½ÃÀ庸°í¼­
»óǰÄÚµå
1308051

¼¼°èÀÇ Å¬¶ó¿ìµå ¿öÅ©·Îµå º¸È£ Ç÷§Æû ½ÃÀå ¼ºÀå ±âȸ

Global Cloud Workload Protection Platform Growth Opportunities

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: Frost & Sullivan | ÆäÀÌÁö Á¤º¸: ¿µ¹® 139 Pages | ¹è¼Û¾È³» : 1-2ÀÏ (¿µ¾÷ÀÏ ±âÁØ)

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

·±Å¸ÀÓ º¸È£ ¿ä±¸°¡ Áõ°¡ÇÔ¿¡ µû¶ó Ŭ¶ó¿ìµå ¿öÅ©·Îµå º¸È£ Ç÷§Æû(CWPP : Cloud Workload Protection Platform) ½ÃÀåÀÇ ÀáÀçÀû ¼ºÀåÀÌ ÃËÁøµË´Ï´Ù.

¼¼°èÀÇ Á¶Á÷Àº ¼öÀÍ È®´ë, °í°´ °æÇè ¹×¸¸Á·µµ Çâ»ó, ºñÁî´Ï½º È¿À²¼º °³¼± µî ºñÁî´Ï½º ¸ñÇ¥¸¦ ¼¼¿ì°í DX(µðÁöÅÐ º¯È¯) ÃßÁøÀ» ÃËÁøÇϱâ À§ÇØ Å¬¶ó¿ìµå·Î ÀüȯÇϰí ÀÖ½À´Ï´Ù.

Cloud User Survey 2022(¼¼°èÀÇ ¾à 1,000°³ Á¶Á÷À» ´ë»óÀ¸·Î ÇÏ´Â ÃÖ±Ù ºÐ¼®)¿¡ µû¸£¸é 73% Á¶Á÷ÀÌ Å¬¶ó¿ìµå¸¦ ºñÁî´Ï½º ¿ì¼±¼øÀ§¸¦ ´Þ¼ºÇÏ´Â µ¥ °¡Àå Áß¿ä ±â¼ú·Î °£ÁÖÇÏ¸ç ºòµ¥ÀÌÅÍ ºÐ¼®, IoT, Çù¾÷ ¹× ȸÀÇ, AI/MLÀ» Æ÷ÇÔÇÑ ±âŸ ±â¼ú Áß °¡Àå ³ôÀº ¼öÄ¡¸¦ º¸¿©ÁÝ´Ï´Ù.

°Ô´Ù°¡ ºÐ¼®¿¡ µû¸£¸é Ŭ¶ó¿ìµå ¸¶À̱׷¹À̼ÇÀº ºÒ°¡ÇÇÇÑ Ãß¼¼ÀÌ¸ç ´ëºÎºÐ ±â¾÷Àº ÀÌ¹Ì ÆÛºí¸¯ Ŭ¶ó¿ìµå¸¦ »ç¿ëÇϰí ÀÖ¾î ¸¶À̱׷¹À̼ÇÀ» °èȹÇϰí ÀÖ´Â ±â¾÷µµ ¸¹¾ÆÁö°í ÀÖ½À´Ï´Ù. ¿£ÅÍÇÁ¶óÀÌÁî´Â ¿©·¯ Ŭ¶ó¿ìµå Á¦°ø¾÷ü ÀÌÁ¡À» Ȱ¿ëÇϱâ À§ÇØ ¸ÖƼŬ¶ó¿ìµå Àü·«µµ ³Î¸® »ç¿ëÇÕ´Ï´Ù.

ÀÌ·¯ÇÑ ½Ã³ª¸®¿À¸¦ ÅëÇØ Ŭ¶ó¿ìµå º¸¾È ±â¼ú Àüü, ƯÈ÷ Ŭ¶ó¿ìµå ¿öÅ©·Îµå º¸È£ Ç÷§Æû ¹× Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¿ëµµ, º¸È£ Ç÷§Æû Ŭ¶ó¿ìµå ȯ°æ ½ÇÇàµÇ´Â ¿öÅ©·Îµå ¹× ¿ëµµÀ» º¸È£ÇؾßÇÒ Çʿ伺ÀÌ ³ô¾ÆÁö¹Ç·Î ´õ ¸¹Àº ±âȸ°¡ ¸¸µé¾îÁý´Ï´Ù.

¸ñÂ÷

Àü·« °úÁ¦

  • ¿Ö ¼ºÀåÀÌ ¾î·Á¿öÁö°í Àִ°¡
  • The Strategic Imperative 8(TM)
  • ¼¼°èÀÇ Å¬¶ó¿ìµå ¿öÅ©·Îµå º¸È£ Ç÷§Æû(CWPP) ½ÃÀå¿¡ ¿µÇâÀ» ¹ÌÄ¡´Â Àü·« °úÁ¦ : »óÀ§ 3°³ Ç׸ñ ¿µÇâ
  • ¼ºÀå ±âȸ Growth Pipeline Engine(TM) ÃËÁø

¼ºÀå ±âȸ ºÐ¼® : ½ÃÀå Á¤ÀÇ

  • ½ÃÀå Á¤ÀÇ
  • ½ÃÀå Á¤ : CWPP ´É·Â
  • ½ÃÀå Á¤ : CWPP ·¹À̾î

¼ºÀå ±âȸ ºÐ¼® : ¼¼°èÀÇ CWPP ½ÃÀå ÁÖ¿ä ¿ä¾à

  • ºÐ¼® ¹üÀ§
  • ¼öÀÍ ¿¹Ãø ¸éÃ¥»çÇ×
  • °í°´ ºÎ¹®
  • Á¶»ç ¹æ¹ý
  • ÁÖ¿ä Á¶»ç °á°ú
  • ½ÃÀå ÁÖ¿ä ¿ä¾à : ÁÖ¿ä Æ¯Â¡°ú ±â´É
  • ½ÃÀå ¼¼ºÐÈ­
  • ÁÖ¿ä °æÀï
  • ÁÖ¿ä ¼ºÀå ÁöÇ¥
  • ¼ºÀå ÃËÁø ¿äÀÎ
  • ¼ºÀå ÃËÁø ¿äÀÎ ºÐ¼®
  • ¼ºÀå ¾ïÁ¦ ¿äÀÎ
  • ¼ºÀå ¾ïÁ¦ ¿äÀÎ ºÐ¼®
  • ¿¹Ãø ÀüÁ¦Á¶°Ç
  • ¼öÀÍ ¿¹Ãø
  • ¼öÀÍ ¿¹Ãø ºÐ¼®
  • Áö¿ªº° ¼öÀÍ ¿¹Ãø
  • Áö¿ªº° ¼öÀÍ, ¿¹Ãø ºÐ¼®
  • °¡°Ý µ¿Çâ°ú ¿¹Ãø ºÐ¼®
  • ¾÷Á¾º° ÆÇ¸Å Á¡À¯À²
  • Àüü ÆÇ¸Å Á¡À¯À²
  • ¼öÀÍ Á¡À¯À²
  • °æÀï ȯ°æ

ÁÖ¿ä º¥´õ ºÐ¼®

  • º¥´õ ÇÁ·ÎÇÊ : Aqua Security
  • º¥´õ ¼Ö·ç¼Ç : Aqua CNSP
  • º¥´õ ÇÁ·ÎÇÊ : Check Point Software Technologies
  • º¥´õ ¼Ö·ç¼Ç:Check Point CloudGuard
  • º¥´õ ÇÁ·ÎÇÊ:Cisco
  • °ø±Þ¾÷ü ¼Ö·ç¼Ç : Cisco Secure Workload
  • º¥´õ ÇÁ·ÎÇÊ : CrowdStrike
  • º¥´õ ¼Ö·ç¼Ç : CrowdStrike Falcon Cloud Security
  • º¥´õ ÇÁ·ÎÇÊ:Kaspersky
  • º¥´õ ¼Ö·ç¼Ç : Kaspersky Hybrid Cloud Security(KHCS)
  • º¥´õ ÇÁ·ÎÇÊ:Lacework
  • º¥´õ ¼Ö·ç¼Ç : Lacework Polygraph Data Platform
  • °ø±Þ¾÷ü ÇÁ·ÎÇÊ : Microsoft Security
  • °ø±Þ¾÷ü ¼Ö·ç¼Ç : Microsoft Defender for Cloud
  • º¥´õ ÇÁ·ÎÇÊ:Orca Security
  • º¥´õ ¼Ö·ç¼Ç : Orca Cloud Security Platform
  • º¥´õ ÇÁ·ÎÇÊ : PANW
  • º¥´õ ¼Ö·ç¼Ç : PANW Prisma Cloud Platform
  • º¥´õ ÇÁ·ÎÇÊ : Red Hat
  • º¥´õ ¼Ö·ç¼Ç : RHACS
  • º¥´õ ÇÁ·ÎÇÊ : SentinelOne
  • º¥´õ ¼Ö·ç¼Ç : Singularity Cloud Workload Security
  • º¥´õ ÇÁ·ÎÇÊ : Sysdig
  • º¥´õ ¼Ö·ç¼Ç : Sysdig Secure
  • º¥´õ ÇÁ·ÎÇÊ : Tigera
  • º¥´õ ¼Ö·ç¼Ç : Tigera Calico Cloud
  • º¥´õ ÇÁ·ÎÇÊ : Trend Micro
  • º¥´õ ¼Ö·ç¼Ç : Trend Micro Cloud One
  • º¥´õ ÇÁ·ÎÇÊ:Trellix
  • º¥´õ ¼Ö·ç¼Ç : Trellix CWS Advanced Suite
  • º¥´õ ÇÁ·ÎÇÊ:Wiz
  • º¥´õ ¼Ö·ç¼Ç : Wiz Cloud Security Platform

±âŸ ÁÖ¸ñÇÒ¸¸ÇÑ º¥´õ ºÐ¼®

  • º¥´õ ÇÁ·ÎÇÊ:Alibaba Cloud
  • º¥´õ ÇÁ·ÎÇÊ : ColorTokens
  • º¥´õ ÇÁ·ÎÇÊ : NSFOCUS
  • º¥´õ ÇÁ·ÎÇÊ : QI-ANXIN ±×·ì
  • º¥´õ ÇÁ·ÎÇÊ:Qualys
  • º¥´õ ÇÁ·ÎÇÊ : Tenable
  • º¥´õ ÇÁ·ÎÇÊ:VMware

¼ºÀå ±âȸ ºÐ¼® : ºÏ¹Ì

  • ÁÖ¿ä ¼ºÀå ÁöÇ¥
  • ¼öÀͰú ¿¹Ãø
  • ¿¹Ãø ºÐ¼®
  • ¾÷°èº°, Àüü ¸ÅÃâ¾× ºñÀ²
  • ¼öÀÍ Á¡À¯À²

¼ºÀå ±âȸ ºÐ¼® : À¯·´, Áßµ¿, ¾ÆÇÁ¸®Ä«(EMEA)

  • ÁÖ¿ä ¼ºÀå ÁöÇ¥
  • ¼öÀͰú ¿¹Ãø
  • ¿¹Ãø ºÐ¼®
  • ¾÷°èº°, Àüü ¸ÅÃâ¾× ºñÀ²
  • ¼öÀÍ Á¡À¯À²

¼ºÀå ±âȸ ºÐ¼® : ¾Æ½Ã¾ÆÅÂÆò¾ç

  • ÁÖ¿ä ¼ºÀå ÁöÇ¥
  • ¼öÀͰú ¿¹Ãø
  • ¿¹Ãø ºÐ¼®
  • ¾÷°èº°, Àüü ¸ÅÃâ¾× ºñÀ²
  • ¼öÀÍ Á¡À¯À²

¼ºÀå ±âȸ ºÐ¼® : ¶óƾ¾Æ¸Þ¸®Ä«

  • ÁÖ¿ä ¼ºÀå ÁöÇ¥
  • ¼öÀͰú ¿¹Ãø
  • ¿¹Ãø ºÐ¼®
  • ¾÷°èº°, Àüü ¸ÅÃâ¾× ºñÀ²
  • ¼öÀÍ Á¡À¯À²

¼ºÀå ±âȸ À¯´Ï¹ö½º

  • ¼ºÀå ±âȸ 1 : Ŭ¶ó¿ìµå¿Í Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ±â¼ú µµÀÔ °¡¼Ó CWPP ±âȸ È®´ë
  • ¼ºÀå ±âȸ 2 : °ü¸® º¸¾È ¼­ºñ½º ¹× Àü¹® º¸¾È ¼­ºñ½º ¼ö¿ä Áõ°¡
  • ¼ºÀå ±âȸ 3 : ÅëÇÕ Ç÷§ÆûÀ¸·Î Àα⠻ó½ÂÀ¸·Î CNAPP¿Í SASE ºñÁî´Ï½º È®´ë

CISO Àü¸Á

  • CWPP ¹Ì·¡
  • CWPP ½ÃÀå : CISO ¿ì·Á
  • CWPP ½ÃÀå : ºÐ¼®°ú Á¦¾È

´ÙÀ½ ´Ü°è

  • ´ÙÀ½ ´Ü°è
  • ¿Ö Frost& SullivanÀΰ¡
  • º°Áö ¸®½ºÆ®
  • ¸éÃ¥»çÇ×
NJH 23.08.21

Increasing Requirements for Run-time Protection Driving the Potential Growth of CWPP

Organizations worldwide migrate to the cloud to facilitate their digital transformation journey, with the business goals of growing revenue, improving customer experience and satisfaction, and improving operational efficiency.

The recent Cloud User Survey 2022, which involved nearly 1000 worldwide organizations, shows that 73% of them see cloud as the most important technology to achieve business priorities, the highest among other technologies, including big data analytics, IoT, collaboration and conferencing, and AI/ML as businesses re-establish their priorities in the new normal of post-pandemic markets.

Furthermore, the survey shows that moving to the cloud is an inevitable trend that most organizations have embraced, with a majority already using public clouds and many more that plan to migrate. Multicloud strategies become more common as well, as companies seek to leverage the benefits of multiple cloud providers.

This scenario creates more opportunities for cloud security technologies as a whole and, in particular, for cloud workload protection platforms and cloud-native application protection platforms due to the need to secure the workloads and applications running in these cloud environments.

Table of Contents

Strategic Imperatives

  • Why is it Increasingly Difficult to Grow?
  • The Strategic Imperative 8™
  • The Impact of the Top 3 Strategic Imperatives on the Global Cloud Workload Protection Platform (CWPP) Market
  • Growth Opportunities Fuel the Growth Pipeline Engine™

Growth Opportunity Analysis: Market Definitions

  • Market Definition
  • Market Definition: CWPP Capabilities
  • Market Definition: CWPP Layers

Growth Opportunity Analysis: Global CWPP Market Overview

  • Scope of Analysis
  • Revenue Estimate Disclaimer
  • Customer Segmentation
  • Research Methodology
  • Key Findings
  • Market Overview: Top Features and Capabilities
  • Market Segmentation
  • Key Competitors
  • Key Growth Metrics
  • Growth Drivers
  • Growth Driver Analysis
  • Growth Restraints
  • Growth Restraint Analysis
  • Forecast Assumptions
  • Revenue Forecast
  • Revenue Forecast Analysis
  • Revenue Forecast by Region
  • Revenue Forecast Analysis by Region
  • Pricing Trends and Forecast Analysis
  • Percent Revenue by Vertical
  • Percent Revenue by Horizontal
  • Revenue Share
  • Competitive Environment

Top Vendor Analysis

  • Vendor Profile: Aqua Security
  • Vendor Solution: Aqua's CNSP
  • Vendor Profile: Check Point Software Technologies
  • Vendor Solution: Check Point's CloudGuard
  • Vendor Profile: Cisco
  • Vendor Solution: Cisco Secure Workload
  • Vendor Profile: CrowdStrike
  • Vendor Solution: CrowdStrike's Falcon Cloud Security
  • Vendor Profile: Kaspersky
  • Vendor Solution: Kaspersky Hybrid Cloud Security (KHCS)
  • Vendor Profile: Lacework
  • Vendor Solution: Lacework's Polygraph Data Platform
  • Vendor Profile: Microsoft Security
  • Vendor Solution: Microsoft Defender for Cloud
  • Vendor Profile: Orca Security
  • Vendor Solution: Orca Cloud Security Platform
  • Vendor Profile: PANW
  • Vendor Solution: PANW's Prisma Cloud Platform
  • Vendor Profile: Red Hat
  • Vendor Solution: RHACS
  • Vendor Profile: SentinelOne
  • Vendor Solution: Singularity Cloud Workload Security
  • Vendor Profile: Sysdig
  • Vendor Solution: Sysdig Secure
  • Vendor Profile: Tigera
  • Vendor Solution: Tigera's Calico Cloud
  • Vendor Profile: Trend Micro
  • Vendor Solution: Trend Micro's Cloud One
  • Vendor Profile: Trellix
  • Vendor Solution: Trellix CWS Advanced Suite
  • Vendor Profile: Wiz
  • Vendor Solution: Wiz's Cloud Security Platform

Other Notable Vendor Analysis

  • Vendor Profile: Alibaba Cloud
  • Vendor Profile: ColorTokens
  • Vendor Profile: NSFOCUS
  • Vendor Profile: QI-ANXIN GROUP
  • Vendor Profile: Qualys
  • Vendor Profile: Tenable
  • Vendor Profile: VMware

Growth Opportunity Analysis: NA

  • Key Growth Metrics
  • Revenue Forecast
  • Forecast Analysis
  • Percent Revenue by Vertical and Horizontal
  • Revenue Share

Growth Opportunity Analysis: EMEA

  • Key Growth Metrics
  • Revenue Forecast
  • Forecast Analysis
  • Percent Revenue by Vertical and Horizontal
  • Revenue Share

Growth Opportunity Analysis: APAC

  • Key Growth Metrics
  • Revenue Forecast
  • Forecast Analysis
  • Percent Revenue by Vertical and Horizontal
  • Revenue Share

Growth Opportunity Analysis: LATAM

  • Key Growth Metrics
  • Revenue Forecast
  • Forecast Analysis
  • Percent Revenue by Vertical and Horizontal
  • Revenue Share

Growth Opportunity Universe

  • Growth Opportunity 1: The Accelerated Adoption of Cloud and Cloud-native Technologies Creates More Opportunities for CWPPs
  • Growth Opportunity 2: The Increasing Need for Managed and Professional Security Services
  • Growth Opportunity 3: The Growing Preference for Integrated Platforms Creates More Business for CNAPPs and SASE

Insights for CISOs

  • The Future of CWPPs
  • CWPP Market: CISOs' Concerns
  • CWPP Market: Insights and Recommendations

Next Steps

  • Your Next Steps
  • Why Frost, Why Now?
  • List of Exhibits
  • Legal Disclaimer
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦