日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 编程资源 > 编程问答 >内容正文

编程问答

Gartner: 2016年十大安全预测

發布時間:2025/3/19 编程问答 33 豆豆
生活随笔 收集整理的這篇文章主要介紹了 Gartner: 2016年十大安全预测 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

在Gartner 2016年安全與風險峰會上,Gartner研究副總裁Earl Parkins指出了在未來2到4年內安全領域的10大戰略性規劃假設Strategic Planning Assumptions (SPAs)。

1)到2020年,99%的漏洞利用將依舊是安全和IT專業人員已知1年以上的。建議措施:企業必須致力于修補他們已知存在的漏洞。這些漏洞很容易被忽略,比起事后彌補,修復這些漏洞的代價更低,也更容易。

2)到2020年,企業遭受的成功***中有三分之一是針對他們的影子IT(Shadow IT)資源的。建議措施:業務部門會想方設法去應對企業面臨的現實問題,會使用各種工具來完成自己的工作。企業應該找到跟蹤影子IT的方法,并創建一個接納和保護的文化,而不是付諸于檢測和懲罰。【注:影子IT泛指那些不在公司統一管理之下的,不受公司官方管轄的IT硬件、軟件和應用,譬如某些部門自建的網站、自己搭建的應用(未向公司申報)等】

3)到2018年,阻止公有云信息泄露的訴求將驅動20%的組織去開發數據安全治理程序。建議措施:開發一套企業級的數據安全治理(Data Security Governance,DSG)程序,找出數據安全策略的差距,制定出解決問題的路線圖,并在適當的時候尋求網絡保險(Cyberinsurance)。

4)到2020年,40%引入了DevOps的企業將會通過采用應用安全自測試、自診斷和自保護技術來保障其開發的應用系統。建議措施:在DevOps時采用運行時應用自保護技術(RSAP)。對那些不夠成熟的供應商和開發商的潛在安全問題點進行評估。

5)到2020年,80%的基于云的CASB交易將被打包到網絡防火墻、安全WEB網關(SWG)和WAF平臺中。建議措施:考慮到客戶遷移到云(過程中可能遇到的問題)和綁定購買的現實情況,企業需要評估應用部署的路線圖,并決定這個投資是否合理。

6)到2018年,利用原生移動安全遏制技術而非第三方可選包的企業將從20%上升到60%。建議措施:驗證并掌握原生的【注:iOS和Android自帶的】移動安全遏制解決方案。注意,具有典型安全需求的企業應該有計劃的逐步轉向原生移動安全遏制技術。

7)到2019年,40%的企業側IAM實現將被IDaaS(身份即服務)實現取代,當前只有10%。建議措施:IDaaS的大部分障礙已經排除,企業應該開始在小規模的項目里進行嘗試。由于合規性的爭論會阻礙IDaaS的發展,企業需要充分認識到IDaaS當前的限制和收益。

8)到2019年,由于識別技術的引入,在中風應用險場景中對密碼和令牌的使用將下降55%。建議措施:密碼的使用在商業實踐中根深蒂固,難以徹底消除,但是企業應該著手尋找那些聚焦于將良好用戶體驗融入持續信任環境開發的產品。從身份識別開始,要求供應商具備生物識別與分析能力。

9)到2018年,超過50%的物聯網設備制造商將無法應對來自弱認證應用的威脅。建議措施:通過改變企業架構,物聯網引入了新的威脅。早期的物聯網安全失效可能會迫使業界去制定認證標準,但企業應該去識別認證風險,建立身份保障的需求,并進行度量。

10)到2020年,超過25%針對企業的確認***將與物聯網有關,而物聯網(安全投入)僅占整個安全預算的10%。建議措施:隨著物聯網的持續發展,供應商(投入)對更偏向易用性而非安全性。IT安全從業者尚無法確認物聯網領域可接受的風險量是多少。企業應該指派物聯網安全的責任人,關注那些有漏洞或者是無法打補丁的物聯網設備,并增加針對物聯網(安全)的預算。


附上原文:

  • Through 2020, 99% of vulnerabilities exploited will continue to be ones known by security and IT professionals for at least one year.
    Recommended Action: Companies should focus on fixing the vulnerabilities they know exist. While these vulnerabilities are easy to ignore, they’re also easier and more inexpensive to fix than to mitigate.

  • By 2020, a third of successful attacks experienced by enterprises will be on their shadow IT resources.
    Recommended Action: Business units deal with the reality of the enterprise and will engage with any tool that helps them do the job. Companies should find a way to track shadow IT, and create a culture of acceptance and protection versus detection and punishment.

  • By 2018, the need to prevent data breaches from public clouds will drive 20% of organizations to develop data security governance programs.
    Recommended Action: Develop an enterprise-wide data security governance (DSG) program. Identify data security policy gaps, develop a roadmap to address the issues and seek cyberinsurance when appropriate.

  • By 2020, 40% of enterprises engaged in DevOps will secure developed applications by adopting application security self-testing, self-diagnosing and self-protection technologies.
    Recommended Action: Adopt Runtime application self protection (RASP) for DevOps. Evaluate less mature vendors and providers for potential security options.

  • By 2020, 80% of new deals for cloud-based CASB will be packaged with network firewall, secure web gateway (SWG) and web application firewall (WAF) platforms.
    Recommended Action: While concerns exist about customer migration to the cloud and bundling purchases, companies should assess the application deployment roadmap and decide whether investment is justified.

  • By 2018, enterprises that leverage native mobile containment rather than third-party options will rise from 20% to 60%.
    Recommended Action: Experiment and become familiar with native containment solutions. Keep in mind that enterprises with average security requirements should plan to move gradually to
    native containment.

  • By 2019, 40% of IDaaS implementations will replace on-premises IAM implementations, up from 10% today.
    Recommended Action: Enough limitations have disappeared on Identity as a Service (IDaaS) that companies should start experimenting on small-scale projects. While a clash of regulations could derail the increased implementation, companies should work to recognize the current limitations and benefits.

  • By 2019, use of passwords and tokens in medium-risk use cases will drop 55%, due to the introduction of recognition technologies.
    Recommended Action: Passwords are too entrenched in business practices to disappear completely, but companies should look for products that focus on development of an environment of continuous trust with good user experience. Begin by identifying use cases, and press vendors for biometric and analytic capabilities.

  • Through 2018, over 50% of IoT device manufacturers will not be able to address threats from weak authentication practices.
    Recommended Action: By changing the enterprise architecture, IoT introduces new threats. Early IoT security failures might force the industry towards authentication standards, but companies should identify authentication risks, establish identity assurance requirements, and employ metrics.

  • By 2020, more than 25% of identified enterprise attacks will involve IoT, though IoT will account for only 10% of IT security budgets.
    Recommended Action: As IoT continues to grow, vendors will favor usability over security and IT security practitioners remain unsure of the correct amount of acceptable risk. Companies should assign business ownership of IoT security, focus on vulnerable or unpatchable IoT devices, and increase IoT-focused budget.


  • 【參考】

    Gartner:2016年十大信息安全技術(含解讀)


    總結

    以上是生活随笔為你收集整理的Gartner: 2016年十大安全预测的全部內容,希望文章能夠幫你解決所遇到的問題。

    如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。