




版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
Gartner
Webinars
Gartnerdeliversactionable,objective
insight,guidanceandtoolstoenable
strongerperformanceonyour
organization'smissioncriticalpriorities
Gartner
Enhanceyourwebinarexperience
E]
AskaDownloadWatch
QuestionAttachmentsAgain
RESTRICTEDDISTRIBUTION
2?2023Gartner,Inc.and/oritsaffiliates.Allrightsreserved.Gartner
筋GConnectwithGartner
TheGartnerEmerging
TechnologiesandTrends
Security&Riskfor2023
LawrencePingree
ManagingVicePresident
RESTRICTEDDISTRIBUTION
3?2023Gartner,Inc.and/oritsaffiliates.Allrightsreserved.Gartner
SecurityMegatrendsfor2023
ShiftUp
DynamicMeshedExternalizedControl
ShiftLeftShiftIn
DynamicEnvironmentswithEmbeddedandComposableSecurity
DevOps-LeadDefenseControls
GoDeep
BigData,MLEnabledCross-ControlAnalysis
andDetection
PUBLIC
4?2022Gartner,Inc.and/oritsaffiliates.Allrightsreserved.Gartner
KeyIssues
1.WhataretheKeyTrendsDrivingInnovationinSecurity?
2.WhataretheKeyEmergingTechnologiesinSecurity?
5?2021Gartner,Inc.and/oritsaffiliates.Allrightsreserved.GartnerisaregisteredtrademarkofGartner,Inc.anditsaffiliates.Gartner
Whatarethekeytrendsdriving
InnovationinSecurity?
6?2021Gartner,Inc.and/oritsaffiliates.Allrightsreserved.GartnerisaregisteredtrademarkofGartner,Inc.anditsaffiliates.Gartner
2023KeyTrendsinSecurity
SupplyChainandGeopoliticalRiskWillEmergingArchitecturalPatterns
DominMaSecurityWilStrMmfirwSecurity
?Activelymitigatehardwareandsoftware?RantoimplementsecurityproductsfocusingZeroTrust&
SupplyChainsupplychainsecuritychallengesonCSMApcmc^les
?Rearchitectyoursecuritytoberesponsive?UsezerotrustarchitecturetoenhanceCybersecurityMesh
togeopoliticairisksoverallsecurityposture
?Simplffythroughconsolidationandconvergence
DevSecOpsWillBecomeBusiness-CriticalSecOpsWVthAutomationWillEnhance
Caf?blHtles
?DevdopaDevSocOpsmindsetto
?Usevendorvalidateddetectionstacks
improveAPIandapplicationsecurity11?Treatmobilesecurityasacriticdelementofyour
fberseourltyrrmharctitlectfuorre:cOoLsPt-?edffaertcatkravsepdrewteencltloionn;ofthreats
?Enforcesecurityandtransparencyenterpriseattacksurface
DevOps?EvaluateyourautomationstrategyforSecOps
acfOBssoftwaredeliveryinfrastruclute11
increasingsecurityoperationsefhciericy
?Continuouslymonitotarxienfofcesecurity
?Enrichassetriskdata,andweaponize
onappl?cdi?onworkloads?Addressworkloadandcontrolplanesecurity
metricstooptimize?xpotur^management
inthedoudwithCNAPP
EndpointsWINNeedAdaptableProtection
DaU-CwrtricSecimtyWillBeKayto,
MDataEverywhere*'WorldAgainttThreats
?Usediscovery,classificationandDLPforvisibility?Implementpreventiveanddetectivecontrols,
intodarkdataandprotectionfrombreach/misuseimludmgransomwareprotection,onallhostsEndpoint
DataSecurity?UseEDRMtoprotectdatabeyondthe
corporateboundary
?Protectyourdistributedanalyticspipelines
CNAFP?cloud2SappliesDohprotectionpiatfornx,-CSMA-p
CDRM?<intarprlMdigkUrirightimanagemant
SouterGartrw
775183CH
INTERNALorRESTRICTED
7?2022Gartner,Inc.and/oritsaffiliates.Allrightsreserved.GartnerGartner
CybersecurityMeshDrivesContinuedFederation
CybersecurityMeshArchitecture
ShiftingLeft(DynamicEnvironments)
DashboardsProtectionIdentityFabric
DyvwniicCootra
zWAf
Centralized
ThreatIntellkgence口④字Withtheincreaseinremoteworkingand
至PolicyAppbcatkxw
ManagementRthemigrationofapplicationsanddatato
CentralizedUim
Dashboardcloudservices,theperimeterisgone.
緲代6
直昌亡IBiometrics
Cervtr?hz?dData
AlectingDigitalassets,andindividuals,are
Q小
Roiicy臼
Emailincreasinglylocatedoutsideenterprises,
OrchMtration□a
Q
Eowhichisforcingorganizationstorethink
Centralized
InvestigationSmver/VM/theirapproachtosecuritycontrols.
CoAlatnet?令畬
Location
Traditionalsecuritycontrolsarehardto
.B?
Playbooi口
Men?ge?nenladapttothisnewreality,soanew
京網■''"
Posture
Managevneotarchitecturalmodelforsecurityis
DirsclorySOTVICM
nflnneeded.
Adaplrv*Acc^M
Centralized
RopoftmgStrategyofintegratingcomposable,
Entitionwnt*
MonaoenwNMdistributedsecuritytoolsbycentralizing
thedataandcontrolplanetoachieve
moreeffectivecollaborationbetween
Gartner
PUBLICt00ls
8?2022Gartner,Inc.and/oritsaffiliates.Allrightsreserved.Gartner
NetworkDefenseArchitecture-SASE
ShiftingUp(DynamicConnectivity)SASEArchitectureComponents
?SASEcorecapabilitiesdistributed
acrossconventionalareassuchas
network,applicationanddatasecurity.
ThekeyarchitecturalprinciplesSASE:
?Unifynetworkandsecurity
orchestration.
?Minimizethenumberoforchestration
points.
IlBmoteUMTXX
?Focusonusingcloud-basedsecurityBranchSecurity
mechanisms.
Gartner
PUBLIC
9?2022Gartner,Inc.and/oritsaffiliates.Allrightsreserved.Gartner
EmbeddedDefense-SaaSSecurityPosture
ShiftingIn(EmbeddedSecurity)
Microsoft365SecurityOptions
.
Manegemarw
AcKanced
**SPMToolsEmergetoAssessSaaSCom,,
EOF
Security(schange
SecurityPostureDMARC/DiOMrSPFCUttOOMf
ThroatProtMXioo(TTvMtExpiorarTracfcAr.locttoiSiryveforSuWWM
SharePoint
AdvMcsedOXBCkiwfi}locppAuditL09
tmrKv
MkcnwoftMenderfor(Xhc*3419SwchOmOHw
?MostEarlyEmergingToolsfocuson(3.UnU.SflfeAfUclwrtwit.Anit-PZ3Ad.MF)Yammer
Flow
MICTOMWI
largecollaborationSuitesandDataSecurMyft
MK?8訪mk?E?tionAotpionJMRce(ndpotnt
CompAanc*
A|?-AqiomMH0M>M?UQW
Sharingtools(MS365,GoogleXaLOM*wn<G)正notJg<rOneDnw.(tntio*?AAireAD
.Team,Endpo4a.MPFlkiSCMKMMMCAglSyitamintun?
Workspace,Salesforce)tnfonnMiorGcMimano*(ArchivmoThirdParty.AutomsucC4ntar>
<(rt?e?fiocandLMwImo.8M*tinecltwMsit>9?
?ManyextendingShadowITvisibilityOomp*?fic?Oo?npiianc4Man*o?r(Compmnc*Sccro)
Comnu*4HtMtCompBancw(SupmvttfankWHMMRbtMgmt
usingintegrationwithOkta/Ping,etcMBnaoeme**1
?「)】,<1.耐
?SaaSSecurityPostureNeedsAPI
Standardization
^
—i
3mOmN*l□[jEndporu
-M1c
tu0
?CISA-SecureCloudBusinessan8!£d
Applications(SCuBA)TechnicalAIK*Informattom
□Prot?ct?on-hl.0306Otont
ReferenceArchitecture(TRA)
-Gartner
PUBLIC
10?2022Gartner,Inc.and/oritsaffiliates.Allrightsreserved.Gartner
PostureManagementExpandingScopeandVisibility
ShiftingIn(*SPM+CloudSecurity)IllustrationofPotentialDeploymentPatternsforCASB,CSPM.CWPP.
SSPMandSMP
儆后
CnterpriM
CloudSecurityPostureCategories(Current)ComplUrM:,Ai-inwit|
QMTS
alk)f14lMortitorhCompluincAaaessment
DgvSccOp*Infgratlon
Cloud/OnProxyAcUptiwAccess
?ASPM-AppSecurityPostureManagementAPI
RHfcIdfHlTtcMIonOContrci
lnt?grat>on
PolicyEorctnyatoCloud
DataLotsPrevention
?CSPM-CloudSecurityPostureManagementTtweetProtection
?CASB-CloudAccessSecurityBroker
CIPSWorkloi
?CWPP-CloudWorkloadProtectionPlatforms
?KSPM-KubernetesSecurityPostureManagement
A-Gc
eaUUyo?ou
>rUVuCw
?SMP-SaaSManagementPlatformo5UIOdGqo
x2o-ZOM?lmW=sSds
wNCpACsAKy
5UAe-e-SEo
iss5dsuOuOS
eoOhoM2?UJf
mSMsoM
?SSPM-SaaSSecurityPostureManagementsP
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
- 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 揚州卷-2025年中考第一次模擬考試數學試卷(含答案解析)
- 消防設施考試總結及試題答案
- 高職單招職業(yè)技能測試模擬試題及答案(二)
- 了解生態(tài)投資與可持續(xù)發(fā)展:2024年證券試題及答案
- 拓展視野:2024年CPMM試題及答案討論
- 見義勇為表揚信范文2篇
- 班主任工作實習計劃02
- 開立擔保函協(xié)議(2025年版)
- 語文學習中常見問題分析試題及答案
- 2025年度自動駕駛技術研發(fā)終止合作協(xié)議通知函范文
- GB/T 23144-2023紙和紙板彎曲挺度的測定兩點法、三點法和四點法的通用原理
- 人教版三年級數學下冊單元復習講義 第八單元 數學廣角-搭配(二)(學生版)
- 《法蘭克福學派》課件
- Chapter6WhenIwaslittle(課件)朗文英語世界三年級下冊
- 蘭州大學學生駕駛摩托車及其他機動車輛家長知情同意書
- 產后恢復操指導的操作流程及考核評分標準
- 2023年CSCO免疫檢查點抑制劑臨床應用指南解讀
- 山東義能煤礦有限公司礦山地質環(huán)境保護與土地復墾方案
- 裝修合同清單與裝修合同示本
- 綜合布線系統(tǒng)方案設計
- 防止架橋機傾覆措施
評論
0/150
提交評論