* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [未分类](https://www2.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant) * 实现端点安全与网络安全协同工作的 5 种方式... # 实现端点安全与网络安全协同工作的 5 种方式 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F12%2Fendpoint-security-and-network-security%2F%3Flang%3Dzh-hans) [](https://twitter.com/share?text=%E5%AE%9E%E7%8E%B0%E7%AB%AF%E7%82%B9%E5%AE%89%E5%85%A8%E4%B8%8E%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8%E5%8D%8F%E5%90%8C%E5%B7%A5%E4%BD%9C%E7%9A%84+5+%E7%A7%8D%E6%96%B9%E5%BC%8F&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F12%2Fendpoint-security-and-network-security%2F%3Flang%3Dzh-hans) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F12%2Fendpoint-security-and-network-security%2F%3Flang%3Dzh-hans&title=%E5%AE%9E%E7%8E%B0%E7%AB%AF%E7%82%B9%E5%AE%89%E5%85%A8%E4%B8%8E%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8%E5%8D%8F%E5%90%8C%E5%B7%A5%E4%BD%9C%E7%9A%84+5+%E7%A7%8D%E6%96%B9%E5%BC%8F&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2018/12/endpoint-security-and-network-security/?lang=zh-hans&ts=markdown) \[\](mailto:?subject=实现端点安全与网络安全协同工作的 5 种方式) Link copied By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?lang=zh-hans&ts=markdown "Posts by Palo Alto Networks") Dec 17, 2018 1 minutes [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) 就网络安全而言,单个解决方案无法防御组织面临的全部威胁。若要实现全面的防护,需要将硬件和软件结合起来,来提供多层安全,从而保护网络免遭各种威胁。精心挑选、实施和维护这些工具所耗费的时间、成本及人力,对于任何组织而言都是一项巨大的投资。然而,网络环境中的相关人员并非总是在外围边界内,网络防护功能也不一定总适用于他们。如果未能使用合适的安全解决方案产品来保护端点,这些人便可能绕过外围安全措施,将外部威胁带入环境中。曾经为保护网络安全付出的努力,有可能会因为采用了错误的端点产品而前功尽弃。 下面介绍端点的五大必备功能,可有效抵御对网络安全态势的负面影响。 ### 1.原生集成威胁情报。 根据 2016 年 Ponemon 的一份研究,39% 的受访者认为,如果组织积极分享威胁情报,所有攻击都可被成功阻截。通过采用全球威胁情报,可突破单个解决方案的能力范畴,将防护功能扩展到全球社区的共享情报。当社区的其他成员遇到新的攻击时,会分享该信息,这样所有成员均可自动检测到已知威胁,并快速识别未知威胁。 网络与端点均应参与威胁情报共享,并在各自环境中的设备上持续应用不断增加的威胁情报。它们还应该相互交换情报,以便在端点上识别和防御的威胁也能够在网络上得到识别和防御。 不过,仅仅共享威胁情报还不够。大多数订阅情报来源的组织都淹没在他们无法关联到或转换为可操作情报的数据中。由于无法自动将威胁情报转换为新的保护措施,组织只能购买更多的数据。如果环境中的这两个组成部分之间没有进行原生集成来产生和共享这些威胁情报,问题将变得更加严重。未经原生集成且无法自动转换为新保护措施的情报毫无用处,除非在它身上投入更多的人力成本。最终结果只会是需要大量人员来进行数据分析。 ### 2.防御已知和未知威胁。 在某个组织之前,大多数传统安全产品的设计目的都是检测已知威胁。在很多情况下,等到检测到未知威胁时,关键资产已经遭到破坏,检测的作用微乎其微且为时已晚。此外,尽管攻击者通常会重用现有的恶意软件和漏洞利用技术,但是他们也会修改现有的攻击,或创建全新的攻击来规避检测。这让所有威胁都无法被大多数安全产品检测到。 对网络或端点的检测和修复一直都是耗费时间和人力且低效的过程。如果网络和端点能够同时预防已知和未知威胁,便可避免这一问题。在理想情况下,端点安全解决方案的防护功能不应依赖于签名和对攻击或漏洞的预先了解,而是应该纳入各种分析和防护方法,以最大限度提高有效性。 ### 3.实现自动化。 攻击者拥有自动化、可扩展性和专业工具可供使用。在 2016 年 Ponemon 的泄漏经济学调查中,68% 的受访者表示,自动化攻击工具让攻击者可以更轻松地成功发起攻击。整个经济体和市场的存在以实惠的价格推动了这些工具的激增。 组织通常采用复杂、耗费人力且看起来效果不佳的单点解决方案,抵御不断增加的复杂攻击。要想战胜攻击者,组织必须使成功发起攻击这件事变得更具挑战性、可获得的利润更低。前述调查中的受访者称,如果执行攻击的时间再延长 40 小时,60% 的攻击均可被阻止。以可扩展和可持续的方式实现此目标的唯一方法便是[自动化](https://www.paloaltonetworks.com/documentation/70/pan-os/newfeaturesguide/management-features/automated-correlation-engine.html)预防。 如果必须指派安全分析师去调查警报情况,则对网络或端点的检测不具有扩展性。自动化可延迟攻击获得成功和回报,促使攻击者将矛头转向下一个潜在受害者,这样可让组织成为更加难以攻击的目标。 ### 4.提供持续性防护。 如今,用户的移动性越来越高,他们会通过全球各地的位于组织网络边界之外的位置连接到内部资源。所有端点都应获得相同级别的保护,无论它们处于联机还是脱机状态,位于本地还是异地。若没有这些持续性防护,端点就很容易受到侵害,网络很有可能也会受到入侵,即便网络防护措施已经部署到位。端点安全必须扩展到传统网络边界以外,考虑到成为网络攻击目标的许多终端用户和端点,以及没有完整可视性的网络。 ### 5.针对网络、端点和云中的活动提供全面可视性。 现代化攻击会通过多个步骤来实现它们的目标。想要成功预防攻击,组织必须对其网络、端点和云中的所有用户、设备和数据拥有全面可视性。必须拥有这种可视性,组织才能了解攻击的情境,在网络和端点中实施安全策略,并关联各个安全事件以改善组织的安全态势。若将原生集成的威胁情报与已知和未知威胁自动预防功能相结合来提供持续性防护,无论是否连接网络,也无论位于何处,这种协同作用均可大幅改善组织的安全态势。这可让组织对机会主义式攻击者的吸引力减小,并最大限度地降低针对性攻击获得成功的几率。 选择使用错误的端点安全解决方案可令您的端点更易受到威胁,并阻碍或毁了为保护网络安全所做的大量工作。您的端点安全解决方案应持续保护所有端点的安全,并为组织的其他部分提供其他有用的功能,从整体上增强整个网络的安全态势。 [Palo Alto Networks Traps](https://www.paloaltonetworks.cn/products/traps.html) Advanced Endpoint Protection 摒弃漏洞检测和事件响应的传统方式,利用多重方法防御措施,以专用的恶意软件和漏洞利用防御方法,预防已知和未知的威胁。作为 Palo Alto Networks Security Operating Platform 的一部分,Traps 与基于云的 WildFire 威胁分析服务集成,可自动将威胁情报转换为恶意软件防御措施,在威胁破坏端点之前先发制人地阻截这些威胁。 *** ** * ** *** ## Related Blogs ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### AI代理已經來臨,威脅也隨之而來](https://www2.paloaltonetworks.com/blog/2025/05/ai-agents-threats/?lang=zh-hant) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### Strata Copilot - 加速迈向自主网络安全的未来](https://www2.paloaltonetworks.com/blog/network-security/strata-copilot/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 防火墙已死?至少本世纪不会!](https://www2.paloaltonetworks.com/blog/2023/08/ngfw-is-not-dead-yet/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 面对性命攸关的时刻,如何实现可靠的医疗物联网安全](https://www2.paloaltonetworks.com/blog/2022/12/medical-iot-security-to-depend-on/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 利用业界首创的 AIOps for NGFW 革新防火墙运行](https://www2.paloaltonetworks.com/blog/2022/03/industry-first-aiops-for-ngfw/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### Prisma Access 是保护远程用户安全的领先云服务](https://www2.paloaltonetworks.com/blog/2021/08/prisma-access-leading-cloud-service-secure-remote-users/?lang=zh-hans) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language