{"id":103926,"date":"2019-11-27T06:08:51","date_gmt":"2019-11-27T14:08:51","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=103926"},"modified":"2019-11-27T06:08:51","modified_gmt":"2019-11-27T14:08:51","slug":"cloud-next-generation-network-security","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/11\/cloud-next-generation-network-security\/?lang=ko","title":{"rendered":"\ucc28\uc138\ub300 \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548\uc740 \ud074\ub77c\uc6b0\ub4dc \uae30\ubc18 \ubc29\uc2dd"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">\uae00: Nir Zuk, Palo Alto Networks \uc124\ub9bd\uc790 \uacb8 CTO<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">\uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc774 \ud074\ub77c\uc6b0\ub4dc\ub85c \uc774\ub3d9\ud558\uace0 \uc0ac\uc6a9\uc790 \uc774\ub3d9\uc131\uc774 \uc99d\uac00\ud558\uba74\uc11c \ub124\ud2b8\uc6cc\ud0b9 \ubc0f \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \uc11c\ube44\uc2a4 \uc81c\uacf5 \ubc29\uc2dd\uc774 \ubc14\ub00c\uace0 \uc788\uc2b5\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548\uc758 \ubbf8\ub798\ub294 \ud074\ub77c\uc6b0\ub4dc\uc5d0 \uc788\uc73c\uba70, \uc774 \uc0c8\ub85c\uc6b4 \ubaa8\ub378\uc740 SASE(Secure Access Service Edge)(\ubc1c\uc74c\uc740 \u201c\uc0c8\uc2dc\u201d)\ub85c \uc54c\ub824\uc838 \uc788\uc2b5\ub2c8\ub2e4. Palo Alto Networks \uc124\ub9bd\uc790 \uacb8 CTO\uc778 Nir Zuk\ub294 \uc5c5\uacc4\uc5d0\uc11c \uac00\uc7a5 \ud3ec\uad04\uc801\uc778 SASE\uc778 Prisma Access \uc81c\ud488\uc744 \ud1b5\ud574 \uc9c0\ub09c \uba87 \ub144\uac04 \uc774 \ubcc0\ud654\ub97c \uc8fc\ub3c4\ud574 \uc624\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc774 \uae30\uace0\ubb38\uc5d0\uc11c Nir\uc740 \uc65c SASE\uac00 \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548\uc758 \ub17c\ub9ac\uc801\uc778 \ubc1c\uc804\uc778\uc9c0\ub97c \uc124\uba85\ud569\ub2c8\ub2e4. \uc774 \uae30\uace0\ubb38\uc740 Palo Alto Networks \uc0ac\uace0 \ub9ac\ub354\ub4e4\uc774 \ud6a8\uacfc\uc801\uc774\uace0 \ud1b5\ud569\ub41c SASE \uc194\ub8e8\uc158\uc758 \ud575\uc2ec \uc6d0\uce59, \ub354 \ub113\uac8c\ub294 \uad6c\ud604\uacfc \uadf8 \uc601\ud5a5\uae4c\uc9c0 \uc0b4\ud3b4\ubcf4\ub294 \uc2dc\ub9ac\uc988\uc758 \uccab \ubc88\uc9f8 \uc21c\uc11c\uc785\ub2c8\ub2e4.<\/span><\/i><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">\ud074\ub77c\uc6b0\ub4dc \uae30\ubc18 \uc138\uacc4\uc5d0\uc11c, \ubcf4\uc548\uc740 \ud1b5\ud569\ub418\uace0 \uc77c\uad00\ub418\uc5b4\uc57c \ud558\uba70 \uc548\uc804\uc774 \uc778\uc99d\ub41c \ud074\ub77c\uc6b0\ub4dc\uc5d0\uc11c \uc81c\uacf5\ub418\uc5b4\uc57c \ud569\ub2c8\ub2e4. \uc774\ub294 \ubcf4\uc548 \ubd84\uc57c\uc5d0\uc11c \uc313\uc544\uc628 \uc800\uc758 \ubaa8\ub4e0 \uacbd\ub825\uc744 \uc2b9\ud654\uc2dc\ud0a8 \ub9d0\uc785\ub2c8\ub2e4. \ubcf4\uc548 \ubd84\uc57c\ub294 \uae30\uc220\uc758 \ubcc0\ud654\uc5d0 \ubc1c\ub9de\ucd94\uace0 \uc0ac\uc6a9\uc790, \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \ubc0f \ub370\uc774\ud130\ub97c \ubcf4\ud638\ud558\uae30 \uc704\ud574 \ub04a\uc784\uc5c6\uc774 \ubc1c\uc804\ud574\uc57c \ud588\uc2b5\ub2c8\ub2e4. \uadf8 \uc911\uc2ec \uc6d0\uce59\uc740 \ubcc0\ud558\uc9c0 \uc54a\uc558\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ubbf8\ub798\uc758 \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548\uacfc \ub2e4\uac00\uc624\ub294 \ud1b5\ud569\uc758 \uc2dc\ub300\uc5d0 \ub808\uac70\uc2dc \ud3ec\uc778\ud2b8 \uc81c\ud488\uc758 \uc811\uadfc\ubc29\uc2dd\uc740 \ub354 \uc774\uc0c1 \ud6a8\uacfc\uac00 \uc5c6\uc2b5\ub2c8\ub2e4.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uac70\uc758 25\ub144 \uc804\uc5d0, \uc800\ub294 \uc5c5\uacc4 \ucd5c\ucd08\uc758 \uc0c1\ud0dc \uc800\uc7a5 \uac80\uc0ac \ubc29\ud654\ubcbd\uc744 \uac1c\ubc1c\ud55c \uc8fc\uc694 \uac1c\ubc1c\uc790\uc600\uc2b5\ub2c8\ub2e4. \uadf8\ub54c\ub294 \uc778\ud130\ub137 \ucd08\uae30 \uc2dc\uc808\uc774\uc5c8\uae30 \ub54c\ubb38\uc5d0 \uc0c1\ud0dc \ube44\uc800\uc7a5 ACL(\uc561\uc138\uc2a4 \uc81c\uc5b4 \ubaa9\ub85d)\uc774 \uc6b0\uc218\ud55c \ubc29\ud654\ubcbd \uae30\uc220\uc774\uc5c8\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub2e4\uac00 ACL\uc740 \uc778\ud130\ub137 \uc624\ub514\uc624 \ubc0f \ube44\ub514\uc624 \uc560\ud50c\ub9ac\ucf00\uc774\uc158(\ub610\ub294 \uc608\uc804\uc758 FTP) \ub4f1 \uc0c1\ud0dc \uc800\uc7a5 \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc758 \ucd9c\ud604\uc5d0 \ub300\ucc98\ud560 \uc218 \uc5c6\uc5b4, \ud655\uc2e4\ud788 \uc0c8\ub85c\uc6b4 \uc811\uadfc\ubc29\uc2dd\uc774 \ud544\uc694\ud588\uc2b5\ub2c8\ub2e4. \ud504\ub85d\uc2dc\ub294 \ub108\ubb34 \ub290\ub9ac\uace0 \uc774\ub7ec\ud55c \ub9ce\uc740 \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc744 \ucc28\ub2e8\ud558\ub824\ub294 \uacbd\ud5a5\uc774 \uc788\uae30 \ub54c\ubb38\uc5d0 \ud504\ub85d\uc2dc \uae30\uc220\uc744 \uc0ac\uc6a9\ud558\ub824\ub294 \uc2dc\ub3c4\ub294 \uc18c\uc6a9\uc5c6\ub294 \uac83\uc73c\ub85c \ubc1d\ud600\uc84c\uc2b5\ub2c8\ub2e4. \uc0c1\ud0dc \uc800\uc7a5 \uac80\uc0ac\ub294 \uc720\uc6a9\ud558\uace0 \uc548\uc804\ud55c \uac83\uc73c\ub85c \ub4dc\ub7ec\ub098, \uadf8\ub54c\ubd80\ud130 \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \uc2dc\uc7a5\uc744 \uc7a5\uc545\ud588\uc2b5\ub2c8\ub2e4.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uac70\uc758 15\ub144 \uc804, \uc778\ud130\ub137 \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \uc218\uac00 \ud3ed\ubc1c\uc801\uc73c\ub85c \uc99d\uac00\ud558\uba74\uc11c \uc0c1\ud0dc \uc800\uc7a5 \uac80\uc0ac\uac00 \uc5b4\ub824\uc6cc\uc9c0\uae30 \uc2dc\uc791\ud558\uc790, \ub2e4\uc2dc \uc0c8\ub85c\uc6b4 \uc811\uadfc\ubc29\uc2dd\uc744 \ucc3e\uc544\uc57c \ud588\uc2b5\ub2c8\ub2e4. \ucd08\uae30\uc5d0\ub294 \ud504\ub85d\uc2dc \uae30\uc220\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc774 \ubb38\uc81c\uc5d0 \ub300\uc751\ud558\ub824\ub294 \uc2dc\ub3c4\ub3c4 \uc788\uc5c8\uc2b5\ub2c8\ub2e4(\ub450 \ubc88\uc9f8 \uc2dc\ub3c4!). \uadf8\ub7ec\ub098 \ud504\ub85d\uc2dc \uace0\uc720\uc758 \ub0ae\uc740 \uc131\ub2a5\uacfc \ubaa8\ub4e0 \uc720\ud615\uc758 \ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d\uc744 \uac80\uc0ac\ud560 \uc218 \uc5c6\ub2e4\ub294 \uc810 \ub54c\ubb38\uc5d0 \ub2e4\uc2dc \ud55c\ubc88 \ub354 \uc2e4\ud328\ud588\uc2b5\ub2c8\ub2e4. \uc800\ub294 \ub2e4\uc2dc \ubc29\ud654\ubcbd\uc744 \uc218\uc815\ud574\uc57c \ud55c\ub2e4\uace0 \uc0dd\uac01\ud588\ub294\ub370, \uc774 \ub54c\ubb38\uc5d0 Palo Alto Networks\ub97c \uc2dc\uc791\ud558\uace0 \uc0c1\ud0dc \uae30\ubc18 \uac80\uc0ac\ub97c \ub300\uccb4\ud560 \ubc29\ubc95, \uc989 App-ID \uae30\ubc18 \ucc28\uc138\ub300 \ubc29\ud654\ubcbd\uc744 \uad6c\ucd95\ud558\uac8c \ub41c \uac83\uc785\ub2c8\ub2e4. \uadf8\ub9ac\uace0 \uc774 \ubc29\ud654\ubcbd\uc740 \uc624\ub298\ub0a0 \ub2e8\uc5f0\ucf54 \uc2dc\uc7a5\uc744 \uc120\ub3c4\ud558\ub294 \ubc29\ud654\ubcbd\uc774 \ub418\uc5c8\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uadf8\ub7ec\ub098 \uc9c0\uae08 \uc6b0\ub9ac\ub294 \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548\uc5d0 \ub610 \ub2e4\ub978 \ubcc0\ud654\ub97c \uac00\uc838\uc624\ub294 \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc758 \ub610 \ud558\ub098\uc758 \ubcc0\ud654\ub97c \ubaa9\uaca9\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ubc88 \ubcc0\ud654\ub294 \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc774 \uae30\uc5c5 \ub370\uc774\ud130 \uc13c\ud130\uc5d0\uc11c \ud074\ub77c\uc6b0\ub4dc(SaaS \ubc0f \ud37c\ube14\ub9ad \ud074\ub77c\uc6b0\ub4dc)\ub85c \uc774\ub3d9\ud558\uace0 \uc788\ub2e4\ub294 \uac83\uc785\ub2c8\ub2e4. \ud074\ub77c\uc6b0\ub4dc \ucc44\ud0dd\uc740 \ubc29\ud654\ubcbd \uc544\ud0a4\ud14d\ucc98\uc5d0 \ub2e4\uc2dc \ub3c4\uc804\uc7a5\uc744 \ub0b4\ubc00\uace0 \uc788\uc73c\uba70 \uc800\ub294 \uc5ec\uae30\uc5d0 \ub300\uc751\ud574\uc57c \ud569\ub2c8\ub2e4. \uadf8\ub9ac\uace0, \ub9de\uc2b5\ub2c8\ub2e4. \uc774 \ubb38\uc81c\ub97c \ud574\uacb0\ud558\ub824\ub294 \ucd08\uae30 \uc2dc\ub3c4\ub294 \ud504\ub85d\uc2dc\ub97c \uc0ac\uc6a9\ud55c \uac83\uc774\uba70, \uc774\uc804\uacfc \ub3d9\uc77c\ud55c \uc774\uc720\ub85c \uc2e4\ud328\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">\uc774\uc81c \ub2e4\uc2dc \ud55c\ubc88, \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548\uc744 \uc218\uc815\ud574\uc57c \ud560 \ub54c\uac00 \ub418\uc5c8\uc2b5\ub2c8\ub2e4.<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">\uc2dc\uac04\uc774 \uc9c0\ub098\uba74\uc11c \uae30\uc5c5\uc740 \uc77c\ubc18\uc801\uc73c\ub85c \uc0c1\ub2f9\ud55c \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \uc778\ud504\ub77c\ub97c \uad6c\uc131\ud588\uc2b5\ub2c8\ub2e4. \uadf8\uc911\uc5d0\ub294 \uc9c0\uc810\uc744 \ubcf4\ud638\ud558\uae30 \uc704\ud55c \uc778\ud504\ub77c\uac00 \uc788\ub294\ub370, \uc5ec\uae30\uc11c\ub294 \ub300\uac1c \ud2b8\ub798\ud53d\uc774 IP-VPN(MPLS\ub97c \uc0dd\uac01\ud574 \ubcf4\uc138\uc694.) \ub124\ud2b8\uc6cc\ud06c\ub97c \ud1b5\ud574 \ubcf8\uc0ac \ub610\ub294 \ub370\uc774\ud130 \uc13c\ud130\ub85c \ubc31\ud640\ub418\uace0 \uc778\ud130\ub137 \ud2b8\ub798\ud53d\uc740 \uac70\uae30\uc11c \ud574\ub2f9 \uae30\uc5c5\uc758 \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \uc2a4\ud0dd\uc744 \ud1b5\ud574 \ub77c\uc6b0\ud305\ub429\ub2c8\ub2e4. \uadf8\ub9ac\uace0 \uae30\uc5c5 \ub370\uc774\ud130 \uc13c\ud130\uc5d0 \ub300\ud55c \uc6d0\uaca9 \uc561\uc138\uc2a4\ub97c \ud5c8\uc6a9\ud558\ub294 \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \uc778\ud504\ub77c\uac00 \uc788\uc2b5\ub2c8\ub2e4.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc774 \ud074\ub77c\uc6b0\ub4dc\ub85c \uc774\ub3d9\ud568\uc5d0 \ub530\ub77c, \ubaa8\ub4e0 \uc9c0\uc810, \uc0ac\uc6a9\uc790 \ubc0f \ud30c\ud2b8\ub108 \ud2b8\ub798\ud53d\uc744 \ubcf8\uc0ac \ub610\ub294 \ub370\uc774\ud130 \uc13c\ud130\ub97c \ud1b5\ud574 \uac15\uc81c\ub85c \ub3cc\ub9ac\ub294 \uc774\uc804\uc758 \ubc29\ubc95\uc740 \ub354 \uc774\uc0c1 \uc758\ubbf8\uac00 \uc5c6\uc2b5\ub2c8\ub2e4. \ud074\ub77c\uc6b0\ub4dc\uc5d0\uc11c \ub3d9\uc77c\ud55c \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \uc2a4\ud0dd\uc744 \uc81c\uacf5\ud558\uc5ec \ud074\ub77c\uc6b0\ub4dc\ub85c \uac00\ub294 \uadf8\ub7ec\ud55c \ud2b8\ub798\ud53d\uc774 \uae30\uc5c5 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \ucda9\ub3cc\ud560 \ud544\uc694\uac00 \uc5c6\uace0 \uae30\uc5c5 \ub370\uc774\ud130 \uc13c\ud130\ub85c \uac00\ub294 \ud2b8\ub798\ud53d\uc774 \uc904\uc5b4\ub4e4\uac8c \ud558\ub294 \uac83\uc774 \ud6e8\uc52c \ub354 \uc77c\ub9ac\uac00 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ud074\ub77c\uc6b0\ub4dc\uc5d0\uc11c \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548\uc744 \uc81c\uacf5\ud558\uba74 \uc0ac\uc6a9\uc790, \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \ubc0f \ub370\uc774\ud130\uac00 \uc5b4\ub514\uc5d0 \uc788\ub4e0 \uac04\uc5d0 \ubcf4\ud638\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">SASE: \uc5b4\ub514\uc11c\ub098 \ub354\uc6b1 \uc548\uc804\ud55c \ud658\uacbd<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Gartner\ub294 \ub124\ud2b8\uc6cc\ud0b9 \ubc0f \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548\uc744 \uc704\ud55c \ud074\ub77c\uc6b0\ub4dc\uc758 \uc0c8\ub85c\uc6b4 \ubaa8\ub378\uc744 \uc81c\uc548\ud588\uc2b5\ub2c8\ub2e4. \uc774 \uc0c8 \ubaa8\ub378\uc740 SASE(Secure Access Service Edge)(\ubc1c\uc74c\uc740 \u201c\uc0c8\uc2dc\u201d)\ub85c \uc54c\ub824\uc838 \uc788\uc2b5\ub2c8\ub2e4. Gartner\ub294 \uc774\ub807\uac8c \uc124\uba85\ud569\ub2c8\ub2e4.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">\u201cSASE(Secure Access Service Edge)\ub294 \ud3ec\uad04\uc801\uc778 WAN \uae30\ub2a5\uacfc \ud3ec\uad04\uc801\uc778 \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \uae30\ub2a5(\uc608: WG, CASB, FWaaS, ZTNA)\uc744 \uacb0\ud569\ud558\uc5ec \ub514\uc9c0\ud138 \uae30\uc5c5\uc758 \ub3d9\uc801 \ubcf4\uc548 \uc561\uc138\uc2a4 \uc694\uad6c\ub97c \uc9c0\uc6d0\ud558\ub294 \uc0c8\ub85c\uc6b4 \uc11c\ube44\uc2a4\uc785\ub2c8\ub2e4.\u201d\u00a0<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">\uc0ac\uc2e4\uc0c1, Gartner\ub294 SASE\uac00 \ud074\ub77c\uc6b0\ub4dc \ubc0f \ubaa8\ubc14\uc77c \ud658\uacbd\uc758 \uc694\uad6c\ub97c \ucda9\uc871\ud560 \uc218 \uc788\uc73c\uba70 \uae30\uc874 \ub124\ud2b8\uc6cc\ud06c \ubc0f \ubcf4\uc548 \uc544\ud0a4\ud14d\ucc98\uc758 \ubb38\uc81c\ub97c \ud574\uacb0\ud560 \uc218 \uc788\ub2e4\uace0 \uc8fc\uc7a5\ud569\ub2c8\ub2e4.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uc800\ub294 \uc774 \uac1c\ub150\uc5d0 \ub3d9\uc758\ud558\uba70, \uc81c \uc0dd\uac01\uc5d0 \uadf8 \ubc29\ubc95\uc740 \ube44\uad50\uc801 \uac04\ub2e8\ud569\ub2c8\ub2e4.\u00a0<\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-sase\"><span style=\"font-weight: 400;\">SASE<\/span><\/a><span style=\"font-weight: 400;\">\ub294 \uc11c\ub85c \ub2e4\ub978 \uc561\uc138\uc2a4 \ubc0f \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \ubc29\ubc95\uc744 \ud558\ub098\uc758 \uc751\uc9d1\ub41c \ud50c\ub7ab\ud3fc\uc73c\ub85c \ud1b5\ud569\ud569\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uac00\uc7a5 \uc911\uc694\ud55c \uac83\uc740, \uc774 \uc751\uc9d1\ub41c \ud50c\ub7ab\ud3fc\uc774 \uc6d0\ud65c\ud55c \uc0ac\uc6a9\uc790 \uacbd\ud5d8\uc744 \ubcf4\uc7a5\ud574\uc57c \ud55c\ub2e4\ub294 \uac83\uc785\ub2c8\ub2e4. \uc774\ub294 \ub300\ubd80\ubd84\uc758 \uc18c\uaddc\ubaa8 \uacf5\uae09\uc5c5\uccb4\uc758 \uc5ed\ub7c9\uc744 \ub118\uc5b4\uc11c\ub294 \uace0\uc131\ub2a5 \uae00\ub85c\ubc8c \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uad6c\ucd95\ud574\uc57c \ud569\ub2c8\ub2e4. SASE\ub294 \ubcf4\uc548 \uc5c5\uacc4\uc5d0\uc11c \uc804\ub840 \uc5c6\ub358 \ud1b5\ud569 \uc218\uc900\uc744 \uc694\uad6c\ud569\ub2c8\ub2e4. \uc774 \ubc29\uc2dd\uc740 \uc9c4\uc785 \uc7a5\ubcbd\uc774 \ub9e4\uc6b0 \ub0ae\uc740 \ub2e8\ud3b8\ud654\ub41c \ubcf4\uc548 \uc0b0\uc5c5\uc758 \ub2e4\ub978 \uc811\uadfc\ubc29\uc2dd\uacfc \ub2e4\ub985\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uc0ac\uc774\ubc84 \ubcf4\uc548 \uc0b0\uc5c5\uc740 \uace0\uac1d\uc5d0\uac8c \uc5ec\ub7ec \uacf5\uae09\uc5c5\uccb4\uc640 \ud611\ub825\ud558\uace0 \uc5ec\ub7ec \ud3ec\uc778\ud2b8 \uc81c\ud488\uacfc \uae30\uc220\uc744 \uc0ac\uc6a9\ud574\uc57c \ud55c\ub2e4\ub294 \uc0ac\uc2e4\uc744 \ub0a9\ub4dd\uc2dc\ud0a4\uae30 \uc704\ud574 \ub178\ub825\ud574 \uc654\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548\uc758 \ubbf8\ub798\ub294 \ud074\ub77c\uc6b0\ub4dc\uc5d0 \uc788\uc73c\uba70, \ubcf4\uc548 \uacf5\uae09\uc5c5\uccb4\ub294 \uc5b4\ub514\uc11c\ub098 \uace0\uac1d\uc744 \ud6a8\uacfc\uc801\uc73c\ub85c \ubcf4\ud638\ud558\uae30 \uc704\ud574 \uc9c4\ud654\ud574\uc57c \ud569\ub2c8\ub2e4.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Palo Alto Networks\uc5d0\uc11c\ub294 \uc774\ub7ec\ud55c \ubcc0\ud654\ub97c \uc608\uacac\ud558\uc5ec \uac15\ub825\ud55c SASE \uc194\ub8e8\uc158\uc744 \uad6c\ucd95\ud588\uc2b5\ub2c8\ub2e4. Prisma Access\ub294 \ubaa8\ub4e0 \ud2b8\ub798\ud53d, \ubaa8\ub4e0 \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \ubc0f \ubaa8\ub4e0 \uc0ac\uc6a9\uc790\ub97c \uc704\ud574 \uc124\uacc4\ub41c SASE \uc544\ud0a4\ud14d\ucc98\uc5d0\uc11c \uae30\uc5c5\uc5d0 \ud544\uc694\ud55c \ub124\ud2b8\uc6cc\ud0b9 \ubc0f \ub124\ud2b8\uc6cc\ud0b9 \ubcf4\uc548\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SASE\uc5d0 \ub300\ud55c \uc790\uc138\ud55c \ub0b4\uc6a9\uc740 \ub2e4\uc74c Gartner \ubcf4\uace0\uc11c\uc5d0\uc11c \ud655\uc778\ud574 \ubcf4\uc2ed\uc2dc\uc624.\u00a0<\/span><a href=\"http:\/\/go.paloaltonetworks.com\/sasegartner\"><span style=\"font-weight: 400;\">The Future of Network Security Is in the Cloud(\ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548\uc758 \ubbf8\ub798\ub294 \ud074\ub77c\uc6b0\ub4dc\uc5d0 \uc788\uc2b5\ub2c8\ub2e4)<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Gartner\ub294 \uc790\uc0ac\uc758 \uc5f0\uad6c \uac04\ud589\ubb3c\uc5d0 \uc5b8\uae09\ub41c \uacf5\uae09\uc5c5\uccb4, \uc81c\ud488 \ub610\ub294 \uc11c\ube44\uc2a4\ub97c \ubcf4\uc99d\ud558\uc9c0 \uc54a\uc744 \ubfd0 \uc544\ub2c8\ub77c \uae30\uc220 \uc0ac\uc6a9\uc790\ub4e4\uc5d0\uac8c \ucd5c\uace0 \ub4f1\uae09\uc744 \ubc1b\uc740 \uacf5\uae09\uc5c5\uccb4 \ub610\ub294 \uae30\ud0c0 \uc9c0\uc815 \uacf5\uae09\uc5c5\uccb4\ub9cc \uc120\ud0dd\ud560 \uac83\uc744 \uad8c\uc7a5\ud558\uc9c0\ub3c4 \uc54a\uc2b5\ub2c8\ub2e4. Gartner \uc5f0\uad6c \uac04\ud589\ubb3c\uc740 Gartner \uc5f0\uad6c \uc870\uc9c1\uc758 \uc758\uacac\uc73c\ub85c \uc791\uc131\ub418\ubbc0\ub85c \uac1d\uad00\uc801\uc778 \uc0ac\uc2e4\ub85c \ud574\uc11d\ub418\uc5b4\uc11c\ub294 \uc548 \ub429\ub2c8\ub2e4. Gartner\ub294 \uc0c1\uc5c5\uc131 \ubcf4\uc99d \ub610\ub294 \ud2b9\uc815 \ubaa9\uc801 \uc801\ud569\uc131\uc744 \ud3ec\ud568\ud558\uc5ec \ubcf8 \uc5f0\uad6c\uc640 \uad00\ub828\ub41c \uba85\uc2dc\uc801 \ub610\ub294 \ubb35\uc2dc\uc801 \ubcf4\uc99d\uc744 \ubaa8\ub450 \ubd80\uc778\ud569\ub2c8\ub2e4.<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">Gartner, The Future of Network Security Is in the Cloud(\ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548\uc758 \ubbf8\ub798\ub294 \ud074\ub77c\uc6b0\ub4dc\uc5d0 \uc788\uc2b5\ub2c8\ub2e4), Neil MacDonald, Lawrence Orans, Joe\u00a0Skorupa, 2019\ub144 8\uc6d4 30\uc77c.<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\uae00: Nir Zuk, Palo Alto Networks \uc124\ub9bd\uc790 \uacb8 CTO \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc774 \ud074\ub77c\uc6b0\ub4dc\ub85c \uc774\ub3d9\ud558\uace0 \uc0ac\uc6a9\uc790 \uc774\ub3d9\uc131\uc774 \uc99d\uac00\ud558\uba74\uc11c \ub124\ud2b8\uc6cc\ud0b9 \ubc0f \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \uc11c\ube44\uc2a4 \uc81c\uacf5 \ubc29\uc2dd\uc774 \ubc14\ub00c\uace0 \uc788\uc2b5\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548\uc758 \ubbf8\ub798\ub294 \ud074\ub77c\uc6b0\ub4dc\uc5d0 \uc788\uc73c\uba70, \uc774 \uc0c8\ub85c\uc6b4 \ubaa8\ub378\uc740 &hellip;<\/p>\n","protected":false},"author":3,"featured_media":103127,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3555],"tags":[],"coauthors":[1641],"class_list":["post-103926","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-3555"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/11\/Nir-Zuk-IgniteUSA2019.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=103926"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103926\/revisions"}],"predecessor-version":[{"id":103927,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103926\/revisions\/103927"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/103127"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=103926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=103926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=103926"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=103926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}