* [Blog](https://www.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com/blog/corporate/) * [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr) * 保護端點的 10 項要求... # 保護端點的 10 項要求 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2018%2F12%2F10-requirements-securing-endpoints%2F%3Flang%3Dzh-hant) [](https://twitter.com/share?text=%E4%BF%9D%E8%AD%B7%E7%AB%AF%E9%BB%9E%E7%9A%84+10+%E9%A0%85%E8%A6%81%E6%B1%82&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2018%2F12%2F10-requirements-securing-endpoints%2F%3Flang%3Dzh-hant) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2018%2F12%2F10-requirements-securing-endpoints%2F%3Flang%3Dzh-hant&title=%E4%BF%9D%E8%AD%B7%E7%AB%AF%E9%BB%9E%E7%9A%84+10+%E9%A0%85%E8%A6%81%E6%B1%82&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/2018/12/10-requirements-securing-endpoints/?lang=zh-hant&ts=markdown) \[\](mailto:?subject=保護端點的 10 項要求) Link copied By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?lang=zh-hant&ts=markdown "Posts by Palo Alto Networks") Dec 25, 2018 1 minutes [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) 幾十年來,傳統的防毒軟體一直是端點實際採用的解決方案。防毒軟體會檢查法規、監管和合規性稽核的所有層面,不過只為組織提供最低程度的安全防護。雖然防毒解決方案保護著世界上近乎所有的端點與伺服器,安全性漏洞的數量卻仍以令人擔憂的速度增加。這主要是因為傳統的防毒軟體是以特徵碼為基礎的安全工具,著重於偵測和回應已進入網路的已知威脅。經驗豐富的攻擊者可以透過廉價的自動化線上工具避開防毒軟體,這些工具可以發動無數次各不相同的未知攻擊。最終,傳統的防毒軟體將不足以保護系統免於遭受安全漏洞的侵害。 為預防安全漏洞,各組織不僅必須保護自身不受已知與未知的網路威脅侵擾,還必須保護自身不被傳統防毒解決方案的失敗所拖累。這表示各組織必須著重於預防。預防才是唯一能減少網路漏洞頻率與影響的有效、可擴充與永續經營方針。那麼,端點安全應該如何才能有效且全面地保護系統、使用者和端點?下列各節將討論這 10 項要求。 **1.預先封鎖已知和未知威脅** 為預防安全漏洞,必須改變事件發生後才偵測和回應事件的做法,應在第一時間防止安全漏洞發生。無論機器是在連線當中或者離線、位於公司內部或外部,以及是否連線到組織的網路,都必須保護端點免於遭受透過惡意軟體提供的已知、未知和零時差威脅以及入侵。實現此目標的關鍵步驟是結合本機和雲端式威脅分析來偵測和預防未知和迴避式威脅。 **2.對使用者生產力不造成負面影響** 進階端點安全產品必須能夠讓最終使用者展開日常業務,並運用行動和雲端技術,讓使用者不需要擔心未知的網路威脅。使用者應能夠專注於本身的職責,而不需要擔心安全修補和更新。使用者必須確信自己受到保護,不會在無意間執行可能破壞系統的惡意軟體或入侵。 **3.將威脅情報自動轉變為預防** 在別處遭遇嶄新獨特攻擊 (例如第三方情報服務提供者和公開威脅情報共享結構) 時取得威脅情報,必須能夠讓端點代理程式立即預防已知惡意軟體、識別和封鎖未知惡意軟體,並阻止兩者感染端點。另外,還須從組織內部收集網路、雲端和端點的威脅數據。必須使用自動化技術來關聯數據、識別入侵指標、建立防護並推送到整個組織。 **4.保護所有應用程式** 應用程式是任何組織能夠有效運作的核心。不過,應用程式中的安全缺陷或錯誤會為攻擊者提供傳統防毒軟體無法保護的廣泛攻擊範圍。組織的安全基礎架構應該能夠為所有應用程式 (包括第三方和專屬應用程式) 提供全面的入侵防範措施。這也應該能夠加快新應用程式的核准過程,藉由快速的安全裁定將新的應用程式引入環境。 **5.不要讓安全性影響系統效能** 安全產品不應該增加系統資源 (例如 RAM、CPU 或磁碟儲存容量) 的負擔。預防安全漏洞絕不能損及使用者體驗。端點防護或這方面的任何安全工具都必須相當精簡,不需要使用大量系統資源,否則必然妨礙系統效能,並損及使用者體驗。 **6.維護舊型系統安全** 各組織不一定都能夠立即部署可用的系統更新和安全修補,因為這樣做會干擾、削減或消除關鍵的作業能力,也可能是因為已達到使用壽命的舊型系統和軟體沒有可用的修補程式。無論安全修補程式可用與否或是否應用,完整的端點安全解決方案都必須防範已知或未知的軟體弱點入侵以支援無法修補的系統。 **7.可供企業採用** 意圖取代防毒軟體的任何安全解決方案都應該具有足夠的可擴充性、靈活性和可管理性,才能在企業環境中進行部署。端點安全應支援並整合企業部署其運算資源的方式,根據需要盡可能擴展到最多的端點,並支援在分散多地的環境中進行部署。同時,必須靈活提供充分的保護,並仍支援業務需求,且不過度限制業務發展。這種靈活性相當重要,因為組織內部各部份間的需求可能完全不同。此外,該解決方案還必須能夠由肩負管理組織其他部份安全的相同群組輕鬆管理。因此,設計時必須考量企業管理層面,而不增加營運負擔。 **8.提供產業合規性要求的獨立驗證** 法規遵從性通常要求屬於特定管轄區的組織採用防毒軟體來保護其端點。若要在滿足合規性要求的同時主動保護端點,取代現有防毒解決方案的端點安全廠商應該能夠提供第三方驗證,以便客戶實現或維護合規性。 **9.提供獨立驗證做為防毒替代做法** 在理想情況下,意圖取代傳統防毒軟體的任何安全產品都應該由獨立的第三方來審查和驗證其效能。進行獨立審查將提供尋求防毒替代做法的組織無法進行的基本檢查。 **10.獲得頂級產業分析師和/或研究機構的認可** 希望擺脫傳統防毒軟體的任何組織都應該確保備受尊重的分析師或研究機構認可該替代做法是端點安全領域的有效方案。這將確保解決方案及其供應商滿足端點安全提供者的多項可行性標準要求。 現今,在針對性攻擊廣泛利用未知惡意軟體和弱點入侵的情况下,主動保護端點比以往任何時候都更加重要。Palo Alto Networks^®^ Traps™ 進階端點防護透過多重方法防禦措施取代傳統防毒軟體,在端點可能遭受破壞之前阻止已知和未知威脅。作為 [Palo Alto Networks Security Operating Platform](https://www.paloaltonetworks.tw/products/security-operating-platform.html) 一部份的 Traps 整合[WildFire](https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/wildfire?ts=markdown) 雲端式威脅分析服務,用於將來自全球社群的威脅情報轉換為惡意軟體防護措施,無論威脅來自何處,都會自動阻止針對端點的威脅。若要瞭解有效的端點安全解決方案必須如何防範安全漏洞,以及 Traps 如何有效替代防毒軟體,請前往 [Traps](https://www.paloaltonetworks.tw/products/traps.html) 頁面。 *** ** * ** *** ## Related Blogs ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### Strata Copilot - 加速邁向自發性網路安全性的未來](https://www.paloaltonetworks.com/blog/network-security/introducing-strata-copilot/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 醫療企業是勒索軟體攻擊者的首要目標](https://www.paloaltonetworks.com/blog/2021/10/healthcare-organizations-are-the-top-target/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 適用於 5G 的零信任:實現安全的數位轉型](https://www.paloaltonetworks.com/blog/2021/10/zero-trust-for-5g-digital-transformation/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 網路攻擊鎖定金融服務企業的 3 個原因以及防禦方式](https://www.paloaltonetworks.com/blog/2021/10/financial-services-cyberattacks/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 連續 7 年提供出色的客戶服務](https://www.paloaltonetworks.com/blog/2021/10/delivering-outstanding-customer-service/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### Palo Alto Networks 研究:61% 的企業難以確保在家工作的遙距網絡安全](https://www.paloaltonetworks.com/blog/2021/09/state-of-hybrid-workforce-security-2021/?lang=zh-hant) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language