´ÓRSAC2022Á¢ÒìɳºÐ¿´ÔÆÔÉúÇå¾²ÈüµÀµÄÉú³¤
Ðû²¼Ê±¼ä 2022-06-02Ò»ÄêÒ»¶ÈµÄRSA´ó»á
½«ÓÚ½ñÄê6ÔÂ6ÈÕÕýʽ¾ÙÐÐ
ÆäÖУ¬£¬£¬£¬£¬£¬Á¢ÒìɳºÐ´óÈü
(Innovation Sandbox)
×÷Ϊ¡°Ç徲ȦµÄ°Â˹¿¨¡±
ÿÄ걸ÊÜÖõÄ¿£¬£¬£¬£¬£¬£¬
³ÉΪȫÇòÍøÂçÇå¾²ÐÐÒµ
ÊÖÒÕÁ¢ÒìºÍͶ×ʵķçÏò±ê

ÏÖÔÚ£¬£¬£¬£¬£¬£¬Á¢ÒìɳºÐ´óÈüµÄ¾öÈüÈëΧÃûµ¥ÒѾ³ö¯£¬£¬£¬£¬£¬£¬»®·ÖÊÇAraali Networks¡¢BastionZero¡¢Cado Security¡¢Cycode¡¢Dasera¡¢Lightspin¡¢Neosec¡¢Sevco Security¡¢Talon Cyber SecurityºÍTorqÊ®¼ÒÓÅÒìÊ×´´ÆóÒµ£¬£¬£¬£¬£¬£¬Ö÷񻃾¼°ÔÆÔÉúÇå¾²¡¢½ÓÈëÇå¾²¡¢Èí¼þ¹©Ó¦Á´Çå¾²¡¢Êý¾ÝÖÎÀí¡¢APIÇå¾²ºÍÇå¾²ÔËÓª¶à¸öÈüµÀ¡£¡£¡£¡£Õâ10¼ÒÊ×´´¹«Ë¾½«ÓÚ6ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ÏòÈ«Çò¹ÛÖÚչʾËûÃÇÔÚÍøÂçÇå¾²ÐÐÒµÉϵÄÊÖÒÕÁ¢Ò죬£¬£¬£¬£¬£¬½ÇÖð×îºóÓ®¼Ò£¬£¬£¬£¬£¬£¬Ò²½«´øÀ´ÐÂÒ»ÂֵĻðÈÈÈüµÀ¡£¡£¡£¡£
ÅÌ»õÁ¢ÒìɳºÐÖ®ÔÆÔÉúÇå¾²ÈüµÀÆóÒµ
×ÜÀÀ½ñÄêÈëΧ¾öÈüµÄÊ®¼ÒÊ×´´ÆóÒµ£¬£¬£¬£¬£¬£¬ÓÐËļҲÎÈüÆóҵѡÔñÁËÔÆÔÉúÇ徲ϸ·ÖÁìÓò£¬£¬£¬£¬£¬£¬ÕâÔÚÀú½ìRSACÁ¢ÒìɳºÐ´óÈüÖнÏÁ¿ÉÙ¼û£¬£¬£¬£¬£¬£¬¿É¼ûÔÆÔÉúÇå¾²ÈüµÀµÄÈȶÈ×ã¹»¸ßÕÇ¡£¡£¡£¡£ÏÂÃæÎÒÃǾÍÀ´ÅÌ»õ±¾´ÎÈëΧ¾öÈüµÄ4¸öÔÆÔÉúÇ徲ƫÏòÁ¢ÒìÆóÒµ¡£¡£¡£¡£
1¡¢Araali Networks£ºÔÆÔÉúÇéÐÎϵÄÍþв·ÀÓù

Araali NetworksÌṩÁËÒ»¿îÃæÏòÔÆÔÉúÇéÐεÄÍþв¼ì²âºÍΣº¦»º½âµÄÊÖÒÕ¿ò¼Ü£¬£¬£¬£¬£¬£¬¿ÉÒÔʶ±ðÓ¦ÓÃÎó²î¡¢»á¼ûȨÏÞ¡¢ÔÆÇéÐÎÉèÖõȶàά¶ÈΣº¦£¬£¬£¬£¬£¬£¬²¢Ìṩµ¯ÐÔ²¹¶¡¶ÔΣº¦¾ÙÐлº½âºÍÐÞ¸´£¬£¬£¬£¬£¬£¬´Ó¶øÓÐÓ÷ÀÓù¶ñÒâ´úÂë¡¢ÀÕË÷²¡¶¾¡¢Ä¾ÂíºóÃŵÈÊֶζÔÔÆÔÉúÇéÐεÄÍþв¡£¡£¡£¡£Araali NetworksµÄÖ÷ÒªÊÖÒÕÌØÉ«ÊÇʹÓÃÁËeBPFÊÖÒÕ¶Ôk8sÔËÐÐʱµÄ»á¼û¿ØÖÆÕ½ÂÔ¾ÙÐÐϸÄåÖÎÀí£¬£¬£¬£¬£¬£¬½µµÍ×ÊÔ´Õ¼Ó㬣¬£¬£¬£¬£¬ÌáÉýʵʱ´¦Öóͷ£Ð§ÂÊ¡£¡£¡£¡£
2¡¢Cado Security£ºÔÆÔÉúÇéÐÎϵÄÊÂÎñȡ֤ºÍÏìÓ¦

Cado Security ÌṩÁËÒ»¿î½Ð×öCado ResponseµÄÔÆÇéÐÎÊÓ²ìȡ֤ƽ̨²úÆ·£¬£¬£¬£¬£¬£¬Ê¹Çå¾²ÍŶÓÄܹ»ÒÔÔÆµÄËÙÂÊÏìÓ¦Íþв¡£¡£¡£¡£Í¨¹ýÔÚÔÆºÍÈÝÆ÷ÇéÐÎÖÐ×Ô¶¯Ö´ÐÐÊý¾Ý²¶»ñºÍ´¦Öóͷ££¬£¬£¬£¬£¬£¬Cado Response¿ÉÒÔÌṩȡ֤¼¶±ðµÄÏêϸÐÅÏ¢ºÍÅä¾°ÐÅÏ¢£¬£¬£¬£¬£¬£¬´Ó¶øÏû³ýÔÆÖÐÍøÂçÇå¾²ÊÂÎñÆÊÎöµÄÖØ´óÐÔ¡£¡£¡£¡£Cado ResponseÊÇÎÞÊðÀíģʽ£¬£¬£¬£¬£¬£¬Ö§³ÖÔÆÔÉúÇéÐÎ×Ô¶¯»¯°²ÅÅ£¬£¬£¬£¬£¬£¬Ö§³Öͨ¹ý¿ç¶àÔÆÇéÐΣ¨°üÀ¨ÐéÄâ»ú¡¢KubernetesÇéÐΣ©¡¢ÈÝÆ÷ÇéÐΡ¢ÎÞЧÀÍÆ÷ÇéÐκÍÍâµØÏµÍ³ÇéÐξÙÐÐÊÂÎñÏìÓ¦ºÍ×Ô¶¯»¯ÊÓ²ìȡ֤¡£¡£¡£¡£Cado SecurityµÄÊ×´´ÈËÒ²ÊÇÖøÃûµÄÍþвÇ鱨ƽ̨ThreatCrowdµÄ¹¹½¨Õߣ¬£¬£¬£¬£¬£¬ÔÚÍþвÇé±¨ÍøÂçºÍÑо¿Æ«ÏòÉϾßÓи»ºñµÄ»ýÀÛ£¬£¬£¬£¬£¬£¬Òò´ËǿʢµÄÇé±¨ÍøÂçºÍÊÂÎñ±ê×¢ÄÜÁ¦³ÉΪCado Response²úÆ·µÄÒ»´óÁÁµã¡£¡£¡£¡£
3¡¢Lightspin£º»ùÓÚÉÏÏÂÎÄÆÊÎöµÄÔÆÔÉúÓ¦ÓóÌÐò±£»£»£»£»£»£»¤Æ½Ì¨

LightspinÍÆ³öÁËÔÆÔÉúÓ¦ÓóÌÐò±£»£»£»£»£»£»¤Æ½Ì¨ (CNAPP)£¬£¬£¬£¬£¬£¬´ÓÈëÇÖÕßµÄÊÓ½ÇÀ´¿´´ýÔÆÇéÐΣ¬£¬£¬£¬£¬£¬Á½¸öÖ÷ÒªÌØÉ«Êǹ¥»÷·¾¶ÆÊÎöºÍÍþв¿ÉÊÓ»¯¡£¡£¡£¡£Lightspin ƽ̨֧³Ö DevOps£¬£¬£¬£¬£¬£¬Í¨¹ýÇå¾²×óÒÆ£¬£¬£¬£¬£¬£¬ÊµÏÖIaC£¨»ù´¡ÉèÊ©¼´´úÂ룩Çå¾²£¬£¬£¬£¬£¬£¬²¢ÊÊÓÃÓÚÔÆÔÉúÇå¾²µÄËùÓн׶Ρ£¡£¡£¡£¸Ãƽ̨¿ÉÒÔʶ±ðÔÆÔÉúÇéÐÎÖеĹ¥»÷·¾¶£¬£¬£¬£¬£¬£¬²¢»ùÓÚÉÏÏÂÎĶԹ¥»÷·¾¶¾ÙÐÐÆÊÎö£¬£¬£¬£¬£¬£¬´Ó¶ø±êʶ¹¥»÷·¾¶Öи澯µÄÓÅÏȼ¶¡£¡£¡£¡£LightspinÔÚ2021ÄêµÄ RSA´ó»áÉÏÒѾո¶ͷ½Ç£¬£¬£¬£¬£¬£¬»ñµÃÁËCDM Global Infosec½ÒÏþµÄSaaS/ÔÆÇå¾²ÈÈÃŹ«Ë¾½±¡£¡£¡£¡£
4¡¢Sevco Security£ºÃæÏòÔÆÔÉúºÍÍâµØÇéÐεĴ󶼾ÝÈÚºÏ×ʲúÖÎÀíÆ½Ì¨

Sevco SecurityÌṩÁËÒ»Ì×Äܹ»»ùÓÚÔÆÔÉúÇéÐΰ²ÅŵÄ×ʲúÖÇÄÜÖÎÀíÆ½Ì¨£¬£¬£¬£¬£¬£¬¿Éͨ¹ýAPI¶Ô½Ó²î±ðÊý¾ÝÔ´µÄ×ʲúÇåµ¥¶ÔÔÆÔÉúºÍÍâµØÇéÐεĶàÔ´×ʲúÖÎÀíÈí¼þµÄÊý¾Ý¾ÙÐÐÈںϣ¬£¬£¬£¬£¬£¬½¨Éè¸üÖÜÈ«µÄ×ʲú¿â£¬£¬£¬£¬£¬£¬ÒÔʶ±ðÆóÒµÍøÂçÖеÄųÈõ×ʲú£¬£¬£¬£¬£¬£¬´Ó¶øÊµÊ±¸ú×Ù×ʲú¿âÖÐ×ʲú״̬ת±äÇéÐΡ£¡£¡£¡£Sevco SecurityµÄÖ÷ÒªÍŶӳÉÔ±À´×ÔCarbon Black£¬£¬£¬£¬£¬£¬ÔÚÖ÷»úÇå¾²ºÍÖÕ¶Ë×ʲúÖÎÀíÆ«ÏòÉÏÓкÜÊǸ»ºñµÄ»ýÀÛºÍʵ¼ùÂÄÀú¡£¡£¡£¡£ÏÖÔÚÒѾ¶Ô½ÓÁËAutomox¡¢CrowdStrike¡¢Lansweeper¡¢MalwareBytes Nebula¡¢Microsoft AD 5¸ö³§É̵Ä×ʲúÊý¾Ý£¬£¬£¬£¬£¬£¬Ö§³Ö¶Ô´ó¶¼¾ÝÔ´×ʲúµÄ½»Ö¯ÅÌÎʺͼìË÷¡£¡£¡£¡£
ÔÆÔÉúÇå¾²½«ÓÐÂÈÈÃÅÈüµÀ
ËļÒÈëΧÁ¢ÒìɳºÐ¾öÈüµÄÔÆÔÉúÇå¾²ÈüµÀÆóÒµ£¬£¬£¬£¬£¬£¬Æä²úÆ·ÁýÕÖÁËÔÆÔÉúÇå¾²µÄ¸÷¸ö·½Ã棬£¬£¬£¬£¬£¬°üÀ¨ÁËÔÆÔÉúÇéÐÎϵÄ×ʲúÖÎÀí¡¢Íþв¼ì²â¡¢È¡Ö¤ÏìÓ¦ºÍÕû¸öÉúÃüÖÜÆÚµÄÇå¾²·À»¤ºÍ¹¥»÷Á´¿ÉÊÓ»¯£¬£¬£¬£¬£¬£¬ÈçÏÂͼËùʾ£º

ͨ¹ý¶ÔÈëΧ³§ÉÌµÄÆÊÎö¿ÉÒÔ·¢Ã÷£¬£¬£¬£¬£¬£¬ÔÆÔÉúÇå¾²ÒѾ³ÉΪ±±ÃÀµØÇøµÄÈÈÃÅÈüµÀ£¬£¬£¬£¬£¬£¬²¢ÇÒ¹Ø×¢¶ÈÒ»Á¬Ôö¸ß¡£¡£¡£¡£
Ëæ×ÅÔÆÅÌËãµÄÆÕ±éÉú³¤ºÍÓ¦Ó㬣¬£¬£¬£¬£¬ÎÒ¹úµÄÔÆÔÉúÇå¾²Ò²½«ÓÀ´ÖÜÈ«µÄ±¬·¢ÔöÌí¡£¡£¡£¡£¾Ý2021ÄêµÄÖйúÔÆÔÉúÐÐÒµÑо¿±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬Áè¼Ý60%µÄÔÆÔÉúÓû§ÒѾÔÚÉú²úÇéÐÎÖÐÓ¦ÓÃÁËÈÝÆ÷ÊÖÒÕ£¬£¬£¬£¬£¬£¬½ü30%µÄÓû§ÕýÔÚ²âÆÀ»òÕýÔÚ˼Á¿Ê¹ÓÃÈÝÆ÷ÊÖÒÕ¡£¡£¡£¡£
ÈÝÆ÷ÊÖÒÕÊÇÔÆÔÉúϵͳµ×²ãÊÖÒÕ£¬£¬£¬£¬£¬£¬Òò¶øÈÝÆ÷Çå¾²Ò²ÊÇÔÆÔÉúÇå¾²µÄ»ùʯ¡£¡£¡£¡£ÈÝÆ÷±àÅÅÊÖÒÕ¡¢Î¢Ð§ÀÍÊÖÒÕºÍ΢¸ôÀëÊÖÒÕµÄÉú³¤£¬£¬£¬£¬£¬£¬Ò²ÎªÈÝÆ÷ÊÖÒÕ´´Á¢ÁËÍêÉÆµÄÉú̬ÇéÐκÍÊÖÒÕϵͳ£¬£¬£¬£¬£¬£¬Ö§³ÖÁËÈÝÆ÷ÊÖÒյįձéÓ¦Óú͵ü´úÉú³¤¡£¡£¡£¡£
Ëæ×ÅÓªÒµÐèÇóÓëÊÖÒÕÐèÇóµÄË«ÂÖÇý¶¯£¬£¬£¬£¬£¬£¬ÈÝÆ÷Çå¾²ÊÖÒÕ½«»áÓëÔÆÔÉú¼Ü¹¹Ò»ÆðÐͬÉÑݽø£¬£¬£¬£¬£¬£¬²¢Ò»Ö±ÍØÕ¹ÆäÓ¦Óó¡¾°£¬£¬£¬£¬£¬£¬ÎªÔËÓªÉÌ¡¢ÄÜÔ´¡¢½ðÈÚ¡¢»¥ÁªÍøµÈÐÐÒµÓû§´´Á¢³ö¸ü¶à¼ÛÖµ¡£¡£¡£¡£

×÷Ϊº£ÄÚ½ÏÔç¼ÓÈëÔÆÔÉúÇå¾²³§ÉÌÖ®Ò»£¬£¬£¬£¬£¬£¬Z6×ðÁú¿Ê±¼¯ÍÅÔÚÕþ¸®¡¢ÔËÓªÉÌ¡¢ÄÜÔ´¡¢½ðÈÚµÈÐÐÒµ»ýÀÛÁËÖÚ¶àÏîĿʵսÂÄÀú£¬£¬£¬£¬£¬£¬¾ß±¸ÍêÕûµÄÔÆÔÉúÇå¾²²úÆ·Á´Ìõ¡£¡£¡£¡£²úÆ·ÒÔÔÆÔÉúÉúÃüÖÜÆÚΪ½¹µã£¬£¬£¬£¬£¬£¬ÒÔÇå¾²×óÒÆÎªÍ·ÄÔ£¬£¬£¬£¬£¬£¬½«Çå¾²ÄÜÁ¦ÖÜÈ«ÈÚÈëµ½DevOpsϵͳÖУ¬£¬£¬£¬£¬£¬¹¹½¨ÃæÏòDevSecOpsÈ«ÉúÃüÖÜÆÚÇå¾²·À»¤ÏµÍ³£¬£¬£¬£¬£¬£¬ÖúÁ¦²î±ðÐÐÒµÓû§¼Æ»®µÄ¿ìËÙÂ䵨£¬£¬£¬£¬£¬£¬×ÊÖúÓû§½â¾ö»ù´¡ÉèÊ©ÔÆ»¯Àú³ÌÖÐÓªÒµÃæÁÙµÄÏÖʵÎÊÌâ¡£¡£¡£¡£


¾©¹«Íø°²±¸11010802024551ºÅ