½ÃÀ庸°í¼­
»óǰÄÚµå
1540814

¼¼°èÀÇ ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀå º¸°í¼­ : ¼Ò½º À¯Çü, ±â¼ú, ÃÖÁ¾ »ç¿ëÀÚ ¹× Áö¿ªº°(2024-2032³â)

Open Source Intelligence Market Report by Source Type, Technique, End User, and Region 2024-2032

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IMARC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 136 Pages | ¹è¼Û¾È³» : 2-3ÀÏ (¿µ¾÷ÀÏ ±âÁØ)

    
    
    




¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

¼¼°è ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀå ±Ô¸ð´Â 2023³â 123¾ï ´Þ·¯¿¡ ´ÞÇß½À´Ï´Ù. ÇâÈÄ IMARC ±×·ìÀº 2024-2032³â 16.77%ÀÇ ¿¬Æò±Õ ¼ºÀå·ü(CAGR)À» º¸À̸ç 2032³â¿¡´Â 517¾ï ´Þ·¯¿¡ À̸¦ °ÍÀ¸·Î ¿¹ÃøÇß½À´Ï´Ù. ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀåÀº »çÀ̹ö º¸¾È À§Çù Áõ°¡, ÀüÀÚ»ó°Å·¡ ¹× ¿Â¶óÀÎ Ç÷§Æû ä³ÎÀÇ ´ëÆøÀûÀÎ È®´ë, ÁøÈ­ÇÏ´Â µðÁöÅРȯ°æ¿¡¼­ ÀÇ»ç°áÁ¤ ÇÁ·Î¼¼½º °³¼± ¹× ¸®½ºÅ© ´ëÀÀÀ» À§ÇÑ AI º¸¾È ¼Ö·ç¼ÇÀÇ µµÀÔ¿¡ ÈûÀÔ¾î ¼ºÀåÇϰí ÀÖ½À´Ï´Ù. ÁÖµµÇϰí ÀÖ½À´Ï´Ù.

¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀå ºÐ¼® :

ÁÖ¿ä ½ÃÀå ¼ºÀå ÃËÁø¿äÀÎ: »çÀ̹ö À§Çù Áõ°¡, OSINT Ç÷§ÆûÀÇ ¿ª·®À» Çâ»ó½ÃŰ´Â ÀΰøÁö´É ¹× ºòµ¥ÀÌÅÍ ºÐ¼®°ú °°Àº ´Ù¾çÇÑ ±â¼ú Çõ½Å, ƯÈ÷ ÀºÇà ¹× ÀÇ·á¿Í °°Àº »ê¾÷ÀÇ ¾ö°ÝÇÑ ±ÔÁ¦ Áؼö ¿ä±¸·Î ÀÎÇØ ±â¾÷µéÀº µ¥ÀÌÅÍ º¸¾ÈÀ» °­È­Çϱâ À§ÇØ OSINT ÅøÀ» »ç¿ëÇϰí ÀÖ½À´Ï´Ù. µ¥ÀÌÅÍ º¸¾ÈÀ» °­È­Çϱâ À§ÇØ OSINT ÅøÀ» »ç¿ëÇÏ°Ô µÇ¾ú½À´Ï´Ù.

ÁÖ¿ä ½ÃÀå µ¿Çâ : ÁÖ¿ä ½ÃÀå µ¿ÇâÀ¸·Î´Â ±â¾÷ÀÌ µ¥ÀÌÅ͸¦ ºÐ¼®ÇÏ°í ´õ ³ªÀº ÅëÂû·ÂÀ» ¾òÀ» ¼ö ÀÖµµ·Ï OSINT ¼Ö·ç¼Ç¿¡ AI, ¸Ó½Å·¯´×, ÀÚ¿¬¾î ó¸® ±â¼úÀ» ÅëÇÕÇÏ´Â °ÍÀ» µé ¼ö ÀÖ½À´Ï´Ù. »çÀ̹ö ¹üÁË È°µ¿ÀÇ ±ÞÁõÀ¸·Î ´ÙÅ©À¥ °¨½Ã¿¡ ´ëÇÑ °ü½ÉÀÌ ³ô¾ÆÁü¿¡ µû¶ó ÁöÇÏ Æ÷·³À» °¨½ÃÇÏ´Â OSINT ¼Ö·ç¼ÇÀÌ µîÀåÇÒ °ÍÀ¸·Î º¸ÀÔ´Ï´Ù.

Áö¸®Àû µ¿Çâ : ºÏ¹Ì°¡ ÇöÀç ½ÃÀåÀ» ÁÖµµÇϰí ÀÖ´Â ÁÖ¿ä ÀÌÀ¯´Â °íµµ·Î ¹ß´ÞµÈ ±â¼ú ÀÎÇÁ¶ó, °ßÁ¶ÇÑ °æÁ¦ ¹ßÀü, ¿¬±¸°³¹ß¿¡ ´ëÇÑ ¸·´ëÇÑ ÅõÀÚ ¶§¹®ÀÔ´Ï´Ù. ¶ÇÇÑ À¯·´¿¡¼­´Â GDPR(EU °³ÀÎÁ¤º¸º¸È£±ÔÁ¤)(EU °³ÀÎÁ¤º¸º¸È£±ÔÁ¤)¿¡ µû¸¥ µ¥ÀÌÅÍ º¸È£°¡ ½ÃÀåÀ» ÁÖµµÇϰí ÀÖÀ¸¸ç, µ¥ÀÌÅÍ ÄÄÇöóÀ̾𽺠¹× µ¥ÀÌÅÍ º¸¾È Ãø¸é¿¡¼­ OSINT µµ±¸¿¡ ´ëÇÑ ¼ö¿ä°¡ Áõ°¡Çϰí ÀÖ½À´Ï´Ù.

°æÀï ±¸µµ: ¿ÀǼҽº ÀÎÅÚ¸®Àü½º »ê¾÷ÀÇ ÁÖ¿ä ½ÃÀå ÁøÃâ±â¾÷À¸·Î´Â Cellebrite(Sun Corporation), Dassault Systemes, Expert.AI, Hensoldt AG, Hyland Software Inc. A., Maltego Technologies GmbH, OffSec Services Limited, Palantir Technologies Inc. µîÀÌ ÀÖ½À´Ï´Ù.

°úÁ¦¿Í ±âȸ: µµÀü°úÁ¦´Â ¹æ´ëÇÑ ¾çÀÇ Á¤º¸¿¡¼­ ÀûÀýÇÏ°í ½Å·ÚÇÒ ¼ö ÀÖ´Â Á¤º¸¸¦ ¼±º°ÇÏ´Â °ÍÀ̸ç, OSINT °ø±Þ¾÷ü´Â µ¥ÀÌÅÍ ÇÁ¶óÀ̹ö½Ã º¸È£¿Í ±¤¹üÀ§ÇÑ µ¥ÀÌÅÍ ¼öÁý ¿å±¸ »çÀÌ¿¡¼­ ÀûÀýÇÑ ±ÕÇüÀ» À¯ÁöÇÏ´Â °ÍÀÌ ¾î·Á¿ï ¼ö ÀÖ½À´Ï´Ù. ±âȸ ¿äÀÎÀ¸·Î´Â Çõ½Å, ´ÙÅ©À¥ ¸ð´ÏÅ͸µ°ú °°Àº À§Çù, À§Çù ÀÎÅÚ¸®Àü½º, »çÀü ¿¹¹æÀû »çÀ̹ö º¸¾ÈÀ» À§ÇÑ OSINT ¼Ö·ç¼Ç¿¡ ´ëÇÑ °ü½É Áõ°¡, OSINT °ø±Þ¾÷ü°¡ ÄÄÇöóÀ̾𽺠Àü¹® ¼Ö·ç¼ÇÀ» Á¦°øÇÏ°í ½ÃÀå Àüü¿¡ ħÅõÇÒ ¼ö ÀÖ´Â ±âȸ ¿äÀÎÀÌ ÀÖ½À´Ï´Ù. OSINT Á¦°ø¾÷ü°¡ ÄÄÇöóÀ̾𽺿¡ ƯȭµÈ ¼Ö·ç¼ÇÀ» Á¦°øÇÏ°í ½ÃÀå Àü¹ÝÀ¸·Î ħÅõÇÒ ¼ö ÀÖ´Â Å« ±âȸ°¡ µÉ ¼ö ÀÖ½À´Ï´Ù.

¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀå µ¿Çâ :

»çÀ̹ö À§Çù Áõ°¡

±â¼úÀÇ ¹ßÀü°ú µðÁöÅÐ »óÈ£ ¿¬°á¼ºÀÌ Áõ°¡ÇÔ¿¡ µû¶ó »çÀ̹ö À§ÇùÀÌ Áõ°¡Çϰí ÀÖ½À´Ï´Ù. ÇØÄ¿, ±¹°¡¸¦ µî¿¡ ¾÷Àº ¿ä¿ø, »çÀ̹ö ¹üÁËÀÚµéÀº ³×Æ®¿öÅ©, ½Ã½ºÅÛ, ¿ëµµÀÇ ¾àÁ¡À» ÆÄ°íµå´Â Àü·«À» °è¼Ó º¯È­½Ã۰í ÀÖ½À´Ï´Ù. ¿¹¸¦ µé¾î, 2023³â 5¿ù ÆäÀ̽ººÏÀÇ ¸ðȸ»çÀÎ ¸ÞŸ(Meta)´Â 12¾ï À¯·ÎÀÇ ¹ú±ÝÀ» ºÎ°ú¹Þ°í À¯·´¿¬ÇÕ(EU)¿¡¼­ ¹Ì±¹À¸·Î »ç¿ëÀÚ µ¥ÀÌÅ͸¦ ÀÌÀüÇÏ´Â °ÍÀ» Áß´ÜÇ϶ó´Â ¸í·ÉÀ» ¹Þ¾Ò½À´Ï´Ù. ÀÌ ¹ú±ÝÀº À¯·´¿¬ÇÕ(EU) Àü¿ª¿¡¼­ ¸ÞŸÀÇ È°µ¿À» °üÇÒÇÏ´Â ¾ÆÀÏ·£µåÀÇ µ¥ÀÌÅͺ¸È£À§¿øÈ¸(DPC)°¡ ºÎ°úÇÑ °ÍÀ¸·Î, 2023³â EU ÀϹݰ³ÀÎÁ¤º¸º¸È£±ÔÁ¤(GDPR(EU °³ÀÎÁ¤º¸º¸È£±ÔÁ¤)(EU °³ÀÎÁ¤º¸º¸È£±ÔÁ¤))À» À§¹ÝÇÑ °Í¿¡ ´ëÇÑ ±â·ÏÀûÀΠó¹úÀÌ µÇ¾ú½À´Ï´Ù. µû¶ó¼­ ¿ÀǼҽº ÀÎÅÚ¸®Àü½º¸¦ ÅëÇÕÇÏ¿© Æ÷·³, ´º½º ¸Åü, ¼Ò¼È ¹Ìµð¾î µî ´Ù¾çÇÑ ¿Â¶óÀÎ ¼Ò½º·ÎºÎÅÍ ¾òÀº Á¤º¸¸¦ ¼öÁýÇÏ°í Æò°¡ÇÏ´Â µ¥ µµ¿òÀÌ µÇ´Â ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀåÀÇ ¼ºÀå¿¡ ±â¿©Çϰí ÀÖ½À´Ï´Ù. ±â¿©Çϰí ÀÖ½À´Ï´Ù.

ÀüÀÚ»ó°Å·¡ ¹× ¿Â¶óÀÎ ¼Ò¸Å¾÷ÀÇ È®´ë

ÀüÀÚ»ó°Å·¡¿Í ¿Â¶óÀÎ ¼Ò¸Å¾÷ÀÇ ±Þ°ÝÇÑ ¼ºÀåÀº °í°´°ú ¼Ò¸Å¾÷ü°¡ ¼îÇÎÇÏ°í °Å·¡ÇÏ´Â ¹æ½ÄÀ» ¿ÏÀüÈ÷ º¯È­½ÃÄ×À¸¸ç, ÀüÀÚ»ó°Å·¡¸¦ ÅëÇØ °í°´Àº Áý¿¡¼­ ½±°Ô ¼îÇÎÀ» ÇÒ ¼ö ÀÖ°Ô µÇ¾úÀ¸¸ç, µðÁöÅÐ °Å·¡°¡ Å©°Ô Áõ°¡Çß½À´Ï´Ù. IMARC GROUP¿¡ µû¸£¸é 2023³â ¼¼°è ÀüÀÚ»ó°Å·¡ ½ÃÀå ±Ô¸ð´Â 21Á¶ 1,000¾ï ´Þ·¯¿¡ ´ÞÇßÀ¸¸ç, 2032³â±îÁö 183Á¶ 8,000¾ï ´Þ·¯·Î ´õ¿í È®´ëµÉ °ÍÀ¸·Î ¿¹»óµÇ¸ç, 2024-2032³â ¿¬Æò±Õ 27.16%ÀÇ º¹ÇÕ ¼ºÀå·üÀ» º¸ÀÏ °ÍÀ¸·Î ¿¹ÃøµË´Ï´Ù. ¶ÇÇÑ, °Å·¡·® Áõ°¡¿Í °Å·¡ÀÇ º¹À⼺ Áõ°¡·Î ÀÎÇØ ¼Ò¸Å¾÷¿¡ ÁøÃâÇÑ ±â¾÷µéÀº µðÁöÅÐ ÀÚ»êÀ» º¸È£Çϱâ À§ÇØ ÀΰøÁö´É ±â¹Ý AI º¸¾È ¼Ö·ç¼ÇÀ» µµÀÔÇÒ ¼ö¹Û¿¡ ¾ø´Â »óȲÀÔ´Ï´Ù. ÀÌ·¯ÇÑ ¼Ö·ç¼ÇÀº AI ¾Ë°í¸®ÁòÀ» »ç¿ëÇÏ¿© ºñÁ¤»óÀûÀÎ ÆÐÅÏÀ» ÇнÀ ¹× ½Äº°Çϰí, ºÎÁ¤ ÇàÀ§¸¦ ½Äº°Çϰí, ¹«´Ü ¾×¼¼½º¸¦ ½Ç½Ã°£À¸·Î ¹æÁöÇÏ¿© ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀåÀÇ ¼öÀÍ¿¡ ±â¿©ÇÕ´Ï´Ù.

º¸¾È ¼Ö·ç¼Ç¿¡ AI ±¸Çö

º¸¾È ¼Ö·ç¼Ç¿¡ ÀΰøÁö´ÉÀ» µµÀÔÇÏ´Â °ÍÀº Á¶Á÷ÀÌ »çÀ̹ö À§ÇùÀ» ÀνÄÇÏ°í ´ëÀÀÇÏ´Â ¹æ½Ä¿¡ ÀÖ¾î ÁøÁ¤ÇÑ °ÔÀÓ Ã¼ÀÎÀú°¡ µÉ ¼ö ÀÖ½À´Ï´Ù. ¿À´Ã³¯ ¹æÈ­º®À̳ª ¾ÈƼ¹ÙÀÌ·¯½º ¼ÒÇÁÆ®¿þ¾î¿Í °°Àº ÀüÅëÀûÀÎ ´ëÃ¥Àº »çÀ̹ö Àû´ëÀÚµéÀÌ »ç¿ëÇÏ´Â º¹ÀâÇÑ Àü¼úÀÇ ±×¹°¸Á¿¡ ´ëÀÀÇϱ⿡´Â ÃæºÐÇÏÁö ¾Ê´Ù´Â °ÍÀÌ ÀÔÁõµÇ¾ú½À´Ï´Ù. Ŭ¶ó¿ìµå º¸¾È ¾ó¶óÀ̾𽺿¡ µû¸£¸é, º¸¾È Àü¹®°¡ÀÇ 63%´Â AI°¡ º¸¾È Á¶Ä¡, ƯÈ÷ À§Çù ŽÁö ¹× ´ëÀÀ ÀýÂ÷¸¦ °³¼±ÇÒ ¼ö ÀÖ´Â ÀáÀç·ÂÀ» ¹Ï°í ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ ½Ã½ºÅÛÀº Áö¼ÓÀûÀ¸·Î µ¥ÀÌÅͰ¡ °ø±ÞµÇ´Â ¸Ó½Å·¯´× ¾Ë°í¸®ÁòÀ» »ç¿ëÇÏ¿© µ¥ÀÌÅͷκÎÅÍ ÇнÀÇϰí, À§Çù¿¡ ÀûÀÀÇϸç, ´Ù¾çÇÑ À¯ÇüÀÇ »ç°í¿¡ ½Ç½Ã°£À¸·Î ÀÚÀ²ÀûÀ¸·Î ´ëÀÀÇÒ ¼ö ÀÖ½À´Ï´Ù. ÀÌ¿¡ µû¶ó ´Ù¾çÇÑ »ê¾÷ ºÐ¾ß¿¡¼­ µðÁöÅÐ ÀÚ»êÀ» º¸È£Çϰí Áß¿ä ÀÎÇÁ¶óÀÇ ¹«°á¼ºÀ» À¯ÁöÇϱâ À§ÇØ Çõ½ÅÀûÀÎ ±â¼ú°ú Á¢±Ù ¹æ½Ä¿¡ ÅõÀÚÇϰí ÀÖÀ¸¸ç, ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀå ¼ö¿ä¸¦ Àû±ØÀûÀ¸·Î Áõ°¡½Ã۰í ÀÖ½À´Ï´Ù.

¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀå ¼¼ºÐÈ­:

IMARC GroupÀº 2024-2032³â±îÁöÀÇ ¼¼°è, Áö¿ª ¹× ±¹°¡º° ¿¹Ãø°ú ÇÔ²² °¢ ½ÃÀå ºÎ¹®ÀÇ ÁÖ¿ä µ¿Çâ¿¡ ´ëÇÑ ºÐ¼®À» Á¦°øÇÕ´Ï´Ù. ÀÌ º¸°í¼­´Â ¼Ò½º À¯Çü, ±â¼ú ¹× ÃÖÁ¾ »ç¿ëÀÚ¿¡ µû¶ó ½ÃÀåÀ» ºÐ·ùÇÕ´Ï´Ù.

¼Ò½º À¯Çüº° ºÐ¼®

½ÃÀå Á¡À¯À²ÀÇ ´ëºÎºÐÀ» Â÷ÁöÇÏ´Â ¹Ìµð¾î

ÀÌ º¸°í¼­´Â ¼Ò½º À¯Çüº°·Î ½ÃÀåÀ» ¼¼ºÎÀûÀ¸·Î ºÐ·ùÇÏ°í ºÐ¼®ÇÕ´Ï´Ù. ¿©±â¿¡´Â ¹Ìµð¾î, ÀÎÅͳÝ, °ø°ø ¹× Á¤ºÎ µ¥ÀÌÅÍ, Àü¹® ¹× Çмú ÃâÆÇ¹°, »ó¾÷ ¹× ±âŸ°¡ Æ÷ÇԵ˴ϴÙ. º¸°í¼­¿¡ µû¸£¸é, ¹Ìµð¾î°¡ °¡Àå Å« ºÎ¹®À» Â÷ÁöÇϰí ÀÖ½À´Ï´Ù.

¹Ìµð¾î ºÎ¹®¿¡´Â TV, ¶óµð¿À, ½Å¹®, ÀâÁö, µðÁöÅÐ ´º½º ä³Î µîÀÌ Æ÷ÇԵ˴ϴÙ. ÁÖ¾îÁø ±¤¹üÀ§ÇÑ Ã¤³ÎÀº ¿©·Ð, ´ëÁßÀÇ µ¿Çâ, »çȸÀÇ ¿òÁ÷ÀÓ¿¡ ´ëÇÑ ±ÍÁßÇÑ Á¤º¸¸¦ ´ã°í ÀÖ½À´Ï´Ù. ¿¬±¸ÀÚµéÀº ½Ç½Ã°£ ¼ÒºñÀÚ Åë°è, ½ÃÀå ¿ªÇÐ, ´ëÁßÀÇ ¹ÝÀÀ¿¡ ´ëÇÑ ½Ç½Ã°£ Á¤º¸¸¦ ¾ò±â À§ÇØ »ç½Ç»ó ¹«ÇÑÇÑ Ã¤³Î¿¡ ÀÇÁ¸Çϰí ÀÖ½À´Ï´Ù. ´ë±Ô¸ð ä³Î°ú ƯÁ¤ ä³ÎÀÌ ¾Æ´Ñ ´Ù¾çÇÑ Ç÷§ÆûÀ» ÅëÇØ ½ÃÀå »óȲÀ» Àü¹ÝÀûÀ¸·Î ÆÄ¾ÇÇÒ ¼ö ÀÖ½À´Ï´Ù. ¿©±â¿¡ ´õÇØ ¹Ìµð¾î ºÎ¹®Àº Á¢±ÙÀÌ ¿ëÀÌÇÏ°í ¸ÅºÐ¸¶´Ù ¾÷µ¥ÀÌÆ®µÇ¸ç ÀϹÝÀûÀ¸·Î ¼¼»óÀÇ ¸ðµç »ç°ÇÀ» ´Ù·ç±â ¶§¹®¿¡ ¸ðµç Á¤º¸¿ø Áß °¡Àå ½Å·ÚÇÒ ¼ö ÀÖ´Â Á¤º¸¿øÀÔ´Ï´Ù.

±â¼úº° ºÐ¼®

º¸¾È ºÐ¼®ÀÌ ¾÷°è¿¡¼­ °¡Àå Å« Á¡À¯À²À» Â÷ÁöÇϰí ÀÖ½À´Ï´Ù.

ÀÌ º¸°í¼­´Â ±â¼úº°·Î ½ÃÀåÀ» ¼¼ºÎÀûÀ¸·Î ºÐ·ùÇÏ°í ºÐ¼®ÇÕ´Ï´Ù. ¿©±â¿¡´Â ÅØ½ºÆ® ºÐ¼®, ºñµð¿À ºÐ¼®, ¼Ò¼È ¹Ìµð¾î ºÐ¼®, Áö¸®Àû °ø°£ ºÐ¼®, º¸¾È ºÐ¼®, ±âŸ µîÀÌ Æ÷ÇԵ˴ϴÙ. º¸°í¼­¿¡ µû¸£¸é, º¸¾È ºÐ¼®ÀÌ °¡Àå Å« ½ÃÀå Á¡À¯À²À» Â÷ÁöÇϰí ÀÖ½À´Ï´Ù.

º¸¾È ºÐ¼®ÀÌ °¡Àå Å« ½ÃÀåÀ¸·Î ¶°¿À¸¥ ÀÌÀ¯´Â Ä¿³ØÆ¼µå ¿ùµå°¡ È®´ëµÇ¸é¼­ µðÁöÅÐ ÀÚ»ê°ú Á¤º¸¸¦ º¸È£ÇØ¾ß ÇÒ Çʿ伺ÀÌ Ä¿Á³±â ¶§¹®ÀÔ´Ï´Ù. º¸¾È ºÐ¼®Àº º¸¾È µ¥ÀÌÅ͸¦ ¼öÁý, ºÐ¼®, ÇØ¼®ÇÏ¿© ÀáÀçÀûÀÎ À§Çù, Ãë¾àÁ¡, Ä§ÇØ °¡´É¼ºÀ» ÆÄ¾ÇÇÏ´Â ¿ªÇÒÀ» ÇÕ´Ï´Ù. ¸Ó½Å·¯´×, Åë°è ºÐ¼®, ÆÐÅÏ ÀνÄÀ» °áÇÕÇØ ½Ç½Ã°£ ¸ð´ÏÅ͸µ, À§Çù ŽÁö, »ç°í ´ëÀÀÀ» ¼öÇàÇÕ´Ï´Ù. ÀÌ ¿Ü¿¡µµ º¸¾È ¹× ºÐ¼®¿¡ ´ëÇÑ ¼ö¿ä Áõ°¡´Â »çÀ̹ö À§Çù°ú IT ȯ°æÀÇ º¹À⼺ Áõ°¡¿¡ µû¸¥ °ÍÀÔ´Ï´Ù. ¿¹¸¦ µé¾î, 2023³â 11¿ù, GenAI¸¦ Ȱ¿ëÇÏ¿© ¼Ò¼È ¿£Áö´Ï¾î¸µÀ» ÅëÇÑ »çÀ̹ö °ø°Ý¿¡ ´ëÀÀÇÏ´Â ÆÀÀ» Áö¿øÇÏ´Â µ¥ ÃÊÁ¡À» ¸ÂÃá SaaS Ç÷§ÆûÀÎ Brightside AI´Â OSINT ÀÎÇÁ¶ó ±¸Ãà¿¡¸¸ ÃÊÁ¡À» ¸ÂÃá ±â¼ú ÅõÀÚ»çÀÎ ¼Ò¼È ¸µÅ©½º(Social Links)¿Í 100¸¸ ´Þ·¯ ±Ô¸ðÀÇ °Å·¡¸¦ ¼º»ç½ÃÄ×½À´Ï´Ù°í ¹ßÇ¥Çß½À´Ï´Ù. ÈÄÀÚ´Â 500°³ ÀÌ»óÀÇ °³¹æÇü Á¤º¸ ¼Ò½º¸¦ ÅëÇÕÇÏ¿© ¿ÀÇ µ¥ÀÌÅÍ ÇÁ·¹ÀÓ¿öÅ©¿¡¼­ ÀÌ·ç¾îÁö´Â ŸÀÎÀÇ µ¥ÀÌÅ͸¦ »ç¿ëÇÏ´Â Á¶Á÷ÀÇ ÀÛ¾÷À» ±ØÀûÀ¸·Î °¡¼ÓÈ­ÇÏ´Â OSINT Ç÷§ÆûÀ¸·Î ´ëÇ¥µË´Ï´Ù. À̹ø °è¾àÀÇ ÀÏȯÀ¸·Î ºê¶óÀÌÆ®»çÀ̵å´Â ÇâÈÄ 5³â°£ ¼Ò¼È ¸µÅ©½º Ç÷§Æû¿¡ ´ëÇÑ Á¢±ÙÀ» È®´ëÇÏ¿© Àΰ£ µ¥ÀÌÅÍ °Ë»ö ¿£Áøº° ÀΰøÁö´É ±â¹Ý LLM ¸ðµ¨À» ÃÖÀûÈ­ÇÏ°í ½ÇÁ¦ »ç·Ê¸¦ È¿°úÀûÀ¸·Î Ȱ¿ëÇÒ ¼ö ÀÖµµ·Ï Áö¿øÇÒ ¿¹Á¤ÀÔ´Ï´Ù.

ÃÖÁ¾ »ç¿ëÀÚº° ºÐ¼®

»çÀ̹ö º¸¾È Á¶Á÷ÀÌ ½ÃÀåÀÇ ÁÖ¿ä ºÎ¹®À» Â÷ÁöÇÕ´Ï´Ù.

ÀÌ º¸°í¼­´Â ½ÃÀåÀ» ÃÖÁ¾ »ç¿ëÀÚº°·Î ¼¼ºÐÈ­ÇÏ¿© ºÐ¼®ÇÕ´Ï´Ù. ¿©±â¿¡´Â Á¤ºÎ Á¤º¸±â°ü, ±º»ç ¹× ±¹¹æ Á¤º¸±â°ü, »çÀ̹ö º¸¾È Á¶Á÷, ¹ý ÁýÇà ±â°ü, ¹Î°£ Àü¹® ±â¾÷, ±ÝÀ¶ ¼­ºñ½º, ±âŸ µîÀÌ Æ÷ÇԵ˴ϴÙ. º¸°í¼­¿¡ µû¸£¸é, »çÀ̹ö º¸¾È Á¶Á÷ÀÌ °¡Àå Å« ºÎ¹®À» Â÷ÁöÇϰí ÀÖ½À´Ï´Ù.

»çÀ̹ö º¸¾È Á¶Á÷Àº ¿Â¶óÀÎ À§Çù°ú °ø°ÝÀ¸·ÎºÎÅÍ µðÁöÅÐ ÀÎÇÁ¶ó, ³×Æ®¿öÅ©, µ¥ÀÌÅ͸¦ º¸È£ÇÕ´Ï´Ù. »çÀ̹ö º¸¾È Á¶Á÷Àº ¿Â¶óÀÎ À§Çù°ú °ø°ÝÀ¸·ÎºÎÅÍ µðÁöÅÐ ÀÎÇÁ¶ó, ³×Æ®¿öÅ© ¹× µ¥ÀÌÅ͸¦ º¸È£ÇÕ´Ï´Ù. »çÀ̹ö º¸¾È Á¶Á÷Àº »çÀ̹ö À§ÇùÀÇ ¼ö¿Í ¼ýÀÚ°¡ Áõ°¡ÇÔ¿¡ µû¶ó ³ôÀº ¼öÁØÀÇ º¸¾È º¸È£¿Í ²÷ÀÓ¾ø´Â °æ°è°¡ ÇÊ¿äÇϱ⠶§¹®¿¡ ¸¹Àº °ü½ÉÀ» ¹Þ°í ÀÖ½À´Ï´Ù. ¶ÇÇÑ »çÀ̹ö º¸¾È Á¶Á÷Àº À§Çù ÀÎÅÚ¸®Àü½º, º¸¾È ºÐ¼®, ħÀÔ Å½Áö ½Ã½ºÅÛ µî ´Ù¾çÇÑ ±â¼ú°ú Á¢±Ù ¹æ½ÄÀ» »ç¿ëÇÏ¿© ³ëÃâÀ» °¨ÁöÇϰí, À§¹ÝÀ» ¹æÁöÇϰí, ³ëÃâÀ» ¿ÏÈ­Çϱâ À§ÇØ ³ë·ÂÇϰí ÀÖ½À´Ï´Ù. ÀÌ¿Í ´õºÒ¾î 2021³â 11¿ù NICEÀÇ »ç¾÷ºÎÀÎ NICE Actimize´Â IFM-X ´ÙÅ©À¥ ÀÎÅÚ¸®Àü½º ¼Ö·ç¼ÇÀÎ IFM-X ´ÙÅ©À¥ ÀÎÅÚ¸®Àü½º ¼Ö·ç¼ÇÀ» ¹ßÇ¥Çß½À´Ï´Ù. ÀÌ ¼Ö·ç¼ÇÀº ´ÙÅ©À¥, µöÀ¥, ¾Ç¼ºÄÚµå ³×Æ®¿öÅ©, °³ÀÎ ¸Þ½Ã¡ Ç÷§Æû, ºñ¹Ð »ç±â²ÛÀÇ ÀÎÇÁ¶ó¿Í Ä¿¹Â´ÏƼ¸¦ ±¤¹üÀ§ÇÏ°Ô Ä¿¹öÇÏ¿© ´Éµ¿Àû »ç±â ¹× °èÁ¤ Å»Ãë(ATO) À§ÇùÀ» ½Äº°ÇÏ´Â ±¤¹üÀ§ÇÑ °úÁ¦¿¡ ´ëÀÀÇÏ´Â ¼Ö·ç¼ÇÀÔ´Ï´Ù. FSO¸¦ Áö¿øÇÕ´Ï´Ù. ´ÙÅ©À¥ÀÇ µ¥ÀÌÅÍ ¾çÀÌ ±ÞÁõÇÏ´Â µ¿½Ã¿¡ ±ÝÀ¶ ¼­ºñ½º ±â°ü(FSO)Àº ŽÁö ¹× ¿¹¹æÀÌ ¾î·Á¿î ´õ º¹ÀâÇÑ »ç±â ÇàÀ§¸¦ °æÇèÇϰí ÀÖ½À´Ï´Ù. ÇöÀç µðÁöÅÐ ±â¼úÀÇ »ç¿ëÀÌ Áõ°¡ÇÔ¿¡ µû¶ó »çÀ̹ö º¸¾ÈÀº °æÁ¦ÀÇ ¸ðµç Ãø¸é¿¡¼­ °¡Àå Áß¿äÇÑ À̽´°¡ µÇ°í ÀÖÀ¸¸ç, ÀÌ´Â ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀåÀÇ ¼ºÀåÀ» °¡¼ÓÇϰí ÀÖ½À´Ï´Ù.

Áö¿ªº° ºÐ¼®

ºÏ¹Ì°¡ ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀå Á¡À¯À² 1À§, °¡Àå Å« ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀå Á¡À¯À² Â÷Áö

ÀÌ º¸°í¼­´Â ºÏ¹Ì(¹Ì±¹, ij³ª´Ù), À¯·´(µ¶ÀÏ, ÇÁ¶û½º, ¿µ±¹, ÀÌÅ»¸®¾Æ, ½ºÆäÀÎ, ·¯½Ã¾Æ, ±âŸ), ¾Æ½Ã¾ÆÅÂÆò¾ç(Áß±¹, ÀϺ», Àεµ, Çѱ¹, È£ÁÖ, Àεµ³×½Ã¾Æ, ±âŸ), ¶óƾ¾Æ¸Þ¸®Ä«(ºê¶óÁú, ¸ß½ÃÄÚ, ±âŸ), Áßµ¿ ¹× ¾ÆÇÁ¸®Ä« µî ÁÖ¿ä Áö¿ª ½ÃÀåÀ» Á¾ÇÕÀûÀ¸·Î ºÐ¼®ÇÕ´Ï´Ù. ÁÖ¿ä Áö¿ª ½ÃÀåµµ Á¾ÇÕÀûÀ¸·Î ºÐ¼®Çß½À´Ï´Ù. º¸°í¼­¿¡ µû¸£¸é ºÏ¹Ì´Â ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ºÐ¾ß¿¡¼­ °¡Àå ±Ô¸ð°¡ Å« Áö¿ª ½ÃÀåÀÔ´Ï´Ù.

ºÏ¹Ì´Â °íµµÀÇ ±â¼ú »ýŰè, °­·ÂÇÑ °æÁ¦ ¼ºÀå ¼Óµµ, Çõ½Å¿¡ ´ëÇÑ ±íÀº Çå½ÅÀ¸·Î À¯¸íÇÕ´Ï´Ù. ºÏ¹Ì´Â ÁÖ·Î ¹Ì±¹°ú ij³ª´Ù¸¦ Æ÷ÇÔÇÏ¸ç ±â¼ú, ±ÝÀ¶, ÀÇ·á, ¼ÒºñÀç µî ´Ù¾çÇÑ »ê¾÷À» ¼±µµÇϰí ÀÖ½À´Ï´Ù. ºÏ¹Ì °æÁ¦ÀÇ Æ¯Â¡Àº ³ôÀº ¼ÒºñÀÚ ±¸¸Å·Â°ú ºü¸¥ ½Å±â¼ú Èí¼ö·ÂÀ¸·Î µðÁöÅÐ ¼­ºñ½º, °í±Þ ºÐ¼® ¹× »çÀ̹ö º¸¾È¿¡ ¸Å¿ì ¸Å·ÂÀûÀÎ ½ÃÀåÀ¸·Î ºÎ»óÇϰí ÀÖ½À´Ï´Ù. ¿¹¸¦ µé¾î, 2024³â 2¿ù 15ÀÏ, Æ÷ÃáÁö ¼±Á¤ 500´ë °úÇбâ¼ú ¼±µµ±â¾÷ÀÎ Leidos´Â ¹Ì±¹ ±¹¹æÁ¤º¸±¹(DIA)ÀÇ °úÇбâ¼ú(S&T) ±¹À¸·ÎºÎÅÍ »õ·Î¿î °ú¾÷Áö½Ã °è¾àÀ» ¼öÁÖÇß´Ù°í ¹ßÇ¥Çß½À´Ï´Ù. ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ÅëÇÕ¼¾ÅÍ(OSIC)¸¦ À§ÇÑ TCPED(Tasking, Collection, Processing, Exploitation, Dissemination) ½Ã½ºÅÛÀ» ¼³°è ¹× ±¸ÇöÇÕ´Ï´Ù. ÀÌó·³ ´Ù¾çÇÏ°í ºÎÀ¯ÇÏ¸ç µðÁöÅп¡ Á¤ÅëÇÑ °í°´ÀÇ ±â´ëÄ¡ÀÇ º¯È­´Â ´Ù¾çÇÑ »ê¾÷ ºÐ¾ßÀÇ ±â¾÷¿¡°Ô ²ÙÁØÇÑ ¼ºÀå°ú ¸¹Àº ±âȸ¸¦ Á¦°øÇÏ¿© ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀå Àü¸Á¿¡ ±àÁ¤ÀûÀÎ ¿µÇâÀ» ¹ÌÄ¡°í ÀÖ½À´Ï´Ù.

°æÀï»óȲ :

¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀå Á¶»ç º¸°í¼­´Â ½ÃÀå °æÀï ±¸µµ¿¡ ´ëÇÑ Á¾ÇÕÀûÀÎ ºÐ¼®µµ Á¦°øÇÕ´Ï´Ù. ¸ðµç ÁÖ¿ä ±â¾÷ÀÇ »ó¼¼ÇÑ ÇÁ·ÎÆÄÀϵµ Á¦°øÇÕ´Ï´Ù. ¿ÀǼҽº ÀÎÅÚ¸®Àü½º »ê¾÷ÀÇ ÁÖ¿ä ½ÃÀå ÁøÃâ±â¾÷Àº Cellebrite(Sun Corporation), Dassault Systemes, Expert.AI, Hensoldt AG, Hyland Software Inc, Maltego Technologies GmbH, OffSec Services Limited, Palantir Technologies Inc. µîÀÔ´Ï´Ù.

(Âü°í·Î, ÀÌ´Â ÀϺΠ±â¾÷ ¸ñ·ÏÀ̸ç, Àüü ¸ñ·ÏÀº º¸°í¼­¿¡¼­ È®ÀÎÇÒ ¼ö ÀÖ½À´Ï´Ù).

´ë±â¾÷µéÀº ´ëÁßÀÌ ÀÌ¿ëÇÒ ¼ö ÀÖ´Â ¼Ò½º¿¡¼­ °í±Þ ºÐ¼® ¹× µ¥ÀÌÅÍ ÃßÃâ¿¡ ´ëÇÑ ¼ö¿ä Áõ°¡¿¡ ´ëÀÀÇϱâ À§ÇØ ÀÌ ºÎ¹®ÀÇ Çõ½Å°ú È®ÀåÀ» À§ÇØ ±¤¹üÀ§ÇÏ°Ô ³ë·ÂÇϰí ÀÖ½À´Ï´Ù. ÀÌµé ±â¾÷Àº ÀΰøÁö´É, ¸Ó½Å·¯´×, ÀÚ¿¬¾î ó¸®¿Í °°Àº ÷´Ü ±â¼úÀ» Ȱ¿ëÇÏ¿© ¼Ò¼È ¹Ìµð¾î, À¥»çÀÌÆ®, ÀϹÝÀÎÀÌ Á¢±ÙÇÒ ¼ö ÀÖ´Â Á¤ºÎ ±â·Ï, Àü¹® °£Ç๰ µî ´Ù¾çÇÑ ÃâóÀÇ µ¥ÀÌÅ͸¦ ºÐ¼®Çß½À´Ï´Ù. ¿¹¸¦ µé¾î, 2024³â 2¿ù ShadowDragonÀº Frost & SullivanÀÌ ¼¼°è OSINT ¾÷°è¿¡¼­ ¼ö¿©ÇÏ´Â '2024 Best Practices Award for Entrepreneurial Company of the Year'¸¦ ¼ö»óÇß½À´Ï´Ù. ¼¨µµ¿ìµå·¡°ïÀº OSINT »çÀ̹ö À§Çù ÀÎÅÚ¸®Àü½º ºÎ¹®¿¡¼­ °í°´°úÀÇ È¿°úÀûÀÌ°í °ß°íÇÑ °ü°è¸¦ ±¸ÃàÇÏ´Â °ÍÀÌ ½Å·Ú ±¸ÃàÀÇ ÇÙ½É ¿ä¼Ò¶ó°í ¹Ï°í ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ ³ë·ÂÀº ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀå Àü¸Á¿¡ ±àÁ¤ÀûÀÎ ¿µÇâÀ» ¹ÌÄ¥ °ÍÀ¸·Î ±â´ëÇϰí ÀÖ½À´Ï´Ù.

¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀå ´º½º

2022³â 3¿ù 24ÀÏ: NICE ¾×Ƽ¸¶ÀÌÁî(NICE Actimize, N.J.)´Â ÀÚ»çÀÇ IFM-X ´ÙÅ©À¥ ÀÎÅÚ¸®Àü½º ¹× ½Å±Ô °èÁ »ç±â ¼Ö·ç¼ÇÀÌ ¼¼°è ±ÝÀ¶ ±â¼ú ½ÃÀå¿¡¼­ °¡Àå ¶Ù¾î³­ ±â¾÷, ±â¼ú ¹× Á¦Ç°À» ¼±Á¤ÇÏ´Â µ¶¸³ÀûÀÎ Á¶Á÷ÀÎ ÇÉÅ×Å© ºê·¹ÀÌÅ©½º·ç(FinTech BreakthroughÀÇ »ç±â¹æÁö Çõ½Å»óÀ» ¼ö»óÇß´Ù°í ¹àÇû½À´Ï´Ù. À̹ø ¼ö»óÀº ÀΰøÁö´É(AI)°ú ¸Ó½Å·¯´×À» ÅëÇÑ ÃÖ÷´Ü ŽÁö ´É·ÂÀ¸·Î À¯¸íÇÑ NICE ¾×Ƽ¸¶ÀÌÁîÀÇ IFM-X ¿£ÅÍÇÁ¶óÀÌÁî »ç±â °ü¸® Ç÷§ÆûÀÌ ¼ö»óÇß½À´Ï´Ù.

2024³â 3¿ù 4ÀÏ, HOOVER, ¼¨µµ¿ìµå·¡°ï(ShadowDragon)Àº ¿ÀǼҽº ÀÎÅÚ¸®Àü½º(OSINT)ÀÇ ¼±±¸ÀûÀÎ À¯Åë¾÷üÀÌÀÚ Àκ£½ºÆ¼°í ±×·ì(Investigo Group)ÀÇ µÎ »ç¾÷üÀÎ Äݶ󺸶óÀÌÆ®(Collaboraite)¿Í º£½ÃÆ®°í ÄÁ¼³ÆÃ(Vesitgo Consulting)À» Ãß°¡ÇÏ¿© Àΰ£ Áß½ÉÀÇ µ¥ÀÌÅÍ¿Í ÀΰøÁö´É(AI)¿¡ ´ëÇÑ ÁýÁßÀûÀÎ µµÀü°úÁ¦¸¦ ±Øº¹ÇÏ°í ¾ÈÀüÇÑ µðÁöÅÐ ÀüȯÀ» ÃËÁøÇÏ´Â °ÍÀ» ¸ñÇ¥·Î ÇÏ´Â ±¸¸ÅÇü ¾ÆÀÌÅÛ°ú ¾ÛÀ» »ý»ê À» Áö¿øÇÕ´Ï´Ù.

º» º¸°í¼­¿¡¼­ ´Ù·é ÁÖ¿ä Áú¹®µé

  • ¼¼°è ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀå ±Ô¸ð´Â?
  • 2024-2032³â ¼¼°è ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀåÀÇ ¿¹»ó ¼ºÀå·üÀº?
  • ¼¼°è ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀåÀ» À̲ô´Â ÁÖ¿ä ¿äÀÎÀº?
  • Äڷγª19°¡ ¼¼°è ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀå¿¡ ¹ÌÄ¡´Â ¿µÇâÀº?
  • ¼Ò½º À¯Çüº° ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀå ¼¼°è ½ÃÀå ÇöȲÀº?
  • ¼¼°è ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀåÀÇ ±â¼úº° ºÐ¼®Àº?
  • ¼¼°è ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀåÀÇ ÃÖÁ¾ »ç¿ëÀÚº° ºÐ¼®Àº?
  • ¼¼°è ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀåÀÇ ÁÖ¿ä Áö¿ªÀº?
  • ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀåÀÇ ¼¼°è ÁÖ¿ä ÁøÃâ ±â¾÷Àº?

¸ñÂ÷

Á¦1Àå ¼­¹®

Á¦2Àå Á¶»ç ¹üÀ§¿Í Á¶»ç ¹æ¹ý

  • Á¶»ç ¸ñÀû
  • ÀÌÇØ°ü°èÀÚ
  • µ¥ÀÌÅÍ ¼Ò½º
    • 1Â÷ Á¤º¸
    • 2Â÷ Á¤º¸
  • ½ÃÀå ÃßÁ¤
    • º¸ÅÒ¾÷ Á¢±Ù
    • Åé´Ù¿î Á¢±Ù
  • Á¶»ç ¹æ¹ý

Á¦3Àå ÁÖ¿ä ¿ä¾à

Á¦4Àå ¼­·Ð

  • °³¿ä
  • ÁÖ¿ä ¾÷°è µ¿Çâ

Á¦5Àå ¼¼°èÀÇ ¿ÀǼҽº ÀÎÅÚ¸®Àü½º ½ÃÀå

  • ½ÃÀå °³¿ä
  • ½ÃÀå ºÐ¼®
  • COVID-19ÀÇ ¿µÇâ
  • ½ÃÀå ¿¹Ãø

Á¦6Àå ½ÃÀå ºÐ¼® : ¼Ò½º À¯Çüº°

  • ¹Ìµð¾î
  • ÀÎÅͳÝ
  • °ø°ø ¹× Á¤ºÎ µ¥ÀÌÅÍ
  • Àü¹® ¹× Çмú ÃâÆÇ¹°
  • »ó¿ë
  • ±âŸ

Á¦7Àå ½ÃÀå ºÐ¼® : ±â¼úº°

  • ÅØ½ºÆ® ºÐ¼®
  • ºñµð¿À ºÐ¼®
  • ¼Ò¼È¹Ìµð¾î ºÐ¼®
  • ÁöÇü°ø°£ ºÐ¼®
  • º¸¾È ºÐ¼®
  • ±âŸ

Á¦8Àå ½ÃÀå ºÐ¼® : ÃÖÁ¾»ç¿ëÀÚº°

  • Á¤ºÎ øº¸ ±â°ü
  • ±º ¹× ¹æÀ§ Á¤º¸ ±â°ü
  • »çÀ̹ö º¸¾È Á¶Á÷
  • ¹ýÁýÇà±â°ü
  • ¹Î°£ Àü¹® »ç¾÷
  • ±ÝÀ¶ ¼­ºñ½º
  • ±âŸ

Á¦9Àå ½ÃÀå ºÐ¼® : Áö¿ªº°

  • ºÏ¹Ì
    • ¹Ì±¹
    • ij³ª´Ù
  • ¾Æ½Ã¾ÆÅÂÆò¾ç
    • Áß±¹
    • ÀϺ»
    • Àεµ
    • Çѱ¹
    • È£ÁÖ
    • Àεµ³×½Ã¾Æ
    • ±âŸ
  • À¯·´
    • µ¶ÀÏ
    • ÇÁ¶û½º
    • ¿µ±¹
    • ÀÌÅ»¸®¾Æ
    • ½ºÆäÀÎ
    • ·¯½Ã¾Æ
    • ±âŸ
  • ¶óƾ¾Æ¸Þ¸®Ä«
    • ºê¶óÁú
    • ¸ß½ÃÄÚ
    • ±âŸ
  • Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«
    • ½ÃÀå µ¿Çâ
    • ½ÃÀå ºÐ¼® : ±¹°¡º°
    • ½ÃÀå ¿¹Ãø

Á¦10Àå SWOT ºÐ¼®

  • °³¿ä
  • °­Á¡
  • ¾àÁ¡
  • ±âȸ
  • À§Çù

Á¦11Àå ¹ë·ùüÀÎ ºÐ¼®

Á¦12Àå PorterÀÇ Five Forces ºÐ¼®

  • °³¿ä
  • ¹ÙÀ̾îÀÇ ±³¼··Â
  • °ø±Þ ±â¾÷ÀÇ ±³¼··Â
  • °æÀï Á¤µµ
  • ½Å±Ô ÁøÃâ¾÷üÀÇ À§Çù
  • ´ëüǰÀÇ À§Çù

Á¦13Àå °¡°Ý ºÐ¼®

Á¦14Àå °æÀï ±¸µµ

  • ½ÃÀå ±¸Á¶
  • ÁÖ¿ä ±â¾÷
  • ÁÖ¿ä ±â¾÷ °³¿ä
    • Cellebrite(Sun Corporation)
    • Dassault Systemes
    • Expert.AI
    • Hensoldt AG
    • Hyland Software Inc.
    • IPS S.p.A.
    • Maltego Technologies GmbH
    • OffSec Services Limited
    • Palantir Technologies Inc.
    • Recorded Future Inc.
    • Thales Group
LSH 24.09.03

The global open source intelligence market size reached US$ 12.3 Billion in 2023. Looking forward, IMARC Group expects the market to reach US$ 51.7 Billion by 2032, exhibiting a growth rate (CAGR) of 16.77% during 2024-2032. The market for open source intelligence is driven by an increasing number of cyber security threats, significant expansion of e-commerce and online platforms channels, and the implementation of AI security solutions to enrich decision-making processes and address risks within the evolving digital environment.

Open Source Intelligence Market Analysis:

Major Market Drivers: The rising number of cyber threats, a range of technological breakthroughs, including artificial intelligence and big data analytics which increase the capabilities of OSINT platforms, and tough regulatory compliance demands, especially in industries like banking and healthcare, prompt businesses to use OSINT tools to bolster data security.

Key Market Trends: The key trends in the market include the incorporation of AI, machine learning, and natural language processing technologies into OSINT solutions to help companies analyze data and obtain relevant insights better. The growing focus on dark web monitoring due to the surge of cybercriminal activities will spawn OSINT solutions for monitoring underground forums.

Geographical Trends: The North America currently leads the market primarily owing to the highly developed technological infrastructure that already exists, robust economic development, and substantial investments in research and development. Besides, the market in Europe is driven by data protection due to GDPR, which created the demand for the OSINT tool in terms of data compliance and data security.

Competitive Landscape: Some of the major market players in the open source intelligence industry include Cellebrite (Sun Corporation), Dassault Systemes, Expert.AI, Hensoldt AG, Hyland Software Inc., IPS S.p.A., Maltego Technologies GmbH, OffSec Services Limited, Palantir Technologies Inc., Recorded Future Inc., Thales Group, among many others.

Challenges and Opportunities: The challenge is filtering vast amounts of information that is relevant and reliable. For OSINT suppliers, striking the right balance between data privacy considerations and the desire for broad data collection may be challenging. Opportunities include increasing interest in OSINT solutions for innovation, threats like dark web monitoring, threat intelligence, and proactive cybersecurity. The enforcement may be a significant opportunity for OSINT providers to offer compliance-focused solutions and increase their overall market penetration.

Open Source Intelligence Market Trends:

Increasing Cyber Threats

Cyber threats are growing due to the advancements in technology and rising digital interconnectivity. Hackers, state-backed agents, and cybercriminals continue to adapt their strategies to exploit weaknesses in networks, systems, and applications. For instance, in May 2023, Meta, Facebook's parent company, was fined €1.2 billion and ordered to stop the transfer of user data from the European Union (EU) to the United States (US). This fine was levied by Ireland's Data Protection Commission (DPC), which is in charge of Meta's activity across the European Union (EU) and happens to be a record punishment for transgressing the EU's General Data Protection Regulation (GDPR) in 2023. Therefore, the incorporation of open-source Intelligence helps collect and evaluate information that is in the public domain and retrieved from diverse online sources such as forums, news outlets, and social media, which contributes to the open source intelligence market growth.

Expansion of E-commerce and Online Retail

The exponential growth of e-commerce and online retail has completely revolutionized the way we shop and transact as customers and retail businesses. Although e-commerce makes it easy for customers to shop from the comfort of their homes, digital transactions have increased significantly. The global e-commerce market size increased to $USD 21.1 trillion in 2023. The market is expected to increase further to $USD 183.8 trillion by 2032, according to IMARC GROUP, and the market compound annual growth rate from 2024 to 2032 is projected at 27.16%. Moreover, the increasing volumes and complexity of transactions have compelled players in the retail industry to adopt artificial intelligence-based AI security solutions to protect their digital assets. These solutions use AI algorithms to learn from and identify unusual patterns, identify fraud, and prevent unauthorized access in real-time, thus contributing to the open source intelligence market revenue.

Implementation of AI in Security Solutions

Artificial Intelligence implementation into security solutions is a real game-changer in how organizations perceive and react to cyber threats. Nowadays, traditional measures, including firewalls and antivirus software, prove to be insufficient against the intricate web of tactics used by cyber adversaries. As per the cloud security alliance, 63% of security professionals believe in the potential of AI to boost security measures, especially improved threat detection and response procedures. These systems use machine learning algorithms that are continuously fed with data, allowing them to learn from it, adjust to the threats on the horizon, and react in real-time autonomously to various types of incidents. Consequently, various industries are investing in innovative technologies and approaches aimed at securing digital assets and preserving the integrity of critical infrastructures, which is positively increasing open source intelligence market demand.

Open Source Intelligence Market Segmentation:

IMARC Group provides an analysis of the key trends in each segment of the market, along with forecasts at the global, regional, and country levels for 2024-2032. Our report has categorized the market based on source type, technique, and end user.

Breakup by Source Type:

Media

Internet

Public and Government Data

Professional and Academic Publications

Commercial

Others

Media accounts for the majority of the market share

The report has provided a detailed breakup and analysis of the market based on the source type. This includes media, internet, public and government data, professional and academic publications, commercial, and others. According to the report, the media represented the largest segment.

The media sector includes television, radio, newspapers, magazines, and digitally hosted news channels. The extensive given channels provide invaluable information on public discourse, popular trends, and social dynamics. Researchers rely on virtually limitless channels as sources of real-time consumer statistics, market dynamics, and public reaction. The availability of platforms that differ from massive and particular channels enables a general understanding of the market condition. Besides this, the media sector is easy to access, updated every minute, and generally covers all the happenings in the world hence the most reliable of all sources.

Breakup by Technique:

Text Analytics

Video Analytics

Social Media Analytics

Geospatial Analytics

Security Analytics

Others

Security analytics holds the largest share of the industry

A detailed breakup and analysis of the market based on the technique have also been provided in the report. This includes text analytics, video analytics, social media analytics, geospatial analytics, security analytics, and others. According to the report, security analytics accounted for the largest market share.

Security analytics is the largest market due to the need to protect digital assets and information that broadens our connected world. It is responsible for collecting, analyzing, and interpreting security data to identify potential threats, vulnerabilities, and breaches. It is a combination of machine learning, statistical analysis, and pattern recognition used to provide real-time monitoring, threat detection, and incident response. Besides this, the rising demand for security analytics responds to the growing complexity of cyber threats and IT environments. For instance, in November 2023, Brightside AI, a Software as a Service platform focused on supporting teams in their fight against genAI-powered social-engineering cyberattacks, is proud to announce the successful completion of a $1M deal with Social Links, a tech investor solely focused on creating OSINT infrastructure. The latter is represented by an OSINT platform that unites more than 500 open sources of information and drastically accelerates an organization's work with other people's data, done in the open data framework. As part of the deal, Brightside will gain extended access to the Social Links platform for the next five years to optimize the artificial intelligence powered LLM models based on human data search engines for effective use of real-world examples.

Breakup by End User:

Government Intelligence Agencies

Military and Defense Intelligence Agencies

Cyber Security Organizations

Law Enforcement Agencies

Private Specialized Business

Financial Services

Others

Cyber security organizations represent the leading market segment

The report has provided a detailed breakup and analysis of the market based on the end user. This includes government intelligence agencies, military and defense intelligence agencies, cyber security organizations, law enforcement agencies, private specialized business, financial services, and others. According to the report, cyber security organizations represented the largest segment.

Cyber security organizations are protecting digital infrastructure, networks, and data from online threats and attacks. It is highly visible due to the increase in the number and multiplicity of cyber threats, necessitating greater security protections and constant vigilance. Moreover, cyber security organizations attempt to detect exposures, prevent violations, and mitigate exposure using various technologies and approaches, including threat intelligence, security analytics, and intrusion detection systems. Besides this, in November 2021, NICE Actimize, a NICE business, unveiled its IFM-X Dark Web Intelligence solution, which delivers broad coverage of the Dark and Deep Web, malware networks, private messaging platforms, and clandestine fraudster infrastructure and communities, aiding FSOs in combating the widespread challenges of identifying active fraud and account takeover (ATO) threats. As the amount of data positioned on the Dark Web continues to surge, financial service organizations (FSOs) simultaneously experience more complex fraud that is harder to detect and prevent. Currently, cyber security is a top issue for all aspects of the economy due to the increasing use of digital technology, which is driving the open-source intelligence market growth.

Breakup by Region:

North America

United States

Canada

Asia-Pacific

China

Japan

India

South Korea

Australia

Indonesia

Others

Europe

Germany

France

United Kingdom

Italy

Spain

Russia

Others

Latin America

Brazil

Mexico

Others

Middle East and Africa

North America leads the market, accounting for the largest open source intelligence market share

The report has also provided a comprehensive analysis of all the major regional markets, which include North America (the United States and Canada); Europe (Germany, France, the United Kingdom, Italy, Spain, Russia, and others); Asia Pacific (China, Japan, India, South Korea, Australia, Indonesia, and others); Latin America (Brazil, Mexico, and others); and the Middle East and Africa. According to the report, North America represents the largest regional market for open-source intelligence.

North America, is known for its very advanced technological ecosystem, strong economic growth pace, and a deep commitment to innovation. It covers mainly the United States and Canada and is a leader across a broad spectrum of industries, including technology, finance, healthcare, and consumer goods. North America's economy is characterized by the high buying power of consumers and the quick assimilation of new technologies, which makes it a very attractive market for digital services, advanced analytics, and cybersecurity. For instance, on February 15, 2024, Leidos, a FORTUNE 500 science and technology leader with a significant footprint, is pleased to announce the firm was awarded a new task order contract by the United States Defense Intelligence Agency's (DIA) Science & Technology (S&T) Directorate. Leidos will design and implement a Tasking, Collection, Processing, Exploitation, and Dissemination (TCPED) system for the DIA's Open Source Intelligence Integration Center (OSIC) based on this agreement. Thus, the shifting expectations of diverse, wealthy, and very digitally-savvy clients offer steady growth and a lot of opportunities to companies of various industries, which is positively influencing the open source intelligence market outlook.

Competitive Landscape:

The open source intelligence market research report has also provided a comprehensive analysis of the competitive landscape in the market. Detailed profiles of all major companies have also been provided. Some of the major market players in the open-source intelligence industry include Cellebrite (Sun Corporation), Dassault Systemes, Expert.AI, Hensoldt AG, Hyland Software Inc., IPS S.p.A., Maltego Technologies GmbH, OffSec Services Limited, Palantir Technologies Inc., Recorded Future Inc., and Thales Group.

(Kindly note that this only represents a partial list of companies, and the complete list has been provided in the report.)

Leading players are extensively working on innovation and expansion in the domain to meet the growing advanced analytics and data extraction needs from publicly available sources. They utilize cutting-edge technologies such as artificial intelligence, machine learning, and natural language processing to analyze data from multiple sources, including social media, websites, publicly accessible government records, and professional publications. For instance, in February 2024, ShadowDragon won the 2024 Best Practices Award for Entrepreneurial Company of the Year awarded by Frost & Sullivan in the Global OSINT industry. The firm believes that building trust is an essential aspect of the OSINT cyber threat intelligence sector, as the firm states that trust is a factor in the OSINT sector as it offers an effective and robust relationship with its customers. These efforts positively impact the open-source intelligence market forecast.

Open Source Intelligence Market News:

March 24 2022: N.J., NICE Actimize, a NICE company, announced that its IFM-X Dark Web Intelligence and New Account Fraud solutions secured the Fraud Prevention Innovation Award of FinTech Breakthrough, an independent organization that recognizes the best companies, technologies, and products in the global financial technology market. It is powered by NICE Actimize's IFM-X enterprise fraud management platform, which is well-known for its cutting-edge detection capabilities powered by Artificial Intelligence (AI) and Machine Learning.

March 4, 2024: HOOVER, ShadowDragon, the pioneering distributor of open-source intelligence (OSINT) that is ethically sourced, unusual datasets, and APIs, is pleased to announce that it has added Collaboraite and Vesitgo Consulting, two Investigo Group entities. Collaboraite helps overcome intensive human-centered data and artificial intelligence (AI) challenges aimed at aiding them in fostering secure digital shifts by producing purchased items and apps.

Key Questions Answered in This Report

  • 1. How big is the global open source intelligence market?
  • 2. What is the expected growth rate of the global open source intelligence market during 2024-2032?
  • 3. What are the key factors driving the global open source intelligence market?
  • 4. What has been the impact of COVID-19 on the global open source intelligence market?
  • 5. What is the breakup of the global open source intelligence market based on the source type?
  • 6. What is the breakup of the global open source intelligence market based on the technique?
  • 7. What is the breakup of the global open source intelligence market based on the end user?
  • 8. What are the key regions in the global open source intelligence market?
  • 9. Who are the key players/companies in the global open source intelligence market?

Table of Contents

1 Preface

2 Scope and Methodology

  • 2.1 Objectives of the Study
  • 2.2 Stakeholders
  • 2.3 Data Sources
    • 2.3.1 Primary Sources
    • 2.3.2 Secondary Sources
  • 2.4 Market Estimation
    • 2.4.1 Bottom-Up Approach
    • 2.4.2 Top-Down Approach
  • 2.5 Forecasting Methodology

3 Executive Summary

4 Introduction

  • 4.1 Overview
  • 4.2 Key Industry Trends

5 Global Open Source Intelligence Market

  • 5.1 Market Overview
  • 5.2 Market Performance
  • 5.3 Impact of COVID-19
  • 5.4 Market Forecast

6 Market Breakup by Source Type

  • 6.1 Media
    • 6.1.1 Market Trends
    • 6.1.2 Market Forecast
  • 6.2 Internet
    • 6.2.1 Market Trends
    • 6.2.2 Market Forecast
  • 6.3 Public and Government Data
    • 6.3.1 Market Trends
    • 6.3.2 Market Forecast
  • 6.4 Professional and Academic Publications
    • 6.4.1 Market Trends
    • 6.4.2 Market Forecast
  • 6.5 Commercial
    • 6.5.1 Market Trends
    • 6.5.2 Market Forecast
  • 6.6 Others
    • 6.6.1 Market Trends
    • 6.6.2 Market Forecast

7 Market Breakup by Technique

  • 7.1 Text Analytics
    • 7.1.1 Market Trends
    • 7.1.2 Market Forecast
  • 7.2 Video Analytics
    • 7.2.1 Market Trends
    • 7.2.2 Market Forecast
  • 7.3 Social Media Analytics
    • 7.3.1 Market Trends
    • 7.3.2 Market Forecast
  • 7.4 Geospatial Analytics
    • 7.4.1 Market Trends
    • 7.4.2 Market Forecast
  • 7.5 Security Analytics
    • 7.5.1 Market Trends
    • 7.5.2 Market Forecast
  • 7.6 Others
    • 7.6.1 Market Trends
    • 7.6.2 Market Forecast

8 Market Breakup by End User

  • 8.1 Government Intelligence Agencies
    • 8.1.1 Market Trends
    • 8.1.2 Market Forecast
  • 8.2 Military and Defense Intelligence Agencies
    • 8.2.1 Market Trends
    • 8.2.2 Market Forecast
  • 8.3 Cyber Security Organizations
    • 8.3.1 Market Trends
    • 8.3.2 Market Forecast
  • 8.4 Law Enforcement Agencies
    • 8.4.1 Market Trends
    • 8.4.2 Market Forecast
  • 8.5 Private Specialized Business
    • 8.5.1 Market Trends
    • 8.5.2 Market Forecast
  • 8.6 Financial Services
    • 8.6.1 Market Trends
    • 8.6.2 Market Forecast
  • 8.7 Others
    • 8.7.1 Market Trends
    • 8.7.2 Market Forecast

9 Market Breakup by Region

  • 9.1 North America
    • 9.1.1 United States
      • 9.1.1.1 Market Trends
      • 9.1.1.2 Market Forecast
    • 9.1.2 Canada
      • 9.1.2.1 Market Trends
      • 9.1.2.2 Market Forecast
  • 9.2 Asia-Pacific
    • 9.2.1 China
      • 9.2.1.1 Market Trends
      • 9.2.1.2 Market Forecast
    • 9.2.2 Japan
      • 9.2.2.1 Market Trends
      • 9.2.2.2 Market Forecast
    • 9.2.3 India
      • 9.2.3.1 Market Trends
      • 9.2.3.2 Market Forecast
    • 9.2.4 South Korea
      • 9.2.4.1 Market Trends
      • 9.2.4.2 Market Forecast
    • 9.2.5 Australia
      • 9.2.5.1 Market Trends
      • 9.2.5.2 Market Forecast
    • 9.2.6 Indonesia
      • 9.2.6.1 Market Trends
      • 9.2.6.2 Market Forecast
    • 9.2.7 Others
      • 9.2.7.1 Market Trends
      • 9.2.7.2 Market Forecast
  • 9.3 Europe
    • 9.3.1 Germany
      • 9.3.1.1 Market Trends
      • 9.3.1.2 Market Forecast
    • 9.3.2 France
      • 9.3.2.1 Market Trends
      • 9.3.2.2 Market Forecast
    • 9.3.3 United Kingdom
      • 9.3.3.1 Market Trends
      • 9.3.3.2 Market Forecast
    • 9.3.4 Italy
      • 9.3.4.1 Market Trends
      • 9.3.4.2 Market Forecast
    • 9.3.5 Spain
      • 9.3.5.1 Market Trends
      • 9.3.5.2 Market Forecast
    • 9.3.6 Russia
      • 9.3.6.1 Market Trends
      • 9.3.6.2 Market Forecast
    • 9.3.7 Others
      • 9.3.7.1 Market Trends
      • 9.3.7.2 Market Forecast
  • 9.4 Latin America
    • 9.4.1 Brazil
      • 9.4.1.1 Market Trends
      • 9.4.1.2 Market Forecast
    • 9.4.2 Mexico
      • 9.4.2.1 Market Trends
      • 9.4.2.2 Market Forecast
    • 9.4.3 Others
      • 9.4.3.1 Market Trends
      • 9.4.3.2 Market Forecast
  • 9.5 Middle East and Africa
    • 9.5.1 Market Trends
    • 9.5.2 Market Breakup by Country
    • 9.5.3 Market Forecast

10 SWOT Analysis

  • 10.1 Overview
  • 10.2 Strengths
  • 10.3 Weaknesses
  • 10.4 Opportunities
  • 10.5 Threats

11 Value Chain Analysis

12 Porters Five Forces Analysis

  • 12.1 Overview
  • 12.2 Bargaining Power of Buyers
  • 12.3 Bargaining Power of Suppliers
  • 12.4 Degree of Competition
  • 12.5 Threat of New Entrants
  • 12.6 Threat of Substitutes

13 Price Analysis

14 Competitive Landscape

  • 14.1 Market Structure
  • 14.2 Key Players
  • 14.3 Profiles of Key Players
    • 14.3.1 Cellebrite (Sun Corporation)
      • 14.3.1.1 Company Overview
      • 14.3.1.2 Product Portfolio
    • 14.3.2 Dassault Systemes
      • 14.3.2.1 Company Overview
      • 14.3.2.2 Product Portfolio
      • 14.3.2.3 Financials
      • 14.3.2.4 SWOT Analysis
    • 14.3.3 Expert.AI
      • 14.3.3.1 Company Overview
      • 14.3.3.2 Product Portfolio
      • 14.3.3.3 Financials
    • 14.3.4 Hensoldt AG
      • 14.3.4.1 Company Overview
      • 14.3.4.2 Product Portfolio
      • 14.3.4.3 Financials
    • 14.3.5 Hyland Software Inc.
      • 14.3.5.1 Company Overview
      • 14.3.5.2 Product Portfolio
    • 14.3.6 IPS S.p.A.
      • 14.3.6.1 Company Overview
      • 14.3.6.2 Product Portfolio
    • 14.3.7 Maltego Technologies GmbH
      • 14.3.7.1 Company Overview
      • 14.3.7.2 Product Portfolio
    • 14.3.8 OffSec Services Limited
      • 14.3.8.1 Company Overview
      • 14.3.8.2 Product Portfolio
    • 14.3.9 Palantir Technologies Inc.
      • 14.3.9.1 Company Overview
      • 14.3.9.2 Product Portfolio
      • 14.3.9.3 Financials
    • 14.3.10 Recorded Future Inc.
      • 14.3.10.1 Company Overview
      • 14.3.10.2 Product Portfolio
    • 14.3.11 Thales Group
      • 14.3.11.1 Company Overview
      • 14.3.11.2 Product Portfolio
      • 14.3.11.3 Financials
      • 14.3.11.4 SWOT Analysis
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦