• 검색 결과가 없습니다.

비즈니스 및 앱 보호 전략

N/A
N/A
Protected

Academic year: 2022

Share "비즈니스 및 앱 보호 전략"

Copied!
26
0
0

로드 중.... (전체 텍스트 보기)

전체 글

(1)

1

Minsu Shin

Senior Sales Engineer Citrix Systems Korea Ltd.

제로 트러스트 보안을 통한

비즈니스 및 앱 보호 전략

(2)

Securing your

workforce

(3)

Cloud SaaS Mobility Flexible operating models

Expanded attack

surface

(4)

Cloud SaaS Mobility Flexible operating models

공격 대상 확장

(5)

Managed &

Unmanaged Devices

Traditional AV & DLP

Tools EPP

(Endpoint Protection Platforms)

Legacy Client Management

Tools

Chrome Book Management

UEM/MDM Tools EDR (Endpoint Detection &

Response) Tools

Client Apps

& Content

(Browser, Mobile, Local,

Remote)

Certificate Management

Tools

Multiple MAM solutions for mobile apps

Browser Protection

Tools (Chrome, Edge, IE etc.) Local App &

Desktop lock down

tools

Server Apps

(SaaS, Web, Traditional Enterprise

Apps)

Web Isolation

Tools

Appliances (e.g.

firewalls)

Network / Location

(Office, Branch

& Remote)

WiFi security

tools MTD

tools

Traditional VPN tools

Branch security appliances Traditional

endpoint DLP & other containment tools (e.g.

CASBs)

UEBA tools

Secure File Sharing MFA

Tools

Identity &

Federation Tools

Secure Web Gateway

Identity Management

Access Management

(6)

User 주변의 모든 것을 보호하는 것이 아닌,

Workspace를

보호하여 User를 보호하자

(7)

Aligned with Zero Trust

Users Network

Traffic

Devices Applications Data

(8)

Citrix Ready Workspace Security Program

통합, 테스트, 검증

Citrix Workspace

Identity and Access

Management

Device and Endpoint Security Monitoring and

Analytics Data Security Network Security

(9)

Citrix Workspace

Identity and Access

Management

Device and Endpoint Security Monitoring and

Analytics Data Security Network Security Zero Trust

Citrix Ready Workspace Security Program

통합, 테스트, 검증

(10)

Citrix Ready Workspace Security

Program with Zero Trust

Granular Contextual Continuous

Secure

Workspace Access

Citrix

Endpoint

Management

Citrix

Analytics

for Security

(11)

Identity and Access Management

Identity, Authentication, Application

Monitoring and Analytics

SIEM, Network Monitoring, Security Analytics

Device and Endpoint Security

UEM, EDP/EDR

Data Security

CASB, DLP

Network

SD-WAN, WAF

Zero Trust

Integrations with Secure Workspace Access,

Citrix Endpoint Management, and Citrix Analytics

(12)

Identity Solution Identity Solution Identity Solution

Citrix Workspace

(13)

Identity Solution Identity Solution Identity Solution

Citrix Workspace

(14)

Citrix Ready Workspace

Security Program with Zero Trust

(15)

Secure your

apps

(16)
(17)

92% of reported vulnerabilities

are in the

application,

not the network

(18)

Applications are becoming more complex

(19)

Protect any application, anywhere

Web App Firewall Bot Management DDoS Mitigation

Monolithic

applications Microservice-based applications

On-prem

applications Cloud

applications

(20)

Citrix

Web App &

API Protection Service

Web App

Firewall DDoS

Mitigation Bot

Management

Coming soon

(21)

Web App

Firewall

(22)

DDoS Mitigation

(23)

Bot Management

Coming soon

(24)

Demo

본 슬라이드는 동영상이므로, 발표 영상을 확인 부탁드립니다.

(25)

빠르고 간편한 구축

직관적인 설정

기능 & 위협

intelligence

자동 업데이트

(26)

2 6

Citrix Virtual Summit

Korea 2020

참조

관련 문서

This study analyzed auto measurement network data managed by the Ministry of Environment beyond the security of data through scientific field survey and direct

영어 umbrella 의 보호  의미를  나타내는  사례로는 Launch Umbrella Safety Solution , Under the Umbrella of IBD , Health umbrella , security umbrella ,

Splunk Security Essentials 앱에서 보안 프레임워크

•  A network added between a protected network and an external network, in order to provide an additional layer of security.!. •  허용할 network 접속과 허용하지

앱과 사용자의 빠른 직접 연결, 보안 블랙홀 제거 150 데이터센터를 통한 보안.

& Policy Control Citrix Workspace User

Micro Service Graph Infra Analytics. Application

Based on the initial refined division of the network into clusters by k-means++, nodes of each network cluster can negotiate internally to select the head node of each