2023年安全與風險新興技術和趨勢_第1頁
2023年安全與風險新興技術和趨勢_第2頁
2023年安全與風險新興技術和趨勢_第3頁
2023年安全與風險新興技術和趨勢_第4頁
2023年安全與風險新興技術和趨勢_第5頁
已閱讀5頁,還剩25頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領

文檔簡介

Gartner

Webinars

Gartnerdeliversactionable,objective

insight,guidanceandtoolstoenable

strongerperformanceonyour

organization'smissioncriticalpriorities

Gartner

Enhanceyourwebinarexperience

E]

AskaDownloadWatch

QuestionAttachmentsAgain

RESTRICTEDDISTRIBUTION

2?2023Gartner,Inc.and/oritsaffiliates.Allrightsreserved.Gartner

筋GConnectwithGartner

TheGartnerEmerging

TechnologiesandTrends

Security&Riskfor2023

LawrencePingree

ManagingVicePresident

RESTRICTEDDISTRIBUTION

3?2023Gartner,Inc.and/oritsaffiliates.Allrightsreserved.Gartner

SecurityMegatrendsfor2023

ShiftUp

DynamicMeshedExternalizedControl

ShiftLeftShiftIn

DynamicEnvironmentswithEmbeddedandComposableSecurity

DevOps-LeadDefenseControls

GoDeep

BigData,MLEnabledCross-ControlAnalysis

andDetection

PUBLIC

4?2022Gartner,Inc.and/oritsaffiliates.Allrightsreserved.Gartner

KeyIssues

1.WhataretheKeyTrendsDrivingInnovationinSecurity?

2.WhataretheKeyEmergingTechnologiesinSecurity?

5?2021Gartner,Inc.and/oritsaffiliates.Allrightsreserved.GartnerisaregisteredtrademarkofGartner,Inc.anditsaffiliates.Gartner

Whatarethekeytrendsdriving

InnovationinSecurity?

6?2021Gartner,Inc.and/oritsaffiliates.Allrightsreserved.GartnerisaregisteredtrademarkofGartner,Inc.anditsaffiliates.Gartner

2023KeyTrendsinSecurity

SupplyChainandGeopoliticalRiskWillEmergingArchitecturalPatterns

DominMaSecurityWilStrMmfirwSecurity

?Activelymitigatehardwareandsoftware?RantoimplementsecurityproductsfocusingZeroTrust&

SupplyChainsupplychainsecuritychallengesonCSMApcmc^les

?Rearchitectyoursecuritytoberesponsive?UsezerotrustarchitecturetoenhanceCybersecurityMesh

togeopoliticairisksoverallsecurityposture

?Simplffythroughconsolidationandconvergence

DevSecOpsWillBecomeBusiness-CriticalSecOpsWVthAutomationWillEnhance

Caf?blHtles

?DevdopaDevSocOpsmindsetto

?Usevendorvalidateddetectionstacks

improveAPIandapplicationsecurity11?Treatmobilesecurityasacriticdelementofyour

fberseourltyrrmharctitlectfuorre:cOoLsPt-?edffaertcatkravsepdrewteencltloionn;ofthreats

?Enforcesecurityandtransparencyenterpriseattacksurface

DevOps?EvaluateyourautomationstrategyforSecOps

acfOBssoftwaredeliveryinfrastruclute11

increasingsecurityoperationsefhciericy

?Continuouslymonitotarxienfofcesecurity

?Enrichassetriskdata,andweaponize

onappl?cdi?onworkloads?Addressworkloadandcontrolplanesecurity

metricstooptimize?xpotur^management

inthedoudwithCNAPP

EndpointsWINNeedAdaptableProtection

DaU-CwrtricSecimtyWillBeKayto,

MDataEverywhere*'WorldAgainttThreats

?Usediscovery,classificationandDLPforvisibility?Implementpreventiveanddetectivecontrols,

intodarkdataandprotectionfrombreach/misuseimludmgransomwareprotection,onallhostsEndpoint

DataSecurity?UseEDRMtoprotectdatabeyondthe

corporateboundary

?Protectyourdistributedanalyticspipelines

CNAFP?cloud2SappliesDohprotectionpiatfornx,-CSMA-p

CDRM?<intarprlMdigkUrirightimanagemant

SouterGartrw

775183CH

INTERNALorRESTRICTED

7?2022Gartner,Inc.and/oritsaffiliates.Allrightsreserved.GartnerGartner

CybersecurityMeshDrivesContinuedFederation

CybersecurityMeshArchitecture

ShiftingLeft(DynamicEnvironments)

DashboardsProtectionIdentityFabric

DyvwniicCootra

zWAf

Centralized

ThreatIntellkgence口④字Withtheincreaseinremoteworkingand

至PolicyAppbcatkxw

ManagementRthemigrationofapplicationsanddatato

CentralizedUim

Dashboardcloudservices,theperimeterisgone.

緲代6

直昌亡IBiometrics

Cervtr?hz?dData

AlectingDigitalassets,andindividuals,are

Q小

Roiicy臼

Emailincreasinglylocatedoutsideenterprises,

OrchMtration□a

Q

Eowhichisforcingorganizationstorethink

Centralized

InvestigationSmver/VM/theirapproachtosecuritycontrols.

CoAlatnet?令畬

Location

Traditionalsecuritycontrolsarehardto

.B?

Playbooi口

Men?ge?nenladapttothisnewreality,soanew

京網■''"

Posture

Managevneotarchitecturalmodelforsecurityis

DirsclorySOTVICM

nflnneeded.

Adaplrv*Acc^M

Centralized

RopoftmgStrategyofintegratingcomposable,

Entitionwnt*

MonaoenwNMdistributedsecuritytoolsbycentralizing

thedataandcontrolplanetoachieve

moreeffectivecollaborationbetween

Gartner

PUBLICt00ls

8?2022Gartner,Inc.and/oritsaffiliates.Allrightsreserved.Gartner

NetworkDefenseArchitecture-SASE

ShiftingUp(DynamicConnectivity)SASEArchitectureComponents

?SASEcorecapabilitiesdistributed

acrossconventionalareassuchas

network,applicationanddatasecurity.

ThekeyarchitecturalprinciplesSASE:

?Unifynetworkandsecurity

orchestration.

?Minimizethenumberoforchestration

points.

IlBmoteUMTXX

?Focusonusingcloud-basedsecurityBranchSecurity

mechanisms.

Gartner

PUBLIC

9?2022Gartner,Inc.and/oritsaffiliates.Allrightsreserved.Gartner

EmbeddedDefense-SaaSSecurityPosture

ShiftingIn(EmbeddedSecurity)

Microsoft365SecurityOptions

.

Manegemarw

AcKanced

**SPMToolsEmergetoAssessSaaSCom,,

EOF

Security(schange

SecurityPostureDMARC/DiOMrSPFCUttOOMf

ThroatProtMXioo(TTvMtExpiorarTracfcAr.locttoiSiryveforSuWWM

SharePoint

AdvMcsedOXBCkiwfi}locppAuditL09

tmrKv

MkcnwoftMenderfor(Xhc*3419SwchOmOHw

?MostEarlyEmergingToolsfocuson(3.UnU.SflfeAfUclwrtwit.Anit-PZ3Ad.MF)Yammer

Flow

MICTOMWI

largecollaborationSuitesandDataSecurMyft

MK?8訪mk?E?tionAotpionJMRce(ndpotnt

CompAanc*

A|?-AqiomMH0M>M?UQW

Sharingtools(MS365,GoogleXaLOM*wn<G)正notJg<rOneDnw.(tntio*?AAireAD

.Team,Endpo4a.MPFlkiSCMKMMMCAglSyitamintun?

Workspace,Salesforce)tnfonnMiorGcMimano*(ArchivmoThirdParty.AutomsucC4ntar>

<(rt?e?fiocandLMwImo.8M*tinecltwMsit>9?

?ManyextendingShadowITvisibilityOomp*?fic?Oo?npiianc4Man*o?r(Compmnc*Sccro)

Comnu*4HtMtCompBancw(SupmvttfankWHMMRbtMgmt

usingintegrationwithOkta/Ping,etcMBnaoeme**1

?「)】,<1.耐

?SaaSSecurityPostureNeedsAPI

Standardization

^

—i

3mOmN*l□[jEndporu

-M1c

tu0

?CISA-SecureCloudBusinessan8!£d

Applications(SCuBA)TechnicalAIK*Informattom

□Prot?ct?on-hl.0306Otont

ReferenceArchitecture(TRA)

-Gartner

PUBLIC

10?2022Gartner,Inc.and/oritsaffiliates.Allrightsreserved.Gartner

PostureManagementExpandingScopeandVisibility

ShiftingIn(*SPM+CloudSecurity)IllustrationofPotentialDeploymentPatternsforCASB,CSPM.CWPP.

SSPMandSMP

儆后

CnterpriM

CloudSecurityPostureCategories(Current)ComplUrM:,Ai-inwit|

QMTS

alk)f14lMortitorhCompluincAaaessment

DgvSccOp*Infgratlon

Cloud/OnProxyAcUptiwAccess

?ASPM-AppSecurityPostureManagementAPI

RHfcIdfHlTtcMIonOContrci

lnt?grat>on

PolicyEorctnyatoCloud

DataLotsPrevention

?CSPM-CloudSecurityPostureManagementTtweetProtection

?CASB-CloudAccessSecurityBroker

CIPSWorkloi

?CWPP-CloudWorkloadProtectionPlatforms

?KSPM-KubernetesSecurityPostureManagement

A-Gc

eaUUyo?ou

>rUVuCw

?SMP-SaaSManagementPlatformo5UIOdGqo

x2o-ZOM?lmW=sSds

wNCpACsAKy

5UAe-e-SEo

iss5dsuOuOS

eoOhoM2?UJf

mSMsoM

?SSPM-SaaSSecurityPostureManagementsP

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
  • 6. 下載文件中如有侵權或不適當內容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論