½ÃÀ庸°í¼­
»óǰÄÚµå
1691005

¾Æ½Ã¾ÆÅÂÆò¾ç(ÀϺ», Áß±¹ Á¦¿Ü)ÀÇ ID ¹× ¾×¼¼½º °ü¸® ½ÃÀå Á¡À¯À²(»ó¹Ý±â) : ID »ýŰèÀÇ ¼ºÀå°ú È¥¶õ ÆÄ¾Ç

Asia/Pacific (Excluding Japan and China) Identity and Access Management Market Shares, 1H24: Identifying Growth and Disruption in the Identity Ecosystem

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IDC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 20 Pages | ¹è¼Û¾È³» : Áï½Ã¹è¼Û

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

24³â »ó¹Ý±â¿¡ IAM ¼Ö·ç¼ÇÀº ´õ ÀÌ»ó ´Ü¼øÇÑ »çÀ̹ö º¸¾È ¿ä±¸»çÇ×ÀÌ ¾Æ´Ï¶ó ºñÁî´Ï½º Çõ½ÅÀÇ ÇÙ½É ÃàÀÌ µÇ¾ú½À´Ï´Ù. ±â¾÷µéÀº AI, ÀÚµ¿È­, ID ¸®½ºÅ© ºÐ¼®À» Ȱ¿ëÇÏ¿© »çÀ̹ö º¸¾È º¹¿ø·ÂÀ» °­È­Çϰí, Á¢¼Ó °Å¹ö³Í½º¸¦ °£¼ÒÈ­Çϸç, ±ÔÁ¤ Áؼö¸¦ ÃßÁøÇϰí ÀÖ½À´Ï´Ù. IAM ½ÃÀåÀÌ °è¼Ó ÁøÈ­ÇÔ¿¡ µû¶ó ±â¾÷Àº »çÀ̹ö À§ÇùÀÌ È®´ëµÇ´Â ½Ã´ë¿¡ µðÁöÅÐ ID, Ŭ¶ó¿ìµå µµÀÔ, ºÐ»êÇü Á¢¼Ó ¸ðµ¨ÀÇ ¹Ì·¡¸¦ È®º¸Çϱâ À§ÇØ ID Àü·«À» Çö´ëÈ­ÇØ¾ß ÇÕ´Ï´Ù. "ID °ü·Ã À§ÇùÀÌ Áõ°¡ÇÔ¿¡ µû¶ó ¾Æ½Ã¾ÆÅÂÆò¾ç(ÀϺ», Áß±¹ Á¦¿Ü)(APEJC)ÀÇ ±â¾÷µéÀº ÁøÈ­ÇÏ´Â °ø°Ý º¤Å͸¦ ¿ÏÈ­Çϱâ À§ÇØ AI ±â¹Ý ID À§Çù ŽÁö ¹× ´ëÀÀ(ITDR), À§Çè ÀûÀÀÇü ÀÎÁõ, ÀÚµ¿È­µÈ ID °Å¹ö³Í½º¿¡ ¿ì¼±¼øÀ§¸¦ µÎ°í ÀÖ½À´Ï´Ù. ¸ÖƼŬ¶ó¿ìµå ¹× ÇÏÀ̺긮µå ȯ°æ Àü¹Ý¿¡¼­ À߸øµÈ ±¸¼º, °úµµÇÑ ±ÇÇÑ, ÀÚ°ÝÁõ¸í ±â¹Ý °ø°Ý Ç¥¸éÀ» ÇØ°áÇϱâ À§ÇØ ID º¸¾È ż¼ °ü¸®(ISPM)·ÎÀÇ ÀüȯÀÌ ÀÌ·ç¾îÁö°í ÀÖ½À´Ï´Ù. ÇÑÆí, °³¹ß ¿î¿µ(DevOps), ¾ÖÇø®ÄÉÀÌ¼Ç ÇÁ·Î±×·¡¹Ö ÀÎÅÍÆäÀ̽º(API) ÅëÇÕ, AI ±â¹Ý ¿öÅ©·Îµå°¡ °ø°Ý Ç¥¸éÀ» È®ÀåÇÔ¿¡ µû¶ó ¸Ó½Å ID º¸¾ÈÀÌ Áß¿äÇØÁö°í ÀÖ½À´Ï´Ù. IDC ¾Æ½Ã¾ÆÅÂÆò¾çÀÇ »çÀ̹ö º¸¾È Á¦Ç° ¹× ¼­ºñ½º ºÎ¹® ¼ö¼® ¸®¼­Ä¡ ¸Å´ÏÀúÀÎ »ç½Ã ±×·Î¹ö´Â "°ø°ÝÀڵ麸´Ù ¾Õ¼­ ³ª°¡·Á¸é Á¶Á÷Àº IAM°ú º¸¾È ºÐ¼®À» ÅëÇÕÇϰí, Çൿ À§Çè ¸ðµ¨À» ÅëÇØ Áö¼ÓÀûÀÎ ÀÎÁõÀ» ½ÃÇàÇϸç, Àû½Ã Á¢¼Ó Á¦¾î ¹× ½Ç½Ã°£ ÀÌ»ó ¡ÈÄ Å½Áö¸¦ Áö¿øÇÏ´Â Á¦·Î Æ®·¯½ºÆ® ÇÁ·¹ÀÓ¿öÅ©¸¦ äÅÃÇØ¾ß ÇÕ´Ï´Ù."¶ó°í ¸»ÇÕ´Ï´Ù.

IDC ½ÃÀå Á¡À¯À² ¼öÄ¡

ÁÖ¿ä ¿ä¾à

±â¼ú °ø±Þ¾÷ü¿¡ ´ëÇÑ Á¶¾ð

  • IAM ÄÚ¾î·Î¼­ÀÇ ¾ÆÀ̵§Æ¼Æ¼ °ü¸® È®Àå
  • Á¦·Î Æ®·¯½ºÆ®¿Í PAMÀÇ ºÎ»ó
  • CIAMÀÇ ¼ºÀåÀº °í°´ÀÇ ÁøÈ­ÇÏ´Â º¸¾È ¿ä±¸¿¡ ÀÇÇØ ÃËÁøµÇ°í ÀÖ½À´Ï´Ù.
  • ÀÎÁõÀÇ ¼ºÀåÀº ÆÐ½º¿öµå¸®½º¿Í AI¸¦ Ȱ¿ëÇÑ ID·ÎÀÇ ÀüȯÀ» ½Ã»çÇÕ´Ï´Ù.
  • ÀüÅëÀûÀÎ ¾ÆÀ̵§Æ¼Æ¼ÀÇ °¨¼Ò´Â Ŭ¶ó¿ìµå ±â¹Ý ¾ÆÀ̵§Æ¼Æ¼ ¼Ö·ç¼ÇÀ¸·ÎÀÇ ÀüȯÀ» ¹Ý¿µÇÕ´Ï´Ù.
  • ½Å¿ø º¸¾È¿¡¼­ AIÀÇ ¿ªÇÒ : »õ·Î¿î ¿µ¿ªÀÇ °³Ã´ÀÚ
  • ±ÔÁ¦ ¹× ÄÄÇöóÀ̾𽺠¾Ð¹ÚÀ¸·Î ÀÎÇÑ IAM ÅõÀÚ ÃËÁø

½ÃÀå Á¡À¯À²

¿ÃÇØ¸¦ Çü¼ºÇÑ ±â¾÷

  • Microsoft
  • IBM
  • Okta
  • CyberArk Software

½ÃÀå »óȲ

  • ÁÖ¿ä ½ÃÀå µ¿Çâ
    • ISPM °¡¼Ó
    • Á¤Ã¥ ÀÚµ¿È­¸¦ À§ÇÑ AI È®Àå ¾ÆÀ̵§Æ¼Æ¼ °Å¹ö³Í½º
    • ¸Ó½Å ID º¸¾ÈÀÇ È®Àå
    • ¾ÆÀ̵§Æ¼Æ¼ ¸®½ºÅ© ½ºÄھ ¹× ¹®¸Æ ÀÎ½Ä ÀÎÁõ
    • Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê º¸¾È Àü·«¿¡¼­ ID º¸¾ÈÀÇ Á߿伺 ºÎ°¢
    • ¾ÆÀ̵§Æ¼Æ¼ À§Çù ŽÁö ¹× ´ëÀÀÀÇ ¹ÎÁÖÈ­

Á¶»ç¹æ¹ý

½ÃÀå Á¤ÀÇ

  • ¾ÆÀ̵§Æ¼Æ¼ °ü¸®
  • °í°´ ID ¹× ¾×¼¼½º °ü¸®
  • ·¹°Å½Ã/±âŸ
  • ÀÎÁõ/°í±Þ ÀÎÁõ
  • Ư±Ç ¾×¼¼½º °ü¸®

°ü·Ã Á¶»ç

ksm 25.04.04

In 1H24, IAM solutions were no longer just a cybersecurity requirement but a core pillar of business transformation. Organizations are leveraging AI, automation, and identity risk analytics to enhance cybersecurity resilience, streamline access governance, and drive compliance alignment. As the IAM market continues to evolve, enterprises must modernize their identity strategies to secure the future of digital identity, cloud adoption, and decentralized access models in an era of expanding cyberthreats."As identity-related threats escalate, enterprises in Asia/Pacific (excluding Japan and China) (APEJC) are prioritizing AI-driven identity threat detection and response (ITDR), risk-adaptive authentication, and automated identity governance to mitigate evolving attack vectors. The shift toward identity security posture management (ISPM) is addressing misconfigurations, excessive entitlements, and credential-based attack surfaces across multicloud and hybrid environments. Meanwhile, machine identity security is becoming critical, as development operations (DevOps), application programming interface (API) integrations, and AI-driven workloads expand the attack surface. To stay ahead of adversaries, organizations must integrate IAM with security analytics, enforce continuous authentication through behavioral risk models, and adopt a zero trust framework that enables just-in-time (JIT) access controls and real-time anomaly detection," says Sakshi Grover, senior research manager, Cybersecurity Products and Services, IDC Asia/Pacific.

IDC Market Share Figure

Executive Summary

Advice for Technology Suppliers

  • The Expansion of Identity Management as the IAM Core
  • Zero Trust and PAM on the Rise
  • CIAM's Growth Driven by Evolving Customer Security Needs
  • Authentication Growth Signals Move Toward Passwordless and AI-Powered Identity
  • Decline in Legacy Identity Reflects the Shift to Cloud-Based Identity Solutions
  • The Role of AI in Identity Security: The Next Frontier
  • Regulatory and Compliance Pressures Driving IAM Investments

Market Share

Who Shaped the Year

  • Microsoft
  • IBM
  • Okta
  • CyberArk Software

Market Context

  • Significant Market Developments
    • The Acceleration of ISPM
    • AI-Augmented Identity Governance for Policy Automation
    • The Expansion of Machine Identity Security
    • Identity Risk Scoring and Context-Aware Authentication
    • The Rise of Identity Security in Cloud-Native Security Strategies
    • The Democratization of Identity Threat Detection and Response

Methodology

Market Definition

  • Identity Management
  • Customer Identity and Access Management
  • Legacy/Other
  • Authentication/Advanced Authentication
  • Privileged Access Management

Related Research

ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦