¿£ÅÍÇÁ¶óÀÌÁî »çÀ̹ö º¸¾ÈÀÇ ÁÖ¿ä ´ÜÁ¡(2023³â)
Top Enterprise Cybersecurity Shortcomings, 2023
»óǰÄÚµå : 1367802
¸®¼­Ä¡»ç : IDC
¹ßÇàÀÏ : 2023³â 10¿ù
ÆäÀÌÁö Á¤º¸ : ¿µ¹® 15 Pages
 ¶óÀ̼±½º & °¡°Ý (ºÎ°¡¼¼ º°µµ)
US $ 7,500 £Ü 10,325,000
PDF (Single User License) help
PDF º¸°í¼­¸¦ 1¸í¸¸ ÀÌ¿ëÇÒ ¼ö ÀÖ´Â ¶óÀ̼±½ºÀÔ´Ï´Ù. Àμâ´Â °¡´ÉÇϸç Àμ⹰ÀÇ ÀÌ¿ë ¹üÀ§´Â PDF ÀÌ¿ë ¹üÀ§¿Í µ¿ÀÏÇÕ´Ï´Ù.


Çѱ۸ñÂ÷

ÀÌ IDC °üÁ¡¿¡¼­´Â ¿À´Ã³¯ ºÏ¹Ì ±â¾÷ÀÇ »çÀ̹ö º¸¾È °üÇàÀ» Á¤ÀÇÇÏ´Â ÁÖ¿ä Æ®·»µå¿¡ ÃÊÁ¡À» ¸ÂÃß°í ÀÖ½À´Ï´Ù. ¸¹Àº ±â¾÷µéÀÌ »çÀ̹ö º¸¾È Àü·«¿¡¼­ Å« °ÝÂ÷¿¡ °è¼Ó Á÷¸éÇϰí ÀÖ½À´Ï´Ù. ÀÏ¹Ý ±â¾÷µéÀº ±¤¹üÀ§ÇÑ »çÀ̹ö º¸¾È µµ±¸¿Í Àü·«¿¡ ÅõÀÚÇϰí ÀÖÁö¸¸, ¿ø°Ý ¿£µåÆ÷ÀÎÆ® º¸¾È, ID ¹× ¾×¼¼½º °ü¸® Á¦¾î, ¿ëµµ ¹× ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á º¸¾È, º¹±¸ ¹× ´ëÀÀ, GRC µîÀÇ ºÐ¾ß¿¡¼­´Â ¿©ÀüÈ÷ ¸¹Àº ±â¾÷µéÀÌ ºÎÁ·ÇÕ´Ï´Ù. ÁÁÀº ¼Ò½ÄÀº ÀÌ·¯ÇÑ °ÝÂ÷¸¦ ÇØ¼ÒÇÒ ¼ö ÀÖ´Â ¼Ö·ç¼ÇÀÌ Á¸ÀçÇϸç, ´ëºÎºÐÀÇ Á¶Á÷ÀÌ ½±°Ô Á¢±ÙÇÒ ¼ö ÀÖ´Ù´Â °ÍÀÔ´Ï´Ù. IDCÀÇ IT ÀÓ¿ø ÇÁ·Î±×·¥(IEP) ºñ»ó±Ù ¿¬±¸ °í¹®ÀÎ Å©¸®½º ÅäÄ¡(Chris Tozzi)´Â "»çÀ̹ö º¸¾ÈÀ» °­È­Çϱâ À§Çؼ­´Â Á¶Á÷¿¡ ÇÊ¿äÇÑ Ãß°¡ µµ±¸¿Í °üÇàÀ» ½Äº°Çϰí À̸¦ µµÀÔÇÏ´Â °ÍÀÌ Áß¿äÇÏ´Ù"°í ¸»Çß½À´Ï´Ù. "±â¾÷ÀÌ »çÀ̹ö º¸¾ÈÀ» ½É°¢ÇÏ°Ô ¹Þ¾ÆµéÀ̰í ÀÖ´Â °ÍÀº ºÐ¸íÇÏÁö¸¸, Á÷¸éÇÑ À§ÇùÀÌ ´Ù¾çÇϱ⠶§¹®¿¡ ¸ðµç À¯ÇüÀÇ À§Çù°ú À§Çè °ü¸®¿¡ ¹Ýµå½Ã ¼º°øÇÏ´Â °ÍÀº ¾Æ´Ï´Ù"¶ó¸ç, "CISO¿Í CIO´Â »çÀ̹ö º¸¾È Àü·«ÀÇ °ÝÂ÷¸¦ Æò°¡Çϰí À§Çù ÇàÀ§ÀÚ°¡ ħÀÔÇϱâ Àü¿¡ °ÝÂ÷¸¦ ÇØ¼ÒÇØ¾ß ÇÑ´Ù"°í ¸»Çß½À´Ï´Ù. ÇàÀ§ÀÚ°¡ ħÀÔÇϱâ Àü¿¡ ±× °ÝÂ÷¸¦ ¸Þ¿ö¾ß ÇÑ´Ù"°í °­Á¶Çß½À´Ï´Ù.

ÁÖ¿ä ¿ä¾à

»óȲ °³¿ä

°¡¼ú ¹ÙÀ̾ ´ëÇÑ ¾îµå¹ÙÀ̽º

Âü°í ÀÚ·á

LSH
¿µ¹® ¸ñÂ÷

¿µ¹®¸ñÂ÷

This IDC Perspective highlights key trends that define cybersecurity practices at North American enterprises today. Many enterprises continue to face major gaps within their cybersecurity strategies. Although the typical organization has invested in a broad range of cybersecurity tools and strategies, a significant number of enterprises continue to fall short in areas such as remote endpoint security, identity and access management controls, application and software supply chain security, remediation and response, and GRC. The good news is that solutions to close these gaps are available and, in many cases, within easy reach for most organizations. Therefore, enhancing cybersecurity is a matter of identifying which additional tools and practices your organization needs and then adopting them."Enterprises clearly take cybersecurity seriously, but given the wide array of threats they face, they are not always successful in managing all types of threats and risks," says Chris Tozzi, adjunct research advisor for IDC's IT Executive Programs (IEP). "CISOs and CIOs must take stock of the gaps within their cybersecurity strategies, then close them before threat actors break through."

Executive Snapshot

Situation Overview

Advice for the Technology Buyer

Learn More

(ÁÖ)±Û·Î¹úÀÎÆ÷¸ÞÀÌ¼Ç 02-2025-2992 kr-info@giikorea.co.kr
¨Ï Copyright Global Information, Inc. All rights reserved.
PC¹öÀü º¸±â