* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [未分类](https://www2.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant) * 保护端点安全需满足的 10 项要求... # 保护端点安全需满足的 10 项要求 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F12%2F10-reqs-for-securing-endpoints%2F%3Flang%3Dzh-hans) [](https://twitter.com/share?text=%E4%BF%9D%E6%8A%A4%E7%AB%AF%E7%82%B9%E5%AE%89%E5%85%A8%E9%9C%80%E6%BB%A1%E8%B6%B3%E7%9A%84+10+%E9%A1%B9%E8%A6%81%E6%B1%82&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F12%2F10-reqs-for-securing-endpoints%2F%3Flang%3Dzh-hans) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F12%2F10-reqs-for-securing-endpoints%2F%3Flang%3Dzh-hans&title=%E4%BF%9D%E6%8A%A4%E7%AB%AF%E7%82%B9%E5%AE%89%E5%85%A8%E9%9C%80%E6%BB%A1%E8%B6%B3%E7%9A%84+10+%E9%A1%B9%E8%A6%81%E6%B1%82&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2018/12/10-reqs-for-securing-endpoints/?lang=zh-hans&ts=markdown) \[\](mailto:?subject=保护端点安全需满足的 10 项要求) Link copied By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?lang=zh-hans&ts=markdown "Posts by Palo Alto Networks") Dec 21, 2018 1 minutes [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) 数十年来,传统防病毒措施一直是保护端点的实际解决方案。这种防病毒措施可进行法规、监管及合规性审计等所有方面的检查,但是在安全方面,它能够真正为组织提供的益处少之又少。尽管防病毒解决方案可为世界上的几乎每个端点和服务器提供保护,但安全漏洞仍不断以惊人的速度增加。这很大程度上是因为传统防病毒措施是基于签名的安全工具,该工具专注于检测和响应进入网络后的已知威胁。经验丰富的攻击者能够使用廉价自动化在线工具,轻松绕过防病毒措施,发动无数独特未知攻击。最终,事实证明,传统防病毒措施不足以防止系统出现安全漏洞。 若要防止安全漏洞,组织必须保护自己免遭已知和未知的网络威胁,同时避免传统防病毒解决方案失效。这意味着他们必须专注于预防。预防对于降低网络攻击频率和影响是唯一有效、可扩展且可持续的途径。那么,端点安全解决方案应具备哪些功能才能有效地全面保护系统、用户和端点呢?以下几个部分将探讨保护端点安全需满足的 10 项要求。 **1.预先阻截已知和未知的威胁** 想要防止安全漏洞,就必须做出转变 --- 从检测和响应已发生的事件,转变为从一开始便防止安全漏洞的发生。无论计算机处于联机还是脱机状态,位于本地还是异地,也无论其是否连接了组织的网络,我们都必须保护端点免遭恶意软件和漏洞利用引起的已知、未知和零日威胁。实现此目标的关键步骤是纳入本地和云威胁分析,以检测和预防未知威胁和具有规避能力的威胁。 **2.不给用户生产力带来负面影响** 先进的端点安全产品必须让最终用户能够顺利开展日常业务和使用移动技术和云技术,而无需担心受到未知的网络威胁。用户应能够专注于履行他们的职责,而不用为安全补丁和安全更新操心。他们必须有足够的信心,相信他们受到了良好的保护,不会无意运行可能破坏其系统的恶意软件或漏洞利用。 **3.自动将威胁情报转变为预防措施** 在别处(如第三方情报服务提供商和公共威胁情报共享结构)遇到独特的新攻击时获取的威胁情报,必须让端点代理能够即时防御已知恶意软件、识别并阻截未知恶意软件,以及阻止感染端点。此外,还必须从组织内部的网络、云和端点收集威胁数据。必须采用自动化方式来关联数据、识别威胁指标、创建防护措施,并在整个组织中推行这些措施。 **4.保护所有应用** 应用在任何组织有效运作的过程中均起着核心作用。遗憾的是,应用中的安全缺陷或 Bug 为威胁执行方提供了很大的攻击面,而传统防病毒措施无法保护该范围。组织的安全基础架构应该能够为第三方应用和专有应用等所有应用,提供针对漏洞利用的全面保护。此外,安全基础架构还应能够通过快速返回安全判定结果,加快引入环境的新应用的审批流程。 **5.不要让安全产品影响系统性能** 安全产品不应给 RAM、CPU 或磁盘存储器等系统资源造成负担。预防安全漏洞决不能以损害用户体验为代价。关于这点,端点保护措施或任何安全工具必须足够轻量,无需大量系统资源,否则其一定会妨碍系统性能并降低用户体验。 **6.保护旧有系统的安全** 组织并不总是能够立即部署可用的系统更新和安全补丁,因为这样做会干扰、削弱或阻止关键的运营功能,或者补丁可能不适用于生命周期已经终止的旧有系统和软件。全面的端点安全解决方案必须能够通过防止利用已知或未知的软件漏洞,支持无法打补丁的系统,而不论安全补丁的可用性或应用如何。 **7.企业现成可用** 任何预期用于替代防病毒措施的安全解决方案都应该具有足够的可扩展性、灵活性及可管理性,以便轻松部署于企业环境中。端点安全解决方案应以企业部署其计算资源的方式提供支持和进行整合,能扩展到所需数量的端点,并支持覆盖位置分散的环境的部署。此外,其还必须能够灵活提供足够的防护,在满足业务需求的同时又不过度限制业务发展。这一灵活性至关重要,因为组织某一部分的需求可能与其另一部分的需求完全不同。另外,该解决方案还必须能够由管理组织其他部分的安全工作的同一团队轻松进行管理。在设计该解决方案时,必须考虑到企业管理以及不增加运营负担等因素。 **8.提供独立的行业合规要求验证** 为遵从监管合规要求,归属于指定司法管辖区的组织通常需要实施防病毒措施,以保护他们端点的安全。为了主动保护端点并满足合规要求,取代现有防病毒解决方案的端点安全供应商应能够提供第三方验证,帮助客户实现或保持合规。 **9.提供独立验证作为防病毒替代方案** 在理想情况下,预期用于替代旧有防病毒解决方案的任何安全产品的性能应得到独立第三方的审查和验证。通过提供独立审查,可进行必要的检查,该检查范围超出了组织期望防病毒替代方案能够执行的功能。 **10.获得行业顶尖分析师和/或研究公司的认可** 希望摒弃传统防病毒解决方案的任何组织都应确保所采用的替代方案是端点安全领域的主要方法,并且已经获得知名分析师或研究公司的认可。这可确保解决方案及其供应商在作为端点安全提供商时,能够满足一系列标准可行性要求。 随着如今在针对性攻击中广泛使用未知恶意软件和漏洞利用,主动保护端点比以往任何时候都更加重要。Palo Alto Networks^®^ Traps™ Advanced Endpoint Protection 以多重方法防御措施替代旧有防病毒解决方案,并可在已知和未知威胁破坏端点之前成功阻截它们。作为 [Palo Alto Networks Security Operating Platform](https://www.paloaltonetworks.cn/products/security-operating-platform.html) 的一部分,Traps 集成了[WildFire](https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/wildfire)基于云的威胁分析服务,可将来自全球社区的威胁情报转变为恶意软件防御措施,并能够自动阻截对端点的威胁,无论这些威胁源自何处。访问 [Traps](https://www.paloaltonetworks.cn/products/traps.html) 页面,进一步了解有效的端点安全解决方案必须具备哪些功能才能预防安全漏洞,以及 Traps 如何有效替代防病毒解决方案。 *** ** * ** *** ## Related Blogs ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### AI代理已經來臨,威脅也隨之而來](https://www2.paloaltonetworks.com/blog/2025/05/ai-agents-threats/?lang=zh-hant) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### Strata Copilot - 加速迈向自主网络安全的未来](https://www2.paloaltonetworks.com/blog/network-security/strata-copilot/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 防火墙已死?至少本世纪不会!](https://www2.paloaltonetworks.com/blog/2023/08/ngfw-is-not-dead-yet/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 面对性命攸关的时刻,如何实现可靠的医疗物联网安全](https://www2.paloaltonetworks.com/blog/2022/12/medical-iot-security-to-depend-on/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 利用业界首创的 AIOps for NGFW 革新防火墙运行](https://www2.paloaltonetworks.com/blog/2022/03/industry-first-aiops-for-ngfw/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### Prisma Access 是保护远程用户安全的领先云服务](https://www2.paloaltonetworks.com/blog/2021/08/prisma-access-leading-cloud-service-secure-remote-users/?lang=zh-hans) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language