½ÃÀ庸°í¼­
»óǰÄÚµå
1398858

¼¼°è Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀÌ¼Ç º¸È£ Ç÷§ÆûÀÇ ¼ºÀå ±âȸ

Global Cloud-native Application Protection Platform Growth Opportunities

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: Frost & Sullivan | ÆäÀÌÁö Á¤º¸: ¿µ¹® 126 Pages | ¹è¼Û¾È³» : 1-2ÀÏ (¿µ¾÷ÀÏ ±âÁØ)

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

Äڵ忡¼­ Ŭ¶ó¿ìµå º¸¾È¿¡ ´ëÇÑ ¿ä±¸°¡ ³ô¾ÆÁö¸é¼­ CNAPPÀÇ ¼ºÀå ÀáÀç·Âµµ ³ô¾ÆÁý´Ï´Ù.

Ŭ¶ó¿ìµå ¼­ºñ½ºÀÇ µµÀÔ°ú º¹À⼺Àº ƯÈ÷ ¸ÖƼ Ŭ¶ó¿ìµå ȯ°æ¿¡¼­ ´õ¿í °¡¼ÓÈ­µÇ°í ÀÖ½À´Ï´Ù. Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀÌ¼Ç º¸È£ Ç÷§Æû(CNAPP)Àº ÆÐÄ¡¿öÅ© ¼Ö·ç¼ÇÀÌ ¾Æ´Ñ ÅëÇÕµÈ ¶óÀÌÇÁ»çÀÌŬ º¸¾ÈÀÇ Çʿ伺À» °­Á¶Çϰí ÀÖÀ¸¸ç, CNAPP¸¦ ÅëÇØ ±âÁ¸¿¡´Â »çÀϷηΠÀÛ¾÷ÇÏ´ø º¸¾È, Ç÷§Æû, °³¹ß ¹× °³¹ßÆÀ µî ´Ù¾çÇÑ ÆÀ °£ÀÇ Çù¾÷À» °­È­ÇÒ ¼ö ÀÖ½À´Ï´Ù. º¸¾ÈÆÀ, Ç÷§ÆûÆÀ, °³¹ßÆÀ µîÀÇ ÆÀ Çù¾÷À» °­È­ÇÒ ¼ö ÀÖ°Ô ÇØÁÝ´Ï´Ù. Ŭ¶ó¿ìµå ȯ°æÀÇ º¯È­¿Í Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀÌ¼Ç °³¹ß ÇÁ·Î¼¼½ºÀÇ Æ¯¼ºÀ¸·Î ÀÎÇØ »ý»ê¼º, ¿ëµµ º¹¿ø·Â ¹× ºñÁî´Ï½º ¹Îø¼ºÀ» ³ôÀ̱â À§ÇØ ÀÌ·¯ÇÑ ÆÀµéÀÌ Çù·ÂÇØ¾ß ÇÕ´Ï´Ù.

´Ù¾çÇÑ Ç÷§Æû°ú ÀÎÇÁ¶ó¿¡ ¼­·Î ´Ù¸¥ º¸¾È ±ÔÄ¢°ú Á¤Ã¥À» Àû¿ëÇÏ´Â Æ÷ÀÎÆ® ¼Ö·ç¼ÇÀ» µµÀÔÇϸé Àü¹ÝÀûÀÎ ¿î¿µ È¿À²¼º, ÃÖÁ¾»ç¿ëÀÚ °æÇè, ºñÁî´Ï½º ¼º°ú°¡ ÀúÇϵǰí, º¸¾È Á¤Ã¥ Àû¿ëÀÌ È¯°æ °£¿¡ Àϰü¼º ¾øÀÌ Àû¿ëµÇ¾î °ü¸® ¿À¹öÇìµå ¹× º¸¾È °ÝÂ÷°¡ ¹ß»ýÇÒ ¼ö ÀÖ½À´Ï´Ù. °ü¸® ¿À¹öÇìµå ¹× º¸¾È °ÝÂ÷¸¦ Áõ°¡½Ãų ¼ö ÀÖ½À´Ï´Ù.

±× °á°ú, Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀ̼ÇÀÇ ¶óÀÌÇÁ»çÀÌŬ Àü¹Ý¿¡ °ÉÃÄ ´õ ³ªÀº ¸®½ºÅ© °ü¸®¿Í º¸¾È º¸È£¸¦ À§ÇØ ¸ðµç º¸¾È ±â´ÉÀ» ´ÜÀÏ Ç÷§Æû¿¡ ÅëÇÕÇÏ¿© ¸ðµç Ŭ¶ó¿ìµå ÀÎÇÁ¶ó, ¿öÅ©·Îµå ¹× ¿ÀǼҽº ¼ÒÇÁÆ®¿þ¾î ¸ðµç Ŭ¶ó¿ìµå ÀÎÇÁ¶ó, ¿öÅ©·Îµå, ¿ÀǼҽº ¼ÒÇÁÆ®¿þ¾î¿¡ °ÉÃÄ À§ÇèÀ» ÃÖ¼ÒÈ­ÇÏ°í º¸È£ ¹üÀ§¸¦ ±Ø´ëÈ­ÇØ¾ß ÇÕ´Ï´Ù. À̸¦ À§Çؼ­´Â ÄÄÇöóÀ̾𽺠¹× º¸¾È Á¡°Ë ÇÁ·Î¼¼½º¸¦ ÀÚµ¿È­Çϰí, ½Ç¼ö°¡ ¹ß»ýÇϱ⠽¬¿î ÀÎÀû °³ÀÔ¿¡ ´ëÇÑ ÀÇÁ¸µµ¸¦ ÁÙ¿© º¸¾È ¼º°ú¸¦ ³ô¿©¾ß ÇÕ´Ï´Ù.

ÇÊ¿äÇÑ ¸ðµç º¸¾È ±â´ÉÀ» ÅëÇÕÇÑ ÅëÇÕ Å¬¶ó¿ìµå º¸¾È Ç÷§ÆûÀÎ CNAPP´Â º¸¾È ¹× ÄÄÇöóÀ̾𽺠ÇÁ·Î¼¼½º¸¦ °£¼ÒÈ­Çϰí ÀÚµ¿È­ÇÏ¿© Á¶Á÷ÀÌ À§Çè ¹× ±âŸ º¸¾È ¹®Á¦¸¦ °ü¸®ÇÒ ¼ö ÀÖµµ·Ï Áö¿øÇÑ´Ù, Æ÷ÀÎÆ® ¼Ö·ç¼ÇÀ» Á¦°ÅÇÒ ¼ö ÀÖ´Â ±âȸ¸¦ Á¦°øÇÏ¿© ±â¾÷ÀÌ ½Ã°£°ú °ü¸® ºñ¿ëÀ» Àý°¨ÇÏ°í º¥´õ °ü¸®¸¦ ÁÙÀÏ ¼ö ÀÖµµ·Ï Áö¿øÇÕ´Ï´Ù.

CNAPP´Â ½ÃÇÁÆ® ·¹ÇÁÆ® º¸¾È ¸ðµ¨À» ÃËÁøÇÏ¿© ±â¾÷ÀÌ Ãʱ⠴ܰèºÎÅÍ °³¹ß ÇÁ·Î¼¼½º¿¡ º¸¾ÈÀ» ÅëÇÕÇÒ ¼ö ÀÖµµ·Ï ÇÔÀ¸·Î½á ÇÁ·Î´ö¼Ç ȯ°æ¿¡¼­ ¼³Á¤ ¿À·ù, Ãë¾àÁ¡ µîÀÇ ¹®Á¦¸¦ ¼öÁ¤ÇÏ°í º¹±¸ÇÏ´Â µ¥ µå´Â À§Çè°ú ½Ã°£À» ÁÙÀÏ ¼ö ÀÖ½À´Ï´Ù.

¸ñÂ÷

Àü·«Àû °úÁ¦

  • ¿Ö ¼ºÀåÀÌ ¾î·Á¿öÁö°í Àִ°¡?
  • The Strategic Imperative 8(TM)
  • Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀÌ¼Ç º¸È£ Ç÷§Æû(CNAPP) ½ÃÀå¿¡ ´ëÇÑ ÁÖ¿ä Àü·«Àû Çʼö ¿ä°ÇÀÇ ¿µÇâ
  • Growth Pipeline Engine(TM)À» °¡¼ÓÇÏ´Â ¼ºÀå ±âȸ

¼ºÀå ±âȸ ºÐ¼®

  • ½ÃÀå Á¤ÀÇ - Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀ̼Ç
  • Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÆÅ°ÅØÃ³ÀÇ ±âº» ¿øÄ¢
  • ±âÁ¸ ¾ÖÇø®ÄÉÀ̼ǰú Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀÌ¼Ç ºñ±³
  • Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ȯ°æÀÇ º¸¾È °úÁ¦
  • Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê º¸¾ÈÀÇ ¼ö¸íÁÖ±â
  • ½ÃÀå Á¤ÀÇ - CNAPP
  • CNAPP - ½ÅÈ­ ¹Ù·ÎÀâ±â
  • ½ÃÀåÀÇ Á¤ÀÇ - ¾ÖÇø®ÄÉÀÌ¼Ç °èÃþ/½ÃÇÁÆ® ·¹ÇÁÆ® º¸¾È
  • ½ÃÀåÀÇ Á¤ÀÇ - ¿öÅ©·Îµå °èÃþ
  • ½ÃÀåÀÇ Á¤ÀÇ - Ŭ¶ó¿ìµå ÀÎÇÁ¶ó °èÃþ
  • CNAPP·ÎÀÇ ÆÐ·¯´ÙÀÓ Àüȯ Çʿ伺
  • CNAPP Á¢±Ù ¹æ½Ä
  • CNAPPÀÇ ÀÌÁ¡
  • ºÐ¼® ¹üÀ§
  • °í°´ ¼¼ºÐÈ­
  • Á¶»ç ¹æ¹ý
  • ½ÃÀå ¼¼ºÐÈ­
  • ÁÖ¿ä °æÀï»ç
  • ½ÃÀå ¹è°æ
  • ½ÃÀå Á¶»ç °á°ú
  • CNAPP ½ÃÀå °³¿ä - ÁÖ¿ä ÀÌ¿ë »ç·Ê¿Í ±â´É
  • CNAPP ½ÃÀå °³¿ä - ±ÔÁ¦ ´ëÀÀ°ú ÇÁ·¹ÀÓ¿öÅ©
  • ÁÖ¿ä ¼ºÀå ÁöÇ¥
  • ¼ºÀå ÃËÁø¿äÀÎ
  • ¼ºÀå ÃËÁø¿äÀÎ ºÐ¼®
  • ¼ºÀå ¾ïÁ¦¿äÀÎ
  • ¼ºÀå ¼ºÀå¿äÀÎ ºÐ¼®
  • ¿¹ÃøÀÇ ÀüÁ¦Á¶°Ç
  • ¸ÅÃâ ¿¹Ãø
  • ¸ÅÃâ ¿¹Ãø ºÐ¼®
  • Áö¿ªº° : ¸ÅÃâ ¿¹Ãø
  • Áö¿ªº° : ¸ÅÃâ ¿¹Ãø ºÐ¼®
  • °¡°Ý µ¿Çâ°ú ¿¹Ãø ºÐ¼®
  • ¼öÁ÷ º° : ¸ÅÃâ Á¡À¯À²
  • ¼öÆò º° : ¸ÅÃâ Á¡À¯À²
  • º¥´õº° : ¸ÅÃâ Á¡À¯À²
  • °æÀï ȯ°æ

TOP º¥´õ ºÐ¼®

  • º¥´õ ¼Ò°³ - Aqua Security
  • º¥´õ ¼Ò°³ - Check Point Software Technologies
  • º¥´õ ¼Ò°³ - CrowdStrike
  • º¥´õ ¼Ò°³ - Lacework
  • º¥´õ ¼Ò°³ - Microsoft(Security)
  • º¥´õ ¼Ò°³ - Orca Security
  • º¥´õ ¼Ò°³ - PANW
  • º¥´õ ¼Ò°³ - Sysdig
  • º¥´õ µ¿Çâ - Trend Micro
  • º¥´õ ¼Ò°³ - Uptycs
  • º¥´õ ¼Ò°³ - Wiz

¼ºÀå ±âȸ ºÐ¼® - ºÏ¹Ì

  • ÁÖ¿ä ¼ºÀå ÁöÇ¥
  • ¸ÅÃâ°ú ¿¹Ãø
  • ¿¹Ãø ºÐ¼® - ºÏ¹Ì
  • º¥´õº° ¸ÅÃâ Á¡À¯À² - ºÏ¹Ì

¼ºÀå ±âȸ ºÐ¼® - À¯·´, Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«

  • ÁÖ¿ä ¼ºÀå ÁöÇ¥
  • ¸ÅÃâ ¿¹Ãø
  • ¿¹Ãø ºÐ¼® - À¯·´, Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«
  • º¥´õº° ¸ÅÃâ Á¡À¯À² - À¯·´, Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«

¼ºÀå ±âȸ ºÐ¼® - ¾Æ½Ã¾ÆÅÂÆò¾ç

  • ÁÖ¿ä ¼ºÀå ÁöÇ¥
  • ¸ÅÃâ ¿¹Ãø
  • ¸ÅÃâ ¿¹Ãø - ¾Æ½Ã¾ÆÅÂÆò¾ç
  • º¥´õº° ¸ÅÃâ Á¡À¯À² - ¾Æ½Ã¾ÆÅÂÆò¾ç

¼ºÀå ±âȸ ºÐ¼® - ¶óƾ¾Æ¸Þ¸®Ä«

  • ÁÖ¿ä ¼ºÀå ÁöÇ¥
  • ¸ÅÃâ ¿¹Ãø
  • ¿¹Ãø ºÐ¼® - ¶óƾ¾Æ¸Þ¸®Ä«
  • º¥´õº° ¸ÅÃâ Á¡À¯À² - ¶óƾ¾Æ¸Þ¸®Ä«

¼ºÀå ±âȸ

  • ¼ºÀå ±âȸ 1- Ç®½ºÅà Ŭ¶ó¿ìµå º¸¾ÈÀ» ÁÖµµÇÏ´Â ÄÚµå-Åõ-Ŭ¶ó¿ìµå ÀÎÅÚ¸®Àü½º¿¡ ´ëÇÑ ¿ä±¸ »çÇ× Áõ°¡
  • ¼ºÀå ±âȸ 2-°ü¸®Çü Àü¹® º¸¾È ¼­ºñ½º¿¡ ´ëÇÑ ¼ö¿ä Áõ°¡
  • ¼ºÀå ±âȸ 3-ÅëÇÕ Ç÷§Æû¿¡ ´ëÇÑ ¼±È£µµ Áõ°¡·Î CNAPP ¹× XDR ÅëÇÕÀ» À§ÇÑ ´õ ¸¹Àº ºñÁî´Ï½º âÃâ

CISO¿ë ÅëÂû

  • CNAPP ½ÃÀå - CISOÀÇ ¿ì·Á »çÇ×
  • CNAPP ½ÃÀå - ÀλçÀÌÆ®¿Í Á¦¾È
  • CNAPP Æò°¡

´ÙÀ½ ´Ü°è

LSH 24.01.04

Increasing Requirements for Code to Cloud Security Drive CNAPP Growth Potential

Cloud services adoption and complexity are accelerating, particularly in multi-cloud environments. Cloud-native application protection platform (CNAPP) emphasizes the need for unified life cycle security rather than patchwork solutions. CNAPP enables organizations to increase team collaboration, including security, platform, and development teams, which traditionally work in silos. Changes in the cloud environment and the nature of the cloud-native application development process require these teams to work together to increase their productivity, application resiliency, and business agility.

Deploying point solutions in different platforms and infrastructures with various security rules and policies will reduce overall operational efficiency, end-user experiences, and business outcomes and increase management overheads and security gaps, as the application of security policies may not be consistent across environments.

As a result, it is necessary to converge all security capabilities into a single platform for better risk management and security protection of the cloud-native applications throughout their life cycle to minimize the risks and maximize the protection coverage across all cloud infrastructures, workloads, open-source software, and artifacts. This requires organizations to automate compliance and security checking processes to reduce the reliance on human intervention, which is error-prone, and increase positive security outcomes.

CNAPP, an integrated cloud security platform consolidating all necessary security capabilities, simplifies and automates security and compliance processes to help organizations manage risks and other security issues. It provides an opportunity to eliminate point solutions, enabling companies to save time and management costs and reduce vendor management.

CNAPP facilitates the shift-left security model, which enables organizations to integrate security into the development process in the early phases, reducing risks and time to fix and remediate issues, such as misconfigurations and vulnerabilities in production.

Table of Contents

Strategic Imperatives

  • Why is it Increasingly Difficult to Grow?
  • The Strategic Imperative 8™
  • The Impact of the Top 3 Strategic Imperatives on the Cloud-native Application Protection Platform (CNAPP) Market
  • Growth Opportunities Fuel the Growth Pipeline Engine™

Growth Opportunity Analysis

  • Market Definition-Cloud-native Applications
  • Cloud-native Architecture Core Principles
  • Comparison between Traditional and Cloud-native Applications
  • Security Challenges in Cloud-native Environments
  • Cloud-native Security Life Cycle
  • Market Definition-CNAPP
  • CNAPP-Demystify the Myths
  • Market Definition-Application Layer/Shift-left Security
  • Market Definition-Workload Layer
  • Market Definition-Cloud Infrastructure Layer
  • The Need for a Paradigm Shift to CNAPPs
  • CNAPP Approaches
  • CNAPP Benefits
  • Scope of Analysis
  • Customer Segmentation
  • Research Methodology
  • Market Segmentation
  • Key Competitors
  • Market Background
  • Market Findings
  • CNAPP Market Overview-Top Use Cases and Features
  • CNAPP Market Overview-Regulatory Compliances and Frameworks
  • Key Growth Metrics
  • Growth Drivers
  • Growth Driver Analysis
  • Growth Restraints
  • Growth Restraint Analysis
  • Forecast Assumptions
  • Revenue Forecast
  • Revenue Forecast Analysis
  • Revenue Forecast by Region
  • Revenue Forecast Analysis by Region
  • Pricing Trends and Forecast Analysis
  • Revenue Share by Vertical
  • Revenue Share by Horizontal
  • Revenue Share by Vendor
  • Competitive Environment

Top Vendor Analysis

  • Vendor Profile-Aqua Security
  • Vendor Profile-Check Point Software Technologies
  • Vendor Profile-CrowdStrike
  • Vendor Profile-Lacework
  • Vendor Profile-Microsoft (Security)
  • Vendor Profile-Orca Security
  • Vendor Profile-PANW
  • Vendor Profile-Sysdig
  • Vendor Profile-Trend Micro
  • Vendor Profile-Uptycs
  • Vendor Profile-Wiz

Growth Opportunity Analysis-NA

  • Key Growth Metrics
  • Revenue Forecast
  • Forecast Analysis-NA
  • Revenue Share by Vendor-NA

Growth Opportunity Analysis-EMEA

  • Key Growth Metrics
  • Revenue Forecast
  • Forecast Analysis-EMEA
  • Revenue Share by Vendor-EMEA

Growth Opportunity Analysis-APAC

  • Key Growth Metrics
  • Revenue Forecast
  • Revenue Forecast-APAC
  • Revenue Share by Vendor-APAC

Growth Opportunity Analysis-LATAM

  • Key Growth Metrics
  • Revenue Forecast
  • Forecast Analysis-LATAM
  • Revenue Share by Vendor-LATAM

Growth Opportunity Universe

  • Growth Opportunity 1-Increasing requirements for Code-to-cloud Intelligence Driving Full-stack Cloud Security
  • Growth Opportunity 2-Increasing Need for Managed and Professional Security Services
  • Growth Opportunity 3-The Growing Preference for Integrated Platforms Creating More Business for CNAPPs and XDR Integration

Insights for CISOs

  • CNAPP Market-CISOs' Concerns
  • CNAPP Market-Insights and Recommendations
  • Evaluating CNAPP

Next Steps

  • Your Next Steps
  • Why Frost, Why Now?
  • List of Exhibits
  • Legal Disclaimer
»ùÇà ¿äû ¸ñ·Ï
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
¸ñ·Ï º¸±â
Àüü»èÁ¦