BigFix-HCL BigFix CyberFOCUS Analytics Head banner

BigFix CyberFOCUS Analytics: ํšจ๊ณผ์ ์ธ ์‚ฌ์ด๋ฒ„ ์œ„ํ—˜ ๊ฐ์†Œ๋ฅผ ์œ„ํ•œ ์ทจ์•ฝ์„ฑ ์กฐ์น˜๋ฐฉ์•ˆ์„ ๊ฐ„์†Œํ™”

BigFix-Streamline Vulnerability Remediation for Effective Cyber Risk Reduction

๋™์˜์ƒ 2:43

HCL BigFix CyberFOCUS Analytics

BigFix CyberFOCUS Analytics: ํšจ๊ณผ์ ์ธ ์‚ฌ์ด๋ฒ„ ์œ„ํ—˜ ๊ฐ์†Œ๋ฅผ ์œ„ํ•œ ์ทจ์•ฝ์„ฑ ์กฐ์น˜๋ฐฉ์•ˆ์„ ๊ฐ„์†Œํ™”

HCL BigFix CyberFOCUS Security Analytics๋Š” IT ์šด์˜ํŒ€์ด ๊ณ ๊ธ‰ ๋ณด์•ˆ ๋ถ„์„ ๋„๊ตฌ๋ฅผ ํ™œ์šฉํ•˜์—ฌ ์ค‘์š”ํ•œ ์ทจ์•ฝ์„ฑ์„ ๋ฐœ๊ฒฌ, ์šฐ์„ ์ˆœ์œ„ ์ง€์ • ๋ฐ ํŒจ์น˜ํ•˜๊ณ  ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ์œ„ํ—˜์„ ์‹ค์‹œ๊ฐ„์œผ๋กœ ์ค„์ผ ์ˆ˜ ์žˆ๋„๋ก ์„ค๊ณ„๋œ ์ƒˆ๋กœ์šด ๊ธฐ๋Šฅ์ž…๋‹ˆ๋‹ค.

๊ฐœ๋ณ„ ํŒ€ ๋ฐ ๋„๊ตฌ๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•˜๋Š” ๊ณ ๋ฆฝ๋œ ํ”„๋กœ์„ธ์Šค์™€ ๋‹ฌ๋ฆฌ HCL BigFix๋Š” ์—ฌ๋Ÿฌ ๋„๊ตฌ์˜ ๋ฐ์ดํ„ฐ๋ฅผ ์—”ํ„ฐํ”„๋ผ์ด์ฆˆ ๋ณด์•ˆ์„ ๋‹ด๋‹นํ•˜๋Š” ์—ฌ๋Ÿฌ ํŒ€์— ์ „๋‹ฌํ•  ๋•Œ ๋ฐœ์ƒํ•˜๋Š” ๋น„ํšจ์œจ์„ฑ์„ ์—†์• ๋Š” ๋‹จ์ผ ํ†ตํ•ฉ ์†”๋ฃจ์…˜์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

HCL BigFix CyberFOCUS Security Analytics๋Š” HCL BigFix Lifecycle, HCL BigFix Compliance ๋ฐ HCL BigFix Remediate์— ํฌํ•จ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค. HCL BigFix๋งŒ ์•Œ๊ณ  ์žˆ๋Š” ์—”๋“œํฌ์ธํŠธ ์ •๋ณด๋ฅผ ํ™œ์šฉํ•˜์—ฌ HCL BigFix CyberFOCUS Security Analytics๋Š” ์ทจ์•ฝ์„ฑ ์กฐ์น˜๋ฐฉ์•ˆ์„ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ํ•˜๊ณ , ๋ณดํ˜ธ ์ˆ˜์ค€ ํ˜‘์•ฝ(PLA)์„ ์‹คํ–‰, ์ •์˜ ๋ฐ ๊ด€๋ฆฌํ•˜๊ณ , CISA KEV ๋…ธ์ถœ์„ ๋ถ„์„ํ•  ์ˆ˜ ์žˆ๋Š” ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

์ง€๋Šฅํ˜• ์ง€์† ์œ„ํ˜‘ ๋งตํ•‘ ๋ฐ Vulnerability Remediation Simulator


Vulnerability Remediation Simulator๋Š” ํ˜„์žฌ ๋ณด๋‹ค ์ค‘์š”ํ•œ ์ง€๋Šฅํ˜• ์ง€์† ์œ„ํ˜‘(APT) ๋ณ€์ข…๊ตฐ๋ณ„๋กœ ์‚ฌ์šฉ์ž ํ™˜๊ฒฝ์— ์กด์žฌํ•˜๋Š” ์ทจ์•ฝ์„ฑ์„ ํ‘œ์‹œํ•ฉ๋‹ˆ๋‹ค. ์ด๋Š” 78%์˜ ๊ธฐ์—…์ด APT ๊ณต๊ฒฉ์œผ๋กœ ๊ฐ€๋™ ์ค‘๋‹จ์„ ๊ฒฝํ—˜ํ•˜๊ธฐ ๋•Œ๋ฌธ์— ์ค‘์š”ํ•ฉ๋‹ˆ๋‹ค(1). ์ด ๋„๊ตฌ๋Š” ํŒจ์น˜ ์ ์šฉ ๋ฐ ์กฐ์น˜๋ฐฉ์•ˆ์ด ๊ณต๊ฒฉ ํ‘œ๋ฉด์— ๋ฏธ์น˜๋Š” ์˜ํ–ฅ์„ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ํ•ฉ๋‹ˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด, ์•„๋ž˜ ํ‘œ์‹œ๋œ ์ด์ „ ๋ฐ ์ดํ›„ ๋ณด๊ณ ์„œ๋Š” CVE-2021-28655 ์กฐ์น˜๋ฐฉ์•ˆ์ด ์กฐ์ง ์ „์ฒด์˜ APT ๋…ธ์ถœ์— ์–ด๋–ค ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š”์ง€ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ํ•ฉ๋‹ˆ๋‹ค.

HCL BigFix CyberFOCUS Security Analytics์˜ ์ตœ์‹  ๋ฆด๋ฆฌ์Šค์—์„œ๋Š” Vulnerability Remediation Simulator๋ฅผ ํ†ตํ•ด ๊ทœ๋ฒ”์  ์กฐ์น˜๋ฐฉ์•ˆ์„ ์ œ๊ณตํ•˜๋ฏ€๋กœ ๊ด€๋ฆฌ์ž๊ฐ€ ์ „๋ฐ˜์ ์ธ APT ๋…ธ์ถœ์„ ์ค„์ด๊ณ  ์กฐ์ง์˜ ๋ณด์•ˆ ํƒœ์„ธ๋ฅผ ๊ฐ€์žฅ ํ–ฅ์ƒ์‹œํ‚ฌ ์ˆ˜ ์žˆ๋Š” ์กฐ์น˜๋ฐฉ์•ˆ์„ ์‹ ์†ํ•˜๊ฒŒ ํŒŒ์•…ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๊ทœ๋ฒ”์  ์กฐ์น˜๋ฐฉ์•ˆ์€ HCL BigFix ๊ด€๋ฆฌ์ž์—๊ฒŒ ๋ณด์•ˆ ์œ„ํ—˜ ๋ฐ ์œ„ํ˜‘ ๋…ธ์ถœ์„ ์‹ ์†ํ•˜๊ฒŒ ์ถ•์†Œํ•˜๋Š” ๋Šฅ๋ ฅ์„ ํ–ฅ์ƒํ•˜๋Š” ์ƒˆ๋กญ๊ณ  ์ง€๋Šฅ์ ์ธ ์ „๋ฌธ ์ง€์‹์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

BigFix-Simulated Exposure AFTER remediation

์กฐ์น˜๋ฐฉ์•ˆ ์ดํ›„ ์‹œ๋ฎฌ๋ ˆ์ด์…˜๋œ ๋…ธ์ถœ


(1) https://purplesec.us/resources/cyber-security-statistics/#APTs

HCL BigFix Insights for Vulnerability Remediation


์—…๊ณ„ ์ตœ๊ณ ์˜ ์ทจ์•ฝ์„ฑ ์Šค์บ๋„ˆ๋ฅผ ์‚ฌ์šฉํ•˜๋Š” ์กฐ์ง์€ HCL BigFix์™€ ํ†ตํ•ฉํ•˜์—ฌ ์ทจ์•ฝ์„ฑ ๊ด€๋ฆฌ ํšจ์œจ์„ฑ์„ ๋†’์ด๊ณ  ๋ณด์•ˆ ๋ชจ๋‹ˆํ„ฐ๋ง์„ ๊ฐ•ํ™”ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. HCL BigFix Insights for Vulnerability Remediation์„ ํ†ตํ•ด IT ๋ฐ ๋ณด์•ˆ ์šด์˜ํŒ€์€ ์ทจ์•ฝ์„ฑ ๋ฐœ๊ฒฌ๊ณผ ์กฐ์น˜๋ฐฉ์•ˆ ์‚ฌ์ด์˜ ์‹œ๊ฐ„์„ ๋Œ€ํญ ๋‹จ์ถ•ํ•˜์—ฌ ์กฐ์ง์˜ ๋ณด์•ˆ ํƒœ์„ธ๋ฅผ ๊ฐœ์„ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.


์•„๋ž˜ ๋ณด๊ณ ์„œ๋Š” Tenable ๋˜๋Š” Qualys๊ฐ€ ๋ฐœ๊ฒฌํ•œ ์ทจ์•ฝ์„ฑ๊ณผ ๊ด€๋ จ๋œ ์ทจ์•ฝ์„ฑ ํŠน์„ฑ์„ ๋ณด์—ฌ์ค๋‹ˆ๋‹ค. ๋˜ํ•œ ์กฐ์น˜๋ฐฉ์•ˆ์„ ์œ„ํ•ด 4๊ฐœ์˜ ์ทจ์•ฝ์„ฑ์ด ์„ ํƒ๋˜์—ˆ์Œ์„ ๋ณด์—ฌ ์ค๋‹ˆ๋‹ค.

BigFix-vulnerabilities discovered

์•„๋ž˜ ๋ณด๊ณ ์„œ๋Š” ๋ฐœ๊ฒฌ๋œ ์ทจ์•ฝ์„ฑ์„ ์ˆ˜์ •ํ•˜๋Š” ๊ด€๋ จ HCL BigFix ์ฝ˜ํ…์ธ (์ˆ˜์ • ์‚ฌํ•ญ)๋ฅผ ๋ณด์—ฌ ์ค๋‹ˆ๋‹ค. ๋˜ํ•œ ๋‘ ๊ฐœ์˜ ์ˆ˜์ • ์‚ฌํ•ญ์ด ๋ฐฐํฌ๋˜๋„๋ก ์„ ํƒ๋˜์—ˆ์Œ์„ ๋ณด์—ฌ ์ค๋‹ˆ๋‹ค.

BigFix-discovered vulnerabilities



HCL BigFix CISA Known Exploited Vulnerability Exposure Analyzer


๋˜ ๋‹ค๋ฅธ ํ˜์‹ ์€ HCL BigFix CISA Known Exploited Vulnerability Exposure Analyzer๋กœ, ์ด ๋„๊ตฌ๋Š” ๊ท€์‚ฌ์˜ ์ทจ์•ฝ์„ฑ์„ ์„ธ๊ณ„์—์„œ ๊ฐ€์žฅ ์‹ฌ๊ฐํ•œ ์œ„ํ˜‘์„ ์ •์˜ํ•˜๊ณ  ์ง€์†์ ์œผ๋กœ ์—…๋ฐ์ดํŠธ๋˜๋Š” CISA KEV ๋ชฉ๋ก์— ๋งตํ•‘ํ•ฉ๋‹ˆ๋‹ค.
CISA Known Exploited Vulnerability Exposure Analyzer๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ IT ์šด์˜ํŒ€์€ ๊ฐ€์žฅ ๊ธด๊ธ‰ํ•˜๊ณ  ์ค‘์š”ํ•œ ๋ณด์•ˆ ๊ณต๋ฐฑ์„ ์‹๋ณ„ํ•˜๋Š” ๋™์‹œ์— ์‹œ๊ฐ„์„ ํฌํ•จํ•˜์—ฌ ์—ฌ๋Ÿฌ ์ฐจ์›์—์„œ ๊ฐ€์žฅ ๋งŽ์ด ๋…ธ์ถœ๋œ ์ž์‚ฐ์„ ํ™•์ธํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์•„๋ž˜ ๋ณด๊ณ ์„œ์—์„œ ๊ฐ€์žฅ ํฐ ์›์€ CISA ์ง€์ • ๊ธฐํ•œ๊นŒ์ง€ ์ˆ˜์ •๋˜์ง€ ์•Š์€ (์‹œ๊ฐ„์„ ํฌํ•จํ•œ ์—ฌ๋Ÿฌ ์ฐจ์›์—์„œ) ๊ฐ€์žฅ ๋†’์€ ๋…ธ์ถœ์„ ๋‚˜ํƒ€๋ƒ…๋‹ˆ๋‹ค.


BigFix-HCL BigFix CISA Known Exploited Vulnerability Exposure Analyzer

์•„๋ž˜ ๋ณด๊ณ ์„œ์—์„œ ์ด ์‹ฌ๊ฐํ•œ ์ทจ์•ฝ์„ฑ์€ ์ˆ˜์ •๋˜์—ˆ์œผ๋ฉฐ ๊ทธ๋ž˜ํ”„์— ๋” ์ด์ƒ ๋‚˜ํƒ€๋‚˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค.


BigFix-CISA KEV report

CISA KEV ๋ณด๊ณ ์„œ์™€ ํƒ์ง€ ๋ฐ ์กฐ์น˜๋ฐฉ์•ˆ ์ฝ˜ํ…์ธ ์— ์•ก์„ธ์Šคํ•˜๋ ค๋ฉด Known Exploited Vulnerabilities ์ฝ˜ํ…์ธ  ํŒฉ ์ถ”๊ฐ€ ๊ธฐ๋Šฅ์ด ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค.

์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ ๋ณด๊ณ ์„œ


์ƒˆ๋กœ์šด HCL BigFix CyberFOCUS ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ ๋ณด๊ณ ์„œ๋Š” ์‚ฌ์šฉ์ž ํ™˜๊ฒฝ ๋‚ด์˜ ์ทจ์•ฝ์„ฑ ๊ทธ๋ฃน(CVE)์— ๋Œ€ํ•œ ๊ณต๊ฒฉ ํ‘œ๋ฉด์„ ๋ถ„์„ํ•  ์ˆ˜ ์žˆ๋Š” ๊ณ ๊ธ‰ ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. IT ํ™˜๊ฒฝ์˜ ์ค‘์š”ํ•œ ๋ถ€๋ถ„์— ๋Œ€ํ•œ ๋ณด์•ˆ ๊ทœ์ • ์ค€์ˆ˜์— ๋Œ€ํ•œ ์ •ํ™•ํ•˜๊ณ  ์‹ฌ์ธต์ ์ธ ๋ถ„์„์„ ์œ„ํ•ด CVE ๋ฐ ์ปดํ“จํ„ฐ ๊ทธ๋ฃน ์กฐํ•ฉ์˜ ์‚ฌ์šฉ์ž ์ง€์ • ๋ชฉ๋ก์„ ์„ ํƒํ•˜๋Š” ๋™์‹œ์— ์ทจ์•ฝ์„ฑ ์™„ํ™” ๋…ธ๋ ฅ์˜ ์ง„ํ–‰ ์ƒํ™ฉ์„ ์ง€์†์ ์œผ๋กœ ๋ชจ๋‹ˆํ„ฐ๋งํ•˜๋Š” ๋ฐ ํ•„์š”ํ•œ ์œ ์—ฐ์„ฑ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์ด ๋ณด๊ณ ์„œ๋Š” ์ทจ์•ฝ์„ฑ ๊ด€๋ฆฌ ์ „๋žต์„ ๊ฐœ์„ ํ•˜๊ธฐ ์œ„ํ•œ ๊ท€์ค‘ํ•œ ํ†ต์ฐฐ๋ ฅ์„ ์ œ๊ณตํ•˜์—ฌ ๋ณด๋‹ค ์ง€๋Šฅ์ ์œผ๋กœ ์•ˆ์ „ํ•œ ํ™˜๊ฒฝ์„ ์œ„ํ•œ ๋” ์‰ฌ์šด ๊ณต๋™ ์ž‘์—…, ์กฐ์ • ๋ฐ ์ˆ˜์ •์„ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•ฉ๋‹ˆ๋‹ค.


Initiative Report

์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ๋Š” ์ทจ์•ฝ์„ฑ ์™„ํ™” ๋˜๋Š” ํŒจ์น˜ ์ ์šฉ ์บ ํŽ˜์ธ์„ ๊ตฌ์„ฑํ•˜๋Š” CVE์˜ ๋ชจ์Œ์ž…๋‹ˆ๋‹ค. ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ๋ฅผ ํ†ตํ•ด ์กฐ์ง์€ ์ œ๊ณตํ•˜๋Š” CVE ์ง‘ํ•ฉ์—์„œ ์ทจ์•ฝ์„ฑ ๋…ธ์ถœ์„ ์ธก์ •ํ•˜๊ฑฐ๋‚˜ ๊ธฐ๋ณธ ์ œ๊ณต ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ ์ค‘ ํ•˜๋‚˜๋ฅผ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ˆ˜ํผ ๊ทธ๋ฃน์€ HCL BigFix ํ™˜๊ฒฝ์—์„œ ๊ฐ€์ ธ์˜จ ์ปดํ“จํ„ฐ ๊ทธ๋ฃน์˜ ์ฝœ๋ ‰์…˜์ž…๋‹ˆ๋‹ค. ์ˆ˜ํผ ๊ทธ๋ฃน ๋‚ด์˜ ์ปดํ“จํ„ฐ ๊ทธ๋ฃน์—๋Š” ๋ณด๊ณ ์„œ์—์„œ ์‰ฝ๊ฒŒ ์ฝ์„ ์ˆ˜ ์žˆ๋„๋ก ๋ณ„๋ช…์„ ์ง€์ •ํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ ๋™์ผํ•œ ์ปดํ“จํ„ฐ ๊ทธ๋ฃน์„ ์—ฌ๋Ÿฌ ์ˆ˜ํผ ๊ทธ๋ฃน์—์„œ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.


Initiative Report 1

CyberFOCUS ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ ๋ณด๊ณ ์„œ๋Š” ๋ชจ๋“  ๊ทœ๋ชจ์˜ ์กฐ์ง์ด ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ํƒœ์„ธ๋ฅผ ๊ฐœ์„ ํ•˜๋Š” ๋ฐ ๋„์›€์ด ๋  ์ˆ˜ ์žˆ๋Š” ๊ฐ•๋ ฅํ•˜๊ณ  ๋‹ค์žฌ๋‹ค๋Šฅํ•œ ๋„๊ตฌ์ž…๋‹ˆ๋‹ค. ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ ๋ณด๊ณ ์„œ๋Š” ์ทจ์•ฝ์„ฑ ๋…ธ์ถœ, ์ˆ˜์ • ์ง„ํ–‰ ์ƒํ™ฉ ๋ฐ ํŒ€ ์„ฑ๊ณผ์— ๋Œ€ํ•œ ๋ช…ํ™•ํ•˜๊ณ  ๊ฐ„๊ฒฐํ•œ ํ†ต์ฐฐ๋ ฅ์„ ์ œ๊ณตํ•จ์œผ๋กœ์จ IT ๊ด€๋ฆฌ์ž๊ฐ€ ์ •๋ณด์— ์ž…๊ฐํ•œ ๊ฒฐ์ •์„ ๋‚ด๋ฆฌ๊ณ  ์šด์˜์„ ๊ฐ„์†Œํ™”ํ•˜๋ฉฐ ์œ„ํ—˜์„ ์ค„์ผ ์ˆ˜ ์žˆ๋„๋ก ํ•ฉ๋‹ˆ๋‹ค.

๋ณดํ˜ธ ์ˆ˜์ค€ ํ˜‘์•ฝ(PLA) ์ •์˜ ๋ฐ ๊ด€๋ฆฌ


HCL BigFix CyberFOCUS Security Analytics์—์„œ๋Š” ๋ณดํ˜ธ ์ˆ˜์ค€ ํ˜‘์•ฝ(PLA)์ด๋ผ๋Š” ์ƒˆ๋กœ์šด ๊ฐœ๋…์ด ๋„์ž…๋˜์—ˆ์Šต๋‹ˆ๋‹ค. PLA๋Š” ์ž์‚ฐ ์ค‘์š”๋„, CVE ์ค‘์š”๋„, ์›ํ•˜๋Š” ํŒจ์น˜ ์ˆ˜์ค€, ๊ทœ์ • ์ค€์ˆ˜ ํ‘œ์ค€, ํ•ฉ์˜๋œ ์กฐ์ง ์„œ๋น„์Šค ์ˆ˜์ค€์„ ๊ธฐ์ค€์œผ๋กœ ํ•œ ์ด๋ฒคํŠธ ๊ด€๋ฆฌ๋ฅผ ๊ฒฐํ•ฉํ•œ ๊ธฐ์ค€์ž…๋‹ˆ๋‹ค.

์•„๋ž˜ ๋ณด๊ณ ์„œ์—์„œ๋Š” 10๊ฐ€์ง€ ์ค‘์š” ์˜์—ญ์— ๋Œ€ํ•ด ๋ณดํ˜ธ ์ˆ˜์ค€ ํ˜‘์•ฝ์ด ์ •์˜๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค. ์ ์€ IT ๋ฐ ๋น„์ฆˆ๋‹ˆ์Šค ๊ด€๊ณ„์ž๊ฐ€ ์ •์˜ํ•˜๊ณ  ๋™์˜ํ•œ ํŒจ์น˜ ์„ฑ๋Šฅ ๋ชฉํ‘œ๋ฅผ ๋‚˜ํƒ€๋ƒ…๋‹ˆ๋‹ค. ์ฐจํŠธ์˜ ๋ง‰๋Œ€๋Š” ์‹ค์ œ ํŒจ์น˜ ์„ฑ๋Šฅ์„ ๋ณด์—ฌ์ค๋‹ˆ๋‹ค. ์ด ์˜ˆ์—์„œ๋Š” ์ผ๋ถ€ ๋ชฉํ‘œ๋Š” ์ถฉ์กฑ๋˜๊ณ  ์žˆ์ง€๋งŒ(์•„๋ž˜ ์ด๋ฏธ์ง€์˜ ํšŒ์ƒ‰ ๋ง‰๋Œ€), ๋‹ค๋ฅธ ๋ชฉํ‘œ๋Š” ํ•ฉ์˜๋œ ๋ชฉํ‘œ(์•„๋ž˜ ์ด๋ฏธ์ง€์˜ ๋ณด๋ผ์ƒ‰ ๋ง‰๋Œ€)๋ฅผ ์ดˆ๊ณผํ•ฉ๋‹ˆ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ๋น„์ฆˆ๋‹ˆ์Šค ๊ด€๊ณ„์ž๊ฐ€ ๋ชฉํ‘œ ๋Œ€๋น„ ์„ฑ๊ณผ๋ฅผ ๋ช…ํ™•ํ•˜๊ฒŒ ํ™•์ธํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.



BigFix-Protection Level Agreements

์š”์•ฝ

HCL BigFix CyberFOCUS Security Analytics ์†Œํ”„ํŠธ์›จ์–ด๋ฅผ ํ†ตํ•ด IT ๋ฐ ๋ณด์•ˆ ์šด์˜ ๋ถ€์„œ๋Š” ์ทจ์•ฝ์„ฑ์„ ์‹ ์†ํ•˜๊ฒŒ ๊ฐœ์„ ํ•˜๊ธฐ ์œ„ํ•œ ๋…ธ๋ ฅ์„ ์กฐ์œจํ•  ์ˆ˜ ์žˆ๋Š” ๊ฐ•๋ ฅํ•œ ๋„๊ตฌ ์„ธํŠธ๋ฅผ ํ™•๋ณดํ•˜๊ฒŒ ๋ฉ๋‹ˆ๋‹ค. IT ์šด์˜ ๋ถ€์„œ๋Š” ์ฒ˜์Œ์œผ๋กœ ๊ฐ€์žฅ ๋†’์€ ๋…ธ์ถœ ์œ„ํ˜‘์— ์ดˆ์ ์„ ๋งž์ถฐ ์กฐ์น˜๋ฐฉ์•ˆ์ด ๋น„์ฆˆ๋‹ˆ์Šค์— ๋ฏธ์น˜๋Š” ์˜ํ–ฅ์„ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ํ•  ์ˆ˜ ์žˆ๊ณ , ์ฃผ์š” ์ทจ์•ฝ์„ฑ ๊ด€๋ฆฌ ๋„๊ตฌ๋ฅผ ์‚ฌ์šฉํ•˜๋Š” ๋ณด์•ˆ ์šด์˜ ๋ถ€์„œ๋Š” ๋ฐœ๊ฒฌ๋œ ์ทจ์•ฝ์„ฑ๊ณผ ์‚ฌ์šฉ ๊ฐ€๋Šฅํ•œ ์กฐ์น˜๋ฐฉ์•ˆ์„ ๋ณด๋‹ค ์‹ ์†ํ•˜๊ฒŒ ์—ฐ๊ฒฐํ•˜์—ฌ ํšจ์œจ์„ฑ์„ ๊ทน๋Œ€ํ™”ํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, IT ์šด์˜ ๋ถ€์„œ๋Š” ํ•ฉ์˜๋œ ๋น„์ฆˆ๋‹ˆ์Šค ๋ชฉํ‘œ์— ๋”ฐ๋ผ ์„ฑ๋Šฅ์„ ์ •์˜ํ•˜๊ณ  ์ธก์ •ํ•จ์œผ๋กœ์จ ์—”ํ„ฐํ”„๋ผ์ด์ฆˆ ๋ณด์•ˆ์—์„œ ๋ณด๋‹ค ์ ๊ทน์ ์ธ ์—ญํ• ์„ ๋‹ด๋‹นํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. HCL BigFix CyberFOCUS Security Analytics๋Š” ์ทจ์•ฝ์„ฑ ๊ด€๋ฆฌ๋ฅผ ๋Œ€ํญ ๊ฐ•ํ™”ํ•˜๊ณ  ์‚ฌ์ด๋ฒ„ ์œ„ํ—˜์„ ์ถ•์†Œํ•ฉ๋‹ˆ๋‹ค.


์ด์ 

BigFix-Improve Endpoint Security

์—”๋“œํฌ์ธํŠธ ๋ณด์•ˆ ํ–ฅ์ƒ

HCL BigFix๋Š” IT ๋ฐ ๋ณด์•ˆ ์šด์˜์ž๊ฐ€ ์ทจ์•ฝ์„ฑ์„ ์‹ ์†ํ•˜๊ฒŒ ๋ฐœ๊ฒฌ, ์šฐ์„ ์ˆœ์œ„ ์ง€์ • ๋ฐ ์ˆ˜์ •ํ•˜๊ณ  ๊ณต๊ฒฉ ํ‘œ๋ฉด์„ ํšจ๊ณผ์ ์œผ๋กœ ์ถ•์†Œํ•˜๊ณ  ๋‚ด๋ถ€์ž ์œ„ํ˜‘์„ ์™„ํ™”ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•ฉ๋‹ˆ๋‹ค.

BigFix-Speed Remediation

์กฐ์น˜๋ฐฉ์•ˆ ๊ฐ€์†ํ™”

์ทจ์•ฝ์„ฑ์€ ์‹ ์†ํ•˜๊ฒŒ ์ˆ˜์ •ํ•˜๋Š” ๊ฒƒ์ด ๊ฐ€์žฅ ์ค‘์š”ํ•ฉ๋‹ˆ๋‹ค. ํŠนํžˆ ์ œ๋กœ๋ฐ์ด ์ทจ์•ฝ์„ฑ์— ์ง๋ฉดํ–ˆ์„ ๋•Œ๋Š” ๋”์šฑ ๊ทธ๋ ‡์Šต๋‹ˆ๋‹ค.

BigFix-Integrate with Leading Vulnerability Scanners

์ฃผ์š” ์ทจ์•ฝ์„ฑ ์Šค์บ๋„ˆ์™€์˜ ํ†ตํ•ฉ

HCL BigFix๋Š” Tenable ๋ฐ Qualys์™€ ํ†ตํ•ฉ๋˜์–ด ์ทจ์•ฝ์„ฑ ๋ฐœ๊ฒฌ๊ณผ ์กฐ์น˜๋ฐฉ์•ˆ ์‚ฌ์ด์˜ ์‹œ๊ฐ„์„ ๋‹จ์ถ•ํ•˜๋Š” ๋ฐ ๋„์›€์ด ๋ฉ๋‹ˆ๋‹ค.

BigFix-Leverage Threat Information

์œ„ํ˜‘ ์ •๋ณด ํ™œ์šฉ

๋‹ค์–‘ํ•œ ์†Œ์Šค์˜ ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค ํ”ผ๋“œ์™€ CISA์—์„œ ๊ฒŒ์‹œํ•œ ATTACK ๊ธฐ์ˆ  ์ž๋ฃŒ ๋ฐ ์•Œ๋ ค์ง„ ์•…์šฉ๋œ ์ทจ์•ฝ์„ฑ์„ ํ™œ์šฉํ•จ์œผ๋กœ์จ ์กฐ์ง์€ ๊ณต๊ฒฉ ๋ฒกํ„ฐ๋ฅผ ๋ณด๋‹ค ์ ๊ทน์ ์œผ๋กœ ์ถ•์†Œํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

BigFix-Simulate the Impact of Remediations

์กฐ์น˜๋ฐฉ์•ˆ์˜ ์˜ํ–ฅ์„ ์‹œ๋ฎฌ๋ ˆ์ด์…˜

์—”ํ‹ฐํ‹ฐ ๋™์ž‘ ๋ถ„์„์„ ํ†ตํ•ด ํŠน์ • ์ทจ์•ฝ์„ฑ์˜ ์ˆ˜์ •์ด ์—”ํ„ฐํ”„๋ผ์ด์ฆˆ ๊ณต๊ฒฉ ํ‘œ๋ฉด์— ๋ฏธ์น˜๋Š” ์˜ํ–ฅ์„ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ํ•˜์—ฌ ๊ด€๋ จ ๋น„์ฆˆ๋‹ˆ์Šค ์ค‘๋‹จ์„ ์ตœ์†Œํ™”ํ•˜๊ณ  ๊ฐ€์žฅ ํฐ ๋ณด์•ˆ ์œ„ํ˜‘์„ ์™„ํ™”ํ•ฉ๋‹ˆ๋‹ค.

BigFix-Measure Performance Against Goals

๋ชฉํ‘œ ๋Œ€๋น„ ์„ฑ๊ณผ ์ธก์ •

๋ณดํ˜ธ ์ˆ˜์ค€ ํ˜‘์•ฝ์„ ์‚ฌ์šฉํ•˜์—ฌ ๋น„์ฆˆ๋‹ˆ์Šค ์ดํ•ด๊ด€๊ณ„์ž ๋ฐ IT ์šด์˜ ๋ถ€์„œ๊ฐ€ ์ •์˜ํ•œ ํ•ฉ์˜๋œ ๋ชฉํ‘œ๋ฅผ ๊ธฐ์ค€์œผ๋กœ ์กฐ์น˜๋ฐฉ์•ˆ ๋ฐ ํŒจ์น˜ ์ž‘์—…์„ ์ธก์ •ํ•ฉ๋‹ˆ๋‹ค.