½ÃÀ庸°í¼­
»óÇ°ÄÚµå
1432315

IDCÀÇ ¼¼°è º¸¾È Á¦Ç° ºÐ·ù¹ý(2024³â)

IDC¢¥s Worldwide Security Products Taxonomy, 2024

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IDC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 24 Pages | ¹è¼Û¾È³» : Áï½Ã¹è¼Û

    
    
    



¡Ø º» »óÇ°Àº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

ÀÌ Á¶»ç º¸°í¼­´Â º¸¾È Á¦Ç°¿¡ °üÇÑ IDCÀÇ ºÐ·ù¹ýÀ» ¼Ò°³ÇÏ°í ÀÖ½À´Ï´Ù. 8°³ ±â¼ú Ä«Å×°í¸® ½ÃÀåÀÇ º¸¾È ¼Ö·ç¼Ç¿¡ ´ëÇÑ Á¤ÀÇ¿Í Á¾ÇÕÀûÀÎ »ó¼¼ ÇÁ·¹ÀÓ¿öÅ©¸¦ Á¦°øÇÕ´Ï´Ù. ÀÌ ºÐ·ù¹ýÀº IDCÀÇ º¸¾È Á¦Ç° ½ÃÀå ¿¹Ãø°ú ½ÃÀå Á¡À¯À², IDCÀÇ ¼¼°è ¹Ý±âº° ¼ÒÇÁÆ®¿þ¾î Æ®·¡Ä¿, IDCÀÇ ¼¼°è ¹Ý±âº° º¸¾È Á¦Ç° Æ®·¡Ä¿ ±â¹ÝÀ» Çü¼ºÇÏ°í ÀÖ½À´Ï´Ù. "IDCÀÇ º¸¾È Á¦Ç° ºÐ·ù¹ýÀº º¸¾È ½ÃÀå¿¡ ´ëÇÑ Æ÷°ýÀûÀÌ°í »ó¼¼ÇÑ ÇÁ·¹ÀÓ¿öÅ©¸¦ Á¦°øÇϸç, IDC°¡ º¸¾È ¼Ö·ç¼ÇÀ» Á¤ÀÇÇÏ°í ºÐ·ùÇÏ´Â ¹æ½ÄÀ» ÀÌÇØÇÏ´Â µ¥ ÇʼöÀûÀÎ ¸®¼Ò½ºÀÔ´Ï´Ù"¶ó°í IDC ½ÃÅ¥¸®Æ¼ Æ®·¯½ºÆ® Á¦Ç° ´ã´ç ¼ö¼® ¸®¼­Ä¡ ¾Ö³Î¸®½ºÆ® ¸ð´ÏÄ« ¼ÖƼ½Ä(Monika Soltysik)Àº ¸»Çß½À´Ï´Ù.

IDCÀÇ ¼¼°è º¸¾È Á¦Ç° ºÐ·ù¹ý

º¸¾È Á¦Ç° ºÐ·ù º¯°æ(2024³â)

  • °èÃþÀû ¸í¸í¹ý

Á¤ÀÇ

  • Àü°³ ¹æ½Ä
  • ¸ÅÃâ
  • º¸¾È Á¦Ç° ½ÃÀå
    • Ŭ¶ó¿ìµå ³×ÀÌƼºê ¾ÖÇø®ÄÉÀÌ¼Ç º¸È£ Ç÷§Æû
      • Ŭ¶ó¿ìµå º¸¾È üÁ¦ °ü¸®
      • Ŭ¶ó¿ìµå ¿öÅ©·Îµå º¸È£ Ç÷§Æû
      • Ŭ¶ó¿ìµå ÀÎÇÁ¶ó ±ÇÇÑ °ü¸®
      • Infrastructure as Code(½ºÄµ)
    • eDiscovery¿Í Æ÷·»½Ä
    • ¿£µåÆ÷ÀÎÆ® º¸¾È
      • ±â¾÷¿ë ¿£µåÆ÷ÀÎÆ® º¸¾È
      • ¼ÒºñÀÚ¿ë µðÁöÅÐ ¶óÀÌÇÁ º¸È£
    • °Å¹ö³Í½º, ¸®½ºÅ©, ÄÄÇöóÀ̾ð½º
    • ³×Æ®¿öÅ© º¸¾È
      • ½Å·ÚÇÒ ¼ö ÀÖ´Â ³×Æ®¿öÅ© ¾×¼¼½º¿Í º¸È£
      • ¾×Ƽºê ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
    • ID ¹× ¾×¼¼½º °ü¸®
      • ¾×¼¼½º
        • °èÁ¤ °ü¸®
        • °í°´ ID¿Í ¾×¼¼½º °ü¸®
      • ·¹°Å½Ã/±âŸ
      • Ư±Ç
        • ÀÎÁõ/°í±Þ ÀÎÁõ
        • Ư±Ç ¾×¼¼½º °ü¸®
    • Á¤º¸¿Í µ¥ÀÌÅÍ º¸¾È
      • Á¤º¸ º¸È£
        • ¸Þ½Ã¡
        • µ¥ÀÌÅÍ ¼Õ½Ç ±â¼ú
        • µ¥ÀÌÅÍ ¾×¼¼½º °Å¹ö³Í½º
        • µ¥ÀÌÅÍ ÇÁ¶óÀ̹ö½Ã¿Í ÄÄÇöóÀ̾ð½º
      • µðÁöÅÐ ½Å·Ú
        • ¾Ïȣȭ¿Í °ü·Ã ±â¼ú
        • Å° °ü¸®, Çϵå¿þ¾î º¸¾È ¸ðµâ(HSM), Áõ¸í¼­
        • µ¥ÀÌÅͺ£À̽º¿Í ½ºÅ丮Áö º¸¾È Åø
    • º¸¾È ºÐ¼®
      • SIEM ¹× Ãë¾à¼º °ü¸®
        • º¸¾È Á¤º¸¿Í À̺¥Æ® °ü¸®
        • Ãë¾à¼º °ü¸®
    • Tier 2 SOC ºÐ¼®°ú Ŭ¶ó¿ìµå ³×ÀÌƼºê XDR
      • ¿ÀÄɽºÆ®·¹À̼ǰú ÀÚµ¿È­ Åø
      • ³×Æ®¿öÅ© º¸¾È ºÐ¼®
        • ³×Æ®¿öÅ© ŽÁö ¹× ´ëÀÀ
        • À§Çù ÀÎÅÚ¸®Àü½º
      • Ŭ¶ó¿ìµå ³×ÀÌƼºê È®Àå ŽÁö ¹× ´ëÀÀ

Âü°í ÀÚ·á

  • ¿ä¾à
KSM 24.04.17

This IDC study presents IDC's taxonomy for security products. It provides definitions and a comprehensive detailed framework of security solutions in eight technology category markets. This taxonomy forms the foundation for IDC's market forecast and market shares for security products, IDC's Worldwide Semiannual Software Tracker, and IDC's Worldwide Semiannual Security Products Tracker."IDC's security products taxonomy provides a comprehensive and detailed framework for the security marketplace and is an essential resource for understanding how IDC defines and categorizes security solutions." - Monika Soltysik, senior research analyst, Security and Trust Products at IDC

IDC's Worldwide Security Products Taxonomy

Security Products Taxonomy Changes for 2024

  • Hierarchical Nomenclature

Definitions

  • Deployment Types
  • Revenue
  • Security Products Market
    • Cloud-Native Application Protection Platform
      • Cloud Security Posture Management
      • Cloud Workload Protection Platform
      • Cloud Infrastructure Entitlements Management
      • Infrastructure as Code (Scanning)
    • eDiscovery and Forensics
    • Endpoint Security
      • Corporate Endpoint Security
      • Consumer Digital Life Protection
    • Governance, Risk, and Compliance
    • Network Security
      • Trusted Network Access and Protection
      • Active Application Security
    • Identity and Access Management
      • Access
        • Identity Management
        • Customer Identity and Access Management
      • Legacy/Other
      • Privilege
        • Authentication/Advanced Authentication
        • Privileged Access Management
    • Information and Data Security
      • Information Protection
        • Messaging
        • Data Loss Technologies
        • Data Access Governance
        • Data Privacy and Compliance
      • Digital Trust
        • Encryption and Related Technologies
        • Key Management, Hardware Security Modules (HSMs), and Certificates
        • Database and Storage Security Tools
    • Security Analytics
      • SIEM and Vulnerability Management
        • Security Information and Event Management
        • Vulnerability Management
    • Tier 2 SOC Analytics and Cloud-Native XDR
      • Orchestration and Automation Tools
      • Network Security Analytics
        • Network Detection and Response
        • Threat Intelligence
      • Cloud-Native Extended Detection and Response

Learn More

  • Synopsis
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óÇ°À» ¼±Åà Áß
»óÇ° ºñ±³Çϱâ
Àüü»èÁ¦