½ÃÀ庸°í¼­
»óǰÄÚµå
1631576

¼ÒÇÁÆ®¿þ¾î ±¸¼º ºÐ¼® : ½ÃÀå Á¡À¯À² ºÐ¼®, »ê¾÷ µ¿Çâ ¹× Åë°è, ¼ºÀå ¿¹Ãø(2025-2030³â)

Software Composition Analysis - Market Share Analysis, Industry Trends & Statistics, Growth Forecasts (2025 - 2030)

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: Mordor Intelligence | ÆäÀÌÁö Á¤º¸: ¿µ¹® | ¹è¼Û¾È³» : 2-3ÀÏ (¿µ¾÷ÀÏ ±âÁØ)

    
    
    




¡á º¸°í¼­¿¡ µû¶ó ÃֽŠÁ¤º¸·Î ¾÷µ¥ÀÌÆ®ÇÏ¿© º¸³»µå¸³´Ï´Ù. ¹è¼ÛÀÏÁ¤Àº ¹®ÀÇÇØ Áֽñ⠹ٶø´Ï´Ù.

¼ÒÇÁÆ®¿þ¾î ±¸¼º ºÐ¼® ½ÃÀåÀº ¿¹Ãø ±â°£ µ¿¾È 21.7%ÀÇ CAGRÀ» ±â·ÏÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù.

Software Composition Analysis-Market-IMG1

ÁÖ¿ä ÇÏÀ̶óÀÌÆ®

  • ¿ÀÇ ¼Ò½º ÄÚµåÀÇ »ç¿ëÀÌ Áõ°¡ÇÔ¿¡ µû¶ó ¿ÀÇ ¼Ò½º Ãë¾àÁ¡ ¹× À§ÇùÀÇ ¼ö°¡ Áõ°¡Çϰí ÀÖÀ¸¸ç, ¼ÒÇÁÆ®¿þ¾î ±¸¼º ºÐ¼®Àº À§Çè¿¡ ´ëÇÑ ¼º°øÀûÀÎ ´ëÀÀÀ» À§ÇØ ¹Þ¾Æµé¿©Áö°í ÀÖ½À´Ï´Ù. ¿ÀÇ ¼Ò½º ¼ÒÇÁÆ®¿þ¾î(OSS)´Â ÅëÇÕÀÇ ´Ü¼ø¼º, ±¤¹üÀ§ÇÑ ±¸¼º¿ä¼Ò, Á¦·Î ºñ¿ë µîÀÇ ÀåÁ¡°ú OSS ¶óÀ̼±½º ÄÄÇöóÀ̾𽺠¸®½ºÅ©, OSS º¸¾È ¸®½ºÅ©, OSS ǰÁú ¸®½ºÅ© µîÀÇ ´ÜÁ¡À» °¡Áö°í ÀÖ½À´Ï´Ù. SonatypeÀÇ Á¦6Â÷ ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á ÇöȲ Á¶»ç¿¡ µû¸£¸é, ¿ÀÇ ¼Ò½º ±¸¼º¿ä¼ÒÀÇ Ãë¾àÁ¡À» Á÷Á¢ °ø°ÝÇÏ¿© ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸ÁÀ» °¨¿°½ÃŰ´Â Â÷¼¼´ë °ø°ÝÀÌ 430% Áõ°¡Çß´Ù°í ÇÕ´Ï´Ù. 430% Áõ°¡Çß½À´Ï´Ù.
  • Àεµ Áß¾ÓÀºÇà¿¡ µû¸£¸é, Áö³­ÇØ Àεµ¿¡¼­ À¯´Ï¹ö¼³ °áÁ¦ ÀÎÅÍÆäÀ̽º(UPI)ÀÇ »ç¿ë Á¡À¯À²Àº PhonePe°¡ 46%, Google Pay°¡ 34%·Î ±× µÚ¸¦ À̾ú½À´Ï´Ù. ÁÖ¿ä ÇÉÅ×Å© ±â¾÷µéÀº Àεµ¿¡¼­ UPI µµÀÔÀÇ Áß¿äÇÑ ¿øµ¿·ÂÀÌ µÇ°í ÀÖ½À´Ï´Ù. ¸ð¹ÙÀÏ °áÁ¦ÀÇ ´ëÁßÈ­·Î ÀÎÇØ ÀÌ Á¶»ç ½ÃÀåÀº ¼ºÀåÇÒ °¡´É¼ºÀÌ ÀÖ½À´Ï´Ù.
  • SCA µµ±¸´Â ÆÐŰ¡ °ü¸®ÀÚ, ¸Å´ÏÆä½ºÅä ÆÄÀÏ, ¼Ò½º ÄÚµå, ¹ÙÀ̳ʸ® ÆÄÀÏ, ÄÁÅ×ÀÌ³Ê À̹ÌÁö ¹× ±âŸ °´Ã¼¸¦ °Ë»çÇÕ´Ï´Ù. ¿ÀÇ ¼Ò½º´Â BOM(Bill of Materials)À¸·Î Á¤¸®µÇ¾î ±¹°¡ Ãë¾àÁ¡ µ¥ÀÌÅͺ£À̽º¸¦ Æ÷ÇÔÇÑ ¿©·¯ µ¥ÀÌÅͺ£À̽º¿Í ºñ±³µË´Ï´Ù. ±¹°¡ Ãë¾àÁ¡ µ¥ÀÌÅͺ£À̽º(NVD, National Vulnerability Database)´Â ¹Ì±¹ Á¤ºÎ°¡ °ü¸®ÇÏ´Â Ãë¾àÁ¡ µ¥ÀÌÅͺ£À̽ºÀ̸ç, ÀÌ µ¥ÀÌÅͺ£À̽º¿¡´Â ¾Ë·ÁÁø ÀϹÝÀûÀÎ º¸¾È °áÇÔ¿¡ ´ëÇÑ Á¤º¸°¡ Æ÷ÇԵǾî ÀÖ½À´Ï´Ù. SynopsysÀÇ ³»ºÎ Ãë¾àÁ¡ µ¥ÀÌÅͺ£À̽ºÀÎ Black Duck KnowledgeBase´Â ¿ÀÇ ¼Ò½º ÇÁ·ÎÁ§Æ®, ¶óÀ̼±½º ¹× º¸¾È Á¤º¸¸¦ ¾÷°è¿¡¼­ °¡Àå ¿Ïº®ÇÏ°Ô Á¤¸®ÇÑ µ¥ÀÌÅͺ£À̽ºÀÔ´Ï´Ù.
  • Áö³­ ¸î ³â µ¿¾È ±â¾÷Àº Àü¿°º´ÀÇ ¿µÇâÀ¸·Î ¿Â¶óÀÎ °Å·¡¸¦ ¸¹ÀÌ »ç¿ëÇÏ°Ô µÇ¾ú°í, ±× °á°ú »ç¶÷µéÀº ´õ ¸¹Àº ºñÁî´Ï½º¸¦ ¿Â¶óÀÎÀ¸·Î ¼öÇàÇØ¾ß Çß½À´Ï´Ù. µðÁöÅÐ Çõ½ÅÀÇ Çʿ伺Àº ±â¾÷ÀÇ ½ÃÀå Ãâ½Ã ½Ã°£¿¡ ¿µÇâÀ» ¹ÌÃÆ½À´Ï´Ù. ±â¾÷Àº »ç½½À̵ç, Á¶°¢À̵ç, ¹öÀüÀ̵ç, »ç¹°À» ½ÃÀå¿¡ Ãâ½ÃÇÏ´Â ½Ã°£À» ´ÜÃàÇÕ´Ï´Ù. ÇÑÆí, ÀÌ·¯ÇÑ ±â¾÷µéÀº µ¥ÀÌÅͰ¡ À¯ÃâµÇ°Å³ª Ãë¾àÁ¡À̳ª ¾Ç¿ëÀÇ ¿©Áö¸¦ ³²±âÁö ¾Êµµ·Ï ¼¼½ÉÇÑ ÁÖÀǸ¦ ±â¿ï¿©¾ß ÇÕ´Ï´Ù. º¸¾È»óÀÇ ÀÌÀ¯·Î Ãâ½ÃµÇ´Â ¸ðµç Á¦Ç° ¹öÀüÀº SCA ÀýÂ÷¸¦ °ÅÃÄ¾ß ÇÕ´Ï´Ù. ÀÌ·¯ÇÑ µðÁöÅÐÈ­·ÎÀÇ ÀüȯÀº ÆÒµ¥¹Í ±â°£ µ¿¾È Áö±Ý±îÁö Á¶»çµÇ¾ú´ø ½ÃÀå¿¡ ±âȸ¸¦ °¡Á®¿Ô´Ù°í º¼ ¼ö ÀÖ½À´Ï´Ù.
  • ¼ÒÇÁÆ®¿þ¾î ±¸¼º ºÐ¼® µµÀÔÀÇ °¡Àå Å« À庮 Áß Çϳª´Â ¼÷·ÃµÈ ÀηÂÀÇ ºÎÁ·ÀÔ´Ï´Ù. ±³À° ¹× ¼÷·ÃµÈ ÀηÂÀÌ ºÎÁ·Çϱ⠶§¹®¿¡ À¯Áöº¸¼ö ÀÛ¾÷ÀÚ´Â °¢°¢ ÇÁ·Î±×·¥ »ç¿ë ¹æ¹ýÀ» °í¾ÈÇØ ³»°í ÀÖ½À´Ï´Ù. ±× °á°ú µ¥ÀÌÅͺ£À̽º°¡ º¹ÀâÇØÁö°í ¹«Áú¼­ÇØÁý´Ï´Ù. Á¶Á÷Àº À¯·á ½Ã°£ Àý¾à ±â´ÉÀ» »ç¿ëÇÒ ¼ö ¾ø½À´Ï´Ù. ±× °á°ú À¯´ÉÇÑ ÀηÂÀº ¼ÒÇÁÆ®¿þ¾î ±¸¼º ºÐ¼® »ê¾÷¿¡¼­ °¡Àå Áß¿äÇÑ ¹®Á¦ Áß Çϳª°¡ µÇ¾ú½À´Ï´Ù.

¼ÒÇÁÆ®¿þ¾î ±¸¼º ºÐ¼® ½ÃÀå µ¿Çâ

Ŭ¶ó¿ìµå ºÎ¹®ÀÌ ½ÃÀåÀ» ÁÖµµÇÏ´Â ¿äÀÎ Áß Çϳª

  • Ŭ¶ó¿ìµå ±â¹Ý ¼ÒÇÁÆ®¿þ¾î ¹× ¼Ö·ç¼ÇÀÌ °¢ »ê¾÷¿¡¼­ ¼ö¿ëµÇ°í Àֱ⠶§¹®¿¡ Ŭ¶ó¿ìµå ¹èÆ÷´Â ¿¹Ãø ±â°£ µ¿¾È °¡Àå ºü¸¥ ¼ºÀå·üÀ» º¸ÀÏ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. ºñ¿ë È¿À²¼ºÀÌ ³ô±â ¶§¹®¿¡ Áß¼Ò±â¾÷¿¡¼­ °¡Àå ¸¹ÀÌ µµÀÔÇϰí ÀÖ½À´Ï´Ù. Ŭ¶ó¿ìµå ¹èÆ÷ ¿É¼ÇÀº ¼ÒÇÁÆ®¿þ¾î¸¦ ¼³Ä¡Çϰųª Ãß°¡ Çϵå¿þ¾î¸¦ À¯Áö °ü¸®ÇÒ ÇÊ¿ä ¾øÀÌ ¿©·¯ ÁöÁ¡ÀÌ ½±°Ô Çù¾÷ÇÒ ¼ö ÀÖ°Ô ÇØÁÝ´Ï´Ù.
  • Ŭ¶ó¿ìµå ÄÄÇ»ÆÃÀº »ó´çÇÑ ½ÃÀå Á¡À¯À²À» Â÷ÁöÇϰí ÀÖÀ¸¸ç, ¼ºÀå¼¼¸¦ ´õ¿í °¡¼ÓÈ­ÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. Ŭ¶ó¿ìµå ÄÄÇ»ÆÃÀÌ Á¦°øÇÏ´Â ºñ¿ë ¹× ¿î¿µ»óÀÇ ÀÌÁ¡À¸·Î ÀÎÇØ ¿¹Ãø ±â°£ µ¿¾È ¿ÂÇÁ·¹¹Ì½º ±¸Ãà ¸ðµ¨¿¡¼­ Ŭ¶ó¿ìµå·ÎÀÇ ÀüȯÀÌ °¡¼ÓÈ­µÉ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. ¿¹¸¦ µé¾î, NTT Ltd.ÀÇ Á¶»ç¿¡ µû¸£¸é, ÀÀ´äÀÚÀÇ Àý¹Ý ÀÌ»ó(52%)ÀÌ Å¬¶ó¿ìµå´Â Á¶Á÷ÀÇ ºñÁî´Ï½º ¿î¿µ¿¡ °¡Àå Å« º¯È­¸¦ °¡Á®¿Ã °ÍÀ̶ó°í ´äÇß½À´Ï´Ù.
  • Ŭ¶ó¿ìµå´Â ¸ðµç ±Ô¸ðÀÇ Á¶Á÷ÀÌ ÇÙ½É ¿ª·®¿¡ ÁýÁßÇÏ´Â µ¿½Ã¿¡ IT ÀÎÇÁ¶ó, ¿¬°á¼º ¹× °ü¸® Ã¥ÀÓÀ» ÀÌ·¯ÇÑ ¼­ºñ½º °³¹ß ¹× Á¦°ø¿¡ ´É¼÷ÇÑ Å¬¶ó¿ìµå Á¦°ø¾÷ü·Î ÀÌÀüÇÒ ¼ö ÀÖ°ÔÇÔÀ¸·Î½á °æÁ¦Àû, ¿î¿µÀû ÀÌÁ¡À» ÀÔÁõÇϰí ÀÖ½À´Ï´Ù. ¶ÇÇÑ, Åë½Å »ê¾÷Àº º¯È­Çϰí ÀÖ½À´Ï´Ù. ºü¸£°Ô È®ÀåµÇ´Â ±â¼ú, ¼ö¿ä Áõ°¡, °í°´ ±â¹ÝÀÇ ´Ù¾çÈ­, Àú·ÅÇÑ ºñ¿ëÀ¸·Î ÃֽŠÁ¦Ç° ¹× ¼­ºñ½º¿¡ ´ëÇÑ ¿ä±¸, À§¼º ¹× ÄÉÀ̺í°ú °°Àº ¿©·¯ ºÎ¹®ÀÌ ±âÁ¸ Åë½Å¿¡ ÅëÇյǴ µî ´Ù¾çÇÑ º¯È­°¡ ÀϾ°í ÀÖ½À´Ï´Ù. ÀÌó·³ ¿£ÅÍÇÁ¶óÀÌÁî ÅëÇÕ ¼ÒÇÁÆ®¿þ¾îÀÇ µµÀÔÀº CSP(Ŭ¶ó¿ìµå ¼­ºñ½º Á¦°ø¾÷ü)°¡ ¼­·Î ´Ù¸¥ µ¶¸³°è ¾ÖÇø®ÄÉÀÌ¼Ç ½Ã½ºÅÛ °£ÀÇ ³í¸®Àû ºñÁî´Ï½º ÇÁ·Î¼¼½º ÅëÇÕÀ» ÅëÇØ ¿©·¯ ±â´É¿¡ °ÉÄ£ ´Ù¾çÇÑ ½Ã½ºÅÛ ¹× ¾ÖÇø®ÄÉÀ̼ÇÀÇ °ü¸® ¹× ¿î¿µÀ» Áö¿øÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù.
  • ¶ÇÇÑ, ÇÁ¸®Á Ŭ¶ó¿ìµå´Â Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀÌ¼Ç º¸È£ Ç÷§Æû¿¡ ¼ÒÇÁÆ®¿þ¾î ±¸¼º ºÐ¼®(SCA)À» Ãß°¡ÇØ º¸È£°¡ ÇÊ¿äÇÑ ¾ÖÇø®ÄÉÀ̼ǰú ±ä¹ÐÇÏ°Ô ¿¬°èµÈ ÄÚµå º¸¾ÈÀ» ±¸ÇöÇÒ ¼ö ÀÖµµ·Ï Áö¿øÇÕ´Ï´Ù. ÀÌ °³¹ßÀº ¾÷°è ÃÖ°íÀÇ ±âº» IaC º¸¾È ±â´ÉÀ» ±â¹ÝÀ¸·Î Çϸç, ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È¿¡ ÀÎÇÁ¶ó ÄÁÅØ½ºÆ®¸¦ Æ÷ÇÔÇÒ ¼ö ÀÖ´Â ÃÖÃÊÀÇ ÄÁÅØ½ºÆ® ±â¹Ý SCA ¼Ö·ç¼ÇÀ» Á¦°øÇÕ´Ï´Ù.
  • ¶ÇÇÑ, ÆÛºí¸¯ Ŭ¶ó¿ìµå¿¡ ´ëÇÑ ÁöÃâÀº IT ¿¹»êÀÇ Áß¿äÇÑ Ç׸ñÀÌ µÇ°í ÀÖ½À´Ï´Ù. Flexera°¡ ½Ç½ÃÇÑ Á¶»ç¿¡ µû¸£¸é, ±â¾÷ÀÇ 37%°¡ ¿¬°£ IT ÁöÃâÀÌ 1,200¸¸ ´Þ·¯ ÀÌ»óÀ̶ó°í ´äÇßÀ¸¸ç, 80%´Â Ŭ¶ó¿ìµå ÁöÃâÀÌ ¿¬°£ 120¸¸ ´Þ·¯ ÀÌ»óÀ̶ó°í ´äÇß½À´Ï´Ù. ¶ó°í ´äÇß½À´Ï´Ù.

ºÏ¹Ì°¡ Å« ºñÁßÀ» Â÷ÁöÇÒ Àü¸Á

  • ºÏ¹Ì´Â »õ·Î¿î ±â¼úÀ» ºü¸£°Ô µµÀÔÇϰí, µðÁöÅÐ ¹ðÅ· ½Ã½ºÅÛ ÀÌ¿ëÀÌ È®´ëµÇ°í, »çÀ̹ö À§ÇùÀÌ Áõ°¡ÇÔ¿¡ µû¶ó ½ÃÀåÀ» µ¶Á¡ÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. ¶ÇÇÑ, Á¤ºÎÀÇ ¾ö°ÝÇÑ ±ÔÁ¦, ¿Â¶óÀÎ ¼îÇÎÀÇ ºÎ»ó, ÁÖ¿ä ½ÃÀå ÁøÀÔ ±â¾÷ÀÇ Á¸Àç µîÀÌ »ê¾÷ ¼ºÀåÀ» ÃËÁøÇϰí ÀÖ½À´Ï´Ù.
  • WhiteSource´Â ¿ÀÇ ¼Ò½º ¾Ç¼ºÄÚµå º¸¾È ¹× À§Çù ŽÁö µµ±¸ÀÎ Diffend¸¦ ÀμöÇß´Ù°í ¹àÇû½À´Ï´Ù. È­ÀÌÆ®¼Ò½º´Â ÀÌÁ¦ ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á¿¡¼­ ¸®½ºÅ©¸¦ ÁÙÀÏ ¼ö ÀÖ´Â ÃÖ÷´Ü Ç÷§ÆûÀ» Á¦°øÇÒ ¼ö ÀÖ°Ô µÆ½À´Ï´Ù.
  • ¶ÇÇÑ ¹ÙÀÌµç ´ëÅë·ÉÀº º¥´õµé¿¡°Ô ¼ÒÇÁÆ®¿þ¾î ºÎǰǥ¸¦ Ȱ¿ëÇÑ ¾ÈÀüÇÑ °³¹ß ±âÁØÀ» Á¦½ÃÇϵµ·Ï ¿ä±¸ÇÔÀ¸·Î½á ¹Ì±¹ÀÇ ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸ÁÀ» º¸È£Çϱâ À§ÇØ ¹Î°üÀÌ ÇÔ²² ³ë·ÂÇÏÀÚ°í Ã˱¸Çß½À´Ï´Ù. SBOMÀ» ÅëÇØ Á¤ºÎ¿¡ ÆÇ¸ÅµÇ´Â »óǰÀÇ ¼ÒÇÁÆ®¿þ¾î ±¸¼º¿ä¼Ò¸¦ Åõ¸íÇÏ°Ô °ø°³Çϰí, ¹ß»ýÇÒ ¼ö ÀÖ´Â À§Çèµµ Åõ¸íÇÏ°Ô °ø°³ÇÒ ¼ö ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ °üÇàÀº ½ÃÀåÀ» ÁÖµµÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù.
  • Áö³­ÇØ 9¿ù, ¼¼°è ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È Å×½ºÆ® ¼Ö·ç¼Ç Á¦°ø¾÷üÀÎ Veracode¿Í ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á À§Çè ¹× º¸¾È ±â¼ú Á¦°ø¾÷üÀÎ Cybeats Technologies, Inc.´Â Çù·Â °ü°è¸¦ ¹ßÇ¥Çß½À´Ï´Ù. À̹ø Á¦ÈÞ´Â ¼ÒºñÀÚ°¡ ÃÖ°íÀÇ »çÀ̹ö º¸¾È ¼Ö·ç¼ÇÀ» ¾òÀ» ¼ö ÀÖµµ·Ï »óÈ£ º¸¿ÏÀûÀÎ ±â¼úÀ» Ȱ¿ëÇϱâ À§ÇÑ °ÍÀÔ´Ï´Ù. °í°´Àº Veracode Partners¸¦ ÅëÇØ CybeatsÀÇ ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á º¸¾È ¼Ö·ç¼ÇÀÎ SBOM Studio¸¦ ±¸¸ÅÇÒ ¼ö ÀÖÀ¸¸ç, ¾ç»ç´Â °øµ¿ ºñÁî´Ï½º¸¦ °ËÅäÇÒ ¿¹Á¤ÀÔ´Ï´Ù.
  • Áö³­ÇØ 2¿ù Log4 Shell°ú °°Àº Ãë¾àÁ¡ÀÌ È­Á¦°¡ µÇ¸é¼­ ¿ÀÇ ¼Ò½º ±¸¼º¿ä¼ÒÀÇ À§Ç輺ÀÌ ´õ¿í ºÎ°¢µÇ¸é¼­ Á¶Á÷Àº ÀÌ·¯ÇÑ À§ÇèÀ» °ü¸®ÇÒ ¼ö ÀÖ´Â ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È Àü·«À» Á¡Á¡ ´õ ¸¹ÀÌ ¿ä±¸Çϰí ÀÖ½À´Ï´Ù.
  • Invicti Security´Â ±â¾÷ÀÌ ¾ÖÇø®ÄÉÀ̼ÇÀÇ ¿ÀÇ ¼Ò½º ºÎºÐÀ» ¸ð´ÏÅ͸µ, ½ºÄµ ¹× º¸È£ÇÒ ¼ö ÀÖµµ·Ï Áö¿øÇÏ´Â ¼ÒÇÁÆ®¿þ¾î ±¸¼º ºÐ¼® Á¦Ç°À» Ãâ½ÃÇß½À´Ï´Ù.

¼ÒÇÁÆ®¿þ¾î ±¸¼º ºÐ¼® »ê¾÷ °³¿ä

¼ÒÇÁÆ®¿þ¾î ±¸¼º ºÐ¼® ½ÃÀåÀÇ °æÀïÀº Áß°£ Á¤µµÀ̸ç, ¿©·¯ ´ë±â¾÷À¸·Î ±¸¼ºµÇ¾î ÀÖ½À´Ï´Ù. ½ÃÀå Á¡À¯À²Àº ÇöÀç À̵é ÁøÀÔ ±â¾÷ Áß ¸î °³ ±â¾÷ÀÌ ½ÃÀåÀ» µ¶Á¡Çϰí ÀÖ½À´Ï´Ù. °æÀï¿¡¼­ »ì¾Æ³²°í ¼¼°è ÁøÃâÀ» È®´ëÇϱâ À§ÇØ ÁÖ¿ä ±â¾÷µéÀº Á¦Ç° Çõ½Å»Ó¸¸ ¾Æ´Ï¶ó M&Aµµ Çϰí ÀÖ½À´Ï´Ù.

2023³â 1¿ù, ±â¾÷ ¹× ¸Å´ÏÁöµå ¼­ºñ½º ÇÁ·Î¹ÙÀÌ´õ(MSP)ÀÇ µ¥ÀÌÅÍ °ü¸® ¹× º¸¾È °­È­¸¦ Áö¿øÇÏ´Â º¸¾È ¼Ö·ç¼Ç Á¦°ø¾÷üÀÎ ¾ÆÆ÷³ª ½ÃÅ¥¸®Æ¼(Apona Security)°¡ ÄÚµå Á¶°¢À» Æ÷ÇÔÇÑ ¶óÀ̺귯¸® ¹× ÄÚµå Ãë¾àÁ¡À» ŽÁöÇÏ´Â ¼ÒÇÁÆ®¿þ¾î ±¸¼º ºÐ¼® µµ±¸ '¾ÆÆ÷³ª(Apona)'¸¦ Ãâ½ÃÇÕ´Ï´Ù. ÄÚµå Á¶°¢À» Æ÷ÇÔÇÑ ¶óÀ̺귯¸® ¹× ÄÚµå Ãë¾àÁ¡À» ŽÁöÇÏ´Â ¼ÒÇÁÆ®¿þ¾î ÄÄÆ÷Áö¼Ç ºÐ¼®(SCA) µµ±¸ '¾ÆÆ÷³ª'¸¦ Ãâ½ÃÇÕ´Ï´Ù. ÀÌ »õ·Î¿î º¸¾È ¼Ö·ç¼ÇÀº OSS Àç»ç¿ëÀ¸·Î ÀÎÇÑ º¸¾È ¹®Á¦¸¦ ÇØ°áÇϰíÀÚ ÇÕ´Ï´Ù. ¸Å¿ì È¿°úÀûÀÎ µ¶ÀÚÀûÀÎ ±â¼ú·Î º¸¾È ÇãÁ¡À» ¸é¹ÐÈ÷ ºÐ¼®ÇÏ¿© ±â¾÷ÀÇ ÄÄÇöóÀ̾𽺠¹× º¸¾ÈÀ» À¯ÁöÇϵµ·Ï µ½½À´Ï´Ù.

ÆÈ·Î¾ËÅä ³×Æ®¿÷½º´Â Áö³­ 9¿ù, °³¹ßÀÚµéÀÌ ¿ÀÇ ¼Ò½º ¼ÒÇÁÆ®¿þ¾î ÄÄÆ÷³ÍÆ®ÀÇ º¸¾ÈÀ» È®º¸ÇÒ ¼ö ÀÖµµ·Ï Áö¿øÇÏ´Â ÃÖÃÊÀÇ ÄÁÅØ½ºÆ® ±â¹Ý ¼ÒÇÁÆ®¿þ¾î ±¸¼º ºÐ¼®(SCA) ÅøÀ» Ãâ½ÃÇß½À´Ï´Ù. Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê º¸¾È ºÐ¾ßÀÇ ¾÷°è ¸®´õ·Î¼­ ÆÈ·Î¾ËÅä ³×Æ®¿÷½ºÀÇ ÀÔÁö¸¦ ´õ¿í °ø°íÈ÷ ÇÒ ¼ö ÀÖ°Ô µÆ½À´Ï´Ù. ±âÁ¸ SCA ¼Ö·ç¼ÇÀº µ¶¸³Çü Á¦Ç°À¸·Î ¸¹Àº °æº¸¸¦ ¹ß»ý½Ãų ¼ö ÀÖÁö¸¸, ¹®Á¦¸¦ ½Äº°Çϰí ÇØ°áÇÏ´Â µ¥ µµ¿òÀÌ µÇ´Â ·±Å¸ÀÓ ÄÁÅØ½ºÆ®°¡ ºÎÁ·ÇÑ ¹Ý¸é, SCA´Â °³¹ßÀÚ¿Í º¸¾È ÆÀÀÌ ÇÁ¸®Á Ŭ¶ó¿ìµå Ç÷§ÆûÀÇ ¾ÖÇø®ÄÉÀÌ¼Ç ¶óÀÌÇÁ»çÀÌŬ¿¡ ¿µÇâÀ» ¹ÌÄ¡´Â ¾Ë·ÁÁø Ãë¾àÁ¡À» ÆÄ¾ÇÇÒ ¼ö ÀÖµµ·Ï µ½½À´Ï´Ù. ¶óÀÌÇÁ»çÀÌŬ¿¡ ¿µÇâÀ» ¹ÌÄ¡´Â ¾Ë·ÁÁø Ãë¾àÁ¡À» ¹ß°ßÇÏ°í ¿ì¼±¼øÀ§¸¦ ÁöÁ¤ÇÒ ¼ö ÀÖ½À´Ï´Ù.

±âŸ ÇýÅÃ

  • ¿¢¼¿ Çü½ÄÀÇ ½ÃÀå ¿¹Ãø(ME) ½ÃÆ®
  • 3°³¿ù°£ÀÇ ¾Ö³Î¸®½ºÆ® Áö¿ø

¸ñÂ÷

Á¦1Àå ¼Ò°³

  • Á¶»ç °¡Á¤°ú ½ÃÀå Á¤ÀÇ
  • Á¶»ç ¹üÀ§

Á¦2Àå Á¶»ç ¹æ¹ý

Á¦3Àå ÁÖ¿ä ¿ä¾à

Á¦4Àå ½ÃÀå ÀλçÀÌÆ®

  • ½ÃÀå °³¿ä
  • »ê¾÷ÀÇ ¸Å·Â - Porter's Five Forces ºÐ¼®
    • ±¸¸ÅÀÚ/¼ÒºñÀÚÀÇ Çù»ó·Â
    • °ø±Þ ±â¾÷ÀÇ ±³¼··Â
    • ½Å±Ô Âü¿©¾÷üÀÇ À§Çù
    • ´ëüǰÀÇ À§Çù
    • °æÀï ±â¾÷ °£ÀÇ °æÀï °­µµ

Á¦5Àå ½ÃÀå ¿ªÇÐ

  • ½ÃÀå ¼ºÀå ÃËÁø¿äÀÎ
    • »ó¾÷¿ë°ú IoT ±â¹Ý ¼ÒÇÁÆ®¿þ¾î Á¦Ç°ÀÇ ¿ÀÇ ¼Ò½º Äڵ忡 ´ëÇÑ ÀÇÁ¸µµ
    • ¾ö°ÝÇÑ ±ÔÁ¦¿Í ¿ÀÇ ¼Ò½º ÄÚµåÀÇ À§Çù°ú ¸®½ºÅ© ·¹º§ »ó½Â
  • ½ÃÀå ¼ºÀå ¾ïÁ¦¿äÀÎ
    • ±â¾÷ Á÷¿øÀÇ ±â¼úÀû Àü¹® Áö½Ä ºÎÁ·
    • Devops¿¡ ÀÇÇÑ ¿øÈ°ÇÑ ¼­ºñ½º¿Í ¹Îø¼ºÀÌ ¼ºÀåÀ» ¾ïÁ¦
  • »ê¾÷ ¹ë·ùüÀÎ ºÐ¼®
  • COVID-19ÀÇ »ê¾÷¿¡ ´ëÇÑ ¿µÇâ Æò°¡

Á¦6Àå ½ÃÀå ¼¼ºÐÈ­

  • ±¸¼º¿ä¼Òº°
    • ¼Ö·ç¼Ç
    • ¼­ºñ½ºº°
  • Àü°³ ¹æ½Äº°
    • Ŭ¶ó¿ìµå
    • ¿ÂÇÁ·¹¹Ì½º
  • »ê¾÷º°
    • IT¡¤Åë½Å
    • BFSI
    • ¼Ò¸Å¡¤E-Commerce
    • Á¤ºÎ±â°ü
    • ±âŸ »ê¾÷º°(ÀÇ·á, ÀÚµ¿Â÷)
  • Áö¿ª
    • ºÏ¹Ì
    • À¯·´
    • ¾Æ½Ã¾ÆÅÂÆò¾ç
    • ¶óƾ¾Æ¸Þ¸®Ä«
    • Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«

Á¦7Àå °æÀï ±¸µµ

  • ±â¾÷ °³¿ä
    • Synopsys, Inc.
    • Sonatype Inc.
    • WhiteHat Security, Inc.
    • Veracode Inc.
    • WhiteSource Software Inc.
    • Flexera Inc.
    • Contrast Security, Inc.
    • NexB, Inc
    • Dahua Technology Co., Ltd.
    • SourceClear Inc.
    • Rogue Wave Software

Á¦8Àå ÅõÀÚ ºÐ¼®

Á¦9Àå ½ÃÀå ±âȸ¿Í ÇâÈÄ µ¿Çâ

ksm 25.01.23

The Software Composition Analysis Market is expected to register a CAGR of 21.7% during the forecast period.

Software Composition Analysis - Market - IMG1

Key Highlights

  • With the increased use of open source codes, the number of open source vulnerabilities and threats is increasing, as is the acceptance of software composition analysis to successfully counter the risks. Open source software (OSS) has its advantages, such as simplicity of integration, a wide range of components, zero cost, and so on, as well as disadvantages, such as OSS license compliance risk, OSS security risk, OSS quality risk, and so on. These open-source vulnerabilities provide extraordinarily lucrative potential for hackers. According to Sonatype's sixth annual state of the software supply chain study, there has been a 430% increase in next-generation assaults that target open-source component vulnerabilities directly to infect software supply chains.
  • According to the Reserve Bank of India, PhonePe had a 46% share of universal payments interface (UPI) usage in India in the last fiscal year, followed by Google Pay with a 34% share. Leading fintech companies have been important drivers of UPI adoption in India. The study market could grow as a result of the widespread use of mobile payments.
  • SCA tools check package managers, manifest files, source code, binary files, container images, and other objects. The open source is assembled into a bill of materials (BOM), which is then compared against several databases, including the National Vulnerability Database. These databases contain information on known and prevalent security flaws. The National Vulnerability Database (NVD) is a vulnerability database maintained by the US government. Synopsys' internal vulnerability database, Black Duck KnowledgeBase, is the industry's most complete compilation of open-source project, licensing, and security information.
  • In the last few years, businesses have used online transactions more because of the pandemic.COVID-19 and the resulting constraints compelled people to conduct more business online. The necessity of digital transformation influenced firms' time to market. Businesses reduce the time it takes to bring things to market, whether in chains, pieces, or versions. On the other hand, these firms must exercise extreme caution to avoid leaking data or allowing room for vulnerabilities or exploits. For security reasons, every version of a product that is launched must go through the SCA procedure. Such a transition toward digitalization would have created opportunities for the previously researched market during the pandemic.
  • One of the most significant barriers to the adoption of software composition analysis is the scarcity of skilled workers. Due to a lack of training and skilled staff, each maintenance crew member devises their own methods for using the program. As a result, the database grows more complicated and disorganized. The organizations are unable to access the paid-for time-saving features. As a result, competent labor is one of the most significant issues in the software composition analysis industry.

Software Composition Analysis Market Trends

Cloud Segment is one of the Factor Driving the Market

  • Due to the growing acceptance of cloud-based software and solutions across industries, cloud deployment is seeing the fastest growth rate during the anticipated period. Due to the cost-efficiency of the deployment, small and medium-sized businesses (SMEs) are where adoption is most prevalent. The cloud deployment option makes it easy for multiple sites to work together without having to install software or keep up with extra hardware.
  • Cloud computing is expected to command a sizable market share and even accelerate growth. The cost and operational benefits offered by the deployment mode are expected to shift the trend away from the on-premise deployment model over the forecasted period. For instance, according to the study by NTT Ltd., over half of the respondents (52%) mentioned that the cloud would have the most transformational impact on their organization's business operations.
  • The cloud has proven itself economically and operationally by allowing organizations of all sizes to focus on their core competencies while transferring IT infrastructure, connectivity, and management responsibility to cloud providers who excel at developing and delivering these services. Further, the telecommunications industry is changing. This is due to rapidly expanding technology, increased demand, client base diversification, the need for current products and services at low rates, and the integration of several sectors, such as satellite and cable, with existing telecommunications. Thus, the implementation of enterprise-integrated software is anticipated to assist CSPs (cloud service providers) in managing and administering various systems and applications across multiple functions by enabling them to achieve logical business process integration across different independent application systems.
  • Further, Prisma Cloud has added Software Composition Analysis (SCA) to its cloud-native application protection platform to assist teams in obtaining code security that is as tightly linked as the apps they need to protect. This development builds on our industry-leading basic IaC security capabilities and makes possible the first context-aware SCA solution that can include the infrastructure context in application security.
  • Furthermore, public cloud spending is a significant line item in IT budgets. The increasing use of the public cloud is driving up cloud spending for organizations of all sizes. According to a survey conducted by Flexera, 37 percent of enterprises said their annual IT spend exceeded USD 12 million, and 80% reported that their cloud spending exceeds USD 1.2 million per year.

North America is Expected to Hold Major Share

  • North America is expected to dominate the market due to its early embrace of new technologies, growing use of digital banking systems, and rising cyber threats. In addition, the strict rules set by the government, the rise of online shopping, and the presence of major market players in the area are all helping the industry grow.
  • WhiteSource disclosed that it had acquired Diffend, an open-source malware security and threat detection tool. Differnd's commercial offerings will be free to use following the acquisition under the new brand WhiteSource Diffend.WhiteSource can now offer cutting-edge platforms to cut down on risk in the software supply chain.
  • Additionally, President Biden urged the public and private sectors to safeguard the US software supply chain by requesting vendors to show secure development standards utilizing a software bill of materials. The software components of goods sold to the government are transparent thanks to an SBOM, as are any possible dangers. Such practices are expected to drive the market.
  • In September last year, Veracode, a global provider of application security testing solutions, and Cybeats Technologies, Inc., a software supply chain risk and security technology provider, announced a collaborative relationship. The alliance will take advantage of complementary skills to guarantee that consumers obtain the best cybersecurity solutions. Customers can buy SBOM Studio, a software supply chain security solution from Cybeats, through Veracode Partners, and the two companies will look into doing business together.
  • In February last year, organizations increasingly required application security strategies that managed this risk as the hazards posed by open-source components became more prominent thanks to vulnerabilities making headlines like Log4 Shell. Invicti Security has released its software composition analysis product to help businesses monitor, scan, and secure the open-source parts of their applications.

Software Composition Analysis Industry Overview

The software composition analysis market is moderately competitive and consists of several major players. In terms of market share, a few of these players currently dominate the market. To stay ahead of the competition and expand their global reach, influential companies use mergers and acquisitions as well as product innovation.

In January 2023, Apona Security, a security solutions provider that helps enterprises and managed service providers (MSPs) manage data and improve security across their patented product suites, will launch Apona, a software composition analysis (SCA) tool that detects vulnerabilities in libraries and code, including code fragments. This new security solution tries to fix the security problems caused by OSS reuse. It does this by closely analyzing security holes with highly effective proprietary technologies and helping businesses stay compliant and safe.

In September 2022, Palo Alto Networks released the first context-aware software composition analysis (SCA) tool to help developers secure open-source software components. Palo Alto Networks' position as the industry leader in cloud-native security is reinforced by introducing SCA into Prisma Cloud. Traditional SCA solutions are stand-alone products that can create many alarms but lack the runtime context to aid in problem identification and resolution. SCA would let developers and security teams find and prioritize known vulnerabilities that affect the application lifecycle of the Prisma Cloud platform.

Additional Benefits:

  • The market estimate (ME) sheet in Excel format
  • 3 months of analyst support

TABLE OF CONTENTS

1 INTRODUCTION

  • 1.1 Study Assumptions and Market Definition
  • 1.2 Scope of the Study

2 RESEARCH METHODOLOGY

3 EXECUTIVE SUMMARY

4 MARKET INSIGHTS

  • 4.1 Market Overview
  • 4.2 Industry Attractiveness- Porter's Five Forces Analysis
    • 4.2.1 Bargaining Power of Buyers/Consumers
    • 4.2.2 Bargaining Power of Suppliers
    • 4.2.3 Threat of New Entrants
    • 4.2.4 Threat of Substitute Products
    • 4.2.5 Intensity of Competitive Rivalry

5 MARKET DYNAMICS

  • 5.1 Market Drivers
    • 5.1.1 Commercial and IoT-based Software Products' Dependence on Open-Source Codes
    • 5.1.2 Strict Laws & Regulations and Growing Levels of Threats and Risks in Open-Source Codes
  • 5.2 Market Restraints
    • 5.2.1 Shortage of Technical Expertise Amongst the Enterprise Workforce
    • 5.2.2 Smooth Services and Agility Due to Devops Repress the Growth
  • 5.3 Industry Value Chain Analysis
  • 5.4 Assessment of Impact of COVID-19 on the Industry

6 MARKET SEGMENTATION

  • 6.1 By Component
    • 6.1.1 Solution
    • 6.1.2 Services
  • 6.2 By Deployment Mode
    • 6.2.1 Cloud
    • 6.2.2 On-premises
  • 6.3 By Industry Vertical
    • 6.3.1 IT & Telecom
    • 6.3.2 BFSI
    • 6.3.3 Retail & E-Commerce
    • 6.3.4 Government
    • 6.3.5 Other Industry Verticals (Healthcare, Automotive)
  • 6.4 Geography
    • 6.4.1 North America
    • 6.4.2 Europe
    • 6.4.3 Asia-Pacific
    • 6.4.4 Latin America
    • 6.4.5 Middle East and Africa

7 COMPETITIVE LANDSCAPE

  • 7.1 Company Profiles
    • 7.1.1 Synopsys, Inc.
    • 7.1.2 Sonatype Inc.
    • 7.1.3 WhiteHat Security, Inc.
    • 7.1.4 Veracode Inc.
    • 7.1.5 WhiteSource Software Inc.
    • 7.1.6 Flexera Inc.
    • 7.1.7 Contrast Security, Inc.
    • 7.1.8 NexB, Inc
    • 7.1.9 Dahua Technology Co., Ltd.
    • 7.1.10 SourceClear Inc.
    • 7.1.11 Rogue Wave Software

8 INVESTMENT ANALYSIS

9 MARKET OPPORTUNITIES AND FUTURE TRENDS

ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦