½ÃÀ庸°í¼­
»óǰÄÚµå
1367802

¿£ÅÍÇÁ¶óÀÌÁî »çÀ̹ö º¸¾ÈÀÇ ÁÖ¿ä ´ÜÁ¡(2023³â)

Top Enterprise Cybersecurity Shortcomings, 2023

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IDC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 15 Pages | ¹è¼Û¾È³» : Áï½Ã¹è¼Û

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

ÀÌ IDC °üÁ¡¿¡¼­´Â ¿À´Ã³¯ ºÏ¹Ì ±â¾÷ÀÇ »çÀ̹ö º¸¾È °üÇàÀ» Á¤ÀÇÇÏ´Â ÁÖ¿ä Æ®·»µå¿¡ ÃÊÁ¡À» ¸ÂÃß°í ÀÖ½À´Ï´Ù. ¸¹Àº ±â¾÷µéÀÌ »çÀ̹ö º¸¾È Àü·«¿¡¼­ Å« °ÝÂ÷¿¡ °è¼Ó Á÷¸éÇϰí ÀÖ½À´Ï´Ù. ÀÏ¹Ý ±â¾÷µéÀº ±¤¹üÀ§ÇÑ »çÀ̹ö º¸¾È µµ±¸¿Í Àü·«¿¡ ÅõÀÚÇϰí ÀÖÁö¸¸, ¿ø°Ý ¿£µåÆ÷ÀÎÆ® º¸¾È, ID ¹× ¾×¼¼½º °ü¸® Á¦¾î, ¿ëµµ ¹× ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á º¸¾È, º¹±¸ ¹× ´ëÀÀ, GRC µîÀÇ ºÐ¾ß¿¡¼­´Â ¿©ÀüÈ÷ ¸¹Àº ±â¾÷µéÀÌ ºÎÁ·ÇÕ´Ï´Ù. ÁÁÀº ¼Ò½ÄÀº ÀÌ·¯ÇÑ °ÝÂ÷¸¦ ÇØ¼ÒÇÒ ¼ö ÀÖ´Â ¼Ö·ç¼ÇÀÌ Á¸ÀçÇϸç, ´ëºÎºÐÀÇ Á¶Á÷ÀÌ ½±°Ô Á¢±ÙÇÒ ¼ö ÀÖ´Ù´Â °ÍÀÔ´Ï´Ù. IDCÀÇ IT ÀÓ¿ø ÇÁ·Î±×·¥(IEP) ºñ»ó±Ù ¿¬±¸ °í¹®ÀÎ Å©¸®½º ÅäÄ¡(Chris Tozzi)´Â "»çÀ̹ö º¸¾ÈÀ» °­È­Çϱâ À§Çؼ­´Â Á¶Á÷¿¡ ÇÊ¿äÇÑ Ãß°¡ µµ±¸¿Í °üÇàÀ» ½Äº°Çϰí À̸¦ µµÀÔÇÏ´Â °ÍÀÌ Áß¿äÇÏ´Ù"°í ¸»Çß½À´Ï´Ù. "±â¾÷ÀÌ »çÀ̹ö º¸¾ÈÀ» ½É°¢ÇÏ°Ô ¹Þ¾ÆµéÀ̰í ÀÖ´Â °ÍÀº ºÐ¸íÇÏÁö¸¸, Á÷¸éÇÑ À§ÇùÀÌ ´Ù¾çÇϱ⠶§¹®¿¡ ¸ðµç À¯ÇüÀÇ À§Çù°ú À§Çè °ü¸®¿¡ ¹Ýµå½Ã ¼º°øÇÏ´Â °ÍÀº ¾Æ´Ï´Ù"¶ó¸ç, "CISO¿Í CIO´Â »çÀ̹ö º¸¾È Àü·«ÀÇ °ÝÂ÷¸¦ Æò°¡Çϰí À§Çù ÇàÀ§ÀÚ°¡ ħÀÔÇϱâ Àü¿¡ °ÝÂ÷¸¦ ÇØ¼ÒÇØ¾ß ÇÑ´Ù"°í ¸»Çß½À´Ï´Ù. ÇàÀ§ÀÚ°¡ ħÀÔÇϱâ Àü¿¡ ±× °ÝÂ÷¸¦ ¸Þ¿ö¾ß ÇÑ´Ù"°í °­Á¶Çß½À´Ï´Ù.

ÁÖ¿ä ¿ä¾à

»óȲ °³¿ä

  • µ¥ÀÌÅÍ ÄÁÅØ½ºÆ®
  • ÁÖ¸ñÇØ¾ß ÇÒ »çÀ̹ö º¸¾È µ¿Çâ
    • ¿ø°Ý ±Ù¹«¸¦ Áö¿øÇÏ´Â ÀÎÇÁ¶ó º¸È£
    • Æ÷°ýÀûÀÌÁö ¾ÊÀº »çÀ̹ö º¸¾È ºÐ¼®
    • ID ¹× ¾×¼¼½º °ü¸® ±âº»¿¡ ¼ÒȦÇϱâ
    • ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾ÈÀÇ ´ÜÁ¡
    • »çÀ̹ö º¸¾È ¹®Á¦ ÇØ°á ¼Óµµ Çâ»ó
    • °Å¹ö³Í½º ¹× ±ÔÁ¤ Áؼö °á°ú °³¼±

°¡¼ú ¹ÙÀ̾ ´ëÇÑ ¾îµå¹ÙÀ̽º

Âü°í ÀÚ·á

  • °ü·Ã Á¶»ç
  • ¿ä¾à
LSH 23.11.01

This IDC Perspective highlights key trends that define cybersecurity practices at North American enterprises today. Many enterprises continue to face major gaps within their cybersecurity strategies. Although the typical organization has invested in a broad range of cybersecurity tools and strategies, a significant number of enterprises continue to fall short in areas such as remote endpoint security, identity and access management controls, application and software supply chain security, remediation and response, and GRC. The good news is that solutions to close these gaps are available and, in many cases, within easy reach for most organizations. Therefore, enhancing cybersecurity is a matter of identifying which additional tools and practices your organization needs and then adopting them."Enterprises clearly take cybersecurity seriously, but given the wide array of threats they face, they are not always successful in managing all types of threats and risks," says Chris Tozzi, adjunct research advisor for IDC's IT Executive Programs (IEP). "CISOs and CIOs must take stock of the gaps within their cybersecurity strategies, then close them before threat actors break through."

Executive Snapshot

Situation Overview

  • Data Context
  • Notable Cybersecurity Trends
    • Securing the Infrastructure That Powers Remote Work
    • Non-Comprehensive Cybersecurity Analytics
    • Identity and Access Management: Neglecting the Fundamentals
    • Application Security Shortcomings
    • Speeding Cybersecurity Remediation
    • Improving Governance and Compliance Outcomes

Advice for the Technology Buyer

Learn More

  • Related Research
  • Synopsis
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦