½ÃÀ庸°í¼­
»óǰÄÚµå
1642272

¸ð¹ÙÀÏ À§Çù ¹æ¾î : ³×Æ®¿öÅ©ÀÇ ÆÛÁö ¿§Áö·Î »çÀ̹ö ¹æ¾î È®Àå

Mobile Threat Defense: Extending Cyberprotection to the Fuzzy Edge of the Network

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IDC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 11 Pages | ¹è¼Û¾È³» : Áï½Ã¹è¼Û

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

ÀÌ IDC Market Perspective¿¡¼­´Â Á¶Á÷¿¡¼­ ¸ð¹ÙÀÏ º¸¾ÈÀÇ Á߿伺¿¡ ´ëÇØ ³íÀÇÇÕ´Ï´Ù. ºñÁî´Ï½º ȯ°æ¿¡¼­ ¸ð¹ÙÀÏ ±â±â¿¡ ´ëÇÑ ÀÇÁ¸µµ°¡ ³ô¾ÆÁü¿¡ µû¶ó »çÀ̹ö º¸¾È ¸®½ºÅ©°¡ Áõ°¡Çϰí ÀÖÀ¸¸ç, ÀÌ¿¡ µû¶ó °­·ÂÇÑ ¸ð¹ÙÀÏ À§Çù ¹æ¾î(MTD) ¼Ö·ç¼ÇÀÌ ¿ä±¸µÇ°í ÀÖ½À´Ï´Ù. ¸ð¹ÙÀÏ À§Çù °ü¸®ÀÇ ¼öÀÍÀÌ Áõ°¡ÇÔ¿¡ µû¶ó ±â¾÷Àº ¾Ç¼ºÄÚµå, µ¥ÀÌÅÍ À¯Ãâ, ³×Æ®¿öÅ© Ãë¾àÁ¡ µîÀÇ Ãë¾àÁ¡À» ÇØ°áÇØ¾ß ÇÕ´Ï´Ù. ÁÖ¿ä »çÀ̹ö º¸¾È ¾÷üµéÀº ¸ð¹ÙÀÏ ±â±â¸¦ À§ÇÑ Á¾ÇÕÀûÀÎ ¿£µåÆ÷ÀÎÆ® º¸È£ ±â´ÉÀ» Á¦°øÇÏ´Â ¹æÇâÀ¸·Î ³ª¾Æ°¡°í ÀÖ½À´Ï´Ù. ±â¾÷µéÀº ÀÌ·¯ÇÑ ¼Ö·ç¼ÇÀ» Æò°¡ÇÏ¿© È®ÀåµÇ´Â ¸ð¹ÙÀÏ À§ÇùÀÇ °æ°è¸¦ È¿°úÀûÀ¸·Î º¸È£ÇÒ ¼ö ÀÖµµ·Ï ÇØ¾ß ÇÕ´Ï´Ù. "À¯¿¬¼ºÀÌ Áõ°¡ÇÔ¿¡ µû¶ó »çÀ̹ö º¸¾È À§Çùµµ Áõ°¡Çϰí ÀÖ½À´Ï´Ù. ¸ð¹ÙÀÏ À§Çù ´ëÀÀÀÌ ¿£µåÆ÷ÀÎÆ® º¸È£¿Í EDRÀ» Áö¹èÇÏ°Ô µÉ ÀÌÀ¯¸¦ ¾Ë¾Æº¸½Ê½Ã¿À."¶ó°í ¸¶ÀÌÅ© ÁÖµå(Mike Jude) ¿£µåÆ÷ÀÎÆ® º¸¾È ¸®¼­Ä¡ µð·ºÅÍ´Â ¸»Çß½À´Ï´Ù.

ÁÖ¿ä ¿ä¾à

»õ·Î¿î ½ÃÀåÀÇ ¹ßÀü°ú µ¿Çâ

  • ŸÇùÀÇ ¿øÃµ
  • ¸ðºô¸®Æ¼ ¹®Á¦¸¦ ÇØ°áÇÏ´Â »ç¶÷Àº ´©±¸Àΰ¡?
  • º¸¾È Àü¹®°¡µéÀº ¹¹¶ó°í ¸»ÇÒ±î?

±â¼ú °ø±Þ¾÷ü¿¡ ´ëÇÑ Á¶¾ð

Âü°íÀÚ·á

  • °ü·Ã Á¶»ç
  • ¿ä¾à
KSM 25.02.12

This IDC Market Perspective discusses the importance of mobile security in organizations. The increasing reliance on mobile devices in business environments has heightened cybersecurity risks, necessitating robust mobile threat defense (MTD) solutions. As mobile threat management revenue grows, organizations must address vulnerabilities such as malware, data leakage, and network vulnerabilities. Leading cybersecurity vendors are moving to offer comprehensive endpoint protection for mobile devices. Companies should evaluate these solutions to secure their expanding mobile threat perimeter effectively."Mobility's dark side: As flexibility rises, so do cybersecurity threats. Discover why mobile threat defense is set to dominate endpoint protection and EDR." - Mike Jude, research director, Endpoint Security

Executive Snapshot

New Market Developments and Dynamics

  • Sources of Compromise
  • Who Is Addressing the Problem of Mobility
  • What Do Security Professionals Say?

Advice for the Technology Supplier

Learn More

  • Related Research
  • Synopsis
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦