½ÃÀ庸°í¼­
»óǰÄÚµå
1697055

IDCÀÇ ¼¼°è º¸¾È ÁöÃâ °¡ÀÌµå ºÐ·ù : Release V1(2025³â)

IDC¢¥s Worldwide Security Spending Guide Taxonomy, 2025: Release V1, 2025

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IDC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 55 Pages | ¹è¼Û¾È³» : Áï½Ã¹è¼Û

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

ÀÌ Á¶»ç º¸°í¼­´Â IDCÀÇ »õ·Î¿î »ê¾÷ Á¤ÀǸ¦ ¼Ò°³Çϰí IDCÀÇ º¸¾È Á¦Ç° ¼¼ºÐÈ­ ±â¹ý°ú ºÐ·ù¹ý¿¡ ´ëÇØ ÀÚ¼¼È÷ ¼³¸íÇÕ´Ï´Ù. IDCÀÇ Àü ¼¼°è º¸¾È ÁöÃâ °¡À̵å(Worldwide Security Spending Guide) µ¥ÀÌÅÍ ¾ÆÆ¼ÆÑÆ®ÀÇ ÄÄÆÐ´Ï¾ð Á¶°¢À¸·Î »ç¿ëÇØ¾ß ÇÕ´Ï´Ù. ¡°IDCÀÇ Worldwide Security Spending Guide ºÐ·ù¹ýÀº º¸¾È ½ÃÀåÀÇ Á¾ÇÕÀûÀÌ°í ¼¼°èÀûÀÌ°í »ó¼¼ÇÑ Áöµµ¸¦ Á¦°øÇÕ´Ï´Ù. °ø±Þ¾÷ü°¡ Á¤ÀǸ¦ Ç¥ÁØÈ­ÇÏ°í º¸¾È Á¦Ç°¿¡ ÃÖ»óÀÇ ±âȸ¸¦ Á¦°øÇÏ´Â ¾÷°è ¹× ±â¾÷ ±Ô¸ðÀÇ ºÎ¹®À» ½Äº°ÇÏ´Â µ¥ µµ¿òÀÌ µÇ´Â ±ÍÁßÇÑ ÀÚ¿øÀÔ´Ï´Ù.¡±¶ó°í IDC Spending Guides Á¶»ç ÀÌ»ç, ¼¿·¹³ª ´Ù ·Ñµå´Â ¸»ÇÕ´Ï´Ù.

IDCÀÇ Àü ¼¼°è º¸¾È ÁöÃâ °¡ÀÌµå ºÐ·ù

º¸¾È ÁöÃâ °¡ÀÌµå ºÐ·ù º¯°æ Release V1(2025³â)

  • ±â¼ú ºÐ·ù º¯°æ
  • ÀÌÀü ¸±¸®½ºÀÇ ÁÖ¿ä ºÐ·ù º¯°æ¿¡ ´ëÇÑ ¾Ë¸²
  • »õ·Î¿î IDC ¾÷°è ºÐ·ù
    • ½Å±Ô »ê¾÷ÀÇ ¼±Á¤ ÇÁ·Î¼¼½º

ºÐ·ù °³¿ä

Á¤ÀÇ

  • ¼öÁ÷ »ê¾÷À̶õ ¹«¾ùÀΰ¡?
  • °æÁ¦ ÁÖü, ±â¾÷, »ç¾÷ü
  • IDCÀÇ ¼½ÅÍ ºä¿Í °ü·ÃµÈ ÁÖ¿ä ¼öÁ÷ ½ÃÀå
    • ¼½ÅͶõ ¹«¾ùÀΰ¡?
  • ÀÌÀü ÇÁ·¹ÀÓ¿öÅ©¿ÍÀÇ °ü°è
  • IDCÀÇ ±â¾÷ ±Ô¸ð ºÐ·ù
    • Á÷¿ø¼ö
  • IDCÀÇ Ç¥ÁØ ±â¾÷ ±Ô¸ð ±¸ºÐ
  • ¼ÒºñÀÚ ¾÷°è¿Í ¼ÒºñÀÚ ¿£µåÆ÷ÀÎÆ® º¸¾È ¼ÒÇÁÆ®¿þ¾î¿¡ °üÇÑ ÁÖÀÇ»çÇ×
  • Áö¿ª ºÐ·ù
  • ±â¼ú ºÐ·ù
  • º¸¾È Á¦Ç° ¹× ¼­ºñ½º
  • Çϵå¿þ¾î
    • Á¤º¸ ¹× µ¥ÀÌÅÍ º¸¾È ±ÔÁ¤ Áؼö
      • Á¤º¸ º¸È£ ±ÔÁ¤ Áؼö
        • ¸Þ½Ã¡ º¸¾È ±ÔÁ¤ Áؼö
    • ³×Æ®¿öÅ© º¸¾È ±ÔÁ¤ Áؼö
      • ½Å·ÚÇÒ ¼ö ÀÖ´Â ³×Æ®¿öÅ© ¾×¼¼½º ¹× º¸È£ ±ÔÁ¤ Áؼö
        • ¹æÈ­º®
        • IDP
        • º¸¾È À¥ °ÔÀÌÆ®¿þÀÌ
        • ÅëÇÕ À§Çù °ü¸®
        • VPN
  • ¼ÒÇÁÆ®¿þ¾î
    • Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀÌ¼Ç º¸È£ Ç÷§Æû
    • ¿£µåÆ÷ÀÎÆ® º¸¾È ¼ÒÇÁÆ®¿þ¾î
      • ¼ÒºñÀÚ µðÁöÅÐ ¶óÀÌÇÁ º¸È£
        • ¼ÒºñÀÚ/SOHO
      • ±â¾÷ ¿£µåÆ÷ÀÎÆ® º¸¾È
        • ÃֽŠ¿£µåÆ÷ÀÎÆ® º¸¾È
    • GRC¿Í Æ÷·»½Ä
      • eDiscovery ¹× Æ÷·»½Ä ¾ÖÇø®ÄÉÀ̼Ç
      • °Å¹ö³Í½º, ¸®½ºÅ©, ±ÔÁ¤ Áؼö ¼ÒÇÁÆ®¿þ¾î
    • ¾ÆÀ̵§Æ¼Æ¼ ¹× ¾×¼¼½º °ü¸® ¼ÒÇÁÆ®¿þ¾î
      • ¾×¼¼½º
        • °í°´ ID ¹× ¾×¼¼½º °ü¸®
        • ¾ÆÀ̵§Æ¼Æ¼ °ü¸®
      • ±ÇÇÑ
        • ÀÎÁõ
        • ±ÇÇÑ ¾×¼¼½º °ü¸®
    • Á¤º¸ ¹× µ¥ÀÌÅÍ º¸¾È ¼ÒÇÁÆ®¿þ¾î
      • µðÁöÅÐ Æ®·¯½ºÆ®
      • Á¤º¸ º¸È£
        • ¸Þ½Ã¡ º¸¾È ¼ÒÇÁÆ®¿þ¾î
        • ±â¹Ð µ¥ÀÌÅÍ °ü¸® ¹× µ¥ÀÌÅÍ ÇÁ¶óÀ̹ö½Ã
    • ³×Æ®¿öÅ© º¸¾È ¼ÒÇÁÆ®¿þ¾î
      • ¾×Ƽºê ¿ëµµ º¸¾È
      • ½Å·ÚÇÒ ¼ö ÀÖ´Â ³×Æ®¿öÅ© ¾×¼¼½º ¹× º¸È£
        • ¾ÈÀüÇÑ Á¢±Ù°ú ¼¼ºÐÈ­
        • Á¦·Î Æ®·¯½ºÆ® ¿§Áö
    • º¸¾È ºÐ¼® ¼ÒÇÁÆ®¿þ¾î
      • º¸¾È Á¤º¸ ¹× À̺¥Æ® °ü¸®
      • Ãë¾à¼º °ü¸®
        • µð¹ÙÀ̽ºÀÇ Ãë¾à¼º Æò°¡
        • ¼ÒÇÁÆ®¿þ¾î Ãë¾à¼º Æò°¡
      • Tier 2 SOC ºÐ¼® ¹× Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê XDR
        • ¿ÀÄɽºÆ®·¹ÀÌ¼Ç ¹× ÀÚµ¿È­ µµ±¸
        • ³×Æ®¿öÅ© °ËÃâ ¹× ÀÀ´ä
        • À§Çù ÀÎÅÚ¸®Àü½º
        • Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºêÀÇ È®Àå °ËÃâ°ú ´ëÀÀ
  • ¼­ºñ½º
    • ÇÁ·ÎÁ§Æ® ÁöÇâ
      • ÄÁ¼³ÆÃ ¼­ºñ½º
        • ºñÁî´Ï½º ÄÁ¼³ÆÃ
        • Ä¿½ºÅÒ ¾ÖÇø®ÄÉÀÌ¼Ç °³¹ß
        • ITÄÁ¼³ÆÃ
      • ÅëÇÕ¼­ºñ½º
        • ³×Æ®¿öÅ© ÄÁ¼³ÆÃ°ú ÅëÇÕ
        • ½Ã½ºÅÛ ÅëÇÕ
    • ¸Å´ÏÁöµå ½ÃÅ¥¸®Æ¼ ¼­ºñ½º
      • °ü¸® º¸¾È ºñÁî´Ï½º ¼­ºñ½º
        • ÁÖ¿ä ¼öÆòÇü BPO
      • ¸Å´ÏÁöµå ½ÃÅ¥¸®Æ¼ ±â¼ú ¼­ºñ½º
        • ¾ÖÇø®ÄÉÀÌ¼Ç °ü¸®
        • È£½ºÆ®Çü ¾ÖÇø®ÄÉÀÌ¼Ç °ü¸®
        • È£½ºÆÃ ÀÎÇÁ¶ó ¼­ºñ½º
        • IT ¾Æ¿ô¼Ò½Ì
        • ³×Æ®¿öÅ© ¹× ¿£µåÆ÷ÀÎÆ® ¾Æ¿ô¼Ò½Ì ¼­ºñ½º
    • Áö¿ø ¼­ºñ½º
      • IT ±³À° ¹× ±³À°
      • º¸¾È ¼­ºñ½º Áö¿ø
        • Çϵå¿þ¾î µµÀÔ ¹× Áö¿ø
        • ¼ÒÇÁÆ®¿þ¾î µµÀÔ ¹× Áö¿ø

Âü°í ÀÚ·á

  • Á¶»ç ¹æ¹ý
    • ȯÀ²
  • ´Ù¸¥ IDC ÁöÃâ °¡À̵å Á¶»ç¿ÍÀÇ Áߺ¹
  • ´Ù¸¥ IDC º¸¾È ¿¹Ãø Á¦Ç°°úÀÇ ¹«°á¼º¿¡ °üÇÑ ÁÖ¼®
  • ºÎ·Ï - ·¹°Å½Ã ¾÷°è ºÐ·ù
  • °ü·Ã Á¶»ç
  • ¿ä¾à
KTH 25.04.11

This IDC study introduces IDC's new industry definitions and provides a detailed description of IDC's security products segmentation methodology and taxonomy. It should be used as a companion piece for IDC's Worldwide Security Spending Guide data deliverables. Technology suppliers may utilize this approach and structure as well to help them build an industry-focused organization."IDC's Worldwide Security Spending Guide taxonomy provides a comprehensive, global, and detailed map of the security marketplace," says Serena Da Rold, research director, IDC Spending Guides. "It is an invaluable resource to help vendors standardize definitions and identify industry and company size segments offering the best opportunities for security products."

IDC's Worldwide Security Spending Guide Taxonomy

Security Spending Guide Taxonomy Changes for 2025 Release V1

  • Technology Taxonomy Changes
  • Reminder of Key Taxonomy Changes in Prior Release
  • New IDC Industry Taxonomy
    • New Industries Selection Process

Taxonomy Overview

Definitions

  • What Is a Vertical Industry?
  • Economic Entities, Enterprises, and Establishments
  • IDC's Sector View and Associated Primary Vertical Markets
    • What Is a Sector?
  • Relationship to the Prior Framework
  • IDC's Company Size Taxonomy
    • Employee Count
  • IDC's Standard Company Size Segmentation
  • Note on Consumer Industry and Consumer Endpoint Security Software
  • Geography Taxonomy
  • Technology Taxonomy
  • Security Products and Services
  • Hardware
    • Information and Data Security Appliances
      • Information Protection Appliances
        • Messaging Security Appliances
    • Network Security Appliances
      • Trusted Network Access and Protection Appliances
        • Firewall
        • IDP
        • Secure Web Gateway
        • Unified Threat Management
        • VPN
  • Software
    • Cloud-Native Application Protection Platform
    • Endpoint Security Software
      • Consumer Digital Life Protection
        • Consumer/SOHO
      • Corporate Endpoint Security
        • Modern Endpoint Security
    • GRC and Forensics
      • eDiscovery and Forensics Applications
      • Governance, Risk, and Compliance Software
    • Identity and Access Management Software
      • Access
        • Customer Identity and Access Management
        • Identity Management
      • Privilege
        • Authentication
        • Privileged Access Management
    • Information and Data Security Software
      • Digital Trust
      • Information Protection
        • Messaging Security Software
        • Sensitive Data Management and Data Privacy
    • Network Security Software
      • Active Application Security
      • Trusted Network Access and Protection
        • Secure Access and Segmentation
        • Zero Trust Edge
    • Security Analytics Software
      • Security Information and Event Management
      • Vulnerability Management
        • Device Vulnerability Assessment
        • Software Vulnerability Assessment
      • Tier 2 SOC Analytics and Cloud-Native XDR
        • Orchestration and Automation Tools
        • Network Detection and Response
        • Threat Intelligence
        • Cloud-Native Extended Detection and Response
  • Services
    • Project Oriented
      • Consulting Services
        • Business Consulting
        • Custom Application Development
        • IT Consulting
      • Integration Services
        • Network Consulting and Integration
        • Systems Integration
    • Managed Security Services
      • Managed Security Business Services
        • Key Horizontal BPO
      • Managed Security Technology Services
        • Application Management
        • Hosted Application Management
        • Hosting Infrastructure Services
        • IT Outsourcing
        • Network and Endpoint Outsourcing Services
    • Support Services
      • IT Education and Training
      • Support Security Services
        • Hardware Deploy and Support
        • Software Deploy and Support

Learn More

  • Methodology
    • Exchange Rates
  • Overlap with Other IDC Spending Guide Research
  • Note on Alignment with Other IDC Security Forecast Products
  • Appendix - Legacy Industry Taxonomy
  • Related Research
  • Synopsis
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦