½ÃÀ庸°í¼­
»óǰÄÚµå
1709401

IDCÀÇ ¼¼°è º¸¾È ¼­ºñ½º ºÐ·ù¹ý(2025³â)

IDC¢¥s Worldwide Security Services Taxonomy, 2025

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IDC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 31 Pages | ¹è¼Û¾È³» : Áï½Ã¹è¼Û

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

ÀÌ º¸°í¼­´Â ÁøÈ­ÇÏ´Â º¸¾È ¼­ºñ½º ½ÃÀåÀ» ÀÌÇØÇϱâ À§ÇÑ ÃֽŠÇÁ·¹ÀÓ¿öÅ©¸¦ Á¦°øÇÕ´Ï´Ù. Á¦·Î Æ®·¯½ºÆ® º¸¾È, DevSecOps ÄÁ¼³ÆÃ, »ê¾÷¿ë IoT º¸¾È, µ¥ÀÌÅÍ º¸È£ ¹× °Å¹ö³Í½º ¼­ºñ½º µîÀÇ »õ·Î¿î Á¤Àǰ¡ Æ÷ÇԵǾî ÀÖ½À´Ï´Ù. ÀÌ ºÐ·ùü°è´Â º¸¾È ¿î¿µ, ÄÚµå °ËÅä, ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È Å×½ºÆ® µî¿¡¼­ GenAI/¿¡ÀÌÀüÆ®Çü AIÀÇ ¿µÇâ¿¡ ÃÊÁ¡À» ¸ÂÃß¾ú½À´Ï´Ù. IDC »çÀ̹ö º¸¾È ÄÁ¼³ÆÃ ¹× Àü¹® º¸¾È ¼­ºñ½º ¿¬±¸ Ã¥ÀÓÀÚ Cathy Huxley´Â "º¸¾ÈÀ» À§ÇÑ GenAI/¿¡ÀÌÀüÆ® AI°¡ ¼³¸í°¡´É¼º, ½Å·Ú¼º, ½Å·Ú¼ºÀ» Çâ»ó½ÃÅ´¿¡ µû¶ó Á¶Á÷Àº AI ±â¹Ý º¸¾È Çõ½ÅÀ» äÅÃÇϰí ÀÖÀ¸¸ç, º¸¾È ¼­ºñ½º Á¦°ø¾÷ü´Â ÀÌ·¯ÇÑ º¯È­¿¡ Áß¿äÇÑ ¿ªÇÒÀ» ´ã´çÇϰí ÀÖ½À´Ï´Ù."¶ó°í ¸»Çß½À´Ï´Ù.

IDCÀÇ ¼¼°è º¸¾È ¼­ºñ½º ºÐ·ù

2025³â º¸¾È ¼­ºñ½º ºÐ·ù º¯°æ

ºÐ·ù °³¿ä

  • »ý¼ºÇü AI/¿¡ÀÌÀüÆ® AIÀÇ ¿µÇâ·Â ÀνÄÇϱâ

°èÃþÀû ¸ÅÇÎ: º¸¾È ¼­ºñ½ºÀÇ 1Â÷/2Â÷ ½ÃÀå

Á¤ÀÇ

  • Àü¹® º¸¾È ¼­ºñ½º
    • »çÀ̹ö º¸¾È ÄÁ¼³ÆÃ
      • Àü·«°ú °èȹ
      • »çÀ̹ö º¸¾È ¾ÆÅ°ÅØÃ³ Æò°¡ ¹× ¼³°è
      • »çÀ̹ö º¸¾È Æò°¡
      • »çÀ̹ö º¹¿ø·Â ÄÁ¼³ÆÃ
    • °Å¹ö³Í½º, ¸®½ºÅ© ¹× ÄÄÇöóÀ̾ð½º
      • ÇÁ¶óÀ̹ö½Ã ÄÁ¼³ÆÃ
      • °Å¹ö³Í½º ÄÁ¼³ÆÃ
      • ¸®½ºÅ© ÄÁ¼³ÆÃ
      • ÄÄÇöóÀ̾𽺠ÄÁ¼³ÆÃ
      • GRC »çÀ̹ö º¸¾È Æò°¡ ¼­ºñ½º
    • »ç°í ´ëÀÀ ¹× ´ëºñ
      • »ç°í ´ëÀÀ
      • »ç°í ´ëÀÀ
      • ¹ýÀÇÇÐ
    • ±¸Çö ¹× ÅëÇÕ
      • º¸¾È ±¸Çö ¼­ºñ½º
      • µµÀÔ ¼­ºñ½º
    • ±³À° ¼­ºñ½º
  • °ü¸®Çü º¸¾È ¼­ºñ½º
    • °ü¸®Çü °¨Áö ¹× ´ëÀÀ
      • Ç»¾îÇ÷¹ÀÌ MDR/MXDR
      • °ü¸®Çü EDR
      • °ü¸®Çü SIEM
      • °ü¸®Çü À§Çù »ç³É
    • °ü¸®Çü º¸È£ ¹× Á¦¾î
      • °ü¸®Çü ³×Æ®¿öÅ© º¸¾È
      • °ü¸®Çü ¿£µåÆ÷ÀÎÆ® º¸¾È
      • °ü¸®Çü ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
      • °ü¸®Çü µ¥ÀÌÅÍ º¸¾È
      • °ü¸®Çü ID/PAM
    • °ü¸®Çü º¸¾È ±â´É
      • ¸Å´ÏÁöµå Ŭ¶ó¿ìµå º¸¾È ¼­ºñ½º
      • °ü¸®Çü GRC
      • °ü¸®Çü ÇÁ¶óÀ̹ö½Ã
      • °ü¸®Çü Ãë¾àÁ¡ °ü¸® ¼­ºñ½º
      • ¸Å´ÏÁöµå »çÀ̹ö º¹±¸
    • ½ÅÈï º¸¾È ¼­ºñ½º
      • ¾çÀÚ ¾ÈÀü º¸¾È ¼­ºñ½º

Âü°íÀÚ·á

  • °ü·Ã Á¶»ç
  • ¿ä¾à

This IDC study provides an updated framework for understanding the evolving security services market. It includes new definitions for zero trust security, DevSecOps consulting, industrial IoT security, and data protection and governance services, among others. The taxonomy highlights the impact of GenAI/agentic AI in security operations, code review, and application security testing, among other security functions. "As GenAI/agentic AI for security advances in explainability, reliability, and trustworthiness, organizations are adopting AI-driven security transformations, with security service providers playing a crucial role in this evolution," said Cathy Huang, research director, Cybersecurity Consulting and Professional Security Services at IDC.

IDC's Worldwide Security Services Taxonomy

Security Services Taxonomy Changes for 2025

Taxonomy Overview

  • Recognizing the Impact of Generative AI/Agentic AI

Hierarchical Mapping: Security Services Primary/Secondary Markets

Definitions

  • Professional Security Services
    • Cybersecurity Consulting
      • Strategy and Planning
      • Cybersecurity Architecture Assessment and Design
      • Cybersecurity Assessments
      • Cyber-Resilience Consulting
    • Governance, Risk, and Compliance
      • Privacy Consulting
      • Governance Consulting
      • Risk Consulting
      • Compliance Consulting
      • GRC Cybersecurity Assessment Services
    • Incident Response and Readiness
      • Incident Response
      • Incident Readiness
      • Forensics
    • Implementation and Integration
      • Security Implementation Services
      • Deployment Services
    • Training Services
  • Managed Security Services
    • Managed Detection and Response
      • Pure-Play MDR/MXDR
      • Managed EDR
      • Managed SIEM
      • Managed Threat Hunting
    • Managed Protection and Controls
      • Managed Network Security
      • Managed Endpoint Security
      • Managed Application Security
      • Managed Data Security
      • Managed Identity/PAM
    • Managed Security Functions
      • Managed Cloud Security Services
      • Managed GRC
      • Managed Privacy
      • Managed Vulnerability Management Services
      • Managed Cyber-Recovery
    • Emerging Security Services
      • Quantum-Safe Security Services

Learn More

  • Related Research
  • Synopsis
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦