Skip to content Skip to navigation Skip to footer

๊ฐœ์š”

ํ†ต์‹  ์„œ๋น„์Šค ์‚ฌ์—…์ž(CSP)๋Š” ๋„คํŠธ์›Œํฌ ๋ณด์•ˆ์— ์–ด๋ ค์›€์„ ๊ฒช๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ํ†ต์‹  ๋„คํŠธ์›Œํฌ๋Š” ์ข…๋ฅ˜๊ฐ€ ๋งŽ๊ณ  ์ „ ์„ธ๊ณ„์ ์œผ๋กœ ๋ถ„์‚ฐ๋˜์–ด ์žˆ์œผ๋ฉฐ, ์˜จํ”„๋ ˆ๋ฏธ์Šค ๋ฐ์ดํ„ฐ ์„ผํ„ฐ, ํผ๋ธ”๋ฆญ/ํ”„๋ผ์ด๋น— ํด๋ผ์šฐ๋“œ ๋ฐฐํฌ, ์˜คํ”„๋ผ์ธ ๋ฆฌํ…Œ์ผ ๋งค์žฅ๊นŒ์ง€ ์•„์šฐ๋ฆ…๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ์‹œ์„ค์€ ๊ธฐ์—… ๊ด‘์—ญ ๋„คํŠธ์›Œํฌ(WAN)์— ์—ฐ๊ฒฐ๋œ ๊ฒŒ์ŠคํŠธ ๋ฌด์„  ๋„คํŠธ์›Œํฌ์™€ ์‚ฌ๋ฌผ ์ธํ„ฐ๋„ท(IoT) ๊ธฐ๊ธฐ๊ฐ€ ์žˆ๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋งŽ์Šต๋‹ˆ๋‹ค.ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย 

ํ†ต์‹  ์„œ๋น„์Šค ์‚ฌ์—…์ž์—๊ฒŒ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ์€ ๊ฐ€์žฅ ํฐ ๊ฑฑ์ •๊ฑฐ๋ฆฌ์ž…๋‹ˆ๋‹ค. ๋ชจ๋“  ๊ณ ๊ฐ ํŠธ๋ž˜ํ”ฝ์€ ๊ธฐ์—…์˜ ๋ฐ์ดํ„ฐ ์„ผํ„ฐ๋ฅผ ๊ฑฐ์น˜๊ธฐ ๋•Œ๋ฌธ์— ๊ณต๊ฒฉํ•˜๊ธฐ์— ๊ฐ€์žฅ ์ข‹์€ ํƒ€๊นƒ์ด ๋ฉ๋‹ˆ๋‹ค. ์‚ฌ์ด๋ฒ„ ๋ฒ”์ฃ„์ž๋Š” ์˜คํ”„๋ผ์ธ ๋ฆฌํ…Œ์ผ ๋งค์žฅ์˜ POS ์‹œ์Šคํ…œ๋„ ๋…ธ๋ฆฌ๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋งŽ์Šต๋‹ˆ๋‹ค. CSP๋Š” ์ž์‹ ์—๊ฒŒ ๋งก๊ฒจ์ง„ ๋ฏผ๊ฐํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ๊ด€๋ จ ํ‘œ์ค€(์˜ˆ: ๊ฒฐ์ œ ์นด๋“œ ์‚ฐ์—… ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ํ‘œ์ค€(PCI DSS), ๋„์ž… ์˜ˆ์ •์ธ PCI ์†Œํ”„ํŠธ์›จ์–ด ๋ณด์•ˆ ํ”„๋ ˆ์ž„์›Œํฌ(SSF))์— ๋”ฐ๋ผ ๋ณดํ˜ธํ•ด์•ผ ํ•  ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ, ๊ณ ๊ฐ์—๊ฒŒ ์ œ๊ณตํ•˜๋Š” ์„œ๋น„์Šค๋ฅผ ์ €ํ•ดํ•˜๊ธฐ ์œ„ํ•œ ๊ณต๊ฒฉ๋„ ๋ฐฉ์–ดํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ์ด ๋ชฉํ‘œ๋ฅผ ๋‹ฌ์„ฑํ•˜๋ ค๋ฉด ๋„คํŠธ์›Œํฌ ์„ฑ๋Šฅ๊ณผ ๊ณ ๊ฐ ๊ฒฝํ—˜์— ๋ถ€์ •์ ์ธ ์˜ํ–ฅ์„ ๋ฏธ์น˜์ง€ ์•Š๋Š” ํฌ๊ด„์ ์ธ ๋ณด์•ˆ๊ณผ ์ค‘์•™์œผ๋กœ ์ง‘์ค‘๋œ ๊ฐ€์‹œ์„ฑ์ด ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค.



ํฌํ‹ฐ๋„ท ์‹œํ๋ฆฌํ‹ฐ ํŒจ๋ธŒ๋ฆญ์œผ๋กœ ํ†ต์‹  ์„œ๋น„์Šค ์‚ฌ์—…์ž ๋ณดํ˜ธ

ํฌํ‹ฐ๋„ท ์‹œํ๋ฆฌํ‹ฐ ํŒจ๋ธŒ๋ฆญ์œผ๋กœ ํ†ต์‹  ์„œ๋น„์Šค ์‚ฌ์—…์ž ๋ณดํ˜ธ

์ž์„ธํžˆ ์ฝ๊ธฐ
๊ณ ๊ฐ ๊ฒฝํ—˜์„ ์ €ํ•ดํ•˜์ง€ ์•Š๊ณ  PCI SSF ์ค€์ˆ˜

๊ณ ๊ฐ ๊ฒฝํ—˜์„ ์ €ํ•ดํ•˜์ง€ ์•Š๊ณ  PCI SSF ์ค€์ˆ˜

์ž์„ธํžˆ ์ฝ๊ธฐ
์ง€๋Šฅํ˜• ์œ„ํ˜‘: CIO์˜ ์‹œํ•œ ํญํƒ„

์ง€๋Šฅํ˜• ์œ„ํ˜‘: CIO์˜ ์‹œํ•œ ํญํƒ„

๋‹ค์šด๋กœ๋“œ

์‚ฌ๋ฌด์‹ค ๋„คํŠธ์›Œํฌ ๋ณด์•ˆ

ํ†ต์‹  ์„œ๋น„์Šค ์‚ฌ์—…์ž(CSP)์˜ ์‚ฌ๋ฌด์‹ค ๋„คํŠธ์›Œํฌ๋Š” ์šด์˜์— ๋ฐ˜๋“œ์‹œ ํ•„์š”ํ•˜๊ณ , ์—„์ฒญ๋‚œ ์–‘์˜ ๋ฏผ๊ฐํ•œ ์ •๋ณด๊ฐ€ ์ €์žฅ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค. ๊ณ ๊ฐ์—๊ฒŒ์„œ ์ˆ˜์ง‘ํ•œ ๊ฒฐ์ œ ์นด๋“œ ๋ฐ ์ฒญ๊ตฌ ์ •๋ณด๊ฐ€ ์ด ๋„คํŠธ์›Œํฌ๋ฅผ ํ†ตํ•ด ์ด๋™ํ•˜๊ณ  ์ €์žฅ๋ฉ๋‹ˆ๋‹ค. ๊ณ ๊ฐ์˜ ํŠธ๋ž˜ํ”ฝ์€ ๋ฐ์ดํ„ฐ ์„ผํ„ฐ๋ฅผ ํ†ตํ•ด ๋ผ์šฐํŒ… ๋ฐ ์ฒ˜๋ฆฌ๋˜์–ด, ๊ณต๊ฒฉ์ž๊ฐ€ ์•ก์„ธ์Šค ๊ถŒํ•œ์„ ์–ป์œผ๋ฉด ๋Œ€๋Ÿ‰์˜ ๊ท€์ค‘ํ•œ ์ •๋ณด๋ฅผ ๋„˜๊ฒจ์ฃผ๊ฒŒ ๋ฉ๋‹ˆ๋‹ค. ๊ธฐ์—…์€ ์ด ๋ชจ๋“  ๋ฐ์ดํ„ฐ๋ฅผ ๋ณดํ˜ธํ•˜๊ณ  ๊ด€๋ จ ๊ทœ์ •์„ ์ค€์ˆ˜ํ•  ๋Šฅ๋ ฅ์ด ์žˆ์–ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.

๊ทธ๋Ÿฌ๋‚˜ CSP๋Š” ์‚ฌ์ด๋ฒ„ ์œ„ํ˜‘์€ ๋ฐ์ดํ„ฐ ์œ ์ถœ์—๋งŒ ๋…ธ์ถœ๋œ ๊ฒƒ์ด ์•„๋‹™๋‹ˆ๋‹ค. ๋ถ„์‚ฐํ˜• ์„œ๋น„์Šค ๊ฑฐ๋ถ€(DDoS) ๊ณต๊ฒฉ์ด๋‚˜ ๋žœ์„ฌ์›จ์–ด ๊ฐ์—ผ์œผ๋กœ ์ธํ•ด ์ค‘์š”ํ•œ ์„œ๋น„์Šค๊ฐ€ ์ค‘๋‹จ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๊ทธ ๊ณผ์ •์—์„œ ์—”ํ„ฐํ”„๋ผ์ด์ฆˆ ๋„คํŠธ์›Œํฌ๋ฅผ ํ•ดํ‚นํ•œ ๊ณต๊ฒฉ์ž๊ฐ€ ๋„คํŠธ์›Œํฌ์—์„œ ์ธํ„ฐ๋„ท์— ์—ฐ๊ฒฐ๋œ ๋ชจ๋‹ˆํ„ฐ๋ง ๊ธฐ๊ธฐ๋ฅผ ์ต์Šคํ”Œ๋กœ์ž‡ํ•˜๊ณ  ์•…์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๋งŽ์€ CSP๊ฐ€ ๋””์ง€ํ„ธ ํ˜์‹ ์œผ๋กœ ์ธํ•ด ๊ธฐ์กด ํšŒ์‚ฌ ๋ฐ์ดํ„ฐ ์„ผํ„ฐ๋Š” ๋ฌผ๋ก ์ด๊ณ , ํผ๋ธ”๋ฆญ ๋ฐ ํ”„๋ผ์ด๋น— ํด๋ผ์šฐ๋“œ๊นŒ์ง€ ํฌํ•จํ•˜๋„๋ก WAN์„ ํ™•์žฅํ–ˆ์Šต๋‹ˆ๋‹ค. ์ด๋Ÿฐ ์ด์งˆ์ ์ธ ๋„คํŠธ์›Œํฌ ํ™˜๊ฒฝ์„ ๋ณดํ˜ธํ•˜๋ ค๋ฉด ์™„์ „ํžˆ ํ†ตํ•ฉ๋œ ํฌ๊ด„์  ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ์†”๋ฃจ์…˜์ด ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค.ย FortiManager,ย FortiSIEM๋ฐย FortiAnalyzer๋ฅผ ์‚ฌ์šฉํ•˜๋Š” ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆํŒ€์—์„œ๋Š” ๋„คํŠธ์›Œํฌ ์ „์ฒด๋ฅผ ์•„์šฐ๋ฅด๋Š” ์ค‘์•™ ์ง‘์ค‘์  ๊ฐ€์‹œ์„ฑ๊ณผ ์ปจํŠธ๋กค์„ ์–ป์„ ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์‰ฝ๊ฒŒ ๊ทœ์ • ์ค€์ˆ˜ ํ˜„ํ™ฉ์„ ํ™•์ธ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.ย FortiClientย ๋ฐ FortiEDR(์—”๋“œํฌ์ธํŠธ ํƒ์ง€ ๋ฐ ๋Œ€์‘)์€ ์ง์› ์›Œํฌ์Šคํ…Œ์ด์…˜๊ณผ POS ์‹œ์Šคํ…œ ๋“ฑ์— ์ง€๋Šฅ์  ํ†ตํ•ฉ ์—”๋“œํฌ์ธํŠธ ๋ณด์•ˆ ์†”๋ฃจ์…˜์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.ย FortiWebย ๋ฐย FortiNAC๋Š” ์›น์‚ฌ์ดํŠธ ๋ณด์•ˆ๊ณผ ์ž๋™ ์‹ ์› ์ธ์ฆ, ๋„คํŠธ์›Œํฌ์— ์—ฐ๊ฒฐ๋œ ์‚ฌ๋ฌผ ์ธํ„ฐ๋„ท(IoT) ๊ธฐ๊ธฐ์˜ ์ทจ์•ฝ์„ฑ ์Šค์บ”์„ ์ œ๊ณตํ•˜๊ณ  FortiAuthenticator๋Š” ID ๊ด€๋ฆฌ๋ฅผ ๋‹จ์ˆœํ™”ํ•ฉ๋‹ˆ๋‹ค.

CSP๋Š” ํฌํ‹ฐ๋„ท ์†”๋ฃจ์…˜์˜ ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๊ธฐ๋Šฅ์œผ๋กœ ๋ณต์žกํ•˜๊ณ  ๋ถ„์‚ฐ๋œ ๋„คํŠธ์›Œํฌ ๋ณด์•ˆ์˜ ๋ถ€๋‹ด์„ ๋œ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

  • ์ฃผ์š” ํด๋ผ์šฐ๋“œ ๊ณต๊ธ‰์—…์ฒด์™€์˜ ๊ธฐ๋ณธ ํ†ตํ•ฉ ๋ฐ 250๊ฐœ๊ฐ€ ๋„˜๋Š” ํƒ€์‚ฌ ๋ณด์•ˆ ์†”๋ฃจ์…˜
  • ๋‹จ์ผ ๋Œ€์‹œ๋ณด๋“œ์—์„œ ์ค‘์•™ ์ง‘์ค‘์  ๊ฐ€์‹œ์„ฑ, ๊ด€๋ฆฌ ๋ฐ ์ •์ฑ… ์ ์šฉ
  • ๊ทœ์ • ์ค€์ˆ˜ ๊ด€๋ฆฌ, ๋ชจ๋‹ˆํ„ฐ๋ง ๋ฐ ๋ณด๊ณ ๋ฅผ ๊ธฐ๋ณธ์ ์œผ๋กœ ์ง€์›
  • ๊ธฐ๋ณธ ๋ถ„์„ ์†”๋ฃจ์…˜์œผ๋กœ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ฐ€์šฉ์„ฑ์„ ๋†’์ด๊ณ  IT ๋ฆฌ์†Œ์Šค ์ ˆ์•ฝ
FortiDeceptor complements an organizationโ€™s existing breach protection strategy by deceiving, exposing, and eliminating attacks originating from internal and external sources before real damage occurs. FortiInsight user and entity behavior analytics (UEBA) technology detects behavioral anomalies and noncompliant activity that may represent possible insider threats. FortiSandbox offers a powerful combination of advanced detection, automated mitigation, actionable insight, and flexible deployment to stop targeted attacks and subsequent data loss. FortiClient strengthens endpoint security through integrated visibility, control, and proactive defense and enables organizations to discover, monitor, and assess endpoint risks in real time. FortiEDR provides advanced endpoint threat prevention, detection, and response with minimal impact on system performance and availability. FortiGate NGFWs utilize purpose-built cybersecurity processors to deliver top-rated protection, end-to-end visibility and centralized control, as well as high-performance inspection of clear-texted and encrypted traffic. FortiWeb web application firewall secures cloud-based resources and DevOps environments by protecting against known and unknown threats, including sophisticated threats such as SQL injection, cross-site scripting, buffer overflows, and DDoS attacks. FortiNAC provides visibility across the entire network and the ability to control access for all devices and users, including dynamic, automated responses. The FortiAuthenticator identity and access management solution and FortiToken tokens grant access to users on a need-to-know basis. FortiSIEM simplifies security information and event management by delivering visibility, automated response, and fast remediation in a single solution. FortiGate Secure SD-WAN combines next-generation firewall (NGFW) security, advanced routing, and WAN optimization capabilities to deliver high performance and security in a unified offering.
Headquarters Network Security deception insiderthreatmap securitysandbox endpoint FortiEDR FortiGate WAF FortiNAC authentication siem SD-WAN
์ž์„ธํ•œ ์ •๋ณด๋Š” ๋‹ค์ด์–ด๊ทธ๋žจ์˜ ๊ฐ ์„น์…˜์„ ํด๋ฆญํ•˜์—ฌ ํ™•์ธํ•˜์„ธ์š”

POS์˜ PCI ๊ทœ์ • ์ค€์ˆ˜

PCI DSS(๊ฒฐ์ œ ์นด๋“œ ์‚ฐ์—… ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ํ‘œ์ค€)๋Š” ํ†ต์‹  ์„œ๋น„์Šค ์‚ฌ์—…์ž(CSP)์—๊ฒŒ๋Š” ํฐ ๊ณ ๋ฏผ๊ฑฐ๋ฆฌ์ž…๋‹ˆ๋‹ค. ๋ฆฌํ…Œ์ผ ๋งค์žฅ์€ ์ „๊ตญ์— ํฉ์–ด์ ธ ์žˆ๊ธฐ ๋•Œ๋ฌธ์— ์†Œ๋น„์ž ๊ฒฐ์ œ ์นด๋“œ ๋ฐ์ดํ„ฐ๋ฅผ ์ถ”์ ํ•˜๊ณ  ๋ณดํ˜ธํ•˜๋Š” ๊ณผ์ •์ด ๋ณต์žกํ•ฉ๋‹ˆ๋‹ค. ์ƒˆ๋กœ์šด PCI ์†Œํ”„ํŠธ์›จ์–ด ๋ณด์•ˆ ํ”„๋ ˆ์ž„์›Œํฌ(SSF)๊ฐ€ ๊ณต๊ฐœ๋˜๋ฉด ์ด๋Ÿฌํ•œ ์š”๊ฑด์€ ๋”์šฑ ์—„๊ฒฉํžˆ ์ ์šฉ๋˜๊ณ , ๊ทœ์ •์„ ์ค€์ˆ˜ํ•˜๋ฉด์„œ ๊ทธ ์ƒํƒœ๋ฅผ ์œ ์ง€ํ•˜๋Š” ๊ณผ์ •์˜ ๋ณต์žก์„ฑ์ด ์ปค์งˆ ๊ฒƒ์ž…๋‹ˆ๋‹ค.

๊ทœ์ •์„ ์ค€์ˆ˜ํ•˜๊ณ  ๊ทธ ์ƒํƒœ๋ฅผ ์œ ์ง€ํ•˜๋ ค๋ฉด ์ด๋ฅผ ์œ„ํ•œ ํ†ตํ•ฉ์ ์ด๊ณ  ๊ณ„ํš์ ์ธ ์ „๋žต์ด ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค. ๋งŽ์€ ๊ธฐ์—…์ด ๊ทœ์ œ ์š”๊ฑด์— ๋งž์ถฐ ๋ณด์•ˆ ์ปจํŠธ๋กค์„ ๊ตฌํ˜„ํ•˜๊ณ ์ž ํ•ฉ๋‹ˆ๋‹ค. ์ด๋Ÿฐ ๋…ธ๋ ฅ์€ ๋Œ€๊ฐœ ๊ธฐ๋ณธ ๊ตฌ์กฐ ์—†์ด ํฌ์ธํŠธ ๋ณด์•ˆ ์†”๋ฃจ์…˜์ด ์–ด์ง€๋Ÿฝ๊ฒŒ ํฉ์–ด์ง€๋Š” ๊ฒฐ๊ณผ๋กœ ๋๋‚˜๊ณ  ์‹ค์งˆ์  ๋ณด์•ˆ ํ˜œํƒ์€ ๊ฑฐ์˜ ์—†๊ฑฐ๋‚˜ ์ „ํ˜€ ๋ฐœ์ƒํ•˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค.ย  ย  ย  ย  ย  ย  ย ย 

๋ฆฌํ…Œ์ผ ๋งค์žฅ์œผ๋กœ ๊ตฌ์„ฑ๋œ ํšŒ์‚ฌ ๋„คํŠธ์›Œํฌ๊ฐ€ ํ™•์žฅ๋˜๊ณ  PCI ์š”๊ฑด์ด ๋ณต์žกํ•ด์งˆ์ˆ˜๋ก, ๊ทœ์ • ์ค€์ˆ˜ ์ƒํƒœ๋ฅผ ์œ ์ง€ํ•˜๊ณ  ์ž…์ฆํ•˜๋Š” ๋ฐ ํ•„์š”ํ•œ ๋„คํŠธ์›Œํฌ ์ „์ฒด์  ๊ฐ€์‹œ์„ฑ๊ณผ ์ค‘์•™ ์ง‘์ค‘ํ˜• ๊ด€๋ฆฌ๋Š” ๋‹ฌ์„ฑํ•˜๊ธฐ ์–ด๋ ต๊ฒŒ ๋ฉ๋‹ˆ๋‹ค. ๋””์ง€ํ„ธ ํ˜์‹  ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ๋Š” IT์™€ ๋ณด์•ˆํŒ€์˜ ๋ถ€๋‹ด์„ ๊ฐ€์ค‘ํ•ฉ๋‹ˆ๋‹ค. ์ƒˆ๋กœ์šด ๊ธฐ๊ธฐ๊ฐ€ ๋„คํŠธ์›Œํฌ์— ์ถ”๊ฐ€๋˜๊ณ  ํšŒ์‚ฌ์˜ ๋””์ง€ํ„ธ ์˜์—ญ์ด ํด๋ผ์šฐ๋“œ๋กœ ํ™•์žฅ๋˜๊ธฐ ๋•Œ๋ฌธ์ž…๋‹ˆ๋‹ค. ๊ฒŒ๋‹ค๊ฐ€ ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…์˜ ์„ฑ์žฅ๋„ ์ด๋Ÿฐ ํ˜„์ƒ์„ ๋”์šฑ ์•…ํ™”ํ•ฉ๋‹ˆ๋‹ค. ๊ธฐ์—…์—์„œ๋Š” ํด๋ผ์šฐ๋“œ ์ธํ”„๋ผ์—์„œ ์ฒ˜๋ฆฌ๋˜๊ณ  ์ €์žฅ๋˜๋Š” ๋ณดํ˜ธ ๋Œ€์ƒ ๋ฐ์ดํ„ฐ๋ฅผ ์ ์ ˆํžˆ ๋ณดํ˜ธํ•˜๊ณ  ์•ก์„ธ์Šค ๊ถŒํ•œ์„ ๊ด€๋ฆฌํ•ด์•ผ ํ•˜๋Š”๋ฐ, ์ด๋ฅผ ์™„์ „ํžˆ ํ†ต์ œํ•  ์ˆ˜๋Š” ์—†์Šต๋‹ˆ๋‹ค.

ํฌํ‹ฐ๋„ท ์‹œํ๋ฆฌํ‹ฐ ํŒจ๋ธŒ๋ฆญ์„ ์‚ฌ์šฉํ•˜๋Š” CSP๋Š” PCI DSS/SSF ๋ฐ ๋‹ค๋ฅธ ๊ทœ์ • ์ค€์ˆ˜ ์˜์—ญ์— ํ•„์š”ํ•œ ์ค‘์•™ ์ง‘์ค‘ํ˜• ๊ฐ€์‹œ์„ฑ๊ณผ ์ปจํŠธ๋กค์„ ์–ป์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์‹œํ๋ฆฌํ‹ฐ ํŒจ๋ธŒ๋ฆญ์—๋Š” ํŒจ๋ธŒ๋ฆญ ์ปค๋„ฅํ„ฐ 12๊ฐœ, ํŒจ๋ธŒ๋ฆญ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ํ”„๋กœ๊ทธ๋ž˜๋ฐ ์ธํ„ฐํŽ˜์ด์Šค(API) 135๊ฐœ ์ด์ƒ์ด ํฌํ•จ๋˜์–ด ์žˆ์œผ๋ฉฐ, ํƒ€์‚ฌ ํ†ตํ•ฉ์ด ๊ธฐ๋ณธ์œผ๋กœ ์ œ๊ณต๋ฉ๋‹ˆ๋‹ค. ์œ„ํ˜‘์„ ๊ณต์œ ํ•˜๋Š” 30๊ฐœ ์ด์ƒ ๊ธฐ์—…๊ณผ ํ˜‘์—…ํ•˜๊ณ , ํƒ€์‚ฌ ๊ณต๊ธ‰์—…์ฒด ์ œํ’ˆ 100๊ฐœ ์ด์ƒ๊ณผ ํ†ตํ•ฉ๋œ ๊ฐœ๋ฐฉ์  API ์—์ฝ”์‹œ์Šคํ…œ์„ ํ†ตํ•ด ๋ชจ๋“  ๋ณด์•ˆ ์†”๋ฃจ์…˜์— ๊ฐ„ํŽธํ•œ ํ†ตํ•ฉ๊ณผ ์ค‘์•™ ์ง‘์ค‘ํ˜• ๊ด€๋ฆฌ๋ฅผ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค.

ํฌํ‹ฐ๋„ท ์‹œํ๋ฆฌํ‹ฐ ํŒจ๋ธŒ๋ฆญ์ด ์ œ๊ณตํ•˜๋Š” ๋ณด์•ˆ ํ†ตํ•ฉ์€ ๋‹ค์Œ๊ณผ ๊ฐ™์ด CSP๋ฅผ ์œ„ํ•œ ๊ทœ์ • ์ค€์ˆ˜ ๊ด€๋ จ ๊ธฐ๋Šฅ์„ ๋‹ค์–‘ํ•˜๊ฒŒ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

  • PCI DSS ๋ฐ ์ฃผ์š” ๊ทœ์ •์— ๋Œ€ํ•œ ๊ธฐ๋ณธ ๋ณด๊ณ  ํ…œํ”Œ๋ฆฟ
  • ๋„คํŠธ์›Œํฌ ์ „์ฒด์ ์œผ๋กœ ๋ณด์•ˆ ์ •์ฑ…์„ ํ•œ ๋ฒˆ์— ๊ด€๋ฆฌํ•˜๊ณ  ์ ์šฉํ•˜๋Š” ๊ธฐ๋Šฅ
  • ๋„คํŠธ์›Œํฌ ์ „์ฒด ํ† ํด๋กœ์ง€ ๋งคํ•‘์„ ์œ„ํ•œ ์ž๋™ ๊ธฐ๊ธฐ ์‹๋ณ„
  • ํฌํ‹ฐ๋„ท ์ œํ’ˆ๊ณผ ํŒจ๋ธŒ๋ฆญ ์ง€์› ํŒŒํŠธ๋„ˆ ์†”๋ฃจ์…˜์˜ ์‹ค์‹œ๊ฐ„ ์›๊ฒฉ ์ธก์ • ๋ฐ์ดํ„ฐ
  • ์˜คํ† ๋ฉ”์ด์…˜ ์Šคํ‹ฐ์นญ์„ ๋น„๋กฏํ•œ ์ž๋™ ํƒ์ง€ ๋ฐ ๋Œ€์‘
FortiAnalyzer provides analytics-powered cybersecurity and log management to provide better detection against breaches. FortiManager supports network operations use cases for centralized management, best practices compliance, and workflow automation to provide better protection against breaches. FortiGate Secure SD-WAN combines next-generation firewall (NGFW) security, advanced routing, and WAN optimization capabilities to deliver high performance and security in a unified offering.
Digital Innovation Diagram FortiAnalyzer FortiManager sd-wan
์ž์„ธํ•œ ์ •๋ณด๋Š” ๋‹ค์ด์–ด๊ทธ๋žจ์˜ ๊ฐ ์„น์…˜์„ ํด๋ฆญํ•˜์—ฌ ํ™•์ธํ•˜์„ธ์š”

์ง€์ ์„ ์œ„ํ•œ ์•ˆ์ „ํ•œ ๋„คํŠธ์›Œํฌ

ํ†ต์‹  ์„œ๋น„์Šค ์‚ฌ์—…์ž(CSP) ์ง€์ ์—์„œ๋Š” ๋น ๋ฅด๊ณ  ์•ˆ์ •์ ์ธ ํ™•์žฅํ˜• ๋„คํŠธ์›Œํฌ ์—ฐ๊ฒฐ์— ์•ก์„ธ์Šคํ•  ์ˆ˜ ์žˆ์–ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ๋ฆฌํ…Œ์ผ ๋งค์žฅ์—์„œ๋Š” ์ˆ˜์‹œ๋กœ ๊ณ ๊ฐ์„ ์œ„ํ•œ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ณ  ์ ๊ฒ€์ด ํ•„์š”ํ•˜๋ฏ€๋กœ, ๊ณ ๊ฐ ๋ฐ์ดํ„ฐ์— ์‹ ์†ํ•˜๊ฒŒ ์•ก์„ธ์Šคํ•˜๊ณ  ์•ˆ์ •์ ์ด๊ณ  ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๋Š” ๋„คํŠธ์›Œํฌ ์—ฐ๊ฒฐ์ด ํ•„์š”ํ•œ ํ…Œ์ŠคํŠธ๊ฐ€ ๊ฐ€๋Šฅํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.

๊ธฐ์กด์˜ ๋‹ค์ค‘ ํ”„๋กœํ† ์ฝœ ๋ ˆ์ด๋ธ” ์Šค์œ„์นญ(MPLS) ํšŒ์„ ์„ ํ†ตํ•ด ์ด ์—ฐ๊ฒฐ์„ ๋ฐฐํฌํ•˜๋Š” ๋ฐ๋Š” ํฐ ๋น„์šฉ์ด ๋“ค๊ณ , ์†”๋ฃจ์…˜๋„ ์œ ์—ฐํ•˜์ง€ ๋ชปํ•ฉ๋‹ˆ๋‹ค. ๊ทธ์— ๋น„ํ•ด, ์†Œํ”„ํŠธ์›จ์–ด ์ •์˜ ๊ด‘์—ญ ๋„คํŠธ์›Œํฌ(SD-WAN)๋Š” MPLS์— ์•ˆ์ •์„ฑ์„ ๋ณด์žฅํ•˜๋ฉด์„œ๋„ ๊ด‘๋Œ€์—ญ ์—ฐ๊ฒฐ์„ ํ†ตํ•ด ์šด์˜๋ฉ๋‹ˆ๋‹ค. SD-WAN์€ ์—ฌ๋Ÿฌ ๊ฐ€์ง€ ์ „์†ก ๋ฏธ๋””์–ด ์‚ฌ์šฉ์„ ์ตœ์ ํ™”ํ•จ์œผ๋กœ์จ ์ด์†Œ์œ ๋น„์šฉ(TCO)์€ ๋‚ฎ์ถ”๊ณ  ์—ฐ๊ฒฐ ์†๋„๋Š” ๋†’์ž…๋‹ˆ๋‹ค. ๋„คํŠธ์›Œํฌ ์ธํ”„๋ผ๋ฅผ ์ตœ์ ํ™”ํ•˜๋ฉด ๋„คํŠธ์›Œํฌ ์„ฑ๋Šฅ์ด ๊ฐœ์„ ๋˜๊ณ , ์—”ํ„ฐํ”„๋ผ์ด์ฆˆ ๋ฐ์ดํ„ฐ ์„ผํ„ฐ์—์„œ ๋ถ€ํ•˜๊ฐ€ ๊ฐ์†Œํ•ด ์šด์˜ ํšจ์œจ์ด ํ–ฅ์ƒ๋ฉ๋‹ˆ๋‹ค. ๋”ฐ๋ผ์„œ CSP๋Š” ์„œ๋น„์Šค ์ˆ˜์ค€ ๊ณ„์•ฝ(SLA)์„ ์ค€์ˆ˜ํ•˜๋ฉด์„œ๋„ ์šด์˜ ๊ฒฝ๋น„(OpEx)๋ฅผ ์ตœ์†Œํ™”ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

SD-WAN์„ ๋ฐฐํฌํ•  ๋•Œ๋Š” ์ถ”๊ฐ€์  ๋ณด์•ˆ ํ”„๋กœ๋น„์ €๋‹์ด ํ•„์š”ํ•˜๋‹ค๋Š” ๊ฒƒ์„ ๊ณ ๋ คํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. SD-WAN ๊ธฐ๋Šฅ์„ ์ œ๋Œ€๋กœ ์‚ฌ์šฉํ•˜๋ ค๋ฉด ๋„คํŠธ์›Œํฌ ์—ฃ์ง€์— ๋ณด์•ˆ์„ ๋ฐฐํฌํ•ด์•ผ ํ•ด์„œ, ๊ฒฐ๊ณผ์ ์œผ๋กœ ์—ฌ๋Ÿฌ ๊ฐœ์˜ ํฌ์ธํŠธ ์ œํ’ˆ์„ ์‚ฌ์šฉํ•˜๊ฒŒ ๋ฉ๋‹ˆ๋‹ค. ํฌํ‹ฐ๋„ท Secure SD-WAN์€ ๊ทธ๋ ‡์ง€ ์•Š์Šต๋‹ˆ๋‹ค. Secure SD-WAN์€ ์‹œ์ค‘์˜ ๋‹ค๋ฅธ ์†”๋ฃจ์…˜๊ณผ ๋‹ฌ๋ฆฌ, ๊ฐ•๋ ฅํ•œ SD-WAN ์œ„ํ˜‘ ๋ณดํ˜ธ๋ฅผ ํฌํ•จํ•œ ์˜ฌ์ธ์› ์†”๋ฃจ์…˜์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๋‚ด์žฅ๋œ ์ฐจ์„ธ๋Œ€ ๋ฐฉํ™”๋ฒฝ(NGFW)์ด L3~L7๊นŒ์ง€ ๋ณด์•ˆ ์ปจํŠธ๋กค์„ ์ œ๊ณตํ•˜๊ณ , ์—…๊ณ„ ์ตœ์ดˆ์˜ SD-WAN ์ „์šฉ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์ง‘์  ํšŒ๋กœ(ASIC) ์นฉ์ด ํƒ‘์žฌ๋œ ์–ดํ”Œ๋ผ์ด์–ธ์Šค๋กœ ์—…๊ณ„ ์ตœ๊ณ ์˜ ์„ฑ๋Šฅ์„ ์„ ๋ณด์ž…๋‹ˆ๋‹ค. ๋˜ํ•œ, ํฌํ‹ฐ๋„ท Secure SD-WAN ์–ดํ”Œ๋ผ์ด์–ธ์Šค์—๋Š” ํ†ตํ•ฉ ์นจ์ž… ๋ฐฉ์ง€ ์‹œ์Šคํ…œ(IPS)์ด ๋‚ด์žฅ๋˜์–ด ์žˆ์–ด์„œ, ์ง€์ ์—์„œ ์™„์ „ํ•œ ํŠธ๋ž˜ํ”ฝ ๊ฒ€์‚ฌ๊ฐ€ ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ํŠธ๋ž˜ํ”ฝ์„ ๋ชฉ์ ํ•˜๋Š” ๋Œ€์ƒ์œผ๋กœ ์ง์ ‘ ๋ผ์šฐํŒ…ํ•ด์„œ ๋ณด์•ˆ์„ ํ•ด์น˜์ง€ ์•Š๊ณ  (ํŠนํžˆ, ํด๋ผ์šฐ๋“œ์— ๋ฐ”์ธ๋”ฉ๋œ ํŠธ๋ž˜ํ”ฝ์˜) ๋„คํŠธ์›Œํฌ ์„ฑ๋Šฅ์„ ๊ฐœ์„ ํ•ฉ๋‹ˆ๋‹ค.

ํฌํ‹ฐ๋„ท Secure SD-Branch๋Š” ํฌํ‹ฐ๋„ทย SD-Branch๋กœ ์ง€์  ๋ณด์•ˆ์„ ํ™•์žฅํ•˜๊ธฐ ์œ„ํ•œ ๊ธฐ๋ฐ˜์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ํฌํ‹ฐ๋„ท SD-Branch๋Š” ์ธํ„ฐ๋„ท์—์„œ ์Šค์œ„์นญ ๋ ˆ์ด์–ด๊นŒ์ง€ ์ง€์ ์—์„œ ๋ณด์•ˆ ์ธํ”„๋ผ์˜ ๊ฐ€์‹œ์„ฑ ๋ฐ ๊ด€๋ฆฌ ๊ธฐ๋Šฅ์„ ํ•œ ๊ณณ์—์„œ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๋ณด์•ˆ ๊ด€์ œ์˜ ํšจ์œจ์ด ํ–ฅ์ƒ๋˜๋ฉฐ, ๋ณด์•ˆ ์ปจํŠธ๋กค์˜ ์ ์šฉ๊ณผ ๊ทœ์ • ์ค€์ˆ˜ ํ™œ๋™ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘์„ ๊ฐ„๋‹จํžˆ ์ฒ˜๋ฆฌํ•  ์ˆ˜ ์žˆ๊ณ , ์—”ํ„ฐํ”„๋ผ์ด์ฆˆ WAN์˜ ๊ฐ€์‹œ์„ฑ๊ณผ ๋ณด์•ˆ์ด ๊ฐœ์„ ๋ฉ๋‹ˆ๋‹ค. CSP๋Š” ์˜ค๋ฒ„ํ—ค๋“œ๋ฅผ ๋‚ฎ์ถ”๊ณ  OpEx๋ฅผ ์ตœ์ ํ™”ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ํฌํ‹ฐ๋„ท SD-Branch์—์„œ FortiAP๋ฌด์„  ์•ก์„ธ์Šค ํฌ์ธํŠธ๋Š” ๋น„์ฆˆ๋‹ˆ์Šค ๋ฐ ๊ฒŒ์ŠคํŠธ ๋„คํŠธ์›Œํฌ์— ์•ˆ์ „ํ•œ ๊ณ ์„ฑ๋Šฅ ๋„คํŠธ์›Œํฌ ์—ฐ๊ฒฐ์„ ์ œ๊ณตํ•˜๊ณ , FortiNAC๋„คํŠธ์›Œํฌ์— ์—ฐ๊ฒฐ๋œ ๋ชจ๋“  ๊ธฐ๊ธฐ์— ์ž๋™ ์‹๋ณ„ ๋ฐ ์•ก์„ธ์Šค ์ œ์–ด๋ฅผ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค.

ํฌํ‹ฐ๋„ท Secure SD-WAN์ด ์ œ๊ณตํ•˜๋Š” ์•ˆ์ •์ ์ด๊ณ  ์•ˆ์ „ํ•œ ๋„คํŠธ์›Œํฌ ์—ฐ๊ฒฐ์„ ์‚ฌ์šฉํ•˜๋Š” ์ง€์ ์—์„œ๋Š” ๋Œ€์—ญํญ ์‚ฌ์šฉ๋Ÿ‰, ๊ฐ€์šฉ์„ฑ, ํ™˜๊ฒฝ ํ’ˆ์งˆ์— ๋Œ€ํ•œ ๊ฑฑ์ • ์—†์ด ๋ณ„๋„์˜ ์ „ํ™” ์„œ๋น„์Šค ๋Œ€์‹  VoIP(Voice over IP)๋ฅผ ๋ฐฐํฌํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋•Œ FortiVoice๋Š” ํฌํ‹ฐ๋„ท SD-Branch์— ๋‚ด์žฅ๋œ ์Šค์œ„์นญ ๋ฐ ์•ก์„ธ์Šค ์ œ์–ด ๊ธฐ๋Šฅ์„ ์‚ฌ์šฉํ•˜์—ฌ ๋‹ค๋ฅธ ๋น„์ฆˆ๋‹ˆ์Šค์™€ ๊ณต์šฉ Wi-Fi ๋„คํŠธ์›Œํฌ์™€ ๋ถ„๋ฆฌํ•  ์ˆ˜ ์žˆ๊ณ , ์‰ฝ๊ฒŒ ๊ตฌ์„ฑํ•  ์ˆ˜ ์žˆ๋Š” ์œ ์—ฐํ•œ VoIP ์†”๋ฃจ์…˜์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๋„คํŠธ์›Œํฌ ์žฅ์• ๊ฐ€ ๋ฐœ์ƒํ–ˆ์„ ๋•Œ ์—ฐ๊ฒฐ์„ ์œ ์ง€ํ•˜๊ธฐ ์œ„ํ•ดย FortiExtender๊ฐ€ 3G/4G/LTE/5G ๋ฐฑ์—… ์†”๋ฃจ์…˜์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

CSP๋Š” ์„ฑ๋Šฅ ๋ฐ ๋ณด์•ˆ ๊ธฐ์ค€์„ ์ถฉ์กฑํ•˜๊ณ , ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•˜๋Š” ๋„คํŠธ์›Œํฌ ์†”๋ฃจ์…˜์„ ์„ ํƒํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.

  • ์ž๋™ ์ธ์‹์„ ์œ„ํ•œ 5,000๊ฐœ ์ด์ƒ์˜ ์„œ๋ช…, ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ํŠธ๋ž˜ํ”ฝ์˜ ์ตœ์  ๋ผ์šฐํŒ…
  • ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค๋ฅผ ์œ„ํ•œ FortiGuard Labs์˜ ๋ฉ€์›จ์–ด ์„œ๋ช… ์—…๋ฐ์ดํŠธ
  • ํ†ตํ•ฉ ์ฐจ์„ธ๋Œ€ ๋ฐฉํ™”๋ฒฝ(NGFW), ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค, ์นจ์ž… ๋ฐฉ์ง€ ์‹œ์Šคํ…œ(IPS) ๋ฐ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์ œ์–ด๋ฅผ ํ†ตํ•œ ์™„์ „ํ•œ ์œ„ํ˜‘ ๋ณดํ˜ธ
  • SSL ๋ฐ TLS ํŠธ๋ž˜ํ”ฝ์„ ๋Œ€๋Ÿ‰์œผ๋กœ ๊ฒ€์‚ฌํ•˜์—ฌ ์šฐ์ˆ˜ํ•œ ์„ฑ๋Šฅ์˜ ํฌ๊ด„์  ์œ„ํ˜‘ ๋ณดํ˜ธ ์ œ๊ณต
  • ๋…๋ฆฝ์  ๋ณด์•ˆ ์›น ๊ฒŒ์ดํŠธ์›จ์ด(SWG) ๋Œ€์‹  ํ†ตํ•ฉ ์›น ํ•„ํ„ฐ๋ง ์ œ๊ณต
  • ๊ธฐ๋ฐ€ ํŠธ๋ž˜ํ”ฝ์„ ์•”ํ˜ธํ™”ํ•˜๊ธฐ ์œ„ํ•œ ๊ณ ์„ฑ๋Šฅ ํ™•์žฅํ˜• ๊ฐ€์ƒ ์‚ฌ์„ค๋ง(VPN) ํ„ฐ๋„

ํฌํ‹ฐ๋„ท SD-Branch๋Š” CSP๊ฐ€ ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๊ธฐ๋Šฅ์„ ์‚ฌ์šฉํ•˜์—ฌ ์ค‘์•™ ์ง‘์ค‘ํ˜• ๋ณด์•ˆ ๊ฐ€์‹œ์„ฑ๊ณผ ๊ด€๋ฆฌ ๊ธฐ๋Šฅ์„ ์ง€์ ์—๊นŒ์ง€ ํ™•์žฅํ•˜๋„๋ก ์ง€์›ํ•ฉ๋‹ˆ๋‹ค.

  • FortiGate NGFW ๋ฐ FortiNAC๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๋„คํŠธ์›Œํฌ์— ์—ฐ๊ฒฐ๋œ ์‚ฌ๋ฌผ์ธํ„ฐ๋„ท(IoT) ๊ธฐ๊ธฐ๋ฅผ ์ž๋™ ๋ฐœ๊ฒฌ ๋ฐ ๋ณดํ˜ธ
  • ์œ ๋ฌด์„  ๋„คํŠธ์›Œํฌ์— ์™„์ „ํ•œ ๋ณด์•ˆ ํ†ตํ•ฉ
  • ๋‹จ์ผ ๋Œ€์‹œ๋ณด๋“œ ๊ฐ€์‹œ์„ฑ๊ณผ ๊ด€๋ฆฌ๋ฅผ ์‚ฌ์šฉํ•œ ์ž๋™ ๊ธฐ๊ธฐ ํ”„๋กœ๋น„์ €๋‹
  • ๋ฐฉํ™”๋ฒฝ, ์ด๋”๋„ท ์Šค์œ„์น˜, WLAN ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ํ•œ ๊ณณ์—์„œ ๊ด€๋ฆฌ
FortiGate Secure SD-WAN combines next-generation firewall (NGFW) security, advanced routing, and WAN optimization capabilities to deliver high performance and security in a unified offering. Fortinet SD-Branch enables customers to converge their security and network access, extending the benefits of the Fortinet Security Fabric to their distributed branches. It includes switching, wireless access, and network access control components.
Secure Networking sdwan sd-branch
์ž์„ธํ•œ ์ •๋ณด๋Š” ๋‹ค์ด์–ด๊ทธ๋žจ์˜ ๊ฐ ์„น์…˜์„ ํด๋ฆญํ•˜์—ฌ ํ™•์ธํ•˜์„ธ์š”

์ง€๋Šฅํ˜• ์œ„ํ˜‘ ๋ณดํ˜ธ

ํ†ต์‹ฌ ์„œ๋น„์Šค ์‚ฌ์—…์ž(CSP)๋Š” ์ˆ˜์‹œ๋กœ ๋ฉ€์›จ์–ด ๊ณต๊ฒฉ์˜ ํ‘œ์ ์ด ๋ฉ๋‹ˆ๋‹ค. CSP์˜ ๋„คํŠธ์›Œํฌ๋ฅผ ๊ฑฐ์ ์œผ๋กœ ์‚ผ์•„ ๊ณ ๊ฐ๊ณผ์˜ ์‹ ๋ขฐ ๊ด€๊ณ„๋ฅผ ์ด์šฉํ•ด ๊ณ ๊ฐ์—๊ฒŒ๊นŒ์ง€ ๋ฉ€์›จ์–ด๋ฅผ ํ™•์‚ฐํ•˜๋Š” ๋ฐ ์ด์šฉํ•ฉ๋‹ˆ๋‹ค. CSP๋Š” ๋„คํŠธ์›Œํฌ์—์„œ ์›€์ง์ด๋Š” ๋ฉ€์›จ์–ด๋ฅผ ํƒ์ง€ํ•˜๊ณ  ์ฐจ๋‹จํ•  ์ˆ˜ ์žˆ์–ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ FortiGuard Labs์˜ ๋ถ„์„์— ๋”ฐ๋ฅด๋ฉด,ย ๋งค์ผ ํƒ์ง€๋˜๋Š” ์ƒˆ๋กœ์šด ๋ฉ€์›จ์–ด์˜ 40%๊ฐ€ ์ œ๋กœ๋ฐ์ด ๋ฉ€์›จ์–ด์ด๊ฑฐ๋‚˜ ์ฒ˜์Œ์œผ๋กœ ๋ฐœ๊ฒฌ๋œ ๋ฉ€์›จ์–ด์ž…๋‹ˆ๋‹ค.ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย ย 

์ง€๋Šฅํ˜• ์œ„ํ˜‘ ๋ณดํ˜ธ๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๊ธฐ๋Šฅ์„ ํฌํ•จํ•œ ๋‹ค๊ณ„์ธต ๋ฐฉ์–ด๊ฐ€ ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค.

  • ์•Œ๋ ค์ง„/์•Œ๋ ค์ง€์ง€ ์•Š์€ ์œ„ํ˜‘ ์‹๋ณ„ ๋ฐ ์ฐจ๋‹จ
  • ๋‚ด๋ถ€ ์œ„ํ˜‘ ํƒ์ง€ ๋ฐ ๋ณต๊ตฌ ์—…๋ฐ์ดํŠธ
  • ์ƒŒ๋“œ๋ฐ•์Šค์—์„œ ์˜์‹ฌ์Šค๋Ÿฌ์šด ์ฝ˜ํ…์ธ ๋ฅผ ์ž๋™ ๊ฒฉ๋ฆฌ ๋ฐ ๋ถ„์„
  • ๋””์…‰์…˜ ๊ธฐ์ˆ ์„ ํ™œ์šฉํ•˜์—ฌ ๋‚ด๋ถ€ ์œ„ํ˜‘ ๋ฐœ๊ฒฌ
  • ์ธ๊ณต ์ง€๋Šฅ(AI) ๋ฐ ๋จธ์‹  ๋Ÿฌ๋‹(ML) ์ค‘์‹ฌ์˜ ์‹ค์‹œ๊ฐ„ ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค
  • ์ง€์†์ ์ธ ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค ๋ฐ ๋ฉ€์›จ์–ด ์„œ๋ช… ์—…๋ฐ์ดํŠธ

FortiGuard Labs๋Š” ํ•˜๋ฃจ์— 100์–ต ๊ฐœ ์ด์ƒ์˜ ๋ณด์•ˆ ์ด๋ฒคํŠธ๋ฅผ ๋ถ„์„ํ•˜์—ฌ ์–ป์€ ๋ฐ์ดํ„ฐ๋ฅผ ํ™œ์šฉํ•˜์—ฌ ๋น ๋ฅด๊ฒŒ ์œ„ํ˜‘์„ ์ˆ˜์ง‘, ๋ถ„์„ํ•˜๊ณ  ๋งค์šฐ ์ •ํ™•ํ•˜๊ฒŒ ๋ถ„๋ฅ˜ํ•ฉ๋‹ˆ๋‹ค. AI ๋ฐ ML์„ ํ™œ์šฉํ•˜์—ฌ ๋ฉ€์›จ์–ด ์„œ๋ช…์„ ์ž‘์„ฑํ•˜๊ณ , ํฌํ‹ฐ๋„ท ์‹œํ๋ฆฌํ‹ฐ ํŒจ๋ธŒ๋ฆญ ์ „์ฒด์— ๊ฒŒ์‹œํ•ฉ๋‹ˆ๋‹ค. ํฌํ‹ฐ๋„ท ์‹œํ๋ฆฌํ‹ฐ ํŒจ๋ธŒ๋ฆญ์„ ํ†ตํ•ด ๊ธฐ์—… ๋„คํŠธ์›Œํฌ๋ฅผ ์ „์ฒด์ ์œผ๋กœ ํ†ตํ•ฉํ•˜๋ฉด ๋ณด์•ˆํŒ€์—์„œ ๋ณด์•ˆ ์˜ค์ผ€์ŠคํŠธ๋ ˆ์ด์…˜, ์ž๋™ํ™” ๋ฐ ๋Œ€์‘(SOAR)์˜ ์ตœ์‹  ๊ธฐ๋Šฅ์„ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

CSP์˜ ๋„คํŠธ์›Œํฌ๋Š” ๋„“๊ฒŒ ๋ถ„์‚ฐ๋˜์–ด ์žˆ์–ด์„œ ์•Œ๋ ค์ง€์ง€ ์•Š์€ ์œ„ํ˜‘์ด ์•ก์„ธ์Šค ๊ถŒํ•œ์„ ์–ป์„ ์ˆ˜ ์žˆ๋Š” ๋นˆํ‹ˆ์ด ์—ฌ๋Ÿฌ ๊ณณ ์žˆ์Šต๋‹ˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด ๊ณต์šฉ Wi-Fi, ๋ชจ๋ฐ”์ผ ๊ธฐ๊ธฐ, ์—ฐ๊ฒฐ๋œ ์‚ฌ๋ฌผ์ธํ„ฐ๋„ท(IoT) ๊ธฐ๊ธฐ ๋“ฑ์ด ์žˆ์Šต๋‹ˆ๋‹ค. FortiGate ์ฐจ์„ธ๋Œ€ ๋ฐฉํ™”๋ฒฝ(NGFW)์—์„œ ํƒ์ง€ํ•œ ์˜์‹ฌ์Šค๋Ÿฌ์šด ์ฝ˜ํ…์ธ ๋Š” ๋„คํŠธ์›Œํฌ๋กœ ๋ณด๋‚ด๊ธฐ ์ „์— FortiSandbox์— ์ „๋‹ฌํ•ด (SSL/TLS ์ฝ˜ํ…์ธ  ๋ณตํ˜ธํ™”๋ฅผ ํฌํ•จํ•œ) ๊ฒฉ๋ฆฌ, ๊ฒ€์‚ฌ ์ ˆ์ฐจ๋ฅผ ๊ฑฐ์นฉ๋‹ˆ๋‹ค. FortiSandbox์—์„œ ์ƒ์„ฑํ•œ ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค๋Š” ํฌํ‹ฐ๋„ท ์‹œํ๋ฆฌํ‹ฐ ํŒจ๋ธŒ๋ฆญ์„ ํ†ตํ•ด ๋‹ค๋ฅธ ๋ณด์•ˆ ์š”์†Œ์— ๊ณต์œ ๋ฉ๋‹ˆ๋‹ค. FortiEDR(์—”๋“œํฌ์ธํŠธ ํƒ์ง€ ๋ฐ ๋Œ€์‘) ์ง€๋Šฅํ˜• ์—”๋“œํฌ์ธํŠธ ๋ณดํ˜ธ๋Š” ์šฉ๋Ÿ‰์„ ๋งŽ์ด ์ฐจ์ง€ํ•˜์ง€ ์•Š๊ณ  ๋†’์€ ๊ฐ€์šฉ์„ฑ์„ ๋ณด์žฅํ•˜๋Š” ์ง€๋Šฅ์  ์—”๋“œํฌ์ธํŠธ ๋ณดํ˜ธ ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•ด, ๋น„์ฆˆ๋‹ˆ์Šค์— ์ค‘์š”ํ•œ ์‹œ์Šคํ…œ๋„ ๋ณดํ˜ธํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๋ฌผ๋ก , ์‚ฌ์ด๋ฒ„ ์œ„ํ˜‘์€ ์™ธ๋ถ€ ๊ณต๊ฒฉ์ž์—๊ฒŒ๋งŒ ๊ตญํ•œ๋˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค. FortiDeceptor๋ฅผ ์‚ฌ์šฉํ•˜๋Š” ๊ธฐ์—…์€ ๋„คํŠธ์›Œํฌ์— ๋Œ€ํ•œ ์•ก์„ธ์Šค ๊ถŒํ•œ์„ ์–ป์€ ์•…์˜์  ๋‚ด๋ถ€์ž๋‚˜ ๊ณต๊ฒฉ์ž๋ฅผ ์ฐพ์•„๋‚ผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. FortiInsight์˜ ์‚ฌ์šฉ์ž ๋ฐ ์—”ํ„ฐํ‹ฐ ๋™์ž‘ ๋ถ„์„(UEBA) ๊ธฐ๋Šฅ์€ ์—”๋“œํฌ์ธํŠธ์™€ ์‚ฌ์šฉ์ž์—๊ฒŒ์„œ ๊ธฐ์—…์„ ์œ„ํ˜‘ํ•  ๋งŒํ•œ ๋น„์ •์ƒ์ ์ด๊ฑฐ๋‚˜, ๊ทœ์ •์„ ์œ„๋ฐ˜ํ•˜๊ฑฐ๋‚˜, ์˜์‹ฌ์Šค๋Ÿฌ์šด ๋™์ž‘์„ ์ฐพ์•„๋‚ด๋Š” ๋ฐ ๋„์›€์„ ์ค๋‹ˆ๋‹ค.

FortiGate NGFWs utilize purpose-built cybersecurity processors to deliver top-rated protection, end-to-end visibility and centralized control, as well as high-performance inspection of clear-texted and encrypted traffic FortiMail protects against common threats in cloud-based and on-premises email systems. FortiSandbox offers a powerful combination of advanced detection, automated mitigation, actionable insight, and flexible deployment to stop targeted attacks and subsequent data loss. FortiDeceptor complements an organizationโ€™s existing breach protection strategy by deceiving, exposing, and eliminating attacks originating from internal and external sources before real damage occurs. FortiNAC provides visibility across the entire network and the ability to control access for all devices and users, including dynamic, automated responses. FortiIsolator accesses content and files from the web in a remote container and then renders risk-free content to users.
Advanced Threat Protection NGFW mail sandbox deception nac FortiIsolator
์ž์„ธํ•œ ์ •๋ณด๋Š” ๋‹ค์ด์–ด๊ทธ๋žจ์˜ ๊ฐ ์„น์…˜์„ ํด๋ฆญํ•˜์—ฌ ํ™•์ธํ•˜์„ธ์š”

๋‹ค์ด๋‚˜๋ฏน ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ

๊ธฐ์—…์—์„œ ๋น„์ฆˆ๋‹ˆ์Šค์— ์ค‘์š”ํ•œ ๋ฐ์ดํ„ฐ ์Šคํ† ๋ฆฌ์ง€์™€ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์— ํด๋ผ์šฐ๋“œ๋ฅผ ๋„์ž…ํ•˜๋Š” ์‚ฌ๋ก€๊ฐ€ ๋Š˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ด๋Ÿฐ ๋ฆฌ์†Œ์Šค๋Š” ๊ฐ•๋ ฅํ•œ ๋ณด์•ˆ์ด ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค. ๋Œ€๋ถ€๋ถ„ ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค ์ œ๊ณต์—…์ฒด๋Š” ๊ธฐ๋ณธ ๋ณด์•ˆ ์„ค์ •์„ ์ œ๊ณตํ•˜์ง€๋งŒ, ๊ธฐ์—…์—์„œ ์ž˜๋ชป ๊ตฌ์„ฑํ•˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋งŽ์•„ ๋ฏผ๊ฐํ•œ ๋ฐ์ดํ„ฐ๊ฐ€ ์œ ์ถœ๋˜๊ธฐ ์‰ฝ์Šต๋‹ˆ๋‹ค. ์ด์™€ ๊ฐ™์€ ๋ฌธ์ œ๊ฐ€ ์ผ์–ด๋‚˜๋Š” ๊ฐ€์žฅ ํฐ ์›์ธ์€ ํด๋ผ์šฐ๋“œ ๊ณต๋™ ์ฑ…์ž„ ๋ชจ๋ธ์— ๋Œ€ํ•œ ์˜คํ•ด์—์„œ ๋น„๋กฏ๋ฉ๋‹ˆ๋‹ค. ํด๋ผ์šฐ๋“œ ๊ณต๋™ ์ฑ…์ž„ ๋ชจ๋ธ์€ ๊ฐ ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค ์ œ๊ณต์—…์ฒด์™€ ๊ณ ๊ฐ์—๊ฒŒ ๋ถ€์—ฌ๋œ ๋ณด์•ˆ ์ฑ…์ž„๊ณผ ๊ทธ ๋‘˜ ์‚ฌ์ด์˜ ๊ณต๋™ ์ฑ…์ž„์„ ์„ค๋ช…ํ•ฉ๋‹ˆ๋‹ค.

ํด๋ผ์šฐ๋“œ์—์„œ๋Š” ์ค‘์•™ ์ง‘์ค‘์  ๊ฐ€์‹œ์„ฑ๊ณผ ์ผ๊ด€์ ์ธ ๋ณด์•ˆ ๊ตฌ์„ฑ ๊ด€๋ฆฌ๋ฅผ ๊ตฌํ˜„ํ•˜๊ธฐ๊ฐ€ ๋ณต์žกํ•ฉ๋‹ˆ๋‹ค. ํด๋ผ์šฐ๋“œ ๊ณต๊ธ‰์—…์ฒด๋งˆ๋‹ค ์„œ๋กœ ๋‹ค๋ฅธ ๋ณด์•ˆ ์ปจํŠธ๋กค๊ณผ ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ์ œ๊ณตํ•˜๊ธฐ ๋•Œ๋ฌธ์ž…๋‹ˆ๋‹ค. ํด๋ผ์šฐ๋“œ๋ฅผ ๋ณดํ˜ธํ•˜๋ ค๋ฉด ์˜จํ”„๋ ˆ๋ฏธ์Šค์™€ ํด๋ผ์šฐ๋“œ ๋ฐฐํฌ์— ๋Œ€ํ•œ ๊ฐ€์‹œ์„ฑ์„ ํ•œ ๊ณณ์—์„œ ์ œ๊ณตํ•ด์•ผ ํ•˜๊ณ , ๋ฉ€ํ‹ฐ ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์—์„œ ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์— ์ผ๊ด€์  ๋ณด์•ˆ ๋ฐ ์ •์ฑ… ๊ด€๋ฆฌ๋ฅผ ์ œ๊ณตํ•  ๋ณด์•ˆ ์†”๋ฃจ์…˜์ด ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค.

๋ฉ€ํ‹ฐ ํด๋ผ์šฐ๋“œ ๋„คํŠธ์›Œํฌ๋ฅผ ๋ณดํ˜ธํ•˜๋Š” ์ฒซ ๋‹จ๊ณ„๋Š” ๋„คํŠธ์›Œํฌ ์ „์ฒด์— ๋Œ€ํ•œ ๊ฐ€์‹œ์„ฑ๊ณผ ์ค‘์•™ ์ง‘์ค‘์  ๊ตฌ์„ฑ ๊ด€๋ฆฌ๋ฅผ ํ™•๋ณดํ•˜๋Š” ๊ฒƒ์ž…๋‹ˆ๋‹ค. ํฌํ‹ฐ๋„ท ์‹œํ๋ฆฌํ‹ฐ ํŒจ๋ธŒ๋ฆญ์€ ์ฃผ์š” ํด๋ผ์šฐ๋“œ ๊ณต๊ธ‰์—…์ฒด ๋ฐ 250๊ฐœ ์ด์ƒ์˜ ํƒ€์‚ฌ ๋ณด์•ˆ ์†”๋ฃจ์…˜๊ณผ ๊ธฐ๋ณธ ํ†ตํ•ฉ๋ฉ๋‹ˆ๋‹ค. ๊ฐ ํด๋ผ์šฐ๋“œ ๋ฐฐํฌ ์‚ฌ์ด์˜ ์‚ฌ์ผ๋กœ๋ฅผ ๋ฌด๋„ˆ๋œจ๋ ค, ๋„คํŠธ์›Œํฌ ์ „์ฒด์— ๋Œ€ํ•œ ๊ฐ€์‹œ์„ฑ์„ ํ†ตํ•ฉ์ ์œผ๋กœ ์ œ๊ณตํ•˜๊ณ  ๋ณด์•ˆ ์ •์ฑ…์„ ์ ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ค‘์•™ ์ง‘์ค‘์  ์ปจํŠธ๋กค์ด ์žˆ์œผ๋ฉด ๋ณด์•ˆํŒ€์—์„œ๋„ ๊ฐ ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค ๊ณต๊ธ‰์—…์ฒด๊ฐ€ ์ œ๊ณตํ•˜๋Š” ๋ณด์•ˆ ์„ค์ •์„ ์ˆ˜๋™์œผ๋กœ ๊ตฌ์„ฑํ•  ํ•„์š”๊ฐ€ ์—†์Šต๋‹ˆ๋‹ค.

๊ธฐ์—…์˜ ํด๋ผ์šฐ๋“œ ๋ฐฐํฌ์— ๋Œ€ํ•œ ์™„์ „ํ•œ ๊ฐ€์‹œ์„ฑ์„ ํ™•๋ณดํ•˜๊ณ  ๋‚˜๋ฉด ์ด์ œ ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ๋ณดํ˜ธํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ๊ฒฐ์ œ ์นด๋“œ ์‚ฐ์—… ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ํ‘œ์ค€(PCI DSS) ๋“ฑ์˜ ๊ทœ์ •์—์„œ๋Š” ์›น ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ฐฉํ™”๋ฒฝ(WAF)์„ ์š”๊ตฌํ•ฉ๋‹ˆ๋‹ค. PCI DSS ์š”๊ฑด 6.6.์— ๋”ฐ๋ฅด๋ฉด, DevOps ํ™˜๊ฒฝ์— WAF๋Š” ํ•„์ˆ˜์ž…๋‹ˆ๋‹ค. ๋‹จ, ๊ธฐ์—…์—์„œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ์ˆ˜์ •ํ•  ๋•Œ๋งˆ๋‹ค ์ฝ”๋“œ ์ „์ฒด๋ฅผ ๊ฒ€ํ† ํ•˜๋Š” ๊ฒฝ์šฐ๋งŒ ์˜ˆ์™ธ์ž…๋‹ˆ๋‹ค.

๋”ฐ๋ผ์„œ WAF๋Š” ํšŒ์‚ฌ ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ๋ฐฐํฌ์—์„œ ์ค‘์š”ํ•œ ๋ถ€๋ถ„์„ ์ฐจ์ง€ํ•ฉ๋‹ˆ๋‹ค.ย FortiWebย WAF๋Š” ๋ฌผ๋ฆฌ์  ์–ดํ”Œ๋ผ์ด์–ธ์Šค, ๊ฐ€์ƒ ๋จธ์‹ (VM) ๋˜๋Š” ์„œ๋น„์Šคํ˜• ์†Œํ”„ํŠธ์›จ์–ด(SaaS) ํ˜•ํƒœ๋กœ ๊ธฐ์—… ์›น์‚ฌ์ดํŠธ, ๊ฒฐ์ œ ํฌํ„ธ, ์›น API๋ฅผ ํด๋ผ์šฐ๋“œ์—์„œ ๋ณดํ˜ธํ•ฉ๋‹ˆ๋‹ค.

๋˜ํ•œ, ํด๋ผ์šฐ๋“œ ๋ฐฐํฌ์— ๋Œ€ํ•œ ์•ก์„ธ์Šค ๊ถŒํ•œ์„ ์ „์ฒด์ ์œผ๋กœ ๊ด€๋ฆฌํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.ย FortiCASB์™€ FortiCWP๋Š” ํด๋ผ์šฐ๋“œ ๋„ค์ดํ‹ฐ๋ธŒ ์•ก์„ธ์Šค ์ œ์–ด์™€ ์›Œํฌ๋กœ๋“œ ๋ณดํ˜ธ๋ฅผ ์ œ๊ณตํ•จ์œผ๋กœ์จ, ๋ฉ€ํ‹ฐ ํด๋ผ์šฐ๋“œ ๋ฐฐํฌ์—์„œ ๊ฐ€์‹œ์„ฑ๊ณผ ๋ณด์•ˆ ๊ด€๋ฆฌ๋ฅผ ๋‹จ์ˆœํ™”ํ•ฉ๋‹ˆ๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœย FortiGate ์ฐจ์„ธ๋Œ€ ๋ฐฉํ™”๋ฒฝ(NGFW)์€ ํด๋ผ์šฐ๋“œ ๋„ค์ดํ‹ฐ๋ธŒ ์„œ๋น„์Šคํ˜• ์ธํ”„๋ผ(IaaS) ํผํŒฉํ„ฐ๋ฅผ ํ†ตํ•ด ๋ชจ๋“  ๋ฐฐํฌ ํ™˜๊ฒฝ์— ํ™•์žฅํ•  ์ˆ˜ ์žˆ๋Š” ๋ณด์•ˆ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

๊ธฐ์—…์—์„œ ๋ณดํ˜ธํ•ด์•ผ ํ•  ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ ์ž์‚ฐ์€ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜๊ณผ ๋ฐ์ดํ„ฐ ์Šคํ† ๋ฆฌ์ง€ ์™ธ์—๋„ ๋งŽ์Šต๋‹ˆ๋‹ค. ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ SaaS ์ด๋ฉ”์ผ ์†”๋ฃจ์…˜(์˜ˆ: Google Mail, Microsoft Office 365)์„ ํ™œ์šฉํ•˜๋Š” ๊ธฐ์—…๋„ ๋Š˜์–ด๋‚˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค.ย FortiMail์€ SaaS ๋ฐ ์˜จํ”„๋ ˆ๋ฏธ์Šค ์ด๋ฉ”์ผ ๋ฐฐํฌ๋ฅผ ๋™์ผํ•œ ์ด๋ฉ”์ผ ๊ฒŒ์ดํŠธ์›จ์ด๋กœ ๋ณดํ˜ธํ•˜๋„๋ก ์ง€์›ํ•ฉ๋‹ˆ๋‹ค.

์š”์ปจ๋Œ€, ํฌํ‹ฐ๋„ท ๋‹ค์ด๋‚˜๋ฏน ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ์†”๋ฃจ์…˜์—๋Š” ๋ฉ€ํ‹ฐ ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์—์„œ๋„ ๋ณด์•ˆ์„ ์ œ๊ณตํ•˜๋Š” ๋ฐ ํ•„์š”ํ•œ ๊ธฐ๋Šฅ์ด ํฌํ•จ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค.

  • ๋ชจ๋“  ์ฃผ์š” ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค ์ œ๊ณต์—…์ฒด์™€ ๊ธฐ๋ณธ ํ†ตํ•ฉ
  • ๋‹จ์ผ ๋Œ€์‹œ๋ณด๋“œ์—์„œ ๋ฉ€ํ‹ฐ ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์˜ ์ „์ฒด์  ๊ฐ€์‹œ์„ฑ ๋ฐ ๊ด€๋ฆฌ ์ œ๊ณต
  • ํด๋ผ์šฐ๋“œ ๋„ค์ดํ‹ฐ๋ธŒ ์›น์‚ฌ์ดํŠธ ๋ณดํ˜ธ, ์ด๋ฉ”์ผ ๋ฐ ๋ฐฉํ™”๋ฒฝ ์†”๋ฃจ์…˜
  • ๋ณด์•ˆ ์ธํ”„๋ผ ์ „์ฒด์— ์‹ค์‹œ๊ฐ„ ์ธ๊ณต ์ง€๋Šฅ(AI) ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค ๋ฐฐํฌ
  • ์•”ํ˜ธํ™”๋œ ํด๋ผ์šฐ๋“œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ฐ์ดํ„ฐ๋ฅผ ๋น„๋กฏํ•œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ํŠธ๋ž˜ํ”ฝ 5,000๊ฐ€์ง€๋ฅผ ์ž๋™ ์‹๋ณ„
  • Secure SD-WAN์„ ์‚ฌ์šฉํ•˜์—ฌ ํด๋ผ์šฐ๋“œ ๋ฆฌ์†Œ์Šค์— ์•ˆ์ „ํ•˜๊ฒŒ ๊ณ ์„ฑ๋Šฅ์œผ๋กœ ์—ฐ๊ฒฐ
FortiCASB manages access to valuable cloud applications and data across multi-cloud deployments. FortiCWP evaluates and monitors cloud configurations, pinpoints misconfigurations, and analyzes traffic across cloud resources. FortiGate VM and SaaS offerings perform inspection of traffic entering and leaving the cloud, including SSL/TLS encrypted traffic. FortiMail protects against common threats in cloud-based and on-premises email systems. FortiWeb web application firewall secures cloud-based resources and DevOps environments by protecting against known and unknown threats, including sophisticated threats such as SQL injection, cross-site scripting, buffer overflows, and DDoS attacks.
Adaptive Cloud Security casb cwp ngfw mail waf
์ž์„ธํ•œ ์ •๋ณด๋Š” ๋‹ค์ด์–ด๊ทธ๋žจ์˜ ๊ฐ ์„น์…˜์„ ํด๋ฆญํ•˜์—ฌ ํ™•์ธํ•˜์„ธ์š”

CSP์˜ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๋ฌธ์ œ

web icon vertical high performance

๋„คํŠธ์›Œํฌ ์„ฑ๋Šฅ

๊ณ ๊ฐ์€ CSP ๋„คํŠธ์›Œํฌ์—์„œ ๋†’์€ ์„ฑ๋Šฅ์„ ๊ธฐ๋Œ€ํ•ฉ๋‹ˆ๋‹ค. ๋ฆฌํ…Œ์ผ ๋งค์žฅ์—์„œ ์ œ๊ณตํ•˜๋Š” ๋ฌด์„  ์•ก์„ธ์Šค๋ฅผ ์‚ฌ์šฉํ•˜๋“ , ํšŒ์‚ฌ ๋ฐ์ดํ„ฐ ์„ผํ„ฐ๋ฅผ ํ†ตํ•ด ํŠธ๋ž˜ํ”ฝ์ด ๋ผ์šฐํŒ…๋˜๊ธฐ๋ฅผ ๊ธฐ๋‹ค๋ฆฌ๋“  ๋งˆ์ฐฌ๊ฐ€์ง€์ž…๋‹ˆ๋‹ค. ๋ณด์•ˆ ๊ธฐ์ˆ ๋กœ ์ธํ•ด ๋„คํŠธ์›Œํฌ ์„ฑ๋Šฅ์ด ์ €ํ•˜๋œ๋‹ค๋ฉด ๊ณ ๊ฐ ๊ฒฝํ—˜์— ๋ถ€์ •์  ์˜ํ–ฅ์„ ๋ฏธ์นฉ๋‹ˆ๋‹ค.

Operational Efficiency

์šด์˜ ํšจ์œจ์„ฑ

CSP์˜ ๋ฐฉ๋Œ€ํ•œ ๋„คํŠธ์›Œํฌ๋ฅผ ๋ณดํ˜ธํ•˜๋ ค๋ฉด ์—ฌ๋Ÿฌ ๊ฐ€์ง€ ๋ณด์•ˆ ์š”์†Œ๊ฐ€ ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค. ๋ณด์•ˆ ์†”๋ฃจ์…˜์„ ํ†ตํ•ฉํ•˜์ง€ ์•Š์œผ๋ฉด ๋ณด์•ˆ ์›Œํฌํ”Œ๋กœ๋ฅผ ์ˆ˜๋™์œผ๋กœ ๊ด€๋ฆฌํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ์šด์˜ ๋น„ํšจ์œจ์€ ์œ„ํ˜‘ ํƒ์ง€, ์˜ˆ๋ฐฉ, ๋Œ€์‘์— ์ง€์—ฐ์„ ์ผ์œผํ‚ค๊ณ , ์ค‘๋ณต์„ ๋ฐœ์ƒ์‹œํ‚ค๋ฉฐ, ์šด์˜ ๊ฒฝ๋น„(OpEx)๋„ ๋Š˜์–ด๋‚˜๊ฒŒ ๋ฉ๋‹ˆ๋‹ค.

web icon vertical visibility

์ข…ํ•ฉ์  ๊ฐ€์‹œ์„ฑ

CSP๋Š” ์˜จํ”„๋ ˆ๋ฏธ์Šค ๋ฐ์ดํ„ฐ ์„ผํ„ฐ, ํด๋ผ์šฐ๋“œ ๋ฐฐํฌ, ์ธํ„ฐ๋„ท์— ์—ฐ๊ฒฐ๋œ POS ์‹œ์Šคํ…œ์ด ์žˆ๋Š” ๋ฆฌํ…Œ์ผ ๋งค์žฅ ๋“ฑ, ๋‹ค์–‘ํ•œ ๋„คํŠธ์›Œํฌ๊ฐ€ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Ÿฐ ์ด์งˆ์  ๋„คํŠธ์›Œํฌ๋ฅผ ๋ณดํ˜ธํ•˜๋ ค๋ฉด ๋„คํŠธ์›Œํฌ ์ „์ฒด์— ๋Œ€ํ•œ ๊ฐ€์‹œ์„ฑ์ด ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ๋ณต์žกํ•˜๊ณ  ์ง€๋Šฅ์ ์ธ ๊ณต๊ฒฉ์„ ์ฐจ๋‹จํ•˜๊ธฐ ์œ„ํ•ด ํฌ์ธํŠธ ๋ณด์•ˆ ์ œํ’ˆ์„ ๋ฐฐํฌํ•˜๋ฉด ๊ฐ€์‹œ์„ฑ์„ ์ €ํ•ดํ•˜๋Š” ์‚ฌ์ผ๋กœ๋งŒ ์ƒ๊ธธ ๋ฟ์ž…๋‹ˆ๋‹ค.

threat intelligence

๋ณต์žกํ•œ ์œ„ํ˜‘ ๋™ํ–ฅ

CSP ๋ฐ์ดํ„ฐ ์„ผํ„ฐ์™€ ๋ฆฌํ…Œ์ผ ๋งค์žฅ์— ๋ฐฐํฌ๋œ POS ๊ธฐ๊ธฐ๋Š” ์‚ฌ์ด๋ฒ„ ๋ฒ”์ฃ„์ž์—๊ฒŒ๋Š” ๊ตฐ์นจ ๋„๋Š” ํ‘œ์ ์ž…๋‹ˆ๋‹ค. ์ด๋Ÿฐ ๊ธฐ๊ธฐ์—์„œ ๋ฐ์ดํ„ฐ๋ฅผ ํ›”์น˜๊ฑฐ๋‚˜, ์ค‘์š”ํ•œ ์„œ๋น„์Šค์— ๋Œ€ํ•œ ๋ถ„์‚ฐ๋œ ์„œ๋น„์Šค ๊ฑฐ๋ถ€(DDoS) ๋˜๋Š” ๋žœ์„ฌ์›จ์–ด ๊ณต๊ฒฉ์œผ๋กœ ์ค‘์š”ํ•œ ์‹œ์Šคํ…œ์ด ์ค‘๋‹จ๋˜๋ฉด CSP๊ฐ€ ์„œ๋น„์Šค ์ˆ˜์ค€ ๊ณ„์•ฝ(SLA)์„ ์ค€์ˆ˜ํ•˜๋Š” ๋ฐ ์–ด๋ ค์›€์ด ์ƒ๊น๋‹ˆ๋‹ค. ๋””์ง€ํ„ธ ํ˜์‹ ์œผ๋กœ ์ƒˆ๋กœ์šด ๊ณต๊ฒฉ ๋ฒกํ„ฐ(์˜ˆ: ๋ฆฌํ…Œ์ผ ๋งค์žฅ์˜ ๊ฒŒ์ŠคํŠธ ๋ฌด์„  ๋„คํŠธ์›Œํฌ, IoT ๊ธฐ๊ธฐ ๋ฐฐํฌ)๊ฐ€ ์ƒ๊ฒจ๋‚˜๋ฉด ์ด๋Ÿฐ ์œ„ํ˜‘์„ ์ฐจ๋‹จํ•˜๊ธฐ๊ฐ€ ๋”๋”์šฑ ์–ด๋ ค์›Œ์ง‘๋‹ˆ๋‹ค.

compliance reporting

๊ทœ์ œ ์ค€์ˆ˜

CSP๋Š” ์˜คํ”„๋ผ์ธ ๋ฆฌํ…Œ์ผ ๋งค์žฅ์ด๋‚˜ ์˜จ๋ผ์ธ ํฌํ„ธ์„ ํ†ตํ•ด ๊ณ ๊ฐ์—๊ฒŒ์„œ ๊ฒฐ์ œ ์นด๋“œ ์ •๋ณด์™€ ๋‹ค๋ฅธ ๋ฏผ๊ฐํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ์ˆ˜์ง‘ํ•ฉ๋‹ˆ๋‹ค. ์ด ๋ฏผ๊ฐํ•œ ๋ฐ์ดํ„ฐ๋Š” ์˜จํ”„๋ ˆ๋ฏธ์Šค ๋ฐ์ดํ„ฐ ์„ผํ„ฐ, ํ”„๋ผ์ด๋น—/ํผ๋ธ”๋ฆญ ํด๋ผ์šฐ๋“œ, ์„œ๋น„์Šคํ˜• ์†Œํ”„ํŠธ์›จ์–ด(SaaS) ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋“ฑ, ๊ธฐ์—… ๋„คํŠธ์›Œํฌ ๊ณณ๊ณณ์— ์ €์žฅ, ์ฒ˜๋ฆฌ๋ฉ๋‹ˆ๋‹ค. ๊ธฐ์—… ๋„คํŠธ์›Œํฌ์˜ ๋ณต์žก์„ฑ์ด ์ปค์ง€๋ฉด์„œ ๊ทœ์ œ ๊ธฐ์ค€(์˜ˆ: PCI DSS)์— ๋”ฐ๋ผ ์ด ๋ฐ์ดํ„ฐ๋ฅผ ๋ณดํ˜ธํ•˜๋Š” ๊ฒƒ์€ ๋”์šฑ ์–ด๋ ค์›Œ์กŒ์Šต๋‹ˆ๋‹ค.

branch network

์ง€์  ๋„คํŠธ์›Œํฌ

CSP๋Š” ๊ณ ๊ฐ ์˜จ๋ณด๋”ฉ, ๋ฌธ์ œ ํ•ด๊ฒฐ, ๋ฏผ๊ฐํ•œ ์‚ฌ์šฉ์ž ๋ฐ์ดํ„ฐ๋ฅผ ์ฒ˜๋ฆฌํ•˜๋Š” ์›๊ฒฉ ์‚ฌ๋ฌด์‹ค์ด ์—ฌ๋Ÿฌ ๊ณณ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Ÿฐ ์ง€์ ๋“ค์€ ๋ฏผ๊ฐํ•œ ๋ฐ์ดํ„ฐ์— ์•ก์„ธ์Šคํ•˜๋ ค๋Š” ๊ณต๊ฒฉ์ž๋‚˜ ์ด๋ฅผ ๋ฐœํŒ์œผ๋กœ ์‚ผ์•„ ์‚ฌ๋ฌด์‹ค ๋„คํŠธ์›Œํฌ์— ์•ก์„ธ์Šคํ•˜๋ ค๋Š” ๊ณต๊ฒฉ์ž์˜ ํ‘œ์ ์ด ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Achieving centralized visibility and control of security operations throughout the headquarters network.

Learn More
Securing payment card data as it flows through the organizationโ€™s network and simplifying Payment Card Industry Data Security Standard (PCI DSS) compliance

Learn More
Delivering reliable and high-speed networking to branch locations while ensuring end-to-end security from the internet to the switching infrastructure.

Learn More
Leveraging real-time threat intelligence, centralized visibility, and automated threat detection and response to secure the enterprise network.

Learn More
Consolidating and centralizing visibility, configuration, and control of multi-cloud environments to provide adaptive cloud security to service providers

Learn More
Service Provider Enterprise Diagram Headquarters PCICompliance SecureNetworking ATP Adaptive Cloud Security
์ž์„ธํ•œ ์ •๋ณด๋Š” ๋‹ค์ด์–ด๊ทธ๋žจ์˜ ๊ฐ ์„น์…˜์„ ํด๋ฆญํ•˜์—ฌ ํ™•์ธํ•˜์„ธ์š”

CSP ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๋ถ„์•ผ์—์„œ ํฌํ‹ฐ๋„ท์˜ ์ฐจ๋ณ„ํ™” ์š”์†Œ

web icon vertical visibility

๊ฐ€์‹œ์„ฑ

ํฌํ‹ฐ๋„ท ์‹œํ๋ฆฌํ‹ฐ ํŒจ๋ธŒ๋ฆญ์€ 250๊ฐœ ์ด์ƒ ํƒ€์‚ฌ ๋ณด์•ˆ ์†”๋ฃจ์…˜์— ๊ธฐ๋ณธ์ ์œผ๋กœ ํ†ตํ•ฉ๋˜๋ฉฐ, CSP๊ฐ€ ๋„คํŠธ์›Œํฌ์˜ ๋ชจ๋“  ๋ณด์•ˆ ์š”์†Œ์— ๋Œ€ํ•œ ๋‹จ์ผ ๋Œ€์‹œ๋ณด๋“œ ๊ฐ€์‹œ์„ฑ๊ณผ ๊ตฌ์„ฑ ๊ด€๋ฆฌ๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์œ„ํ˜‘ ํƒ์ง€ ๋ฐ ๋Œ€์‘ ์†๋„๋ฅผ ๋†’์ด๋ฉด์„œ๋„ ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์—์„œ ์ผ๊ด€๋œ ๋ณด์•ˆ ์ •์ฑ…์„ ์ ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Ÿฐ ๊ธด๋ฐ€ํ•œ ํ†ตํ•ฉ์„ ํ†ตํ•ด ์šด์˜ ๊ฒฝ๋น„(OpEx)๋ฅผ ์ตœ์†Œํ™”ํ•˜๋ฉด์„œ SLA๋ฅผ ์ค€์ˆ˜ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

automation

์ž๋™ํ™”

ํฌํ‹ฐ๋„ท ์†”๋ฃจ์…˜์€ ๋ณด์•ˆ ์˜ค์ผ€์ŠคํŠธ๋ ˆ์ด์…˜, ์ž๋™ํ™” ๋ฐ ๋Œ€์‘(SOAR)์˜ ์ตœ์‹  ๊ธฐ๋Šฅ์„ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค. CSP์—์„œ ์ „์ฒด์ ์œผ๋กœ ๋ณด์•ˆ์„ ๊ฐ•ํ™”ํ•  ์ˆ˜ ์žˆ๊ณ , ๊ธฐ์ˆ ์„ ๊ฐ–์ถ˜ ๊ฐ€์šฉ ์ธ๋ ฅ์˜ ํšจ์šฉ์„ ๊ทน๋Œ€ํ™”ํ•˜์—ฌ ๋ฆฌ์†Œ์Šค๋ฅผ ํ™•๋Œ€ํ•˜๋Š” ํ•œํŽธ ๋ฆฌ์†Œ์Šค ์ œ์•ฝ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ค‘์•™ ์ง‘์ค‘์  ๋ณด์•ˆ ๊ด€๋ฆฌ๋ฅผ ํ†ตํ•ด ๋„คํŠธ์›Œํฌ ์ „์ฒด์— ์ •์ฑ…์„ ์ ์šฉํ•˜๊ณ , ๊ทœ์ œ ๊ธฐ๊ด€, ์ตœ๊ณ ์œ„ ๊ฒฝ์˜์ง„, ์ด์‚ฌ๋“ค์„ ์œ„ํ•œ ๋ณด๊ณ ์„œ๋ฅผ ์ž๋™ ์ƒ์„ฑํ•ฉ๋‹ˆ๋‹ค.

threat intelligence

์„ ์ œ์  AI ์ค‘์‹ฌ ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค

FortiGuard Labs์—์„œ ์ œ๊ณตํ•˜๋Š” ์ธ๊ณต ์ง€๋Šฅ(AI)๊ณผ ๋จธ์‹  ๋Ÿฌ๋‹(ML) ๊ธฐ๋ฐ˜ ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค๋Š” ํฌํ‹ฐ๋„ท ์‹œํ๋ฆฌํ‹ฐ ํŒจ๋ธŒ๋ฆญ์„ ํ†ตํ•ด ์‹ค์‹œ๊ฐ„์œผ๋กœ ๋ณด์•ˆ ๊ธฐ๊ธฐ์— ์ „๋‹ฌ๋ฉ๋‹ˆ๋‹ค. ๊ธฐ์—… ๋‚ด POS ์‹œ์Šคํ…œ์—์„œ ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ ์ธํ”„๋ผ์— ์ด๋ฅด๊ธฐ๊นŒ์ง€, ๋„คํŠธ์›Œํฌ ์ „์ฒด์ ์œผ๋กœ ์•Œ๋ ค์ง„ ์œ„ํ˜‘๊ณผ ์•Œ๋ ค์ง€์ง€ ์•Š์€ ์œ„ํ˜‘์— ๋Œ€ํ•œ ์ข…ํ•ฉ์  ๋ณดํ˜ธ๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

web icon vertical high performance

ํƒ์›”ํ•œ ์„ฑ๋Šฅ

FortiGate ์ฐจ์„ธ๋Œ€ ๋ฐฉํ™”๋ฒฝ(NGFW)์€ NSS Labs์—์„œ ์ œ๊ณตํ•˜๋Š” ์„ฑ๋Šฅ ํ…Œ์ŠคํŠธ๋ฅผ ํ†ตํ•ด ์—…๊ณ„์—์„œ ๊ฐ€์žฅ ์ง€์—ฐ์ด ๋‚ฎ๋‹ค๋Š” ๊ฒƒ์ด ์ž…์ฆ๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ํฌํ‹ฐ๋„ท์€ ๊ณ ํšจ์œจ ๋งž์ถคํ˜• FortiGate ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์ง‘์  ํšŒ๋กœ(ASIC)์™€ ์„ธ๊ณ„ ์ตœ์ดˆ์˜ ์†Œํ”„ํŠธ์›จ์–ด ์ •์˜ ๊ด‘์—ญ ๋„คํŠธ์›Œํฌ(SD-WAN) ASIC๋ฅผ ํ†ตํ•ด WAN ์—ฃ์ง€์™€ ๋„คํŠธ์›Œํฌ์— ์šฐ์ˆ˜ํ•œ ์„ฑ๋Šฅ์˜ ๋ณด์•ˆ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๊ฒŒ๋‹ค๊ฐ€ SSL/TLS ์•”ํ˜ธํ™” ๊ฒ€์‚ฌ ๋“ฑ์˜ ๊ณ ๊ธ‰ ๊ธฐ๋Šฅ์„ ํ™œ์„ฑํ™”ํ•˜๋”๋ผ๋„ ์†๋„๋‚˜ ์ฒ˜๋ฆฌ๋Ÿ‰ ์ธก๋ฉด์—์„œ ๋„คํŠธ์›Œํฌ ์„ฑ๋Šฅ์— ์˜ํ–ฅ์„ ๋ฏธ์น˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค. ๋˜ํ•œ, FortiGate VM ์‹œ๋ฆฌ์ฆˆ๋Š” ํŒจํ‚ท ๊ฐ€์†ํ™” ๊ธฐ์ˆ (์˜ˆ: ๋ฐ์ดํ„ฐ ํ‰๋ฉด ๊ฐœ๋ฐœ ํ‚คํŠธ(DPDK), ๋‹จ์ผ ๋ฃจํŠธ ์ž…๋ ฅ/์ถœ๋ ฅ ๊ฐ€์ƒํ™”(SR-IOV), Intel QuickAssist Technology(QAT)) ๋ฐ ํฌํ‹ฐ๋„ท ๊ฐ€์ƒ ๋ณด์•ˆ ์ฒ˜๋ฆฌ ์žฅ์น˜(vSPU) ๊ธฐ์ˆ ์„ ๊ฒฐํ•ฉํ•˜์—ฌ ์˜จํ”„๋ ˆ๋ฏธ์Šค, ํ”„๋ผ์ด๋น— ํด๋ผ์šฐ๋“œ, ํผ๋ธ”๋ฆญ ํด๋ผ์šฐ๋“œ๋ฅผ ๋น„๋กฏํ•œ CSP ๋ฐ์ดํ„ฐ ์„ผํ„ฐ์— ํ•„์š”ํ•œ ์ตœ์ ์˜ ์„ฑ๋Šฅ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.