½ÃÀ庸°í¼­
»óǰÄÚµå
1665835

±â¾÷ Àü¹ÝÀÇ AI »ç¿ë º¸¾È ¹× º¸È£¿¡ ´ëÇÑ ÅëÇÕÀû Á¢±Ù ¹æ½Ä

Taking an Integrated Approach in Securing and Safeguarding AI Use Across the Enterprise

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IDC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 6 Pages | ¹è¼Û¾È³» : Áï½Ã¹è¼Û

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

ÀÌ IDC Perspective´Â ±â¾÷ÀÌ ¿î¿µ Àü¹Ý¿¡¼­ AI »ç¿ëÀ» º¸È£ÇÏ°í º¸¾ÈÀ» À¯ÁöÇϱâ À§ÇØ Æ÷°ýÀûÀÎ ÇÁ·¹ÀÓ¿öÅ©¸¦ µµÀÔÇØ¾ß ÇÒ Çʿ伺À» °­Á¶ÇÕ´Ï´Ù. AI ÅëÇÕÀÌ °¡¼ÓÈ­µÊ¿¡ µû¶ó ±â¾÷Àº µ¥ÀÌÅÍ ÇÁ¶óÀ̹ö½Ã ¹®Á¦, º¸¾È Ãë¾à¼º, ±ÔÁ¤ Áؼö ¹®Á¦ µî Áß´ëÇÑ À§Çè¿¡ Á÷¸éÇϰí ÀÖ½À´Ï´Ù. ÀÌ º¸°í¼­´Â AI ÀÚ»êÀ» ½Äº°Çϰí, À§ÇèÀ» °¨ÁöÇϰí, ½Ç½Ã°£À¸·Î À§ÇùÀ» ¿ÏÈ­ÇÏ´Â °ÍÀÌ Áß¿äÇÏ´Ù´Â Á¡À» °­Á¶ÇÕ´Ï´Ù. ¶ÇÇÑ Àüü AI ¼ö¸í Áֱ⸦ Æ÷°ýÇÏ´Â °­·ÂÇÑ AI º¸¾È ¼Ö·ç¼ÇÀ» Á¦°øÇÏ¿© ¾ÈÀüÇÏ°í ½Å·ÚÇÒ ¼ö ÀÖ´Â AI µµÀÔÀ» º¸ÀåÇÏ´Â ±â¼ú °ø±Þ¾÷üÀÇ ¿ªÇÒÀ» °­Á¶ÇÕ´Ï´Ù. "AI´Â ±â¾÷ÀÌ ºñÁî´Ï½º ¼º°ú¸¦ ȹ±âÀûÀ¸·Î °³¼±Çϱâ À§ÇØ ´Ù¾çÇÑ »óȲ°ú »ç¿ë »ç·Ê¿¡ È¿°úÀûÀ¸·Î ¹èÆ÷ÇÒ ¼ö ÀÖ´Â ½ºÀ§½º ±º¿ë Ä®À̶ó´Â ¼Ó´ãó·³ ºü¸£°Ô ¹ßÀüÇØ ¿Ô½À´Ï´Ù. ±×·¯³ª ±â¾÷ Àü¹Ý¿¡¼­ AI¸¦ ´ë±Ô¸ð·Î ºü¸£°Ô µµÀÔÇÏ´Â °úÁ¤¿¡¼­ ÀûÀýÈ÷ ´ëºñÇÏÁö ¸øÇÑ »õ·Î¿î À§Çè¿¡ ³ëÃâµÇ´Â °æ¿ìµµ ¸¹½À´Ï´Ù. ÀÌÁ¦ ±â¾÷Àº ÃÖÁ¾ »ç¿ëÀÚ¿¡°Ô Åõ¸íÇÑ ¹æ½ÄÀ¸·Î Àüü AI ¼ö¸í Áֱ⠵¿¾È AI »ç¿ëÀ» º¸È£Çϱâ À§ÇØ Àü»çÀûÀ¸·Î ÅëÇÕµÈ Á¢±Ù ¹æ½ÄÀ» ÃëÇÏ¿© AI äÅðú Çõ½ÅÀ» °¡¼ÓÈ­ÇØ¾ß ÇÕ´Ï´Ù."¶ó°í IDC ¾Æ½Ã¾Æ/ÅÂÆò¾ç ÀÎÇÁ¶ó ¿¬±¸ ºÎ¿¬±¸ Ã¥ÀÓÀÚ Çª½¬Ä«¶ô½¬ ¼¢¹Ù±×(Pushkaraksh Shanbhag)´Â ¸»ÇÕ´Ï´Ù.

ÁÖ¿ä ¿ä¾à

»óȲ °³¿ä

  • Cisco AI Defense

Å×Å©³î·¯Áö ±¸¸ÅÀÚ¿¡ ´ëÇÑ ¾îµå¹ÙÀ̽º

Âü°í ÀÚ·á

  • °ü·Ã Á¶»ç
  • ¿ä¾à
ksm 25.03.13

This IDC Perspective highlights the urgent need for enterprises to adopt comprehensive frameworks to secure and safeguard AI usage across their operations. As AI integration accelerates, companies face significant risks, including data privacy issues, security vulnerabilities, and compliance challenges. This report emphasizes the importance of identifying AI assets, detecting risks, and mitigating threats in real time. It also underscores the role of technology vendors in providing robust AI security solutions that cover the entire AI life cycle, ensuring secure and trusted AI adoption."AI has rapidly evolved into the proverbial technology Swiss army knife that enterprises can effectively deploy in a wide variety of contexts and use cases in their quest to drive radically improved business outcomes. However, this rapid and large-scale adoption of AI across enterprises also exposes them to a plethora of new risks they are not adequately prepared for. The need of the hour is for enterprises to take an integrated, enterprisewide approach to securing their AI usage through the full AI life cycle, in a manner that is transparent to end users so AI adoption and innovation continues apace," says Pushkaraksh Shanbhag, associate research director for infrastructure research, IDC Asia/Pacific.

Executive Snapshot

Situation Overview

  • Cisco AI Defense

Advice for the Technology Buyer

Learn More

  • Related Research
  • Synopsis
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦