´ÓRSAC2022´´ÐÂɳºÐ¿´ÔÆÔ­ÉúÄþ¾²ÈüµÀµÄÉú³¤

Ðû²¼Ê±¼ä 2022-06-02

Ò»ÄêÒ»¶ÈµÄRSA´ó»á

½«ÓÚ½ñÄê6ÔÂ6ÈÕÕýʽ¾ÙÐÐ
ÆäÖУ¬´´ÐÂɳºÐ´óÈü

(Innovation Sandbox)
×÷Ϊ¡°Äþ¾²È¦µÄ°Â˹¿¨¡±
ÿÄ걸ÊÜÖõÄ¿£¬
³ÉΪȫÇòÍøÂçÄþ¾²ÐÐÒµ
¼¼Êõ´´ÐºÍͶ×ʵķçÏò±ê


1.jpg


Ä¿Ç°£¬´´ÐÂɳºÐ´óÈüµÄ¾öÈüÈëΧÃûµ¥ÒѾ­³ö¯£¬·Ö±ðÊÇAraali Networks¡¢BastionZero¡¢Cado Security¡¢Cycode¡¢Dasera¡¢Lightspin¡¢Neosec¡¢Sevco Security¡¢Talon Cyber SecurityºÍTorqÊ®¼ÒÓÅÐã³õ´´ÆóÒµ£¬Ö÷ÒªÉæ¼°ÔÆÔ­ÉúÄþ¾²¡¢½ÓÈëÄþ¾²¡¢Èí¼þ¹©Ó¦Á´Äþ¾²¡¢Êý¾ÝÖÎÀí¡¢APIÄþ¾²ºÍÄþ¾²ÔËÓª¶à¸öÈüµÀ¡£Õâ10¼Ò³õ´´¹«Ë¾½«ÓÚ6ÔÂ6ÈÕ£¬ÏòÈ«Çò¹ÛÖÚչʾËûÃÇÔÚÍøÂçÄþ¾²ÐÐÒµÉϵļ¼Êõ´´Ð£¬½ÇÖð×îºóÓ®¼Ò£¬Ò²½«´øÀ´ÐÂÒ»ÂֵĻðÈÈÈüµÀ¡£



Å̵㴴ÐÂɳºÐÖ®ÔÆÔ­ÉúÄþ¾²ÈüµÀÆóÒµ



×ÜÀÀ½ñÄêÈëΧ¾öÈüµÄÊ®¼Ò³õ´´ÆóÒµ£¬ÓÐËļҲÎÈüÆóҵѡÔñÁËÔÆÔ­ÉúÄþ¾²Ï¸·ÖÁìÓò£¬ÕâÔÚÀú½ìRSAC´´ÐÂɳºÐ´óÈüÖбÈÁ¦ÉÙ¼û£¬¿É¼ûÔÆÔ­ÉúÄþ¾²ÈüµÀµÄÈȶÈ×ã¹»¸ßÕÇ¡£ÏÂÃæÎÒÃǾÍÀ´Å̵㱾´ÎÈëΧ¾öÈüµÄ4¸öÔÆÔ­ÉúÄþ¾²Æ«Ïò´´ÐÂÆóÒµ¡£


1¡¢Araali Networks£ºÔÆÔ­Éú»·¾³ÏµÄÍþв·ÀÓù


2.png


Araali NetworksÌṩÁËÒ»¿îÃæÏòÔÆÔ­Éú»·¾³µÄÍþв¼ì²âºÍ·çÏÕ»º½âµÄ¼¼Êõ¿ò¼Ü£¬¿ÉÒÔʶ±ðÓ¦Ó鶴¡¢·ÃÎÊȨÏÞ¡¢ÔÆ»·¾³ÅäÖõȶàά¶È·çÏÕ£¬²¢Ìṩµ¯ÐÔ²¹¶¡¶Ô·çÏÕ½øÐлº½âºÍÐÞ¸´£¬´Ó¶øÓÐЧ·ÀÓù¶ñÒâ´úÂë¡¢ÀÕË÷²¡¶¾¡¢Ä¾ÂíºóÃŵÈÊֶζÔÔÆÔ­Éú»·¾³µÄÍþв¡£Araali NetworksµÄÖ÷Òª¼¼ÊõÌØÉ«ÊÇʹÓÃÁËeBPF¼¼Êõ¶Ôk8sÔËÐÐʱµÄ·ÃÎÊ¿ØÖƼÆı½øÐо«Ï¸¹ÜÀí£¬½µµÍ×ÊÔ´Õ¼Óã¬ÌáÉýʵʱ´¦ÖÃЧÂÊ¡£


2¡¢Cado Security£ºÔÆÔ­Éú»·¾³ÏµÄʼþÈ¡Ö¤ºÍÏìÓ¦


3.png


Cado Security ÌṩÁËÒ»¿î½Ð×öCado ResponseµÄÔÆ»·¾³ÊÓ²ìȡ֤ƽ̨²úÎʹÄþ¾²ÍŶÓÄܹ»ÒÔÔƵÄËÙ¶ÈÏìÓ¦Íþв¡£Í¨¹ýÔÚÔƺÍÈÝÆ÷»·¾³ÖÐ×Ô¶¯Ö´ÐÐÊý¾Ý²¶×½ºÍ´¦Öã¬Cado Response¿ÉÒÔÌṩȡ֤¼¶´ËÍâÏêϸÐÅÏ¢ºÍÅä¾°ÐÅÏ¢£¬´Ó¶øÏû³ýÔÆÖÐÍøÂçÄþ¾²Ê¼þ·ÖÎöµÄÅÓ´óÐÔ¡£Cado ResponseÊÇÎÞÊðÀíģʽ£¬Ö§³ÖÔÆÔ­Éú»·¾³×Ô¶¯»¯²¿Êð£¬Ö§³Öͨ¹ý¿ç¶àÔÆ»·¾³£¨°üÂÞÐéÄâ»ú¡¢Kubernetes»·¾³£©¡¢ÈÝÆ÷»·¾³¡¢ÎÞ·þÎñÆ÷»·¾³ºÍµ±µØϵͳ»·¾³½øÐÐʼþÏìÓ¦ºÍ×Ô¶¯»¯ÊÓ²ìÈ¡Ö¤¡£Cado SecurityµÄÊ×´´ÈËÒ²ÊÇÖøÃûµÄÍþвÇ鱨ƽ̨ThreatCrowdµÄ¹¹½¨Õߣ¬ÔÚÍþвÇ鱨ÊÕ¼¯ºÍÑо¿Æ«ÏòÉϾßÓи»ºñµÄ»ýÀÛ£¬Òò´ËÇ¿´óµÄÇ鱨ÊÕ¼¯ºÍʼþ±ê×¢ÄÜÁ¦³ÉΪCado Response²úÎïµÄÒ»´óÁÁµã¡£


3¡¢Lightspin£º»ùÓÚÉÏÏÂÎÄ·ÖÎöµÄÔÆÔ­ÉúÓ¦Ó÷¨Ê½±£»¤Æ½Ì¨



4.png


LightspinÍƳöÁËÔÆÔ­ÉúÓ¦Ó÷¨Ê½±£»¤Æ½Ì¨ (CNAPP)£¬´ÓÈëÇÖÕßµÄÊÓ½ÇÀ´¿´´ýÔÆ»·¾³£¬Á½¸öÖ÷ÒªÌØÉ«Êǹ¥»÷·¾¶·ÖÎöºÍÍþв¿ÉÊÓ»¯¡£Lightspin ƽ̨֧³Ö DevOps£¬Í¨¹ýÄþ¾²×óÒÆ£¬ÊµÏÖIaC£¨»ù´¡ÉèÊ©¼´´úÂ룩Äþ¾²£¬²¢ÊÊÓÃÓÚÔÆÔ­ÉúÄþ¾²µÄËùÓн׶Ρ£¸Ãƽ̨¿ÉÒÔʶ±ðÔÆÔ­Éú»·¾³ÖеĹ¥»÷·¾¶£¬²¢»ùÓÚÉÏÏÂÎĶԹ¥»÷·¾¶½øÐзÖÎö£¬´Ó¶ø±êʶ¹¥»÷·¾¶Öи澯µÄÓÅÏȼ¶¡£LightspinÔÚ2021ÄêµÄ RSA´ó»áÉÏÒѾ­Õ¸Â¶Í·½Ç£¬»ñµÃÁËCDM Global Infosec·¢±íµÄSaaS/ÔÆÄþ¾²ÈÈÃŹ«Ë¾½±¡£


4¡¢Sevco Security£ºÃæÏòÔÆÔ­ÉúºÍµ±µØ»·¾³µÄ¶àÊý¾ÝÈÚºÏ×ʲú¹ÜÀíƽ̨


5.png


Sevco SecurityÌṩÁËÒ»Ì×Äܹ»»ùÓÚÔÆÔ­Éú»·¾³²¿ÊðµÄ×ʲúÖÇÄܹÜÀíƽ̨£¬¿Éͨ¹ýAPI¶Ô½Ó²îÒìÊý¾ÝÔ´µÄ×ʲúÇåµ¥¶ÔÔÆÔ­ÉúºÍµ±µØ»·¾³µÄ¶àÔ´×ʲú¹ÜÀíÈí¼þµÄÊý¾Ý½øÐÐÈںϣ¬½¨Á¢¸üÈ«ÃæµÄ×ʲú¿â£¬ÒÔʶ±ðÆóÒµÍøÂçÖеĴàÈõ×ʲú£¬´Ó¶øʵʱ¸ú×Ù×ʲú¿âÖÐ×ʲú״̬±ä»¯Çé¿ö¡£Sevco SecurityµÄÖ÷ÒªÍŶӳÉÔ±À´×ÔCarbon Black£¬ÔÚÖ÷»úÄþ¾²ºÍÖÕ¶Ë×ʲú¹ÜÀíÆ«ÏòÉÏÓзdz£¸»ºñµÄ»ýÀÛºÍʵ¼ù¾­Ñ顣ĿǰÒѾ­¶Ô½ÓÁËAutomox¡¢CrowdStrike¡¢Lansweeper¡¢MalwareBytes Nebula¡¢Microsoft AD 5¸ö³§É̵Ä×ʲúÊý¾Ý£¬Ö§³Ö¶Ô¶àÊý¾ÝÔ´×ʲúµÄ½»²æ²éѯºÍ¼ìË÷¡£



ÔÆÔ­ÉúÄþ¾²½«Ó­ÐÂÈȵãÈüµÀ



ËļÒÈëΧ´´ÐÂɳºÐ¾öÈüµÄÔÆÔ­ÉúÄþ¾²ÈüµÀÆóÒµ£¬Æä²úÎïÁýÕÖÁËÔÆÔ­ÉúÄþ¾²µÄ¸÷¸ö·½Ã棬°üÂÞÁËÔÆÔ­Éú»·¾³ÏµÄ×ʲú¹ÜÀí¡¢Íþв¼ì²â¡¢È¡Ö¤ÏìÓ¦ºÍÕû¸öÉúÃüÖÜÆÚµÄÄþ¾²·À»¤ºÍ¹¥»÷Á´¿ÉÊÓ»¯£¬ÈçÏÂͼËùʾ£º


6.png


ͨ¹ý¶ÔÈëΧ³§É̵ķÖÎö¿ÉÒÔ·¢ÏÖ£¬ÔÆÔ­ÉúÄþ¾²ÒѾ­³ÉΪ±±ÃÀµØÓòµÄÈȵãÈüµÀ£¬¶øÇÒ¹Ø×¢¶ÈÁ¬ÐøÔö¸ß¡£


Ëæ×ÅÔƼÆËãµÄ¹ã·ºÉú³¤ºÍÓ¦Óã¬ÎÒ¹úµÄÔÆÔ­ÉúÄþ¾²Ò²½«Ó­À´È«ÃæµÄ·¢×÷Ôö³¤¡£¾Ý2021ÄêµÄÖйúÔÆÔ­ÉúÐÐÒµÑо¿³ÂËßÖ¸³ö£¬Áè¼Ý60%µÄÔÆÔ­ÉúÓû§ÒѾ­ÔÚÉú²ú»·¾³ÖÐÓ¦ÓÃÁËÈÝÆ÷¼¼Êõ£¬½ü30%µÄÓû§ÕýÔÚ²âÆÀ»òÕýÔÚ¿¼ÂÇʹÓÃÈÝÆ÷¼¼Êõ¡£


ÈÝÆ÷¼¼ÊõÊÇÔÆÔ­ÉúÌåϵµ×²ã¼¼Êõ£¬Òò¶øÈÝÆ÷Äþ¾²Ò²ÊÇÔÆÔ­ÉúÄþ¾²µÄ»ùʯ¡£ÈÝÆ÷±àÅż¼Êõ¡¢Î¢·þÎñ¼¼ÊõºÍ΢¸ôÀë¼¼ÊõµÄÉú³¤£¬Ò²ÎªÈÝÆ÷¼¼ÊõµÞÔìÁËÍêÉƵÄÉú̬»·¾³ºÍ¼¼ÊõÌåϵ£¬Ö§³ÅÁËÈÝÆ÷¼¼ÊõµÄ¹ã·ºÓ¦Óú͵ü´úÉú³¤¡£


Ëæ×ÅÒµÎñÐèÇóÓë¼¼ÊõÐèÇóµÄË«ÂÖÇý¶¯£¬ÈÝÆ÷Äþ¾²¼¼Êõ½«»áÓëÔÆÔ­Éú¼Ü¹¹Ò»ÆðЭͬÉÑݽø£¬²¢²»Í£ÍØÕ¹ÆäÓ¦Óó¡¾°£¬ÎªÔËÓªÉÌ¡¢ÄÜÔ´¡¢½ðÈÚ¡¢»¥ÁªÍøµÈÐÐÒµÓû§µÞÔì³ö¸ü¶à¼ÛÖµ¡£


7.png


×÷Ϊ¹úÄÚ½ÏÔç¼ÓÈëÔÆÔ­ÉúÄþ¾²³§ÉÌÖ®Ò»£¬¶«É­Æ½Ì¨¼¯ÍÅÔÚÕþ¸®¡¢ÔËÓªÉÌ¡¢ÄÜÔ´¡¢½ðÈÚµÈÐÐÒµ»ýÀÛÁËÖÚ¶àÏîĿʵս¾­Ñ飬¾ß±¸ÍêÕûµÄÔÆÔ­ÉúÄþ¾²²úÎïÁ´Ìõ¡£²úÎïÒÔÔÆÔ­ÉúÉúÃüÖÜÆÚΪºËÐÄ£¬ÒÔÄþ¾²×óÒÆΪ˼Ï룬½«Äþ¾²ÄÜÁ¦È«ÃæÈÚÈëµ½DevOpsÌåϵÖУ¬¹¹½¨ÃæÏòDevSecOpsÈ«ÉúÃüÖÜÆÚÄþ¾²·À»¤Ìåϵ£¬ÖúÁ¦²îÒìÐÐÒµÓû§·½°¸µÄ¿ìËÙÂäµØ£¬×ÊÖúÓû§½â¾ö»ù´¡ÉèÊ©ÔÆ»¯¹ý³ÌÖÐÒµÎñÃæÁÙµÄʵ¼ÊÎÊÌâ¡£