½ÃÀ庸°í¼­
»óǰÄÚµå
1737591

DevSecOps ¹× ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á º¸¾ÈÀ» À§ÇÑ RSAC 2025ÀÇ ÁÖ¿ä ¹ßÇ¥ »çÇ×

Key Announcements from RSAC 2025 for DevSecOps and Software Supply Chain Security

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IDC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 11 Pages | ¹è¼Û¾È³» : Áï½Ã¹è¼Û

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

À̹ø IDC Perspective¿¡¼­´Â ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È¿¡ ÃÊÁ¡À» ¸ÂÃá RSA ÄÁÆÛ·±½º 2025ÀÇ ÁÖ¿ä Á¦Ç° ¹ßÇ¥¿Í ½ÃÀå µ¿ÇâÀ» ¿ä¾àÇÕ´Ï´Ù. ÀÌ Çà»ç¿¡¼­´Â AI ¿¡ÀÌÀüÆ® ¹× ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È, ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È Å×½ºÆ® Çö´ëÈ­, ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á Á¦¾î °­È­, ´ë±Ô¸ð ºñÀΰ£ ID °ü¸® µî ¿©·¯ ºÐ¾ß¿¡¼­ Çõ½ÅÀÌ ±ÞÁõÇß½À´Ï´Ù. °ø±Þ¾÷üµéÀº ÅëÇÕ, ÀÚµ¿È­, AI ±â¹Ý ±â´ÉÀ» °­Á¶ÇÏ¸ç ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È¿¡ ´ëÇÑ º¸´Ù ÅëÇյǰí È®Àå °¡´ÉÇÑ Á¢±Ù ¹æ½ÄÀ¸·ÎÀÇ ÀüȯÀ» ¹Ý¿µÇß½À´Ï´Ù. IDCÀÇ DevSecOps ¹× ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á º¸¾È ¿¬±¸ ¸Å´ÏÀúÀÎ Katie NortonÀº "RSAC 2025¿¡¼­ ¹ßÇ¥µÈ ¹ßÇ¥ÀÇ ¾ç°ú ´Ù¾ç¼ºÀº ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾ÈÀÌ ¾ó¸¶³ª ºü¸£°Ô ÁøÈ­Çϰí ÀÖ´ÂÁö º¸¿©ÁÝ´Ï´Ù. °ø±Þ¾÷ü°¡ ÀÎÁ¢ ¿µ¿ªÀ¸·Î È®ÀåÇϰí Ç÷§Æû ±â´ëÄ¡¸¦ ÀçÁ¤ÀÇÇÔ¿¡ µû¶ó º¸¾È ¸®´õ´Â µµ±¸, ÆÀ, ¿ì¼±¼øÀ§°¡ ÀÌ ½ÃÀåÀÇ ¹Ì·¡ ¹æÇâ¿¡ ¾î¶»°Ô ºÎÇÕÇÏ´ÂÁö ÀçÆò°¡ÇØ¾ß ÇÒ °ÍÀÔ´Ï´Ù."

ÁÖ¿ä ¿ä¾à

»óȲ °³¿ä

  • »çÀ̹ö º¸¾ÈÀÇ ¹Ì·¡¸¦ °­È­ÇÏ°í º¸È£ÇÏ´Â AI
    • AI ½Ã´ëÀÇ ÁøÈ­ÇÏ´Â ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
    • ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸ÁÀÇ Áö¼ÓÀûÀÎ ¼º¼÷
    • ¸Ó½Å ID Æø¹ß¿¡ ´ëÀÀ
    • ÀÚ±Ý Á¶´Þ ¹× Àμö

±â¼ú ±¸¸ÅÀÚ¸¦ À§ÇÑ ¾îµå¹ÙÀ̽º

Âü°í ÀÚ·á

  • °ü·Ã Á¶»ç
  • ¿ä¾à
LSH 25.06.12

This IDC Perspective summarizes key product announcements and market developments from RSA Conference 2025, with a focus on application security. The event featured a surge of innovation across areas including securing AI agents and applications, modernizing application security testing, strengthening software supply chain controls, and managing nonhuman identities at scale. Vendors emphasized integration, automation, and AI-powered capabilities, reflecting a shift toward more unified and scalable approaches to application security."The volume and variety of announcements at RSAC 2025 highlight how rapidly application security is evolving," said Katie Norton, research manager, DevSecOps and Software Supply Chain Security at IDC. "As vendors expand into adjacent areas and redefine platform expectations, security leaders will need to reassess how their tools, teams, and priorities align with the future direction of this market."

Executive Snapshot

Situation Overview

  • AI Powers and Secures the Future of Cybersecurity
    • Evolving Application Security in the Age of AI
    • Software Supply Chain Continues to Mature
    • Reining in the Machine Identity Explosion
    • Funding and Acquisition

Advice for the Technology Buyer

Learn More

  • Related Research
  • Synopsis
»ùÇà ¿äû ¸ñ·Ï
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
¸ñ·Ï º¸±â
Àüü»èÁ¦