Proofpoint ํŒจํ‚ค์ง€๋กœ ๊ฐ€์น˜ ์ตœ์ ํ™”

๊ฐœ์š”

Proofpoint Collaboration Security Prime์„ ํ†ตํ•ด ์—์ด์ „ํŠธํ˜• ์—…๋ฌด ๊ณต๊ฐ„์— ์™„๋ฒฝํ•œ ํ˜‘์—… ๋ณด์•ˆ์„ ๊ตฌํ˜„ํ•˜์‹ญ์‹œ์˜ค.

Collaboration Security Tier 2
Collaboration Security Tier 2
๊ณ„์ • ํƒˆ์ทจ ๋ฐฉ์ง€ ๋“ฑ์œผ๋กœ ์ด๋ฉ”์ผ ์™ธ๋ถ€๋กœ ๋ณดํ˜ธ ๋ฒ”์œ„๋ฅผ ํ™•์žฅํ•ฉ๋‹ˆ๋‹ค.
์ž์„ธํ•œ ์ •๋ณด
Collaboration Security Tier 3
Collaboration Security Tier 3
์ธ๊ฐ„ ์œ„ํ—˜ ๊ธฐ๋ฐ˜ ๊ต์œก ๋ฐ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ์ถ”๊ฐ€ํ•˜์—ฌ ๋ณดํ˜ธ๋ฅผ ๊ฐ•ํ™”ํ•ฉ๋‹ˆ๋‹ค.
์ž์„ธํ•œ ์ •๋ณด
Collaboration Security Prime
Collaboration Security Prime
๊ณ„์ธต 3์˜ ๋ชจ๋“  ๊ธฐ๋Šฅ์— ์‚ฌ์นญ ๋ฐฉ์ง€ ๊ธฐ๋Šฅ ์ถ”๊ฐ€
์ž์„ธํ•œ ์ •๋ณด
๋น„๊ต

์†”๋ฃจ์…˜์„ ๋น„๊ตํ•˜์—ฌ ํŒ€์— ์ ํ•ฉํ•œ ์†”๋ฃจ์…˜ ์ฐพ๊ธฐ

์ด๋ฉ”์ผ ๋ณด์•ˆ ์†”๋ฃจ์…˜์„ ์ฐพ๊ณ  ๊ณ„์‹ญ๋‹ˆ๊นŒ? Proofpoint Core Email Protection์„ ํ™•์ธํ•ด ๋ณด์‹ญ์‹œ์˜ค.

์ฃผ์š” ํŠน์ง• ๋ฐ ๊ธฐ๋Šฅ Core Tier 2 Tier 3 Prime
์—…๊ณ„ ์ตœ๊ณ  ์ˆ˜์ค€์˜ ์ด๋ฉ”์ผ ๋ณด์•ˆ
Yes
Yes
Yes
Yes
๊ณ„์ • ํƒˆ์ทจ๋กœ๋ถ€ํ„ฐ ๋ฐฉ์–ด
Yes
Yes
Yes
์†์ƒ๋œ ๊ณต๊ธ‰์—…์ฒด ๊ณ„์ •์œผ๋กœ๋ถ€ํ„ฐ ๋ฐฉ์–ด
Yes
Yes
Yes
๋ณด์•ˆ ๋ฉ”์‹œ์ง• ๋„๊ตฌ(์˜ˆ: Teams, Slack)
Yes
Yes
Yes
์ž๋™ํ™”๋œ ์œ„ํ˜‘ ์•ˆ๋‚ด ๊ต์œก ์ œ๊ณต
Yes
Yes
์œ„ํ˜‘์„ ์ฆ‰๊ฐ์  ์‹œ๋ฎฌ๋ ˆ์ด์…˜์œผ๋กœ ๋ณ€ํ™˜
Yes
Yes
๋„๋ฉ”์ธ ์‚ฌ๊ธฐ ๋ฐ ์Šคํ‘ธํ•‘ ๋ฐฉ์ง€
Yes
ํ˜ธ์ŠคํŒ…๋œ ์„œ๋น„์Šค(DMARC, DKIM, SPF)๋กœ ์ธ์ฆ ๊ฐ„์†Œํ™”
Yes
์œ ์‚ฌ ๋„๋ฉ”์ธ ํƒ์ง€ ๋ฐ ์ˆ˜์ •
Yes
๋ณด์•ˆ ์‘์šฉ ํ”„๋กœ๊ทธ๋žจ ์ƒ์„ฑ ์ด๋ฉ”์ผ
Yes
๊ฒฌ์  ์š”์ฒญ

Proofpoint Prime์„ ํ†ตํ•ด ์™„๋ฒฝํ•œ ํ˜‘์—… ๋ณด์•ˆ

FAQ

FAQ

์ €๋Š” ๊ธฐ์กด ๊ณ ๊ฐ์ž…๋‹ˆ๋‹ค. ๊ธฐ์กด ์š”๊ธˆ์ œ๊ฐ€ ์ƒˆ ์†”๋ฃจ์…˜์— ์–ด๋–ป๊ฒŒ ๋ฐ˜์˜๋˜๋‚˜์š”?

Proofpoint๋Š” ๊ธฐ์กด ๊ณ ๊ฐ์ด ์‚ฌ์šฉ ์ค‘์ธ ์†”๋ฃจ์…˜์„ ๊ฐฑ์‹ ํ•˜๋Š” ๊ฒƒ์„ ์กด์ค‘ํ•ฉ๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ์†”๋ฃจ์…˜์—๋Š” ์žฌ์ •์ ์œผ๋กœ ๋„์›€์ด ๋  ์ˆ˜ ์žˆ๋Š” ํŠน๋ณ„ ํ• ์ธ๊ณผ ์ถ”๊ฐ€ ๊ธฐ๋Šฅ์ด ๋‚ด์žฅ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค. Proofpoint ๊ณ„์ • ํŒ€๊ณผ ์ƒ์˜ํ•˜์—ฌ ์กฐ์ง์˜ ์š”๊ตฌ ์‚ฌํ•ญ์— ๊ฐ€์žฅ ์ ํ•ฉํ•œ ์†”๋ฃจ์…˜์„ ๊ฒฐ์ •ํ•˜์‹ญ์‹œ์˜ค.

์†”๋ฃจ์…˜ ๊ฐ€๊ฒฉ์€ ์–ด๋–ป๊ฒŒ ์ฑ…์ •๋˜๋‚˜์š”?

Proofpoint ์†”๋ฃจ์…˜์€ ๊ณ ๊ฐ์— ๋งž๊ฒŒ ๊ฐ€์น˜๋ฅผ ์ตœ์ ํ™”ํ•˜๋„๋ก ์„ค๊ณ„๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ์ฆ‰, ๊ฐ€๋Šฅํ•œ ๊ฐ€์žฅ ํšจ๊ณผ์ ์ด๊ณ  ํฌ๊ด„์ ์ธ ์†”๋ฃจ์…˜์„ ์ง€์† ๊ฐ€๋Šฅํ•œ ๊ฐ€๊ฒฉ์œผ๋กœ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์˜ˆ์‚ฐ ๊ฐ€๊ฒฉ์€ ์‚ฌ์šฉ์ž ๋ผ์ด์„ ์Šค ์ˆ˜์™€ ๊ณ„์•ฝ ๊ธฐ๊ฐ„(1๋…„ ๋˜๋Š” ๋‹ค๋…„ ๊ณ„์•ฝ)์— ๋”ฐ๋ผ ๋‹ฌ๋ผ์งˆ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์‚ฌ์šฉ๋Ÿ‰์— ๋”ฐ๋ฅธ ์˜ˆ์™ธ๊ฐ€ ์žˆ์œผ๋ฏ€๋กœ Proofpoint ๊ณ„์ • ํŒ€๊ณผ ์š”๊ตฌ ์‚ฌํ•ญ์— ๋Œ€ํ•ด ๋…ผ์˜ํ•˜์‹ญ์‹œ์˜ค.

์กฐ์ง์— ์–ด๋–ค ์†”๋ฃจ์…˜์ด ์ ํ•ฉํ•œ์ง€ ์–ด๋–ป๊ฒŒ ์•Œ ์ˆ˜ ์žˆ๋‚˜์š”?

Proofpoint์— ๋ฌธ์˜ํ•˜์‹ญ์‹œ์˜ค. ๋Œ€ํ™”๋ฅผ ํ†ตํ•ด ์กฐ์ง์˜ ๊ธฐ์ค€, ๊ณผ์ œ, ๋ฌธํ™”, ์˜ˆ์‚ฐ์— ๋Œ€ํ•ด ์ž์„ธํžˆ ์•Œ์•„๋ณด๊ณ  ๊ฒฐ์ •์„ ๋„์™€๋“œ๋ฆฌ๊ฒ ์Šต๋‹ˆ๋‹ค.