์‚ฌ์ด๋ฒ„ ์ปจํŠธ๋กค๋Ÿฌ

์‚ฌ์ด๋ฒ„ ์ปจํŠธ๋กค๋Ÿฌ

Management, Configuration & Attack Lifecycle - Unified.

์‚ฌ์ด๋ฒ„ ์ปจํŠธ๋กค๋Ÿฌ๋Š” ์–ด๋–ค ์ผ์„ ํ•ฉ๋‹ˆ๊นŒ?

The Radware Cyber Controller is a unified solution for management, configuration and attack lifecycle. Radware Cyber Controller provides frictionless security, increased visibility and an improved user experience via multiple security operation dashboards for a unified view into attack lifecycle and mitigation analysis for both inline and out-of-path DDoS deployments. Cyber Controller provides network analytics with comprehensive visibility of traffic statistics during peacetime and attack, simplified management and configuration with unified visibility and control.

"๋ผ๋“œ์›จ์–ด๋Š” ์˜จํ”„๋ ˆ๋ฏธ์Šค ๋ฐ์ดํ„ฐ ์„ผํ„ฐ, ํ”„๋ผ์ด๋น— ๋˜๋Š” ํผ๋ธ”๋ฆญ ํด๋ผ์šฐ๋“œ, ํ†ตํ•ฉ WAF, ๋ชจ๋“  ํ™˜๊ฒฝ์„ ์œ„ํ•œ ๋ด‡ ๋ฐ API ๋ณดํ˜ธ, ํผ๋ธ”๋ฆญ ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์„ ์œ„ํ•œ ๋‹ค๋ฉด์  ๋ณดํ˜ธ, ๊ณ ๊ธ‰ ๋ฉ€ํ‹ฐ ํด๋ผ์šฐ๋“œ ADC๋ฅผ ํฌํ•จํ•œ ๋ชจ๋“  ์ธํ”„๋ผ์— ๋Œ€ํ•œ DDoS ๋ณดํ˜ธ๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค."

Sachin Birajdar
๋ถ„์„๊ฐ€, Quadrant Knowledge Solutions

SPARK ๋งคํŠธ๋ฆญ์Šค ๋ณด๊ธฐ: DDoS ๊ฒฝ๊ฐ, 2022

๊ฐ„๋‹จํ•œ ๊ด€๋ฆฌ์™€ ์„ค์ •์„ ํ†ตํ•ด ์ œ๊ณต๋˜๋Š”
ํ’๋ถ€ํ•œ ์‚ฌ์šฉ์ž ๊ฒฝํ—˜ ๋ฐ ๊ฐ€์‹œ์„ฑ

๊ฐ•๋ ฅํ•œ ๋ถ„์„

๊ฐ•๋ ฅํ•œ ๋ถ„์„

๋„คํŠธ์›Œํฌ ์ƒํ™ฉ์— ๋Œ€ํ•œ ์ธ์‚ฌ์ดํŠธ๋ฅผ ์ œ๊ณตํ•˜๊ณ  ํ‰์‹œ ๋˜๋Š” ๊ณต๊ฒฉ์„ ๋ฐ›๋Š” ๋™์•ˆ ๋น„์ •์ƒ์ ์ธ ํ™œ๋™์„ ์ฐพ์•„๋ƒ…๋‹ˆ๋‹ค.

๊ฐœ์„ ๋œ ๋ณด์•ˆ์šด์˜(SecOps)

๊ฐœ์„ ๋œ ๋ณด์•ˆ์šด์˜(SecOps)

๊ณต๊ฒฉ๊ณผ ๊ณต๊ฒฉ ์‚ฌ์ด์— ๋”์šฑ ๋น ๋ฅด๊ณ  ์ง๊ด€์ ์ธ ๋ฃจํ”„ ํด๋กœ์ €, ํ™œ๋ฐœํ•œ ๊ฒฝ๊ฐ ํ™œ๋™ ๋ฐ ๊ฒฝ๊ฐ ํ™œ๋™ ์กฐ์ •์ด ๊ฐ€๋Šฅํ•˜๋„๋ก ๋งŒ๋“ญ๋‹ˆ๋‹ค.

์œ ์—ฐํ•œ ๋ฐฐํฌ ์˜ต์…˜

๊ฐœ์„ ๋œ ๋ณดํ˜ธ ๋Šฅ๋ ฅ

ํ˜์‹ ์ ์ธ ์ •์ฑ… ์—๋””ํ„ฐ๊ฐ€ ์ปค๋„ฅ์…˜ PPS ์ œํ•œ, HTTPS ๋ณดํ˜ธ, SYN ๋ณดํ˜ธ, ์„œ๋ช… ๋ณดํ˜ธ, ํŠธ๋ž˜ํ”ฝ ํ•„ํ„ฐ๋ง, BDoS ๋“ฑ์˜ ์ƒˆ๋กœ์šด ๋ณดํ˜ธ ๋ฐ ๊ฐœ์„ ๋œ ๋ณดํ˜ธ๋ฅผ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค.

๋†’์€ ๊ฐ€์šฉ์„ฑ

๋†’์€ ๊ฐ€์šฉ์„ฑ

๋‚˜๋ž€ํžˆ ํŽผ์ณ์ง€๋Š” ๊ฒฝ๊ฐ ํ™œ๋™ ํŽ˜์ด์ง€์™€ ๋ชจ๋‹ˆํ„ฐ๋ง ๋Œ€์‹œ๋ณด๋“œ๋ฅผ ์ด์šฉํ•˜์—ฌ ๋น ๋ฅธ ๊ฒฝ๊ฐ ํ™œ๋™์ด ๊ฐ€๋Šฅํ•˜๋ฉฐ, ์ด๋ฅผ ํ†ตํ•ด ๊ด€๋ฆฌ ๋ฐ ์‹œ์Šคํ…œ ์ œ์–ด์˜ ๋†’์€ ๊ฐ€์šฉ์„ฑ์„ ๋ณด์žฅํ•ฉ๋‹ˆ๋‹ค.

์‚ฌ์ด๋ฒ„ ์ปจํŠธ๋กค๋Ÿฌ ๋„คํŠธ์›Œํฌ ๋ถ„์„

๋„คํŠธ์›Œํฌ ๋ถ„์„์€ ํ‰์‹œ์—๋„ ์ •๋ณด๋ฅผ ์ œ๊ณตํ•˜๊ณ , ๋˜ํ•œ ๊ณต๊ฒฉ ์‹œ์—๋„ Top-NํŒŒ๋ผ๋ฏธํ„ฐ์— ๊ด€ํ•œ ์ž์„ธํ•œ ์ •๋ณด(ํƒ‘ ์†Œ์Šค ๋˜๋Š” ๋ชฉ์ ์ง€ IP, ํƒ‘ ์†Œ์Šค ๋˜๋Š” ๋ชฉ์ ์ง€ ํฌํŠธ, ํƒ‘ ํ”„๋กœํ† ์ฝœ, ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜๊ณผ ์„œ๋น„์Šค ์ ‘์† ์žฅ์†Œ ๋“ฑ์— ์ด๋ฅด๋Š”)๋ฅผ ์ œ๊ณตํ•ด ์ค๋‹ˆ๋‹ค. ๋Œ€์‹œ๋ณด๋“œ์—๋Š” ์ฃผ๊ฐ„ ํŠธ๋ž˜ํ”ฝ ๊ฒฝํ–ฅ์ด ์ œ๊ณต๋˜๋ฏ€๋กœ ์‹œ๊ฐ„ ๊ฒฝ๊ณผ์— ๋”ฐ๋ฅธ ๋„คํŠธ์›Œํฌ DNA์˜ ์„ฑ๊ฒฉ๊ณผ ๋น„์ •์ƒ์ ์ธ ํ™œ๋™์˜ ํŒŒ์•…์ด ๊ฐ€๋Šฅํ•˜๊ณ , ์ด๋Ÿฌํ•œ ์ •๋ณด๋ฅผ ๊ณ„์†๋˜๋Š” ๊ณต๊ฒฉ๊ณผ ์—ฐ๊ฒฐ์‹œํ‚ฌ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๊ฐœ์„ ๋œ ๋ณด์•ˆ์šด์˜(SecOps)

๋ณด์•ˆ์šด์˜ ๋Œ€์‹œ๋ณด๋“œ๋ฅผ ๋‚˜๋ž€ํžˆ ํŽผ์น  ์ˆ˜ ์žˆ์–ด, ๊ณต๊ฒฉ ์ •๋ณด ๋ฐ ๊ฒฝ๊ฐ ํ™œ๋™์„ ๊ฐ™์€ ์œˆ๋„์šฐ ๋‚ด์—์„œ ๋ณผ ์ˆ˜ ์žˆ์œผ๋ฏ€๋กœ ๋‹ค์Œ์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.

  • ์—ฌ๋Ÿฌ ๊ฐœ์˜ ๋‹ค์–‘ํ•œ ํŠธ๋ž˜ํ”ฝ ๋Œ€์‹œ๋ณด๋“œ๋ฅผ ์‰ฝ๊ณ  ๋น ๋ฅด๊ฒŒ ์ด๋™
  • ๊ฐ์ง€๋œ ๊ณต๊ฒฉ, ์ ์šฉํ•œ ์ •์ฑ…, ์ฐธ์—ฌํ•˜๋Š” DefensePro ๊ธฐ๊ธฐ์˜ ์ƒ์„ธํ•œ ์ •๋ณด๋ฅผ ๋ณผ ์ˆ˜ ์žˆ์Œ
  • ํšจ๊ณผ์ ์ธ ๊ณต๊ฒฉ ๊ฒฝ๊ฐ์„ ์œ„ํ•œ ์„ค์ • ๋ณ€๊ฒฝ ๋ฐ ์กฐ์ •
๊ฐ์ง€๋œ ๊ณต๊ฒฉ, ์ ์šฉํ•œ ์ •์ฑ…, ์ฐธ์—ฌํ•˜๋Š” DefensePro ๊ธฐ๊ธฐ์˜ ์ƒ์„ธํ•œ ์ •๋ณด๋ฅผ ๋ณผ ์ˆ˜ ์žˆ์Œ

์ด๋Ÿฌํ•œ ๋ชจ๋“  ๊ณผ์ •์—์„œ ๋™์ผํ•œ ๋ณด์•ˆ์šด์˜ ์Šคํฌ๋ฆฐ์ด ์ œ๊ณต๋ฉ๋‹ˆ๋‹ค. ๊ทธ๋ฆฌ๊ณ  ์ด๋Ÿฌํ•œ ๋Œ€์‹œ๋ณด๋“œ๋กœ ์ธํ•ด ๊ฒฐ๊ณผ์ ์œผ๋กœ ๊ณต๊ฒฉ๊ณผ ๊ณต๊ฒฉ ์‚ฌ์ด์— ๋น ๋ฅด๊ณ  ์ง๊ด€์ ์ธ ๋ฃจํ”„ ํด๋กœ์ €, ํ™œ๋ฐœํ•œ ๊ฒฝ๊ฐ ์กฐ์น˜ ๋ฐ ๊ฒฝ๊ฐ ์กฐ์ •์ด ๊ฐ€๋Šฅํ•ด์ง‘๋‹ˆ๋‹ค.

๋ฐ์ดํ„ฐ์‹œํŠธ

Multi-Tenant Portal for DDoS Protection for Service Providers

Service providers are constantly searching for new business opportunities and they’re turning to managed security services to enhance their service portfolio.

์ž์„ธํžˆ ๋ณด๊ธฐ
๋ฐ์ดํ„ฐ์‹œํŠธ

๋ผ๋“œ์›จ์–ด ์‚ฌ์ด๋ฒ„ ์ปจํŠธ๋กค๋Ÿฌ

๋ผ๋“œ์›จ์–ด ์‚ฌ์ด๋ฒ„ ์ปจํŠธ๋กค๋Ÿฌ๋Š” ๋‹ค์ค‘๋ณด์•ˆ ์šด์˜ ๋Œ€์‹œ๋ณด๋“œ๋ฅผ ํ†ตํ•ด ๋งˆ์ฐฐ ์—†๋Š” ๋ณด์•ˆ๊ณผ ํ™•์žฅ๋œ ๊ฐ€์‹œ์„ฑ ๋ฐ ๊ฐœ์„ ๋œ ์‚ฌ์šฉ์ž ๊ฒฝํ—˜์„ ์ œ๊ณตํ•˜๋ฉฐ, ๋˜ํ•œ ํ†ตํ•ฉ ๋ทฐ์—์„œ ์ธ๋ผ์ธ ๋ฐ ๊ฒฝ๋กœ๋ฅผ ๋ฒ—์–ด๋‚œ DDos ๋ฐฐํฌ ๊ณต๊ฒฉ์˜ ๋ผ์ดํ”„์‚ฌ์ดํด๊ณผ ๊ฒฝ๊ฐ ๋ถ„์„์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

์ž์„ธํžˆ ๋ณด๊ธฐ
์†”๋ฃจ์…˜ ๊ฐœ์š”

์„œ๋น„์Šค ์ œ๊ณต์ž๋ฅผ ์œ„ํ•œ ์‚ฌ์ด๋ฒ„ ์ปจํŠธ๋กค๋Ÿฌ ๋ณด์•ˆ

์‚ฌ์ด๋ฒ„ ์ปจํŠธ๋กค๋Ÿฌ๋Š” ์„œ๋น„์Šค ์ œ๊ณต์ž๋“ค์—๊ฒŒ ๋ณด์•ˆ ๊ด€๋ฆฌ์™€ ํ†ตํ•ฉ ๋ฐ ์ž๋™ํ™”๋œ ์†”๋ฃจ์…˜์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

์ž์„ธํžˆ ๋ณด๊ธฐ

๋ผ๋“œ์›จ์–ด ์˜์—…๋ถ€์— ๋ฌธ์˜ํ•˜๊ธฐ

๋ผ๋“œ์›จ์–ด ์ „๋ฌธ๊ฐ€๋“ค์ด ๊ท€ํ•˜์˜ ์งˆ๋ฌธ์— ๋‹ตํ•˜๊ณ , ์–ด๋–ค ํ•ด๊ฒฐ์ฑ…์ด ํ•„์š”ํ•œ์ง€ ์ง„๋‹จํ•˜๊ณ , ์–ด๋–ค ์ œํ’ˆ์ด ๊ท€์‚ฌ์˜ ์‚ฌ์—…์— ๊ฐ€์žฅ ์ ํ•ฉํ•œ์ง€ ์ดํ•ดํ•˜์‹ค ์ˆ˜ ์žˆ๋„๋ก ๋„์™€๋“œ๋ฆฝ๋‹ˆ๋‹ค.

ํ˜„์žฌ ๊ณ ๊ฐ์ด์‹ญ๋‹ˆ๊นŒ?

๊ธฐ์ˆ  ์ง€์› ๋˜๋Š” ์ถ”๊ฐ€ ์„œ๋น„์Šค๊ฐ€ ํ•„์š”ํ•˜์‹œ๊ฑฐ๋‚˜ ๋‹น์‚ฌ ์ œํ’ˆ ๋ฐ ์†”๋ฃจ์…˜์— ๊ด€ํ•ด ๊ถ๊ธˆํ•˜์‹  ์ ์ด ์žˆ๋‹ค๋ฉด ์ €ํฌ๊ฐ€ ์ฆ‰์‹œ ๋„์™€๋“œ๋ฆฌ๊ฒ ์Šต๋‹ˆ๋‹ค.

์‚ฌ์—…์žฅ ์†Œ์žฌ์ง€
์ฆ‰์‹œ ๋‹ต์„ ๊ตฌํ•  ์ˆ˜ ์žˆ๋Š” ์ง€์‹ ์ •๋ณด ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค
๋ฌด๋ฃŒ ์˜จ๋ผ์ธ ์ œํ’ˆ ๊ต์œก
๋ผ๋“œ์›จ์–ด ๊ธฐ์ˆ  ์ง€์›๋ถ€์™€์˜ ์ƒ๋‹ด
๋ผ๋“œ์›จ์–ด ๊ณ ๊ฐ ํ”„๋กœ๊ทธ๋žจ ์ฐธ์—ฌ

์†Œ์…œ๋ฏธ๋””์–ด

์ „๋ฌธ๊ฐ€๋“ค๊ณผ ๊ต๋ฅ˜ํ•˜๊ณ  ๋ผ๋“œ์›จ์–ด ๊ธฐ์ˆ ์— ๊ด€ํ•œ ๋Œ€ํ™”์— ์ฐธ์—ฌํ•˜์„ธ์š”.

๋ธ”๋กœ๊ทธ
๋ณด์•ˆ ์—ฐ๊ตฌ ์„ผํ„ฐ
CyberPedia