¼¼°èÀÇ CTI(Cyber Threat Intelligence) ¹× TIP( Threat Intelligence Platform) ¼ºÀå ±âȸ
Global Cyber Threat Intelligence and Threat Intelligence Platform Growth Opportunities
»óǰÄÚµå : 1490863
¸®¼­Ä¡»ç : Frost & Sullivan
¹ßÇàÀÏ : 2024³â 04¿ù
ÆäÀÌÁö Á¤º¸ : ¿µ¹® 83 Pages
 ¶óÀ̼±½º & °¡°Ý (ºÎ°¡¼¼ º°µµ)
US $ 4,950 £Ü 7,024,000
Web Access (Regional License) help
Frost & SullivanÀÇ À¥»çÀÌÆ® ·Î±×ÀÎ ÆÐ½º¿öµå°¡ ¹ßÇàµÇ¸ç, PDF¸¦ ´Ù¿î·Îµå ¹Þ´Â ÇüÅ·ΠÁ¦°øµÉ ¿¹Á¤ÀÔ´Ï´Ù. PDF º¸°í¼­¸¦ µ¿ÀÏ »ç¾÷Àå¿¡¼­ ¸ðµç ºÐµéÀÌ ÀÌ¿ëÇÒ ¼ö ÀÖ´Â ¶óÀ̼±½ºÀÔ´Ï´Ù. Àμ⠰¡´ÉÇϸç Àμ⹰ÀÇ ÀÌ¿ë ¹üÀ§´Â PDF ÀÌ¿ë ¹üÀ§¿Í µ¿ÀÏÇÕ´Ï´Ù


Çѱ۸ñÂ÷

AIÀÇ È®»êÀ¸·Î ŽÁö, ´ëÀÀ, »ý»ê¼º ¹× °í°´ º¸°í¸¦ °­È­ÇÏ´Â TI ¼Ö·ç¼Ç¿¡ ´ëÇÑ ¼ö¿ä°¡ Áõ°¡Çϰí ÀÖ½À´Ï´Ù.

À§Çù ÀÎÅÚ¸®Àü½º(TI) µµÀÔÀÇ Çʿ伺Àº ÄÄÇöóÀ̾𽺠¿ä°ÇÀ» ³Ñ¾î¼±´Ù. Á¶Á÷Àº È¿°úÀûÀÎ ¿î¿µÀ» À§ÇØ TI¸¦ IT ÇÁ·¹ÀÓ¿öÅ©¿¡ ÅëÇÕÇØ¾ß ÇÕ´Ï´Ù. Ŭ¶ó¿ìµå ¸¶À̱׷¹À̼Ç, IoT, AI, ¿ø°Ý ±Ù¹« µî ¼¼°è µðÁöÅÐÈ­ ³ë·ÂÀ¸·Î ÀÎÇØ °ø°Ý ´ë»ó, IT º¹À⼺, Ÿ»ç¿¡ ´ëÇÑ ÀÇÁ¸µµ°¡ Áõ°¡Çϸ鼭 ´Ù¾çÇÑ °æ·ÎÀÇ Ãë¾àÁ¡ÀÌ ³ëÃâµÇ°í ÀÖ½À´Ï´Ù. °ø°ÝÀÚµéÀº ÇöÀç µµ¸ÞÀÎ, ¸ð¹ÙÀÏ ¾Û, ¼Ò¼È ¹Ìµð¾î, °ø±Þ¸ÁÀÇ ¾àÁ¡À» ³ë¸®°í ÀÖÀ¸¸ç, ÇÇ½Ì ¹× Á¦3ÀÚ Ä§ÇØÀÇ À§ÇèÀº Á¡Á¡ ´õ Ä¿Áö°í ÀÖ½À´Ï´Ù.

º¸¾È ¹®Á¦¿¡ ´ëÇÑ ¼Ò±ØÀûÀÎ Á¢±Ù ¹æ½ÄÀº Ä§ÇØ ´ç Æò±Õ ºñ¿ëÀÌ 445¸¸ ´Þ·¯(IBM, 2023³â)¿¡ ´ÞÇÑ´Ù´Â Á¡À» °¨¾ÈÇÒ ¶§ °æÁ¦ÀûÀ¸·Î Áö¼Ó °¡´ÉÇÏÁö ¾Ê½À´Ï´Ù. ÇÇ½Ì ¹× °ø±Þ¸Á À§Çè¿¡ Àû±ØÀûÀ¸·Î ´ëÀÀÇÏ´Â °ÍÀº ºê·£µå °¡Ä¡ Ç϶ô, È¥¶õ, ¼öÀÍ ¼Õ½ÇÀ» ¹æÁöÇϱâ À§ÇØ ÇʼöÀûÀÔ´Ï´Ù. µðÁöÅÐ ÀÚ»êÀ» º¸È£Çϱâ À§Çؼ­´Â °æ°è¸¦ ³Ñ³ªµå´Â Á¾ÇÕÀûÀÎ Á¢±ÙÀÌ ÇÊ¿äÇϸç, TI´Â »õ·Î¿î Æ®·»µå¸¦ ÀÌÇØÇÏ°í ¹æ¾î¸¦ °­È­ÇÏ¿© Á¶Á÷ÀÌ »çÀ̹ö À§ÇùÀ» ¹æÁöÇÒ ¼ö ÀÖµµ·Ï µ½½À´Ï´Ù.

TI »ýŰè´Â ±×µ¿¾È CTI(»çÀ̹ö À§Çù ÀÎÅÚ¸®Àü½º), TIP(À§Çù ÀÎÅÚ¸®Àü½º Ç÷§Æû), EASM(¿ÜºÎ °ø°Ý Ç¥¸é °ü¸®), DRP(µðÁöÅÐ ¸®½ºÅ© º¸È£)·Î ³ª´µ¾îÁ® ÀÖ¾úÀ¸³ª, Àüü º¸¾È Ç÷§ÆûÀ¸·Î ÅëÇյǰí ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ À¶ÇÕÀº ERMM(¿ÜºÎ À§Çè ¿ÏÈ­ ¹× °ü¸®) Ç÷§ÆûÀÇ ÃâÇöÀ» ÃËÁøÇϰí, TIP Á¦°ø¾÷ü¸¦ Á¾ÇÕÀûÀÎ º¸¾È ¿î¿µ(SecOps) Ç÷§ÆûÀ¸·Î ÀüȯÇÏ´Â °è±â°¡ µÉ °ÍÀÔ´Ï´Ù.

CTI »ê¾÷°ú TIP »ê¾÷Àº AIÀÇ ¹ßÀü°ú Ç÷§ÆûÀÇ ÅëÇÕÀ¸·Î ¹øÃ¢Çϰí ÀÖÀ¸¸ç, »çÀü ¿¹¹æÀû º¸¾È ¼ö¿ä¿¡ ´ëÀÀÇϰí ÀÖ½À´Ï´Ù. ºÏ¹Ì°¡ ¼±µÎ¸¦ ´Þ¸®°í ÀÖÀ¸¸ç, À¯·´-Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«(EMEA)°¡ CTI ºÎ¹® 2À§, TIP ºÎ¹® 3À§¸¦ Â÷ÁöÇϰí ÀÖ½À´Ï´Ù. ¹Ý¸é ¾Æ½Ã¾ÆÅÂÆò¾çÀº CTI¿¡¼­ 3À§, TIP¿¡¼­ 2À§¸¦ Â÷ÁöÇϰí ÀÖ½À´Ï´Ù. ¶óƾ¾Æ¸Þ¸®Ä«´Â »ó´çÇÑ ¼ºÀå ÀáÀç·ÂÀ» º¸¿©ÁÖ°í ÀÖ½À´Ï´Ù. ÇコÄɾî, ±â¼ú, ±ÝÀ¶ ºÎ¹®Àº À§ÇùÀÇ È®´ë¿Í ±ÔÁ¦ ÇÁ·¹ÀÓ¿öÅ©(HIPAA µî)¿¡ ÈûÀÔ¾î ¼öÀÍ ±âÁØÀ¸·Î ¼±µÎ¸¦ ´Þ¸®°í ÀÖ½À´Ï´Ù.

°á·ÐÀûÀ¸·Î, CTI¿Í TIP ºÎ¹®Àº ¼­·Î ´Ù¸¥ ¿ä±¸¿Í ¼º¼÷µµ¸¦ °¡Áø ´Ù¾çÇÑ »ê¾÷ ºÎ¹®¿¡ ´ëÀÀÇÏ¿© »ó´çÇÑ ¼ºÀåÀ» ÀÌ·ê Áغñ°¡ µÇ¾î ÀÖ½À´Ï´Ù.

¸ñÂ÷

Àü·«Àû Çʼö ¿ä°Ç

CISO¿ë ÀλçÀÌÆ®

¼ºÀå ±âȸ ºÐ¼®

¼ºÀå ±âȸ ºÐ¼® : CTI ¹× TIP

¼ºÀå ±âȸ ºÐ¼® : CTI

¼ºÀå ±âȸ ºÐ¼® : TIP

¼ºÀå ±âȸ

´ÙÀ½ ´Ü°è

LSH
¿µ¹® ¸ñÂ÷

¿µ¹®¸ñÂ÷

The Proliferation of AI Boosts Demand for TI Solutions to Enhance Detection, Response, Productivity, and Customer Reporting

The need to adopt threat intelligence (TI) has transcended compliance requirements-it is now essential due to the evolving threat landscape. Organizations must integrate TI into their IT frameworks to operate effectively. Global digitalization initiatives such as cloud migration, IoT, AI, and remote work have expanded attack surfaces, IT complexity, and reliance on third parties, which subsequently exposes vulnerabilities across multiple vectors. Traditional perimeter security is inadequate; attackers now exploit weaknesses in domains, mobile apps, social media, and supply chains, escalating risks of phishing and third-party breaches.

The reactive approach to security is economically unsustainable, given the average $4.45 million cost per breach (IBM, 2023). Proactively addressing phishing and supply chain risks is imperative to prevent brand erosion, disruptions, and revenue loss. A holistic approach is necessary to protect digital assets beyond perimeters. TI enables organizations to prevent cyber threats by understanding emerging trends and strengthening defenses.

The TI ecosystem, historically fragmented into cyber threat intelligence (CTI), threat intelligence platform (TIP), external attack surface management (EASM), and digital risk protection (DRP), is converging into holistic security platforms. This convergence drives the emergence of external risk mitigation and management (ERMM) platforms and transitions TIP providers into comprehensive security operations (SecOps) platforms.

The CTI and TIP industries thrive on AI advancements and platform consolidation, responding to proactive security demands. North America leads, with Europe, the Middle East, and Africa (EMEA) following as the second-largest in CTI and third-largest in TIP. Meanwhile, APAC ranks third in CTI and second in TIP. LATAM demonstrates considerable growth potential. The healthcare, technology, and finance sectors lead in revenue, driven by escalating threats and regulatory frameworks (e.g., HIPAA).

In conclusion, both the CTI and TIP sectors are poised for substantial growth, catering to different segments of the industry, with varying needs and maturity levels.

Table of Contents

Strategic Imperatives

Insights for CISOs

Growth Opportunity Analysis

Growth Opportunity Analysis: CTI and TIP

Growth Opportunity Analysis: CTI

Growth Opportunity Analysis: TIP

Growth Opportunity Universe

Next Steps

(ÁÖ)±Û·Î¹úÀÎÆ÷¸ÞÀÌ¼Ç 02-2025-2992 kr-info@giikorea.co.kr
¨Ï Copyright Global Information, Inc. All rights reserved.
PC¹öÀü º¸±â