{"id":180306,"date":"2023-02-27T15:40:33","date_gmt":"2023-02-27T23:40:33","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=180306"},"modified":"2023-02-27T15:40:33","modified_gmt":"2023-02-27T23:40:33","slug":"%ec%9a%b4%ec%98%81-%eb%8b%a4%ec%9a%b4%ed%83%80%ec%9e%84-%ec%97%86%eb%8a%94-%ec%a0%9c%eb%a1%9c-%ed%8a%b8%eb%9f%ac%ec%8a%a4%ed%8a%b8-ot-%eb%b3%b4%ec%95%88","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2023\/02\/%ec%9a%b4%ec%98%81-%eb%8b%a4%ec%9a%b4%ed%83%80%ec%9e%84-%ec%97%86%eb%8a%94-%ec%a0%9c%eb%a1%9c-%ed%8a%b8%eb%9f%ac%ec%8a%a4%ed%8a%b8-ot-%eb%b3%b4%ec%95%88\/?lang=ko","title":{"rendered":"\uc6b4\uc601 \ub2e4\uc6b4\ud0c0\uc784 \uc5c6\ub294 \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 OT \ubcf4\uc548"},"content":{"rendered":"<p>Palo Alto Networks\uc758 \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \uc0ac\uc5c5\ubd80 \uc120\uc784 \ubd80\uc0ac\uc7a5 \uc9c1\ucc45\uc744 \ub9e1\uace0 \uc788\ub2e4 \ubcf4\ub2c8, \ub9e4\ub144 \uc218\ubc31 \uacf3\uc758 \uace0\uac1d \uc5c5\uccb4\uc640 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc744 \uad00\ub9ac\ud558\uba74\uc11c \uacaa\ub294 \uc5b4\ub824\uc6c0\uc5d0 \uad00\ud55c \uc774\uc57c\uae30\ub97c \ub098\ub204\uac8c \ub429\ub2c8\ub2e4. \uc9c0\ub09c \uba87 \ub144\uac04 \ub098\ud0c0\ub09c \uc8fc\ubaa9\ud560 \ub9cc\ud55c \ub3d9\ud5a5 \uc911\uc5d0 \ub2e4\uc591\ud55c \uc5c5\uc885\uc5d0\uc11c \ub514\uc9c0\ud138 \ud601\uc2e0\uc774 \ube68\ub77c\uc9d0\uc5d0 \ub530\ub77c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc694\uad6c \uc0ac\ud56d\uc774 \uc11c\ub85c \ub2e4\ub978 \ud615\ud0dc\ub85c \ubc1c\ub2ec\ud558\uac8c \ub41c \uac83\uc774 \ucc38 \ud765\ubbf8\ub85c\uc6e0\uc2b5\ub2c8\ub2e4. \uadf8\uc911\uc5d0\uc11c\ub3c4 \uace0\uc720\ud55c \uc694\uad6c \uc0ac\ud56d\uc774 \uc218\ubc18\ub418\uace0, \uc8fc\ubcc0\uc5d0 \uace0\uc720\ud55c \uc5ec\ud30c\ub97c \ubbf8\uce58\ub294 \ub300\ud45c\uc801\uc778 \uc5c5\uc885\uc73c\ub85c\ub294 \uc8fc\uc694 \uc778\ud504\ub77c\uc758 \uc0c1\ub2f9 \ubd80\ubd84\uc744 \ucc28\uc9c0\ud558\ub294 OT \ubd80\ubb38\uc774 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\uc81c\uc870, \uc804\uae30 \uc124\ube44, \ubb3c\ub958 \ub4f1\uc758 \uc5c5\uacc4 \uace0\uac1d\uacfc \ub9cc\ub098\ubcf8 \uacb0\uacfc, Palo Alto Networks\uc5d0\uc11c \uc81c\uacf5\ud558\ub294 \ub3d9\uae09 \ucd5c\uace0\uc758 \ubcf4\uc548\uc774 \uc808\uc2e4\ud558\ub2e4\ub294 \uc774\uc57c\uae30\ub97c \ub9ce\uc774 \ub4e4\uc5c8\uc2b5\ub2c8\ub2e4. \uadf8\ub7f0\ub370 \uadf8\uac83\uc73c\ub85c \ub300\ud654\uac00 \ub05d\ub09c \uac83\uc774 \uc544\ub2c8\ub77c, \uc6b0\uc218\ud55c \ubcf4\uc548\uc744 \ud655\ubcf4\ud558\ub294 \uac83\ub3c4 \ubb3c\ub860 \uc911\uc694\ud558\uc9c0\ub9cc \uc6b4\uc601 \ub2e4\uc6b4\ud0c0\uc784\uc774 \ubc1c\uc0dd\ud574\uc11c\ub294 \uc548 \ub41c\ub2e4\ub294 \uc0ac\uc2e4\uc744 \uac15\uc870\ud558\ub294 \uace0\uac1d\uc774 \ub9ce\uc558\uc2b5\ub2c8\ub2e4. \uc6b4\uc601\uc774 \uc911\ub2e8\ub418\uba74 \uc218\uc775\uc5d0 \uc989\uac01\uc801\uc73c\ub85c \ud0c0\uaca9\uc774 \ubc1c\uc0dd\ud558\uae30 \ub54c\ubb38\uc785\ub2c8\ub2e4. \uac8c\ub2e4\uac00 \uc6b4\uc601\uc774 \uc911\ub2e8\ub418\uba74 \uadfc\ub85c\uc790\uc640 \uace0\uac1d, \uc77c\ubc18 \ub300\uc911\uc758 \uc548\uc804\uc5d0\ub3c4 \uc911\ub300\ud55c \ud0c0\uaca9\uc774 \ubc1c\uc0dd\ud560 \uc218 \uc788\uae30 \ub54c\ubb38\uc774\uae30\ub3c4 \ud569\ub2c8\ub2e4.<\/p>\n<p><strong>\uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 OT \ubcf4\uc548\uacfc Industrial OT Security<\/strong><\/p>\n<p>\uc624\ub298\uc740 Palo Alto Networks\uc5d0\uc11c \uc774\uc640 \uac19\uc740 OT \uc5c5\uccb4\uc758 \uace0\uc720\ud55c \uc694\uad6c \uc0ac\ud56d\uc5d0 \ub9de\ucdb0 \ud2b9\ubcc4\ud788 \uace0\uc548\ud55c \ucd5c\uc2e0 \uc194\ub8e8\uc158\uc744 \ucd9c\uc2dc\ud55c\ub2e4\ub294 \ubc18\uac00\uc6b4 \uc18c\uc2dd\uc744 \uc54c\ub824\ub4dc\ub9bd\ub2c8\ub2e4. \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 OT \ubcf4\uc548\uc740 OT \uc790\uc0b0 \ubc0f \ub124\ud2b8\uc6cc\ud06c, 5G\ub85c \uc5f0\uacb0\ub41c \uc790\uc0b0, \uc6d0\uaca9 \uc6b4\uc601 \ub4f1\uc5d0 \ub300\ud55c \ud3ec\uad04\uc801\uc778 \uac00\uc2dc\uc131\uacfc \ubcf4\uc548\uc744 \ud655\ubcf4\ud558\ub3c4\ub85d \uc124\uacc4\ud558\uc5ec \uae30\uc5c5\uc774 \ud544\uc694\ub85c \ud558\ub294 \ubaa8\ub4e0 \uacf3\uc5d0 \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8\ub97c \uc77c\uad00\ub418\uac8c \uc801\uc6a9\ud558\ub3c4\ub85d \uc9c0\uc6d0\ud569\ub2c8\ub2e4. Enterprise Strategy Group\uc758 \uc804\ubb38\uac00 \ud300\uc740 \uc774 \ucd5c\uc2e0 \uc194\ub8e8\uc158\uc744 \uc811\ud55c \ud6c4 \uc544\ub798\uc640 \uac19\uc774 \uc804\ud588\uc2b5\ub2c8\ub2e4.<\/p>\n<p><em>\"\uc0b0\uc5c5\uc6a9 OT \uc2dc\uc2a4\ud15c\uacfc IT \uc2dc\uc2a4\ud15c\uc758 \uc0c1\ud638 \uc5f0\uacb0\uc131\uc774 \uc99d\uac00\ud558\uba74\uc11c, \uacf5\uaca9\uc790\uac00 \uc774\uc6a9\ud560 \uc218 \uc788\ub294 \uacf5\uaca9 \ud45c\uba74 \uaddc\ubaa8\ub3c4 \ub530\ub77c\uc11c \ucee4\uc9c0\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc810\uc810 \uc815\uad50\ud574\uc9c0\ub294 \uc704\ud611\uc5d0 \ub9de\uc11c \uae30\uc5c5\uc744 \ubc29\uc5b4\ud558\ub824\uba74 OT\uc640 IT, \ub124\ud2b8\uc6cc\ud06c, \ub514\ubc14\uc774\uc2a4, \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uacfc \uc0ac\uc6a9\uc790 \uc804\uccb4\ub97c \ucd1d\ub9dd\ub77c\ud574 \uac00\uc2dc\uc131, \uc138\ubd84\ud654\ub41c \ucee8\ud14d\uc2a4\ud2b8, \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \uae30\ub2a5\uc744 \uc81c\uacf5\ud558\ub294 \uad11\ubc94\uc704\ud55c \ubcf4\uc548 \uc804\ub7b5\uc774 \uaf2d \ud544\uc694\ud569\ub2c8\ub2e4. Palo Alto Networks \uc194\ub8e8\uc158\uc740 \uc774\ub7ec\ud55c \ud1b5\ud569\ud615 \ubcf4\uc548 \ubaa8\ub378\uc744 \ub3c4\uc785\ud574 \ubcf5\uc7a1\ud55c OT \ud658\uacbd\uc744 \uc798 \ubcf4\ud638\ud560 \uac83\uc73c\ub85c \ubcf4\uc785\ub2c8\ub2e4.\" \u2013 Dave Gruber, Enterprise Strategy Group \uc218\uc11d \uc560\ub110\ub9ac\uc2a4\ud2b8<\/em><\/p>\n<p>Palo Alto Networks \uc194\ub8e8\uc158\uc740 \uc65c \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \uae30\ubc18\uc744 \ud0dd\ud588\uc744\uae4c\uc694? \uba87 \uc8fc \uc804\ucbe4\uc5d0 \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8\uac00 \uc911\uc694 \uc778\ud504\ub77c\uc5d0 \uc911\uc694\ud55c \uc758\ubbf8\ub97c \uc9c0\ub2c8\ub294 \uc774\uc720\ub97c <a href=\"https:\/\/www.paloaltonetworks.com\/cybersecurity-perspectives\/zero-trust-for-critical-infrastructure?utm_source=bambu&amp;medium=social&amp;campaign=advocacy\">\uc2ec\uce35 \ud0d0\uad6c\ud55c \uae00<\/a>\uc744 \uac8c\uc7ac\ud588\uc2b5\ub2c8\ub2e4. \uadf8 \uae00\uc5d0\uc11c \uc9c0\uc801\ud55c \uc694\uc810 \ud55c \uac00\uc9c0\ub97c \uc5ec\uae30\uc11c\ub3c4 \uac15\uc870\ud558\uace0\uc790 \ud569\ub2c8\ub2e4.<\/p>\n<p><em>\uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8\ub294 \uc0ac\uc6a9\uc790\uc5d0\ub9cc \uad6d\ud55c\ub418\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \uac19\uc740 \uc6d0\uce59\uc744 \ud074\ub77c\uc6b0\ub4dc \uc6cc\ud06c\ub85c\ub4dc \ubc0f OT \ub514\ubc14\uc774\uc2a4\ub098 \ub124\ud2b8\uc6cc\ud06c \ub178\ub4dc \ub4f1 \uc778\ud504\ub77c \uad6c\uc131 \uc694\uc18c\uc5d0\ub3c4 \uc801\uc6a9\ud569\ub2c8\ub2e4. \uadf8\ub798\ub3c4 \ub514\ubc14\uc774\uc2a4\uac00 \ud558\ub824\uace0 \ud558\ub294 \uc791\uc5c5\uc744 \uc778\uc99d\ud558\uace0 \uc81c\uc5b4 \uae30\ub2a5\uc744 \uc81c\uacf5\ud558\ub824\uba74 \ub514\ubc14\uc774\uc2a4\uc640 \uc561\uc138\uc2a4\ub97c \uc778\uc99d\ud574\uc57c \ud558\uae30\ub294 \ub9c8\ucc2c\uac00\uc9c0\uc778\ub370, \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8\uac00 \ubc14\ub85c \uc774 \uc5ed\ud560\uc744 \ud569\ub2c8\ub2e4.<\/em><\/p>\n<p>Palo Alto Networks\uac00 \uc81c\uacf5\ud558\ub294 \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \uae30\ub2a5\uc744 OT \ud658\uacbd\uc5d0\ub3c4 \ud655\ub300 \ub3c4\uc785\ud560 \uc218 \uc788\uac8c \ub418\uc5b4 \uae30\uc069\ub2c8\ub2e4.<\/p>\n<p>\uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 OT \ubcf4\uc548 \uc194\ub8e8\uc158\uc758 \uc77c\ud658\uc73c\ub85c \uc0c8\ub85c\uc6b4 \ubcf4\uc548 \uc11c\ube44\uc2a4, \uc989 Industrial OT Security\ub3c4 \ucd9c\uc2dc\ud569\ub2c8\ub2e4. Industrial OT Security(\ube14\ub85c\uadf8 \ub9c1\ud06c)\ub294 ML \uae30\ubc18\uc758 \uc885\ud569\uc801\uc778 \uac00\uc2dc\uc131, \ubcf4\uc548 \uc815\ucc45 \ucd94\ucc9c, \ub3d9\uae09 \ucd5c\uace0\uc758 \uc704\ud611 \ubc29\uc9c0, \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \uc801\uc6a9\uc744 \ud1b5\ud574 OT \uc790\uc0b0\uc758 \ubcf4\uc548\uc744 \ud655\ubcf4\ud569\ub2c8\ub2e4. \uba38\uc2e0 \ub7ec\ub2dd(ML)\uacfc \ud06c\ub77c\uc6b0\ub4dc\uc18c\uc2f1 \ud154\ub808\uba54\ud2b8\ub9ac\ub97c \ud568\uaed8 \uc0ac\uc6a9\ud574 \uc218\ubc31 \uac00\uc9c0 \uace0\uc720\ud55c \uc790\uc0b0 \ud504\ub85c\ud544, OT\ubcc4 \uc704\ud611 \uc2dc\uadf8\ub2c8\ucc98\uc640 1,000\uc5ec \uac00\uc9c0 OT\/ICS\/SCADA \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc744 \uc778\uc2dd\ud569\ub2c8\ub2e4. \ucd5c\uadfc Enterprise Security Group\uc774 \uc2e4\uc2dc\ud55c \uc5f0\uad6c\uc5d0 \ub530\ub974\uba74, Industrial OT Security\ub294 \ub300\uccb4 \uc81c\ud488 \ub300\ube44 351%\uc758 \ud22c\uc790 \uc218\uc775(ROI)\uc744 \uc81c\uacf5\ud558\uba70 \ubcf5\uc7a1\uc131\uc740 \ucd5c\ub300 95%\uae4c\uc9c0 \uacbd\uac10\ud558\uace0, \ub3d9\uc2dc\uc5d0 \ub9ac\uc2a4\ud06c\ub97c \uc644\ud654\ud558\ub294 \ud6a8\uacfc\uac00 \uc788\ub294 \uac83\uc73c\ub85c \ub098\ud0c0\ub0ac\uc2b5\ub2c8\ub2e4.<\/p>\n<p><strong>\ud3ec\uad04\uc801\uc778 \ubcf4\uc548 \ubcf4\uc7a5<\/strong><\/p>\n<p>\uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 OT \ubcf4\uc548\uc740 \ub3d9\uae09 \ucd5c\uace0\uc758 \ubcf4\uc548\uacfc \ud0c1\uc6d4\ud55c \uc6b4\uc601 \uac00\ub3d9 \uc2dc\uac04\uc744 \uacb8\ube44\ud558\ub3c4\ub85d, \ud2b9\ud788 \uc138 \uac00\uc9c0 \uc6d0\uce59\uc5d0 \uc8fc\uc548\uc810\uc744 \ub450\uc5b4 \uac1c\ubc1c\ud588\uc2b5\ub2c8\ub2e4.<\/p>\n<ul>\n<li><strong>\ud3ec\uad04\uc801\uc778 \uac00\uc2dc\uc131\uc5d0\uc11c \uc2dc\uc791 -<\/strong> \ubcf4\uc774\uc9c0 \uc54a\ub294 \uac83\uc744 \ubcf4\ud638\ud560 \uc218\ub294 \uc5c6\ub294 \ubc95\uc785\ub2c8\ub2e4. \uadf8\ub9ac\uace0 OT \uc790\uc0b0\uc740 \ud0d0\uc0c9\ud558\uae30 \uadf9\ud788 \uc5b4\ub824\uc6b4 \ub514\ubc14\uc774\uc2a4\uc785\ub2c8\ub2e4. Palo Alto Networks \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 OT \ubcf4\uc548 \uc194\ub8e8\uc158\uc740 \uc774\ubbf8 \ub3d9\uae09 \ucd5c\uace0\ub85c \uc778\uc815\ubc1b\uc740 \uac00\uc2dc\uc131\uc744 \uae30\ucd08\ub85c, \ucd5c\uc2e0 Industrial OT Security \uc11c\ube44\uc2a4\ub97c \ud1b5\ud574 \uc2ec\uce35\uc801\uc774\uace0 \uad11\ubc94\uc704\ud55c OT \ub514\ubc14\uc774\uc2a4 \ucee4\ubc84\ub9ac\uc9c0\uae4c\uc9c0 \ucd94\uac00\ub85c \uc81c\uacf5\ud569\ub2c8\ub2e4. \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 OT \ubcf4\uc548\uc744 \uc774\uc6a9\ud558\uba74 \ubaa8\ub4e0 \uac83\uc744 \uc2dc\uc57c\uc5d0 \ub123\ub294 \uae30\ubcf8 \ud1a0\ub300\ub97c \uad6c\ucd95\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li><strong>\ubaa8\ub4e0 \ud658\uacbd\uc5d0 \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \uc801\uc6a9 <\/strong>- \uc0c8\ub85c \uc811\ud558\ub294 \ud658\uacbd\uc774 \ub9e4\uc6b0 \ub2e4\uc591\ud558\ubbc0\ub85c \uc77c\uc77c\uc774 \ub2e4\ub8e8\uae30 \uc5b4\ub824\uc6cc \ud798\ub4e4\ub2e4\ub294 \uace0\uac1d \uc758\uacac\uc774 \ub9ce\uc2b5\ub2c8\ub2e4. \uc608\ub97c \ub4e4\uc5b4 OT \ub514\ubc14\uc774\uc2a4\uc640 IT \ub514\ubc14\uc774\uc2a4\ub97c \ub124\ud2b8\uc6cc\ud06c\uc0c1\uc5d0\uc11c \uc735\ud569\ud558\uace0, \uac70\uae30\uc5d0 \uc9c1\uc6d0, \ud30c\ud2b8\ub108, \uacf5\uae09\uc5c5\uccb4\uac00 \uc6d0\uaca9\uc73c\ub85c \uc124\ube44\uc5d0 \uc561\uc138\uc2a4\ud569\ub2c8\ub2e4. \ub610\ud55c 5G \ub124\ud2b8\uc6cc\ud06c\uac00 \ub300\ud3ed \ud655\ub300\ub418\ub294 \ub4f1 \ucca8\ub2e8 \uae30\uc220\uc774 \ub3c4\uc785\ub418\uba74\uc11c \uc544\ud0a4\ud14d\ucc98\ub294 \uc810\uc810 \ub354 \ubcf5\uc7a1\ud574\uc9c0\uace0 \uc788\uc2b5\ub2c8\ub2e4 \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 OT \ubcf4\uc548\uc744 \uc774\uc6a9\ud558\uba74 \uc774\ub7f0 \uac01\uac01\uc758 \ud658\uacbd\uc744 \uc5c5\uacc4 \ucd5c\uace0\uc758 \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \ubcf4\uc548\uc73c\ub85c \uc190\uc27d\uac8c \ubcf4\ud638\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 OT \ubcf4\uc548\uc740 \ucd5c\uc18c \uad8c\ud55c \uc561\uc138\uc2a4 \uc81c\uc5b4\ubd80\ud130 \uc9c0\uc18d\uc801\uc778 \uc2e0\ub8b0 \uac80\uc99d, \ubcf4\uc548 \uac80\uc0ac\uc5d0 \uc774\ub974\uae30\uae4c\uc9c0 \uc704\uce58\uc5d0 \uad6c\uc560\ubc1b\uc9c0 \uc54a\uace0 \ub2e4\uc591\ud55c \uae30\ub2a5\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/li>\n<li><strong>\uc6b4\uc601 \uac04\uc18c\ud654 <\/strong>- \uc800\ud76c \uc785\uc7a5\uc5d0\uc11c \uac00\uc7a5 \ubc18\uac00\uc6b4 \uace0\uac1d\uc740 \uc0ac\uc77c\ub85c\ud654\ub41c \uc194\ub8e8\uc158 \uc5ec\ub7ec \uac1c\ub97c \uaff0\uc5b4\ub9de\ucdb0\uc11c \uac00\uc2dc\uc131 \ubb38\uc81c\ub97c \uc870\uae08\uc529 \uc644\ud654\ud558\uace0, \uace0\uc720\ud55c \ud658\uacbd\ub9c8\ub2e4 \ubc1c\uc0dd\ud558\ub294 \ubcf4\uc548 \ud5c8\uc810\uc744 \uba54\uc6cc\ubcf4\ub824 \ubd84\ud22c\ud558\ub294 \uace0\uac1d\uc785\ub2c8\ub2e4. \uc774\ub7f0 \uace0\uac1d\uc740 \uc5ec\ub7ec \uac1c \uc194\ub8e8\uc158\uc744 \ubcf4\uc720\ud558\ub2e4 \ubcf4\ub2c8 \ud658\uacbd\uc774 \ubcf5\uc7a1\ud574\uc838 \ubcf4\uc548 \uac04\uadf9\uc774 \uc0dd\uae30\uace0 \ud300\uc758 \uc5c5\ubb34 \ubd80\ub2f4\ub3c4 \uc2ec\ud558\uba70 \uc7ac\uc815\uc801\uc73c\ub85c\ub3c4 \ubd80\ub2f4\uc774 \ucee4\uc9c0\uac8c \ub429\ub2c8\ub2e4. \uc774\ub54c \uc77c\uad00\ub418\uace0, \uc0ac\uc6a9\uc774 \uac04\ud3b8\ud558\uace0, \uc810\uc810 \ubd88\uc548\ud574\uc9c0\ub294 \uacbd\uae30\ub97c \uac10\uc548\ud574 \uac00\uaca9\ub3c4 \uc801\ub2f9\ud55c \uc194\ub8e8\uc158\uc774 \uc808\uc2e4\ud569\ub2c8\ub2e4. \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 OT \ubcf4\uc548\uc740 \ub2e8 \ud55c \uacf3\uc758 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \ud30c\ud2b8\ub108\uac00 \uc77c\uad00\ub41c \ubcf4\uc548\uc744 \uc81c\uacf5\ud558\ub3c4\ub85d \uace0\uc548\ud588\uc73c\ubbc0\ub85c, \uace0\uac1d\uc774 \uc14b\uc5c5\uc774\ub098 \uc0ac\uc77c\ub85c\uc5d0\uc11c \ubc97\uc5b4\ub098 \uc2dc\uac04\uc801\uc778 \uc5ec\uc720\ub97c \uc5bb\uac8c \ub429\ub2c8\ub2e4.<\/li>\n<\/ul>\n<p>Palo Alto Networks \uc194\ub8e8\uc158\uc740 \uc774\ub7f0 \uc138 \uac00\uc9c0 \uc6d0\uce59\uc744 \uace0\uc218\ud574 OT \ub9ac\ub354 \uae30\uc5c5\uc5d0 \uc808\uc2e4\ud55c \uac83, \ubc14\ub85c \uc0c1\uc2dc \uc6b4\uc601\uc744 \ubcf4\uc7a5\ud558\ub294 \ubcf4\uc548\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4(CISO \uc544\ub2d8).<\/p>\n<p><strong>\uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 OT \ubcf4\uc548\uc5d0 \uad00\ud574 \uc790\uc138\ud788 \uc54c\uc544\ubcf4\uae30: <\/strong>\uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 OT \ubcf4\uc548\uc5d0 \uad00\ud55c \uc790\uc138\ud55c \uc815\ubcf4\ub97c \uc6d0\ud558\uc2dc\ub098\uc694? \uc194\ub8e8\uc158 \ud398\uc774\uc9c0\uc5d0\uc11c \ub354 \ub9ce\uc740 \ub9ac\uc18c\uc2a4\uc640 \uc0ac\ub840 \uc5f0\uad6c\ub97c \ucc38\uc870\ud558\uc138\uc694. <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/zero-trust-ot-security\">\ud398\uc774\uc9c0\ub85c \uc774\ub3d9<\/a><\/p>\n<p><strong>Industrial OT Security\uc5d0 \uad00\ud574 \uc790\uc138\ud788 \uc54c\uc544\ubcf4\uae30: <\/strong>Industrial OT Security\uac00 \ub300\uccb4 OT \ubcf4\uc548 \uc194\ub8e8\uc158 \ub300\ube44 351%\uc758 \ub192\uc740 \ud22c\uc790 \uc218\uc775(ROI)\uc744 \uc2e4\ud604\ud558\uace0, \ubcf5\uc7a1\uc131\uc744 \ucd5c\ub300 95% \uacbd\uac10\ud558\ub3c4\ub85d \uc9c0\uc6d0\ud558\ub294 \ubc29\ubc95\uc5d0 \uad00\ud574 <strong>\uc790\uc138\ud788 \uc54c\uc544\ubcf4\ub824\uba74<\/strong> <a href=\"http:\/\/paloaltonetworks.com\/resources\/whitepapers\/economic-validation-report-industrial-ot-security\">\ub9ac\uc11c\uce58 \uacb0\uacfc\ub97c \ub2e4\uc6b4\ub85c\ub4dc<\/a>\ud558\uc138\uc694.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks\uc758 \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \uc0ac\uc5c5\ubd80 \uc120\uc784 \ubd80\uc0ac\uc7a5 \uc9c1\ucc45\uc744 \ub9e1\uace0 \uc788\ub2e4 \ubcf4\ub2c8, \ub9e4\ub144 \uc218\ubc31 \uacf3\uc758 \uace0\uac1d \uc5c5\uccb4\uc640 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc744 \uad00\ub9ac\ud558\uba74\uc11c \uacaa\ub294 \uc5b4\ub824\uc6c0\uc5d0 \uad00\ud55c \uc774\uc57c\uae30\ub97c \ub098\ub204\uac8c \ub429\ub2c8\ub2e4. \uc9c0\ub09c \uba87 \ub144\uac04 \ub098\ud0c0\ub09c \uc8fc\ubaa9\ud560 \ub9cc\ud55c &hellip;<\/p>\n","protected":false},"author":723,"featured_media":180159,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[8565,8566],"tags":[],"coauthors":[7076],"class_list":["post-180306","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement-ko","category-products-and-services-ko"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2023\/02\/cq5dam.web_.1280.1280.jpeg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/180306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=180306"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/180306\/revisions"}],"predecessor-version":[{"id":180307,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/180306\/revisions\/180307"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/180159"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=180306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=180306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=180306"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=180306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}