ÀHµÛ¥b¾ÉÅé³]³ÆªºÁpºô»Ý¨D¤Î²£·~¤W¤U´åªººò±K¦X§@¡A·N¨ýþÓ¥ô¦ó¸ê°T¶Ç»¼ªº¦w¥þº|¬}³£¥i¯à¥[¼@¸ê¦wªº«Â¯Ù»P¬D¾Ô¡AªøZ¬ì§Þ¡]EverMore¡^±À¥Xªº¸ê¦w²£«~¡uTP-SEC¡v¡A©ó¤µ¦~SEMICON TAIWAN®i´£¥X¸Ñ¤è¡A°w¹ï¸ê¦w°ÝÃD»P¨¾¿m¡A´£¨Ñ§Þ³N»PºÞ²z¬Û¤¬µ²¦Xªº¥þ±µ¦²¤¡A½T«O¥b¾ÉÅé²£·~¦b§Ö³tµo®iªº¦P®É¡A¤´¯à«O«ùéw©M¦w¥þ¹B¦æ¡C
ªøZ¬ì§Þ¦h¦~¨Ó±Mª`©ó¥[±K©M¸Ñ±K§Þ³Nªº¬ãµo¡A¨Ã¿n·¥±À°Ê¹s«H¥ô®Ø¬[¡]Zero Trust Framework¡^ªºÀ³¥Î¡C¸ê¦w²£«~¡uTP-SEC¡vµ²¦X¡u¹s«H¥ô¡]Zero-Trust¡^¡v©M¡u·L¹jÂ÷¡]Micro-Isolation¡^¡v§Þ³N¡AÀ³¥Î©ó±j¤ÆAD¡]Active Directory¡^ªº¦h¦]¤lÅçÃÒ¡]Multi-Factor Authentication, MFA¡^¡A¦b¤£¼vÅTAD¾Þ§@©MÅvºÞ²z«e´£¤U¡A¼W±j¦w¥þ¨¾Å@¡A¨Ã¥]§t°w¹ïÀɮסB¨¤À¤ÎºÝÂIªº»{ÃÒ¨¾Å@¾÷¨î¡A´£°ª¹ï§Ü¶i¶¥«ùÄò©Êº¯³z§ðÀ»¡]Advanced Persistent Threat, APT¡^©M°Ç¯Á³nÅé§ðÀ»¡]Ransomware¡^ªº¯à¤O¡C
ªøZ¬ì§Þ«ü¥X¡A¹s«H¥ô©M·L¹jÂ÷¬Oºò±K¬ÛÃöªº¦w¥þµ¦²¤¡A¨ä¤¤·L¹jÂ÷¬O¹ê²{¹s«H¥ô¦s¨ú¡]Zero Trust Access, ZTA¡^ªº®Ö¤ß§Þ³N¡C³z¹L¹s«H¥ôì«h¡A¥i¥H½T«O¥¼¸g±ÂÅvªº¦s¨ú³Qªý¤î¡AY¬YÓºÝÂI¾D¨ì¤J«I©Î¨¤À³Q«_¥Î¡A·L¹jÂ÷´N¯à¨¾¤î«Â¯Ù¦b¨t²Î¤º³¡¾î¦VÂX´²¡A±q¦Ó«OÅ@¨ä¥L¾÷±K¸ê®Æ¨Ó·½¡C
·L¹jÂ÷ÁÙ¯à±Nºô¸ô¤¤ªº¨CÓºÝÂI¹ê¬I¨¤À¹jÂ÷¡A¦P®ÉÁY¤p§ðÀ»±¡A¨Ï§ðÀ»ªÌ¥u¯à¦s¨úÀô¹Ò¤¤ªº¤@¤p³¡¤À¡A¨Ã³z¹L¸Ô²Óªº¬Fµ¦©M¹jÂ÷¡A¨îº|¬}ªºÂX´²½d³ò¡AÀ°§U¸ê¦w¹Î¶¤§ó¨³³t¦³®ÄÀ³¹ï«Â¯Ù¡A¥B¤¹³\¹ï¨üºÞ¨îªº¾÷±Ó¸ê®Æ¶i¦æºë·Ç±±¨î¡A±q¦Ó´£°ª¦X³W©Ê¡Aº¡¨¬¤£¦Pªk³Wªºn¨D¡C
¡uTP-SEC¡v¬OªøZ¬ì§Þ»P¬ü°êª¿¨¦Jonetix¸ê¦w¬ì§Þ¤½¥q¦X§@¶}µoªº¦¨ªG¡A¤wÀò±o¦h¶µ¸ê¦w¬ÛÃö±M§Q§Þ³N¡C¥¼¨ÓªøZ¬ì§Þ±N¿n·¥±À¼s¡uTP-SEC¡v¦Ü¦UÓÀ³¥Î»â°ì¡A¥H¼W±j¤¤¤p¥ø·~ªº¸ê¦w¨¾Å@¯à¤O¡C <ºK¿ý¸gÀÙ>