시장보고서
상품코드
2020253

디셉션 기술 시장 규모, 점유율, 성장 및 세계 업계 분석 : 유형 및 용도별, 지역별 인사이트 및 예측(2026-2034년)

Deception Technology Market Size, Share, Growth and Global Industry Analysis By Type & Application, Regional Insights and Forecast to 2026-2034

발행일: | 리서치사: 구분자 Fortune Business Insights Pvt. Ltd. | 페이지 정보: 영문 160 Pages | 배송안내 : 문의

    
    
    



가격
Unprintable PDF & Excel (Single User License) help
PDF & Excel 보고서를 1명만 이용할 수 있는 라이선스입니다. 인쇄 및 편집이 불가능합니다.
US $ 4,850 금액 안내 화살표 ₩ 7,335,000
Unprintable PDF & Excel (Multi User License) help
PDF & Excel 보고서를 동일 기업의 6명까지 이용할 수 있는 라이선스입니다. 인쇄 및 편집이 불가능합니다. 보고서 내 텍스트 등의 복사 및 붙여넣기는 가능합니다.
US $ 5,850 금액 안내 화살표 ₩ 8,848,000
PDF, Excel & PPT (Enterprise License) help
PDF, Excel & PPT 보고서를 동일 기업의 모든 분이 이용할 수 있는 라이선스입니다. 인쇄 및 편집이 가능하며, 보고서 내 텍스트 등의 복사 및 붙여넣기도 가능합니다.
US $ 6,850 금액 안내 화살표 ₩ 10,360,000
카드담기
※ 부가세 별도
한글목차
영문목차
※ 본 상품은 영문 자료로 한글과 영문 목차에 불일치하는 내용이 있을 경우 영문을 우선합니다. 정확한 검토를 위해 영문 목차를 참고해주시기 바랍니다.

디셉션 기술 시장의 성장 요인

세계 디셉션 기술 시장은 2025년에 25억 4,000만 달러로 평가되었고, 2026년에는 29억 2,000만 달러, 2034년에는 67억 4,000만 달러에 달할 것으로 예상되며, 예측 기간(2026-2034) 동안 11%의 연평균 복합 성장률(CAGR)을 보일 것으로 예측됩니다. 북미는 조기 도입과 탄탄한 사이버 보안 인프라에 힘입어 2025년 40%의 점유율을 차지하며 시장을 주도했습니다.

디셉션 기술은 네트워크 내에 가짜 서버, 인증정보, 용도, 데이터베이스 등의 미끼(decoy) 자산을 배치하여 조직의 데이터를 보호하는 고도의 사이버 보안 기법입니다. 이 미끼는 진짜처럼 보이도록 설계되어 공격자가 실제 자산과 구별하기 어렵게 만듭니다. 사이버 범죄자가 이러한 미끼와 상호작용을 하면 시스템이 경보를 발령하여 위협을 조기에 감지하고 대응할 수 있도록 합니다.

이 기술은 비용 효율성과 효율성으로 인해 특히 중소기업(SME)들 사이에서 인기가 높아지고 있습니다.

코로나19가 시장 성장에 미치는 영향

코로나19 팬데믹은 디셉션 기술 시장의 성장에 큰 영향을 미쳤습니다. 원격 근무로의 전환, 온라인 활동 증가, 급속한 디지털 전환으로 인해 전 세계적으로 사이버 공격이 급증하고 있습니다.

업계 조사에 따르면, 팬데믹 기간 동안 사이버 범죄가 급격히 증가함에 따라 BFSI(은행, 금융, 보험), 제조, 소매 등 다양한 산업 분야에서 많은 조직이 첨단 사이버 보안 솔루션을 도입해야 하는 상황에 직면했습니다. 디셉션 기술은 실시간으로 위협을 식별하고 완화할 수 있는 신뢰할 수 있는 도구로 부상했습니다.

시장 동향

제로 트러스트 아키텍처 도입

시장을 형성하는 주요 트렌드 중 하나는 제로 트러스트 아키텍처(ZTA)의 도입 확대입니다. 이 접근 방식은 위협이 네트워크 안팎에 존재할 수 있다고 가정하고, 모든 사용자와 기기에 대해 엄격한 인증을 적용합니다.

디셉션 기술은 네트워크 내 횡방향 이동을 식별하고 내부자에 의한 위협을 감지함으로써 제로 트러스트 프레임워크를 보완합니다. 조직이 디지털 전환 전략을 점점 더 많이 추진함에 따라 통합 보안 솔루션에 대한 수요가 증가하고 있습니다.

신기술과의 통합

디셉션 플랫폼과 클라우드 컴퓨팅, IoT, 모바일 기술과의 통합으로 그 효용성이 더욱 높아지고 있습니다. 이러한 통합을 통해 복잡한 IT 환경 전반에 걸쳐 위협 가시성, 확장성 및 보호 기능을 향상시킬 수 있습니다.

시장 역학

시장 성장 촉진요인

시장 성장의 주요 요인은 사이버 위협과 데이터 침해 증가입니다. IoT 기기 및 커넥티드 시스템 도입 확대로 공격 대상 영역이 확대되면서 고도의 보안 솔루션이 요구되고 있습니다.

또한, 사이버 보안에 대한 정부의 투자와 규제 준수 요건으로 인해 조직은 기밀 데이터를 보호하기 위해 디셉션 기술을 도입하고 있습니다.

시장 성장 억제요인

이러한 장점에도 불구하고, 시장에는 일부 조직의 취약한 네트워크 보안 인프라와 같은 과제가 존재합니다. 엔드포인트가 침해된 경우, 공격자는 여전히 중요한 데이터에 접근할 수 있기 때문에 디셉션 시스템의 효과는 제한적일 수밖에 없습니다.

또한, 현실적이고 확장 가능한 미끼(디코이)를 설계하기 위해서는 기술적 전문 지식이 필요하며, 이는 도입에 걸림돌이 될 수 있습니다.

세분화 분석

구성요소별

솔루션 부문이 시장을 주도하고 있으며, 산업 전반에 걸친 도입 확대에 힘입어 2026년에는 64.99%의 점유율을 차지할 것으로 예측됩니다. 서비스 부문은 전문 서비스 및 관리 서비스에 대한 수요로 인해 더 높은 CAGR로 성장할 것으로 예측됩니다.

도입 형태별

클라우드 기반 부문은 비용 효율성, 확장성, 원격 접근성으로 인해 2026년 71.96%의 점유율로 시장을 주도했습니다.

기업 유형별

2026년에는 복잡한 인프라를 관리하기 위해 고도의 보안 프레임워크를 필요로 하는 대기업이 60.96%의 점유율을 차지하며 시장을 주도할 것으로 예측됩니다. 또한, 중소기업들도 비용적인 측면의 경제성 때문에 빠르게 도입하고 있습니다.

산업별

BFSI(은행, 금융, 보험) 부문은 강력한 데이터 보호의 필요성으로 인해 가장 큰 시장 점유율을 차지하고 있습니다. 제조업은 인더스트리 4.0의 도입으로 강력한 성장이 예상되고 있습니다.

지역별 동향

북미는 2025년 10억 3,000만 달러로 시장을 주도할 것으로 예상되며, 주요 기업의 강력한 입지와 첨단 사이버 보안 도입에 힘입어 2026년에는 11억 8,000만 달러에 달할 것으로 전망됩니다.

아시아태평양은 2025년 5억 6,000만 달러를 차지할 것으로 예상되며, 인도, 중국 등의 국가에서 IoT의 보급 확대와 디지털화 진전에 따라 빠른 성장이 예상됩니다.

유럽은 2025년 6억 7,000만 달러를 차지할 것으로 예상되며, 사이버 위협 증가와 정부 투자 확대로 인해 지속적으로 확대되고 있습니다.

중동 및 아프리카 및 라틴아메리카에서는 사이버 보안 인프라에 대한 인식 제고와 투자 증가에 힘입어 꾸준한 성장세를 보이고 있습니다.

엔드포인트 보안의 취약성, 도입의 복잡성 등의 문제가 존재하지만, 클라우드 컴퓨팅, AI, 제로 트러스트 아키텍처의 발전으로 이러한 장벽을 극복할 수 있을 것으로 예측됩니다. 전반적으로, 향후 몇 년 동안 디셉션 기술은 사이버 보안 전략을 강화하고 현대 디지털 인프라를 보호하는 데 있어 매우 중요한 역할을 할 것입니다.

목차

제1장 서론

제2장 주요 요약

제3장 시장 역학

제4장 경쟁 구도

제5장 세계의 디셉션 기술 시장 규모 추정, 예측, 2021년-2034년

제6장 북미의 디셉션 기술 시장 규모 추정, 예측, 2021년-2034년

제7장 유럽의 디셉션 기술 시장 규모 추정, 예측, 2021년-2034년

제8장 아시아태평양의 디셉션 기술 시장 규모 추정, 예측, 2021년-2034년

제9장 중동 및 아프리카의 디셉션 기술 시장 규모 추정, 예측, 2021년-2034년

제10장 남아메리카의 디셉션 기술 시장 규모 추정, 예측, 2021년-2034년

제11장 주요 10개사 기업 개요

제12장 요점

LSH 26.05.14

Growth Factors of deception technology Market

The global deception technology market was valued at USD 2.54 billion in 2025 and is projected to grow to USD 2.92 billion in 2026, reaching USD 6.74 billion by 2034, exhibiting a CAGR of 11% during the forecast period (2026-2034). North America dominated the market with a 40% share in 2025, driven by early adoption and strong cybersecurity infrastructure.

Deception technology is an advanced cybersecurity approach that protects organizational data by deploying decoy assets such as fake servers, credentials, applications, and databases within networks. These decoys are designed to appear real, making it difficult for attackers to distinguish them from actual assets. When cybercriminals interact with these decoys, the system triggers alerts, enabling early threat detection and response.

The technology is gaining popularity due to its cost-effectiveness and efficiency, especially among small and medium-sized enterprises (SMEs).

Impact of COVID-19 on Market Growth

The COVID-19 pandemic significantly influenced the growth of the deception technology market. The shift toward remote work, increased online activities, and rapid digital transformation led to a surge in cyberattacks globally.

According to industry studies, cybercrime increased dramatically during the pandemic, prompting organizations across sectors such as BFSI, manufacturing, and retail to adopt advanced cybersecurity solutions. Deception technology emerged as a reliable tool for identifying and mitigating threats in real time.

Market Trends

Adoption of Zero-Trust Architecture

One of the key trends shaping the market is the growing adoption of zero-trust architecture (ZTA). This approach assumes that threats may exist both inside and outside the network and enforces strict verification for all users and devices.

Deception technology complements zero-trust frameworks by identifying lateral movement within networks and detecting insider threats. As organizations increasingly implement digital transformation strategies, the demand for integrated security solutions is rising.

Integration with Emerging Technologies

The integration of deception platforms with cloud computing, IoT, and mobile technologies is enhancing their effectiveness. These integrations enable better threat visibility, scalability, and protection across complex IT environments.

Market Dynamics

Market Drivers

The primary driver of market growth is the rising number of cyber threats and data breaches. Increasing adoption of IoT devices and connected systems has expanded the attack surface, necessitating advanced security solutions.

Additionally, government investments in cybersecurity and regulatory compliance requirements are encouraging organizations to adopt deception technology to safeguard sensitive data.

Market Restraints

Despite its advantages, the market faces challenges such as weak network security infrastructure in some organizations. If endpoints are compromised, attackers can still access critical data, limiting the effectiveness of deception systems.

Furthermore, designing realistic and scalable decoys requires technical expertise, which can hinder adoption.

Segmentation Analysis

By Component

The solutions segment dominates the market and is projected to hold 64.99% share in 2026, driven by increased deployment across industries. The services segment is expected to grow at a higher CAGR due to demand for professional and managed services.

By Deployment Mode

The cloud-based segment leads the market with 71.96% share in 2026, owing to cost efficiency, scalability, and remote accessibility.

By Enterprise Type

Large enterprises dominate with a 60.96% share in 2026, as they require advanced security frameworks to manage complex infrastructures. SMEs are also rapidly adopting due to affordability.

By Vertical

The BFSI sector holds the largest market share due to the need for robust data protection. Manufacturing is expected to witness strong growth due to Industry 4.0 adoption.

Regional Insights

North America led the market with USD 1.03 billion in 2025 and is projected to reach USD 1.18 billion in 2026, supported by strong presence of key players and advanced cybersecurity adoption.

Asia Pacific accounted for USD 0.56 billion in 2025 and is expected to grow rapidly due to increasing IoT adoption and digitalization in countries like India and China.

Europe held USD 0.67 billion in 2025 and continues to expand due to rising cyber threats and increased government investments.

Middle East & Africa and Latin America are witnessing steady growth driven by increasing awareness and investments in cybersecurity infrastructure.

Competitive Landscape

Key players in the market include Attivo Networks, Inc., Rapid7, Inc., Illusive Networks, Inc., Fidelis Cybersecurity, Guardicore, and Trapx Security. These companies are focusing on innovation, partnerships, and acquisitions to strengthen their market position.

Recent developments include platform upgrades, AI integration, and strategic collaborations to enhance threat detection capabilities.

Conclusion

The deception technology market is experiencing steady growth, driven by rising cyber threats, increasing digital transformation, and growing adoption of advanced security frameworks. With market value expected to increase from USD 2.54 billion in 2025 to USD 6.74 billion by 2034, the industry presents strong growth opportunities.

Although challenges such as weak endpoint security and complexity in deployment exist, advancements in cloud computing, AI, and zero-trust architecture are expected to overcome these barriers. Overall, deception technology will play a critical role in strengthening cybersecurity strategies and protecting modern digital infrastructures in the coming years.

Segmentation By Component

  • Solution
  • Services

By Deception Stack

  • Application Security
  • Data Security
  • Endpoint Security
  • Network Security

By Deployment Mode

  • On-Premise
  • Cloud-based

By Enterprise Type

  • Small and Medium Enterprises (SMEs)
  • Large Enterprises

By Vertical

  • Banking, Financial Services, and Insurance (BFSI)
  • Energy & Utilities
  • Government
  • Healthcare
  • Telecom and IT
  • Manufacturing
  • Retail
  • Others (Education, Defense, and Others)

By Region

  • North America (By Component, By Deception Stack, By Deployment Mode, By Enterprise Type, By Vertical, and By Country)
    • U.S. (By Deception Stack)
    • Canada (By Deception Stack)
    • Mexico (By Deception Stack)
  • South America (By Component, By Deception Stack, By Deployment Mode, By Enterprise Type, By Vertical, and By Country)
    • Brazil (By Deception Stack)
    • Argentina (By Deception Stack)
    • Rest of Latin America (By Deception Stack)
  • Europe (By Component, By Deception Stack, By Deployment Mode, By Enterprise Type, By Vertical, and By Country)
    • U.K. (By Deception Stack)
    • Germany (By Deception Stack)
    • France (By Deception Stack)
    • Italy (By Deception Stack)
    • Spain (By Deception Stack)
    • Russia (By Deception Stack)
    • Benelux (By Deception Stack)
    • Nordics (By Deception Stack)
    • Rest of Europe (By Deception Stack)
  • Middle East & Africa (By Component, By Deception Stack, By Deployment Mode, By Enterprise Type, By Vertical, and By Country)
    • Turkey (By Deception Stack)
    • Israel (By Deception Stack)
    • GCC (By Deception Stack)
    • North Africa (By Deception Stack)
    • South Africa (By Deception Stack)
    • Rest of the Middle East & Africa
  • Asia Pacific (By Component, By Deception Stack, By Deployment Mode, By Enterprise Type, By Vertical, and By Country)
    • China (By Deception Stack)
    • Japan (By Deception Stack)
    • India (By Deception Stack)
    • South Korea (By Deception Stack)
    • ASEAN (By Deception Stack)
    • Oceania (By Deception Stack)
    • Rest of Asia Pacific (By Deception Stack)

Table of Content

1. Introduction

  • 1.1. Definition, By Segment
  • 1.2. Research Methodology/Approach
  • 1.3. Data Sources

2. Executive Summary

3. Market Dynamics

  • 3.1. Macro and Micro Economic Indicators
  • 3.2. Drivers, Restraints, Opportunities and Trends

4. Competition Landscape

  • 4.1. Business Strategies Adopted by Key Players
  • 4.2. Consolidated SWOT Analysis of Key Players
  • 4.3. Global Deception Technology Key Players Market Share/Ranking, 2025

5. Global Deception Technology Market Size Estimates and Forecasts, By Segments, 2021-2034

  • 5.1. Key Findings
  • 5.2. By Component (USD)
    • 5.2.1. Solution
    • 5.2.2. Services
  • 5.3. By Deception Stack (USD)
    • 5.3.1. Application Security
    • 5.3.2. Data Security
    • 5.3.3. Endpoint Security
    • 5.3.4. Network Security
  • 5.4. By Deployment (USD)
    • 5.4.1. On-premise
    • 5.4.2. Cloud-based
  • 5.5. By Enterprise Type (USD)
    • 5.5.1. Small and Medium Enterprises (SMEs)
    • 5.5.2. Large Enterprises
  • 5.6. By Vertical (USD)
    • 5.6.1. Banking, Financial Services, and Insurance (BFSI)
    • 5.6.2. Energy & Utilities
    • 5.6.3. Government
    • 5.6.4. Healthcare
    • 5.6.5. Telecom & IT
    • 5.6.6. Manufacturing
    • 5.6.7. Retail
    • 5.6.8. Others (Education, Defense, etc.)
  • 5.7. By Region (USD)
    • 5.7.1. North America
    • 5.7.2. Europe
    • 5.7.3. Asia Pacific
    • 5.7.4. Middle East & Africa
    • 5.7.5. South America

6. North America Deception Technology Market Size Estimates and Forecasts, By Segments, 2021-2034

  • 6.1. Key Findings
  • 6.2. By Component (USD)
    • 6.2.1. Solution
    • 6.2.2. Services
  • 6.3. By Deception Stack (USD)
    • 6.3.1. Application Security
    • 6.3.2. Data Security
    • 6.3.3. Endpoint Security
    • 6.3.4. Network Security
  • 6.4. By Deployment (USD)
    • 6.4.1. On-premise
    • 6.4.2. Cloud-based
  • 6.5. By Enterprise Type (USD)
    • 6.5.1. Small and Medium Enterprises (SMEs)
    • 6.5.2. Large Enterprises
  • 6.6. By Vertical (USD)
    • 6.6.1. Banking, Financial Services, and Insurance (BFSI)
    • 6.6.2. Energy & Utilities
    • 6.6.3. Government
    • 6.6.4. Healthcare
    • 6.6.5. Telecom & IT
    • 6.6.6. Manufacturing
    • 6.6.7. Retail
    • 6.6.8. Others (Education, Defense, and Others)
  • 6.7. By Country (USD)
    • 6.7.1. United States
      • 6.7.1.1. By Deception Stack
    • 6.7.2. Canada
      • 6.7.2.1. By Deception Stack
    • 6.7.3. Mexico
      • 6.7.3.1. By Deception Stack

7. Europe Deception Technology Market Size Estimates and Forecasts, By Segments, 2021-2034

  • 7.1. Key Findings
  • 7.2. By Component (USD)
    • 7.2.1. Solution
    • 7.2.2. Services
  • 7.3. By Deception Stack (USD)
    • 7.3.1. Application Security
    • 7.3.2. Data Security
    • 7.3.3. Endpoint Security
    • 7.3.4. Network Security
  • 7.4. By Deployment (USD)
    • 7.4.1. On-premise
    • 7.4.2. Cloud-based
  • 7.5. By Enterprise Type (USD)
    • 7.5.1. Small and Medium Enterprises (SMEs)
    • 7.5.2. Large Enterprises
  • 7.6. By Vertical (USD)
    • 7.6.1. Banking, Financial Services, and Insurance (BFSI)
    • 7.6.2. Energy & Utilities
    • 7.6.3. Government
    • 7.6.4. Healthcare
    • 7.6.5. Telecom & IT
    • 7.6.6. Manufacturing
    • 7.6.7. Retail
    • 7.6.8. Others (Education, Defense, etc.)
  • 7.7. By Country (USD)
    • 7.7.1. United Kingdom
      • 7.7.1.1. By Deception Stack
    • 7.7.2. Germany
      • 7.7.2.1. By Deception Stack
    • 7.7.3. France
      • 7.7.3.1. By Deception Stack
    • 7.7.4. Italy
      • 7.7.4.1. By Deception Stack
    • 7.7.5. Spain
      • 7.7.5.1. By Deception Stack
    • 7.7.6. Russia
      • 7.7.6.1. By Deception Stack
    • 7.7.7. Benelux
      • 7.7.7.1. By Deception Stack
    • 7.7.8. Nordics
      • 7.7.8.1. By Deception Stack
    • 7.7.9. Rest of Europe

8. Asia Pacific Deception Technology Market Size Estimates and Forecasts, By Segments, 2021-2034

  • 8.1. Key Findings
  • 8.2. By Component (USD)
    • 8.2.1. Solution
    • 8.2.2. Services
  • 8.3. By Deception Stack (USD)
    • 8.3.1. Application Security
    • 8.3.2. Data Security
    • 8.3.3. Endpoint Security
    • 8.3.4. Network Security
  • 8.4. By Deployment (USD)
    • 8.4.1. On-premise
    • 8.4.2. Cloud-based
  • 8.5. By Enterprise Type (USD)
    • 8.5.1. Small and Medium Enterprises (SMEs)
    • 8.5.2. Large Enterprises
  • 8.6. By Vertical (USD)
    • 8.6.1. Banking, Financial Services, and Insurance (BFSI)
    • 8.6.2. Energy & Utilities
    • 8.6.3. Government
    • 8.6.4. Healthcare
    • 8.6.5. Telecom & IT
    • 8.6.6. Manufacturing
    • 8.6.7. Retail
    • 8.6.8. Others (Education, Defense, etc.)
  • 8.7. By Country (USD)
    • 8.7.1. China
      • 8.7.1.1. By Deception Stack
    • 8.7.2. India
      • 8.7.2.1. By Deception Stack
    • 8.7.3. Japan
      • 8.7.3.1. By Deception Stack
    • 8.7.4. South Korea
      • 8.7.4.1. By Deception Stack
    • 8.7.5. ASEAN
      • 8.7.5.1. By Deception Stack
    • 8.7.6. Oceania
      • 8.7.6.1. By Deception Stack
    • 8.7.7. Rest of Asia Pacific

9. Middle East & Africa Deception Technology Market Size Estimates and Forecasts, By Segments, 2021-2034

  • 9.1. Key Findings
  • 9.2. By Component (USD)
    • 9.2.1. Solution
    • 9.2.2. Services
  • 9.3. By Deception Stack (USD)
    • 9.3.1. Application Security
    • 9.3.2. Data Security
    • 9.3.3. Endpoint Security
    • 9.3.4. Network Security
  • 9.4. By Deployment (USD)
    • 9.4.1. On-premise
    • 9.4.2. Cloud-based
  • 9.5. By Enterprise Type (USD)
    • 9.5.1. Small and Medium Enterprises (SMEs)
    • 9.5.2. Large Enterprises
  • 9.6. By Vertical (USD)
    • 9.6.1. Banking, Financial Services, and Insurance (BFSI)
    • 9.6.2. Energy & Utilities
    • 9.6.3. Government
    • 9.6.4. Healthcare
    • 9.6.5. Telecom & IT
    • 9.6.6. Manufacturing
    • 9.6.7. Retail
    • 9.6.8. Others (Education, Defense, etc.)
  • 9.7. By Country (USD)
    • 9.7.1. Turkey
      • 9.7.1.1. By Deception Stack
    • 9.7.2. Israel
      • 9.7.2.1. By Deception Stack
    • 9.7.3. GCC
      • 9.7.3.1. By Deception Stack
    • 9.7.4. North Africa
      • 9.7.4.1. By Deception Stack
    • 9.7.5. South Africa
      • 9.7.5.1. By Deception Stack
    • 9.7.6. Rest of MEA

10. South America Deception Technology Market Size Estimates and Forecasts, By Segments, 2021-2034

  • 10.1. Key Findings
  • 10.2. By Component (USD)
    • 10.2.1. Solution
    • 10.2.2. Services
  • 10.3. By Deception Stack (USD)
    • 10.3.1. Application Security
    • 10.3.2. Data Security
    • 10.3.3. Endpoint Security
    • 10.3.4. Network Security
  • 10.4. By Deployment (USD)
    • 10.4.1. On-premise
    • 10.4.2. Cloud-based
  • 10.5. By Enterprise Type (USD)
    • 10.5.1. Small and Medium Enterprises (SMEs)
    • 10.5.2. Large Enterprises
  • 10.6. By Vertical (USD)
    • 10.6.1. Banking, Financial Services, and Insurance (BFSI)
    • 10.6.2. Energy & Utilities
    • 10.6.3. Government
    • 10.6.4. Healthcare
    • 10.6.5. Telecom & IT
    • 10.6.6. Manufacturing
    • 10.6.7. Retail
    • 10.6.8. Others (Education, Defense, etc.)
  • 10.7. By Country (USD)
    • 10.7.1. Brazil
      • 10.7.1.1. By Deception Stack
    • 10.7.2. Argentina
      • 10.7.2.1. By Deception Stack
    • 10.7.3. Rest of South America

11. Company Profiles for Top 10 Players (Based on data availability in public domain and/or on paid databases)

  • 11.1. Attivo Networks, Inc.
    • 11.1.1. Overview
      • 11.1.1.1. Key Management
      • 11.1.1.2. Headquarters
      • 11.1.1.3. Offerings/Business Segments
    • 11.1.2. Key Details (Key details are consolidated data and not product/service specific)
      • 11.1.2.1. Employee Size
      • 11.1.2.2. Past and Current Revenue
      • 11.1.2.3. Geographical Share
      • 11.1.2.4. Business Segment Share
      • 11.1.2.5. Recent Developments
  • 11.2. Rapid7, Inc.
    • 11.2.1. Overview
      • 11.2.1.1. Key Management
      • 11.2.1.2. Headquarters
      • 11.2.1.3. Offerings/Business Segments
    • 11.2.2. Key Details (Key details are consolidated data and not product/service specific)
      • 11.2.2.1. Employee Size
      • 11.2.2.2. Past and Current Revenue
      • 11.2.2.3. Geographical Share
      • 11.2.2.4. Business Segment Share
      • 11.2.2.5. Recent Developments
  • 11.3. Illusive Networks, Inc.
    • 11.3.1. Overview
      • 11.3.1.1. Key Management
      • 11.3.1.2. Headquarters
      • 11.3.1.3. Offerings/Business Segments
    • 11.3.2. Key Details (Key details are consolidated data and not product/service specific)
      • 11.3.2.1. Employee Size
      • 11.3.2.2. Past and Current Revenue
      • 11.3.2.3. Geographical Share
      • 11.3.2.4. Business Segment Share
      • 11.3.2.5. Recent Developments
  • 11.4. TopSpin Security (Fidelis Cybersecurity)
    • 11.4.1. Overview
      • 11.4.1.1. Key Management
      • 11.4.1.2. Headquarters
      • 11.4.1.3. Offerings/Business Segments
    • 11.4.2. Key Details (Key details are consolidated data and not product/service specific)
      • 11.4.2.1. Employee Size
      • 11.4.2.2. Past and Current Revenue
      • 11.4.2.3. Geographical Share
      • 11.4.2.4. Business Segment Share
      • 11.4.2.5. Recent Developments
  • 11.5. Allure Security Technology, Inc.
    • 11.5.1. Overview
      • 11.5.1.1. Key Management
      • 11.5.1.2. Headquarters
      • 11.5.1.3. Offerings/Business Segments
    • 11.5.2. Key Details (Key details are consolidated data and not product/service specific)
      • 11.5.2.1. Employee Size
      • 11.5.2.2. Past and Current Revenue
      • 11.5.2.3. Geographical Share
      • 11.5.2.4. Business Segment Share
      • 11.5.2.5. Recent Developments
  • 11.6. PacketViperDell Inc.
    • 11.6.1. Overview
      • 11.6.1.1. Key Management
      • 11.6.1.2. Headquarters
      • 11.6.1.3. Offerings/Business Segments
    • 11.6.2. Key Details (Key details are consolidated data and not product/service specific)
      • 11.6.2.1. Employee Size
      • 11.6.2.2. Past and Current Revenue
      • 11.6.2.3. Geographical Share
      • 11.6.2.4. Business Segment Share
      • 11.6.2.5. Recent Developments
  • 11.7. CyberTrap Software GmbH
    • 11.7.1. Overview
      • 11.7.1.1. Key Management
      • 11.7.1.2. Headquarters
      • 11.7.1.3. Offerings/Business Segments
    • 11.7.2. Key Details (Key details are consolidated data and not product/service specific)
      • 11.7.2.1. Employee Size
      • 11.7.2.2. Past and Current Revenue
      • 11.7.2.3. Geographical Share
      • 11.7.2.4. Business Segment Share
      • 11.7.2.5. Recent Developments
  • 11.8. LogRhythm, Inc.
    • 11.8.1. Overview
      • 11.8.1.1. Key Management
      • 11.8.1.2. Headquarters
      • 11.8.1.3. Offerings/Business Segments
    • 11.8.2. Key Details (Key details are consolidated data and not product/service specific)
      • 11.8.2.1. Employee Size
      • 11.8.2.2. Past and Current Revenue
      • 11.8.2.3. Geographical Share
      • 11.8.2.4. Business Segment Share
      • 11.8.2.5. Recent Developments
  • 11.9. Cynet Systems
    • 11.9.1. Overview
      • 11.9.1.1. Key Management
      • 11.9.1.2. Headquarters
      • 11.9.1.3. Offerings/Business Segments
    • 11.9.2. Key Details (Key details are consolidated data and not product/service specific)
      • 11.9.2.1. Employee Size
      • 11.9.2.2. Past and Current Revenue
      • 11.9.2.3. Geographical Share
      • 11.9.2.4. Business Segment Share
      • 11.9.2.5. Recent Developments
  • 11.10. Smokescreen Technologies
    • 11.10.1. Overview
      • 11.10.1.1. Key Management
      • 11.10.1.2. Headquarters
      • 11.10.1.3. Offerings/Business Segments
    • 11.10.2. Key Details (Key details are consolidated data and not product/service specific)
      • 11.10.2.1. Employee Size
      • 11.10.2.2. Past and Current Revenue
      • 11.10.2.3. Geographical Share
      • 11.10.2.4. Business Segment Share
      • 11.10.2.5. Recent Developments

12. Key Takeaways

샘플 요청 목록
0 건의 상품을 선택 중
목록 보기
전체삭제
문의
원하시는 정보를
찾아 드릴까요?
문의주시면 필요한 정보를
신속하게 찾아드릴게요.
02-2025-2992
kr-info@giikorea.co.kr
문의하기