architect, sales engineeringfireeyeday.com/event/pdf/t2_3.cyberdefenselive2018.pdf© 2018 fireeye |...

35
시트릭스 김상욱 부장 Architect, Sales Engineering 안전한 디지털 Workspace 업무환경 트렌드

Upload: others

Post on 26-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

시트릭스 김상욱 부장Architect, Sales Engineering

안전한 디지털 Workspace 업무환경 트렌드

Page 2: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

▪사용자 컴퓨팅 트렌드

▪기업 사용자 컴퓨팅 보호

▪사용자 모바일 보안

아젠다

Page 3: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

사용자 컴퓨팅 트랜드

Page 4: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

70%of top global companies have teams dedicated to Digital Transformation

Page 5: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

Market Trend

Source: Gartner (July 2017)

BYOD, Collaboration 정착기

Smart Workspace 를 주목할 시기

Page 6: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

DataApps

Users UsersUsers Users Users

Page 7: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

변화된 사용자 IT 환경

#@!*$

Page 8: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

디바이스 보안 레벨

일반 사용자레벨

기업 보안레벨

미션 크리티컬레벨

85 93 99

Page 9: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

…빙산의 일각…

어플리케이션 접속

클라우드 스토리지

개인 백업

계정 공유

등등..

연동 데이터

새로운 사용자 컴퓨팅 환경의 위협

디바이스 관리..

Page 10: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

다양한 디바이스환경에서

APP/OS/DATA를긴밀하게 사용

늘어난 관리포인트들에 대한

Security 관리

기기 데이터

APP/OS

DataDevice

관리 인식의 변화

Page 11: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

APP/OS의 서비스화• 중앙관리• 가상화

PC/모바일에서 분리• NAS, CIFS• Data Share&Sync

Bring Your Own

Device간 Seamless한 UX

앱앱

데이터

Data

기기

Device

분리 구성 트렌드

Page 12: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

모바일 MDM

사용자 PC

MAM + MDM

가상화

Page 13: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

기업 PC 보호 방향

Page 14: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

Host/Mainframe

Client/Server

Web/Desktop

BYO/Cloud/Wireless

• 완전 중앙집중

• 컴퓨팅 파워 분산• 데이터 PC 분산

• Web으로 분산• 데이터 PC 분산

PC 백신 DRM, DLP 등등..

망분리

사용자 컴퓨팅과 보안

• 완전 분산

가상화

Page 15: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

가상화 화면..

가상PC

물리 PC가상 PC

Page 16: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

망분리.. 국내만?..

Page 17: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

PC 가상화 방식

업무망 VDI인터넷망 VDI

Page 18: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

인터넷 VDI 물리 PC(업무)

인터넷 망분리

장점 단점

• 가장 빠르게 적용• 보안이 뛰어남• 업무환경 변화 적음• 업무망분리에 비해 저비

• 스마트워크 업무 불가

가상 PC(인터넷)

Page 19: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

업무 VDI

업무망 망분리

장점 단점

• 장애, 사이버공격에신속한 대응

• 스마트워크 지원• 정보중앙 저장 및유출 방지

• 업무환경 변화 많음• 인터넷 망분리에 비해 고비용

물리 PC(인터넷) 가상 PC(업무)

Page 20: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

보안 Endpoint 디바이스

Zero Client

Zero / Thin Client Samsung Galaxy S8 DeX

구글 크롬북 저사양/저비용 노트북

Page 21: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

가상화 네트워크 모니터링

HDX Insight를통한 가상화솔루션트래픽실시간모니터링및 분석

NetScaler StoreFront

DesktopsApps

XenDesktop Controller

Windows Server Windows Desktop

Director EdgeSight Studio

DesktopsApps

Receiver

Page 22: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

HDX Insight 동작개요

NetScaler 1

2 HDX Insight (ICA)

3 Citrix Director

AppFlow Data

3rd Party

Ops Tools

NetScaler

MAS

Page 23: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

• 암호화된트래픽가시성확보

• 확보된트래픽을기반으로보안

솔루션과연동 (by Q3)

• 실시간사용자접속 웹 사이트정책 제어

• 사용자계정 접속정보 제공및

스코어링기능을통한사용자정책 설정

NetScaler Secure Web Gateway

SSL 트래픽에대한 암호화/복호화기능및 자체 DB를사용한웹 싸이트통제

Page 24: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

사용자 모바일 보안

Page 25: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

30억by 2025

Page 26: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

75%Digital Natives

by 2020

Page 27: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

모바일 보안

MAM

모바일 애플리케이션 관리

MIM

모바일 데이터 관리

MDM모바일 기기 관리

MDM

Mobile Device Management

MAM

Mobile Applications Management

MIM

Mobile Information Management

시장흐름

Page 28: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

IT 보안

IT 우회

BYO기기

기업 소유 및 관리

기밀

APP

Data

Page 29: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

개인 모바일에서 업무앱 보안 문제

Page 30: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

@ 일상 + 업무

Page 31: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

@ 일상 @ 업무SecureHub

• 업무앱 제어

• 데이터암호화

• 보안연동

• Micro-VPN

Page 32: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

MAM 사용자 화면

SecureHub 모바일화면사내앱스토어

Page 33: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

MAM 구성 과정

사내 앱스토어 사용자 적용업무앱 준비 업무앱 랩핑

App

*.IPK, *APK

*.mdx

Page 34: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

© 2018 FireEye | Private & Confidential

MAM 보안 기술의 원리

Mobile OS

카메라,

마이크등등

MDX

App

Citrix 보안영역 (AES 256)

Network Files Clipboard

Policy Intercept

Network Files Clipboard

Page 35: Architect, Sales Engineeringfireeyeday.com/event/pdf/T2_3.CyberDefenseLive2018.pdf© 2018 FireEye | Private & Confidential • 암호화된트래픽가시성확보 • 확보된트래픽을기반으로보안

Thank You