{"id":61066,"date":"2025-10-30T08:25:34","date_gmt":"2025-10-30T16:25:34","guid":{"rendered":"https:\/\/www.sumologic.com\/blog\/%eb%aa%a8%eb%93%a0-%ea%b5%ac%eb%a7%a4%ec%9e%90%ec%9d%98-%ed%88%b4%ed%82%b7%ec%97%90-gartner%ec%9d%98-siem-%ed%95%b5%ec%8b%ac-%ec%97%ad%eb%9f%89-%eb%b3%b4%ea%b3%a0%ec%84%9c%ea%b0%80-%eb%b0%98%eb%93%9c"},"modified":"2026-01-26T13:22:31","modified_gmt":"2026-01-26T21:22:31","slug":"gartner-critical-capabilities-for-siem-report","status":"publish","type":"blog","link":"https:\/\/www.sumologic.com\/ko\/blog\/gartner-critical-capabilities-for-siem-report","title":{"rendered":"Gartner Critical Capabilities for SIEM \ubcf4\uace0\uc11c\uac00 \ubaa8\ub4e0 \uad6c\ub9e4\uc790\uc758 \ud234\ud0b7\uc5d0 \ud3ec\ud568\ub418\uc5b4\uc57c \ud558\ub294 \uc774\uc720"},"content":{"rendered":"\n<section class=\"e-stn e-stn-0d652506f82b000a392973813b918ee25d5b4211 e-stn--glossary-inner-content e-stn--table-of-content\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-1f7b3997080fc292474d26ff00c905d99d3520fa e-col--content-wrapper  col-sm-12 col-lg-12 col-xl-12\">\n<div class=\"e-div e-div-a1b32f66e1749758df41d5aea14f647cd10e362c e-div--card-btn-link\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"200\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Header_Gartner_Critical_Capabilities_SIEM_Report_blog.png\" alt=\"\" class=\"wp-image-55742\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Header_Gartner_Critical_Capabilities_SIEM_Report_blog.png 700w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Header_Gartner_Critical_Capabilities_SIEM_Report_blog-300x86.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Header_Gartner_Critical_Capabilities_SIEM_Report_blog-575x164.png 575w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>\uac00\uc7a5 \uc548\uac1c \ub080 \ub0a0\uc5d0\ub3c4 \ub108\ub97c \uc548\ub0b4\ud574 \uc904 \ub3c4\uad6c\ub97c \ubc14\ub77c\ubcf8 \uc801 \uc788\uc5b4?<\/p>\n\n\n\n<p>\uadf8\uac8c \uc6b0\ub9ac \uc544\ubc84\uc9c0\uc758 \ub098\uce68\ubc18\uc774\uc5c8\uc5b4. \uc544\ubc84\uc9c0\ub294 \uadf8 \ub098\uce68\ubc18\uc774 \uc790\uc2e0\uc758 \uc704\uce58\ub97c \uc54c\ub824\uc918\uc11c\uac00 \uc544\ub2c8\ub77c, \uc9c4\uc815\ud55c \ubd81\ucabd\uc774 \uc5b4\ub514\uc778\uc9c0 \uc0c1\uae30\uc2dc\ucf1c \uc92c\uae30 \ub54c\ubb38\uc5d0 \uac00\uc9c0\uace0 \ub2e4\ub154\uc5b4.<\/p>\n\n\n\n<p>\ub098\ub294 \ubbf8 \ud574\uad70\uc5d0\uc11c 12\ub144 \ub3d9\uc548 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc804\ubb38\uac00\ub85c \uc77c\ud588\uace0, \uadf8 \ub098\uce68\ubc18\uc740 \uc5ec\uc804\ud788 \ub098\uc640 \ud568\uaed8\ud558\uace0 \uc788\uc5b4. <\/p>\n\n\n\n<p>SIEM \ubc0f \uc704\ud611 \ud0d0\uc9c0 \ubd84\uc57c\uc5d0\uc11c <a href=\"https:\/\/www.sumologic.com\/briefs\/gartner-siem-critical-capabilities\">Gartner Critical Capabilities for Security Information and Event Management (SIEM) \ubcf4\uace0\uc11c<\/a>\ub294 \uadf8 \ub098\uce68\ubc18\ucc98\ub7fc \ub290\uaef4\uc838. \ub9d1\uc740 \ud558\ub298\uc744 \uc57d\uc18d\ud558\uc9c0\ub294 \uc54a\uc9c0\ub9cc, \uc911\uc694\ud560 \ub54c \uc5b4\ub5a4 \uae30\uc220\uc774 \uc77c\uad00\ub418\uac8c \uc131\ub2a5\uc744 \ubc1c\ud718\ud558\ub294\uc9c0 \ubcf4\uc5ec\uc90c\uc73c\ub85c\uc368 \uc9c4\uc815\ud55c \ubd81\ucabd\uc744 \ucc3e\ub3c4\ub85d \ub3c4\uc640\uc918.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"why-this-report-matters\">\uc774 \ubcf4\uace0\uc11c\uac00 \uc911\uc694\ud55c \uc774\uc720<\/h2>\n\n\n\n<p>\uc0ac\uc774\ubc84 \ubcf4\uc548\uc774 \ubb34\uc5c7\uc778\uc9c0\uc5d0 \ub300\ud574 \ubaa8\ub450\uac00 \uac01\uc790\uc758 \uc758\uacac\uc744 \uac00\uc9c0\uace0 \uc788\uc5b4. \ub9ce\uc740 \uc194\ub8e8\uc158\uc774 \ub354 \ube60\ub978 \ud0d0\uc9c0, \ud5a5\uc0c1\ub41c AI, \ub354 \uc9c0\ub2a5\uc801\uc778 \uc790\ub3d9\ud654\ub97c \uc57d\uc18d\ud558\uc9c0\ub9cc, \uc57d\uc18d\uc744 \uc9c0\ud0a4\uc9c0 \ubabb\ud574. \uad6c\ub9e4\uc790\ub4e4\uc5d0\uac8c \uc911\uc694\ud55c \uac83\uc740 \uc57d\uc18d\ud55c \ubc14\ub97c \uc218\ud589\ud568\uc774 \uc785\uc99d\ub41c \uc194\ub8e8\uc158\uc744 \ucc3e\ub294 \uac83\uc774\uace0, \uadf8 \uacfc\uc815\uc740 \uc548\uac1c \uc18d\uc744 \ud5e4\uccd0\ub098\uac00\ub294 \uac83\ucc98\ub7fc \ub290\uaef4\uc9c8 \uc218 \uc788\uc5b4.<\/p>\n\n\n\n<p>\uc6b0\ub9ac\uc5d0\uac8c Gartner\uac00 \ud3c9\uac00\ud558\ub294 \uac01 \uc0ac\uc6a9 \uc0ac\ub840 \u2014 Out-of-the-Box SIEM, Customizable SIEM, \uadf8\ub9ac\uace0 Threat Detection, Investigation &amp; Response (TDIR) \u2014 \ub294 \ud2b9\uc815 \uc6b4\uc601 \uc694\uad6c \uc0ac\ud56d\uc744 \ub098\ud0c0\ub0b4:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SIEM\uc744 \uc2e0\uc18d\ud558\uac8c \uad6c\ucd95\ud574\uc57c \ud558\ub294 \ud300\uc744 \uc704\ud55c \uac00\uce58 \uc2e4\ud604 \uc18d\ub3c4.<br\/><\/li>\n\n\n\n<li>\ub9e4\uc77c \ud0d0\uc9c0\ub97c \uc870\uc815\ud558\uace0 \uaddc\uce59\uc744 \uac1c\uc120\ud558\ub294 \uc0ac\ub78c\ub4e4\uc744 \uc704\ud55c \uc720\uc5f0\uc131\uacfc \uae4a\uc774.<br\/><\/li>\n\n\n\n<li>\uace0\uae09 SOC \uc6cc\ud06c\ud50c\ub85c\uc6b0\ub97c \uc2e4\ud589\ud558\ub294 \ud300\uc744 \uc704\ud55c \ud1b5\ud569 \uc870\uc0ac \ubc0f \uc790\ub3d9\ud654.<br\/><\/li>\n<\/ul>\n\n\n\n<p>\uc810\uc218\ub97c \uc790\uc138\ud788 \uc0b4\ud3b4\ubcf4\uba74, \uc5ec\ub7ec \ud328\ud134\uc774 \ub098\ud0c0\ub098\uae30 \uc2dc\uc791\ud558\ub294 \uac83\uc744 \ubcfc \uc218 \uc788\uc5b4. \uc77c\ubd80 \uacf5\uae09\uc5c5\uccb4\ub294 \ube60\ub974\uc9c0\ub9cc \uae4a\uc774\uac00 \uc5c6\uc5b4. \ub2e4\ub978 \uacf5\uae09\uc5c5\uccb4\ub294 \uac15\ub825\ud558\uc9c0\ub9cc \uc0ac\uc6a9\ud558\uae30 \ubcf5\uc7a1\ud574. \uc9c4\uc815\ud55c \uac00\uce58\ub294 Sumo Logic\uc758 \ud655\uc7a5\uc131, \ubd84\uc11d \ubc0f \uc790\ub3d9\ud654\uac00 \uad50\ucc28\ud558\ub294 \uc774\ub7ec\ud55c \uc0ac\uc6a9 \uc0ac\ub840 \uc804\ubc18\uc5d0\uc11c \uc81c\ud488\uc774 \uc5b4\ub5bb\uac8c \uc791\ub3d9\ud558\ub294\uc9c0 \ud655\uc778\ud558\ub294 \ub370 \uc788\uc5b4.<\/p>\n\n\n\n<p>\uc774\uac83\uc774 \uc774 \ubcf4\uace0\uc11c\uac00 \uc815\ubcf4\uc5d0 \ubc1d\uc740 \uad6c\ub9e4\uc790\ub4e4\uc5d0\uac8c \ud544\uc218\uc801\uc778 \uc774\uc720\uc57c. \uc774 \ubcf4\uace0\uc11c\ub294 \uc774 \uc5c5\uacc4\uc5d0\uc11c \uac70\uc758 \ucc3e\uc544\ubcfc \uc218 \uc5c6\ub294 \uac83\uc744 \uc81c\uacf5\ud574: \ube44\uc988\ub2c8\uc2a4 \uc694\uad6c \uc0ac\ud56d\uc744 \uae30\uc220 \uc5ed\ub7c9\uacfc \uc77c\uce58\uc2dc\ud0a4\ub294 \ub098\ub780\ud788 \ube44\uad50\ud558\ub294 \uae30\uc900 \uae30\ubc18 \uc811\uadfc \ubc29\uc2dd \ub9d0\uc774\uc57c.<\/p>\n\n\n\n<p>\uac00\uc7a5 \ud070 \uc774\ub984\uc774\ub098 \ud654\ub824\ud55c \ub9c8\ucf00\ud305\uc5d0 \uad00\ud55c \uac83\uc774 \uc544\ub2c8\uc57c. \uc0c1\ud669\uc774 \ud604\uc2e4\uc774 \ub420 \ub54c \uc5b4\ub5a4 \uc194\ub8e8\uc158\uc774 \uc131\uacfc\ub97c \ub0b4\ub294\uc9c0\uc5d0 \uad00\ud55c \uac83\uc774\uc57c. \uadf8\ub9ac\uace0 \uadf8\uac8c \ubaa8\ub4e0 \uc2e4\ubb34\uc790\uac00 \uc774\ud574\ud558\ub294 \uc5b8\uc5b4\uc57c.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-we-feel-this-year-s-report-shows\">\uc62c\ud574 \ubcf4\uace0\uc11c\uac00 \ubcf4\uc5ec\uc900\ub2e4\uace0 \uc6b0\ub9ac\uac00 \ub290\ub07c\ub294 \uac83<\/h2>\n\n\n\n<p>\ubcf4\uace0\uc11c\uc5d0\uc11c <a href=\"https:\/\/www.sumologic.com\/ko\/solutions\/security\">Sumo Logic Intelligent Operations Platform<\/a>\uc740 \ud3c9\uac00\ub41c \ubaa8\ub4e0 \uc0ac\uc6a9 \uc0ac\ub840\uc5d0\uc11c \uc810\uc218\ub97c \ubc1b\uc558\uc5b4.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>\uc0ac\uc6a9 \uc0ac\ub840<\/td><td>5\uc810 \ub9cc\uc810 \uc810\uc218<\/td><td>\uc21c\uc704<\/td><\/tr><tr><td>\uc704\ud611 \ud0d0\uc9c0, \uc870\uc0ac &amp; \ub300\uc751<\/td><td>3.87<\/td><td>2\uc704<\/td><\/tr><tr><td>\ub9de\ucda4\ud615 SIEM<\/td><td>3.89<\/td><td>3\uc704<\/td><\/tr><tr><td>\uc989\uc2dc \uc0ac\uc6a9 \uac00\ub2a5\ud55c SIEM<\/td><td>3.61<\/td><td>4\uc704<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>\uc6b0\ub9ac\ub294 \uac01 \uc810\uc218\uac00 \uace0\uac1d\uc774 \uadf8 \uc77c\uad00\uc131\uc744 \uacbd\ud5d8\ud558\ub294 \ubc29\uc2dd\uc758 \ub2e4\ub978 \ucc28\uc6d0\uc744 \ubc18\uc601\ud55c\ub2e4\uace0 \ubbff\uc5b4:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\uc704\ud611 \ud0d0\uc9c0, \uc870\uc0ac &amp; \ub300\uc751 (3.87):<br\/>\uc774 \uc810\uc218\ub294 \ud50c\ub7ab\ud3fc\uc774 \ubd84\uc11d\uac00\ub4e4\uc774 \ucee8\ud14d\uc2a4\ud2b8\ub97c \uc5f0\uacb0\ud558\uace0, \ubd84\ub958\ub97c \uac00\uc18d\ud654\ud558\uba70, \uacb0\uc815\uc801\uc778 \uc870\uce58\ub97c \ucde8\ud558\ub3c4\ub85d \uc5bc\ub9c8\ub098 \ud6a8\uacfc\uc801\uc73c\ub85c \uc9c0\uc6d0\ud558\ub294\uc9c0 \ubcf4\uc5ec\uc918. \uae30\ubcf8 <a href=\"https:\/\/www.sumologic.com\/guides\/agentic-ai-log-analytics\" data-type=\"resource\" data-id=\"3018\">AI \uae30\ubc18 \ubd84\uc11d<\/a>, <a href=\"https:\/\/www.sumologic.com\/glossary\/ueba\">UEBA<\/a>, \uadf8\ub9ac\uace0 \ud1b5\ud569\ub41c \ubcf4\uac15\uc744 \ud1b5\ud574 Sumo Logic\uc740 \ud300\uc774 \uacbd\uace0\uac00 \ubc1c\uc0dd\ud588\ub2e4\ub294 \uc0ac\uc2e4\ubfd0\ub9cc \uc544\ub2c8\ub77c, \uc65c \uc911\uc694\ud55c\uc9c0 \uc774\ud574\ud558\ub3c4\ub85d \ub3c4\uc640\uc918. <br\/><\/li>\n\n\n\n<li>\ub9de\ucda4\ud615 SIEM (3.89):<br\/>\uc720\uc5f0\uc131\uc740 \uc9c0\ub2a5\ud615 SOC\uc5d0 \ud544\uc218\uc801\uc774\uc57c. \uc6b0\ub9ac\ub294 \uc774 \uc810\uc218\ub97c \ud50c\ub7ab\ud3fc\uc774 \uace0\uc720\ud55c \ub370\uc774\ud130 \ud30c\uc774\ud504\ub77c\uc778\uc5d0 \uc801\uc751\ud558\uace0, \uc678\ubd80 \ub3c4\uad6c\uc640 \ud1b5\ud569\ud558\uba70, \uae30\uc874 \uc6cc\ud06c\ud50c\ub85c\uc6b0\ub97c \ub2e4\uc2dc \uc791\uc131\ud560 \ud544\uc694 \uc5c6\uc774 \uc790\ub3d9\ud654\ub97c \uc9c0\uc6d0\ud558\ub294 \ub2a5\ub825\uc5d0 \ub300\ud55c \ubc18\uc601\uc73c\ub85c \ubcf4\uace0 \uc788\uc5b4. <a href=\"https:\/\/www.sumologic.com\/help\/docs\/platform-services\/automation-service\/about-automation-service\/\">Sumo Logic\uc758 \uc790\ub3d9\ud654 \uc11c\ube44\uc2a4<\/a>\uc640 \uac1c\ubc29\ud615 \uc544\ud0a4\ud14d\ucc98\ub294 \ud300\uc774 \ubbf8\ub9ac \uc815\uc758\ub41c \ud15c\ud50c\ub9bf\uc5d0 \uac15\uc81c\ub418\ub294 \ub300\uc2e0 \uc790\uc2e0\ub9cc\uc758 \ub85c\uc9c1\uc744 \uad6c\ucd95\ud558\ub3c4\ub85d \ud574\uc918.<br\/><\/li>\n\n\n\n<li>\uc989\uc2dc \uc0ac\uc6a9 \uac00\ub2a5\ud55c SIEM (3.61):<br\/>\uac00\uc7a5 \ub9de\ucda4 \uc124\uc815 \uac00\ub2a5\ud55c \ud50c\ub7ab\ud3fc \uc911 \ud558\ub098\uc784\uc5d0\ub3c4 \ubd88\uad6c\ud558\uace0, Sumo Logic\uc740 \ube60\ub978 \uac00\uce58 \uc2e4\ud604\uc5d0 \uacc4\uc18d \ud22c\uc790\ud558\uace0 \uc788\uc5b4. \uc6b0\ub9ac\ub294 \uc774 \uc810\uc218\uac00 \uc0ac\uc804 \uad6c\ucd95\ub41c \ub300\uc2dc\ubcf4\ub4dc, 1,000\uac1c \uc774\uc0c1\uc758 \ud0d0\uc9c0 \uaddc\uce59, \uadf8\ub9ac\uace0 MITRE ATT&amp;CK\uc5d0 \ubd80\ud569\ud558\ub294 \ucf58\ud150\uce20\uac00 \uace0\uac1d\uc774 \uba87 \uc2dc\uac04 \ub0b4\uc5d0 \ud0d0\uc9c0\ub97c \uc2dc\uc791\ud560 \uc218 \uc788\ub3c4\ub85d \ud574\uc8fc\ub294 \ubc29\uc2dd\uc744 \uc815\ud655\ud558\uac8c \ubc18\uc601\ud55c\ub2e4\uace0 \ubbff\uc5b4.<br\/><\/li>\n<\/ul>\n\n\n\n<p>\uc6b0\ub9ac\ub294 \uc774\uac83\uc744 \uc9c0\ub2a5\ud615 \ubcf4\uc548 \uc6b4\uc601\uc5d0\ub294 \uc989\uac01\uc801\uc778 \uac00\uc2dc\uc131\uacfc \uc7a5\uae30\uc801\uc778 \uc801\uc751\uc131 \ubaa8\ub450\uac00 \ud544\uc694\ud558\ub2e4\ub294 \uc6b0\ub9ac\uc758 \ubbff\uc74c\uc5d0 \ub300\ud55c \uac80\uc99d\uc73c\ub85c \ubcf4\uace0 \uc788\uc5b4. \ubcf4\uc548 \ud300\uc5d0\uac8c \uc774\ub294 \uc0ac\uac01\uc9c0\ub300 \uac10\uc18c, \ub354 \ube60\ub978 \uc870\uc0ac, \uadf8\ub9ac\uace0 \ub9e4 \uc21c\uac04\uc774 \uc911\uc694\ud560 \ub54c \ub354 \ub192\uc740 \ud655\uc2e0\uc73c\ub85c \uc774\uc5b4\uc838.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-compass-and-the-map\">\ub098\uce68\ubc18\uacfc \uc9c0\ub3c4<\/h2>\n\n\n\n<p>Gartner Critical Capabilities for SIEM \ubcf4\uace0\uc11c\uac00 \ub098\uce68\ubc18 \uc5ed\ud560\uc744 \ud558\uc5ec \uc2dc\uc7a5\uc744 \ud0d0\uc0c9\ud558\uace0 \ubd84\uc11d, \uc790\ub3d9\ud654 \ubc0f \ud655\uc7a5\uc131\uc5d0\uc11c \uce21\uc815 \uac00\ub2a5\ud55c \uac15\uc810\uc774 \uc5b4\ub514\uc5d0 \uc788\ub294\uc9c0 \uc2dd\ubcc4\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub41c\ub2e4\uace0 \uac00\uc815\ud574 \ubd10. <\/p>\n\n\n\n<p>\uadf8\ub807\ub2e4\uba74 \uc6b0\ub9ac\ub294 <a href=\"https:\/\/www.sumologic.com\/guides\/siem-evaluation\">Sumo Logic SIEM \ud3c9\uac00 \uac00\uc774\ub4dc<\/a>\uac00 \uc9c0\ub3c4\ub77c\uace0 \uc0dd\uac01\ud574. \uc774 \uac00\uc774\ub4dc\ub294 \ub3c5\ub9bd\uc801\uc778 \ucc44\uc810 \ubaa8\ub378\uc744 \ub108\uc758 \ud658\uacbd\uc5d0\uc11c \uc2e4\ud589\ud558\uc5ec \ub370\uc774\ud130, \uc6cc\ud06c\ud50c\ub85c\uc6b0 \ubc0f \uc544\ud0a4\ud14d\ucc98\ub97c \ud1b5\ud574 \uc790\uc2e0\ub9cc\uc758 \uacbd\ub85c\ub97c \uacc4\ud68d\ud560 \uc218 \uc788\ub294 \uc2e4\uc6a9\uc801\uc774\uace0 \ubc18\ubcf5 \uac00\ub2a5\ud55c \ud504\ub85c\uc138\uc2a4\ub85c \uc804\ud658\ud574 \uc918.<\/p>\n\n\n\n<p>SIEM \ud3c9\uac00 \uac00\uc774\ub4dc\ub294 \ud300\uc774 \uc790\uc2e0\uc758 \ud658\uacbd\uc5d0\uc11c \ubc14\ub85c \uadf8 \ucc28\uc6d0\ub4e4\uc744 \ud3c9\uac00\ud560 \uc218 \uc788\ub3c4\ub85d \ud574\uc8fc\ub294 \ubcf4\uc644\uc801\uc778 \ud504\ub808\uc784\uc6cc\ud06c\ub97c \ubcf4\uc5ec\uc918:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>\ub370\uc774\ud130 \uc218\uc9d1 \ubc0f \uc815\uaddc\ud654<br\/><\/li>\n\n\n\n<li>\ub370\uc774\ud130 \ubcc0\ud658 \ubc0f \ubcf4\uac15<br\/><\/li>\n\n\n\n<li>\uace0\uae09 \ubd84\uc11d \ubc0f \ud0d0\uc9c0<br\/><\/li>\n\n\n\n<li>\uc870\uc0ac \ubc0f \ud611\uc5c5<br\/><\/li>\n\n\n\n<li>\ub300\uc751 \ubc0f \uc790\ub3d9\ud654<br\/><\/li>\n<\/ol>\n\n\n\n<p>\ud568\uaed8 \uc0ac\uc6a9\ud558\uba74 \ub098\uce68\ubc18\uacfc \uc9c0\ub3c4\ub294 \ubc29\ud5a5 \uc124\uc815\uc5d0\uc11c \uacb0\uc815\uc73c\ub85c \ub098\uc544\uac00\ub3c4\ub85d \ub3c4\uc640\uc918. \ubcf4\uace0\uc11c\ub294 \ub108\uc5d0\uac8c \uad00\uc810\uc744 \uc81c\uacf5\ud574. \uac00\uc774\ub4dc\ub294 \ub108\uc5d0\uac8c \uc99d\uac70\ub97c \uc81c\uacf5\ud574. \uadf8 \uc870\ud569\uc740 \ub108\uc758 \uad6c\ub9e4 \ubc29\uc2dd\uc744 \ubcc0\ud654\uc2dc\ud0a4\uace0, \ub3c5\ub9bd\uc801\uc778 \uc99d\uac70\uc640 \uc9c1\uc811\uc801\uc778 \uac80\uc99d \ubaa8\ub450\ub97c \uae30\ubc18\uc73c\ub85c \uad6c\ucd95\ub41c \ubc29\uc5b4 \uac00\ub2a5\ud55c \uc804\uc9c4 \uacbd\ub85c\ub97c \uc81c\uacf5\ud574.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"finding-your-bearings-in-the-ai-era\">AI \uc2dc\ub300\uc5d0 \ubc29\ud5a5\uc744 \ucc3e\ub294 \uac83<\/h2>\n\n\n\n<p>Gartner \ubcf4\uace0\uc11c\ub294 \uac00\uc815\ubcf4\ub2e4 \uc99d\uac70\ub97c \uc911\uc694\ud558\uac8c \uc5ec\uae30\ub294 \ubcf4\uc548 \ud300\uc744 \uc704\ud55c \uac83\uc774\uc57c. \uc774 \ubcf4\uace0\uc11c\ub294 \uc2e4\ubb34\uc790\ub4e4\uc774 \ub9c8\ucf00\ud305 \uc8fc\uc7a5\uc758 \uc548\uac1c\ub97c \uaff0\ub6ab\uc5b4 \ubcf4\uace0 \uc2e4\uc81c \uacb0\uacfc\ub97c \ud615\uc131\ud558\ub294 \uce21\uc815 \uac00\ub2a5\ud55c \uc5ed\ub7c9\uc5d0 \uc9d1\uc911\ud558\ub3c4\ub85d \ub3c4\uc640\uc918.<\/p>\n\n\n\n<p>AI\uac00 \ud601\uc2e0\uacfc \uc801\ub300\uc801 \uc804\uc220 \ubaa8\ub450\ub97c \uac00\uc18d\ud654\ud568\uc5d0 \ub530\ub77c, \uba85\ud655\uc131\uc740 \uc784\ubb34\uc758 \ud575\uc2ec\uc774 \ub3fc. <a href=\"https:\/\/www.sumologic.com\/guides\/siem\">Sumo Logic Intelligent Operations Platform<\/a>\uc740 \ub3d9\uc77c\ud55c \uc6d0\uce59\uc744 \uc801\uc6a9\ud574 \u2014 \ud1b5\ud569\ub41c \uac00\uc2dc\uc131, <a href=\"https:\/\/www.sumologic.com\/ko\/solutions\/dojo-ai\">\uc5d0\uc774\uc804\ud2f1 AI<\/a>, \uadf8\ub9ac\uace0 \ud300\uc774 \ubc18\uc751\uc5d0\uc11c \uc900\ube44 \uc0c1\ud0dc\ub85c \ub098\uc544\uac00\ub3c4\ub85d \ub3c4\uc640\uc8fc\ub294 \uc790\ub3d9\ud654\ub97c \uc81c\uacf5\ud558\ub294 \uac70\uc57c.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.sumologic.com\/briefs\/gartner-siem-critical-capabilities\" data-type=\"resource\" data-id=\"54591\">2025 Gartner Critical Capabilities for SIEM \ubcf4\uace0\uc11c\uc5d0 \uc561\uc138\uc2a4\ud574 \ubd10.<\/a><\/p>\n\n\n\n<p><strong>Gartner, Critical Capabilities for Security Information and Event Management, \uc791\uc131\uc790: Eric Ahlm, Andrew Davies, Angel Berrios, Darren Livingstone, 2025\ub144 10\uc6d4 13\uc77c<\/strong><\/p>\n\n\n\n<p><strong>Gartner\ub294 \uc5f0\uad6c \uac04\ud589\ubb3c\uc5d0 \ubb18\uc0ac\ub41c \uc5b4\ub5a0\ud55c \uacf5\uae09\uc5c5\uccb4, \uc81c\ud488 \ub610\ub294 \uc11c\ube44\uc2a4\ub3c4 \ubcf4\uc99d\ud558\uc9c0 \uc54a\uc73c\uba70, \uae30\uc220 \uc0ac\uc6a9\uc790\uc5d0\uac8c \ucd5c\uace0 \ub4f1\uae09 \ub610\ub294 \uae30\ud0c0 \uc9c0\uc815\uc744 \ubc1b\uc740 \uacf5\uae09\uc5c5\uccb4\ub9cc\uc744 \uc120\ud0dd\ud558\ub3c4\ub85d \uad8c\uc7a5\ud558\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. Gartner \uc5f0\uad6c \uac04\ud589\ubb3c\uc740 Gartner \uc5f0\uad6c \uc870\uc9c1\uc758 \uc758\uacac\uc73c\ub85c \uad6c\uc131\ub418\uba70, \uc0ac\uc2e4 \uc9c4\uc220\ub85c \ud574\uc11d\ub418\uc5b4\uc11c\ub294 \uc548 \ub429\ub2c8\ub2e4. Gartner\ub294 \ubcf8 \uc5f0\uad6c\uc640 \uad00\ub828\ud558\uc5ec \uba85\uc2dc\uc801\uc774\ub4e0 \ubb35\uc2dc\uc801\uc774\ub4e0 \ubaa8\ub4e0 \ubcf4\uc99d(\uc0c1\ud488\uc131 \ub610\ub294 \ud2b9\uc815 \ubaa9\uc801\uc5d0\uc758 \uc801\ud569\uc131\uc5d0 \ub300\ud55c \ubaa8\ub4e0 \ubcf4\uc99d \ud3ec\ud568)\uc744 \ubd80\uc778\ud569\ub2c8\ub2e4.  <\/strong><\/p>\n\n\n\n<p><strong>GARTNER\ub294 \ubbf8\uad6d \ubc0f \uad6d\uc81c\uc801\uc73c\ub85c Gartner, Inc. \ubc0f\/\ub610\ub294 \uadf8 \uacc4\uc5f4\uc0ac\uc758 \ub4f1\ub85d \uc0c1\ud45c\uc774\uc790 \uc11c\ube44\uc2a4 \ub9c8\ud06c\uc774\uba70, \ubcf8 \ubb38\uc11c\uc5d0\uc11c\ub294 \ud5c8\uac00\ub97c \ubc1b\uc544 \uc0ac\uc6a9\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \ubaa8\ub4e0 \uad8c\ub9ac \ubcf4\uc720. <\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":55749,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"blog-category":[320,325],"blog-tag":[],"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"62715,62740,62708","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"blog-category":[320,325],"blog-tag":[],"class_list":["post-61066","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog-category-secops-security","blog-category-cloud-siem"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/blog\/61066","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":4,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/blog\/61066\/revisions"}],"predecessor-version":[{"id":67774,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/blog\/61066\/revisions\/67774"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/media\/55749"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/media?parent=61066"}],"wp:term":[{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/blog-category?post=61066"},{"taxonomy":"blog-tag","embeddable":true,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/blog-tag?post=61066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}