Global Information
ȸ»ç¼Ò°³ | ¹®ÀÇ | ºñ±³¸®½ºÆ®

³×Æ®¿öÅ© º¸¾È ±â¼ú Á¤º¸ ±¸µ¶ ¼­ºñ½º

Cyber Security Technology TechVision Opportunity Engine

¸®¼­Ä¡»ç Frost & Sullivan
¹ßÇàÁ¤º¸ ¿¬°£±¸µ¶ »óǰÄÚµå 58717
ÆäÀÌÁö Á¤º¸ ¿µ¹®
US $ 6,950 £Ü 9,189,000 Web Access (Single User License)
US $ 14,950 £Ü 19,766,000 Web Access (Enterprise License)


³×Æ®¿öÅ© º¸¾È ±â¼ú Á¤º¸ ±¸µ¶ ¼­ºñ½º Cyber Security Technology TechVision Opportunity Engine
¹ßÇàÁ¤º¸ : ÆäÀÌÁö Á¤º¸ : ¿µ¹®

¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹®¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

º» ¿¬°£ °è¾àÇü Á¤º¸ ¼­ºñ½ºÀÇ ¸ñÀûÀº ³×Æ®¿öÅ© ÀÎÇÁ¶ó½ºÆ®·°Ã³ ¹× ³×Æ®¿öÅ©»ó¿¡¼­ ¿î¿ëµÇ´Â ¸®¼Ò½ºÀÇ º¸È£¸¦ ¸ñÀûÀ¸·Î ÇÑ »õ·Î¿î ±â¼ú Áøº¸¿¡ ´ëÇØ Á¶»çÇÑ °ÍÀÔ´Ï´Ù. ÀÌ ¼­ºñ½º´Â ½ºÆÔ¸ÞÀÏ ´ëÃ¥, ÄÄÇ»ÅÍ ¹ÙÀÌ·¯½º ´ëÃ¥, ÇÇ½Ì ´ëÃ¥, °èÁ¤ °ü¸®, ÀçÇØ º¹±¸, ¹æÈ­º®, VPN(Virtual Private Networks), ¿£µåÆ÷ÀÎÆ® º¸¾È, ÄÁÅÙÃ÷ ÇÊÅ͸µ, À¥ ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È, ÀÎÁõ ¹× Á¢±Ù Á¦¾î, ħÀÔ ¹æÁö ¹× ŽÁö ½Ã½ºÅÛ, ¾Ïȣȭ ¾Ë°í¸®Áò, ¾Ïȣȭ ±â¼ú, ³×Æ®¿öÅ© º¸¾È¿¡ ´ëÀÀÇÏ´Â ÆÐÅÏ ÀÎ½Ä ½Ã½ºÅÛ µî ºÐ¾ßÀÇ »õ·Î¿î µ¿Çâ°ú Á¦Ç° ¹ßÇ¥¿¡ ´ëÇÑ Æò°¡¸¦ ÅëÇØ »õ·Î¿î ºñÁö´Ï½º ±âȸ¸¦ È®ÀÎÇϰųª ±â¼ú Æ÷Æ®Æú¸®¿À¿¡ °üÇÑ ÆÇ´ÜÀ» º¸°­Çϴµ¥ µµ¿òÀÌ µÇ´Â Àü·«ÀûÀÎ °ßÇØ¸¦ Á¦°øÇÏ´Â °ÍÀÔ´Ï´Ù. ¶ÇÇÑ ³×Æ®¿öÅ© º¸¾È ±â¼ú °³¹ßÀÇ ·Îµå¸Ê, IP Æ÷Æ®Æú¸®¿À ºÐ¼®, ÀÚ±Ý Á¦°ø°ú ÅõÀÚÀÇ ±âȸ¿¡ °üÇÑ Á¤º¸, ±â¼ú °³¹ßÀÌ °¡Á®¿À´Â ±âȸ Æò°¡, ±â¼ú Æò°¡, ±â¼ú °³¹ßÀ» °¡¼Ó½ÃŰ´Â ¿äÀÎ, ÇØ°áÇØ¾ß ÇÒ °úÁ¦¿¡ ´ëÇÑ ºÐ¼® µîµµ ÀÌ ¼­ºñ½ºÀÇ Æ¯Â¡ÀÔ´Ï´Ù.

±â¼úÀûÀÎ Á¤º¸¸¦ Á¦°øÇϰí Àü·«ÀûÀÎ Á¦¾ÈÀ» Çϱâ À§ÇØ Frost & SullivanÀÇ ¾Ö³Î¸®½ºÆ®´Â °ü·Ã ¾÷°èÀÇ ÃâÆÇ¹°, Á¤±â°£Ç๰, Frost & SullivanÀÇ µ¥ÀÌÅͺ£À̽º, ´Ù¾çÇÑ Á¶Á÷ÀÌ µ¶ÀÚÀûÀ¸·Î ¿î¿ëÇÏ´Â µ¥ÀÌÅͺ£À̽ºÀÇ Á¶»ç ¹× °¢Á¾ ±â¼úÀ̳ª Á¦Ç°ÀÇ ÁÖ¿ä ¿¬±¸ÀÚ¿Í °³¹ßÀÚ, ÇàÁ¤±â°ü Á÷¿ø, ±â¾÷ °æ¿µÁø¿¡ ´ëÇÑ Ã»Ãë Á¶»ç µîÀ» ½Ç½ÃÇØ Á¤º¸¸¦ ¼öÁýÇϰí ÀÖ½À´Ï´Ù. ¾Ö³Î¸®½ºÆ®ÀÇ ÀÌ ºÐ¾ß¿¡ ´ëÇÑ Àü·«ÀûÀÎ Àü¸ÁÀº °ü·Ã ¾÷°èÀÇ ´Ù¾çÇÑ µ¿Çâ¿¡ ´ëÇÑ Æò°¡¡¤ºÐ¼®¿¡ µû¶ó µµÃâµÈ °á·Ð¿¡ ±Ù°ÅÇϰí ÀÖ½À´Ï´Ù.

KSM 17.12.20

The Cyber Security Technology (CST) technology opportunity engine (TOEs) mission is to investigate new and emerging developments that aim to protect the network infrastructure and the resources operating in the network. NST offers strategic insights that would help identify new business opportunities and enhance technology portfolio decisions by assessing new developments and product launches in: anti-spam, anti-virus, phishing, identity management, disaster recovery, firewalls, virtual private networks, end-point security, content filtering, web application security, authentication and access control, intrusion prevention and detection systems, encryption algorithms, cryptographic techniques, and pattern recognition systems for network security.

Highlights of this service include: technology roadmapping of network security technologies; IP portfolio analysis; information on funding and investment opportunities; evaluation of commercial opportunities from technology developments; technology assessment; analysis of technology accelerators and challenges and many more.

This TOE highlights innovation features, value propositions, industry impact of 15 monthly innovations along a particular theme, and includes strategic insights on the technology from a global perspective. Strategic insights include insights on IP, competitive landscape, key research focus areas, key success factors for technology adoption, and noteworthy funding details.

Back to Top
ÀüÈ­ ¹®ÀÇ
F A Q