RSA Á¢ÒìɳºÐÅÌ»õ | Elevate Security¡ª¡ª¡°ÒÔÈËΪ±¾¡±µÄÇå¾²ÐÐΪ¸ÄÉÆÆ½Ì¨
2020-02-17
2020Äê2ÔÂ24ÈÕ-28ÈÕ£¬ÍøÂçÇå¾²ÐÐҵʢ»áRSA Conference½«ÔھɽðɽÀ¿ªá¡Ä»¡£´ó»áµÄÁ¢ÒìɳºÐ»·½Ú±¸ÊÜÖõÄ¿£¬³ÉΪȫÇòÍøÂçÇå¾²ÐÐÒµÊÖÒÕÁ¢ÒìºÍͶ×ʵķçÏò±ê¡£
ǰ²»¾Ã£¬RSAC¹Ù·½Ðû²¼ÁË×îÖÕÈëÑ¡½ñÄêµÄÁ¢ÒìɳºÐʮǿÊ×´´¹«Ë¾£ºAppOmni¡¢BluBracket¡¢Elevate Security¡¢ForAllSecure¡¢INKY¡¢Obsidian¡¢SECURITI.AI¡¢Sqreen¡¢Tala Security¡¢Vulcan¡£
¾ÅÓÎÀÏ¸ç¿Æ¼¼½«Í¨¹ýÅä¾°ÏÈÈÝ¡¢²úÆ·ÌØµã¡¢µãÆÀÆÊÎöµÈ£¬´ø¸÷ÈËÏàʶÈëΧµÄʮǿ³§ÉÌ¡£½ñÌ죬ÎÒÃÇÒªÏÈÈݵÄÊdz§ÉÌÊÇ£ºElevate Security¡£
¹«Ë¾ÏÈÈÝ
Elevate SecurityÓÚ2017Äê1Ô½¨Éè[1]£¬×ܲ¿Î»ÓÚÃÀ¹ú¾É½ðɽÍåÇø¡£Á½Î»Ê×´´ÈËMasha SedovaºÍRobert Fly¶¼ÊÇǰSalesforceÈÏÕæÇå¾²ºÍÐÅÍÐÖÎÀíµÄ¸ß¹Ü£¬Óи»ºñµÄÇå¾²ÖÎÀíÂÄÀú¡£¹«Ë¾¾ÓÉÁ½ÂÖÈÚ×Ê£¬ÏÖÔÚ´¦ÓÚAÂÖÈÚ×ʽ׶Σ¬ÈÚ×ʹæÄ£1000ÍòÃÀÔª[2]¡£Çø±ðÓÚ´ó¶¼ÖØµã¹Ø×¢ÊÖÒÕ£¨Technology£©ÓëÁ÷³Ì£¨Processes£©µÄÇå¾²´´Òµ¹«Ë¾£¬Elevate»ùÓÚ¶ÔÄ¿½ñÍøÂçÇ徲Σº¦µÄ¶´²ì£¬ÌṩÕë¶ÔÈË£¨People£©µÄÇå¾²ÐÐΪ¸ÄÉÆÆ½Ì¨¼°¶¨ÖÆ»¯¼Æ»®£¬Äܹ»Í¨¹ý¶ÔÔ±¹¤ÐÐΪµÄÆÀ¹ÀÕÉÁ¿¡¢Êý¾Ý¿ÉÊÓ»¯Ìṩ¶ÔÆóÒµ¶àÌõÀíµÄΣº¦¼à¿Ø£¬½ø¶øÌṩ¸öÐÔ»¯µÄÔ±¹¤ÆÀ¼¶·´ÏìÒÔ¼°ÔöÇ¿µÄÇå¾²Åàѵ¡£Elevate SecurityÕýÆõºÏ½ñÄêRSACµÄ“Human Element”Ö÷Ì⣬ÓÐЩ“Ó¦Ô˶øÉú”µÄÒâ˼£¬Ïë±ØÕâÒ²ÊÇÖúÁ¦Ëü½øÈëÁËÁ¢ÒìɳºÐ¾öÈüµÄÒ»´óÒòËØ¡£
Åä¾°ÏÈÈÝ
2014ÄêIBMÇå¾²·þÎñµÄÒ»ÏîÑо¿Åú×¢£¬95%µÄÍøÂçÇ徲ʧÏÝÊÇÈËΪ¹ýʧÔì³ÉµÄ¡£¶ø½üÆÚ¿¨°Í˹»ùµÄÑо¿ÔòÅú×¢91%µÄÉæ¼°¹«ÓÐÔÆÓû§Êý¾Ýй¶ÊÂÎñµÄ¹«Ë¾ÉùÃ÷Éç»á¹¤³ÌѧÊÇÆäËùÔâÊܹ¥»÷Ô˶¯µÄÒ»¸ö»·½Ú[3]¡£ÈËΪÒòËØÒ»Ö±ÒÔÀ´¶¼ÊÇÍøÂç¿Õ¼äÇå¾²µÄÖ÷ÒªÒ»»·¡£Ëæ×ÅÖÖÖÖÇå¾²·ÀÓù×Ô¶¯»¯ÊÖÒÕ¡¢²úÆ·¡¢Æ½Ì¨µÄÓ¿ÏÖ£¬´ó·ùÌáÉýÁ˹¥»÷ÕßÈëÇÖµÄÄѶȡ£È»¶ø£¬ÔÚÇå¾²¡¢ÀûÒæØü¹ØµÄÒªº¦³¡¾°Ï£¬ÓÉÀûÒæÇý¶¯µÄ¹¥»÷ÕßÎÞ·ì²»×꣬¸ß¼¶Ò»Á¬¹¥·ÀµÄÕ½³¡Ö𽥸¡³öË®Ãæ¡£Ä¿½ñ£¬×ÝÈ»ÊÇÇ°ÑØµÄÈ˹¤ÖÇÄÜÇý¶¯µÄ·ÀÓùÊֶΣ¬Ò²Óú·¢Ç¿µ÷“human-in-the-loop”µÄÈË»ú±Õ»·ÐͬÄÜÁ¦¡£È˼ÈÊÇ·ÀÓù»·½ÚµÄÖ÷Òª×é³É£¬Ò²Í¬Ê±¿ÉÄܳÉΪ¹¥»÷ÕßÍ»ÆÆ·ÀÓùµÄųÈõµã¡£
Ëæ×ÅÍøÂçÇå¾²³ÉΪȫÇò¸÷·½µÄ¹Ø×¢ÈÈÃÅ£¬ÍøÂçÇå¾²´ÓÒµÕßÓú·¢¸ÐÊܵ½Ëù´¦ÐÐÒµ¶ÔÌìϵÄÓ°ÏìÁ¦¡£¶øÕâÖÖÓ°ÏìÁ¦Ò²Öð½¥Í¨¹ýÖÖÖÖÇå¾²½ÌÓý¡¢Í»·¢µÄÇå¾²ÊÂÎñ¡¢Í¨Àý»¯µÄÇå¾²ÂÉ·¨£¬ÉîÈëµ½ËùÓÐÈ˵ÄÊÂÇéÉúÑÄÖС£ÕýÈçͨË×ÈËÓú·¢ÊìϤµ½µ½Ð¡ÎÒ˽¼ÒµÄ¿µ½¡ÖÎÀíÓÈΪÖ÷Òª£¬´óÖÐСÐÍÆóÒµÒÔÖÂСÎÒ˽¼ÒµÄÍøÂçÇå¾²Òâʶ¡¢Ç徲ϰ¹ß¡¢Çå¾²ÐÐΪ£¬½«Éî¿ÌÓ°Ï쵽СÎÒ˽¼ÒÒÔ¼°Ëù´¦×éÖ¯µÄÇå¾²»ù´¡¡£È»¶øÍøÂçÇå¾²ÎÄ»¯Æø·ÕµÄÐγÉÈÎÖØ¶øµÀÔ¶£¬´ÓÒµÕß¶ÔÇå¾²ÄÜÁ¦ÌáÉýºÍÉú³¤µÄÊìϤҲÖð½¥´Ó×·Öð¸ü¿ì¡¢¸ü×¼¡¢¸üÖÇÄܵÄÊÖÒÕ¡¢²úÆ·£¬×ª¶øÔ½·¢¹Ø×¢“ÒÔÈËΪ±¾”µÄÊÖÒÕ¡¢Á÷³Ì¡¢¹æÔòÉõÖÁϰ¹ßºÍÎÄ»¯µÄÐÂÌõÀí¡£
GartnerÔÚ×Ô˳ӦÇå¾²µÄϵͳ[5]ÖУ¬Ã÷È·µØ½«People-Centric×÷ΪÁËÒ»¸öÖ÷ÒªÔÔò£¬ÔÚÕû¸öÒÔÈËΪ±¾µÄÇ徲ϵͳÄÚ£¬Çå¾²½ÌÓýÊÇ»ùʯ£¬Ö»ÓÐÌá¸ßÔ±¹¤µÄÇå¾²ÒâʶºÍÇå¾²ÊÖÒÕ£¬²Å»ªÓÐÓÃïÔÌÖÖÖÖÇå¾²»úÖÆÔËÐеĿªÏú£¬ÌáÉýÕû¸öÇ徲ϵͳµÄÔËתЧÂÊ¡£

ÐÐÒµÒѾÓв»ÉÙ¹«Ë¾×öÇå¾²ÒâʶÅàѵ£¨Security Awareness Training£©£¬GartnerÒ²Ðû²¼¹ýħÁ¦ÏóÏÞ[4]¡£´ó²¿·Ö¹Å°åÇå¾²ÒâʶÅàѵ²úÆ·µÄÖ÷Òª¾ºÕùÁ¦ÔÚÓÚϵͳµÄ¡¢¿ÆÑ§µÄÅàѵÄÚÈÝ£¬ÒÔ¼°ÓëÄÚÈÝÏàÆ¥ÅäµÄÅÌËã»úÅàѵ¸¨Öúϵͳ¡£¶øÕâЩÄÚÈݺ͹¤¾ßÔòÖ÷ÒªÊÇÎ§ÈÆÍ¨¹ý“Åàѵ”ÒÔÌáÉý“Òâʶ”µÄÄ¿µÄ¶ø¹¹½¨µÄ£¬Õâµ¼ÖÂÇå¾²ÒâʶµÄÌáÉýÀú³Ì¸üÀàËÆ¶Ô»úе´ò²¹¶¡Éý¼¶µÄÀú³Ì£¬ÄÑÒÔÃ÷È·»³±§Ð¡ÎÒ˽¼ÒÔÚÕâÒ»Àú³ÌÖеÄÐÐΪת±ä£¬¶øÇ±ÔÚµÄΣº¦ÕýÔ̺¬ÓÚÖî¶àÈ˵ÄÐÐΪϸ½Úµ±ÖС£
Elevate SecurityÌṩµÄƽּ̨ÔÚͨ¹ýͳһµÄ¿ÉÊÓ»¯ÊֶΣ¬¼à²â¡¢ÖÎÀíÔ±¹¤µÄÇå¾²ÐÐΪ£¬²¢ÌṩÖúÓÚÌáÉýÆóÒµÇå¾²ÎÄ»¯µÄÓʼþ·´ÏìºÍÇå¾²½ÌÓý×ÊÔ´£¬ÒÔ¿ÉÁ¿»¯µÄ·½·¨Ôö½øÔ±¹¤Çå¾²ÐÐΪµÄ¸ÄÉÆ£¬×ÊÖúÆóÒµÖÎÀíÕßÓÐÓýµµÍÔ±¹¤ÈËΪÒòËØ¹ØÁªµÄÇ徲Σº¦¡£ÓÐÁËÆÀ¼ÛÖ¸±ê£¬¾ÍÄÜÐγɱջ·£¬×ÊÖúÆóÒµµü´úµØ¸ÄÉÆÔ±¹¤ÔÚÇå¾²·À»¤ÖеÄÖ÷¹ÛÄܶ¯ÐÔ£¬Ìá¸ßÆóÒµÕûÌåµÄÇå¾²·À»¤Ë®Æ½¡£
²úÆ·ÏÈÈÝ
Elevateƽ̨Ö÷ÒªÌṩÒÔÏÂËĸö¹¦Ð§Ä£¿é£¬ReflexÌá¹©ÍøÂç´¹ÂÚÓʼþ¹¥»÷Ä£Äâ¼°Ïà¹ØÐ§¹ûÆÀ¹À£»VisionÊÇÒ»¸öÒDZíÅÌ£¬½«´¹ÂÚÓʼþ¹¥»÷Ä£ÄâЧ¹û¼°Í¨¹ýAPI¼¯³ÉµÄÆäËûÔ±¹¤ÈËΪÒòËØÏà¹ØÇå¾²Êý¾ÝͳһÕûºÏ¼°ÆÊÎö£¬¾ß±¸²¿·Ö¼¶ºÍСÎÒ˽¼Ò¼¶µÄÏÂ×êÊÓͼ£»PulseÌṩ¿ÉÉèÖõġ¢»ùÓÚÓʼþµÄÔ±¹¤ÆÀ¼¶·´Ïìϵͳ£¬ÒÔ¸öÐÔ»¯µÄ·½·¨ÏòÔ±¹¤ÌṩÕûÌåµÄÒÔ¼°¶à¸öÄÚÈÝÄ£¿éµÄÇå¾²ÐÐΪÆÀ¼¶£»Hacker’s MindÌṩ¹¥»÷ÕßÊӽǵÄÇå¾²Åàѵ£¬ÒÔÕë¶ÔÐÔÌáÉýÒªº¦²¿·Ö¡¢¸ßΣº¦Ô±¹¤µÄÇå¾²ÒâʶºÍ·À»¤ÄÜÁ¦¡£

»ùÓÚÒÔÉÏËĸö¹¦Ð§Ä£¿é£¬ÌáÉý×éÖ¯ÄÚ²¿Ö°Ô±Çå¾²Òâʶ¡¢ÅàÓýÇå¾²ÎÄ»¯¿ÉÒÔ·Ö²½¾ÙÐУ¬¼´Í¨¹ýReflexÍê³É´¹ÂÚÓʼþ¹¥»÷Ä£Ä⣬½¨ÉèÇå¾²»ùÏ߯À¼¶£»Í¨¹ýVisionÒDZíÅÌÆÊÎö²¢¸ú×ÙÆóÒµ¸÷²ã¼¶Ö°Ô±µÄÕûÌå¡¢×ÜÌåÇå¾²ÐÐΪΣº¦£»Í¨¹ýPulseÓʼþÆÀ·Ö¿¨»úÖÆ·´ÏìÖ°Ô±ÐÐΪÆÀ·Ö£¬¼¤ÀøÐÐΪˢУ»×îºó£¬Õë¶Ô¸ßΣº¦Ð¡ÎÒ˽¼Ò»ò²¿·Ö£¬ÌṩÕë¶ÔÐÔ¸öÐÔ»¯µÄÇå¾²Åàѵǿ»¯¡£

ElevateÌṩÁËÆ½Ì¨µÄ»ù±¾ÊÔÓù¦Ð§£¬Ôڴ˼òÆÓÏÈÈÝ¡£¸Ã»¥¶¯Ê½DemoÖ÷Òª°üÀ¨VisionºÍPulseÁ½²¿·Ö¡£¿ÉÒÔ¿´µ½Vision DashboardÌṩµÄÊÓͼºÜ¼òÔ¼¡£´Ó²¿·Ö¼¶±ðÉÏ£¬°üÀ¨×ÜÌåÇ徲Σº¦Öµ¡¢Î£º¦ÂþÑÜ¡¢²¿·ÖÆÀ·ÖÒÔ¼°ÐÐΪӳÉä¡£ÐÐΪӳÉ䣨Behavior Map£©ÊÇÒÔ²¿·ÖΪµ¥Î»£¬¶ÔËùÍøÂçµÄÇå¾²ÐÐΪÊý¾ÝµÄÕûºÏÆÀ¼¶£¬Ö±¹Û·´Ó¦²¿·ÖÔÚ¸÷ά¶ÈÉÏ£¬°üÀ¨ÕûÌå¡¢×ÀÃæÕûÀí¡¢¶ñÒâÈí¼þ¡¢ÃÜÂëÇå¾²¡¢´¹ÂÚ¹¥»÷²âÊÔ¡¢ÅàѵµÈά¶ÈµÄΣº¦Æ·¼¶¡£´ÓÄ¿½ñÐÅÏ¢¿´£¬¸ÃElevate DemoËù¼¯³ÉºÍÕ¹ÏֵĴ󲿷ÖÊý¾ÝÔ´ÐèҪͨ¹ýÍⲿAPI½ÓÈ룬ƽ̨ÄÚ²¿Ö»Ìṩ»ùÓÚReflexµÄ´¹ÂÚÓʼþ¹¥»÷Ä£ÄâµÄÆÀ¼¶Êý¾Ý¡£
VisionÊÓͼÏ»¹Ìṩ¸÷²¿·ÖÄÚ²¿µÄ×ÜÌåºÍСÎÒ˽¼ÒÆÀ¼¶¼°ÅÅÐò£¬Ìṩ¸üϸ½Ú¡¢Ö±¹ÛµÄÇ徲Σº¦ÊÓͼ¡£

ÔÚPulse±êǩϣ¬ÌṩCampaigns¹¦Ð§¡£¸Ã¹¦Ð§Ó¦¿ÉÌṩ¿ÉÉèÖõ쬻ùÓÚÓʼþµÄÇå¾²ÆÀ¼¶·´Ïì¼°ÖÎÀí¡£ÔÚDemoÖУ¬Ö»Äܹ»ÏòÊÔÕßÓÃÓʼþ·¢ËÍÑùÀý·´ÏìÓʼþ£¬°üÀ¨²î±ðÆ·¼¶ÆÀ·ÖµÄÈý·ÝÓʼþ¡£ÒÔÒ»·ÝÆÀ¼¶Îª“Sturdy”µÄ·´ÏìÓʼþΪÀý£¬ÆÀ·Ö·ÖΪPhishing & Reporting¡¢Password Manager¡¢Training¡¢Malware¡¢Clean DeskÕâÎå¸ö²¿·Ö£¬¶ÔÓ¦VisionÒDZíÅÌÖм¯³ÉµÄÎåÏîÄÚÈÝ¡£Ã¿Ò»ÏîÄÚÈݶ¼ÓжÔÓ¦ÏêϸÄÚÈÝ£¬ÀýÈç¹ØÓÚPhishing & Reporting£¬°üÀ¨´¹ÂÚÓʼþ¹¥»÷µÄÏêϸʱ¼ä¡¢Ô±¹¤Ð¡ÎÒ˽¼ÒÆÀ¹ÀЧ¹ûÒÔ¼°Óëͬ²¿·ÖÆäËûÔ±¹¤µÄºáÏò±ÈÕÕЧ¹û¡£ËäÈ»£¬ÈôÊÇijһÏîÆÀ¹À´ï±ê£¬ÓʼþÖлáÓÐÀàËÆÓÚ»ÕÕµļ¤Àø»úÖÆ£¬ÒÔÃãÀøÔ±¹¤¼¯ÆëËùÓÐÇå¾²»ÕÕ£¬Íê³É¶ÔÓ¦µÄÍêÈ«ÐÐΪ±ê×¼¡£

¹«Ë¾½â¶Á
“ÒÔÈËΪ±¾”£¬ÒÔÈ˼°ÆäÐÐΪΪ½¹µã£¬¹Ø×¢Ö°Ô±ÒòËØÔÚÍøÂç¿Õ¼äÇå¾²ÖеÄÒªº¦×÷Ó㬴Ó×éÖ¯¡¢Õ½ÂÔ¡¢Á÷³Ì¡¢Ö´ÂÉÀýÔòµÈ½Ç¶ÈÒ»Á¬ÖÎÀí¡¢¼à¿ØÆóÒµÇ徲Σº¦£¬½ø¶øÕë¶ÔÐÔ¡¢ÏµÍ³ÐԵķ¢Ã÷ųÈõÐÔ£¬½µµÍÇ徲Σº¦£¬ÒѳÉÎªÍøÂçÇå¾²·ÀÓùµÄÒªº¦Ò»»·¡£º£ÄÚÐí¶à´óÐÍÆóÒµµÄÇå¾²ÖÎÀí²¿·ÖÒ²×îÏȾ߱¸°üÀ¨Ö°¹¤Çå¾²Åàѵ¡¢Çå¾²ÆÀ¹À¼ì²éµÈÄÜÁ¦¡£Elevate Security»ùÓÚÆ½Ì¨ÌṩµÄ´¹ÂÚÓʼþ¹¥»÷Ä£Äâ¡¢¿ÉÊÓ»¯ÆÊÎö¡¢Óʼþ·´Ïìϵͳ¼°³¡¾°Ê½µÄÇå¾²ÅàѵÄÜÁ¦£¬ÏòÒµ½çÌṩÁËÒ»¸öÆóÒµÇå¾²ÎÄ»¯ÅàÓýµÄƽ̨»¯·¶±¾£¬Äܹ»¸øÖÖÖÖÐÍ×éÖ¯¶ÔСÎÒ˽¼ÒÇå¾²ÐÐΪµÄÖÎÀí»úÖÆºÍÒªÁìÌṩÓÐÁ¦µÄÄ£°å¡£Í¬Ê±£¬ÒÔÃæÏòÈ˵ÄÇå¾²ÐÐΪÒòËØÔÚÍøÂçÇå¾²³¡¾°ÏµÄΣº¦¹Ü¿Ø±Õ»·ÎªÖ÷Ì⣬½²ÊöÁËÒ»¸öÍêÕû²¢ÇÒÇÐÖÐÖÎÀíÍ´µãµÄºÃ¹ÊÊ¡£²»Ö¹ÓÚ´Ë£¬Elevate SecurityÌṩµÄ²»Ö¹ÊÇ˼Ð÷ºÍ»úÖÆµÄÁ¢Òì¡£¸Ã¹«Ë¾»ùÓÚÒÑÓÐÆ½Ì¨£¬Ìá¹©ÃæÏò¸÷¿Í»§×éÖ¯µÄ¶¨ÖÆ»¯½â¾ö¼Æ»®£¬°üÀ¨Êý¾Ý½ÓÈë¡¢Çå¾²Á÷³ÌµÈ²ãÃæµÄ¶¨ÖƺÍ×Éѯ£¬ÕâЩƽ̨ÊÖÒÕÖ®ÍâµÄÄÜÁ¦Ôö²¹Í¬ÑùÊǸù«Ë¾µÄ½¹µã¾ºÕùÁ¦¡£
´ÓÏÖÓÐ×ÊÁÏÀ´¿´£¬Elevateƽ̨ÌṩµÄ¹¦Ð§¿ÉÒÔÓüòÔ¼¶ø²»¼òÆÓÀ´¹éÄÉ×ۺϡ£Elevateƽ̨ËùÕ¹ÏֵĹ¦Ð§Ò»Ä¿ÁËÈ»£¬Ò²Ã»ÓзºÆðÖØ´óµÄÁ÷³Ì£¬Æ½Ì¨±³ºóËùʹÓõÄÊÖÒÕ²»ÊÇÆä½¹µã¾ºÕùÁ¦¡£“Let's target security behavior change, not awareness.”ElevateµÄ½¹µã¹¦Ð§õè¾¶ºÜÇåÎú£¬ÒÔÔ±¹¤Çå¾²ÐÐΪµÄ¸ÄÉÆ×÷ΪĿµÄ£¬Ìṩ°üÀ¨¶¨ÖÆ»¯µÄÊý¾ÝÕÉÁ¿¡¢¼¯³É¡¢ÆÊÎö¡¢·´Ïì¡¢Ðж¯£¨Åàѵ£©µÄÁ÷³Ìµü´úºÍ±Õ»·£¬ÒÔ¼°Ò»Á¬µÄ¡¢Á¿»¯µÄΣº¦ÆÀ¹À»úÖÆÓëÆ½Ì¨£¬ÌáÉýÖÎÀíÕß¶ÔÆóÒµÕûÌåµ½Ô±¹¤Ð¡ÎÒ˽¼ÒµÄÇ徲Σº¦Æ·¼¶µÄ¶´¼û¡¢¼à¿ØºÍÖÎÀíÄÜÁ¦¡£ÒÔÁ¿»¯µÄ·½·¨¹Ø×¢È˵ÄÇå¾²ÐÐΪ¸ÄÉÆ¶øÒ»Ö±ÁôÓÚÌîѼʽµÄÇå¾²Åàѵ£¬Elevate SecurityÊÇÍ»ÆÆ¹Å°åÇå¾²ÒâʶÅàѵ²úÆ·ÐÎ̬¹ÌÓÐ˼Ð÷µÄÏÈÐÐÕß¡£ÐÅÍÐδÀ´Elevateƽ̨»áÌṩ¸ü¶àµÄƽ̨»¯×é¼þ£¬Öª×ãÖÖÖÖÐÍ×éÖ¯¶ÔÄÚ²¿Ö°Ô±µÄ¶¯Ì¬¡¢Ò»Á¬¡¢×Ô˳ӦµÄÇå¾²ÐÐΪΣº¦Á¿»¯ÆÀ¹ÀÓëÇå¾²ÐÐΪÌáÉýÐèÇó£¬ÒÔ˳Ӧ¸ü¸ß¼¶µÄ¹¥·À³¡¾°¡¢¸üÑϽ÷µÄÖ´ÂÉÀýÔòÒªÇó¡£
²Î¿¼ÎÄÏ×
- https://elevatesecurity.com/
- https://www.crunchbase.com/organization/elevate-security
- ¡¶Understanding Security of the Cloud: from Adoption Benefits to Threats and Concerns¡·
- https://www.gartner.com/doc/3950454
- Top Cybersecurity Trends for 2016-2017, Gartner Security & Risk Management Summit 2016

¾ÅÓÎÀϸçÔÆ







