÁØÀÇ À§Çè °¨¼Ò¸¦ °¡´ÉÇϰÔÇÔÀ¸·Î½á ¾ÆÅ°ÅØÃ³ ±â¹Ý µðÁöÅÐ ½Å·ÚÀÇ ÃÊÁ¡Àº º¸¾È°ú À§Çè °ü¸® ¸ðµÎ¿¡ ¿µÇâÀ» ¹ÌÄ¥ ¼ö ÀÖ½À´Ï´Ù."

IDC PlanScape µµÇ¥

ÁÖ¿ä ¿ä¾à

»çÀ̹ö º¸¾È ¾ÆÅ°ÅØÃ³´Â ¿Ö Áß¿äÇѰ¡?

»çÀ̹ö º¸¾È ¾ÆÅ°ÅØÃ³¶õ ¹«¾ùÀΰ¡?

ÁÖ¿ä ÀÌÇØ°ü°èÀÚ´Â ´©±¸Àΰ¡?

¿ì¸® Á¶Á÷Àº »çÀ̹ö º¸¾È ¾ÆÅ°ÅØÃ³¸¦ ¾î¶»°Ô Ȱ¿ëÇÒ ¼ö Àִ°¡?

  • Ÿ°Ù ¾ÆÅ°ÅØÃ³ Ư¡
    • Çõ½Å
    • ÀçÀ̿뼺
    • ±³È¯ °¡´É¼º
    • ¸ñÀû
  • ÀÔ¹®
    • »çÀ̹ö º¸¾È ¾ÆÅ°ÅØÃ³°¡ ½ÇÇöµÉ Çʿ䰡 ÀÖ´Â ¿µÇâÀ» Á¤ÀÇÇÑ´Ù
    • »çÀ̹ö º¸¾È ¾ÆÅ°ÅØÃ³ Ç¥ÁØ ¶Ç´Â ±âÁØÁ¡Àº ¹«¾ùÀΰ¡?
    • »çÀ̹ö º¸¾È ¾ÆÅ°ÅØÃ³ ÆÀÀ» °á¼ºÇÑ´Ù
    • À§ÇèÀ» Æò°¡ÇÑ´Ù
    • Àç°í¸¦ Æò°¡ÇÑ´Ù
    • ÃøÁ¤°ú KPI¿¡ ÃÊÁ¡À» ¸ÂÃá´Ù
    • »çÀ̹ö º¸¾È ¾ÆÅ°ÅØÃ³ Ã¥Á¤
    • ÇÁ·Î¼¼½º¿Í °á°ú¸¦ °øÀ¯ÇÑ´Ù
    • ´ÙÀ½ ½ºÅÜ¿¡ ¿ì¼±¼øÀ§¸¦ Á¤ÇÑ´Ù
    • ½Ç½ÃÇÑ´Ù

Å×Å©³î·¯Áö ±¸ÀÔÀÚ¿¡ ´ëÇÑ ¾îµå¹ÙÀ̽º

°ü·Ã Á¶»ç

KSM 23.06.21

This IDC PlanScape details how cybersecurity architecture impacts value and enables trust by design."Cybersecurity architecture balances the practices of identity, vulnerability, and threat management with the broader values of digital ecosystem trustworthiness," says Alizabeth Calder, adjunct research advisor for IDC's IT Executive Programs (IEP). "By integrating the benefits of security economics and enabling a reduced risk on a unit-cost basis, an architecture-based focus on digital trust can inform both security and risk management."

IDC PlanScape Figure

Executive Summary

Why Is Cybersecurity Architecture Important?

What Is Cybersecurity Architecture?

Who Are the Key Stakeholders?

How Can My Organization Take Advantage of Cybersecurity Architecture?

  • Characteristics of the Target Architecture
    • Innovation
    • Reusability
    • Replaceability
    • Purpose
  • Getting Started
    • Define the Influence That the Cybersecurity Architecture Needs to Enable
    • What Are the Standards or Reference Points for the Cybersecurity Architecture?
    • Form a Cybersecurity Architecture Team
    • Assess the Risks
    • Assess the Inventory
    • Focus on Measurement and KPIs
    • Formulate the Cybersecurity Architecture
    • Socialize the Process and Results
    • Prioritize Next Steps
    • Implement

Advice for Technology Buyers

Related Research

ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦