´ÓRSAC2022Á¢ÒìɳºÐ¿´ÔÆÔ­ÉúÇå¾²ÈüµÀµÄÉú³¤

Ðû²¼Ê±¼ä 2022-06-02

Ò»ÄêÒ»¶ÈµÄRSA´ó»á

½«ÓÚ½ñÄê6ÔÂ6ÈÕÕýʽ¾ÙÐÐ
ÆäÖУ¬£¬£¬£¬£¬£¬£¬Á¢ÒìɳºÐ´óÈü

(Innovation Sandbox)
×÷Ϊ¡°Ç徲ȦµÄ°Â˹¿¨¡±
ÿÄ걸ÊÜÖõÄ¿£¬£¬£¬£¬£¬£¬£¬
³ÉΪȫÇòÍøÂçÇå¾²ÐÐÒµ
ÊÖÒÕÁ¢ÒìºÍͶ×ʵķçÏò±ê


1.jpg


ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬Á¢ÒìɳºÐ´óÈüµÄ¾öÈüÈëΧÃûµ¥ÒѾ­³ö¯£¬£¬£¬£¬£¬£¬£¬»®·ÖÊÇAraali Networks¡¢BastionZero¡¢Cado Security¡¢Cycode¡¢Dasera¡¢Lightspin¡¢Neosec¡¢Sevco Security¡¢Talon Cyber SecurityºÍTorqÊ®¼ÒÓÅÒìÊ×´´ÆóÒµ£¬£¬£¬£¬£¬£¬£¬Ö÷񻃾¼°ÔÆÔ­ÉúÇå¾²¡¢½ÓÈëÇå¾²¡¢Èí¼þ¹©Ó¦Á´Çå¾²¡¢Êý¾ÝÖÎÀí¡¢APIÇå¾²ºÍÇå¾²ÔËÓª¶à¸öÈüµÀ¡£¡£¡£¡£Õâ10¼ÒÊ×´´¹«Ë¾½«ÓÚ6ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬ÏòÈ«Çò¹ÛÖÚչʾËûÃÇÔÚÍøÂçÇå¾²ÐÐÒµÉϵÄÊÖÒÕÁ¢Ò죬£¬£¬£¬£¬£¬£¬½ÇÖð×îºóÓ®¼Ò£¬£¬£¬£¬£¬£¬£¬Ò²½«´øÀ´ÐÂÒ»ÂֵĻðÈÈÈüµÀ¡£¡£¡£¡£



ÅÌ»õÁ¢ÒìɳºÐÖ®ÔÆÔ­ÉúÇå¾²ÈüµÀÆóÒµ



×ÜÀÀ½ñÄêÈëΧ¾öÈüµÄÊ®¼ÒÊ×´´ÆóÒµ£¬£¬£¬£¬£¬£¬£¬ÓÐËļҲÎÈüÆóҵѡÔñÁËÔÆÔ­ÉúÇ徲ϸ·ÖÁìÓò£¬£¬£¬£¬£¬£¬£¬ÕâÔÚÀú½ìRSACÁ¢ÒìɳºÐ´óÈüÖнÏÁ¿ÉÙ¼û£¬£¬£¬£¬£¬£¬£¬¿É¼ûÔÆÔ­ÉúÇå¾²ÈüµÀµÄÈȶÈ×ã¹»¸ßÕÇ¡£¡£¡£¡£ÏÂÃæÎÒÃǾÍÀ´ÅÌ»õ±¾´ÎÈëΧ¾öÈüµÄ4¸öÔÆÔ­ÉúÇ徲ƫÏòÁ¢ÒìÆóÒµ¡£¡£¡£¡£


1¡¢Araali Networks£ºÔÆÔ­ÉúÇéÐÎϵÄÍþв·ÀÓù


2.png


Araali NetworksÌṩÁËÒ»¿îÃæÏòÔÆÔ­ÉúÇéÐεÄÍþв¼ì²âºÍΣº¦»º½âµÄÊÖÒÕ¿ò¼Ü£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔʶ±ðÓ¦ÓÃÎó²î¡¢»á¼ûȨÏÞ¡¢ÔÆÇéÐÎÉèÖõȶàά¶ÈΣº¦£¬£¬£¬£¬£¬£¬£¬²¢Ìṩµ¯ÐÔ²¹¶¡¶ÔΣº¦¾ÙÐлº½âºÍÐÞ¸´£¬£¬£¬£¬£¬£¬£¬´Ó¶øÓÐÓ÷ÀÓù¶ñÒâ´úÂë¡¢ÀÕË÷²¡¶¾¡¢Ä¾ÂíºóÃŵÈÊֶζÔÔÆÔ­ÉúÇéÐεÄÍþв¡£¡£¡£¡£Araali NetworksµÄÖ÷ÒªÊÖÒÕÌØÉ«ÊÇʹÓÃÁËeBPFÊÖÒÕ¶Ôk8sÔËÐÐʱµÄ»á¼û¿ØÖÆÕ½ÂÔ¾ÙÐÐϸÄåÖÎÀí£¬£¬£¬£¬£¬£¬£¬½µµÍ×ÊÔ´Õ¼Ó㬣¬£¬£¬£¬£¬£¬ÌáÉýʵʱ´¦Öóͷ£Ð§ÂÊ¡£¡£¡£¡£


2¡¢Cado Security£ºÔÆÔ­ÉúÇéÐÎϵÄÊÂÎñȡ֤ºÍÏìÓ¦


3.png


Cado Security ÌṩÁËÒ»¿î½Ð×öCado ResponseµÄÔÆÇéÐÎÊÓ²ìȡ֤ƽ̨²úÆ·£¬£¬£¬£¬£¬£¬£¬Ê¹Çå¾²ÍŶÓÄܹ»ÒÔÔÆµÄËÙÂÊÏìÓ¦Íþв¡£¡£¡£¡£Í¨¹ýÔÚÔÆºÍÈÝÆ÷ÇéÐÎÖÐ×Ô¶¯Ö´ÐÐÊý¾Ý²¶»ñºÍ´¦Öóͷ££¬£¬£¬£¬£¬£¬£¬Cado Response¿ÉÒÔÌṩȡ֤¼¶±ðµÄÏêϸÐÅÏ¢ºÍÅä¾°ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬´Ó¶øÏû³ýÔÆÖÐÍøÂçÇå¾²ÊÂÎñÆÊÎöµÄÖØ´óÐÔ¡£¡£¡£¡£Cado ResponseÊÇÎÞÊðÀíģʽ£¬£¬£¬£¬£¬£¬£¬Ö§³ÖÔÆÔ­ÉúÇéÐÎ×Ô¶¯»¯°²ÅÅ£¬£¬£¬£¬£¬£¬£¬Ö§³Öͨ¹ý¿ç¶àÔÆÇéÐΣ¨°üÀ¨ÐéÄâ»ú¡¢KubernetesÇéÐΣ©¡¢ÈÝÆ÷ÇéÐΡ¢ÎÞЧÀÍÆ÷ÇéÐκÍÍâµØÏµÍ³ÇéÐξÙÐÐÊÂÎñÏìÓ¦ºÍ×Ô¶¯»¯ÊÓ²ìȡ֤¡£¡£¡£¡£Cado SecurityµÄÊ×´´ÈËÒ²ÊÇÖøÃûµÄÍþвÇ鱨ƽ̨ThreatCrowdµÄ¹¹½¨Õߣ¬£¬£¬£¬£¬£¬£¬ÔÚÍþвÇé±¨ÍøÂçºÍÑо¿Æ«ÏòÉϾßÓи»ºñµÄ»ýÀÛ£¬£¬£¬£¬£¬£¬£¬Òò´ËǿʢµÄÇé±¨ÍøÂçºÍÊÂÎñ±ê×¢ÄÜÁ¦³ÉΪCado Response²úÆ·µÄÒ»´óÁÁµã¡£¡£¡£¡£


3¡¢Lightspin£º»ùÓÚÉÏÏÂÎÄÆÊÎöµÄÔÆÔ­ÉúÓ¦ÓóÌÐò± £»£»£»£» £»£»¤Æ½Ì¨



4.png


LightspinÍÆ³öÁËÔÆÔ­ÉúÓ¦ÓóÌÐò± £»£»£»£» £»£»¤Æ½Ì¨ (CNAPP)£¬£¬£¬£¬£¬£¬£¬´ÓÈëÇÖÕßµÄÊÓ½ÇÀ´¿´´ýÔÆÇéÐΣ¬£¬£¬£¬£¬£¬£¬Á½¸öÖ÷ÒªÌØÉ«Êǹ¥»÷·¾¶ÆÊÎöºÍÍþв¿ÉÊÓ»¯¡£¡£¡£¡£Lightspin ƽ̨֧³Ö DevOps£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÇå¾²×óÒÆ£¬£¬£¬£¬£¬£¬£¬ÊµÏÖIaC£¨»ù´¡ÉèÊ©¼´´úÂ룩Çå¾²£¬£¬£¬£¬£¬£¬£¬²¢ÊÊÓÃÓÚÔÆÔ­ÉúÇå¾²µÄËùÓн׶Ρ£¡£¡£¡£¸Ãƽ̨¿ÉÒÔʶ±ðÔÆÔ­ÉúÇéÐÎÖеĹ¥»÷·¾¶£¬£¬£¬£¬£¬£¬£¬²¢»ùÓÚÉÏÏÂÎĶԹ¥»÷·¾¶¾ÙÐÐÆÊÎö£¬£¬£¬£¬£¬£¬£¬´Ó¶ø±êʶ¹¥»÷·¾¶Öи澯µÄÓÅÏȼ¶¡£¡£¡£¡£LightspinÔÚ2021ÄêµÄ RSA´ó»áÉÏÒѾ­Õ¸Â¶Í·½Ç£¬£¬£¬£¬£¬£¬£¬»ñµÃÁËCDM Global Infosec½ÒÏþµÄSaaS/ÔÆÇå¾²ÈÈÃŹ«Ë¾½±¡£¡£¡£¡£


4¡¢Sevco Security£ºÃæÏòÔÆÔ­ÉúºÍÍâµØÇéÐεĴ󶼾ÝÈÚºÏ×ʲúÖÎÀíÆ½Ì¨


5.png


Sevco SecurityÌṩÁËÒ»Ì×Äܹ»»ùÓÚÔÆÔ­ÉúÇéÐΰ²ÅŵÄ×ʲúÖÇÄÜÖÎÀíÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬¿Éͨ¹ýAPI¶Ô½Ó²î±ðÊý¾ÝÔ´µÄ×ʲúÇåµ¥¶ÔÔÆÔ­ÉúºÍÍâµØÇéÐεĶàÔ´×ʲúÖÎÀíÈí¼þµÄÊý¾Ý¾ÙÐÐÈںϣ¬£¬£¬£¬£¬£¬£¬½¨Éè¸üÖÜÈ«µÄ×ʲú¿â£¬£¬£¬£¬£¬£¬£¬ÒÔʶ±ðÆóÒµÍøÂçÖеÄųÈõ×ʲú£¬£¬£¬£¬£¬£¬£¬´Ó¶øÊµÊ±¸ú×Ù×ʲú¿âÖÐ×ʲú״̬ת±äÇéÐΡ£¡£¡£¡£Sevco SecurityµÄÖ÷ÒªÍŶӳÉÔ±À´×ÔCarbon Black£¬£¬£¬£¬£¬£¬£¬ÔÚÖ÷»úÇå¾²ºÍÖÕ¶Ë×ʲúÖÎÀíÆ«ÏòÉÏÓкÜÊǸ»ºñµÄ»ýÀÛºÍʵ¼ùÂÄÀú¡£¡£¡£¡£ÏÖÔÚÒѾ­¶Ô½ÓÁËAutomox¡¢CrowdStrike¡¢Lansweeper¡¢MalwareBytes Nebula¡¢Microsoft AD 5¸ö³§É̵Ä×ʲúÊý¾Ý£¬£¬£¬£¬£¬£¬£¬Ö§³Ö¶Ô´ó¶¼¾ÝÔ´×ʲúµÄ½»Ö¯ÅÌÎʺͼìË÷¡£¡£¡£¡£



ÔÆÔ­ÉúÇå¾²½«Ó­ÐÂÈÈÃÅÈüµÀ



ËļÒÈëΧÁ¢ÒìɳºÐ¾öÈüµÄÔÆÔ­ÉúÇå¾²ÈüµÀÆóÒµ£¬£¬£¬£¬£¬£¬£¬Æä²úÆ·ÁýÕÖÁËÔÆÔ­ÉúÇå¾²µÄ¸÷¸ö·½Ã棬£¬£¬£¬£¬£¬£¬°üÀ¨ÁËÔÆÔ­ÉúÇéÐÎϵÄ×ʲúÖÎÀí¡¢Íþв¼ì²â¡¢È¡Ö¤ÏìÓ¦ºÍÕû¸öÉúÃüÖÜÆÚµÄÇå¾²·À»¤ºÍ¹¥»÷Á´¿ÉÊÓ»¯£¬£¬£¬£¬£¬£¬£¬ÈçÏÂͼËùʾ£º


6.png


ͨ¹ý¶ÔÈëΧ³§ÉÌµÄÆÊÎö¿ÉÒÔ·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÔÆÔ­ÉúÇå¾²ÒѾ­³ÉΪ±±ÃÀµØÇøµÄÈÈÃÅÈüµÀ£¬£¬£¬£¬£¬£¬£¬²¢ÇÒ¹Ø×¢¶ÈÒ»Á¬Ôö¸ß¡£¡£¡£¡£


Ëæ×ÅÔÆÅÌËãµÄÆÕ±éÉú³¤ºÍÓ¦Ó㬣¬£¬£¬£¬£¬£¬ÎÒ¹úµÄÔÆÔ­ÉúÇå¾²Ò²½«Ó­À´ÖÜÈ«µÄ±¬·¢ÔöÌí¡£¡£¡£¡£¾Ý2021ÄêµÄÖйúÔÆÔ­ÉúÐÐÒµÑо¿±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬Áè¼Ý60%µÄÔÆÔ­ÉúÓû§ÒѾ­ÔÚÉú²úÇéÐÎÖÐÓ¦ÓÃÁËÈÝÆ÷ÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬½ü30%µÄÓû§ÕýÔÚ²âÆÀ»òÕýÔÚ˼Á¿Ê¹ÓÃÈÝÆ÷ÊÖÒÕ¡£¡£¡£¡£


ÈÝÆ÷ÊÖÒÕÊÇÔÆÔ­Éúϵͳµ×²ãÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬Òò¶øÈÝÆ÷Çå¾²Ò²ÊÇÔÆÔ­ÉúÇå¾²µÄ»ùʯ¡£¡£¡£¡£ÈÝÆ÷±àÅÅÊÖÒÕ¡¢Î¢Ð§ÀÍÊÖÒÕºÍ΢¸ôÀëÊÖÒÕµÄÉú³¤£¬£¬£¬£¬£¬£¬£¬Ò²ÎªÈÝÆ÷ÊÖÒÕ´´Á¢ÁËÍêÉÆµÄÉú̬ÇéÐκÍÊÖÒÕϵͳ£¬£¬£¬£¬£¬£¬£¬Ö§³ÖÁËÈÝÆ÷ÊÖÒյįձéÓ¦Óú͵ü´úÉú³¤¡£¡£¡£¡£


Ëæ×ÅÓªÒµÐèÇóÓëÊÖÒÕÐèÇóµÄË«ÂÖÇý¶¯£¬£¬£¬£¬£¬£¬£¬ÈÝÆ÷Çå¾²ÊÖÒÕ½«»áÓëÔÆÔ­Éú¼Ü¹¹Ò»ÆðЭͬÉÑݽø£¬£¬£¬£¬£¬£¬£¬²¢Ò»Ö±ÍØÕ¹ÆäÓ¦Óó¡¾°£¬£¬£¬£¬£¬£¬£¬ÎªÔËÓªÉÌ¡¢ÄÜÔ´¡¢½ðÈÚ¡¢»¥ÁªÍøµÈÐÐÒµÓû§´´Á¢³ö¸ü¶à¼ÛÖµ¡£¡£¡£¡£


7.png


×÷Ϊº£ÄÚ½ÏÔç¼ÓÈëÔÆÔ­ÉúÇå¾²³§ÉÌÖ®Ò»£¬£¬£¬£¬£¬£¬£¬Z6×ðÁú¿­Ê±¼¯ÍÅÔÚÕþ¸®¡¢ÔËÓªÉÌ¡¢ÄÜÔ´¡¢½ðÈÚµÈÐÐÒµ»ýÀÛÁËÖÚ¶àÏîĿʵսÂÄÀú£¬£¬£¬£¬£¬£¬£¬¾ß±¸ÍêÕûµÄÔÆÔ­ÉúÇå¾²²úÆ·Á´Ìõ¡£¡£¡£¡£²úÆ·ÒÔÔÆÔ­ÉúÉúÃüÖÜÆÚΪ½¹µã£¬£¬£¬£¬£¬£¬£¬ÒÔÇå¾²×óÒÆÎªÍ·ÄÔ£¬£¬£¬£¬£¬£¬£¬½«Çå¾²ÄÜÁ¦ÖÜÈ«ÈÚÈëµ½DevOpsϵͳÖУ¬£¬£¬£¬£¬£¬£¬¹¹½¨ÃæÏòDevSecOpsÈ«ÉúÃüÖÜÆÚÇå¾²·À»¤ÏµÍ³£¬£¬£¬£¬£¬£¬£¬ÖúÁ¦²î±ðÐÐÒµÓû§¼Æ»®µÄ¿ìËÙÂ䵨£¬£¬£¬£¬£¬£¬£¬×ÊÖúÓû§½â¾ö»ù´¡ÉèÊ©ÔÆ»¯Àú³ÌÖÐÓªÒµÃæÁÙµÄÏÖʵÎÊÌâ¡£¡£¡£¡£