¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.
ÀÌ Á¶»ç ¸®Æ÷Æ®´Â º¸¾È Á¦Ç°¿¡ °üÇÑ IDCÀÇ ºÐ·ù¹ýÀ» ¼Ò°³Çϰí ÀÖ½À´Ï´Ù. 8°³ ±â¼ú Ä«Å×°í¸® ½ÃÀå¿¡¼ º¸¾È ¼Ö·ç¼ÇÀÇ Á¤ÀÇ¿Í Á¾ÇÕÀû »ó¼¼ ÇÁ·¹ÀÓ¿öÅ©¸¦ Á¦°øÇÕ´Ï´Ù. ÀÌ ºÐ·ù¹ýÀº IDCÀÇ º¸¾È Á¦Ç° ½ÃÀå Àü¸Á ¹× ½ÃÀå Á¡À¯À², IDCÀÇ Àü¼¼°è ¹Ý±âº° ¼ÒÇÁÆ®¿þ¾î ÃßÀû±â, IDCÀÇ Àü¼¼°è ¹Ý±âº° º¸¾È Á¦Ç° ÃßÀû±âÀÇ ±âÃʸ¦ Çü¼ºÇÕ´Ï´Ù. "IDCÀÇ º¸¾È Á¦Ç° ºÐ·ù ü°è´Â º¸¾È ½ÃÀå¿¡ ´ëÇÑ Æ÷°ýÀûÀÌ°í »ó¼¼ÇÑ ÇÁ·¹ÀÓ¿öÅ©¸¦ Á¦°øÇϸç IDC°¡ º¸¾È ¼Ö·ç¼ÇÀ» Á¤ÀÇÇÏ°í ºÐ·ùÇÏ´Â ¹æ¹ýÀ» ÀÌÇØÇÏ´Â µ¥ ÇʼöÀûÀÎ ¸®¼Ò½ºÀÔ´Ï´Ù." - Monika Soltysik, IDC º¸¾È ¹× ½Å·Ú Á¦Ç° ºÎ¹® ¼±ÀÓ ¿¬±¸ ºÐ¼®°¡
IDCÀÇ ¿ùµå¿ÍÀÌµå º¸¾È Á¦Ç° ºÐ·ù
2025³âÀÇ º¸¾È Á¦Ç° ºÐ·ù º¯°æ
Á¤ÀÇ
- µµÀÔ À¯Çü
- ¸ÅÃâ
- º¸¾È Á¦Ç° ½ÃÀå
- Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀÌ¼Ç º¸È£ Ç÷§Æû
- Ŭ¶ó¿ìµå º¸¾È üÁ¦ °ü¸®
- Ŭ¶ó¿ìµå ¿öÅ©·Îµå º¸È£ Ç÷§Æû
- Ŭ¶ó¿ìµå ÀÎÇÁ¶ó ±ÇÇÑ °ü¸®
- ÄÚµå·Î¼ÀÇ ÀÎÇÁ¶ó(½ºÄµ)
- Ŭ¶ó¿ìµå ŽÁö¿Í ´ëÀÀ
- µ¥ÀÌÅÍ º¸¾È ż¼ °ü¸®
- Kubernetes º¸¾È ż¼ °ü¸®
- AI º¸¾È ż¼ °ü¸®
- eDiscovery¿Í Æ÷·»½Ä
- ¿£µåÆ÷ÀÎÆ® º¸¾È
- ±â¾÷ ¿£µåÆ÷ÀÎÆ® º¸¾È
- ¼ÒºñÀÚ µðÁöÅÐ ¶óÀÌÇÁ º¸È£
- °Å¹ö³Í½º, ¸®½ºÅ©, ÄÄÇöóÀ̾ð½º
- ³×Æ®¿öÅ© º¸¾È
- ½Å·ÚÇÒ ¼ö ÀÖ´Â ³×Æ®¿öÅ© ¾×¼¼½º¿Í º¸È£
- ¾×Ƽºê ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
- ½Å¿ø°ú ¾×¼¼½º °ü¸®
- ¾×¼¼½º
- ID °ü¸®
- °í°´ ID¿Í ¾×¼¼½º °ü¸®
- ·¹°Å½Ã/±âŸ
- Ư±Ç
- ÀÎÁõ/÷´Ü ÀÎÁõ
- Ư±Ç ¾×¼¼½º °ü¸®
- Á¤º¸¿Í µ¥ÀÌÅÍÀÇ º¸¾È
- Á¤º¸ º¸È£
- ¸Þ½Ã¡
- µ¥ÀÌÅÍ ¼Õ½Ç ±â¼ú
- µ¥ÀÌÅÍ ¾×¼¼½º °Å¹ö³Í½º
- µ¥ÀÌÅÍ ÇÁ¶óÀ̹ö½Ã¿Í ÄÄÇöóÀ̾ð½º
- µðÁöÅÐ Æ®·¯½ºÆ®
- ¾ÏÈ£È ¹× °ü·Ã ±â¼ú
- Ű °ü¸®, Çϵå¿þ¾î º¸¾È ¸ðµâ(HSM), Áõ¸í¼
- µ¥ÀÌÅͺ£À̽º ¹× ½ºÅ丮Áö º¸¾È Åø
- º¸¾È ºÐ¼®
- SOC ºÐ¼®, ÀÚµ¿È, Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê XDR
- ¿ÀÄɽºÆ®·¹À̼ǰú ÀÚµ¿È Åø
- ³×Æ®¿öÅ© º¸¾È ºÐ¼®
- ³×Æ®¿öÅ© ŽÁö¿Í ÀÀ´ä
- À§Çù ÀÎÅÚ¸®Àü½º
- Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê È®Àå ŽÁö¿Í ´ëÀÀ
Âü°í ÀÚ·á
KSA 25.02.27
This IDC study presents IDC's taxonomy for security products. It provides definitions and a comprehensive detailed framework of security solutions in eight technology category markets. This taxonomy forms the foundation for IDC's market forecast and market shares for security products, IDC's Worldwide Semiannual Software Tracker, and IDC's Worldwide Semiannual Security Products Tracker."IDC's security products taxonomy provides a comprehensive and detailed framework for the security marketplace and is an essential resource for understanding how IDC defines and categorizes security solutions." - Monika Soltysik, senior research analyst, Security and Trust Products at IDC
IDC's Worldwide Security Products Taxonomy
Security Products Taxonomy Changes for 2025
- Hierarchical Nomenclature
Definitions
- Deployment Types
- Revenue
- Security Products Market
- Cloud-Native Application Protection Platform
- Cloud Security Posture Management
- Cloud Workload Protection Platform
- Cloud Infrastructure Entitlements Management
- Infrastructure as Code (Scanning)
- Cloud Detection and Response
- Data Security Posture Management
- Kubernetes Security Posture Management
- AI-Security Posture Management
- eDiscovery and Forensics
- Endpoint Security
- Corporate Endpoint Security
- Consumer Digital Life Protection
- Governance, Risk, and Compliance
- Network Security
- Trusted Network Access and Protection
- Active Application Security
- Identity and Access Management
- Access
- Identity Management
- Customer Identity and Access Management
- Legacy/Other
- Privilege
- Authentication/Advanced Authentication
- Privileged Access Management
- Information and Data Security
- Information Protection
- Messaging
- Data Loss Technologies
- Data Access Governance
- Data Privacy and Compliance
- Digital Trust
- Encryption and Related Technologies
- Key Management, Hardware Security Modules (HSMs), and Certificates
- Database and Storage Security Tools
- Security Analytics
- SIEM
- Vulnerability Management
- SOC Analytics, Automation, and Cloud-Native XDR
- Orchestration and Automation Tools
- Network Security Analytics
- Network Detection and Response
- Threat Intelligence
- Cloud-Native Extended Detection and Response
Learn More