SlideShare a Scribd company logo
ํ†ตํ•ฉ ์—”๋“œํฌ์ธํŠธ ๋ณด์•ˆ์†”๋ฃจ์…˜
Symantec Endpoint Protection 11.0
Symantec Korea
2009
๋ชฉ์ฐจ


     1   ์—”๋“œํฌ์ธํŠธ ๋ณด์•ˆ ํ™˜๊ฒฝ์˜ ๋ณ€ํ™”

     2   Symantec Endpoint Protection 11.0 ๊ฐœ์š”

     3   Symantec Endpoint Protection 11.0 ๊ตฌ์„ฑ์š”์†Œ

     4   Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

     5   ๊ธฐ๋Œ€ํšจ๊ณผ : Value

     6   ๋ณ„์ฒจ : Why Symantec
                                                  2
์—”๋“œํฌ์ธํŠธ ๋ณด์•ˆ ํ™˜๊ฒฝ์˜ ๋ณ€ํ™”

๋ณด์•ˆ ์œ„ํ˜‘์˜ ๋ณ€ํ™”
๋ณด์•ˆ ์œ„ํ˜‘์˜ ์ข…๋ฅ˜๋Š” ๋‚ ๋กœ ๋‹ค์–‘ํ•˜๊ณ  ๊ณ ๋„ํ™” ๋˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ด์— ๋Œ€์‘ํ•˜๊ธฐ ์œ„ํ•œ ๋ณด์•ˆ ์กฐ์น˜์˜ ๋ฐฉํ–ฅ๋„ ๋ณ€ํ™”๋˜๊ณ  ์žˆ๋‹ค.
ํŠนํžˆ ๊ธฐ์กด์— ๋„คํŠธ์›Œํฌ ๋ณด์•ˆ๊ธฐ์ˆ  ์œ„์ฃผ์˜ ๋ณด์•ˆ ํˆฌ์ž์˜ ๋ฐฉํ–ฅ์—์„œ ๋ณด์•ˆ ์‚ฌ๊ณ ์˜ ๊ทผ์›์ธ ์—”๋“œํฌ์ธํŠธ์— ๋Œ€ํ•œ ์ง์ ‘์ ์ธ
๋ณด์•ˆ ๊ฐ•ํ™”๋กœ ๊ทธ ๋ฐฉํ–ฅ์ด ๋ฐ”๋€Œ๊ณ  ์žˆ๋‹ค. ๋”ฐ๋ผ์„œ ๊ธฐ์กด์˜ ์—”๋“œํฌ์ธํŠธ ๋ณด์•ˆ๊ธฐ์ˆ ์˜ ๋Œ€๋ช…์‚ฌ์˜€๋˜ ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค์— ๋Œ€ํ•œ
์ธ์‹๋„ ๊ทธ ํ•œ๊ณ„๊ฐ€ ์ ์ฐจ ์ธ์‹๋˜๋ฉด์„œ ์ด๋ฅผ ๊ทน๋ณตํ•  ์ˆ˜ ์žˆ๋Š” ๋Œ€์•ˆ ๊ธฐ์ˆ ๋“ค์ด ์ฃผ๋ชฉ๋ฐ›๊ณ  ์žˆ๋‹ค. (Future of AntiVirus)
 ๋ฒ”์ฃ„ํ–‰์œ„




                                                                                       ํ”ผ์‹ฑ, ์ œ๋กœ๋ฐ์ด ๊ณต๊ฒฉ



                                                                             ์• ๋“œ์›จ์–ด, ์ŠคํŒŒ์ด์›จ์–ด



                                                                 ๋ด‡ ๊ณต๊ฒฉ



                                                    ์ŠคํŒธ ๋ฉ”์ผ


                                         ์›œ : ์ทจ์•ฝ์  ๊ณต๊ฒฉ, ๋Œ€์šฉ๋Ÿ‰ ๋ฉ”์ผ๋ฐœ์†ก, ๋„คํฌ์›Œํฌ ํŠธ๋ž˜ํ”ฝ ๋ฐœ์ƒ
  ๋‹จ์ˆœ ํ˜ธ๊ธฐ์‹ฌ




                        ๋ฐ”์ด๋Ÿฌ์Šค


           ๊ณผ์‹œ๋ชฉ์  : ๊ธฐ์ˆ ๋ ฅ                                                                      ๊ธˆ์ „์  ๋ชฉ์ 
              1986                                                                           2008


                  Symantec Endpoint Protection 11                                                    3
์ƒˆ๋กœ์šด ์‹ ๊ทœ ์œ„ํ˜‘์˜ ๋“ฑ์žฅ
                    Threat Evolution Timeline

                                                                                                              Zero Day
๋ฒ”์ฃ„


                                                                                  Phishing                    Exploits
                                                                  Phishing
                                                                                  Explodes IPS (Host)
                                                                                               Crimeware
                                                                                                              & Threats

                                                                                               Application Control
                                                                                        Spyware & Adware      Rootkits
                                                                 Adware            Antispyware
                                                                               Spyware
                                                                                            Explode          On the Rise


                                                                                                Device Control
 types of threats




                                                                                                            Paid
                                                                    Bots &          DDoS           Bots    Vulnerability
                                                                          IPS (Network)
                                                                    Botnets    Attacks Explode              Research



                                           Spam                     Tracking             Spam Explodes
                                                                    Cookies



                                          Antivirus
                                     Vulnerabilities                      Mass Mailing         Network
                                                                                         Firewall
ํ˜ธ๊ธฐ์‹ฌ




                                    Openly Discussed                        Worms            Worms



                     Virus    Destructive Virus                 Macro Virus

                           ํ‰ํŒ                                       motivations of attackers                     ์ด์ต
                    1986      Symantec Endpoint Protection 11                                                        2006
์—”๋“œํฌ์ธํŠธ ๋ณด์•ˆ ํ™˜๊ฒฝ์˜ ๋ณ€ํ™”

๊ด€๋ฆฌ ํ™˜๊ฒฝ์˜ ๋ณ€ํ™”
๏ฑ IT ๊ด€๋ฆฌ ํ™˜๊ฒฝ์˜ ๋ณต์žก์„ฑ ์ฆ๊ฐ€
  โ€“   ์ „ํ†ต์ ์ธ ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ์ œํ’ˆ ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ํŒจ์น˜๊ด€๋ฆฌ ์†”๋ฃจ์…˜, PC ๋ฐฉํ™”๋ฒฝ, ๋งค์ฒด์ œ์–ด ์†”๋ฃจ์…˜ ๋“ฑ ์ง„ํ™”ํ•˜๋Š” ๋ณด์•ˆ์œ„ํ˜‘์—
      ๋Œ€์‘ํ•˜๊ธฐ ์œ„ํ•ด ๊ฐœ๋ณ„ ๋ณด์•ˆ์†”๋ฃจ์…˜์˜ ์ง€์†์ ์ธ ๋„์ž…์œผ๋กœ ๋‹ค์–‘ํ•œ ์ œํ’ˆ์— ๋Œ€ํ•œ ์ •์ฑ…๊ด€๋ฆฌ ๋ฐ ์šด์˜์˜ ๋ณต์žก์„ฑ ์ฆ๊ฐ€
๏ฑ ๊ด€๋ฆฌ/์†Œ์œ  ๋น„์šฉ์˜ ์ฆ๊ฐ€
  โ€“   ์ƒˆ๋กœ์šด ๋ณด์•ˆ ์œ„ํ˜‘์ด ์ถœํ˜„ํ• ๋•Œ๋งˆ๋‹ค ๊ทธ๋ฅผ ์œ„ํ•œ ๊ฐœ๋ณ„ ์†”๋ฃจ์…˜์„ ์ง€์†์ ์œผ๋กœ ๋„์ž…ํ•จ์œผ๋กœ์จ ๋ณด์•ˆ ์†”๋ฃจ์…˜ ๋„์ž…๋น„์šฉ์ด
      ์ง€์†์ ์œผ๋กœ ์ฆ๊ฐ€ํ•˜๊ณ  ๋˜ํ•œ ๊ทธ๋ฅผ ๊ด€๋ฆฌํ•˜๊ธฐ ์œ„ํ•œ ์šด์˜/์œ ์ง€ ๋น„์šฉ ๋ฐ ๊ด€๋ฆฌ ์ธ๋ ฅ์ด ์ง€์†์ ์œผ๋กœ ์ฆ๊ฐ€ํ•ด์•ผ ํ•˜๋Š” ์•…์ˆœํ™˜
๏ฑ ๊ธฐ์กด ๋ณด์•ˆ์†”๋ฃจ์…˜์˜ ๊ธฐ์ˆ ์  ํ•œ๊ณ„
  โ€“   ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ๋„์ž… ๊ณ ๊ฐ์ด ์ „์ฒด์˜ 99%๋ฅผ ์ฐจ์ง€ํ•จ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ์ง€์†์ ์œผ๋กœ ๋ฐ”์ด๋Ÿฌ์Šค ์‚ฌ๊ณ ๊ฐ€ ๋ฐœ์ƒํ•˜๋ฉฐ 68%์˜
      ๊ธฐ์—…์ด ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค๋ฅผ ์‚ฌ์šฉํ•จ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ๋ณด์•ˆ์‚ฌ๊ณ ๊ฐ€ ๋Š์ด์ง€ ์•Š์Œ. ๋”ฐ๋ผ์„œ ์ด๋ฅผ ๊ทน๋ณตํ•  ๋Œ€์•ˆ๊ธฐ์ˆ ์ด ํ•„์š”ํ•จ.




                      ๋ณต์žก์„ฑ ์ฆ๊ฐ€                 ๋น„์šฉ์ฆ๊ฐ€


                      ์‚ฌ์šฉ์ž ๋‹จ๋ง
                     ์ œ์–ด ๊ธฐ๋Šฅ ๋ถ€์žฌ                ๋น„ ํšจ์œจ์„ฑ



           Symantec Endpoint Protection 11                            5
Symantec Endpoint Protection 11.0 ๊ฐœ์š”

SEP 11.0 ๊ฐœ์š”
 Symantec Endpoint Protection์€ ๊ธฐ์กด์˜ Symantec AntiVirus ์ œํ’ˆ์„ ํš๊ธฐ์ ์œผ๋กœ ๊ฐœ์„ ํ•จ๊ณผ ๋™์‹œ์— ์—…๊ณ„ ๋ฆฌ๋”์˜ ๊ฐ
 ์†”๋ฃจ์…˜์˜ ์ธ์ˆ˜ํ•ฉ๋ณ‘์„ ํ†ตํ•ด ๊ฐ–์ถ˜ ๊ฐ ํฌ์ธํŠธ ๊ธฐ์ˆ ์„ ํ•˜๋‚˜์˜ ์ œํ’ˆ์œผ๋กœ ํ†ตํ•ฉํ•จ์œผ๋กœ์จ ๋ณด์•ˆ์„ฑ ํ–ฅ์ƒ๊ณผ ๊ด€๋ฆฌ์˜ ๋‹จ์ˆœํ™”๋ฅผ
 ์ด๋ฃธ.

                                                  โ€ข   Network Access Control โ€“ ๊ธฐ๋Šฅ ํฌํ•จ
                              ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ ์ œ์–ด          โ€ข   Agent์— ํฌํ•จ, ๋ณ„๋„์˜ Agent ์„ค์น˜๊ฐ€ ๋ถˆํ•„์š”
                                 (NAC)            โ€ข   ๋ณ„๋„์˜ ์˜ต์…˜์ด๋ฉฐ ์ถ”๊ฐ€ ๊ตฌ๋งคํ•˜์—ฌ์•ผ ํ•จ

                                                  โ€ข   Endpoint ๋งค์ฒด ์ œ์–ด๋ฅผ ํ†ตํ•œ ์ •๋ณด ์œ ์ถœ ๋ฐฉ์ง€ - USB
                                   ๋งค์ฒด ์ œ์–ด              ๋“œ๋ผ์ด๋ธŒ, MP3, CD-RW๋“ฑ ์— ๋Œ€ํ•œ ์ œ์–ด

       Symantec
       Endpoint                                   โ€ข   ์นจ์ž… ํƒ์ง€ ๋ฐ ์ฐจ๋‹จ ์†”๋ฃจ์…˜์ธ NIPS(๋„คํŠธ์›Œํฌ) ์™€ HIPS
       Protection                  ์นจ์ž… ํƒ์ง€              (ํ˜ธ์ŠคํŠธ)์˜ ํ†ตํ•ฉ

                                                  โ€ข   ์—…๊ณ„ ์ตœ๊ณ ์˜ Endpoint ๋ฐฉํ™”๋ฒฝ ๊ธฐ์ˆ  ์ž…์ฆ - Gartner
                                                      MQ โ€œLeaderโ€ โ€“ 4๋…„ ์—ฐ์†
                                     ๋ฐฉํ™”๋ฒฝ
                                                  โ€ข   ์œ„์น˜์— ๋”ฐ๋ฅธ ์ •์ฑ… ์ ์šฉ ๊ฐ€๋Šฅ

                                                  โ€ข   ์—…๊ณ„ ์ตœ๊ณ ์˜ Rootkit ํƒ์ง€ ๋ฐ ์ œ๊ฑฐ ๊ธฐ์ˆ 
                                ์•ˆํ‹ฐ์ŠคํŒŒ์ด์›จ์–ด           โ€ข   ์ปค๋„(Kernel) ๋ ˆ๋ฒจ๋‹จ์˜ ๊ฒ€์ƒ‰ ๊ธฐ์ˆ 
       Single Agent

                                                  โ€ข   ์„ธ๊ณ„ ์„ ๋‘ ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ์†”๋ฃจ์…˜
                                 ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค           โ€ข   43ํšŒ ์—ฐ์† VB 100 ์ˆ˜์ƒ(2009๋…„ 4์›” ๊นŒ์ง€)



                Symantec Endpoint Protection 11                                             6
Symantec Endpoint Protection 11.0 ๊ฐœ์š”

SEP 11.0 ๊ฐœ์š”
 Symantec Endpoint Protection์€ ํ•˜๋‚˜์˜ ์—์ด์ „ํŠธ์— Symantec AntiVirus ๊ธฐ๋Šฅ๊ณผ ์ตœ์‹  ์œ„ํ˜‘ ์ฐจ๋‹จ ๊ธฐ๋Šฅ์„ ์กฐํ•ฉํ•จ
 ์œผ๋กœ์จ ๋…ธํŠธ๋ถ, ๋ฐ์Šคํฌํƒ‘, ์„œ๋ฒ„๋ฅผ ๋Œ€์ƒ์œผ๋กœ ํ•˜๋Š” ์•…์„ฑ ํ”„๋กœ๊ทธ๋žจ์„ ํšจ๊ณผ์ ์œผ๋กœ ์ฐจ๋‹จํ•˜๋Š” ํ˜์‹ ์ ์ธ ์†”๋ฃจ์…˜.
 Symantec Endpoint Protection์€ ์—…๊ณ„ ์„ ๋‘๋กœ ์ธ์ •๋ฐ›์•„์˜จ ๊ฐ ๋ถ„์•ผ์˜ ๋‹ค์–‘ํ•œ ๋ณด์•ˆ๊ธฐ์ˆ ๋“ค์„ ๋‹จ์ผ ์ œํ’ˆ๋‚ด์— ํ†ตํ•ฉํ•จ
 ์œผ๋กœ์จ ๊ธฐ์—… ๊ณ ๊ฐ์— 3๋Œ€ ๊ฐ€์น˜(๋ณด์•ˆ์„ฑ, ๋‹จ์ˆœ์„ฑ, ์œ ์—ฐ์„ฑ) ์ œ๊ณต


                                    Symantec Endpoint Protection 11.0




    ๋ณด์•ˆ์„ฑ                                   ๋‹จ์ˆœ์„ฑ                              ์œ ์—ฐ์„ฑ
    ํฌ๊ด„์ ์ธ ์—”ํŠธํฌ์ธํŠธ ๋ณดํ˜ธ                         ๋‹จ์ผ ๊ด€๋ฆฌ์ฝ˜์†”, ๋‹จ์ผ ์—์ด์ „ํŠธ                 ๊ธฐ์กด ํ™˜๊ฒฝ๊ณผ์˜ ์œ ์—ฐํ•œ ํ†ตํ•ฉ์ง€์›


  ๏ƒ˜๋‹จ์ˆœํ•œ ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ์ œํ’ˆ, ๊ทธ์ด์ƒ                  ๏ƒ˜์ค‘์•™ ์ง‘์ค‘์  ๊ด€๋ฆฌ                       ๏ƒ˜๋‹จ์ผ ์—์ด์ „ํŠธ/๋‹จ์ผ ์ฝ˜์†”
  ๏ƒ˜์ „๋ก€์—†๋Š” ์ˆ˜์ค€์˜ ๋ณดํ˜ธ ๋ฒ”์œ„                      ๏ƒ˜ํŽธ๋ฆฌํ•œ ๊ตฌ์ถ• ๋ฐ ๊ด€๋ฆฌ                     ๏ƒ˜๊ด€๋ฆฌ ์˜ค๋ฒ„ํ—ค๋“œ์˜ ์ ˆ๊ฐ
  ๏ƒ˜์‹œ๋งŒํ… ๊ธ€๋กœ๋ฒŒ ์ธํ…”๋ฆฌ์ „์Šค                       ๏ƒ˜ํฌ๊ด„์ ์ธ ์—”ํŠธํฌ์ธํŠธ ๊ฐ€์‹œ์„ฑ                  ๏ƒ˜์œ ์—ฐํ•œ ์•„ํ‚คํ…์ณ
   ๋„คํŠธ์›Œํฌ                                ๏ƒ˜์ž๋™ ๋ณด์•ˆ ์—…๋ฐ์ดํŠธ                      ๏ƒ˜๊ธฐ์กด ๋ณด์•ˆ/IT ๊ธฐ์ˆ ์˜ ํ™œ์šฉ๋„ ๊ฐœ์„ 
                                       ๏ƒ˜๋น„์šฉ์˜ ์ ˆ๊ฐ                          ๏ƒ˜Symantec NAC ์˜ต์…˜




             Symantec Endpoint Protection 11                                                   7
Symantec Endpoint Protection 11.0 ๊ตฌ์„ฑ์š”์†Œ

SEP 11.0 ๊ตฌ์„ฑ์š”์†Œ :
 Symantec Endpoint Protection์€ ํฌ๊ฒŒ ์ •์ฑ…๊ด€๋ฆฌ ์„œ๋ฒ„์™€ ๋ฐ์ดํƒ€๋ฒ ์ด์Šค ๊ทธ๋ฆฌ๊ณ  ์‹ค์ œ ๋ณด์•ˆ๊ธฐ๋Šฅ์„ ์ˆ˜ํ–‰ํ•˜๋Š”
 ์—์ด์ „ํŠธ๋กœ ๊ตฌ์„ฑ๋œ๋‹ค.


  ์„œ๋ฒ„๊ตฐ        ์ •์ฑ…๊ด€๋ฆฌ์„œ๋ฒ„ ๋ฐ ๋ฐ์ดํƒ€ ๋ฒ ์ด์Šค                   Symantec Enterprise Protection Manager(SEPM)
                                                 ์ •์ฑ…๊ด€๋ฆฌ, ๋ชจ๋‹ˆํ„ฐ๋ง, ์—…๋ฐ์ดํŠธ ๊ด€๋ฆฌ ๋“ฑ

                                     10101010
                                     10101010
                                                Database Server
                                      1010101
                                     10101010    -์ž„๋ฒ ๋””๋“œ DB(Sybase) : 1,000 ์‚ฌ์šฉ์ž ๋ฏธ๋งŒ
                                      1010101
                                                 -MS-SQL 2000/2005 : 1,000 ์‚ฌ์šฉ์ž ์ด์ƒ




 ์—์ด์ „ํŠธ                                  ์—์ด์ „ํŠธ                     SEP Client
                                                                 - ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค, ์•ˆํ‹ฐ์ŠคํŒŒ์ด์›จ์–ด
                                                                 - ๋ฐฉํ™”๋ฒฝ
                                                                 - ์‚ฌ์ „๋ฐฉ์—ญ๊ธฐ๋Šฅ
                                                                 - ์นจ์ž…๋ฐฉ์ง€ ๊ธฐ๋Šฅ
                                                                 - ๋งค์ฒด์ œ์–ด
                                                                 - ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ์ œ์–ด ๋“ฑ.



            Symantec Endpoint Protection 11                                                    8
Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ๊ธฐ๋Šฅ
 Symantec Endpoint Protection์˜ ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ๊ธฐ๋Šฅ์€ ๊ธ€๋กœ๋ฒŒ Leader์˜ ์ œํ’ˆ์ธ Symantec AntiVirus๋ฅผ ํ†ตํ•ฉํ•˜์—ฌ
 ๋†’์€ ํƒ์ง€์œจ๊ณผ ์‹œ์Šคํ…œ ์•ˆ์ •์„ฑ์„ ๋ณด์žฅํ•˜์—ฌ, ํŠนํžˆ ๊ธฐ์กด ์—”์ง„์„ ๊ฐœ์„ ํ•˜์—ฌ ์‹œ์Šคํ…œ ๋ถ€ํ•˜๋ฅผ ํš๊ธฐ์ ์œผ๋กœ ์ค„์—ฌ์„œ ๋†’์€
 ํƒ์ง€์œจ์„ ๊ฐ€๋ฒผ์šด ์—”์ง„์œผ๋กœ ์ œ๊ณตํ•จ.
    โ€“   ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ์‹œ์žฅ์„ ์„ ๋„ํ•˜๋Š” ๊ธฐ์ˆ 
    โ€“   VB100 Award 43ํšŒ ์—ฐ์† ์ˆ˜์ƒ (09๋…„04์›” ํ˜„์žฌ)




                                       Virus Bulletin โ€“ Feb 2007




               Symantec Endpoint Protection 11                                       9
Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

์•ˆํ‹ฐ์ŠคํŒŒ์ด์›จ์–ด ๊ธฐ๋Šฅ
 Symantec Endpoint Protection์˜ ์•ˆํ‹ฐ์ŠคํŒŒ์›จ์–ด ๊ธฐ๋Šฅ์€ ๊ธฐ์กด ๋ฒ„์ „์˜ ๊ธฐ๋Šฅ์—์„œ Rootkit์— ๋Œ€ํ•œ ํƒ์ง€, ์ œ๊ฑฐ ๊ธฐ๋Šฅ์„
 ํฌ๊ฒŒ ๊ฐ•ํ™”ํ•˜์˜€์Œ. ํŠนํžˆ ์ตœ๊ทผ์˜ Rootkit์€ ๊ทธ ์กด์žฌ๋ฅผ ์€ํํ•˜๊ธฐ ์œ„ํ•ด Kernel Level์—์„œ ๋™์ž‘ํ•˜์—ฌ ํŒŒ์ผ ์‹œ์Šคํ…œ์„
 ๊ฐ์‹œํ•˜๋Š” ๊ธฐ์กด ์•ˆํ‹ฐ์ŠคํŒŒ์ด์›จ์–ด ๊ธฐ์ˆ ๋กœ๋Š” ํƒ์ง€ ๋ฐ ์ œ๊ฑฐ๊ฐ€ ๋ถˆ๊ฐ€๋Šฅํ•จ. ํ•˜์ง€๋งŒ SEP 11.0์—์„œ๋Š” ๊ธฐ์กด Veritas์˜
 VxMS ๊ธฐ์ˆ ์„ ์ ‘๋ชฉํ•˜์—ฌ ํ•˜๋“œ๋“œ๋ผ์ด๋ธŒ์˜ ์„นํ„ฐ ๋ฐ์ดํƒ€(Sector Data)๋ฅผ ์ง์ ‘ ์ ‘๊ทผํ•˜์—ฌ ์•…์„ฑ Rootkit์„ ์ œ๊ฑฐ ํ•จ.
    โ€“   VxMS ๊ธฐ์ˆ ์„ ์ด์šฉํ•œ Kernel Lever Rootkit ์ œ๊ฑฐ
    โ€“   Thompson Security Lab ํ…Œ์ŠคํŠธ ๊ฒฐ๊ณผ(Sep, 2006)
         โ€ข   ์—ฌ๋Ÿฌ ์ œํ’ˆ์ค‘์— ์œ ์ผํ•˜๊ฒŒ 20๊ฐœ Rootkit ๋ชจ๋‘ ํƒ์ง€
         โ€ข   ์น˜๋ฃŒ ๊ฐœ์ˆ˜ ๋˜ํ•œ ๊ฒฝ์Ÿ์‚ฌ ๋Œ€๋น„ ๊ฑฐ์˜ 2๋ฐฐ์ˆ˜ ๊ธฐ๋ก




                                                  Source: Thompson Cyber Security Labs, August 2006



                Symantec Endpoint Protection 11                                                       10
Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

๋ฐฉํ™”๋ฒฝ ๊ธฐ๋Šฅ
 ๋ฐฉํ™”๋ฒฝ ๊ธฐ๋Šฅ์˜ ๋ชจ๋“  ๋ฐฉํ™”๋ฒฝ ์ •์ฑ…์€ ๊ฐœ์ธ ์‚ฌ์šฉ์ž๊ด€๋ฆฌ๊ฐ€ ์•„๋‹Œ ์ค‘์•™ ์„œ๋ฒ„์—์„œ ์ •์ฑ… ๊ด€๋ฆฌ๊ฐ€ ์ด๋ฃจ์–ด ์ง€๋ฉฐ ์ •์ฑ… ์ ์šฉ ์‹œ
 ๋ชจ๋“  ์‚ฌ์šฉ์ž PC๋กœ ์ผ๊ด„ ๋ฐฐํฌ ๋ฉ๋‹ˆ๋‹ค. ํŠนํžˆ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ธฐ๋ฐ˜์˜ ๋ฐฉํ™”๋ฒฝ ์ •์ฑ…(์˜ˆ:e๋™ํ‚คP2P ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ธˆ์ง€)
 ์„ค์ •์œผ๋กœ ๊ด€๋ฆฌ์ž๊ฐ€ ์‰ฝ๊ฒŒ PC์˜ ๋ฐฉํ™”๋ฒฝ ์ •์ฑ…์„ ์„ค์ • ๊ฐ€๋Šฅ
   โ€“   ๊ฐ€์žฅ ๊ฐ€๋ณ๊ณ  ๊ฐ€์žฅ ๊ฐ•๋ ฅํ•œ ๋ฐฉํ™”๋ฒฝ ์—”์ง„ (By Gartner MQ Report)
   โ€“   4๋…„ ์—ฐ์† Gartner MQ Report Leader ํ‰๊ฐ€
   โ€“   ์ง๊ด€์ ์ธ ์ •์ฑ…์„ค์ • ์ธํ„ฐํŽ˜์ด์Šค๋กœ ์†์‰ฌ์šด ๊ด€๋ฆฌ
   โ€“   Sygate NAC Agent์˜ ๋ฐฉํ™”๋ฒฝ ๋ชจ๋“ˆ ์ฑ„์šฉ



       Application+Host+์„œ๋น„์Šค+์‹œ๊ฐ„+์ธํ„ฐํŽ˜์ด์Šค
       ์กฐ๊ฑด์„ ๋ณตํ•ฉ์ ์œผ๋กœ ์„ค์ •                                            SEPM



                                                          F/W Policy ๊ด€๋ฆฌ/๋ฐฐํฌ
                                                          Central Management
                                                 F/W ์ •์ฑ…




         ํ–ฅ์ƒ๋œ Application Centric ๊ธฐ๋ฐ˜ Firewall Rule ์ƒ์„ฑ ์ง€์›


               Symantec Endpoint Protection 11                                 11
Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

๋ฐฉํ™”๋ฒฝ ๊ธฐ๋Šฅ
 ๋ฐฉํ™”๋ฒฝ ์ •์ฑ… ์„ค์ •์€ ๋‹ค์–‘ํ•œ ์„ ํƒ์‚ฌํ•ญ์„ ํ†ตํ•ด ๊ด€๋ฆฌ์ž๊ฐ€ ์›ํ•˜๋Š” ์ˆ˜์ค€์„ ์ถฉ์กฑํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ URL ์ฐจ๋‹จ์„ ํ†ตํ•ด ์œ ํ•ด
 ์‹ธ์ดํŠธ ์ฐจ๋‹จ ๋˜๋Š” ์‹œ๊ฐ„ ์„ค์ •์„ ํ†ตํ•ด ์ •์ฑ…์ด ์ž๋™์œผ๋กœ ์‹œ๊ฐ„์— ๋”ฐ๋ผ Enable / Disable ๋  ์ˆ˜ ์žˆ์Œ. ๋˜ํ•œ ์ด๋Ÿฌํ•œ ๋ฐฉํ™”๋ฒฝ
 ๊ธฐ๋Šฅ์€ ์‹œ์Šคํ…œ ๋ถ€ํ•˜๋ฅผ ๊ฑฐ์˜ ์ฃผ์ง€ ์•Š์Œ.




         ๊ตฌ๋ถ„                                     ์„ค            ๋ช…
    ๋ฒˆํ˜ธ          ๊ทœ์น™์˜๋ฒˆํ˜ธ
    ์‹คํ–‰๋จ         ํ™•์ธ๋ž€์„ ์ฒดํฌํ•˜๋ฉด ๊ทœ์น™์„ ์‹คํ–‰ํ•˜๊ณ , ์ฒดํฌ๋ฅผ ์ทจ์†Œํ•˜๋ฉด ๊ทœ์น™์‹คํ–‰์„ ์ค‘์ง€
    ์ด๋ฆ„          ๊ทœ์น™์˜ ์ด๋ฆ„
    ์‹ฌ๊ฐ๋„         ๊ทœ์น™์ด ์‹คํŒจํ•œ ๊ฒฝ์šฐ์˜ ์‹ฌ๊ฐ๋„. 0 ~ 15 ์‚ฌ์ด ๊ฐ’์œผ๋กœ ์„ค์ •. ๋กœ๊ทธ์— ์‚ฌ์šฉ๋จ
    ์‘์šฉํ”„๋กœ๊ทธ๋žจ      ๊ทœ์น™์„ ์‹คํ–‰ํ•˜๋Š” ์‘์šฉํ”„๋กœ๊ทธ๋žจ. ์‘์šฉํ”„๋กœ๊ทธ๋žจ์ด ํƒ์ง€๋˜๋ฉด ๊ทœ์น™์ด ์ ์šฉ๋จ
    ์‹œ๊ฐ„          ๊ทœ์น™์ด ํ™œ์„ฑํ™” ๋˜๊ฑฐ๋‚˜ ๋น„ํ™œ์„ฑํ™”๋˜๋Š” ๊ธฐ๊ฐ„
    ์„œ๋น„์Šค         ๋ฐฉํ™”๋ฒฝ ๊ทœ์น™์„ ์‹คํ–‰ํ•˜๋Š” ์„œ๋น„์Šค
    ์ธํ„ฐํŽ˜์ด์Šค       ๋ชจ๋“  ์–ด๋Œ‘ํ„ฐ, ์ž„์˜์˜ VPN, ์ „ํ™”์ ‘์†, ์ด๋”๋„ท, ๋ฌด์„  ๋“ฑ์˜ ๋ฐฉํ™”๋ฒฝ ๊ทœ์น™์„ ์‹คํ–‰ํ•˜๋Š” ์–ด๋Œ‘ํ„ฐ
    ํ™”๋ฉด๋ณดํ˜ธ๊ธฐ       ํ™”๋ฉด๋ณดํ˜ธ๊ธฐ ์ƒํƒœ[์ผœ์ง], [๊บผ์ง]์€ ๊ทœ์น™์— ์˜ํ–ฅ์„ ์คŒ. [๋ชจ๋‘]๋Š” ๊ทœ์น™์— ์˜ํ•ญ์„ ์ฃผ์ง€ ์•Š์Œ.
    ์ž‘์—…          ํ—ˆ์šฉ โ€“ ํŒจํ‚ท์„ ํ—ˆ์šฉ, ์ค‘๋‹จ-ํŒจํ‚ท์ „์†ก์„ ์ค‘๋‹จ, ์งˆ์˜-์‚ฌ์šฉ์ž๊ฐ€ ํŒจํ‚ท์„ ํ—ˆ์šฉํ• ์ง€ ์ค‘๋‹จํ• ์ง€ ๋ฌผ์Œ
    ์ถ”์           ๊ทœ์น™์— ๋Œ€ํ•œ ์ •๋ณด๋ฅผ ๋กœ๊ทธ์— ๊ธฐ๋กํ•˜๊ฑฐ๋‚˜ ์ด๋ฉ”์ผ ์•Œ๋ฆผ์„ ๋ณด๋ƒ„
    ์ƒ์„ฑ๋œ ์œ„์น˜      ๊ทœ์น™์ด ์ž‘์„ฑ๋œ ์œ„์น˜(์ •์ฑ… ๊ด€๋ฆฌ์ž๋‚˜ ๊ทธ๋ฃน์ด๋‚˜ ์œ„์น˜์ˆ˜์ค€)
    ์„ค๋ช…          ๊ทœ์น™์˜ ์ž‘๋™ ๋ฐฉ๋ฒ• ๋“ฑ ๊ทœ์น™์— ๋Œ€ํ•œ ์ •๋ณด

              Symantec Endpoint Protection 11                              12
Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

์นจ์ž…๋ฐฉ์ง€(IPS) ๊ธฐ๋Šฅ
 Symantec Endpoint Protection์˜ ์นจ์ž…๋ฐฉ์ง€๊ธฐ๋Šฅ์€ Symantec์ด ๊ธฐ์กด์— ๋ณด์œ ํ•˜๊ณ  ์žˆ๋˜ ๋„คํŠธ์›Œํฌ๊ธฐ๋ฐ˜ IPS ๊ธฐ์ˆ ๊ณผ
 ํ˜ธ์ŠคํŠธ IPS๊ธฐ์ˆ ์„ ์ ‘๋ชฉํ•˜์˜€์Œ. ๊ฒŒ๋‹ค๊ฐ€ ์ œ๋กœ๋ฐ์ด ๊ณต๊ฒฉ์— ๋Œ€ํ•œ ๋Œ€์•ˆ ๊ธฐ์ˆ ์„ ์ œ๊ณตํ•จ์œผ๋กœ์จ ์‹ ์ข… ์›œ ๊ณต๊ฒฉ์— ํšจ๊ณผ์ ์œผ๋กœ
 ๋Œ€์‘ ํ•  ์ˆ˜ ์žˆ์Œ.




                                                    ์นจ์ž…๋ฐฉ์ง€๊ธฐ๋Šฅ(IPS)




   ๋„คํŠธ์›Œํฌ๊ธฐ๋ฐ˜ IPS ๊ธฐ์ˆ                                                                              ํ˜ธ์ŠคํŠธ๊ธฐ๋ฐ˜ IPS ๊ธฐ์ˆ 


                                        ์ทจ์•ฝ์„ฑ ๊ธฐ๋ฐ˜ ์‚ฌ์ „๋ฐฉ์—ญ                      ํ–‰๋™๊ธฐ๋ฐ˜ ์‚ฌ์ „๋ฐฉ์—ญ
   Generic Exploit Blocking             (Sigs for vulnerability)   (Whole Security-SONAR)   Proactive Threat Scan

                                        ์‹œ๊ทธ๋„ˆ์ณ ๊ธฐ๋ฐ˜ IPS                     ์ •์ฑ…๊ธฐ๋ฐ˜ ์นจ์ž…์ฐจ๋‹จ
   Deep packet inspection                                                                    Application Control
                                        (SNORT-like)




                    Symantec Endpoint Protection 11                                                                 13
Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

์‚ฌ์ „ ๋ฐฉ์—ญ ๊ธฐ๋Šฅ : ํ–‰๋™๊ธฐ๋ฐ˜
 Symantec Endpoint Protection๋Š” ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ๋ฐ ๊ธฐ์กด IPS ๋“ฑ ์‹œ๊ทธ๋„ˆ์ณ ๊ธฐ๋ฐ˜์˜ ์•Œ๋ ค์ง„ ๊ณต๊ฒฉ ์œ„์ฃผ๋กœ ๋ณดํ˜ธํ•˜๋Š”
 ๊ธฐ์ˆ ์„ ๋„˜์–ด์„œ ํ–‰๋™๊ธฐ๋ฐ˜ ๋˜๋Š” ์ทจ์•ฝ์„ฑ ๊ธฐ๋ฐ˜ ์ฐจ๋‹จ๋ฐฉ์‹์„ ํ†ตํ•ด ์ œ๋กœ๋ฐ์ด ์›œ๊ณต๊ฒฉ๊ณผ ๊ฐ™์€ ์‹ ์ข… ์œ„ํ˜‘์— ํšจ๊ณผ์ ์œผ๋กœ
 ๋Œ€์ฒ˜ํ•จ.


                                                            Application Behabior Data
              ํ–‰๋™๊ธฐ๋ฐ˜ ์‚ฌ์ „๋ฐฉ์—ญ๊ธฐ๋Šฅ
                  Proactive Threat Scan                OS            ๋ฉ”๋ชจ๋ฆฌ            Devices
   - ํ–‰๋™๊ธฐ๋ฐ˜ ์‚ฌ์ „๋ฐฉ์—ญ ๊ธฐ์ˆ ์˜ Leader ์ธ Whole Security์‚ฌ๋ฅผ ์ธ์ˆ˜
   - ์‹œ์Šคํ…œ ๋ฉ”๋ชจ๋ฆฌ์— ๋กœ๋“œ ๋˜๋Š” ํ”„๋กœ์„ธ์Šค์˜ ํ–‰์œ„ ๊ฐ์‹œ
   - ๋ฉ”๋ชจ๋ฆฌ ์ƒ์ฃผ ํ”„๋กœ์„ธ์Šค์— ๋Œ€ํ•ด์„œ ์ˆ˜๋ฐฑ๊ฐœ์˜ ํƒ์ง€๋ชจ๋“ˆ์„ ์ด์šฉํ•˜์—ฌ
    ์ •์ƒ(Valid) ๋˜๋Š” ์•…์„ฑ(Malicious) ํ”„๋กœ์„ธ์Šค๋กœ ๊ตฌ๋ถ„
                                                               ์•…์„ฑ์ฝ”๋“œ ํƒ์ง€๋ชจ๋“ˆ
   - ์‹ค์ œ ์ œ๋กœ๋ฐ์ด ํƒ์ง€์‚ฌ๋ก€ : Sasser-d, Mytob-bd, Sober-F ๋“ฑ
     ๋‹ค์ˆ˜
                                                      ๋ชจ๋“ˆA       ๋ชจ๋“ˆB        ๋ชจ๋“ˆC          ๋ชจ๋“ˆD
   - ์˜คํƒ์œจ 0.005%

             No False
                        16M Installations
              Alarm




                                                               ์Šค์ฝ”์–ด๋ง ์•Œ๊ณ ๋ฆฌ์ฆ˜
                                              False
                                             Alarms

                   Only 20 False Positives
                   for every 1 Million PCโ€™s
                  Symantec Endpoint Protection 11                                             14
Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

์‚ฌ์ „ ๋ฐฉ์—ญ ๊ธฐ๋Šฅ : ์ทจ์•ฝ์„ฑ ๊ธฐ๋ฐ˜
 Symantec Endpoint Protection๋Š” ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ๋ฐ ๊ธฐ์กด IPS ๋“ฑ ์‹œ๊ทธ๋„ˆ์ณ ๊ธฐ๋ฐ˜์˜ ์•Œ๋ ค์ง„ ๊ณต๊ฒฉ ์œ„์ฃผ๋กœ ๋ณดํ˜ธํ•˜๋Š”
 ๊ธฐ์ˆ ์„ ๋„˜์–ด์„œ ํ–‰๋™๊ธฐ๋ฐ˜ ๋˜๋Š” ์ทจ์•ฝ์„ฑ ๊ธฐ๋ฐ˜ ์ฐจ๋‹จ๋ฐฉ์‹์„ ํ†ตํ•ด ์ œ๋กœ๋ฐ์ด ์›œ๊ณต๊ฒฉ๊ณผ ๊ฐ™์€ ์‹ ์ข… ์œ„ํ˜‘์— ํšจ๊ณผ์ ์œผ๋กœ
 ๋Œ€์ฒ˜ํ•จ.


                                                  - OS ๋ฐ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ์ทจ์•ฝ์„ฑ์ด ๋ฐœ๊ฒฌ๋œ ํ›„ ์ ์  ๋” ๋นจ๋ผ์ง€๋Š” ์•…์„ฑ์ฝ”๋“œ์˜

          ์ทจ์•ฝ์„ฑ ๊ธฐ๋ฐ˜ ์‚ฌ์ „๋ฐฉ์—ญ๊ธฐ๋Šฅ                            ์ถœํ˜„์— ๋Œ€์‘ํ•˜๊ธฐ ์œ„ํ•œ ์ˆ˜๋‹จ (Generic Exploit Blocking โ€“ GEB ๋ฐ ์‹œ๊ทธ๋„ˆ์ฒ˜
          Generic Exploit Blocking(GEB)           ๊ธฐ๋ฐ˜์˜ IDS)
                                                  - ์ทจ์•ฝ์„ฑ์ด ๋ฐœ๊ฒฌ๋˜๋ฉด ๊ทธ ์ทจ์•ฝ์„ฑ์„ ์•…์šฉํ•˜๋Š” ๊ณต๊ฒฉํ–‰์œ„์— ๋Œ€ํ•œ ํƒ์ง€ ๊ธฐ๋ฒ• ์ œ๊ณต
                                                  - ์ทจ์•ฝ์„ฑ์„ ๊ฐ€์ง„ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜/์„œ๋น„์Šค์— ๋Œ€ํ•œ ๋ฒ„ํผ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ ์‹œ๋„ ๋“ฑ์„
                                                      ํƒ์ง€/์ฐจ๋‹จ




                                                                         Custom Sig Engine
                                                         Signature IDS
                                RCP
               SMTP                                                                          SMTP          RCP
                                                GEB



                         SSH                                                                         SSH
                                                                                              HTTP          IM
                                     IM                                                               FTP
              HTTP             FTP




              Symantec Endpoint Protection 11                                                                    15
Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

๋งค์ฒด ์ œ์–ด
 Symantec Endpoint Protection์˜ ๋งค์ฒด์ œ์–ด๋Š” ์žฅ์น˜๋ณ„ Class ID๊ฐ’์„ ์ด์šฉํ•˜์—ฌ, ๋งค์ฒด๋ฅผ ์ฐจ๋‹จํ•˜๊ฑฐ๋‚˜ ํ—ˆ์šฉํ•  ์ˆ˜ ์žˆ๊ณ , ๋˜ํ•œ
 ๋งค์ฒด๋ณ„ Read / Write๊ถŒํ•œ ์ œ์–ด๋ฅผ ์ˆ˜ํ–‰ ํ•  ์ˆ˜ ์žˆ์Œ.
    โ€“   USB, Floppy, 1394, IDE, Tape, CD/DVD, ํ”„๋ฆฐํŠธ ์žฅ๋น„, PCMCIA, ์ด๋ฏธ์ง• ์žฅ๋น„(์Šค์บ๋„ˆ, ๋””์ง€ํ„ธ์นด๋ฉ”๋ผ
        ๋“ฑ), ์ ์™ธ์„ ์žฅ๋น„, ๋ธ”๋ฃจํˆฌ์Šค ๋“ฑ ๋ฌด์„ ์žฅ๋น„, SCSI, ๋ชจ๋Ž€, ์Šค๋งˆํŠธ์นด๋“œ ๋ฆฌ๋”, ์Šคํ† ๋ฆฌ์ง€ ๋ณผ๋ฅจ ๋“ฑ.




        SEPM(๊ด€๋ฆฌ์„œ๋ฒ„)                                      USB            Agent

                                                       Floppy

                                           Human Interface Device

                                                    1394 Device

                                                 Devices of Class ID



                    OS Driver ๊ธฐ๋ฐ˜์˜ ๋‹ค์–‘ํ•œ ๋งค์ฒด๋ฅผ SEPM์—์„œ ์‰ฝ๊ฒŒ ์ œ์–ด


               Symantec Endpoint Protection 11                                     16
Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

๋„คํŠธ์›Œํฌ ์ ‘๊ทผ์ œ์–ด (NAC) : Option(๋ผ์ด์„ผ์Šค ๋ณ„๋„๊ตฌ๋งค)
 Symantec Endpoint Protection์˜ ๊ธฐ์กด ์ธํ”„๋ผ๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ๋ณ„๋„์˜ ์†Œํ”„ํŠธ์›จ์–ด ๋ฐฐํฌ ์—†์ด ๋ผ์ด์„ผ์Šค ์ž…๋ ฅ๋งŒ์œผ๋กœ NAC
 ๊ธฐ๋Šฅ์„ ๊ทธ๋Œ€๋กœ ์‚ฌ์šฉ(NAC Ready) , ์—”๋“œํฌ์ธํŠธ ๋ณด์•ˆ์ •์ฑ…์„ ๊ธฐ๋ฐ˜์œผ๋กœ ๋ณด์•ˆ์ •์ฑ…์„ ๋”ฐ๋ฅด์ง€ ์•Š๋Š” ๋‹จ๋ง์— ๋Œ€ํ•ด
 ์ž๋™์น˜๋ฃŒํ•˜๊ฑฐ๋‚˜ ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ์ œ์–ด ๋ฐ ์ ‘๊ทผ๊ถŒํ•œ ํ• ๋‹น.


                                                                                                                           3
                 2                                                                                 3. ํ•ด๋‹น ์ทจ์•ฝ์„ฑ์— ๋Œ€ํ•œ ๋ณต๊ตฌ
                        2. ํŠน์ • PC ๋ณด์•ˆ ์ทจ์•ฝ์„ฑ ๋ฐœ๊ฒฌ                                                          - ์ž๋™ OS Patch ์„ค์น˜
                       ์˜ˆ์‹œ) ๋ฌด๊ฒฐ์„ฑ ๊ฒ€์‚ฌ ํ•ญ๋ชฉ
        ํ•ญ๋ชฉ                  Health Check List        ๊ฒฐ๊ณผ

         1       ๊ทœ์ • AV ์„ค์น˜ ์œ ๋ฌด/์‹คํ–‰ ์—ฌ๋ถ€                   OK

         2       AV ์ตœ์‹  Pattern update                OK

         3       ์ตœ์‹  OS ๋ณด์•ˆ ํŒจ์น˜ update                  Fail

         4       ๊ทœ์ • ๋ณด์•ˆ SW ์„ค์น˜/์‹คํ–‰ ์—ฌ๋ถ€                   OK

         5       Host OS ๋ณด์•ˆ ์„ค์ • ์ ๊ฒ€ ์‚ฌํ•ญ                 OK




             1                                                                                                                          4
                 1. ์ฃผ๊ธฐ์ ์ธ PC ๋ณด์•ˆ ๋ฌด๊ฒฐ์„ฑ ๊ฒ€์‚ฌ                                                                  4. ์ •์ƒ PC ์น˜๋ฃŒ/๋ณต๊ตฌ
                     ์˜ˆ์‹œ) ๋ฌด๊ฒฐ์„ฑ ๊ฒ€์‚ฌ ํ•ญ๋ชฉ                                                                        - ๊ณ ๊ฐ์ด ๊ทœ์ •ํ•˜๋Š” ๋ณด์•ˆ ์ˆ˜์ค€์œผ๋กœ ๋ณต๊ตฌ
   ํ•ญ๋ชฉ                Health Check List          ๊ฒฐ๊ณผ                                                          ํ•ญ๋ชฉ            Health Check List   ๊ฒฐ๊ณผ
   1    ๊ทœ์ • AV ์„ค์น˜ ์œ ๋ฌด/์‹คํ–‰ ์—ฌ๋ถ€                                                                                    1   ๊ทœ์ • AV ์„ค์น˜ ์œ ๋ฌด/์‹คํ–‰ ์—ฌ๋ถ€            OK

   2    AV ์ตœ์‹  Pattern update                                                                                 2   AV ์ตœ์‹  Pattern update         OK

   3    ์ตœ์‹  OS ๋ณด์•ˆ ํŒจ์น˜ update                                                                                   3   ์ตœ์‹  OS ๋ณด์•ˆ ํŒจ์น˜ update           OK

   4    ๊ทœ์ • ๋ณด์•ˆ SW ์„ค์น˜/์‹คํ–‰ ์—ฌ๋ถ€                                                                                    4   ๊ทœ์ • ๋ณด์•ˆ SW ์„ค์น˜/์‹คํ–‰ ์—ฌ๋ถ€            OK

   5    Host OS ๋ณด์•ˆ ์„ค์ • ์ ๊ฒ€ ์‚ฌํ•ญ                                  Self Host Integrity Control Process             5   Host OS ๋ณด์•ˆ ์„ค์ • ์ ๊ฒ€ ์‚ฌํ•ญ          OK
                                                             (PC ๋ณด์•ˆ์ƒํƒœ๋ฅผ ๊ฒ€์‚ฌ & ์ทจ์•ฝ์„ฑ ๋ณต๊ตฌ)

                               Symantec Endpoint Protection 11                                                                                     17
Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

์‹œ์Šคํ…œ ์•ˆ์ •์„ฑ
 ๏ฑ   ์‹œ์Šคํ…œ ๋ฆฌ์†Œ์Šค ์‚ฌ์šฉ๋Ÿ‰ ๊ฐ์†Œ
     โ€“   ๋‹ค์–‘ํ•œ ๋ณด์•ˆ ๊ธฐ์ˆ ์„ ๋™์‹œ์— ์ œ๊ณตํ•˜์ง€๋งŒ ๋ฐ˜๋ฉด์— ์‹œ์Šคํ…œ ๋ฆฌ์†Œ์Šค ์‚ฌ์šฉ๋Ÿ‰์€ ๋‹จ๋… ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ์ œํ’ˆ ์‚ฌ์šฉ์‹œ ๋ณด๋‹ค ๋‚ฎ์€
         ์‚ฌ์šฉ๋ฅ  ์œ ์ง€
 ๏ฑ   ํด๋ผ์ด์–ธํŠธ ๋ณด์•ˆ ํ”„๋กœ์„ธ์Šค/์„œ๋น„์Šค/ํ”„๋กœ๊ทธ๋žจ ์‚ญ์ œ ๋ฐฉ์ง€
     โ€“   ์„ค์น˜์ƒํƒœ, ์„œ๋น„์Šค, ํ”„๋กœ์„ธ์Šค ๋“ฑ์— ๋Œ€ํ•œ ์‚ฌ์šฉ์ž์— ์˜ํ•œ ์ž„์˜ ์ค‘์ง€๋ฅผ ์ฐจ๋‹จ. ๋˜ํ•œ ์„œ๋น„์Šค ์ƒํƒœ๋ฅผ โ€œ์‚ฌ์šฉํ•˜์ง€ ์•Š์Œโ€์œผ๋กœ
         ๊ฐ•์ œ ์„ค์ •ํ•˜๋”๋ผ๋„ ๋ถ€ํŒ…์‹œ์— ๊ฐ•์ œ ์„œ๋น„์Šค๋ฅผ ์‹คํ–‰ํ•˜์—ฌ ์ƒ์‹œ ๋ณด์•ˆ์ƒํƒœ ์œ ์ง€(Always ON)
 ๏ฑ   ์ž„์˜ ๋ณ€๊ฒฝ ๋ฐฉ์ง€ ๊ธฐ๋Šฅ
     โ€“   SEP ์ปจํ…์ธ , ํŒŒ์ผ ๋“ฑ ์ •์ƒ ๋™์ž‘์„ ๋ฐฉํ•ดํ•˜๊ณ ์ž ํ•˜๋Š” ๋ชฉ์ ์˜ ์†์ƒ ํ–‰์œ„๋ฅผ ์ฐจ๋‹จ.



                                                 129MB
                                           SCS 3.1




              84%
           Memory Reduction
                                         SAV CE 10.1
                                                     62MB


                          24MB
               SEP 11.0

              Symantec Endpoint Protection 11                              18
Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

์ค‘์•™ ๊ด€๋ฆฌ ๊ธฐ๋Šฅ
 ๏ฑ   ์ค‘์•™ ์ง‘์ค‘์‹ ์ด๋ฒคํŠธ ๋กœ๊น…
     โ€“   ํด๋ผ์ด์–ธํŠธ ์ƒ์˜ ๊ฐ์—ผ, ํŒจํ„ด
         ๋ฏธ์—…๋ฐ์ดํŠธ, ์ž๋™ ๋ณดํ˜ธ ๊ธฐ๋Šฅ ์ค‘์ง€๋“ฑ์˜
         ์ด๋ฒคํŠธ ๋ฐ ํ†ต๊ณ„๋ฅผ Dash Board๋“ฑ์„
         ํ†ตํ•˜์—ฌ ํŒŒ์•…
     โ€“   ์ •์˜ํ•œ ์ด๋ฒคํŠธ ๊ฒฝ๊ณ  ๋ฐœ์ƒ ์‹œ (๊ฐ์—ผ,
         ์„œ๋น„์Šค ์ค‘์ง€ ํด๋ผ์ด์–ธํŠธ, ํŒจํ„ด
         ๋ฏธ์—…๋ฐ์ดํŠธ) ์ค‘์•™ ์ฝ˜์†”์„ ํ†ตํ•œ ๊ฒฝ๊ณ 
         ๋ฐœ์ƒ
     โ€“   ํด๋ผ์ด์–ธํŠธ ์‹œ์Šคํ…œ ์žฌ์‹œ์ž‘, ๊ฐ•์ œ ํŒจํ„ด
         ์—…๋ฐ์ดํŠธ, ๊ด€๋ฆฌ์ž์— ์˜ํ•œ ๊ฒ€์ƒ‰๋“ฑ์˜
         ๋ช…๋ น ์‹คํ–‰ ์‹œ ์ค‘์•™ ์ฝ˜์†”์„ ํ†ตํ•œ ๋ช…๋ น
         ์‹คํ–‰ ์™„๋ฃŒ ์—ฌ๋ถ€ ํ™•์ธ ๊ฐ€๋Šฅ
 ๏ฑ   ์—ญํ• ์— ๋”ฐ๋ฅธ ๊ด€๋ฆฌ์ž ๊ถŒํ•œ ์ง€์ •
     โ€“   ๋Œ€๊ทœ๋ชจ ๊ธฐ์—… ํ™˜๊ฒฝ์— ๋”ฐ๋ฅธ ๊ด€๋ฆฌ์ž
         ๋“ฑ๋ก์„ ์œ„ํ•˜์—ฌ, ์ •์ฑ… ์„ค์ • ๊ถŒํ•œ ๋˜๋Š”
         ๋ณด๊ธฐ ๊ถŒํ•œ ๋“ฑ์˜ ๊ด€๋ฆฌ์ž ๊ถŒํ•œ ๋ถ€์—ฌ
         ๊ฐ€๋Šฅ
 ๏ฑ   ๋ฐฐํฌ๋ฅผ ์œ„ํ•œ ๊ธฐ๋Šฅ ์ œ๊ณต
     โ€“   ํŒจํ‚ค์ง€ ์ž‘์„ฑ ๊ธฐ๋Šฅ
     โ€“   ํŒจ์น˜ ๋ฐ ์—…๋ฐ์ดํŠธ ์ œ๊ณต
     โ€“   ์›๊ฒฉ ์„ค์น˜ ๊ธฐ๋Šฅ


              Symantec Endpoint Protection 11   19
Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

์ปจํ…์ธ  ์—…๋ฐ์ดํŠธ ๊ด€๋ฆฌ
 ๏ฑ   Manager์— ์˜ํ•œ ์ปจํ…์ธ  ๊ด€๋ฆฌ
     โ€“   Manager๊ฐ€ ์ตœ์‹  ํด๋ผ์ด์–ธํŠธ ํŒจ์น˜, ๋ฐ”์ด๋Ÿฌ์Šค ์ •์˜ ํŒจํ„ด, IDS ์‹œ๊ทธ๋„ˆ์ฒ˜๋“ฑ๊ณผ ๊ฐ™์€ ์ปจํ…์ธ ๋ฅผ ์—…๋ฐ์ดํŠธ ํ•  ๊ฒฝ์šฐ ๊ฐ ๊ฐœ๋ณ„
         ํด๋ผ์ด์–ธํŠธ์— ํฌํ•จ๋œ ์ปจํ…์ธ ์™€ ์ฐจ์ด๋‚˜๋Š” ๋ถ€๋ถ„๋งŒ ์ฆ๋ถ„์œผ๋กœ ์ƒ์„ฑํ•˜์—ฌ ํ•ด๋‹น ํด๋ผ์ด์–ธํŠธ์— ๋ฐฐํฌํ•  ์ˆ˜ ์žˆ์Œ
     โ€“   ํด๋ผ์ด์–ธํŠธ์˜ ์ปจํ…์ธ ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ, ์ œํ’ˆ ์ž์ฒด์˜ ๋ฒ„์ „ ์—…๋ฐ์ดํŠธ๋„ ์ž๋™ ์ ์šฉ๊ฐ€๋Šฅ
     ์˜ˆ) SEP 11 ๋ฒ„์ „์œผ๋กœ 12๋ฒ„์ „์œผ๋กœ ๋นŒ๋“œ์—…์ด ๋  ๊ฒฝ์šฐ์—๋„ ์ค‘์•™์—์„œ ์ž๋™ ๋ฐฐํฌ๋ฅผ ํ†ตํ•˜์—ฌ ์žฌ์„ค์น˜ ๋“ฑ์˜ ์ˆ˜์ž‘์—… ๋ถˆํ•„์š”




              Symantec Endpoint Protection 11                                  20
Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

Active Directory / LDAP ์—ฐ๋™
 ๏ฑ   Active Directory์™€์˜ ์—ฐ๋™
     โ€“   AD์™€์˜ ์—ฐ๋™์„ ํ†ตํ•˜์—ฌ ๊ธฐ์กด
         Organization Unit Import ์ง€์›
     โ€“   ์˜ˆ์•ฝ ์‹œ๊ฐ„์— ๋”ฐ๋ฅธ AD์™€์˜ ์ฃผ๊ธฐ์ 
         ๋™๊ธฐํ™” ๋˜๋Š” ์š”์ฒญ์— ์˜ํ•œ ๋™๊ธฐํ™”
         ์ง€์›
     โ€“   AD ์—ฐ๋™์˜ ๊ฒฝ์šฐ, ํด๋ผ์ด์–ธํŠธ ๋ฐฐํฌ
         ์‹œ ํ•ด๋‹น ๊ทธ๋ฃน์— ์ž๋™ ๋“ฑ๋ก
     โ€“   AD๋ฅผ ํ†ตํ•œ ๊ด€๋ฆฌ์ž ์ธ์ฆ




                  Symantec Endpoint Protection 11   21
Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

๋ณด๊ณ ์„œ ๋ฐ ๋ชจ๋‹ˆํ„ฐ๋ง๊ธฐ๋Šฅ
 ๏ฑ    ๋‹ค์–‘ํ•œ ๋ฆฌํฌํŠธ ์ œ๊ณต
      โ€“   ์กฐ์ง๋‚ด ๋ชจ๋“  ์‹œ์Šคํ…œ์— ๋Œ€ํ•œ ์‹ค์‹œ๊ฐ„
          ์ด๋ฒคํŠธ๊ฐ€ Dash Board
      โ€“   ์ง€์ •๋œ ๊ด€๋ฆฌ์ž์— ๋Œ€ํ•ด ์ฃผ๊ธฐ๋ณ„
          ๋ฆฌํฌํŠธ ๋ฐœ์†ก ๊ธฐ๋Šฅ
      โ€“   ํŠน์ • ์ด๋ฒคํŠธ ๋ฐœ์†ก ์‹œ ์ •์˜ํ•œ ๋ฐฐ์น˜
          ํŒŒ์ผ ์‹คํ–‰ ๋ฐ ๊ด€๋ฆฌ์ž ๊ฒฝ๊ณ  ์ „์†ก
                                                    โ‘    โ‘ก
          ๊ธฐ๋Šฅ
      โ€“   ์•ฝ 50์—ฌ๊ฐœ์˜ ๋ณด๊ณ ์„œ ํ…œํ”Œ๋ฆฟ ์ œ๊ณต
          (๊ฐ์—ผ, ์‹œ๊ทธ๋„ˆ์ฒ˜ ๋ฐฐํฌ ํ˜„ํ™ฉ,
          ํด๋ผ์ด์–ธํŠธ ๋ฏธ์„ค์น˜ ์‹œ์Šคํ…œ ๋“ฑ)
 1.   ์ „์ฒด ๋„คํŠธ์›Œํฌ์—์„œ ๋ฐ”์ด๋Ÿฌ์Šค ๋ฐ ์ŠคํŒŒ์ด์›จ์–ด ๋“ฑ                      โ‘ข   โ‘ฃ
      ์•…์„ฑ์ฝ”๋“œ๋ณ„ ์‹ค์‹œ๊ฐ„ ์ฒ˜๋ฆฌํ˜„ํ™ฉ
 2.   ๋ฐ”์ด๋Ÿฌ์Šค ์ •์˜ํŒŒ์ผ(ํŒจํ„ด)์ด ์ตœ์‹ ์ด ์•„๋‹Œ ์‹œ์Šคํ…œ
      ์ˆ˜ ํ†ต๊ณ„
 3.   ์ตœ๊ทผ ํ•˜๋ฃจ ๋™์•ˆ์˜ ์•…์„ฑ์ฝ”๋“œ ํƒ์ง€์ถ”์ด๋ฅผ
      ์‹œ๊ฐ„๋Œ€๋ณ„๋กœ ๋„์‹ํ™”
 4.   Security Response
      ์‹œ๋งŒํ… Global Service์ธ DeepSight์˜ ๋ฐ์ดํƒ€๋ฅผ
      ์ด์šฉํ•˜์—ฌ ํ˜„์žฌ ์‹œ์ ์˜ ๊ธ€๋กœ๋ฒŒ Top Threats ๋ฐ                 โ‘ค
      ์‹ ์ข… ์•…์„ฑ์ฝ”๋“œ ์ •๋ณด๋ฅผ ๋ชจ๋‹ˆํ„ฐ๋ง. ํŠนํžˆ ํ™•์‚ฐ๋„๊ฐ€
      ๋†’์€ ์›œ์ถœํ˜„์‹œ ๋ณด์•ˆ๋“ฑ๊ธ‰ ๊ฒฝ๊ณ .
 5.   ์—”์ง„, ์‹ค์‹œ๊ฐ„ ๋ณดํ˜ธ๊ธฐ๋Šฅ ๋“ฑ ํ•„์ˆ˜ ๊ธฐ๋Šฅ๋“ค์˜
      ์‚ฌ์šฉ์ƒํƒœ์— ๋Œ€ํ•œ ๋ชจ๋‹ˆํ„ฐ๋ง

                  Symantec Endpoint Protection 11           22
Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

์•„ํ‚คํ…์ฒ˜ 1
 ๏ฑ Manager ๋ฐ DB, Client ์ง€์› OS ํ”Œ๋žซํผ



              Symantec Endpoint
              Protection Manager
          Java-based
          ์›น์ ‘์†์„ ํ†ตํ•˜์—ฌ ์œ„์น˜์™€ ๊ด€๊ณ„์—†์ด                                    SEPM ์ง€์› OS ํ”Œ๋žซํผ
          ์ ‘์† ๊ฐ€๋Šฅ                                                Windows XP (32 and 64 bit),
          ์—ญํ• ์— ๋”ฐ๋ฅธ ๊ด€๋ฆฌ์ž ๊ถŒํ•œ ์„ค์ •                                     Windows 2000 (32 and 64 bit),
                                                                                Data
                                                                               Store
                                                               Windows 2003 (32 and 64 bit),
                                   ์ค‘์•™ ์ฝ˜์†”                       Windows Vista (32 and 64 bit)

                                                               ์ง€์› DB
                                                               ๋‚ด์žฅ Sybase DB (1000ํด๋ผ์ด์–ธํŠธ
                                                               ๋ฏธ๋งŒ)
                                                               MS SQL Server (1000ํด๋ผ์ด์–ธํŠธ
                                                               ์ด์ƒ)

                                                                     SEP 11 ํด๋ผ์ด์–ธํŠธ ์ง€์› OS ํ”Œ๋žซํผ
                                                                     Windows XP (32 and 64 bit),
                                                                     Windows 2000 (32 and 64 bit),
                                                                     Windows 2003 (32 and 64 bit),
                                      Servers              Laptops   Windows Vista (32 and 64 bit)
                                                Desktops

                                                Clients
            Symantec Endpoint Protection 11                                                          23
Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

์•„ํ‚คํ…์ฒ˜ 2
                                                                                 ๏‚ง Peripheral Deice Control
 ๏ฑ Manager, Client๊ฐ„ ํ†ต์‹  ํฌํŠธ ๋ฐ ์ •๋ณด



              Symantec Endpoint
              Protection Manager                                 To the server
                                                                 ์ด๋ฒคํŠธ
                                                                 ๋กœ๊ทธ
                                                                 ์ƒํƒœ ์ •๋ณด
          To the client
          ์›๊ฒฉ ์„ค์น˜/ํŒจ์น˜
          ์ •์ฑ… ๋ฐฐํฌ
          ์ปจํ…์ธ  ๋ฐฐํฌ
          - Virus Definition
          - IDS Signature

                                                                  ํ†ต์‹  ํฌํŠธ
                                                                  HTTPS (443/tcp)
                                                                  HTTP (80/tcp)
                                                                  * Manager์˜ 80, 443/tcp ํฌํŠธ๊ฐ€
                                                                  Open๋˜์–ด ์žˆ์–ด์•ผ ํ•˜๋ฉฐ,
                                                                  ํด๋ผ์ด์–ธํŠธ๋“ค์— ๋Œ€ํ•ด์„œ๋Š”
                                                                  ์ธ๋ฐ”์šด๋“œ ์˜คํ”ˆ ์ •์ฑ…์ด ๋ถˆํ•„์š”ํ•จ




                                       Servers              Laptops
                                                 Desktops

                                                 Clients
             Symantec Endpoint Protection 11                                                                  24
Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ

๊ตฌ์„ฑ ๋””์ž์ธ
 ๏ฑ Single Site
    โ€“   ๊ฐ€์žฅ ๊ธฐ๋ณธ์ ์ธ ๋ฐฉ๋ฒ•์œผ๋กœ์จ IT ํ™˜๊ฒฝ์ด ํฌ์ง€ ์•Š๊ฑฐ๋‚˜ ์ง€์—ญ์ ์œผ๋กœ ๋ถ„์‚ฐ๋˜์–ด ์žˆ์ง€ ์•Š์€ ํ™˜๊ฒฝ์— ์ ์šฉ



                                                                - ํด๋ผ์ด์–ธํŠธ์ˆ˜๊ฐ€ 1,000๋…ธ๋“œ ๋ฏธ๋งŒ์ผ ๊ฒฝ์šฐ :
                                     1010101                    Embedded DB ์‚ฌ์šฉ(Sybase)
                                     0101010
                                     1010101                    - 1,000 ๋…ธ๋“œ ์ด์ƒ์ผ ๊ฒฝ์šฐ MS-SQL ์„œ๋ฒ„ ์‚ฌ์šฉ


                                                                - ํ•„์š”์‹œ ์ด์ค‘ํ™”

                                 SEPM              SEPM(์„ ํƒ์‚ฌํ•ญ)




                 Symantec Endpoint Protection 11                                                 25
๊ธฐ๋Œ€ํšจ๊ณผ

SEP 11.0 Value




                  Symantec Endpoint Protection

           Secure                                 Simple    Seamless
    ๏ฑ ๋น„๊ตํ• ์ˆ˜ ์—†๋Š” ์ข…ํ•ฉ ๊ธฐ์ˆ                           ๏ฑ   ๋‹จ์ผ ์—์ด์ „ํŠธ   ๏ฑ ๋‹ค์–‘ํ•œ ๊ณ ๊ฐ ๋„คํŠธ์›Œํฌ ํ™˜๊ฒฝ
    ๏ฑ ์•ˆํ‹ฐ ๋ฐ”์ด๋Ÿฌ์Šค ๊ทธ ์ด์ƒ์˜ ๋ณดํ˜ธ                       ๏ฑ   ๋‹จ์ผ ๊ด€๋ฆฌ์ฝ˜์†”     ์ง€์›
      ๊ธฐ์ˆ                                      ๏ฑ   ๋‹จ์ผ ๋ผ์ด์„ผ์Šค
    ๏ฑ Symantec์˜ Global Intelligence                        ๏ฑ ์›ํ•˜๋Š” ํ˜•ํƒœ๋กœ ์‚ฌ์šฉํ•  ์ˆ˜
      Network์˜ ๊ธฐ์ˆ                             ๏ฑ   ๋‹จ์ผ ๊ณ ๊ฐ์ง€์›
                                                             ์žˆ๋„๋ก ์†์‰ฌ์šด ์„ค์ •
                                                           ๏ฑ ํ•„์ˆ˜ ๋ณดํ˜ธ ๊ธฐ์ˆ  ๋ฐ
                                                             ์ปดํ”Œ๋ผ์ด์–ธ์Šค ๊ธฐ๋Šฅ์˜ ์™„๋ฒฝํ•œ
                                                             ์กฐํ•ฉ




               Symantec Endpoint Protection 11                                26
๋ณ„์ฒจ : Why Symantec
Why Symantec

โ€ข ์•ˆ์ •์„ฑ
 โ€“ 150,000,000 ์ด์ƒ์˜ ์‹œ์Šคํ…œ์—์„œ ๊ฒ€์ฆ๋œ ์ œํ’ˆ ์•ˆ์ •์„ฑ
 โ€“ AV ์‹œ๊ทธ๋„ˆ์ฒ˜์˜ ์‹ ๋ขฐ์„ฑ

โ€ข ํƒ์ง€์œจ
 โ€“   ๋‹ค์–‘ํ•œ ํ…Œ์ŠคํŠธ์™€ ์ธ์ฆ๊ธฐ๊ด€์„ ํ†ตํ•ด ๊ฒ€์ฆ๋œ ํƒ์ง€ ๋ฐ ์น˜๋ฃŒ ๋Šฅ๋ ฅ
 โ€“   73,000 (07๋…„ 6์›” ํ˜„์žฌ)์ด์ƒ์˜ ๋ฐ”์ด๋Ÿฌ์Šค DB ๋ณด์œ 
 โ€“   ํ–‰๋™๊ธฐ๋ฐ˜ ํƒ์ง€ ๊ธฐ์ˆ ์„ ํ†ตํ•œ zero-day ๊ณต๊ฒฉ ๋ฐฉ์–ด
 โ€“   ์›”๋“ฑํ•œ ํŒจํ„ด ์—…๋ฐ์ดํŠธ ์ œ๊ณต

โ€ข ๋Œ€์‘ ๋ฐ ์ง€์›
 โ€“ ์‹ ์ข… ์œ„ํ˜‘์— ๋น ๋ฅด๊ฒŒ ๋Œ€์ฒ˜ํ•˜๊ธฐ ์œ„ํ•œ ์ „์„ธ๊ณ„ ์ธํ”„๋ผ
 โ€“ ์„ธ๊ณ„ ๊ฐ์ง€์˜ ๋ณด์•ˆ ์šด์˜ ์„ผํ„ฐ(Security Operations Center)์™€ ๋ณด์•ˆ ๋Œ€์‘ ์—ฐ๊ตฌ์†Œ
   (Security Response Lab)๋ฅผ ํ†ตํ•ด 24x7 ์ •๋ณด ๋ณด์•ˆ ์„œ๋น„์Šค ์ œ๊ณต
 โ€“ ์ „์„ธ๊ณ„ 25๊ฐœ ์ง€์› ์„ผํ„ฐ๋ฅผ ํ†ตํ•ด ๊ธฐ์—…๊ณผ ์ผ๋ฐ˜ ์‚ฌ์šฉ์ž์˜ ๋ณด์•ˆ ๋ฐ ๊ฐ€์šฉ์„ฑ ์š”๊ตฌ์‚ฌํ•ญ
   ์— ๋Œ€์‘


                                                            28
Global Intelligence Network

์‹œ๋งŒํ… SOC     +   ์‹œ๋งŒํ…์ด ๋ชจ๋‹ˆํ„ฐ๋งํ•˜๋Š”   +       ์‹œ๋งŒํ…์ง€์›         +   180๊ฐœ ๊ตญ์— ๋“ฑ๋ก๋œ 40,000์—ฌ๊ฐœ์˜     +   ์‹œ๋งŒํ… ๋ณด์•ˆ์—ฐ๊ตฌ์†Œ
                    ๊ตญ๊ฐ€                                           ์„ผ์„œ

                                     ๋ฒ ๋ฅผ๋ฆฐ, ๋…์ผ                       โ€ข   Symantectm Security Response
                                      ๋Ÿฐ๋˜,์˜๊ตญ                             โ€“   ์„ธ๊ณ„ ์ตœ๊ณ ์˜ ๋ณด์•ˆ ๋Œ€์‘์„ผํ„ฐ
   ํ† ์ฟ„, ์ผ๋ณธ
                                                                        โ€“   180๊ฐœ๊ตญ 40,000๊ฐœ ์„ผ์„œ๋ฅผ ํ†ตํ•œ ์ธํ„ฐ๋„ท
                                  ๋”๋ธ”๋ฆฐ, ์•„์ผ๋žœ๋“œ                                 ์œ„ํ˜‘ ๋ชจ๋‹ˆํ„ฐ๋ง
                ์บ˜๊ฑฐ๋ฆฌ, ์บ๋‚˜๋‹ค                                                โ€“   ์‹ ์ข… ์œ„ํ˜‘์— ๋Œ€ํ•œ ๋น ๋ฅธ ๋Œ€์ฒ˜

             ์Šคํ”„๋งํ•„๋“œ, ์˜ค๋ ˆ๊ณค                                                 โ€ข   ์ƒˆ๋กœ ๋ฐœ๊ฒฌ๋œ ์œ„ํ˜‘์— ๋Œ€ํ•œ ๋ฐ”์ด๋Ÿฌ์Šค ์ •์˜
                                       ์›”๋ค, ๋ฉ”์‚ฌ์ถ”์„ธ์Šค                            ๋Š” ํ•ด๋‹น ์—…๋ฌด์ผ์— ์ƒ์„ฑ๋จ
            ๋ ˆ๋“œ์šฐ๋“œ ์‹œ, ์บ˜๋ฆฌํฌ๋‹ˆ์•„                                               โ€ข   3๋“ฑ๊ธ‰ ์ด์ƒ์˜ ๋†’์€ ํ™•์‚ฐ๋„์˜ ์œ„ํ˜‘์— ๋Œ€ํ•œ
                                                                            ์ฆ‰๊ฐ์ ์ธ ๋Œ€์ฒ˜
            ์ƒŒํƒ€ ๋ชจ๋‹ˆ์นด, ์บ˜๋ฆฌํฌ๋‹ˆ์•„
                                                                        โ€ข   Digital Immune System์€ ์ด๋ฏธ ์•Œ๋ ค์ง„
                                                                            ๋ฐ”์ด๋Ÿฌ์Šค์— ๋Œ€ํ•œ ์˜๋ขฐ๊ฑด์„ 95% ์ด์ƒ ์ž
             ์ƒŒ ์•ˆํ† ๋‹ˆ์˜ค, ํ…์‚ฌ์Šค
                                                                            ๋™์ฒ˜๋ฆฌํ•˜์—ฌ ์‹ ์†ํ•˜๊ฒŒ ๋Œ€์‘



                                              ์•Œ๋ž™์‚ฐ๋“œ๋ฆฌ์•„, ๋ฒ„์ง€๋‹ˆ์•„
                    ์‹œ๋“œ๋‹ˆ, ํ˜ธ์ฃผ




                                                                                                       29
์‹œ์žฅ ์ ์œ ๋„




         (Source: IDC)




                         30
์ธ์ฆ๊ธฐ๊ด€ ํ‰๊ฐ€




                              Symantec:
                              โ€ข 99๋…„ ์ดํ›„
                                43ํšŒ ์—ฐ์†
                                ํ†ต๊ณผํ•œ ์œ ์ผํ•œ
                                ๋ฒค๋”
                              โ€ข 09๋…„ 04์›”
                                ํ˜„์žฌ



          โ€ข Pass: Detected all "In the Wild viruses" in
            comparative tests (with no false positives)
          โ€ข Fail: Missed detection after three attempts
          โ€ข โ€”: Chose not to submit for testing




                                                          31
ํŒจํ„ด ์—…๋ฐ์ดํŠธ ๋นˆ๋„


               Vendor              Updates
               Symantec             1699
               Sophos                395
               F-Secure              216
               Fortinet              174
               Panda                 138
               ESet Nod32            115
               Norman                 85
               Trend Micro            82
               McAfee                 68
               F-Prot                 67


      Averages 4X more updates than nearest competitor
                                                         Source: www.av-test.org
                                                         1/1/2006 โ€“ 3/31/2006

                                                                             32
์›”๋ณ„ ์œ„ํ˜‘ ํƒ์ง€ ๋ณด๊ณ  ๋นˆ๋„




                 Source: Symantec
                 Security Response




                                     33
๋น ๋ฅธ ์ƒ˜ํ”Œ ์ฒ˜๋ฆฌ ๋Œ€์‘




              Source: Symantec
              Security Response




                                  34
AV ์‹œ๊ทธ๋„ˆ์ฒ˜์˜ ์‹ ๋ขฐ๋„

โ€ข ์ „์„ธ๊ณ„ 150,000,000 ์ด์ƒ์˜ ์‹œ์Šคํ…œ์—์„œ
  Symantec AV ์‹œ๊ทธ๋„ˆ์ฒ˜ ์‚ฌ์šฉ


โ€ข ์ผ์ผ 28,000,000 ์ด์ƒ์˜ ๋‹ค์šด๋กœ๋“œ


โ€ข ๋ชจ๋“  ์ง€์› OS์— ๋Œ€ํ•˜์—ฌ 2,000,000 ์ด์ƒ
  ์˜ ์ •์ƒ ํŒŒ์ผ ํ…Œ์ŠคํŠธ ๊ฒ€์ƒ‰์„ ํ†ตํ•ด ๋ฐฐํฌ๋˜
  ๋Š” fully certified ๋œ ๋ฐ”์ด๋Ÿฌ์Šค ์ •์˜


โ€ข ์ฃผ์š” OS ๋ฐ ์ฃผ์š” ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์— ๋Œ€ํ•ด
  ํ…Œ์ŠคํŠธ ํ›„ ๋ฐฐํฌ๋˜๋Š” Rapid Release ๋ฐ”์ด
  ๋Ÿฌ์Šค ์ •์˜




                                35
Key Customers for
Symantec Endpoint Protection โ€“ 1/2
Key Customers for
Symantec Endpoint Protection โ€“ 2/2




                                     37
๊ฐ์‚ฌํ•ฉ๋‹ˆ๋‹ค!


      Copyright ยฉ 2007 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and
      other countries. Other names may be trademarks of their respective owners.
      This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to
      the maximum extent allowed by law. The information in this document is subject to change without notice.


Symantec Endpoint Protection 11                                                                                                                                                                                 38

More Related Content

Similar to My cool new Slideshow!2

Asec report vol.16_kor
Asec report vol.16_korAsec report vol.16_kor
Asec report vol.16_kor
nam kwangjin
ย 
์•…์„ฑ์ฝ”๋“œ ๋™ํ–ฅ ๋ฐ ๋Œ€์‘ ๋ฐฉ์•ˆ
์•…์„ฑ์ฝ”๋“œ ๋™ํ–ฅ ๋ฐ ๋Œ€์‘ ๋ฐฉ์•ˆ์•…์„ฑ์ฝ”๋“œ ๋™ํ–ฅ ๋ฐ ๋Œ€์‘ ๋ฐฉ์•ˆ
์•…์„ฑ์ฝ”๋“œ ๋™ํ–ฅ ๋ฐ ๋Œ€์‘ ๋ฐฉ์•ˆ
Youngjun Chang
ย 
1. 2009๋…„ ์ƒ๋ฐ˜๊ธฐ ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ
1. 2009๋…„ ์ƒ๋ฐ˜๊ธฐ ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ1. 2009๋…„ ์ƒ๋ฐ˜๊ธฐ ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ
1. 2009๋…„ ์ƒ๋ฐ˜๊ธฐ ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ
Youngjun Chang
ย 
์•…์„ฑ ์ฝ”๋“œ์™€ ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ
์•…์„ฑ ์ฝ”๋“œ์™€ ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ์•…์„ฑ ์ฝ”๋“œ์™€ ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ
์•…์„ฑ ์ฝ”๋“œ์™€ ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ
Youngjun Chang
ย 
์•…์„ฑ์ฝ”๋“œ์™€ ๊ฐœ์ธ ์ •๋ณด ๋ณดํ˜ธ
์•…์„ฑ์ฝ”๋“œ์™€ ๊ฐœ์ธ ์ •๋ณด ๋ณดํ˜ธ์•…์„ฑ์ฝ”๋“œ์™€ ๊ฐœ์ธ ์ •๋ณด ๋ณดํ˜ธ
์•…์„ฑ์ฝ”๋“œ์™€ ๊ฐœ์ธ ์ •๋ณด ๋ณดํ˜ธ
Youngjun Chang
ย 
๋žœ์„ฌ์›จ์–ด vs ์œˆ๋„์šฐ 10
๋žœ์„ฌ์›จ์–ด vs ์œˆ๋„์šฐ 10๋žœ์„ฌ์›จ์–ด vs ์œˆ๋„์šฐ 10
๋žœ์„ฌ์›จ์–ด vs ์œˆ๋„์šฐ 10
Sik Kim
ย 
Cybereason in Korea, SMEC
Cybereason in Korea, SMECCybereason in Korea, SMEC
Cybereason in Korea, SMEC
SMEC Co.,Ltd.
ย 
1.์•…์„ฑ์ฝ”๋“œ ์ตœ์‹  ๋™ํ–ฅ๊ณผ ๊ธฐ๋ฒ•
1.์•…์„ฑ์ฝ”๋“œ ์ตœ์‹  ๋™ํ–ฅ๊ณผ ๊ธฐ๋ฒ•1.์•…์„ฑ์ฝ”๋“œ ์ตœ์‹  ๋™ํ–ฅ๊ณผ ๊ธฐ๋ฒ•
1.์•…์„ฑ์ฝ”๋“œ ์ตœ์‹  ๋™ํ–ฅ๊ณผ ๊ธฐ๋ฒ•
Youngjun Chang
ย 
์†Œํฌ์Šค ์ธํ„ฐ์…‰ํŠธ ์—‘์Šค ์†Œ๊ฐœ (Sophos Intercept X)
์†Œํฌ์Šค ์ธํ„ฐ์…‰ํŠธ ์—‘์Šค ์†Œ๊ฐœ (Sophos Intercept X)์†Œํฌ์Šค ์ธํ„ฐ์…‰ํŠธ ์—‘์Šค ์†Œ๊ฐœ (Sophos Intercept X)
์†Œํฌ์Šค ์ธํ„ฐ์…‰ํŠธ ์—‘์Šค ์†Œ๊ฐœ (Sophos Intercept X)
Gunjung Lee
ย 
ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค๋ฅผ ์ด์šฉํ•œ APT ๋Œ€์‘
ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค๋ฅผ ์ด์šฉํ•œ APT ๋Œ€์‘ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค๋ฅผ ์ด์šฉํ•œ APT ๋Œ€์‘
ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค๋ฅผ ์ด์šฉํ•œ APT ๋Œ€์‘
Youngjun Chang
ย 
๋ณด์•ˆ ์œ„ํ˜‘ ํ˜•ํƒœ์™€ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
๋ณด์•ˆ ์œ„ํ˜‘ ํ˜•ํƒœ์™€ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•๋ณด์•ˆ ์œ„ํ˜‘ ํ˜•ํƒœ์™€ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
๋ณด์•ˆ ์œ„ํ˜‘ ํ˜•ํƒœ์™€ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
Youngjun Chang
ย 
แ„Œแ…ตแ„‚แ…ณแ†ผแ„’แ…งแ†ผแ„Œแ…ตแ„‰แ…ฉแ†จแ„‹แ…ฑแ„’แ…งแ†ธแ„€แ…ฉแ†ผแ„€แ…งแ†จ แ„Žแ…ฌแ„‰แ…ตแ†ซแ„ƒแ…ฉแ†ผแ„’แ…ฃแ†ผ แ„‡แ…ฎแ†ซแ„‰แ…ฅแ†จ
แ„Œแ…ตแ„‚แ…ณแ†ผแ„’แ…งแ†ผแ„Œแ…ตแ„‰แ…ฉแ†จแ„‹แ…ฑแ„’แ…งแ†ธแ„€แ…ฉแ†ผแ„€แ…งแ†จ แ„Žแ…ฌแ„‰แ…ตแ†ซแ„ƒแ…ฉแ†ผแ„’แ…ฃแ†ผ แ„‡แ…ฎแ†ซแ„‰แ…ฅแ†จแ„Œแ…ตแ„‚แ…ณแ†ผแ„’แ…งแ†ผแ„Œแ…ตแ„‰แ…ฉแ†จแ„‹แ…ฑแ„’แ…งแ†ธแ„€แ…ฉแ†ผแ„€แ…งแ†จ แ„Žแ…ฌแ„‰แ…ตแ†ซแ„ƒแ…ฉแ†ผแ„’แ…ฃแ†ผ แ„‡แ…ฎแ†ซแ„‰แ…ฅแ†จ
แ„Œแ…ตแ„‚แ…ณแ†ผแ„’แ…งแ†ผแ„Œแ…ตแ„‰แ…ฉแ†จแ„‹แ…ฑแ„’แ…งแ†ธแ„€แ…ฉแ†ผแ„€แ…งแ†จ แ„Žแ…ฌแ„‰แ…ตแ†ซแ„ƒแ…ฉแ†ผแ„’แ…ฃแ†ผ แ„‡แ…ฎแ†ซแ„‰แ…ฅแ†จ
ํ•œ์ต ์ฃผ
ย 
์•…์„ฑ์ฝ”๋“œ ๊ฐœ๋ก 
์•…์„ฑ์ฝ”๋“œ ๊ฐœ๋ก  ์•…์„ฑ์ฝ”๋“œ ๊ฐœ๋ก 
์•…์„ฑ์ฝ”๋“œ ๊ฐœ๋ก 
Youngjun Chang
ย 
๋ณด์•ˆ ์œ„ํ˜‘๊ณผ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
๋ณด์•ˆ ์œ„ํ˜‘๊ณผ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•๋ณด์•ˆ ์œ„ํ˜‘๊ณผ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
๋ณด์•ˆ ์œ„ํ˜‘๊ณผ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
Youngjun Chang
ย 
๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ๊ณผ ๋Œ€์‘ ๋ฐฉ์•ˆ
๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ๊ณผ ๋Œ€์‘ ๋ฐฉ์•ˆ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ๊ณผ ๋Œ€์‘ ๋ฐฉ์•ˆ
๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ๊ณผ ๋Œ€์‘ ๋ฐฉ์•ˆ
Youngjun Chang
ย 
๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ๊ณผ ๋Œ€์‘ ๋ฐฉ์•ˆ
๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ๊ณผ ๋Œ€์‘ ๋ฐฉ์•ˆ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ๊ณผ ๋Œ€์‘ ๋ฐฉ์•ˆ
๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ๊ณผ ๋Œ€์‘ ๋ฐฉ์•ˆ
Youngjun Chang
ย 
APT Case Study
APT Case StudyAPT Case Study
APT Case Study
Youngjun Chang
ย 
๋ณด์•ˆ ์œ„ํ˜‘๊ณผ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
๋ณด์•ˆ ์œ„ํ˜‘๊ณผ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•๋ณด์•ˆ ์œ„ํ˜‘๊ณผ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
๋ณด์•ˆ ์œ„ํ˜‘๊ณผ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
Youngjun Chang
ย 
์ •๋ณด๋ณดํ˜ธ์ตœ๊ทผ์ด์Šˆ๋ฐํŒจ๋Ÿฌ๋‹ค์ž„์˜๋ณ€ํ™” ์ž„์ข…์ธ(๊ณ ๋ ค๋Œ€)
์ •๋ณด๋ณดํ˜ธ์ตœ๊ทผ์ด์Šˆ๋ฐํŒจ๋Ÿฌ๋‹ค์ž„์˜๋ณ€ํ™” ์ž„์ข…์ธ(๊ณ ๋ ค๋Œ€)์ •๋ณด๋ณดํ˜ธ์ตœ๊ทผ์ด์Šˆ๋ฐํŒจ๋Ÿฌ๋‹ค์ž„์˜๋ณ€ํ™” ์ž„์ข…์ธ(๊ณ ๋ ค๋Œ€)
์ •๋ณด๋ณดํ˜ธ์ตœ๊ทผ์ด์Šˆ๋ฐํŒจ๋Ÿฌ๋‹ค์ž„์˜๋ณ€ํ™” ์ž„์ข…์ธ(๊ณ ๋ ค๋Œ€)
Kyuhyung Cho
ย 
์ฃผ๊ฐ„ ๋ณด์•ˆ It๋‰ด์Šค 9์›” ๋‹ค์„ฏ์งธ์ฃผ
์ฃผ๊ฐ„ ๋ณด์•ˆ It๋‰ด์Šค 9์›” ๋‹ค์„ฏ์งธ์ฃผ์ฃผ๊ฐ„ ๋ณด์•ˆ It๋‰ด์Šค 9์›” ๋‹ค์„ฏ์งธ์ฃผ
์ฃผ๊ฐ„ ๋ณด์•ˆ It๋‰ด์Šค 9์›” ๋‹ค์„ฏ์งธ์ฃผ
์†Œ๋น„์ž ๋งŒ์กฑ๋„ 1์œ„ ๊ทธ๋ฃน์›จ์–ด,๋‹ค์šฐ์˜คํ”ผ์Šค
ย 

Similar to My cool new Slideshow!2 (20)

Asec report vol.16_kor
Asec report vol.16_korAsec report vol.16_kor
Asec report vol.16_kor
ย 
์•…์„ฑ์ฝ”๋“œ ๋™ํ–ฅ ๋ฐ ๋Œ€์‘ ๋ฐฉ์•ˆ
์•…์„ฑ์ฝ”๋“œ ๋™ํ–ฅ ๋ฐ ๋Œ€์‘ ๋ฐฉ์•ˆ์•…์„ฑ์ฝ”๋“œ ๋™ํ–ฅ ๋ฐ ๋Œ€์‘ ๋ฐฉ์•ˆ
์•…์„ฑ์ฝ”๋“œ ๋™ํ–ฅ ๋ฐ ๋Œ€์‘ ๋ฐฉ์•ˆ
ย 
1. 2009๋…„ ์ƒ๋ฐ˜๊ธฐ ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ
1. 2009๋…„ ์ƒ๋ฐ˜๊ธฐ ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ1. 2009๋…„ ์ƒ๋ฐ˜๊ธฐ ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ
1. 2009๋…„ ์ƒ๋ฐ˜๊ธฐ ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ
ย 
์•…์„ฑ ์ฝ”๋“œ์™€ ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ
์•…์„ฑ ์ฝ”๋“œ์™€ ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ์•…์„ฑ ์ฝ”๋“œ์™€ ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ
์•…์„ฑ ์ฝ”๋“œ์™€ ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ
ย 
์•…์„ฑ์ฝ”๋“œ์™€ ๊ฐœ์ธ ์ •๋ณด ๋ณดํ˜ธ
์•…์„ฑ์ฝ”๋“œ์™€ ๊ฐœ์ธ ์ •๋ณด ๋ณดํ˜ธ์•…์„ฑ์ฝ”๋“œ์™€ ๊ฐœ์ธ ์ •๋ณด ๋ณดํ˜ธ
์•…์„ฑ์ฝ”๋“œ์™€ ๊ฐœ์ธ ์ •๋ณด ๋ณดํ˜ธ
ย 
๋žœ์„ฌ์›จ์–ด vs ์œˆ๋„์šฐ 10
๋žœ์„ฌ์›จ์–ด vs ์œˆ๋„์šฐ 10๋žœ์„ฌ์›จ์–ด vs ์œˆ๋„์šฐ 10
๋žœ์„ฌ์›จ์–ด vs ์œˆ๋„์šฐ 10
ย 
Cybereason in Korea, SMEC
Cybereason in Korea, SMECCybereason in Korea, SMEC
Cybereason in Korea, SMEC
ย 
1.์•…์„ฑ์ฝ”๋“œ ์ตœ์‹  ๋™ํ–ฅ๊ณผ ๊ธฐ๋ฒ•
1.์•…์„ฑ์ฝ”๋“œ ์ตœ์‹  ๋™ํ–ฅ๊ณผ ๊ธฐ๋ฒ•1.์•…์„ฑ์ฝ”๋“œ ์ตœ์‹  ๋™ํ–ฅ๊ณผ ๊ธฐ๋ฒ•
1.์•…์„ฑ์ฝ”๋“œ ์ตœ์‹  ๋™ํ–ฅ๊ณผ ๊ธฐ๋ฒ•
ย 
์†Œํฌ์Šค ์ธํ„ฐ์…‰ํŠธ ์—‘์Šค ์†Œ๊ฐœ (Sophos Intercept X)
์†Œํฌ์Šค ์ธํ„ฐ์…‰ํŠธ ์—‘์Šค ์†Œ๊ฐœ (Sophos Intercept X)์†Œํฌ์Šค ์ธํ„ฐ์…‰ํŠธ ์—‘์Šค ์†Œ๊ฐœ (Sophos Intercept X)
์†Œํฌ์Šค ์ธํ„ฐ์…‰ํŠธ ์—‘์Šค ์†Œ๊ฐœ (Sophos Intercept X)
ย 
ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค๋ฅผ ์ด์šฉํ•œ APT ๋Œ€์‘
ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค๋ฅผ ์ด์šฉํ•œ APT ๋Œ€์‘ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค๋ฅผ ์ด์šฉํ•œ APT ๋Œ€์‘
ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค๋ฅผ ์ด์šฉํ•œ APT ๋Œ€์‘
ย 
๋ณด์•ˆ ์œ„ํ˜‘ ํ˜•ํƒœ์™€ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
๋ณด์•ˆ ์œ„ํ˜‘ ํ˜•ํƒœ์™€ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•๋ณด์•ˆ ์œ„ํ˜‘ ํ˜•ํƒœ์™€ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
๋ณด์•ˆ ์œ„ํ˜‘ ํ˜•ํƒœ์™€ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
ย 
แ„Œแ…ตแ„‚แ…ณแ†ผแ„’แ…งแ†ผแ„Œแ…ตแ„‰แ…ฉแ†จแ„‹แ…ฑแ„’แ…งแ†ธแ„€แ…ฉแ†ผแ„€แ…งแ†จ แ„Žแ…ฌแ„‰แ…ตแ†ซแ„ƒแ…ฉแ†ผแ„’แ…ฃแ†ผ แ„‡แ…ฎแ†ซแ„‰แ…ฅแ†จ
แ„Œแ…ตแ„‚แ…ณแ†ผแ„’แ…งแ†ผแ„Œแ…ตแ„‰แ…ฉแ†จแ„‹แ…ฑแ„’แ…งแ†ธแ„€แ…ฉแ†ผแ„€แ…งแ†จ แ„Žแ…ฌแ„‰แ…ตแ†ซแ„ƒแ…ฉแ†ผแ„’แ…ฃแ†ผ แ„‡แ…ฎแ†ซแ„‰แ…ฅแ†จแ„Œแ…ตแ„‚แ…ณแ†ผแ„’แ…งแ†ผแ„Œแ…ตแ„‰แ…ฉแ†จแ„‹แ…ฑแ„’แ…งแ†ธแ„€แ…ฉแ†ผแ„€แ…งแ†จ แ„Žแ…ฌแ„‰แ…ตแ†ซแ„ƒแ…ฉแ†ผแ„’แ…ฃแ†ผ แ„‡แ…ฎแ†ซแ„‰แ…ฅแ†จ
แ„Œแ…ตแ„‚แ…ณแ†ผแ„’แ…งแ†ผแ„Œแ…ตแ„‰แ…ฉแ†จแ„‹แ…ฑแ„’แ…งแ†ธแ„€แ…ฉแ†ผแ„€แ…งแ†จ แ„Žแ…ฌแ„‰แ…ตแ†ซแ„ƒแ…ฉแ†ผแ„’แ…ฃแ†ผ แ„‡แ…ฎแ†ซแ„‰แ…ฅแ†จ
ย 
์•…์„ฑ์ฝ”๋“œ ๊ฐœ๋ก 
์•…์„ฑ์ฝ”๋“œ ๊ฐœ๋ก  ์•…์„ฑ์ฝ”๋“œ ๊ฐœ๋ก 
์•…์„ฑ์ฝ”๋“œ ๊ฐœ๋ก 
ย 
๋ณด์•ˆ ์œ„ํ˜‘๊ณผ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
๋ณด์•ˆ ์œ„ํ˜‘๊ณผ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•๋ณด์•ˆ ์œ„ํ˜‘๊ณผ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
๋ณด์•ˆ ์œ„ํ˜‘๊ณผ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
ย 
๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ๊ณผ ๋Œ€์‘ ๋ฐฉ์•ˆ
๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ๊ณผ ๋Œ€์‘ ๋ฐฉ์•ˆ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ๊ณผ ๋Œ€์‘ ๋ฐฉ์•ˆ
๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ๊ณผ ๋Œ€์‘ ๋ฐฉ์•ˆ
ย 
๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ๊ณผ ๋Œ€์‘ ๋ฐฉ์•ˆ
๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ๊ณผ ๋Œ€์‘ ๋ฐฉ์•ˆ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ๊ณผ ๋Œ€์‘ ๋ฐฉ์•ˆ
๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ๊ณผ ๋Œ€์‘ ๋ฐฉ์•ˆ
ย 
APT Case Study
APT Case StudyAPT Case Study
APT Case Study
ย 
๋ณด์•ˆ ์œ„ํ˜‘๊ณผ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
๋ณด์•ˆ ์œ„ํ˜‘๊ณผ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•๋ณด์•ˆ ์œ„ํ˜‘๊ณผ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
๋ณด์•ˆ ์œ„ํ˜‘๊ณผ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฒ•
ย 
์ •๋ณด๋ณดํ˜ธ์ตœ๊ทผ์ด์Šˆ๋ฐํŒจ๋Ÿฌ๋‹ค์ž„์˜๋ณ€ํ™” ์ž„์ข…์ธ(๊ณ ๋ ค๋Œ€)
์ •๋ณด๋ณดํ˜ธ์ตœ๊ทผ์ด์Šˆ๋ฐํŒจ๋Ÿฌ๋‹ค์ž„์˜๋ณ€ํ™” ์ž„์ข…์ธ(๊ณ ๋ ค๋Œ€)์ •๋ณด๋ณดํ˜ธ์ตœ๊ทผ์ด์Šˆ๋ฐํŒจ๋Ÿฌ๋‹ค์ž„์˜๋ณ€ํ™” ์ž„์ข…์ธ(๊ณ ๋ ค๋Œ€)
์ •๋ณด๋ณดํ˜ธ์ตœ๊ทผ์ด์Šˆ๋ฐํŒจ๋Ÿฌ๋‹ค์ž„์˜๋ณ€ํ™” ์ž„์ข…์ธ(๊ณ ๋ ค๋Œ€)
ย 
์ฃผ๊ฐ„ ๋ณด์•ˆ It๋‰ด์Šค 9์›” ๋‹ค์„ฏ์งธ์ฃผ
์ฃผ๊ฐ„ ๋ณด์•ˆ It๋‰ด์Šค 9์›” ๋‹ค์„ฏ์งธ์ฃผ์ฃผ๊ฐ„ ๋ณด์•ˆ It๋‰ด์Šค 9์›” ๋‹ค์„ฏ์งธ์ฃผ
์ฃผ๊ฐ„ ๋ณด์•ˆ It๋‰ด์Šค 9์›” ๋‹ค์„ฏ์งธ์ฃผ
ย 

My cool new Slideshow!2

  • 2. ๋ชฉ์ฐจ 1 ์—”๋“œํฌ์ธํŠธ ๋ณด์•ˆ ํ™˜๊ฒฝ์˜ ๋ณ€ํ™” 2 Symantec Endpoint Protection 11.0 ๊ฐœ์š” 3 Symantec Endpoint Protection 11.0 ๊ตฌ์„ฑ์š”์†Œ 4 Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ 5 ๊ธฐ๋Œ€ํšจ๊ณผ : Value 6 ๋ณ„์ฒจ : Why Symantec 2
  • 3. ์—”๋“œํฌ์ธํŠธ ๋ณด์•ˆ ํ™˜๊ฒฝ์˜ ๋ณ€ํ™” ๋ณด์•ˆ ์œ„ํ˜‘์˜ ๋ณ€ํ™” ๋ณด์•ˆ ์œ„ํ˜‘์˜ ์ข…๋ฅ˜๋Š” ๋‚ ๋กœ ๋‹ค์–‘ํ•˜๊ณ  ๊ณ ๋„ํ™” ๋˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ด์— ๋Œ€์‘ํ•˜๊ธฐ ์œ„ํ•œ ๋ณด์•ˆ ์กฐ์น˜์˜ ๋ฐฉํ–ฅ๋„ ๋ณ€ํ™”๋˜๊ณ  ์žˆ๋‹ค. ํŠนํžˆ ๊ธฐ์กด์— ๋„คํŠธ์›Œํฌ ๋ณด์•ˆ๊ธฐ์ˆ  ์œ„์ฃผ์˜ ๋ณด์•ˆ ํˆฌ์ž์˜ ๋ฐฉํ–ฅ์—์„œ ๋ณด์•ˆ ์‚ฌ๊ณ ์˜ ๊ทผ์›์ธ ์—”๋“œํฌ์ธํŠธ์— ๋Œ€ํ•œ ์ง์ ‘์ ์ธ ๋ณด์•ˆ ๊ฐ•ํ™”๋กœ ๊ทธ ๋ฐฉํ–ฅ์ด ๋ฐ”๋€Œ๊ณ  ์žˆ๋‹ค. ๋”ฐ๋ผ์„œ ๊ธฐ์กด์˜ ์—”๋“œํฌ์ธํŠธ ๋ณด์•ˆ๊ธฐ์ˆ ์˜ ๋Œ€๋ช…์‚ฌ์˜€๋˜ ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค์— ๋Œ€ํ•œ ์ธ์‹๋„ ๊ทธ ํ•œ๊ณ„๊ฐ€ ์ ์ฐจ ์ธ์‹๋˜๋ฉด์„œ ์ด๋ฅผ ๊ทน๋ณตํ•  ์ˆ˜ ์žˆ๋Š” ๋Œ€์•ˆ ๊ธฐ์ˆ ๋“ค์ด ์ฃผ๋ชฉ๋ฐ›๊ณ  ์žˆ๋‹ค. (Future of AntiVirus) ๋ฒ”์ฃ„ํ–‰์œ„ ํ”ผ์‹ฑ, ์ œ๋กœ๋ฐ์ด ๊ณต๊ฒฉ ์• ๋“œ์›จ์–ด, ์ŠคํŒŒ์ด์›จ์–ด ๋ด‡ ๊ณต๊ฒฉ ์ŠคํŒธ ๋ฉ”์ผ ์›œ : ์ทจ์•ฝ์  ๊ณต๊ฒฉ, ๋Œ€์šฉ๋Ÿ‰ ๋ฉ”์ผ๋ฐœ์†ก, ๋„คํฌ์›Œํฌ ํŠธ๋ž˜ํ”ฝ ๋ฐœ์ƒ ๋‹จ์ˆœ ํ˜ธ๊ธฐ์‹ฌ ๋ฐ”์ด๋Ÿฌ์Šค ๊ณผ์‹œ๋ชฉ์  : ๊ธฐ์ˆ ๋ ฅ ๊ธˆ์ „์  ๋ชฉ์  1986 2008 Symantec Endpoint Protection 11 3
  • 4. ์ƒˆ๋กœ์šด ์‹ ๊ทœ ์œ„ํ˜‘์˜ ๋“ฑ์žฅ Threat Evolution Timeline Zero Day ๋ฒ”์ฃ„ Phishing Exploits Phishing Explodes IPS (Host) Crimeware & Threats Application Control Spyware & Adware Rootkits Adware Antispyware Spyware Explode On the Rise Device Control types of threats Paid Bots & DDoS Bots Vulnerability IPS (Network) Botnets Attacks Explode Research Spam Tracking Spam Explodes Cookies Antivirus Vulnerabilities Mass Mailing Network Firewall ํ˜ธ๊ธฐ์‹ฌ Openly Discussed Worms Worms Virus Destructive Virus Macro Virus ํ‰ํŒ motivations of attackers ์ด์ต 1986 Symantec Endpoint Protection 11 2006
  • 5. ์—”๋“œํฌ์ธํŠธ ๋ณด์•ˆ ํ™˜๊ฒฝ์˜ ๋ณ€ํ™” ๊ด€๋ฆฌ ํ™˜๊ฒฝ์˜ ๋ณ€ํ™” ๏ฑ IT ๊ด€๋ฆฌ ํ™˜๊ฒฝ์˜ ๋ณต์žก์„ฑ ์ฆ๊ฐ€ โ€“ ์ „ํ†ต์ ์ธ ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ์ œํ’ˆ ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ํŒจ์น˜๊ด€๋ฆฌ ์†”๋ฃจ์…˜, PC ๋ฐฉํ™”๋ฒฝ, ๋งค์ฒด์ œ์–ด ์†”๋ฃจ์…˜ ๋“ฑ ์ง„ํ™”ํ•˜๋Š” ๋ณด์•ˆ์œ„ํ˜‘์— ๋Œ€์‘ํ•˜๊ธฐ ์œ„ํ•ด ๊ฐœ๋ณ„ ๋ณด์•ˆ์†”๋ฃจ์…˜์˜ ์ง€์†์ ์ธ ๋„์ž…์œผ๋กœ ๋‹ค์–‘ํ•œ ์ œํ’ˆ์— ๋Œ€ํ•œ ์ •์ฑ…๊ด€๋ฆฌ ๋ฐ ์šด์˜์˜ ๋ณต์žก์„ฑ ์ฆ๊ฐ€ ๏ฑ ๊ด€๋ฆฌ/์†Œ์œ  ๋น„์šฉ์˜ ์ฆ๊ฐ€ โ€“ ์ƒˆ๋กœ์šด ๋ณด์•ˆ ์œ„ํ˜‘์ด ์ถœํ˜„ํ• ๋•Œ๋งˆ๋‹ค ๊ทธ๋ฅผ ์œ„ํ•œ ๊ฐœ๋ณ„ ์†”๋ฃจ์…˜์„ ์ง€์†์ ์œผ๋กœ ๋„์ž…ํ•จ์œผ๋กœ์จ ๋ณด์•ˆ ์†”๋ฃจ์…˜ ๋„์ž…๋น„์šฉ์ด ์ง€์†์ ์œผ๋กœ ์ฆ๊ฐ€ํ•˜๊ณ  ๋˜ํ•œ ๊ทธ๋ฅผ ๊ด€๋ฆฌํ•˜๊ธฐ ์œ„ํ•œ ์šด์˜/์œ ์ง€ ๋น„์šฉ ๋ฐ ๊ด€๋ฆฌ ์ธ๋ ฅ์ด ์ง€์†์ ์œผ๋กœ ์ฆ๊ฐ€ํ•ด์•ผ ํ•˜๋Š” ์•…์ˆœํ™˜ ๏ฑ ๊ธฐ์กด ๋ณด์•ˆ์†”๋ฃจ์…˜์˜ ๊ธฐ์ˆ ์  ํ•œ๊ณ„ โ€“ ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ๋„์ž… ๊ณ ๊ฐ์ด ์ „์ฒด์˜ 99%๋ฅผ ์ฐจ์ง€ํ•จ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ์ง€์†์ ์œผ๋กœ ๋ฐ”์ด๋Ÿฌ์Šค ์‚ฌ๊ณ ๊ฐ€ ๋ฐœ์ƒํ•˜๋ฉฐ 68%์˜ ๊ธฐ์—…์ด ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค๋ฅผ ์‚ฌ์šฉํ•จ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ๋ณด์•ˆ์‚ฌ๊ณ ๊ฐ€ ๋Š์ด์ง€ ์•Š์Œ. ๋”ฐ๋ผ์„œ ์ด๋ฅผ ๊ทน๋ณตํ•  ๋Œ€์•ˆ๊ธฐ์ˆ ์ด ํ•„์š”ํ•จ. ๋ณต์žก์„ฑ ์ฆ๊ฐ€ ๋น„์šฉ์ฆ๊ฐ€ ์‚ฌ์šฉ์ž ๋‹จ๋ง ์ œ์–ด ๊ธฐ๋Šฅ ๋ถ€์žฌ ๋น„ ํšจ์œจ์„ฑ Symantec Endpoint Protection 11 5
  • 6. Symantec Endpoint Protection 11.0 ๊ฐœ์š” SEP 11.0 ๊ฐœ์š” Symantec Endpoint Protection์€ ๊ธฐ์กด์˜ Symantec AntiVirus ์ œํ’ˆ์„ ํš๊ธฐ์ ์œผ๋กœ ๊ฐœ์„ ํ•จ๊ณผ ๋™์‹œ์— ์—…๊ณ„ ๋ฆฌ๋”์˜ ๊ฐ ์†”๋ฃจ์…˜์˜ ์ธ์ˆ˜ํ•ฉ๋ณ‘์„ ํ†ตํ•ด ๊ฐ–์ถ˜ ๊ฐ ํฌ์ธํŠธ ๊ธฐ์ˆ ์„ ํ•˜๋‚˜์˜ ์ œํ’ˆ์œผ๋กœ ํ†ตํ•ฉํ•จ์œผ๋กœ์จ ๋ณด์•ˆ์„ฑ ํ–ฅ์ƒ๊ณผ ๊ด€๋ฆฌ์˜ ๋‹จ์ˆœํ™”๋ฅผ ์ด๋ฃธ. โ€ข Network Access Control โ€“ ๊ธฐ๋Šฅ ํฌํ•จ ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ ์ œ์–ด โ€ข Agent์— ํฌํ•จ, ๋ณ„๋„์˜ Agent ์„ค์น˜๊ฐ€ ๋ถˆํ•„์š” (NAC) โ€ข ๋ณ„๋„์˜ ์˜ต์…˜์ด๋ฉฐ ์ถ”๊ฐ€ ๊ตฌ๋งคํ•˜์—ฌ์•ผ ํ•จ โ€ข Endpoint ๋งค์ฒด ์ œ์–ด๋ฅผ ํ†ตํ•œ ์ •๋ณด ์œ ์ถœ ๋ฐฉ์ง€ - USB ๋งค์ฒด ์ œ์–ด ๋“œ๋ผ์ด๋ธŒ, MP3, CD-RW๋“ฑ ์— ๋Œ€ํ•œ ์ œ์–ด Symantec Endpoint โ€ข ์นจ์ž… ํƒ์ง€ ๋ฐ ์ฐจ๋‹จ ์†”๋ฃจ์…˜์ธ NIPS(๋„คํŠธ์›Œํฌ) ์™€ HIPS Protection ์นจ์ž… ํƒ์ง€ (ํ˜ธ์ŠคํŠธ)์˜ ํ†ตํ•ฉ โ€ข ์—…๊ณ„ ์ตœ๊ณ ์˜ Endpoint ๋ฐฉํ™”๋ฒฝ ๊ธฐ์ˆ  ์ž…์ฆ - Gartner MQ โ€œLeaderโ€ โ€“ 4๋…„ ์—ฐ์† ๋ฐฉํ™”๋ฒฝ โ€ข ์œ„์น˜์— ๋”ฐ๋ฅธ ์ •์ฑ… ์ ์šฉ ๊ฐ€๋Šฅ โ€ข ์—…๊ณ„ ์ตœ๊ณ ์˜ Rootkit ํƒ์ง€ ๋ฐ ์ œ๊ฑฐ ๊ธฐ์ˆ  ์•ˆํ‹ฐ์ŠคํŒŒ์ด์›จ์–ด โ€ข ์ปค๋„(Kernel) ๋ ˆ๋ฒจ๋‹จ์˜ ๊ฒ€์ƒ‰ ๊ธฐ์ˆ  Single Agent โ€ข ์„ธ๊ณ„ ์„ ๋‘ ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ์†”๋ฃจ์…˜ ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค โ€ข 43ํšŒ ์—ฐ์† VB 100 ์ˆ˜์ƒ(2009๋…„ 4์›” ๊นŒ์ง€) Symantec Endpoint Protection 11 6
  • 7. Symantec Endpoint Protection 11.0 ๊ฐœ์š” SEP 11.0 ๊ฐœ์š” Symantec Endpoint Protection์€ ํ•˜๋‚˜์˜ ์—์ด์ „ํŠธ์— Symantec AntiVirus ๊ธฐ๋Šฅ๊ณผ ์ตœ์‹  ์œ„ํ˜‘ ์ฐจ๋‹จ ๊ธฐ๋Šฅ์„ ์กฐํ•ฉํ•จ ์œผ๋กœ์จ ๋…ธํŠธ๋ถ, ๋ฐ์Šคํฌํƒ‘, ์„œ๋ฒ„๋ฅผ ๋Œ€์ƒ์œผ๋กœ ํ•˜๋Š” ์•…์„ฑ ํ”„๋กœ๊ทธ๋žจ์„ ํšจ๊ณผ์ ์œผ๋กœ ์ฐจ๋‹จํ•˜๋Š” ํ˜์‹ ์ ์ธ ์†”๋ฃจ์…˜. Symantec Endpoint Protection์€ ์—…๊ณ„ ์„ ๋‘๋กœ ์ธ์ •๋ฐ›์•„์˜จ ๊ฐ ๋ถ„์•ผ์˜ ๋‹ค์–‘ํ•œ ๋ณด์•ˆ๊ธฐ์ˆ ๋“ค์„ ๋‹จ์ผ ์ œํ’ˆ๋‚ด์— ํ†ตํ•ฉํ•จ ์œผ๋กœ์จ ๊ธฐ์—… ๊ณ ๊ฐ์— 3๋Œ€ ๊ฐ€์น˜(๋ณด์•ˆ์„ฑ, ๋‹จ์ˆœ์„ฑ, ์œ ์—ฐ์„ฑ) ์ œ๊ณต Symantec Endpoint Protection 11.0 ๋ณด์•ˆ์„ฑ ๋‹จ์ˆœ์„ฑ ์œ ์—ฐ์„ฑ ํฌ๊ด„์ ์ธ ์—”ํŠธํฌ์ธํŠธ ๋ณดํ˜ธ ๋‹จ์ผ ๊ด€๋ฆฌ์ฝ˜์†”, ๋‹จ์ผ ์—์ด์ „ํŠธ ๊ธฐ์กด ํ™˜๊ฒฝ๊ณผ์˜ ์œ ์—ฐํ•œ ํ†ตํ•ฉ์ง€์› ๏ƒ˜๋‹จ์ˆœํ•œ ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ์ œํ’ˆ, ๊ทธ์ด์ƒ ๏ƒ˜์ค‘์•™ ์ง‘์ค‘์  ๊ด€๋ฆฌ ๏ƒ˜๋‹จ์ผ ์—์ด์ „ํŠธ/๋‹จ์ผ ์ฝ˜์†” ๏ƒ˜์ „๋ก€์—†๋Š” ์ˆ˜์ค€์˜ ๋ณดํ˜ธ ๋ฒ”์œ„ ๏ƒ˜ํŽธ๋ฆฌํ•œ ๊ตฌ์ถ• ๋ฐ ๊ด€๋ฆฌ ๏ƒ˜๊ด€๋ฆฌ ์˜ค๋ฒ„ํ—ค๋“œ์˜ ์ ˆ๊ฐ ๏ƒ˜์‹œ๋งŒํ… ๊ธ€๋กœ๋ฒŒ ์ธํ…”๋ฆฌ์ „์Šค ๏ƒ˜ํฌ๊ด„์ ์ธ ์—”ํŠธํฌ์ธํŠธ ๊ฐ€์‹œ์„ฑ ๏ƒ˜์œ ์—ฐํ•œ ์•„ํ‚คํ…์ณ ๋„คํŠธ์›Œํฌ ๏ƒ˜์ž๋™ ๋ณด์•ˆ ์—…๋ฐ์ดํŠธ ๏ƒ˜๊ธฐ์กด ๋ณด์•ˆ/IT ๊ธฐ์ˆ ์˜ ํ™œ์šฉ๋„ ๊ฐœ์„  ๏ƒ˜๋น„์šฉ์˜ ์ ˆ๊ฐ ๏ƒ˜Symantec NAC ์˜ต์…˜ Symantec Endpoint Protection 11 7
  • 8. Symantec Endpoint Protection 11.0 ๊ตฌ์„ฑ์š”์†Œ SEP 11.0 ๊ตฌ์„ฑ์š”์†Œ : Symantec Endpoint Protection์€ ํฌ๊ฒŒ ์ •์ฑ…๊ด€๋ฆฌ ์„œ๋ฒ„์™€ ๋ฐ์ดํƒ€๋ฒ ์ด์Šค ๊ทธ๋ฆฌ๊ณ  ์‹ค์ œ ๋ณด์•ˆ๊ธฐ๋Šฅ์„ ์ˆ˜ํ–‰ํ•˜๋Š” ์—์ด์ „ํŠธ๋กœ ๊ตฌ์„ฑ๋œ๋‹ค. ์„œ๋ฒ„๊ตฐ ์ •์ฑ…๊ด€๋ฆฌ์„œ๋ฒ„ ๋ฐ ๋ฐ์ดํƒ€ ๋ฒ ์ด์Šค Symantec Enterprise Protection Manager(SEPM) ์ •์ฑ…๊ด€๋ฆฌ, ๋ชจ๋‹ˆํ„ฐ๋ง, ์—…๋ฐ์ดํŠธ ๊ด€๋ฆฌ ๋“ฑ 10101010 10101010 Database Server 1010101 10101010 -์ž„๋ฒ ๋””๋“œ DB(Sybase) : 1,000 ์‚ฌ์šฉ์ž ๋ฏธ๋งŒ 1010101 -MS-SQL 2000/2005 : 1,000 ์‚ฌ์šฉ์ž ์ด์ƒ ์—์ด์ „ํŠธ ์—์ด์ „ํŠธ SEP Client - ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค, ์•ˆํ‹ฐ์ŠคํŒŒ์ด์›จ์–ด - ๋ฐฉํ™”๋ฒฝ - ์‚ฌ์ „๋ฐฉ์—ญ๊ธฐ๋Šฅ - ์นจ์ž…๋ฐฉ์ง€ ๊ธฐ๋Šฅ - ๋งค์ฒด์ œ์–ด - ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ์ œ์–ด ๋“ฑ. Symantec Endpoint Protection 11 8
  • 9. Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ๊ธฐ๋Šฅ Symantec Endpoint Protection์˜ ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ๊ธฐ๋Šฅ์€ ๊ธ€๋กœ๋ฒŒ Leader์˜ ์ œํ’ˆ์ธ Symantec AntiVirus๋ฅผ ํ†ตํ•ฉํ•˜์—ฌ ๋†’์€ ํƒ์ง€์œจ๊ณผ ์‹œ์Šคํ…œ ์•ˆ์ •์„ฑ์„ ๋ณด์žฅํ•˜์—ฌ, ํŠนํžˆ ๊ธฐ์กด ์—”์ง„์„ ๊ฐœ์„ ํ•˜์—ฌ ์‹œ์Šคํ…œ ๋ถ€ํ•˜๋ฅผ ํš๊ธฐ์ ์œผ๋กœ ์ค„์—ฌ์„œ ๋†’์€ ํƒ์ง€์œจ์„ ๊ฐ€๋ฒผ์šด ์—”์ง„์œผ๋กœ ์ œ๊ณตํ•จ. โ€“ ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ์‹œ์žฅ์„ ์„ ๋„ํ•˜๋Š” ๊ธฐ์ˆ  โ€“ VB100 Award 43ํšŒ ์—ฐ์† ์ˆ˜์ƒ (09๋…„04์›” ํ˜„์žฌ) Virus Bulletin โ€“ Feb 2007 Symantec Endpoint Protection 11 9
  • 10. Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ ์•ˆํ‹ฐ์ŠคํŒŒ์ด์›จ์–ด ๊ธฐ๋Šฅ Symantec Endpoint Protection์˜ ์•ˆํ‹ฐ์ŠคํŒŒ์›จ์–ด ๊ธฐ๋Šฅ์€ ๊ธฐ์กด ๋ฒ„์ „์˜ ๊ธฐ๋Šฅ์—์„œ Rootkit์— ๋Œ€ํ•œ ํƒ์ง€, ์ œ๊ฑฐ ๊ธฐ๋Šฅ์„ ํฌ๊ฒŒ ๊ฐ•ํ™”ํ•˜์˜€์Œ. ํŠนํžˆ ์ตœ๊ทผ์˜ Rootkit์€ ๊ทธ ์กด์žฌ๋ฅผ ์€ํํ•˜๊ธฐ ์œ„ํ•ด Kernel Level์—์„œ ๋™์ž‘ํ•˜์—ฌ ํŒŒ์ผ ์‹œ์Šคํ…œ์„ ๊ฐ์‹œํ•˜๋Š” ๊ธฐ์กด ์•ˆํ‹ฐ์ŠคํŒŒ์ด์›จ์–ด ๊ธฐ์ˆ ๋กœ๋Š” ํƒ์ง€ ๋ฐ ์ œ๊ฑฐ๊ฐ€ ๋ถˆ๊ฐ€๋Šฅํ•จ. ํ•˜์ง€๋งŒ SEP 11.0์—์„œ๋Š” ๊ธฐ์กด Veritas์˜ VxMS ๊ธฐ์ˆ ์„ ์ ‘๋ชฉํ•˜์—ฌ ํ•˜๋“œ๋“œ๋ผ์ด๋ธŒ์˜ ์„นํ„ฐ ๋ฐ์ดํƒ€(Sector Data)๋ฅผ ์ง์ ‘ ์ ‘๊ทผํ•˜์—ฌ ์•…์„ฑ Rootkit์„ ์ œ๊ฑฐ ํ•จ. โ€“ VxMS ๊ธฐ์ˆ ์„ ์ด์šฉํ•œ Kernel Lever Rootkit ์ œ๊ฑฐ โ€“ Thompson Security Lab ํ…Œ์ŠคํŠธ ๊ฒฐ๊ณผ(Sep, 2006) โ€ข ์—ฌ๋Ÿฌ ์ œํ’ˆ์ค‘์— ์œ ์ผํ•˜๊ฒŒ 20๊ฐœ Rootkit ๋ชจ๋‘ ํƒ์ง€ โ€ข ์น˜๋ฃŒ ๊ฐœ์ˆ˜ ๋˜ํ•œ ๊ฒฝ์Ÿ์‚ฌ ๋Œ€๋น„ ๊ฑฐ์˜ 2๋ฐฐ์ˆ˜ ๊ธฐ๋ก Source: Thompson Cyber Security Labs, August 2006 Symantec Endpoint Protection 11 10
  • 11. Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ ๋ฐฉํ™”๋ฒฝ ๊ธฐ๋Šฅ ๋ฐฉํ™”๋ฒฝ ๊ธฐ๋Šฅ์˜ ๋ชจ๋“  ๋ฐฉํ™”๋ฒฝ ์ •์ฑ…์€ ๊ฐœ์ธ ์‚ฌ์šฉ์ž๊ด€๋ฆฌ๊ฐ€ ์•„๋‹Œ ์ค‘์•™ ์„œ๋ฒ„์—์„œ ์ •์ฑ… ๊ด€๋ฆฌ๊ฐ€ ์ด๋ฃจ์–ด ์ง€๋ฉฐ ์ •์ฑ… ์ ์šฉ ์‹œ ๋ชจ๋“  ์‚ฌ์šฉ์ž PC๋กœ ์ผ๊ด„ ๋ฐฐํฌ ๋ฉ๋‹ˆ๋‹ค. ํŠนํžˆ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ธฐ๋ฐ˜์˜ ๋ฐฉํ™”๋ฒฝ ์ •์ฑ…(์˜ˆ:e๋™ํ‚คP2P ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ธˆ์ง€) ์„ค์ •์œผ๋กœ ๊ด€๋ฆฌ์ž๊ฐ€ ์‰ฝ๊ฒŒ PC์˜ ๋ฐฉํ™”๋ฒฝ ์ •์ฑ…์„ ์„ค์ • ๊ฐ€๋Šฅ โ€“ ๊ฐ€์žฅ ๊ฐ€๋ณ๊ณ  ๊ฐ€์žฅ ๊ฐ•๋ ฅํ•œ ๋ฐฉํ™”๋ฒฝ ์—”์ง„ (By Gartner MQ Report) โ€“ 4๋…„ ์—ฐ์† Gartner MQ Report Leader ํ‰๊ฐ€ โ€“ ์ง๊ด€์ ์ธ ์ •์ฑ…์„ค์ • ์ธํ„ฐํŽ˜์ด์Šค๋กœ ์†์‰ฌ์šด ๊ด€๋ฆฌ โ€“ Sygate NAC Agent์˜ ๋ฐฉํ™”๋ฒฝ ๋ชจ๋“ˆ ์ฑ„์šฉ Application+Host+์„œ๋น„์Šค+์‹œ๊ฐ„+์ธํ„ฐํŽ˜์ด์Šค ์กฐ๊ฑด์„ ๋ณตํ•ฉ์ ์œผ๋กœ ์„ค์ • SEPM F/W Policy ๊ด€๋ฆฌ/๋ฐฐํฌ Central Management F/W ์ •์ฑ… ํ–ฅ์ƒ๋œ Application Centric ๊ธฐ๋ฐ˜ Firewall Rule ์ƒ์„ฑ ์ง€์› Symantec Endpoint Protection 11 11
  • 12. Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ ๋ฐฉํ™”๋ฒฝ ๊ธฐ๋Šฅ ๋ฐฉํ™”๋ฒฝ ์ •์ฑ… ์„ค์ •์€ ๋‹ค์–‘ํ•œ ์„ ํƒ์‚ฌํ•ญ์„ ํ†ตํ•ด ๊ด€๋ฆฌ์ž๊ฐ€ ์›ํ•˜๋Š” ์ˆ˜์ค€์„ ์ถฉ์กฑํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ URL ์ฐจ๋‹จ์„ ํ†ตํ•ด ์œ ํ•ด ์‹ธ์ดํŠธ ์ฐจ๋‹จ ๋˜๋Š” ์‹œ๊ฐ„ ์„ค์ •์„ ํ†ตํ•ด ์ •์ฑ…์ด ์ž๋™์œผ๋กœ ์‹œ๊ฐ„์— ๋”ฐ๋ผ Enable / Disable ๋  ์ˆ˜ ์žˆ์Œ. ๋˜ํ•œ ์ด๋Ÿฌํ•œ ๋ฐฉํ™”๋ฒฝ ๊ธฐ๋Šฅ์€ ์‹œ์Šคํ…œ ๋ถ€ํ•˜๋ฅผ ๊ฑฐ์˜ ์ฃผ์ง€ ์•Š์Œ. ๊ตฌ๋ถ„ ์„ค ๋ช… ๋ฒˆํ˜ธ ๊ทœ์น™์˜๋ฒˆํ˜ธ ์‹คํ–‰๋จ ํ™•์ธ๋ž€์„ ์ฒดํฌํ•˜๋ฉด ๊ทœ์น™์„ ์‹คํ–‰ํ•˜๊ณ , ์ฒดํฌ๋ฅผ ์ทจ์†Œํ•˜๋ฉด ๊ทœ์น™์‹คํ–‰์„ ์ค‘์ง€ ์ด๋ฆ„ ๊ทœ์น™์˜ ์ด๋ฆ„ ์‹ฌ๊ฐ๋„ ๊ทœ์น™์ด ์‹คํŒจํ•œ ๊ฒฝ์šฐ์˜ ์‹ฌ๊ฐ๋„. 0 ~ 15 ์‚ฌ์ด ๊ฐ’์œผ๋กœ ์„ค์ •. ๋กœ๊ทธ์— ์‚ฌ์šฉ๋จ ์‘์šฉํ”„๋กœ๊ทธ๋žจ ๊ทœ์น™์„ ์‹คํ–‰ํ•˜๋Š” ์‘์šฉํ”„๋กœ๊ทธ๋žจ. ์‘์šฉํ”„๋กœ๊ทธ๋žจ์ด ํƒ์ง€๋˜๋ฉด ๊ทœ์น™์ด ์ ์šฉ๋จ ์‹œ๊ฐ„ ๊ทœ์น™์ด ํ™œ์„ฑํ™” ๋˜๊ฑฐ๋‚˜ ๋น„ํ™œ์„ฑํ™”๋˜๋Š” ๊ธฐ๊ฐ„ ์„œ๋น„์Šค ๋ฐฉํ™”๋ฒฝ ๊ทœ์น™์„ ์‹คํ–‰ํ•˜๋Š” ์„œ๋น„์Šค ์ธํ„ฐํŽ˜์ด์Šค ๋ชจ๋“  ์–ด๋Œ‘ํ„ฐ, ์ž„์˜์˜ VPN, ์ „ํ™”์ ‘์†, ์ด๋”๋„ท, ๋ฌด์„  ๋“ฑ์˜ ๋ฐฉํ™”๋ฒฝ ๊ทœ์น™์„ ์‹คํ–‰ํ•˜๋Š” ์–ด๋Œ‘ํ„ฐ ํ™”๋ฉด๋ณดํ˜ธ๊ธฐ ํ™”๋ฉด๋ณดํ˜ธ๊ธฐ ์ƒํƒœ[์ผœ์ง], [๊บผ์ง]์€ ๊ทœ์น™์— ์˜ํ–ฅ์„ ์คŒ. [๋ชจ๋‘]๋Š” ๊ทœ์น™์— ์˜ํ•ญ์„ ์ฃผ์ง€ ์•Š์Œ. ์ž‘์—… ํ—ˆ์šฉ โ€“ ํŒจํ‚ท์„ ํ—ˆ์šฉ, ์ค‘๋‹จ-ํŒจํ‚ท์ „์†ก์„ ์ค‘๋‹จ, ์งˆ์˜-์‚ฌ์šฉ์ž๊ฐ€ ํŒจํ‚ท์„ ํ—ˆ์šฉํ• ์ง€ ์ค‘๋‹จํ• ์ง€ ๋ฌผ์Œ ์ถ”์  ๊ทœ์น™์— ๋Œ€ํ•œ ์ •๋ณด๋ฅผ ๋กœ๊ทธ์— ๊ธฐ๋กํ•˜๊ฑฐ๋‚˜ ์ด๋ฉ”์ผ ์•Œ๋ฆผ์„ ๋ณด๋ƒ„ ์ƒ์„ฑ๋œ ์œ„์น˜ ๊ทœ์น™์ด ์ž‘์„ฑ๋œ ์œ„์น˜(์ •์ฑ… ๊ด€๋ฆฌ์ž๋‚˜ ๊ทธ๋ฃน์ด๋‚˜ ์œ„์น˜์ˆ˜์ค€) ์„ค๋ช… ๊ทœ์น™์˜ ์ž‘๋™ ๋ฐฉ๋ฒ• ๋“ฑ ๊ทœ์น™์— ๋Œ€ํ•œ ์ •๋ณด Symantec Endpoint Protection 11 12
  • 13. Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ ์นจ์ž…๋ฐฉ์ง€(IPS) ๊ธฐ๋Šฅ Symantec Endpoint Protection์˜ ์นจ์ž…๋ฐฉ์ง€๊ธฐ๋Šฅ์€ Symantec์ด ๊ธฐ์กด์— ๋ณด์œ ํ•˜๊ณ  ์žˆ๋˜ ๋„คํŠธ์›Œํฌ๊ธฐ๋ฐ˜ IPS ๊ธฐ์ˆ ๊ณผ ํ˜ธ์ŠคํŠธ IPS๊ธฐ์ˆ ์„ ์ ‘๋ชฉํ•˜์˜€์Œ. ๊ฒŒ๋‹ค๊ฐ€ ์ œ๋กœ๋ฐ์ด ๊ณต๊ฒฉ์— ๋Œ€ํ•œ ๋Œ€์•ˆ ๊ธฐ์ˆ ์„ ์ œ๊ณตํ•จ์œผ๋กœ์จ ์‹ ์ข… ์›œ ๊ณต๊ฒฉ์— ํšจ๊ณผ์ ์œผ๋กœ ๋Œ€์‘ ํ•  ์ˆ˜ ์žˆ์Œ. ์นจ์ž…๋ฐฉ์ง€๊ธฐ๋Šฅ(IPS) ๋„คํŠธ์›Œํฌ๊ธฐ๋ฐ˜ IPS ๊ธฐ์ˆ  ํ˜ธ์ŠคํŠธ๊ธฐ๋ฐ˜ IPS ๊ธฐ์ˆ  ์ทจ์•ฝ์„ฑ ๊ธฐ๋ฐ˜ ์‚ฌ์ „๋ฐฉ์—ญ ํ–‰๋™๊ธฐ๋ฐ˜ ์‚ฌ์ „๋ฐฉ์—ญ Generic Exploit Blocking (Sigs for vulnerability) (Whole Security-SONAR) Proactive Threat Scan ์‹œ๊ทธ๋„ˆ์ณ ๊ธฐ๋ฐ˜ IPS ์ •์ฑ…๊ธฐ๋ฐ˜ ์นจ์ž…์ฐจ๋‹จ Deep packet inspection Application Control (SNORT-like) Symantec Endpoint Protection 11 13
  • 14. Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ ์‚ฌ์ „ ๋ฐฉ์—ญ ๊ธฐ๋Šฅ : ํ–‰๋™๊ธฐ๋ฐ˜ Symantec Endpoint Protection๋Š” ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ๋ฐ ๊ธฐ์กด IPS ๋“ฑ ์‹œ๊ทธ๋„ˆ์ณ ๊ธฐ๋ฐ˜์˜ ์•Œ๋ ค์ง„ ๊ณต๊ฒฉ ์œ„์ฃผ๋กœ ๋ณดํ˜ธํ•˜๋Š” ๊ธฐ์ˆ ์„ ๋„˜์–ด์„œ ํ–‰๋™๊ธฐ๋ฐ˜ ๋˜๋Š” ์ทจ์•ฝ์„ฑ ๊ธฐ๋ฐ˜ ์ฐจ๋‹จ๋ฐฉ์‹์„ ํ†ตํ•ด ์ œ๋กœ๋ฐ์ด ์›œ๊ณต๊ฒฉ๊ณผ ๊ฐ™์€ ์‹ ์ข… ์œ„ํ˜‘์— ํšจ๊ณผ์ ์œผ๋กœ ๋Œ€์ฒ˜ํ•จ. Application Behabior Data ํ–‰๋™๊ธฐ๋ฐ˜ ์‚ฌ์ „๋ฐฉ์—ญ๊ธฐ๋Šฅ Proactive Threat Scan OS ๋ฉ”๋ชจ๋ฆฌ Devices - ํ–‰๋™๊ธฐ๋ฐ˜ ์‚ฌ์ „๋ฐฉ์—ญ ๊ธฐ์ˆ ์˜ Leader ์ธ Whole Security์‚ฌ๋ฅผ ์ธ์ˆ˜ - ์‹œ์Šคํ…œ ๋ฉ”๋ชจ๋ฆฌ์— ๋กœ๋“œ ๋˜๋Š” ํ”„๋กœ์„ธ์Šค์˜ ํ–‰์œ„ ๊ฐ์‹œ - ๋ฉ”๋ชจ๋ฆฌ ์ƒ์ฃผ ํ”„๋กœ์„ธ์Šค์— ๋Œ€ํ•ด์„œ ์ˆ˜๋ฐฑ๊ฐœ์˜ ํƒ์ง€๋ชจ๋“ˆ์„ ์ด์šฉํ•˜์—ฌ ์ •์ƒ(Valid) ๋˜๋Š” ์•…์„ฑ(Malicious) ํ”„๋กœ์„ธ์Šค๋กœ ๊ตฌ๋ถ„ ์•…์„ฑ์ฝ”๋“œ ํƒ์ง€๋ชจ๋“ˆ - ์‹ค์ œ ์ œ๋กœ๋ฐ์ด ํƒ์ง€์‚ฌ๋ก€ : Sasser-d, Mytob-bd, Sober-F ๋“ฑ ๋‹ค์ˆ˜ ๋ชจ๋“ˆA ๋ชจ๋“ˆB ๋ชจ๋“ˆC ๋ชจ๋“ˆD - ์˜คํƒ์œจ 0.005% No False 16M Installations Alarm ์Šค์ฝ”์–ด๋ง ์•Œ๊ณ ๋ฆฌ์ฆ˜ False Alarms Only 20 False Positives for every 1 Million PCโ€™s Symantec Endpoint Protection 11 14
  • 15. Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ ์‚ฌ์ „ ๋ฐฉ์—ญ ๊ธฐ๋Šฅ : ์ทจ์•ฝ์„ฑ ๊ธฐ๋ฐ˜ Symantec Endpoint Protection๋Š” ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ๋ฐ ๊ธฐ์กด IPS ๋“ฑ ์‹œ๊ทธ๋„ˆ์ณ ๊ธฐ๋ฐ˜์˜ ์•Œ๋ ค์ง„ ๊ณต๊ฒฉ ์œ„์ฃผ๋กœ ๋ณดํ˜ธํ•˜๋Š” ๊ธฐ์ˆ ์„ ๋„˜์–ด์„œ ํ–‰๋™๊ธฐ๋ฐ˜ ๋˜๋Š” ์ทจ์•ฝ์„ฑ ๊ธฐ๋ฐ˜ ์ฐจ๋‹จ๋ฐฉ์‹์„ ํ†ตํ•ด ์ œ๋กœ๋ฐ์ด ์›œ๊ณต๊ฒฉ๊ณผ ๊ฐ™์€ ์‹ ์ข… ์œ„ํ˜‘์— ํšจ๊ณผ์ ์œผ๋กœ ๋Œ€์ฒ˜ํ•จ. - OS ๋ฐ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ์ทจ์•ฝ์„ฑ์ด ๋ฐœ๊ฒฌ๋œ ํ›„ ์ ์  ๋” ๋นจ๋ผ์ง€๋Š” ์•…์„ฑ์ฝ”๋“œ์˜ ์ทจ์•ฝ์„ฑ ๊ธฐ๋ฐ˜ ์‚ฌ์ „๋ฐฉ์—ญ๊ธฐ๋Šฅ ์ถœํ˜„์— ๋Œ€์‘ํ•˜๊ธฐ ์œ„ํ•œ ์ˆ˜๋‹จ (Generic Exploit Blocking โ€“ GEB ๋ฐ ์‹œ๊ทธ๋„ˆ์ฒ˜ Generic Exploit Blocking(GEB) ๊ธฐ๋ฐ˜์˜ IDS) - ์ทจ์•ฝ์„ฑ์ด ๋ฐœ๊ฒฌ๋˜๋ฉด ๊ทธ ์ทจ์•ฝ์„ฑ์„ ์•…์šฉํ•˜๋Š” ๊ณต๊ฒฉํ–‰์œ„์— ๋Œ€ํ•œ ํƒ์ง€ ๊ธฐ๋ฒ• ์ œ๊ณต - ์ทจ์•ฝ์„ฑ์„ ๊ฐ€์ง„ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜/์„œ๋น„์Šค์— ๋Œ€ํ•œ ๋ฒ„ํผ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ ์‹œ๋„ ๋“ฑ์„ ํƒ์ง€/์ฐจ๋‹จ Custom Sig Engine Signature IDS RCP SMTP SMTP RCP GEB SSH SSH HTTP IM IM FTP HTTP FTP Symantec Endpoint Protection 11 15
  • 16. Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ ๋งค์ฒด ์ œ์–ด Symantec Endpoint Protection์˜ ๋งค์ฒด์ œ์–ด๋Š” ์žฅ์น˜๋ณ„ Class ID๊ฐ’์„ ์ด์šฉํ•˜์—ฌ, ๋งค์ฒด๋ฅผ ์ฐจ๋‹จํ•˜๊ฑฐ๋‚˜ ํ—ˆ์šฉํ•  ์ˆ˜ ์žˆ๊ณ , ๋˜ํ•œ ๋งค์ฒด๋ณ„ Read / Write๊ถŒํ•œ ์ œ์–ด๋ฅผ ์ˆ˜ํ–‰ ํ•  ์ˆ˜ ์žˆ์Œ. โ€“ USB, Floppy, 1394, IDE, Tape, CD/DVD, ํ”„๋ฆฐํŠธ ์žฅ๋น„, PCMCIA, ์ด๋ฏธ์ง• ์žฅ๋น„(์Šค์บ๋„ˆ, ๋””์ง€ํ„ธ์นด๋ฉ”๋ผ ๋“ฑ), ์ ์™ธ์„ ์žฅ๋น„, ๋ธ”๋ฃจํˆฌ์Šค ๋“ฑ ๋ฌด์„ ์žฅ๋น„, SCSI, ๋ชจ๋Ž€, ์Šค๋งˆํŠธ์นด๋“œ ๋ฆฌ๋”, ์Šคํ† ๋ฆฌ์ง€ ๋ณผ๋ฅจ ๋“ฑ. SEPM(๊ด€๋ฆฌ์„œ๋ฒ„) USB Agent Floppy Human Interface Device 1394 Device Devices of Class ID OS Driver ๊ธฐ๋ฐ˜์˜ ๋‹ค์–‘ํ•œ ๋งค์ฒด๋ฅผ SEPM์—์„œ ์‰ฝ๊ฒŒ ์ œ์–ด Symantec Endpoint Protection 11 16
  • 17. Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ์ œ์–ด (NAC) : Option(๋ผ์ด์„ผ์Šค ๋ณ„๋„๊ตฌ๋งค) Symantec Endpoint Protection์˜ ๊ธฐ์กด ์ธํ”„๋ผ๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ๋ณ„๋„์˜ ์†Œํ”„ํŠธ์›จ์–ด ๋ฐฐํฌ ์—†์ด ๋ผ์ด์„ผ์Šค ์ž…๋ ฅ๋งŒ์œผ๋กœ NAC ๊ธฐ๋Šฅ์„ ๊ทธ๋Œ€๋กœ ์‚ฌ์šฉ(NAC Ready) , ์—”๋“œํฌ์ธํŠธ ๋ณด์•ˆ์ •์ฑ…์„ ๊ธฐ๋ฐ˜์œผ๋กœ ๋ณด์•ˆ์ •์ฑ…์„ ๋”ฐ๋ฅด์ง€ ์•Š๋Š” ๋‹จ๋ง์— ๋Œ€ํ•ด ์ž๋™์น˜๋ฃŒํ•˜๊ฑฐ๋‚˜ ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ์ œ์–ด ๋ฐ ์ ‘๊ทผ๊ถŒํ•œ ํ• ๋‹น. 3 2 3. ํ•ด๋‹น ์ทจ์•ฝ์„ฑ์— ๋Œ€ํ•œ ๋ณต๊ตฌ 2. ํŠน์ • PC ๋ณด์•ˆ ์ทจ์•ฝ์„ฑ ๋ฐœ๊ฒฌ - ์ž๋™ OS Patch ์„ค์น˜ ์˜ˆ์‹œ) ๋ฌด๊ฒฐ์„ฑ ๊ฒ€์‚ฌ ํ•ญ๋ชฉ ํ•ญ๋ชฉ Health Check List ๊ฒฐ๊ณผ 1 ๊ทœ์ • AV ์„ค์น˜ ์œ ๋ฌด/์‹คํ–‰ ์—ฌ๋ถ€ OK 2 AV ์ตœ์‹  Pattern update OK 3 ์ตœ์‹  OS ๋ณด์•ˆ ํŒจ์น˜ update Fail 4 ๊ทœ์ • ๋ณด์•ˆ SW ์„ค์น˜/์‹คํ–‰ ์—ฌ๋ถ€ OK 5 Host OS ๋ณด์•ˆ ์„ค์ • ์ ๊ฒ€ ์‚ฌํ•ญ OK 1 4 1. ์ฃผ๊ธฐ์ ์ธ PC ๋ณด์•ˆ ๋ฌด๊ฒฐ์„ฑ ๊ฒ€์‚ฌ 4. ์ •์ƒ PC ์น˜๋ฃŒ/๋ณต๊ตฌ ์˜ˆ์‹œ) ๋ฌด๊ฒฐ์„ฑ ๊ฒ€์‚ฌ ํ•ญ๋ชฉ - ๊ณ ๊ฐ์ด ๊ทœ์ •ํ•˜๋Š” ๋ณด์•ˆ ์ˆ˜์ค€์œผ๋กœ ๋ณต๊ตฌ ํ•ญ๋ชฉ Health Check List ๊ฒฐ๊ณผ ํ•ญ๋ชฉ Health Check List ๊ฒฐ๊ณผ 1 ๊ทœ์ • AV ์„ค์น˜ ์œ ๋ฌด/์‹คํ–‰ ์—ฌ๋ถ€ 1 ๊ทœ์ • AV ์„ค์น˜ ์œ ๋ฌด/์‹คํ–‰ ์—ฌ๋ถ€ OK 2 AV ์ตœ์‹  Pattern update 2 AV ์ตœ์‹  Pattern update OK 3 ์ตœ์‹  OS ๋ณด์•ˆ ํŒจ์น˜ update 3 ์ตœ์‹  OS ๋ณด์•ˆ ํŒจ์น˜ update OK 4 ๊ทœ์ • ๋ณด์•ˆ SW ์„ค์น˜/์‹คํ–‰ ์—ฌ๋ถ€ 4 ๊ทœ์ • ๋ณด์•ˆ SW ์„ค์น˜/์‹คํ–‰ ์—ฌ๋ถ€ OK 5 Host OS ๋ณด์•ˆ ์„ค์ • ์ ๊ฒ€ ์‚ฌํ•ญ Self Host Integrity Control Process 5 Host OS ๋ณด์•ˆ ์„ค์ • ์ ๊ฒ€ ์‚ฌํ•ญ OK (PC ๋ณด์•ˆ์ƒํƒœ๋ฅผ ๊ฒ€์‚ฌ & ์ทจ์•ฝ์„ฑ ๋ณต๊ตฌ) Symantec Endpoint Protection 11 17
  • 18. Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ ์‹œ์Šคํ…œ ์•ˆ์ •์„ฑ ๏ฑ ์‹œ์Šคํ…œ ๋ฆฌ์†Œ์Šค ์‚ฌ์šฉ๋Ÿ‰ ๊ฐ์†Œ โ€“ ๋‹ค์–‘ํ•œ ๋ณด์•ˆ ๊ธฐ์ˆ ์„ ๋™์‹œ์— ์ œ๊ณตํ•˜์ง€๋งŒ ๋ฐ˜๋ฉด์— ์‹œ์Šคํ…œ ๋ฆฌ์†Œ์Šค ์‚ฌ์šฉ๋Ÿ‰์€ ๋‹จ๋… ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ์ œํ’ˆ ์‚ฌ์šฉ์‹œ ๋ณด๋‹ค ๋‚ฎ์€ ์‚ฌ์šฉ๋ฅ  ์œ ์ง€ ๏ฑ ํด๋ผ์ด์–ธํŠธ ๋ณด์•ˆ ํ”„๋กœ์„ธ์Šค/์„œ๋น„์Šค/ํ”„๋กœ๊ทธ๋žจ ์‚ญ์ œ ๋ฐฉ์ง€ โ€“ ์„ค์น˜์ƒํƒœ, ์„œ๋น„์Šค, ํ”„๋กœ์„ธ์Šค ๋“ฑ์— ๋Œ€ํ•œ ์‚ฌ์šฉ์ž์— ์˜ํ•œ ์ž„์˜ ์ค‘์ง€๋ฅผ ์ฐจ๋‹จ. ๋˜ํ•œ ์„œ๋น„์Šค ์ƒํƒœ๋ฅผ โ€œ์‚ฌ์šฉํ•˜์ง€ ์•Š์Œโ€์œผ๋กœ ๊ฐ•์ œ ์„ค์ •ํ•˜๋”๋ผ๋„ ๋ถ€ํŒ…์‹œ์— ๊ฐ•์ œ ์„œ๋น„์Šค๋ฅผ ์‹คํ–‰ํ•˜์—ฌ ์ƒ์‹œ ๋ณด์•ˆ์ƒํƒœ ์œ ์ง€(Always ON) ๏ฑ ์ž„์˜ ๋ณ€๊ฒฝ ๋ฐฉ์ง€ ๊ธฐ๋Šฅ โ€“ SEP ์ปจํ…์ธ , ํŒŒ์ผ ๋“ฑ ์ •์ƒ ๋™์ž‘์„ ๋ฐฉํ•ดํ•˜๊ณ ์ž ํ•˜๋Š” ๋ชฉ์ ์˜ ์†์ƒ ํ–‰์œ„๋ฅผ ์ฐจ๋‹จ. 129MB SCS 3.1 84% Memory Reduction SAV CE 10.1 62MB 24MB SEP 11.0 Symantec Endpoint Protection 11 18
  • 19. Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ ์ค‘์•™ ๊ด€๋ฆฌ ๊ธฐ๋Šฅ ๏ฑ ์ค‘์•™ ์ง‘์ค‘์‹ ์ด๋ฒคํŠธ ๋กœ๊น… โ€“ ํด๋ผ์ด์–ธํŠธ ์ƒ์˜ ๊ฐ์—ผ, ํŒจํ„ด ๋ฏธ์—…๋ฐ์ดํŠธ, ์ž๋™ ๋ณดํ˜ธ ๊ธฐ๋Šฅ ์ค‘์ง€๋“ฑ์˜ ์ด๋ฒคํŠธ ๋ฐ ํ†ต๊ณ„๋ฅผ Dash Board๋“ฑ์„ ํ†ตํ•˜์—ฌ ํŒŒ์•… โ€“ ์ •์˜ํ•œ ์ด๋ฒคํŠธ ๊ฒฝ๊ณ  ๋ฐœ์ƒ ์‹œ (๊ฐ์—ผ, ์„œ๋น„์Šค ์ค‘์ง€ ํด๋ผ์ด์–ธํŠธ, ํŒจํ„ด ๋ฏธ์—…๋ฐ์ดํŠธ) ์ค‘์•™ ์ฝ˜์†”์„ ํ†ตํ•œ ๊ฒฝ๊ณ  ๋ฐœ์ƒ โ€“ ํด๋ผ์ด์–ธํŠธ ์‹œ์Šคํ…œ ์žฌ์‹œ์ž‘, ๊ฐ•์ œ ํŒจํ„ด ์—…๋ฐ์ดํŠธ, ๊ด€๋ฆฌ์ž์— ์˜ํ•œ ๊ฒ€์ƒ‰๋“ฑ์˜ ๋ช…๋ น ์‹คํ–‰ ์‹œ ์ค‘์•™ ์ฝ˜์†”์„ ํ†ตํ•œ ๋ช…๋ น ์‹คํ–‰ ์™„๋ฃŒ ์—ฌ๋ถ€ ํ™•์ธ ๊ฐ€๋Šฅ ๏ฑ ์—ญํ• ์— ๋”ฐ๋ฅธ ๊ด€๋ฆฌ์ž ๊ถŒํ•œ ์ง€์ • โ€“ ๋Œ€๊ทœ๋ชจ ๊ธฐ์—… ํ™˜๊ฒฝ์— ๋”ฐ๋ฅธ ๊ด€๋ฆฌ์ž ๋“ฑ๋ก์„ ์œ„ํ•˜์—ฌ, ์ •์ฑ… ์„ค์ • ๊ถŒํ•œ ๋˜๋Š” ๋ณด๊ธฐ ๊ถŒํ•œ ๋“ฑ์˜ ๊ด€๋ฆฌ์ž ๊ถŒํ•œ ๋ถ€์—ฌ ๊ฐ€๋Šฅ ๏ฑ ๋ฐฐํฌ๋ฅผ ์œ„ํ•œ ๊ธฐ๋Šฅ ์ œ๊ณต โ€“ ํŒจํ‚ค์ง€ ์ž‘์„ฑ ๊ธฐ๋Šฅ โ€“ ํŒจ์น˜ ๋ฐ ์—…๋ฐ์ดํŠธ ์ œ๊ณต โ€“ ์›๊ฒฉ ์„ค์น˜ ๊ธฐ๋Šฅ Symantec Endpoint Protection 11 19
  • 20. Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ ์ปจํ…์ธ  ์—…๋ฐ์ดํŠธ ๊ด€๋ฆฌ ๏ฑ Manager์— ์˜ํ•œ ์ปจํ…์ธ  ๊ด€๋ฆฌ โ€“ Manager๊ฐ€ ์ตœ์‹  ํด๋ผ์ด์–ธํŠธ ํŒจ์น˜, ๋ฐ”์ด๋Ÿฌ์Šค ์ •์˜ ํŒจํ„ด, IDS ์‹œ๊ทธ๋„ˆ์ฒ˜๋“ฑ๊ณผ ๊ฐ™์€ ์ปจํ…์ธ ๋ฅผ ์—…๋ฐ์ดํŠธ ํ•  ๊ฒฝ์šฐ ๊ฐ ๊ฐœ๋ณ„ ํด๋ผ์ด์–ธํŠธ์— ํฌํ•จ๋œ ์ปจํ…์ธ ์™€ ์ฐจ์ด๋‚˜๋Š” ๋ถ€๋ถ„๋งŒ ์ฆ๋ถ„์œผ๋กœ ์ƒ์„ฑํ•˜์—ฌ ํ•ด๋‹น ํด๋ผ์ด์–ธํŠธ์— ๋ฐฐํฌํ•  ์ˆ˜ ์žˆ์Œ โ€“ ํด๋ผ์ด์–ธํŠธ์˜ ์ปจํ…์ธ ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ, ์ œํ’ˆ ์ž์ฒด์˜ ๋ฒ„์ „ ์—…๋ฐ์ดํŠธ๋„ ์ž๋™ ์ ์šฉ๊ฐ€๋Šฅ ์˜ˆ) SEP 11 ๋ฒ„์ „์œผ๋กœ 12๋ฒ„์ „์œผ๋กœ ๋นŒ๋“œ์—…์ด ๋  ๊ฒฝ์šฐ์—๋„ ์ค‘์•™์—์„œ ์ž๋™ ๋ฐฐํฌ๋ฅผ ํ†ตํ•˜์—ฌ ์žฌ์„ค์น˜ ๋“ฑ์˜ ์ˆ˜์ž‘์—… ๋ถˆํ•„์š” Symantec Endpoint Protection 11 20
  • 21. Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ Active Directory / LDAP ์—ฐ๋™ ๏ฑ Active Directory์™€์˜ ์—ฐ๋™ โ€“ AD์™€์˜ ์—ฐ๋™์„ ํ†ตํ•˜์—ฌ ๊ธฐ์กด Organization Unit Import ์ง€์› โ€“ ์˜ˆ์•ฝ ์‹œ๊ฐ„์— ๋”ฐ๋ฅธ AD์™€์˜ ์ฃผ๊ธฐ์  ๋™๊ธฐํ™” ๋˜๋Š” ์š”์ฒญ์— ์˜ํ•œ ๋™๊ธฐํ™” ์ง€์› โ€“ AD ์—ฐ๋™์˜ ๊ฒฝ์šฐ, ํด๋ผ์ด์–ธํŠธ ๋ฐฐํฌ ์‹œ ํ•ด๋‹น ๊ทธ๋ฃน์— ์ž๋™ ๋“ฑ๋ก โ€“ AD๋ฅผ ํ†ตํ•œ ๊ด€๋ฆฌ์ž ์ธ์ฆ Symantec Endpoint Protection 11 21
  • 22. Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ ๋ณด๊ณ ์„œ ๋ฐ ๋ชจ๋‹ˆํ„ฐ๋ง๊ธฐ๋Šฅ ๏ฑ ๋‹ค์–‘ํ•œ ๋ฆฌํฌํŠธ ์ œ๊ณต โ€“ ์กฐ์ง๋‚ด ๋ชจ๋“  ์‹œ์Šคํ…œ์— ๋Œ€ํ•œ ์‹ค์‹œ๊ฐ„ ์ด๋ฒคํŠธ๊ฐ€ Dash Board โ€“ ์ง€์ •๋œ ๊ด€๋ฆฌ์ž์— ๋Œ€ํ•ด ์ฃผ๊ธฐ๋ณ„ ๋ฆฌํฌํŠธ ๋ฐœ์†ก ๊ธฐ๋Šฅ โ€“ ํŠน์ • ์ด๋ฒคํŠธ ๋ฐœ์†ก ์‹œ ์ •์˜ํ•œ ๋ฐฐ์น˜ ํŒŒ์ผ ์‹คํ–‰ ๋ฐ ๊ด€๋ฆฌ์ž ๊ฒฝ๊ณ  ์ „์†ก โ‘  โ‘ก ๊ธฐ๋Šฅ โ€“ ์•ฝ 50์—ฌ๊ฐœ์˜ ๋ณด๊ณ ์„œ ํ…œํ”Œ๋ฆฟ ์ œ๊ณต (๊ฐ์—ผ, ์‹œ๊ทธ๋„ˆ์ฒ˜ ๋ฐฐํฌ ํ˜„ํ™ฉ, ํด๋ผ์ด์–ธํŠธ ๋ฏธ์„ค์น˜ ์‹œ์Šคํ…œ ๋“ฑ) 1. ์ „์ฒด ๋„คํŠธ์›Œํฌ์—์„œ ๋ฐ”์ด๋Ÿฌ์Šค ๋ฐ ์ŠคํŒŒ์ด์›จ์–ด ๋“ฑ โ‘ข โ‘ฃ ์•…์„ฑ์ฝ”๋“œ๋ณ„ ์‹ค์‹œ๊ฐ„ ์ฒ˜๋ฆฌํ˜„ํ™ฉ 2. ๋ฐ”์ด๋Ÿฌ์Šค ์ •์˜ํŒŒ์ผ(ํŒจํ„ด)์ด ์ตœ์‹ ์ด ์•„๋‹Œ ์‹œ์Šคํ…œ ์ˆ˜ ํ†ต๊ณ„ 3. ์ตœ๊ทผ ํ•˜๋ฃจ ๋™์•ˆ์˜ ์•…์„ฑ์ฝ”๋“œ ํƒ์ง€์ถ”์ด๋ฅผ ์‹œ๊ฐ„๋Œ€๋ณ„๋กœ ๋„์‹ํ™” 4. Security Response ์‹œ๋งŒํ… Global Service์ธ DeepSight์˜ ๋ฐ์ดํƒ€๋ฅผ ์ด์šฉํ•˜์—ฌ ํ˜„์žฌ ์‹œ์ ์˜ ๊ธ€๋กœ๋ฒŒ Top Threats ๋ฐ โ‘ค ์‹ ์ข… ์•…์„ฑ์ฝ”๋“œ ์ •๋ณด๋ฅผ ๋ชจ๋‹ˆํ„ฐ๋ง. ํŠนํžˆ ํ™•์‚ฐ๋„๊ฐ€ ๋†’์€ ์›œ์ถœํ˜„์‹œ ๋ณด์•ˆ๋“ฑ๊ธ‰ ๊ฒฝ๊ณ . 5. ์—”์ง„, ์‹ค์‹œ๊ฐ„ ๋ณดํ˜ธ๊ธฐ๋Šฅ ๋“ฑ ํ•„์ˆ˜ ๊ธฐ๋Šฅ๋“ค์˜ ์‚ฌ์šฉ์ƒํƒœ์— ๋Œ€ํ•œ ๋ชจ๋‹ˆํ„ฐ๋ง Symantec Endpoint Protection 11 22
  • 23. Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ ์•„ํ‚คํ…์ฒ˜ 1 ๏ฑ Manager ๋ฐ DB, Client ์ง€์› OS ํ”Œ๋žซํผ Symantec Endpoint Protection Manager Java-based ์›น์ ‘์†์„ ํ†ตํ•˜์—ฌ ์œ„์น˜์™€ ๊ด€๊ณ„์—†์ด SEPM ์ง€์› OS ํ”Œ๋žซํผ ์ ‘์† ๊ฐ€๋Šฅ Windows XP (32 and 64 bit), ์—ญํ• ์— ๋”ฐ๋ฅธ ๊ด€๋ฆฌ์ž ๊ถŒํ•œ ์„ค์ • Windows 2000 (32 and 64 bit), Data Store Windows 2003 (32 and 64 bit), ์ค‘์•™ ์ฝ˜์†” Windows Vista (32 and 64 bit) ์ง€์› DB ๋‚ด์žฅ Sybase DB (1000ํด๋ผ์ด์–ธํŠธ ๋ฏธ๋งŒ) MS SQL Server (1000ํด๋ผ์ด์–ธํŠธ ์ด์ƒ) SEP 11 ํด๋ผ์ด์–ธํŠธ ์ง€์› OS ํ”Œ๋žซํผ Windows XP (32 and 64 bit), Windows 2000 (32 and 64 bit), Windows 2003 (32 and 64 bit), Servers Laptops Windows Vista (32 and 64 bit) Desktops Clients Symantec Endpoint Protection 11 23
  • 24. Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ ์•„ํ‚คํ…์ฒ˜ 2 ๏‚ง Peripheral Deice Control ๏ฑ Manager, Client๊ฐ„ ํ†ต์‹  ํฌํŠธ ๋ฐ ์ •๋ณด Symantec Endpoint Protection Manager To the server ์ด๋ฒคํŠธ ๋กœ๊ทธ ์ƒํƒœ ์ •๋ณด To the client ์›๊ฒฉ ์„ค์น˜/ํŒจ์น˜ ์ •์ฑ… ๋ฐฐํฌ ์ปจํ…์ธ  ๋ฐฐํฌ - Virus Definition - IDS Signature ํ†ต์‹  ํฌํŠธ HTTPS (443/tcp) HTTP (80/tcp) * Manager์˜ 80, 443/tcp ํฌํŠธ๊ฐ€ Open๋˜์–ด ์žˆ์–ด์•ผ ํ•˜๋ฉฐ, ํด๋ผ์ด์–ธํŠธ๋“ค์— ๋Œ€ํ•ด์„œ๋Š” ์ธ๋ฐ”์šด๋“œ ์˜คํ”ˆ ์ •์ฑ…์ด ๋ถˆํ•„์š”ํ•จ Servers Laptops Desktops Clients Symantec Endpoint Protection 11 24
  • 25. Symantec Endpoint Protection 11.0 ์ฃผ์š”๊ธฐ๋Šฅ ๊ตฌ์„ฑ ๋””์ž์ธ ๏ฑ Single Site โ€“ ๊ฐ€์žฅ ๊ธฐ๋ณธ์ ์ธ ๋ฐฉ๋ฒ•์œผ๋กœ์จ IT ํ™˜๊ฒฝ์ด ํฌ์ง€ ์•Š๊ฑฐ๋‚˜ ์ง€์—ญ์ ์œผ๋กœ ๋ถ„์‚ฐ๋˜์–ด ์žˆ์ง€ ์•Š์€ ํ™˜๊ฒฝ์— ์ ์šฉ - ํด๋ผ์ด์–ธํŠธ์ˆ˜๊ฐ€ 1,000๋…ธ๋“œ ๋ฏธ๋งŒ์ผ ๊ฒฝ์šฐ : 1010101 Embedded DB ์‚ฌ์šฉ(Sybase) 0101010 1010101 - 1,000 ๋…ธ๋“œ ์ด์ƒ์ผ ๊ฒฝ์šฐ MS-SQL ์„œ๋ฒ„ ์‚ฌ์šฉ - ํ•„์š”์‹œ ์ด์ค‘ํ™” SEPM SEPM(์„ ํƒ์‚ฌํ•ญ) Symantec Endpoint Protection 11 25
  • 26. ๊ธฐ๋Œ€ํšจ๊ณผ SEP 11.0 Value Symantec Endpoint Protection Secure Simple Seamless ๏ฑ ๋น„๊ตํ• ์ˆ˜ ์—†๋Š” ์ข…ํ•ฉ ๊ธฐ์ˆ  ๏ฑ ๋‹จ์ผ ์—์ด์ „ํŠธ ๏ฑ ๋‹ค์–‘ํ•œ ๊ณ ๊ฐ ๋„คํŠธ์›Œํฌ ํ™˜๊ฒฝ ๏ฑ ์•ˆํ‹ฐ ๋ฐ”์ด๋Ÿฌ์Šค ๊ทธ ์ด์ƒ์˜ ๋ณดํ˜ธ ๏ฑ ๋‹จ์ผ ๊ด€๋ฆฌ์ฝ˜์†” ์ง€์› ๊ธฐ์ˆ  ๏ฑ ๋‹จ์ผ ๋ผ์ด์„ผ์Šค ๏ฑ Symantec์˜ Global Intelligence ๏ฑ ์›ํ•˜๋Š” ํ˜•ํƒœ๋กœ ์‚ฌ์šฉํ•  ์ˆ˜ Network์˜ ๊ธฐ์ˆ  ๏ฑ ๋‹จ์ผ ๊ณ ๊ฐ์ง€์› ์žˆ๋„๋ก ์†์‰ฌ์šด ์„ค์ • ๏ฑ ํ•„์ˆ˜ ๋ณดํ˜ธ ๊ธฐ์ˆ  ๋ฐ ์ปดํ”Œ๋ผ์ด์–ธ์Šค ๊ธฐ๋Šฅ์˜ ์™„๋ฒฝํ•œ ์กฐํ•ฉ Symantec Endpoint Protection 11 26
  • 28. Why Symantec โ€ข ์•ˆ์ •์„ฑ โ€“ 150,000,000 ์ด์ƒ์˜ ์‹œ์Šคํ…œ์—์„œ ๊ฒ€์ฆ๋œ ์ œํ’ˆ ์•ˆ์ •์„ฑ โ€“ AV ์‹œ๊ทธ๋„ˆ์ฒ˜์˜ ์‹ ๋ขฐ์„ฑ โ€ข ํƒ์ง€์œจ โ€“ ๋‹ค์–‘ํ•œ ํ…Œ์ŠคํŠธ์™€ ์ธ์ฆ๊ธฐ๊ด€์„ ํ†ตํ•ด ๊ฒ€์ฆ๋œ ํƒ์ง€ ๋ฐ ์น˜๋ฃŒ ๋Šฅ๋ ฅ โ€“ 73,000 (07๋…„ 6์›” ํ˜„์žฌ)์ด์ƒ์˜ ๋ฐ”์ด๋Ÿฌ์Šค DB ๋ณด์œ  โ€“ ํ–‰๋™๊ธฐ๋ฐ˜ ํƒ์ง€ ๊ธฐ์ˆ ์„ ํ†ตํ•œ zero-day ๊ณต๊ฒฉ ๋ฐฉ์–ด โ€“ ์›”๋“ฑํ•œ ํŒจํ„ด ์—…๋ฐ์ดํŠธ ์ œ๊ณต โ€ข ๋Œ€์‘ ๋ฐ ์ง€์› โ€“ ์‹ ์ข… ์œ„ํ˜‘์— ๋น ๋ฅด๊ฒŒ ๋Œ€์ฒ˜ํ•˜๊ธฐ ์œ„ํ•œ ์ „์„ธ๊ณ„ ์ธํ”„๋ผ โ€“ ์„ธ๊ณ„ ๊ฐ์ง€์˜ ๋ณด์•ˆ ์šด์˜ ์„ผํ„ฐ(Security Operations Center)์™€ ๋ณด์•ˆ ๋Œ€์‘ ์—ฐ๊ตฌ์†Œ (Security Response Lab)๋ฅผ ํ†ตํ•ด 24x7 ์ •๋ณด ๋ณด์•ˆ ์„œ๋น„์Šค ์ œ๊ณต โ€“ ์ „์„ธ๊ณ„ 25๊ฐœ ์ง€์› ์„ผํ„ฐ๋ฅผ ํ†ตํ•ด ๊ธฐ์—…๊ณผ ์ผ๋ฐ˜ ์‚ฌ์šฉ์ž์˜ ๋ณด์•ˆ ๋ฐ ๊ฐ€์šฉ์„ฑ ์š”๊ตฌ์‚ฌํ•ญ ์— ๋Œ€์‘ 28
  • 29. Global Intelligence Network ์‹œ๋งŒํ… SOC + ์‹œ๋งŒํ…์ด ๋ชจ๋‹ˆํ„ฐ๋งํ•˜๋Š” + ์‹œ๋งŒํ…์ง€์› + 180๊ฐœ ๊ตญ์— ๋“ฑ๋ก๋œ 40,000์—ฌ๊ฐœ์˜ + ์‹œ๋งŒํ… ๋ณด์•ˆ์—ฐ๊ตฌ์†Œ ๊ตญ๊ฐ€ ์„ผ์„œ ๋ฒ ๋ฅผ๋ฆฐ, ๋…์ผ โ€ข Symantectm Security Response ๋Ÿฐ๋˜,์˜๊ตญ โ€“ ์„ธ๊ณ„ ์ตœ๊ณ ์˜ ๋ณด์•ˆ ๋Œ€์‘์„ผํ„ฐ ํ† ์ฟ„, ์ผ๋ณธ โ€“ 180๊ฐœ๊ตญ 40,000๊ฐœ ์„ผ์„œ๋ฅผ ํ†ตํ•œ ์ธํ„ฐ๋„ท ๋”๋ธ”๋ฆฐ, ์•„์ผ๋žœ๋“œ ์œ„ํ˜‘ ๋ชจ๋‹ˆํ„ฐ๋ง ์บ˜๊ฑฐ๋ฆฌ, ์บ๋‚˜๋‹ค โ€“ ์‹ ์ข… ์œ„ํ˜‘์— ๋Œ€ํ•œ ๋น ๋ฅธ ๋Œ€์ฒ˜ ์Šคํ”„๋งํ•„๋“œ, ์˜ค๋ ˆ๊ณค โ€ข ์ƒˆ๋กœ ๋ฐœ๊ฒฌ๋œ ์œ„ํ˜‘์— ๋Œ€ํ•œ ๋ฐ”์ด๋Ÿฌ์Šค ์ •์˜ ์›”๋ค, ๋ฉ”์‚ฌ์ถ”์„ธ์Šค ๋Š” ํ•ด๋‹น ์—…๋ฌด์ผ์— ์ƒ์„ฑ๋จ ๋ ˆ๋“œ์šฐ๋“œ ์‹œ, ์บ˜๋ฆฌํฌ๋‹ˆ์•„ โ€ข 3๋“ฑ๊ธ‰ ์ด์ƒ์˜ ๋†’์€ ํ™•์‚ฐ๋„์˜ ์œ„ํ˜‘์— ๋Œ€ํ•œ ์ฆ‰๊ฐ์ ์ธ ๋Œ€์ฒ˜ ์ƒŒํƒ€ ๋ชจ๋‹ˆ์นด, ์บ˜๋ฆฌํฌ๋‹ˆ์•„ โ€ข Digital Immune System์€ ์ด๋ฏธ ์•Œ๋ ค์ง„ ๋ฐ”์ด๋Ÿฌ์Šค์— ๋Œ€ํ•œ ์˜๋ขฐ๊ฑด์„ 95% ์ด์ƒ ์ž ์ƒŒ ์•ˆํ† ๋‹ˆ์˜ค, ํ…์‚ฌ์Šค ๋™์ฒ˜๋ฆฌํ•˜์—ฌ ์‹ ์†ํ•˜๊ฒŒ ๋Œ€์‘ ์•Œ๋ž™์‚ฐ๋“œ๋ฆฌ์•„, ๋ฒ„์ง€๋‹ˆ์•„ ์‹œ๋“œ๋‹ˆ, ํ˜ธ์ฃผ 29
  • 31. ์ธ์ฆ๊ธฐ๊ด€ ํ‰๊ฐ€ Symantec: โ€ข 99๋…„ ์ดํ›„ 43ํšŒ ์—ฐ์† ํ†ต๊ณผํ•œ ์œ ์ผํ•œ ๋ฒค๋” โ€ข 09๋…„ 04์›” ํ˜„์žฌ โ€ข Pass: Detected all "In the Wild viruses" in comparative tests (with no false positives) โ€ข Fail: Missed detection after three attempts โ€ข โ€”: Chose not to submit for testing 31
  • 32. ํŒจํ„ด ์—…๋ฐ์ดํŠธ ๋นˆ๋„ Vendor Updates Symantec 1699 Sophos 395 F-Secure 216 Fortinet 174 Panda 138 ESet Nod32 115 Norman 85 Trend Micro 82 McAfee 68 F-Prot 67 Averages 4X more updates than nearest competitor Source: www.av-test.org 1/1/2006 โ€“ 3/31/2006 32
  • 33. ์›”๋ณ„ ์œ„ํ˜‘ ํƒ์ง€ ๋ณด๊ณ  ๋นˆ๋„ Source: Symantec Security Response 33
  • 34. ๋น ๋ฅธ ์ƒ˜ํ”Œ ์ฒ˜๋ฆฌ ๋Œ€์‘ Source: Symantec Security Response 34
  • 35. AV ์‹œ๊ทธ๋„ˆ์ฒ˜์˜ ์‹ ๋ขฐ๋„ โ€ข ์ „์„ธ๊ณ„ 150,000,000 ์ด์ƒ์˜ ์‹œ์Šคํ…œ์—์„œ Symantec AV ์‹œ๊ทธ๋„ˆ์ฒ˜ ์‚ฌ์šฉ โ€ข ์ผ์ผ 28,000,000 ์ด์ƒ์˜ ๋‹ค์šด๋กœ๋“œ โ€ข ๋ชจ๋“  ์ง€์› OS์— ๋Œ€ํ•˜์—ฌ 2,000,000 ์ด์ƒ ์˜ ์ •์ƒ ํŒŒ์ผ ํ…Œ์ŠคํŠธ ๊ฒ€์ƒ‰์„ ํ†ตํ•ด ๋ฐฐํฌ๋˜ ๋Š” fully certified ๋œ ๋ฐ”์ด๋Ÿฌ์Šค ์ •์˜ โ€ข ์ฃผ์š” OS ๋ฐ ์ฃผ์š” ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์— ๋Œ€ํ•ด ํ…Œ์ŠคํŠธ ํ›„ ๋ฐฐํฌ๋˜๋Š” Rapid Release ๋ฐ”์ด ๋Ÿฌ์Šค ์ •์˜ 35
  • 36. Key Customers for Symantec Endpoint Protection โ€“ 1/2
  • 37. Key Customers for Symantec Endpoint Protection โ€“ 2/2 37
  • 38. ๊ฐ์‚ฌํ•ฉ๋‹ˆ๋‹ค! Copyright ยฉ 2007 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Symantec Endpoint Protection 11 38