½ÃÀ庸°í¼­
»óǰÄÚµå
1684180

Çö´ëÀÇ ÀνôøÆ®¿¡´Â Ãֽе¥ÀÌÅÍ ¸¶ÀÌ´×ÀÌ ÇÊ¿ä

Modern Incidents Require Modern Data Mining

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IDC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 8 Pages | ¹è¼Û¾È³» : Áï½Ã¹è¼Û

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

ÀÌ IDC Perspective¿¡¼­´Â µ¥ÀÌÅÍ ¸¶ÀÌ´×ÀÌ »ç°í ´ëÀÀ ÇÁ·Î¼¼½º¸¦ ÃÖÀûÈ­ÇÏ´Â µ¥ ¾î¶»°Ô ÇʼöÀûÀÎ ¿ªÇÒÀ» ÇÏ´ÂÁö ¼³¸íÇÕ´Ï´Ù. »çÀ̹ö À§ÇùÀÌ Á¡Á¡ ´õ Á¤±³ÇØÁö¸é¼­ È¿°úÀûÀÎ »ç°í ´ëÀÀÀ» À§ÇÑ Ãֽе¥ÀÌÅÍ ¸¶ÀÌ´× µµ±¸°¡ ÇÊ¿äÇØÁ³½À´Ï´Ù. ±âÁ¸ÀÇ ¼öµ¿ ÇÁ·Î¼¼½º´Â ºÎÀûÀýÇϱ⠶§¹®¿¡ Áö¿¬°ú À§Çè Áõ°¡·Î À̾îÁý´Ï´Ù. µ¥ÀÌÅÍ ¸¶ÀÌ´× ±â¼úÀº Ä§ÇØ ´ëÀÀÀÇ ¼Óµµ¿Í Á¤È®¼ºÀ» Çâ»ó½ÃÄÑ °³ÀÎÁ¤º¸ º¸È£ ±ÔÁ¤À» ÁؼöÇÏ°í ºñ¿ëÀ» Àý°¨ÇÕ´Ï´Ù. Á¶Á÷Àº ¼Õ»óµÈ µ¥ÀÌÅ͸¦ ½Å¼ÓÇÏ°Ô ½Äº°Çϰí À§ÇùÀ» ¿ÏÈ­ÇÏ¸ç ºÒÇÊ¿äÇÑ ¸ö°ª ÁöºÒÀ» ÇÇÇϱâ À§ÇØ ¸ñÀû¿¡ ¸Â°Ô ±¸ÃàµÈ µ¥ÀÌÅÍ ¸¶ÀÌ´× ¼Ö·ç¼ÇÀ» µµÀÔÇØ¾ß ÇÕ´Ï´Ù. È¿À²ÀûÀÌ°í ¾ÈÀüÇÑ »ç°í °ü¸®¸¦ À§Çؼ­´Â ÷´Ü µ¥ÀÌÅÍ ¸¶ÀÌ´× ±â´ÉÀ» °®Ãá ±â¼ú ¼±µµÀûÀÎ ¼­ºñ½º Á¦°ø¾÷ü¿Í Çù·ÂÇÏ´Â °ÍÀÌ Áß¿äÇÕ´Ï´Ù. "µ¥ÀÌÅÍ´Â ¹®Á¦ÀÇ ÇÙ½ÉÀÔ´Ï´Ù. Á¶Á÷Àº ¹æ´ëÇÑ ¾çÀÇ µ¥ÀÌÅ͸¦ »ý¼ºÇÏÁö¸¸ µ¥ÀÌÅͰ¡ ¾îµð¿¡ ÀÖ´ÂÁö, ¾î¶² ³»¿ëÀÌ Æ÷ÇԵǾî ÀÖ´ÂÁö ¸ð¸£´Â °æ¿ì°¡ ¸¹½À´Ï´Ù."¶ó°í IDCÀÇ °³ÀÎÁ¤º¸ º¸È£ ¹× ¹ý·ü ±â¼ú ¿¬±¸ Ã¥ÀÓÀÚÀÎ ¶óÀ̾ð ¿À¸®¾î¸®(Ryan O'Leary, Esq.)´Â ¸»ÇÕ´Ï´Ù.

ÁÖ¿ä ¿ä¾à

»óȲ °³¿ä

  • µ¥ÀÌÅÍ ¸¶ÀÌ´×À» ÅëÇÑ ÀνôøÆ® ´ëÀÀ ÃÖÀûÈ­
    • ¸ñÀû¿¡ ¸Â´Â µ¥ÀÌÅÍ ¸¶ÀÌ´× ±â¼úÀÇ Çʿ伺
      • ÀνôøÆ® ´ëÀÀÀ» À§ÇÑ Àü¿ë µ¥ÀÌÅÍ ¸¶ÀÌ´×ÀÇ ÀÌÁ¡

±â¼ú ±¸¸ÅÀÚ¸¦ À§ÇÑ Á¶¾ð

Âü°í ÀÚ·á

  • °ü·Ã Á¶»ç
  • ¿ä¾à
ksm 25.03.28

This IDC Perspective explains how data mining plays an essential role in optimizing the incident response process. The increasing sophistication of cyberthreats necessitates modern data mining tools for effective incident response. Traditional manual processes are inadequate, leading to delays and higher risks. Data mining technology enhances the speed and accuracy of breach responses, ensuring compliance with privacy regulations and reducing costs. Organizations must adopt purpose-built data mining solutions to quickly identify compromised data, mitigate threats, and avoid unnecessary ransom payments. Engaging tech-forward service providers with advanced data mining capabilities is crucial for efficient and secure incident management."Data is at the core of the issue. Organizations create massive volumes of data, and they often don't know where their data is or what it contains," says Ryan O'Leary, Esq., research director for Privacy and Legal Technology at IDC.

Executive Snapshot

Situation Overview

  • Optimize Incident Response with Data Mining
    • The Need for Purpose-Built Data Mining Technology
      • Benefits of Purpose-Built Data Mining for Incident Response

Advice for the Technology Buyer

Learn More

  • Related Research
  • Synopsis
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦