시장보고서
상품코드
2032414

엔드포인트 감지 및 대응(EDR) 시장 보고서 : 컴포넌트별, 솔루션 유형별, 도입 형태별, 조직 규모별, 최종 이용 산업별 및 지역별(2026-2034년)

Endpoint Detection and Response Market Report by Component, Solution Type, Deployment Mode, Organization Size, End Use Industry, and Region 2026-2034

발행일: | 리서치사: 구분자 IMARC | 페이지 정보: 영문 146 Pages | 배송안내 : 2-3일 (영업일 기준)

    
    
    




가격
PDF & Excel (Single User License) help
PDF & Excel 보고서를 1명만 이용할 수 있는 라이선스입니다. 인쇄 불가능하며, 텍스트 등의 Copy&Paste도 불가능합니다.
US $ 3,999 금액 안내 화살표 ₩ 6,080,000
PDF & Excel (5 User License) help
PDF & Excel 보고서를 동일 기업의 5명까지 이용할 수 있는 라이선스입니다. 텍스트 등의 Copy&Paste가 불가능합니다. 인쇄는 5부까지 가능하며, 인쇄물의 이용 범위는 PDF 이용 범위와 동일합니다.
US $ 4,999 금액 안내 화살표 ₩ 7,601,000
PDF & Excel (Corporate License) help
PDF & Excel 보고서를 동일 기업의 모든 분이 이용할 수 있는 라이선스입니다. 텍스트 등의 Copy&Paste가 가능합니다. 인쇄 가능하며, 인쇄물의 이용 범위는 PDF 이용 범위와 동일합니다.
US $ 5,999 금액 안내 화살표 ₩ 9,122,000
카드담기
※ 부가세 별도
한글목차
영문목차
※ 본 상품은 영문 자료로 한글과 영문 목차에 불일치하는 내용이 있을 경우 영문을 우선합니다. 정확한 검토를 위해 영문 목차를 참고해주시기 바랍니다.

세계의 엔드포인트 감지 및 대응(EDR) 시장 규모는 2025년에 43억 달러에 이르렀습니다. 향후, 이 시장은 2034년까지 174억 달러에 이를 것으로 예측되며, 2026-2034년 CAGR 16.22%로 성장할 전망입니다. 지능형 악성코드, 랜섬웨어, 제로데이 공격 등 사이버 위협의 고도화, 재택근무(WFH) 모델의 확산, 엔드포인트 보호 플랫폼(EPP)의 통합이 시장을 주도하는 주요 요인으로 꼽힙니다.

엔드포인트 감지 및 대응(EDR)은 엔드포인트에 대한 종합적인 보안 솔루션으로, 무단 액세스와 사용자 데이터 침해로부터 보호하기 위해 설계되었습니다. 여기에는 네트워크 액세스 제어, 위협 방지, 데이터 유출 방지, 데이터 분류 등 다양한 기능이 포함되어 있습니다. EDR은 엔드포인트의 데이터 활동을 수집, 분석, 모니터링하여 잠재적인 위협을 식별하는 데 매우 중요한 역할을 합니다. 이를 통해 조직은 보다 신속하게 대응하고, 공격의 연쇄를 파악할 수 있으며, 지능형 악성코드 및 인증정보 도용에 대한 시스템 방어를 강화할 수 있습니다.

현재 사고 데이터 검색 및 조사를 용이하게 하고 데이터 스토리지 시스템에 대한 높은 수준의 지원을 제공하는 EDR에 대한 수요가 증가하면서 시장 성장을 견인하고 있습니다. 이 외에도 위협 사냥, 데이터 탐색 및 의심스러운 활동 감지를 위한 EDR의 도입 확대도 시장 성장에 기여하고 있습니다. 또한, 위협 감지 능력 향상, 대량의 엔드포인트 데이터 분석, 비정상적인 행동 패턴 감지를 위한 인공지능(AI)과 머신러닝(ML)의 도입 확대는 시장 전망을 밝게 하고 있습니다. 이와 더불어, 확장성, 유연성 및 중앙 집중식 관리를 제공하여 조직이 다양한 위치와 환경에 걸쳐 엔드포인트를 보호할 수 있도록 지원하는 클라우드 기반 EDR 솔루션의 인기가 높아지면서 시장 성장에 기여하고 있습니다. 또한, 종합적인 엔드포인트 보안을 제공하기 위한 엔드포인트 보호 플랫폼(EPP)의 통합이 진행되면서 시장 성장에 힘을 실어주고 있습니다.

엔드포인트 감지 및 대응(EDR) 시장 동향/촉진요인:

사이버 위협의 고도화

고도화된 악성코드, 랜섬웨어, 제로데이 공격 등 끊임없이 진화하는 사이버 위협 상황은 시장의 주요 촉진요인으로 작용하고 있습니다. 조직은 기존 보안 대책의 한계를 인식하고, 지능형 위협을 감지하고 대응하기 위해 첨단 엔드포인트 보안 솔루션을 찾고 있습니다. 또한, 사이버 범죄자들은 공격 자동화, 새로운 취약점 발견, 감지 회피 등을 위해 AI와 ML 기술을 점점 더 많이 활용하고 있습니다. 이러한 기술을 통해 그들은 보다 정교하고 표적화된 공격을 할 수 있게 되었습니다. 사물인터넷(IoT)의 확산으로 연결된 기기의 수가 증가함에 따라 악용될 수 있는 취약점 발생원이 더욱 증가하고 있습니다. 또한, 클라우드 서비스는 다양한 이점을 가져다주는 반면, 적절하게 관리 및 보호되지 않으면 잠재적인 보안 위험을 초래할 수 있습니다.

재택근무(WFH) 모델 보급 확대

현재 직원들이 일과 삶의 균형을 적절히 유지할 수 있도록 지원하는 재택근무(WFH) 모델의 도입이 증가하고 있습니다. 여기에 초고속 인터넷, 화상회의 도구, 보안 가상사설망(VPN), 클라우드 기반 생산성 향상 도구 등 견고하고 안전하고 신뢰할 수 있는 기술을 이용할 수 있게 된 것도 원격 근무를 가능하게 하고 있습니다. 또한, 직원들의 재택근무를 통해 기업은 사무실 공간, 유틸리티 및 기타 간접비 관련 비용을 절감할 수 있습니다. 또한, 많은 기업들은 원격 근무를 통해 생산성이 향상되고 있다는 사실을 깨닫고 있습니다. 이는 직원들이 재택근무를 할 때, 기존 사무실 환경에 비해 방해나 방해받을 기회가 적기 때문입니다. 또한, 출퇴근 시간이 없어져 그 시간을 생산적인 업무에 사용할 수 있습니다. 원격근무 모델은 유연성을 제공하고 업무 효율성을 높여주지만, 사이버 보안 침해의 발생을 증가시키고 있습니다. 사이버 보안 침해 및 해킹 활동으로 인해 다양한 기밀정보가 도난당할 수 있는데, EDR 솔루션의 도입으로 이를 방지할 수 있습니다.

엔드포인트 보안에 대한 인식 제고

엔드포인트 보안에 대한 인식이 높아진 것은 IoT 기기의 확산, 클라우드 서비스로의 대규모 전환, 원격 및 모바일 업무 환경의 광범위한 도입과 같은 기술적 진보에 기인합니다. 또한, 원격 근무의 도입으로 많은 직원들이 개인 기기나 자택 네트워크에서 회사 리소스에 접근할 수 있게 되면서 사이버 보안 침해가 증가하고 있습니다. 이와 더불어, 정보 유출, 랜섬웨어 공격 등 사이버 공격의 빈도, 고도화, 영향력이 꾸준히 증가함에 따라 조직은 EDR 솔루션에 대한 투자를 고려하고 있습니다. 또한, 규제 압력 증가와 데이터 유출로 인한 잠재적인 금전적, 평판상의 손실로 인해 기업들은 엔드포인트 보안에 대한 경각심을 높이고 있습니다.

목차

제1장 서문

제2장 조사 범위와 조사 방법

제3장 주요 요약

제4장 서론

제5장 세계의 엔드포인트 감지 및 대응(EDR) 시장

제6장 시장 분석 : 컴포넌트별

제7장 시장 분석 : 솔루션 유형별

제8장 시장 분석 : 도입 모드별

제9장 시장 분석 : 조직 규모별

제10장 시장 분석 : 최종 사용 산업별

제11장 시장 분석 : 지역별

제12장 SWOT 분석

제13장 밸류체인 분석

제14장 Porter's Five Forces 분석

제15장 가격 분석

제16장 경쟁 구도

JHS 26.05.18

The global endpoint detection and response market size reached USD 4.3 Billion in 2025. Looking forward, the market is expected to reach USD 17.4 Billion by 2034, exhibiting a growth rate (CAGR) of 16.22% during 2026-2034. The growing sophistication of cyber threats including advanced malware, ransomware, and zero-day attacks, rising adoption of work-from-home (WFH) models, and increasing integration of endpoint protection platforms (EPPs) are some of the major factors propelling the market.

Endpoint detection and response (EDR) is a comprehensive security solution for endpoints designed to safeguard against unauthorized access and compromise of user data. It encompasses a range of features, including network access control, threat protection, data loss prevention, and data classification. It plays a crucial role in collecting, analyzing, and monitoring endpoint data activities to identify potential threats. It helps organizations respond more swiftly and comprehend the attack chain, thus fortifying the system against sophisticated malware and credential theft.

At present, the increasing demand for EDR, as it facilitates incident data search and investigation and offers advanced support for data storage systems, is impelling the growth of the market. Besides this, the rising adoption of EDR in threat hunting, data exploration, and the detection of suspicious activities are contributing to the growth of the market. In addition, the growing adoption of artificial intelligence (AI) and machine learning (ML) to enhance threat detection capabilities, analyze large volumes of endpoint data, and detect anomalous behavior patterns is offering a favorable market outlook. Apart from this, the increasing popularity of cloud based EDR solution, as it offers scalability, flexibility, and centralized management, allowing organizations to protect their endpoints across different locations and environments, is supporting the growth of the market. Additionally, the rising integration of endpoint protection platforms (EPPs) to provide comprehensive endpoint security is bolstering the growth of the market.

Endpoint Detection and Response Market Trends/Drivers:

Rising sophistication of cyber threats

The continually evolving landscape of cyber threats, including advanced malware, ransomware, and zero-day attacks, is a major driver for the market. Organizations are increasingly realizing the limitations of traditional security measures and seeking advanced endpoint security solutions to detect and respond to sophisticated threats. Moreover, AI and ML technologies are increasingly being used by cybercriminals to automate their attacks, discover new vulnerabilities, and evade detection. These technologies allow them to launch more sophisticated and targeted attacks. The Internet of Things (IoT) is leading to an increase in connected devices, creating more potential points of vulnerability that can be exploited. Additionally, cloud services, while providing various benefits, also present potential security risks if not properly managed and secured.

Increasing adoption of work-from-home (WFH) models

At present, there is an increase in the adoption of work-from-home (WFH) models as they help employees maintain a proper work-life balance. Besides this, the availability of robust, secure, and reliable technology, including high-speed internet, video conferencing tools, secure virtual private networks (VPNs), and cloud-based productivity tools, is also enabling remote work. In addition, companies can save on expenses associated with office space, utilities, and other overhead costs when employees work from home. Many companies are also finding that remote work is increasing productivity, as employees often face fewer distractions and interruptions at home than in a traditional office environment. It also eliminates commute time, which can be used for productive work. Even though remote working models are providing flexibility and boosting efficiency in work, it is also increasing the occurrence of cybersecurity breaches. Cyber security breaches, along with hacking activities, can often steal various confidential information, which can be restricted by the implementation of EDR solutions.

Increasing awareness about endpoint security

The growing awareness about endpoint security is attributed to technological advancements, such as the proliferation of IoT devices, mass transition to cloud services, and the widespread adoption of remote and mobile work environments. Additionally, the adoption of remote working is enabling numerous employees to access company resources from personal devices and home networks, which is contributing to the rise in cyber security breaches. Besides this, the steady increase in the frequency, sophistication, and impact of cyberattacks, with high-profile breaches and ransomware attacks, is compelling organizations to invest in EDR solutions. Furthermore, the growing regulatory pressures and potential financial and reputational losses associated with data breaches are making businesses more conscious of endpoint security.

Endpoint Detection and Response Industry Segmentation:

This report provides an analysis of the key trends in each segment of the global endpoint detection and response market report, along with forecasts at the global, regional, and country levels from 2026-2034. The report categorizes the market based on component, solution type, deployment mode, organization size, and end use industry.

Breakup by Component:

  • Solutions
  • Services

Solutions dominate the market

EDR solutions are advanced security tools designed to help organizations identify, investigate, and respond to suspicious activities on the endpoints in their networks. They operate by continuously monitoring and collecting data from endpoints. This data may include system behaviors, changes to system files, and communications traffic. EDR solutions can provide detailed, contextual information about the threat, such as the endpoints or users involved, the processes initiated by the threat, and the network connections made. They can also provide detailed, contextual information about the threat, such as the endpoints or users involved, the processes initiated by the threat, and the network connections made.

Breakup by Solution Type:

  • Workstations
  • Mobile Devices
  • Servers
  • Point of Sale Terminals

Workstations hold the largest share of the market

Endpoint detection and response (EDR) solutions play a crucial role in securing workstations, which are an essential component of the network of an organization. Workstations, including desktops and laptops, are often the primary tools used by employees to access and manage sensitive data, making them a prime target for cybercriminals. EDR solutions work by constantly monitoring these endpoints, collecting behavioral data to detect anomalies that could indicate a cyber threat. Through machine learning (ML) and advanced analytics, EDR systems can identify both known and unknown threats, including advanced persistent threats (APTs) that traditional antivirus solutions might miss. They respond quickly to neutralize threats by isolating the affected workstation, terminating malicious processes, or restoring the system to a safe state.

Breakup by Deployment Mode:

  • On-premises
  • Cloud-based

On-premises hold the biggest share of the market

On-premises endpoint detection and response (EDR) solutions are systems that are installed and run on devices within the physical location of an organization, including servers, desktops, and laptops. These systems operate by continuously collecting and analyzing data from endpoints within the network to detect potential threats and respond accordingly. They offer a granular level of control over data and security operations, which is particularly beneficial for organizations with specific regulatory compliance requirements or those dealing with highly sensitive data. They help organizations to maintain direct control over their data and avoid the need to transmit sensitive information to third-party cloud servers. Moreover, the detailed insights provided by on-premises EDR about security incidents, including their origin, the vulnerabilities exploited, and the subsequent actions taken by the threat actor, enable organizations to improve their security posture over time.

Breakup by Organization Size:

  • Large Enterprises
  • Small and Medium-sized Enterprises

Large enterprises hold the maximum share in the market

Large enterprises require endpoint detection and response (EDR) solutions for managing and securing various endpoints. EDR solutions offer centralized visibility and control over diverse endpoints, enabling security teams to monitor, detect, and respond to threats effectively. They provide advanced threat detection capabilities, leveraging techniques, such as behavior analysis, machine learning (ML), and threat intelligence. These capabilities enable the identification of unknown and emerging threats, reducing the risk of successful breaches. They also assist in meeting compliance requirements by providing continuous monitoring, incident response capabilities, and detailed reporting. Furthermore, they ensure that organizations can demonstrate adherence to security standards and maintain regulatory compliance.

Breakup by End Use Industry:

  • BFSI
  • IT and Telecom
  • Manufacturing
  • Healthcare
  • Retail
  • Others

BFSI holds the largest share in the market

The banking, financial services, and insurance (BFSI) sector is a lucrative target for hackers due to the high value of financial assets, sensitive customer data, and the potential for significant financial gain. In response to the increasing cyber threat landscape, BFSI organizations are increasingly relying on endpoint detection and response (EDR) solutions for handling a vast amount of sensitive customer information, including financial records, personal identification details, and transaction data. EDR solutions provide real-time monitoring and threat detection on endpoints, ensuring that customer data is safeguarded against unauthorized access, data breaches, and malicious activities. They help to detect and respond to advanced malware and phishing attacks targeting BFSI organizations by identifying and neutralizing threats before they can compromise critical systems. Furthermore, EDR solutions play a crucial role in preventing financial fraud, unauthorized transactions, and account takeovers.

Breakup by Region:

  • North America
  • United States
  • Canada
  • Asia-Pacific
  • China
  • Japan
  • India
  • South Korea
  • Australia
  • Indonesia
  • Others
  • Europe
  • Germany
  • France
  • United Kingdom
  • Italy
  • Spain
  • Russia
  • Others
  • Latin America
  • Brazil
  • Mexico
  • Others
  • Middle East and Africa

North America exhibits a clear dominance, accounting for the largest endpoint detection and response market share

The report has also provided a comprehensive analysis of all the major regional markets, which include North America (the United States and Canada); Asia Pacific (China, Japan, India, South Korea, Australia, Indonesia, and others); Europe (Germany, France, the United Kingdom, Italy, Spain, Russia, and others); Latin America (Brazil, Mexico, and others); and the Middle East and Africa. According to the report, North America accounted for the largest market share.

North America held the biggest market share due to the rising digitization of business operations to improve efficiency, boost productivity, and reduce the occurrence of manual errors.

Another contributing aspect is the growing focus on integrating robust cybersecurity solutions in the BFSI sector. In addition, the increasing implementation of stringent policies to protect data from hackers is contributing to the growth of the market.

Asia Pacific is estimated to expand further in this domain due to the rising awareness about the importance of adopting comprehensive cybersecurity solutions. Apart from this, the increasing emergence of e-commerce brands selling products online is propelling the growth of the market.

Competitive Landscape:

Key market players in the endpoint detection and response (EDR) market are investing in research and development (R&D) operations to develop innovative and advanced EDR solutions. They are also focusing on enhancing threat detection capabilities, improving response times, and leveraging emerging technologies, such as AI and ML. Top companies are strategic partnerships with other cybersecurity companies, technology providers, or industry associations to expand their customer reach, enhance product offerings, and integrate complementary technologies. They are also expanding their presence globally to tap into emerging markets and cater to the growing demand for EDR solutions. Leading players are working to improve the user experience by making their solutions more user-friendly, intuitive, and easy to deploy.

The report has provided a comprehensive analysis of the competitive landscape in the market. Detailed profiles of all major companies have also been provided. Some of the key players in the market include:

  • Broadcom Inc.
  • Cisco Systems Inc.
  • CrowdStrike Inc.
  • Cybereason
  • Fortra LLC
  • Microsoft Corporation
  • OpenText Corporation
  • Palo Alto Networks Inc
  • RSA Security LLC
  • SentinelOne
  • Sophos Ltd.
  • Trend Micro Incorporated

Notable Developments:

In September 2022, Broadcom Inc. announced the launch of the Trident 4C Ethernet switch ASIC, which is a security switch capable of analyzing all traffic at a line rate.

In October 2022, Cybereason and MEC networks declared a partnership to provide the Cybereason Defense Platform to various VARs and MSSPs across the Philippines to address the increasingly sophisticated cyber threats.

In November 2022, Help Systems LLC changed its name to Fortra LLC for making a strategic shift towards providing global customers with a single line of cyber defense. It also focused on enhancing commitment to assist customers in simplifying the complexity of cybersecurity in a business environment increasingly under siege.

Key Questions Answered in This Report

1. How big is the endpoint detection and response market?

2. What is the future outlook of endpoint detection and response market?

3. What are the key factors driving the endpoint detection and response market?

4. Which region accounts for the largest endpoint detection and response market share?

5. Which are the leading companies in the global endpoint detection and response market?

Table of Contents

1 Preface

2 Scope and Methodology

  • 2.1 Objectives of the Study
  • 2.2 Stakeholders
  • 2.3 Data Sources
    • 2.3.1 Primary Sources
    • 2.3.2 Secondary Sources
  • 2.4 Market Estimation
    • 2.4.1 Bottom-Up Approach
    • 2.4.2 Top-Down Approach
  • 2.5 Forecasting Methodology

3 Executive Summary

4 Introduction

  • 4.1 Overview
  • 4.2 Key Industry Trends

5 Global Endpoint Detection and Response Market

  • 5.1 Market Overview
  • 5.2 Market Performance
  • 5.3 Impact of COVID-19
  • 5.4 Market Forecast

6 Market Breakup by Component

  • 6.1 Solutions
    • 6.1.1 Market Trends
    • 6.1.2 Market Forecast
  • 6.2 Services
    • 6.2.1 Market Trends
    • 6.2.2 Market Forecast

7 Market Breakup by Solution Type

  • 7.1 Workstations
    • 7.1.1 Market Trends
    • 7.1.2 Market Forecast
  • 7.2 Mobile Devices
    • 7.2.1 Market Trends
    • 7.2.2 Market Forecast
  • 7.3 Servers
    • 7.3.1 Market Trends
    • 7.3.2 Market Forecast
  • 7.4 Point of Sale Terminals
    • 7.4.1 Market Trends
    • 7.4.2 Market Forecast

8 Market Breakup by Deployment Mode

  • 8.1 On-premises
    • 8.1.1 Market Trends
    • 8.1.2 Market Forecast
  • 8.2 Cloud-based
    • 8.2.1 Market Trends
    • 8.2.2 Market Forecast

9 Market Breakup by Organization Size

  • 9.1 Large Enterprises
    • 9.1.1 Market Trends
    • 9.1.2 Market Forecast
  • 9.2 Small and Medium-sized Enterprises
    • 9.2.1 Market Trends
    • 9.2.2 Market Forecast

10 Market Breakup by End Use Industry

  • 10.1 BFSI
    • 10.1.1 Market Trends
    • 10.1.2 Market Forecast
  • 10.2 IT and Telecom
    • 10.2.1 Market Trends
    • 10.2.2 Market Forecast
  • 10.3 Manufacturing
    • 10.3.1 Market Trends
    • 10.3.2 Market Forecast
  • 10.4 Healthcare
    • 10.4.1 Market Trends
    • 10.4.2 Market Forecast
  • 10.5 Retail
    • 10.5.1 Market Trends
    • 10.5.2 Market Forecast
  • 10.6 Others
    • 10.6.1 Market Trends
    • 10.6.2 Market Forecast

11 Market Breakup by Region

  • 11.1 North America
    • 11.1.1 United States
      • 11.1.1.1 Market Trends
      • 11.1.1.2 Market Forecast
    • 11.1.2 Canada
      • 11.1.2.1 Market Trends
      • 11.1.2.2 Market Forecast
  • 11.2 Asia-Pacific
    • 11.2.1 China
      • 11.2.1.1 Market Trends
      • 11.2.1.2 Market Forecast
    • 11.2.2 Japan
      • 11.2.2.1 Market Trends
      • 11.2.2.2 Market Forecast
    • 11.2.3 India
      • 11.2.3.1 Market Trends
      • 11.2.3.2 Market Forecast
    • 11.2.4 South Korea
      • 11.2.4.1 Market Trends
      • 11.2.4.2 Market Forecast
    • 11.2.5 Australia
      • 11.2.5.1 Market Trends
      • 11.2.5.2 Market Forecast
    • 11.2.6 Indonesia
      • 11.2.6.1 Market Trends
      • 11.2.6.2 Market Forecast
    • 11.2.7 Others
      • 11.2.7.1 Market Trends
      • 11.2.7.2 Market Forecast
  • 11.3 Europe
    • 11.3.1 Germany
      • 11.3.1.1 Market Trends
      • 11.3.1.2 Market Forecast
    • 11.3.2 France
      • 11.3.2.1 Market Trends
      • 11.3.2.2 Market Forecast
    • 11.3.3 United Kingdom
      • 11.3.3.1 Market Trends
      • 11.3.3.2 Market Forecast
    • 11.3.4 Italy
      • 11.3.4.1 Market Trends
      • 11.3.4.2 Market Forecast
    • 11.3.5 Spain
      • 11.3.5.1 Market Trends
      • 11.3.5.2 Market Forecast
    • 11.3.6 Russia
      • 11.3.6.1 Market Trends
      • 11.3.6.2 Market Forecast
    • 11.3.7 Others
      • 11.3.7.1 Market Trends
      • 11.3.7.2 Market Forecast
  • 11.4 Latin America
    • 11.4.1 Brazil
      • 11.4.1.1 Market Trends
      • 11.4.1.2 Market Forecast
    • 11.4.2 Mexico
      • 11.4.2.1 Market Trends
      • 11.4.2.2 Market Forecast
    • 11.4.3 Others
      • 11.4.3.1 Market Trends
      • 11.4.3.2 Market Forecast
  • 11.5 Middle East and Africa
    • 11.5.1 Market Trends
    • 11.5.2 Market Breakup by Country
    • 11.5.3 Market Forecast

12 SWOT Analysis

  • 12.1 Overview
  • 12.2 Strengths
  • 12.3 Weaknesses
  • 12.4 Opportunities
  • 12.5 Threats

13 Value Chain Analysis

14 Porters Five Forces Analysis

  • 14.1 Overview
  • 14.2 Bargaining Power of Buyers
  • 14.3 Bargaining Power of Suppliers
  • 14.4 Degree of Competition
  • 14.5 Threat of New Entrants
  • 14.6 Threat of Substitutes

15 Price Analysis

16 Competitive Landscape

  • 16.1 Market Structure
  • 16.2 Key Players
  • 16.3 Profiles of Key Players
    • 16.3.1 Broadcom Inc.
      • 16.3.1.1 Company Overview
      • 16.3.1.2 Product Portfolio
      • 16.3.1.3 Financials
      • 16.3.1.4 SWOT Analysis
    • 16.3.2 Cisco Systems Inc.
      • 16.3.2.1 Company Overview
      • 16.3.2.2 Product Portfolio
      • 16.3.2.3 Financials
      • 16.3.2.4 SWOT Analysis
    • 16.3.3 CrowdStrike Inc.
      • 16.3.3.1 Company Overview
      • 16.3.3.2 Product Portfolio
      • 16.3.3.3 Financials
      • 16.3.3.4 SWOT Analysis
    • 16.3.4 Cybereason
      • 16.3.4.1 Company Overview
      • 16.3.4.2 Product Portfolio
    • 16.3.5 Fortra LLC
      • 16.3.5.1 Company Overview
      • 16.3.5.2 Product Portfolio
    • 16.3.6 Microsoft Corporation
      • 16.3.6.1 Company Overview
      • 16.3.6.2 Product Portfolio
      • 16.3.6.3 Financials
      • 16.3.6.4 SWOT Analysis
    • 16.3.7 OpenText Corporation
      • 16.3.7.1 Company Overview
      • 16.3.7.2 Product Portfolio
      • 16.3.7.3 Financials
      • 16.3.7.4 SWOT Analysis
    • 16.3.8 Palo Alto Networks Inc.
      • 16.3.8.1 Company Overview
      • 16.3.8.2 Product Portfolio
      • 16.3.8.3 Financials
      • 16.3.8.4 SWOT Analysis
    • 16.3.9 RSA Security LLC
      • 16.3.9.1 Company Overview
      • 16.3.9.2 Product Portfolio
    • 16.3.10 SentinelOne
      • 16.3.10.1 Company Overview
      • 16.3.10.2 Product Portfolio
      • 16.3.10.3 Financials
    • 16.3.11 Sophos Ltd.
      • 16.3.11.1 Company Overview
      • 16.3.11.2 Product Portfolio
    • 16.3.12 Trend Micro Incorporated
      • 16.3.12.1 Company Overview
      • 16.3.12.2 Product Portfolio
      • 16.3.12.3 Financials
      • 16.3.12.4 SWOT Analysis
샘플 요청 목록
0 건의 상품을 선택 중
목록 보기
전체삭제
문의
원하시는 정보를
찾아 드릴까요?
문의주시면 필요한 정보를
신속하게 찾아드릴게요.
02-2025-2992
kr-info@giikorea.co.kr
문의하기