»çÀ̹ö º¸¾ÈÀÇ ¿¡ÀÌÀüÆ® AI : »çÀ̹ö º¸¾È ¼³°èÀÚ¸¦ À§ÇÑ ÀÔ¹® °¡À̵å
Agentic AI in Cybersecurity: A Primer Guide for Cybersecurity Architects
»óǰÄÚµå : 1748021
¸®¼­Ä¡»ç : IDC
¹ßÇàÀÏ : 2025³â 06¿ù
ÆäÀÌÁö Á¤º¸ : ¿µ¹® 17 Pages
 ¶óÀ̼±½º & °¡°Ý (ºÎ°¡¼¼ º°µµ)
US $ 7,500 £Ü 10,393,000
PDF (Single User License) help
PDF º¸°í¼­¸¦ 1¸í¸¸ ÀÌ¿ëÇÒ ¼ö ÀÖ´Â ¶óÀ̼±½ºÀÔ´Ï´Ù. Àμâ´Â °¡´ÉÇϸç Àμ⹰ÀÇ ÀÌ¿ë ¹üÀ§´Â PDF ÀÌ¿ë ¹üÀ§¿Í µ¿ÀÏÇÕ´Ï´Ù.


Çѱ۸ñÂ÷

»çÀ̹ö º¸¾ÈÀÇ ¿¡ÀÌÀüÆ® AI¿¡ ´ëÇÑ IDC Perspective¿¡¼­´Â ½Ã½ºÅÛÀÌ ÀνÄ, Ãß·Ð, ÇൿÀ» ÅëÇØ ÀÚÀ²¼ºÀ» ¹ßÈÖÇÒ ¼ö ÀÖµµ·Ï ÇÏ´Â ¿¡ÀÌÀüÆ® AIÀÇ ¿ªÇÒÀ» °­Á¶Çϸ鼭 »çÀ̹ö º¸¾È¿¡¼­ AIÀÇ ÁøÈ­¿¡ ´ëÇØ »ìÆìº¾´Ï´Ù. ÀÌ ¹®¼­¿¡¼­´Â ¼öµ¿ ¿î¿µ¿¡¼­ µ¿Àû ÀÚÀ²¼ºÀ¸·ÎÀÇ ¹ßÀü °úÁ¤À» ¼³¸íÇϸç ÀÚÀ²¼ºÀ» ´Þ¼ºÇÏ´Â µ¥ ÀÖ¾î ´Ü¼ø¼º, º¸¾È Ç÷§Æû, Ç¥ÁØ IT ¾ÆÅ°ÅØÃ³ÀÇ Á߿伺À» °­Á¶ÇÕ´Ï´Ù. ¶ÇÇÑ »çÀ̹ö º¸¾È¿¡¼­ ¾ÈÀüÇϰí À±¸®ÀûÀÎ AI ¹èÆ÷¸¦ º¸ÀåÇϱâ À§ÇØ ¼³¸í °¡´É¼º ¹× °øÁ¤¼º°ú °°Àº ½Å·ÚÇÒ ¼ö ÀÖ´Â AI ¿ä¼ÒÀÇ ÅëÇÕ¿¡ ´ëÇØ¼­µµ ³íÀÇÇÕ´Ï´Ù. "¿¡ÀÌÀüÆ® AI Ç÷§ÆûÀº Ãß·Ð ¿£ÁøÀÌ Á¡Á¡ ´õ Á¤±³ÇØÁö°í È®·üÀû ÀÇ»ç °áÁ¤À» À§ÇÑ º¸»ó ¼ö´ÜÀÌ °³¼±µÊ¿¡ µû¶ó º¸¾È ȯ°æÀÇ º¯È­¿¡ µû¶ó ¹Ýº¹Çϰí Á¶Á¤Çϱ⠽ÃÀÛÇÕ´Ï´Ù. AI ¿¡ÀÌÀüÆ®´Â ŽÁö ¹× Á¶»çºÎÅÍ ´ëÀÀ ¹× ¼öÁ¤¿¡ À̸£±â±îÁö ´ëºÎºÐÀÇ ´Ü¼øÇÏ°í ¹Ýº¹ÀûÀÎ SOC ÇÁ·Î¼¼½º¸¦ »ç¶÷ÀÇ °³ÀÔÀ» ÃÖ¼ÒÈ­Çϸ鼭 ó¸®ÇϹǷΠMTTI¿Í MTTRÀÌ ´õ¿í ´ÜÃàµË´Ï´Ù. Çǵå¹é ·çÇÁ¸¦ ÅëÇØ AI ¿¡ÀÌÀüÆ®´Â ÀÌÀü¿¡ ¹ß°ßµÈ À§ÇùÀ» ±â¹ÝÀ¸·Î »õ·Î¿î ŽÁö ¹× ´ëÀÀÀ» »ý¼ºÇÒ ¼ö ÀÖ½À´Ï´Ù. Àΰ£Àº »õ·Î¿î À§Çù¿¡ ´ëÇÑ Ç÷§ÆûÀÇ ÀûÀÀÀ» °¨µ¶Çϰí IT ¾ÆÅ°ÅØÃ³ÀÇ º¯È­¿¡ ÀûÀÀÇϸ鼭 º¹¿ø·ÂÀ» À¯ÁöÇÏ´Â Àü·«Àû ¿ªÇÒÀ» ¼öÇàÇÕ´Ï´Ù. À̸¦ Çö¸íÇÏ°Ô »ý°¢ÇÏ´Â ¹æ¹ýÀº "½Ã½ºÅÛ¿¡ Àΰ£ÀÇ ÆÇ´Ü°ú °³ÀÔÀ» ³Ö´Â °Í"ÀÌ ¾Æ´Ï¶ó "»ç¶÷ÀÌ ½Ã½ºÅÛÀ» ¸ð´ÏÅ͸µÇÏ´Â °Í"ÀÔ´Ï´Ù." - Frank Dickson, IDC º¸¾È ¹× ½Å·Ú ºÎ¹® ±×·ì ºÎ»çÀå

ÁÖ¿ä ¿ä¾à

»óȲ °³¿ä

±â¼ú ±¸¸ÅÀÚ¸¦ À§ÇÑ Á¶¾ð

Âü°íÀÚ·á

ksm
¿µ¹® ¸ñÂ÷

¿µ¹®¸ñÂ÷

This IDC Perspective on agentic AI in cybersecurity explores the evolution of AI in cybersecurity, emphasizing the role of agentic AI, which enables systems to exhibit agency through perception, reasoning, and action. The document outlines the progression from manual operations to dynamic autonomy, highlighting the importance of simplicity, security platforms, and standard IT architecture in achieving autonomy. It also discusses the integration of trustworthy AI elements, such as explainability and fairness, to ensure safe and ethical AI deployment in cybersecurity."Agentic AI platforms begin to iterate and adjust to changes in the security environment as reasoning engines become increasingly sophisticated and the compensating measures for probabilistic decision-making improve. AI agents handle most menial and repetitive SOC processes, from detection and investigation to response and remediation, with minimal human intervention, further reducing MTTI and MTTR. A feedback loop enables AI agents to create new detections and responses based on previously seen threats. Humans play a strategic role, overseeing the platform's adaptation to emerging threats and adjusting to changes in the IT architecture while maintaining resilience. A smart way to think of this is putting the 'human on the loop' as opposed to putting the 'human in the loop'." - Frank Dickson, group vice president, Security and Trust, IDC

Executive Snapshot

Situation Overview

Advice for the Technology Buyer

Learn More

(ÁÖ)±Û·Î¹úÀÎÆ÷¸ÞÀÌ¼Ç 02-2025-2992 kr-info@giikorea.co.kr
¨Ï Copyright Global Information, Inc. All rights reserved.
PC¹öÀü º¸±â