½ÃÀ庸°í¼­
»óÇ°ÄÚµå
1445602

¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è(SDP) : ¼¼°è ½ÃÀå Á¡À¯À² ºÐ¼®, »ê¾÷ µ¿Çâ ¹× Åë°è, ¼ºÀå ¿¹Ãø(2024-2029³â)

Global Software-Defined Perimeter - Market Share Analysis, Industry Trends & Statistics, Growth Forecasts (2024 - 2029)

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: Mordor Intelligence | ÆäÀÌÁö Á¤º¸: ¿µ¹® | ¹è¼Û¾È³» : 2-3ÀÏ (¿µ¾÷ÀÏ ±âÁØ)

    
    
    




¡á º¸°í¼­¿¡ µû¶ó ÃֽŠÁ¤º¸·Î ¾÷µ¥ÀÌÆ®ÇÏ¿© º¸³»µå¸³´Ï´Ù. ¹è¼ÛÀÏÁ¤Àº ¹®ÀÇÇØ Áֽñ⠹ٶø´Ï´Ù.

¼¼°è ¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è(SDP) ½ÃÀå ±Ô¸ð´Â 2024³â 90¾ï 6,000¸¸ ´Þ·¯·Î ÃßÁ¤µÇ¸ç, ¿¹Ãø ±â°£(2024-2029³â) µ¿¾È 27.39%ÀÇ CAGR·Î ¼ºÀåÇÏ¿© 2029³â¿¡´Â 304¾ï ´Þ·¯¿¡ ´ÞÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù.

¼¼°è ¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è - ½ÃÀå

ÁÖ¿ä ÇÏÀ̶óÀÌÆ®

  • Ŭ¶ó¿ìµå ¼­ºñ½º´Â µðÁöÅÐ Çõ½ÅÀÇ ÁÖ¿ä ¿øµ¿·ÂÀÌ¸ç ´Ù¾çÇÑ »ê¾÷¿¡¼­ ±¤¹üÀ§ÇÏ°Ô Ã¤Åõǰí ÀÖ½À´Ï´Ù. ÀÌ´Â ºñÁî´Ï½º¿¡ ´Ù¾çÇÑ º¸¾È ¹®Á¦¸¦ ¾ß±âÇÏ°í ÀÖÀ¸¸ç, ÀÌ´Â ¿¹Ãø ±â°£ µ¿¾È ¼¼°è ¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è ½ÃÀåÀÇ ¼ºÀåÀ» ÃËÁøÇÏ´Â °áÁ¤ÀûÀÎ ÀÌÀ¯ÀÔ´Ï´Ù.
  • ´ëºÎºÐÀÇ ±â¾÷ÀÌ µðÁöÅÐ ºñÁî´Ï½º Çõ½ÅÀ» Áö¿øÇϱâ À§ÇØ ÇÏÀ̺긮µå IT µµÀÔÀÇ ´Ù¾çÇÑ ´Ü°è¿¡ Àֱ⠶§¹®¿¡ Á¶Á÷Àº Çѵ¿¾È °¡»ó»ç¼³¸Á(VPN)°ú ¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è ±â¼ú¿¡ ÀÇÁ¸ÇÏ°Ô µÉ °ÍÀÔ´Ï´Ù. ¸¹Àº Á¶Á÷Àº ºñÁî´Ï½º ¿ä±¸, ºÎ¼­ ¶Ç´Â Áö¿ª¿¡ µû¶ó SDP¸¦ ±¸ÇöÇÏ¿© ÀÏ·ÃÀÇ »ç¿ëÀÚ¿Í ¾ÖÇø®ÄÉÀ̼ÇÀ» Áö¿øÇϱâ·Î °áÁ¤Çß½À´Ï´Ù. ÀÌ·Î ÀÎÇØ µÎ °³ ÀÌ»óÀÇ °³º° º¸¾È ¾×¼¼½º ½Ã½ºÅÛ °ü¸®°¡ º¹ÀâÇØÁö°í, IT ÅëÇÕÀÇ ÀÌÁ¡°ú °æÁ¦¼ºÀÌ »óÃæµË´Ï´Ù. °á±¹, Á¶Á÷Àº º¸¾È ¾×¼¼½º¿¡ ´ëÇÑ ÅõÀÚ¿Í ³ë·ÂÀ» °è¼ÓÇØ¾ß ÇÕ´Ï´Ù.
  • ±âÁ¸ÀÇ ¿ÂÇÁ·¹¹Ì½º VPNÀº ºñ¿ëÀÌ ¸¹ÀÌ µé°í ¿î¿µ ¹× À¯Áöº¸¼ö°¡ ¾î·Á¿ï ¼ö ÀÖ½À´Ï´Ù. µû¶ó¼­ »õ·Î¿î ¿ø°Ý ±Ù¹« ÀηÂÀ» À¯ÁöÇϰųª ¸¶À̱׷¹À̼ÇÇÏ´Â µ¥ ¾î·Á¿òÀ» °Þ°í ÀÖ´Â ¸¹Àº Á¶Á÷Àº ´Ù¸¥ ³×Æ®¿öÅ© º¸¾È ´ë¾ÈÀ» °í·ÁÇÏ°í ÀÖ½À´Ï´Ù. ¿¹¸¦ µé¾î, VPNÀÇ Áß¿äÇÑ ´ë¾ÈÀ¸·Î ¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è(Software Defined Boundary)¸¦ °í·ÁÇÏ´Â »ç¶÷µéµµ ÀÖ½À´Ï´Ù. ¿¹¸¦ µé¾î, Palo Alto Networks¿Í ZscalerÀÇ ¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è ¼­ºñ½º´Â ¾î´À Á¤µµÀÇ ÀçÁ¤Àû, ¿î¿µÀû ÅõÀÚ¸¦ ÀüÁ¦·Î ±¤¹üÀ§ÇÑ ±Ô¸ðÀÇ ¿ø°Ý ¾×¼¼½º¸¦ °£¼ÒÈ­ÇÒ ¼ö ÀÖ½À´Ï´Ù.
  • Ŭ¶ó¿ìµå ¼­ºñ½º´Â ºü¸¥ È®À强°ú ÀÚ¿ø È°¿ëÀÇ À¯¿¬¼ºÀ» ÅëÇØ ºñÁî´Ï½º¸¦ °¡¼ÓÈ­ÇÒ ¼ö ÀÖ´Â Áß¿äÇÑ ±âȸ¸¦ Á¦°øÇÕ´Ï´Ù. ¶ÇÇÑ, Ŭ¶ó¿ìµå ÄÄÇ»ÆÃÀº ÇÕ¸®ÀûÀÎ ºñ¿ëÀ¸·Î ¿øÈ°ÇÑ È®ÀåÀÌ °¡´ÉÇϱ⠶§¹®¿¡ ¿î¿µ ºñ¿ëÀ» Àý°¨ÇÏ°í ´ë±Ô¸ð ¾÷±×·¹À̵忡 ´ëÇÑ ÀçÁ¤Àû ÁöÃâÀ» ¾ïÁ¦ÇÒ ¼ö ÀÖ½À´Ï´Ù.
  • ¶ÇÇÑ, Á¡Á¡ ´õ ¸¹Àº ±â¾÷µéÀÌ Á÷¿øµéÀÌ ¾îµð¼­³ª ´Ù¾çÇÑ µð¹ÙÀ̽º¸¦ »ç¿ëÇÏ¿© ÀÏÇÒ ¼ö ÀÖµµ·Ï Áö¿øÇÏ´Â ¿£ÅÍÇÁ¶óÀÌÁî ¸ðºô¸®Æ¼ ¼Ö·ç¼ÇÀ» µµÀÔÇÏ°í ÀÖ½À´Ï´Ù. À̸¦ ÅëÇØ ¿ö¶ó¹ëÀ» ½ÇÇöÇÏ°í, Á÷¿ø°ú ¼ÒºñÀÚ °£ÀÇ ±³·ù¿Í ¾÷¹« »ý»ê¼ºÀ» 34% Çâ»ó½ÃÄ×½À´Ï´Ù. Á÷¿øÀÇ ¾à 67%°¡ BYOD(Bring Your Own Device) Á¤Ã¥À» µµÀÔÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. ÀÌ´Â ¸ð¹ÙÀÏ ¹× ¿ø°Ý ÀåÄ¡¿¡ ´ëÇÑ ³×Æ®¿öÅ© º¸¾ÈÀÇ Çʿ伺À» ´õ¿í °­Á¶ÇÕ´Ï´Ù. º¸°í¼­¿¡ µû¸£¸é, 2023³â±îÁö IT Á¶Á÷ÀÇ 30%°¡ BYOD Á¤Ã¥À» È®´ëÇÏ¿© Á÷Àå¿¡¼­ Á÷¿øÀÇ ¿þ¾î·¯ºíÀ» Áö¿øÇÒ °èȹÀ̸ç, ÀÌ´Â ½ÃÀåÀ» ´õ¿í ÃËÁøÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù.
  • ±×·¯³ª ¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è ¼Ö·ç¼ÇÀÇ Áß¿äÇÑ ÀÌÁ¡¿¡ ´ëÇÑ ÀÎ½Ä ºÎÁ·°ú ¹«·á ¿ÀǼҽº º¸¾È Ç¥ÁØ¿¡ ´ëÇÑ ¼ö¿ä Áõ°¡´Â ½ÃÀå ¼ºÀåÀ» ÀúÇØÇÒ ¼ö ÀÖ½À´Ï´Ù.
  • ¸¹Àº Á¶Á÷ÀÌ 'ÇØ¾ß ÇÒ ÀÏ' ¸ñ·Ï¿¡ 'Á¦·Î Æ®·¯½ºÆ® µµÀÔ'À» Æ÷ÇÔ½ÃÄ×Áö¸¸, COVID-19ÀÇ ÆÒµ¥¹ÍÀ¸·Î ÀÎÇØ Á¦·Î Æ®·¯½ºÆ® µµÀÔÀÌ °¡¼ÓÈ­µÇ°í ÀÖ½À´Ï´Ù. ¶ÇÇÑ, Ŭ¶ó¿ìµåÀÇ ºÎ»óÀ¸·Î ¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ ±¤¿ª ³×Æ®¿öÅ©(SD-WAN)ÀÇ »ç¿ëÀÌ Áõ°¡Çϸ鼭 ÀͽºÇ÷ÎÀÕ°ú ÇǽÌÀ» ŽÁöÇÏ°í Â÷´ÜÇÏ´Â ¹æ¹ýÀ» Æ÷ÇÔÇÑ ¹Ì·¡ ÁöÇâÀûÀÎ º¸¾È ¸ðµ¨¿¡ ´ëÇÑ »õ·Î¿î Æ®·»µå¿¡ ´ëÇÑ ¼ö¿ä°¡ Áõ°¡ÇÏ°í ÀÖ½À´Ï´Ù. ·£¼¶¿þ¾î ¹× ±âŸ ÃֽŠ¾Ç¼ºÄÚµå.

¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è ½ÃÀå µ¿Çâ

BFSI ºÎ¹®Àº Å« ÆøÀÇ ¼ºÀå¼¼¸¦ ±â·ÏÇÒ °Í

  • ¸ðµç ºÐ¾ß¿¡¼­ µðÁöÅÐÈ­°¡ ±¤¹üÀ§ÇÏ°Ô µµÀԵǸ鼭 ±ÝÀ¶ ºÐ¾ß¿¡µµ ¿µÇâÀ» ¹ÌÄ¡°í ÀÖ½À´Ï´Ù. ´ëºÎºÐÀÇ ÀºÇàÀº µ¥ÀÌÅÍ, ÇÁ·Î¼¼½º, ÀÎÇÁ¶ó¸¦ ÇÏÀ̺긮µå Ŭ¶ó¿ìµå·Î ÀüȯÇÏ¿© ¿ÂÇÁ·¹¹Ì½º ¹× ¿ÀÇÁÇÁ·¹¹Ì½º Ŭ¶ó¿ìµå ±¸ÇöÀÇ ÀÌÁ¡À» ¸ðµÎ È°¿ëÇÏ°í ÀÖ½À´Ï´Ù.
  • ÀüÀÚ ±â±âÀÇ ±Þ¼ÓÇÑ µµÀÔ°ú ÀÎÅͳÝÀÇ ³ôÀº º¸±ÞÀ¸·Î µðÁöÅÐ ¼­ºñ½ºÀÇ ¼ºÀåÀÌ ÃËÁøµÇ¾î °áÁ¦ ¿ëÀ̼º, ¿¬Áß¹«ÈÞ °¡µ¿ ½Ã°£, ¾ÈÀüÇÑ ÀúÀå ¹× »óÈ£ ¿î¿ë¼º¿¡ ´ëÇÑ °í°´ÀÇ ±â´ëÄ¡°¡ ³ô¾ÆÁ³½À´Ï´Ù. ÀÌ·Î ÀÎÇØ °í°´°úÀÇ ¸ÖƼä³Î °ü°è¸¦ À¯ÁöÇϸ鼭 ºñ¿ëÀ» Å©°Ô Àý°¨ÇÒ ¼ö ÀÖ´Â ±âȸ°¡ »ý°å½À´Ï´Ù. ¶ÇÇÑ, Ŭ¶ó¿ìµå ÄÄÇ»ÆÃÀº ½ÅÁ¦Ç° °³¹ß Áֱ⸦ ´ÜÃà½ÃÄÑ °í°´ÀÇ ¿ä±¸¿¡ º¸´Ù ºü¸£°í È¿À²ÀûÀ¸·Î ´ëÀÀÇÒ ¼ö ÀÖµµ·Ï Áö¿øÇÕ´Ï´Ù.
  • ¶ÇÇÑ, ±ÝÀ¶ ºÐ¾ß¿¡ ƯȭµÈ ¿©·¯ ±â¼ú ½ºÅ¸Æ®¾÷ÀÌ µîÀåÇÏ¿© ¿ì¸®ÀÇ ±¸¸Å ¹æ½Ä¿¡ È¥¶õÀ» ÀÏÀ¸Å°°í ÀÖ½À´Ï´Ù. ¿¹¸¦ µé¾î, Àεµ¿¡¼­´Â ¾Û ±â¹Ý Áö°©°ú Aadhaar/UPI¿¡ ¿¬°áµÈ ÀνºÅÏÆ® Æ®·£Àè¼Ç¿¡¼­ ´ÜÀÏ Ã¢±¸ E-Commerce ¾Û¿¡ À̸£±â±îÁö ÇÉÅ×Å© ½ºÅ¸Æ®¾÷Àº À§ÇùÀ» ¿°µÎ¿¡ µÎ°í ¾Û¿¡ ´ëÇÑ °­·ÂÇÑ µ¥ÀÌÅÍ º¸¾È ÇÁ·¹ÀÓ¿öÅ©¿¡ ÅõÀÚÇØ¾ß ÇÕ´Ï´Ù. ÅõÀÚÇØ¾ß ÇÕ´Ï´Ù. ÀÌ·¯ÇÑ °æ¿ì, ÀºÇà, ±ÝÀ¶ ¼­ºñ½º ¹× º¸Çè(BFSI) »ê¾÷ÀÇ »çÀ̹ö À§ÇùÀ» Á¦¾îÇÒ ¼ö ÀÖ´Â ¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è ¼Ö·ç¼ÇÀÌ ÇÊ¿äÇÕ´Ï´Ù.
  • ¸¹Àº ±ÝÀ¶±â°üÀÌ Á¤ºÎ ±â°ü°ú Çù·ÂÇÏ¿© »çÀ̹ö º¸¾È¿¡ ´ëÇÑ ÀνÄÀ» ³ôÀÌ°í ±â¹Ð µ¥ÀÌÅ͸¦ º¸È£ÇÏ°í ÀÖ½À´Ï´Ù. ¿¹¸¦ µé¾î, 2022³â 2¿ù Çʸ®ÇÉ ¹ý¹«ºÎ(DoJ)¿Í Çʸ®ÇÉ ÀºÇàÇùȸ(BAP)´Â Çʸ®ÇÉÀÇ »çÀ̹ö º¸¾È¿¡ ´ëÇÑ ÀνÄÀ» ³ôÀÌ°í »çÀ̹ö ¹üÁË¿Í ½Î¿ì±â À§ÇÑ ¾çÇØ°¢¼­(MoU)¸¦ ü°áÇß½À´Ï´Ù. ¶ÇÇÑ, ±ÝÀ¶±â°üµéÀÇ ÀνÄÀÌ ³ô¾ÆÁü¿¡ µû¶ó ¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è ¼Ö·ç¼ÇÀÇ µµÀÔÀÌ ÃËÁøµÉ °ÍÀÔ´Ï´Ù.

ºÏ¹Ì ½ÃÀå Á¡À¯À²ÀÌ Å« ½ÃÀå Á¡À¯À²À» Â÷Áö

  • ÇコÄÉ¾î »ê¾÷Àº »õ·Î¿î µµ±¸¿Í ±â¼ú·Î ÀÇ·á ¼­ºñ½º Á¦°øÀ» À籸¼ºÇÏ¿© ´õ ³ªÀº ȯÀÚ Ä¡·á¿Í È¿À²¼ºÀ» °³¼±Çϱâ À§ÇØ ÀÇ·á ¼­ºñ½º Á¦°øÀ» À籸¼ºÇÏ´Â º¯È­¸¦ °æÇèÇÏ°í ÀÖ½À´Ï´Ù. ¸ð¹ÙÀÏ °Ç°­ ¾ÖÇø®ÄÉÀ̼ǰú ¿þ¾î·¯ºí ±â¼úÀº ȯÀÚÀÇ È°µ¿À» ¸ð´ÏÅ͸µÇÏ´Â ½Ç¿ëÀûÀÎ °Ç°­ µµ±¸·Î È°¿ëµÇ°í ÀÖ½À´Ï´Ù. ¿¹¸¦ µé¾î, ½º¸¶Æ®ÆùÀº ¹«Áõ»ó ½É¹æ¼¼µ¿À» °¨ÁöÇϱâ À§ÇØ µ¥ÀÌÅ͸¦ Àü¼ÛÇÏ´Â ½ÉÀüµµ Àü±ØÀÌ ÀåÂøµÈ ¾î´ðÅÍ·Î »ç¿ëµË´Ï´Ù.
  • Groupe Speciale Mobile Association(GSMA)¿¡ µû¸£¸é, ºÏ¹Ì Áö¿ªÀÇ »ç¹°ÀÎÅͳÝ(IoT) ¿¬°á ¼ö´Â 2025³â±îÁö 2018³â 23¾ï °³¿¡¼­ 5.9¾ï °³·Î Áõ°¡ÇÒ °ÍÀ¸·Î ¿¹»óµÇ¸ç, IoT ±â±â¿¡ ´ëÇÑ ¼ö¿ä´Â Áõ°¡ Ãß¼¼¿¡ ÀÖ½À´Ï´Ù. Áß°ß ¹× ´ë±â¾÷À» Áß½ÉÀ¸·Î ¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è(SDP)¸¦ äÅÃÇÑ °í±Þ ³×Æ®¿öÅ© º¸¾È ¼Ö·ç¼Ç¿¡ ´ëÇÑ ¼ö¿ä°¡ Áõ°¡ÇÏ°í ÀÖ½À´Ï´Ù.
  • 2022³â 4¿ù, ¹Ì±¹ Á¤ºÎ´Â »çÀ̹ö º¸¾È ¹®Á¦¸¦ ÇØ°áÇϱâ À§ÇØ ¹Ì±¹ Àü¿ªÀÇ »çÀ̹ö º¸¾ÈÀ» °­È­Çϱâ À§ÇØ »çÀ̹ö°ø°£µðÁöÅÐÁ¤Ã¥±¹(CDP)À» Ãâ¹ü½ÃÄ×½À´Ï´Ù. ¶ÇÇÑ Á¤ºÎ´Â ±¹°¡ ¾Èº¸ ¹®Á¦, °æÁ¦Àû ±âȸ, »çÀ̹ö °ø°£, µðÁöÅÐ ±â¼ú, µðÁöÅÐ Á¤Ã¥°ú °ü·ÃµÈ ¹Ì±¹ÀÇ °¡Ä¡°ü¿¡ ¹ÌÄ¡´Â ¿µÇâ¿¡ ´ëÇؼ­µµ ´Ù·ê °ÍÀ¸·Î º¸ÀÔ´Ï´Ù. ¶ÇÇÑ CDP±¹¿¡´Â ±¹Á¦ »çÀ̹ö °ø°£ º¸¾È, ±¹Á¦ Á¤º¸Åë½Å Á¤Ã¥, µðÁöÅÐ ÀÚÀ¯ÀÇ ¼¼ °¡Áö Á¤Ã¥ ºÎ¼­°¡ Æ÷ÇԵǾî ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ Á¤ºÎÀÇ ³ë·ÂÀº ¿¹Ãø ±â°£ µ¿¾È ½ÃÀå ¼ºÀåÀ» ´õ¿í ÃËÁøÇÒ °ÍÀ¸·Î º¸ÀÔ´Ï´Ù.
  • ¶ÇÇÑ, ¼Ò¸Å¾÷°èÀÇ ÁÖ¿ä ±â¾÷µéÀº ¿ÂÇÁ·¹¹Ì½º ¹× ¿ÀÇÁÇÁ·¹¹Ì½º Ŭ¶ó¿ìµå ±¸ÇöÀÇ ÀÌÁ¡À» È°¿ëÇÏ°í, ¿ì¼öÇÑ ¼îÇÎ °æÇèÀ» Á¦°øÇϱâ À§ÇØ ÀÚ»ç µ¥ÀÌÅͼ¾ÅÍ ¹× ±âŸ ÆÛºí¸¯ Ŭ¶ó¿ìµå¿¡ ´Ù¾çÇÑ ¾ÖÇø®ÄÉÀ̼ÇÀ» °®Ãá ÇÏÀ̺긮µå Ŭ¶ó¿ìµå ¼Ö·ç¼ÇÀ» äÅÃÇÏ°í ÀÖ½À´Ï´Ù. ¿¹¸¦ µé¾î, ¾Æ¸¶Á¸°í ¸ÅÀåÀº ÄÄÇ»ÅÍ ºñÀü, µö·¯´×, ¼¾¼­ À¶ÇÕ ±â¼úÀ» °áÇÕÇÏ¿© °áÁ¦ ¹× üũ¾Æ¿ô ÇÁ·Î¼¼½º¸¦ ÀÚµ¿È­ÇÏ¿© °í°´ÀÌ ÁÙÀ» ¼­Áö ¾Ê°íµµ ¸ÅÀå¿¡ Á÷Á¢ µé¾î°¡¼­ »óÇ°À» ¹Þ°í ³ª°¥ ¼ö ÀÖµµ·Ï ÇÏ°í ÀÖ½À´Ï´Ù. ¹Ý¸é, °áÁ¦´Â Amazon Go ¾ÛÀ» ÅëÇØ ÀÚµ¿À¸·Î ÀÌ·ç¾îÁý´Ï´Ù. µû¶ó¼­ ¼Ò¸Å ºÎ¹®Àº µðÁöÅÐÈ­·Î ÀüȯÇÏ°í ÀÖÀ¸¸ç, ÇâÈÄ ³×Æ®¿öÅ© º¸¾ÈÀÌ ÇÊ¿äÇϸç, ¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è ½ÃÀåÀ¸·Î À¯¸ÁÇÑ ±æÀ» ¿­¾îÁÙ °ÍÀÔ´Ï´Ù.
  • ÃÖ±Ù COVID-19ÀÇ Àü ¼¼°èÀûÀÎ È®»êÀ¸·Î ÀÎÇØ ºÐ»ê ÀÎÇÁ¶óÀÇ API ¹× ±âŸ ¼­ºñ½º »ç¿ëÀÌ Áõ°¡ÇÔ¿¡ µû¶ó ´Ü±âÀûÀ¸·Î º¸¾È ¼ÒÇÁÆ®¿þ¾î¿¡ ´ëÇÑ ¼ö¿ä°¡ Áõ°¡Çß½À´Ï´Ù. ±×·¯³ª µðÁöÅÐ ÀÎÇÁ¶ó¸¦ µµÀÔÇÏ´Â ±â¾÷ÀÇ ¼ö°¡ Áõ°¡ÇÒ °ÍÀ¸·Î ¿¹»óµÊ¿¡ µû¶ó ÇâÈÄ ¸î ³â µ¿¾È ¼ö¿ä°¡ Å©°Ô Áõ°¡ÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù.

¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è »ê¾÷ °³¿ä

¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è ½ÃÀåÀº Àû´çÈ÷ ÁýÁߵǾî ÀÖÀ¸¸ç, Perimeter 81, ZScaler, Cisco Systems, Inc, Okta Inc, APPGate, Check Point¿Í °°Àº ÁÖ¿ä ¾÷üµéÀÌ ÁÖµµÇÏ°í ÀÖ½À´Ï´Ù. ½ÃÀå Á¡À¯À²ÀÌ ³ôÀº À̵é ÁÖ¿ä ±â¾÷µéÀº ÇØ¿Ü °í°´ ±â¹Ý °³Ã´¿¡ ÁÖ·ÂÇÏ°í ÀÖ½À´Ï´Ù. ¶ÇÇÑ, ÀÌµé ±â¾÷Àº Àü·«Àû Á¦ÈÞ¿Í ÆÄÆ®³Ê½ÊÀ» ÅëÇØ ½ÃÀå Á¡À¯À²À» È®´ëÇÏ°í ¼öÀͼºÀ» ³ôÀÌ°í ÀÖ½À´Ï´Ù. ±×·¯³ª Áß°ß-Áß¼Ò±â¾÷µéÀº ±â¼ú ¹ßÀüÀ» È°¿ëÇÑ Á¦Ç° Çõ½ÅÀ» ÅëÇØ »õ·Î¿î ½ÃÀåÀ» °³Ã´ÇÏ°í »õ·Î¿î °è¾àÀ» ü°áÇÔÀ¸·Î½á ½ÃÀå¿¡¼­ÀÇ ÀÔÁö¸¦ °­È­ÇÏ°í ÀÖ½À´Ï´Ù.

Áö³­ 6¿ù, Á¸½¼ÄÜÆ®·ÑÁî´Â Ä¿³ØƼµå ºôµù¿¡ Á¦·Î Æ®·¯½ºÆ® »çÀ̹ö º¸¾ÈÀ» µµÀÔÇϱâ À§ÇØ ÅÛÆÛµå ³×Æ®¿÷½º(Tempered Networks)¸¦ ÀμöÇÑ´Ù°í ¹ßÇ¥Çß½À´Ï´Ù. ÅÛÆÛµå ³×Æ®¿÷½º´Â ¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è¸¦ »ç¿ëÇÏ¿© ¾ÈÀüÇÑ Åë½ÅÀ» »ý¼ºÇÏ°í °Ç¹° ³×Æ®¿öÅ©ÀÇ ¸¶ÀÌÅ©·Î ¼¼ºÐÈ­¿Í Áß¿äÇÑ µ¥ÀÌÅÍ ¹× ¼­ºñ½º¸¦ °­È­ÇÏ´Â ¼¼ºÎÀûÀÎ ¾×¼¼½º Á¦¾î ¹× ÀÎÁõÀ» °¡´ÉÇÏ°Ô ÇÕ´Ï´Ù. ÅÛÆÛµå ³×Æ®¿÷½º´Â ¿£µåÆ÷ÀÎÆ® µð¹ÙÀ̽º, ¿§Áö °ÔÀÌÆ®¿þÀÌ, Ŭ¶ó¿ìµå Ç÷§Æû, ¼­ºñ½º ±â¼úÀÚ µî ´Ù¾çÇÑ ±×·ì¿¡ °ÉÃÄ ¾ÈÀüÇÑ ³×Æ®¿öÅ© Á¢±ÙÀ» °¡´ÉÇÏ°Ô ÇÏ´Â °Ç¹°¿ë ÷´Ü ÀÚ°¡ ¹æ¾î ½Ã½ºÅÛÀÎ '¿¡¾î¿ù(Airwall)' ±â¼úÀ» °³¹ßÇß½À´Ï´Ù. °³¹ßÇß½À´Ï´Ù.

¶ÇÇÑ, 2022³â 4¿ù Cloud Security Alliance(CSA)´Â SDP ¹× Á¦·Î Æ®·¯½ºÆ® ¿öÅ·±×·ì¿¡¼­ ÀÛ¼ºÇÑ ¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è(SDP) 2.0 »ç¾çÀ» °ø°³Çß½À´Ï´Ù. SDP 2.0 »ç¾çÀº º¸¾È ¹× ±â¼ú Á¶Á÷ÀÌ SDP ±¸ÇöÀÇ ÇÙ½É ±¸¼º¿ä¼Ò¿Í ¿øÄ¢À» ÀÌÇØÇÏ´Â µ¥ µµ¿òÀÌ µË´Ï´Ù. ¶ÇÇÑ, Ŭ¶ó¿ìµå ³×ÀÌƼºê ¾ÆÅ°ÅØó, ¼­ºñ½º ¸Þ½Ã ±¸Çö, Á¦·Î Æ®·¯½ºÆ®ÀÇ ±¤¹üÀ§ÇÑ Ãß±¸¿Í °°Àº ³ë·Â °£ÀÇ ½Ã³ÊÁö È¿°úµµ °­Á¶ÇÏ°í ÀÖ½À´Ï´Ù.

±âŸ ÇýÅÃ

  • ¿¢¼¿ Çü½ÄÀÇ ½ÃÀå ¿¹Ãø(ME) ½ÃÆ®
  • 3°³¿ù°£ ¾Ö³Î¸®½ºÆ® Áö¿ø

¸ñÂ÷

Á¦1Àå ¼­·Ð

  • Á¶»ç °¡Á¤°ú ½ÃÀå Á¤ÀÇ
  • Á¶»ç ¹üÀ§

Á¦2Àå Á¶»ç ¹æ¹ý

Á¦3Àå ÁÖ¿ä ¿ä¾à

Á¦4Àå ½ÃÀå ÀλçÀÌÆ®

  • ½ÃÀå °³¿ä
  • ¹ë·ùüÀÎ/°ø±Þ¸Á ºÐ¼®
  • ¾÷°èÀÇ ¸Å·Â - Porter's Five Forces ºÐ¼®
    • ½Å±Ô Âü¿©¾÷üÀÇ À§Çù
    • ±¸¸ÅÀÚÀÇ ±³¼··Â
    • °ø±Þ ±â¾÷ÀÇ ±³¼··Â
    • ´ëü Á¦Ç°ÀÇ À§Çù
    • °æÀï ±â¾÷°£ °æÀï °­µµ
  • COVID-19°¡ ¾÷°è¿¡ ¹ÌÄ¡´Â ¿µÇâ Æò°¡

Á¦5Àå ½ÃÀå ¿ªÇÐ

  • ½ÃÀå °³¿ä
  • ½ÃÀå ¼ºÀå ÃËÁø¿äÀÎ
    • Ŭ¶ó¿ìµå¿¡ÀÇ Áö¼ÓÀûÀÎ À̵¿, IoT ¹× BYOD µµÀÔ
    • ¾ö°ÝÇÑ µ¥ÀÌÅÍ ÄÄÇöóÀ̾𽺠¿ä°Ç°ú È®Àå°¡´ÉÇÑ µ¥ÀÌÅÍ º¸È£ Àü·«ÀÇ Çʿ伺
  • ½ÃÀå ¼ºÀå ¾ïÁ¦¿äÀÎ
    • ¿ÀÇ ¼Ò½º º¸¾È Ç¥ÁØ¿¡ ´ëÇÑ ¼ö¿ä Áõ°¡

Á¦6Àå ½ÃÀå ¼¼ºÐÈ­

  • À¯Çü
    • ¼Ö·ç¼Ç
    • ¼­ºñ½º
  • Àü°³ ¹æ½Ä
    • Ŭ¶ó¿ìµå
    • ¿ÂÇÁ·¹¹Ì½º
  • ÃÖÁ¾»ç¿ëÀÚ ¾÷Á¾
    • BFSI
    • Åë½Å°ú IT
    • ÇコÄɾî
    • ¼Ò¸Å
    • Á¤ºÎ
    • ±âŸ ÃÖÁ¾»ç¿ëÀÚ ºÐ¾ß
  • Áö¿ª
    • ºÏ¹Ì
    • À¯·´
    • ¾Æ½Ã¾ÆÅÂÆò¾ç
    • ¼¼°è ±âŸ Áö¿ª

Á¦7Àå °æÀï »óȲ

  • ±â¾÷ °³¿ä
    • Perimeter 81
    • ZScaler
    • Cisco Systems, Inc
    • Okta, Inc
    • APPGate
    • Check Point
    • Broadcom(Symantec)
    • Cato Networks Limited
    • Unisys Corporation
    • Fortinent Corporation
    • Palo Alto Networks Inc.
    • Safe-T Group Limited
    • Akamai Technologies, Inc(Soha Systems)
    • Verizon Communications(Vidder)

Á¦8Àå ÅõÀÚ ºÐ¼®

Á¦9Àå ½ÃÀå ±âȸ¿Í ÇâÈÄ µ¿Çâ

ksm 24.03.18

The Global Software-Defined Perimeter Market size is estimated at USD 9.06 billion in 2024, and is expected to reach USD 30.40 billion by 2029, growing at a CAGR of 27.39% during the forecast period (2024-2029).

Global Software-Defined Perimeter - Market

Key Highlights

  • Cloud services are the primary drivers for digital transformation, with ubiquitous adoption in various industries. It has brought different security challenges for the business, which is the crucial reason for promoting the growth of the global software-defined perimeter market during the projected period.
  • As most enterprises are at various stages of their hybrid IT implementation to support their digital business transformation, organizations will likely rely on both virtual private networks (VPN) and software-defined perimeter technology for some time. Many organizations have decided to implement SDP according to a business need, division, or region to support that set of users and applications. This introduces complications in managing two or more separate secure access systems, which contradicts IT consolidation's benefits and economies. Ultimately, organizations should progress their investment and initiatives for highly-secure access.
  • Traditional on-premises VPNs can be expensive and difficult to operate and maintain. Thus, many organizations tasked with maintaining or moving to a new remote workforce are considering other network security alternatives. For example, some weigh software-defined perimeter as a vital VPN alternative. For instance, software-defined perimeter services from Palo Alto Networks and Zscaler can simplify remote access at a broad scale, pending some degree of financial and operational investment.
  • Cloud services provide significant opportunities to accelerate the business through rapid scalability and the flexibility of resource utilization. It also reduces operational costs and controls financial spending on large-scale upgrades as cloud computing facilitates seamless scaling at reasonable costs.
  • In addition, more and more businesses are implementing enterprise mobility solutions that enable and encourage employees to work from anywhere and through a wide range of devices. It has created a work-life balance and increased employee-consumer interaction and operational productivity by 34%. About 67% of the workforce is expected to adopt bring your own devices (BYOD) policy for work; this further emphasizes the need for network security for mobile and remote devices. According to the report, by 2023, 30% of IT organizations will extend their BYOD policy to cater to employees' wearables in the workforce, which will further drive the market.
  • However, a lack of awareness of the critical benefits of software-defined perimeter solutions and the rise in demand for free and open-source security standards can hamper the market's growth.
  • While many organizations put "deploying zero trust" on their "to-do" list, the COVID-19 pandemic sped up zero-trust adoption. Furthermore, with the rise of the cloud, the increasing use of software-defined wide area networks (SD-WANs) has given a new trend demand as it is a future-proof security model that encompasses the ways to detect and block exploits, phishing, ransomware, and other modern malware.

Software-Defined Perimeter Market Trends

BFSI Sector Will Experience Significant Growth

  • Wide-scale adoption of digitalization in every sector has also touched the financial sector. Most banks are migrating their data, process, and infrastructure to hybrid cloud to benefit from both on-premises and off-premise cloud implementation.
  • The rapid adoption of electronic devices and high internet penetration fuelled the growth of digital services and increased the customers' expectations for ease of payment, 24x7 uptime, secure storage, and interoperability. It has created an opportunity to maintain a multi-channel relationship with customers at a much-reduced cost. Cloud computing has also shortened the development cycles for new products and supports a faster and more efficient response to customers' needs.
  • Further, several technology start-ups specializing in the financial segment have emerged, disrupting how we make purchases. For instance, in India, from app-based wallets and Aadhaar/UPI-linked instant transactions to single-window e-commerce apps, fintech start-ups need to be mindful of the threats and invest in robust data security frameworks for the apps. Such instances demand software-defined perimeter solutions to control cyber threats in the banking, financial services, and insurance (BFSI) industry.
  • Many financial institutions collaborate with government organizations to advance cyber security awareness and protect sensitive data. For instance, in February 2022, the Department of Justice (DoJ) and the industry group Bankers Association of the Philippines (BAP) signed a memorandum of understanding (MoU) to raise cybersecurity awareness and combat cybercrime in the Philippines. In addition, the increased awareness among financial organizations would prompt deploying software-defined perimeter solutions.

North America to Hold a Significant Market Share

  • The healthcare industry is experiencing a transformation with new tools and technologies to reconstruct the delivery of health services to improve efficiency with better patient care. Mobile health applications and wearable technologies are leveraged as practical health tools to monitor patients' activities. For instance, smartphones are used as an adapter with electrocardiogram electrodes to transmit data to detect silent atrial fibrillation.
  • According to Groupe Speciale Mobile Association (GSMA), by 2025, the number of Internet of Things (IoT) connections in North America is expected to grow to 5.9 billion from 2.3 billion in 2018. With the rising trend of IoT devices, the demand for high network security solutions is increasing, which caters to adopting the software-defined perimeter (SDP), mostly in medium and large enterprises.
  • In April 2022, the US government launched the Bureau of Cyberspace and Digital Policy (CDP) to enhance cybersecurity across the nation, aiming to address cybersecurity challenges. In addition, the government would address the national security challenges, economic opportunities, and implications for US values associated with cyberspace, digital technologies, and digital policy. Further, the CDP bureau includes three policy units: International Cyberspace Security, International Information and Communications Policy, and Digital Freedom. Such initiatives taken by the government would further boost the market growth over the forecast period.
  • Moreover, major players in the retail sector are embracing hybrid cloud solutions with various applications in their data centers and others in the public cloud to benefit from both on-premise and off-premise cloud implementation and create a great shopping experience. For instance, AmazonGo stores utilize a combination of computer vision, deep learning, and sensor fusion technology to automate the payment and checkout process so that customers can directly enter the store, pick up items and leave without queuing. In contrast, the payment is made automatically through the Amazon Go app. Therefore, the retail sector is shifting to digitalization and requires network security in the future, which paves a promising road for a software-defined perimeter market.
  • The recent outbreak of COVID-19 worldwide resulted in a short-term increase in demand for security software owing to the increased usage of API and other services from distributed infrastructure. However, this is expected to influence a significant growth in demand over the next few years as the number of enterprises adopting digital infrastructure is expected to increase.

Software-Defined Perimeter Industry Overview

The software-defined perimeter market is moderately concentrated and dominated by significant players like Perimeter 81, ZScaler, Cisco Systems, Inc, Okta Inc., APPGate, and Check Point. With a significant market share, these major players focus on developing their customer base across foreign countries. In addition, these companies are leveraging strategic collaborations and partnerships to raise their market share and boost their profitability. However, with product innovations using technological advancements, mid-size to smaller firms are growing their market presence by tapping new markets and securing new contracts.

In June 2022, Johnson Controls announced the acquisition of Tempered Networks to bring zero-trust cybersecurity to connected buildings. Tempered Networks use software-defined perimeters to create secure communications enabling micro-segmentation of building networks and granular access control and authentication that fortifies critical data and services. Tempered Networks has created 'Airwall' technology, an advanced self-defense system for buildings that enables secure network access across diverse groups of endpoint devices, edge gateways, cloud platforms, and service technicians.

Moreover, in April 2022, The Cloud Security Alliance (CSA) published the software-defined perimeter (SDP) 2.0 specification created by their SDP and zero-trust working groups. SDP 2.0 specification helps security and technology organizations understand the core components and tenets of implementing an SDP. It also highlights the synergies among efforts such as cloud-native architectures, service-mesh implementations, and the broader pursuit of zero trust.

Additional Benefits:

  • The market estimate (ME) sheet in Excel format
  • 3 months of analyst support

TABLE OF CONTENTS

1 INTRODUCTION

  • 1.1 Study Assumptions and Market Definition
  • 1.2 Scope of the Study

2 RESEARCH METHODOLOGY

3 EXECUTIVE SUMMARY

4 MARKET INSIGHTS

  • 4.1 Market Overview
  • 4.2 Value Chain / Supply Chain Analysis
  • 4.3 Industry Attractiveness - Porter's Five Forces Analysis
    • 4.3.1 Threat of New Entrants
    • 4.3.2 Bargaining Power of Buyers/Consumers
    • 4.3.3 Bargaining Power of Suppliers
    • 4.3.4 Threat of Substitute Products
    • 4.3.5 Intensity of Competitive Rivalry
  • 4.4 Assessment of Impact of COVID-19 on the Industry

5 MARKET DYNAMICS

  • 5.1 Market Overview
  • 5.2 Market Drivers
    • 5.2.1 Ongoing Migration to The Cloud, Adoption of IoT & BYOD
    • 5.2.2 Stringent Data Compliance Requirements and Need for Scalable Data Safeguarding Strategies
  • 5.3 Market Restraints
    • 5.3.1 Growing Demand for Open-Source Security Standards

6 MARKET SEGMENTATION

  • 6.1 Type
    • 6.1.1 Solutions
    • 6.1.2 Services
  • 6.2 Deployment Mode
    • 6.2.1 Cloud
    • 6.2.2 On-Premise
  • 6.3 End-User Verticals
    • 6.3.1 BFSI
    • 6.3.2 Telecom and IT
    • 6.3.3 Healthcare
    • 6.3.4 Retail
    • 6.3.5 Government
    • 6.3.6 Other End-user Verticals
  • 6.4 Geography
    • 6.4.1 North America
    • 6.4.2 Europe
    • 6.4.3 Asia-Pacific
    • 6.4.4 Rest of the World

7 COMPETITIVE LANDSCAPE

  • 7.1 Company Profiles
    • 7.1.1 Perimeter 81
    • 7.1.2 ZScaler
    • 7.1.3 Cisco Systems, Inc
    • 7.1.4 Okta, Inc
    • 7.1.5 APPGate
    • 7.1.6 Check Point
    • 7.1.7 Broadcom (Symantec)
    • 7.1.8 Cato Networks Limited
    • 7.1.9 Unisys Corporation
    • 7.1.10 Fortinent Corporation
    • 7.1.11 Palo Alto Networks Inc.
    • 7.1.12 Safe-T Group Limited
    • 7.1.13 Akamai Technologies, Inc (Soha Systems)
    • 7.1.14 Verizon Communications (Vidder)

8 INVESTMENT ANALYSIS

9 MARKET OPPORTUNITIES AND FUTURE TRENDS

ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óÇ°À» ¼±Åà Áß
»óÇ° ºñ±³Çϱâ
Àüü»èÁ¦