½ÃÀ庸°í¼­
»óǰÄÚµå
1683522

½ÃÅ¥¾î ¾×¼¼½º ¼­ºñ½º ¿§Áö(SASE) ½ÃÀå : ½ÃÀå Á¡À¯À² ºÐ¼®, »ê¾÷ µ¿Çâ, ¼ºÀå ¿¹Ãø(2025-2030³â)

Secure Access Service Edge (SASE) - Market Share Analysis, Industry Trends & Statistics, Growth Forecasts (2025 - 2030)

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: Mordor Intelligence | ÆäÀÌÁö Á¤º¸: ¿µ¹® | ¹è¼Û¾È³» : 2-3ÀÏ (¿µ¾÷ÀÏ ±âÁØ)

    
    
    




¡á º¸°í¼­¿¡ µû¶ó ÃֽŠÁ¤º¸·Î ¾÷µ¥ÀÌÆ®ÇÏ¿© º¸³»µå¸³´Ï´Ù. ¹è¼ÛÀÏÁ¤Àº ¹®ÀÇÇØ Áֽñ⠹ٶø´Ï´Ù.

½ÃÅ¥¾î ¾×¼¼½º ¼­ºñ½º ¿§Áö ½ÃÀå ±Ô¸ð´Â 2025³â¿¡ 129¾ï 4,000¸¸ ´Þ·¯·Î ÃßÁ¤µÇ°í, ¿¹Ãø ±â°£ 2025³âºÎÅÍ 2030³â±îÁö CAGR 20.29%·Î ¼ºÀåÇÒ Àü¸ÁÀ̸ç, 2030³â¿¡´Â 326¾ï ´Þ·¯¿¡ ´ÞÇÒ °ÍÀ¸·Î ¿¹ÃøµË´Ï´Ù.

Secure Access Service Edge(SASE)-Market-IMG1

SASE´Â ³×Æ®¿öÅ© ¾×¼¼½º º¸¾ÈÀÇ ÆÐ·¯´ÙÀÓ ½ÃÇÁÆ®¸¦ ÀǹÌÇÕ´Ï´Ù. ÀÌ´Â Firewall-as-a-service(FWaaS) ¹× SD-WAN°ú °°Àº ³×Æ®¿öÅ©¿Í º¸¾È ±â´ÉÀ» ÅëÇÕÇÏ°í ³×Æ®¿öÅ©-as-a-service(NaaS)¸¦ ´ÜÀÏ Å¬¶ó¿ìµå ³×ÀÌÆ¼ºê ¼­ºñ½º¿¡ ÅëÇÕÇÑ °ÍÀÔ´Ï´Ù. ÀÌ ÅëÇÕÀ» ÅëÇØ ºÐ»êµÈ ¿öÅ©Æ÷½º ¹× Ŭ¶ó¿ìµå ±â¹Ý ¾ÖÇø®ÄÉÀ̼ÇÀº È®Àå °¡´ÉÇϰí À¯¿¬ÇÏ¸ç ¾ÈÀüÇÑ ¹æ½ÄÀ¸·Î º¸È£µÇ°í ¿¬°áµË´Ï´Ù.

ÁÖ¿ä ÇÏÀ̶óÀÌÆ®

  • SASE´Â SDN ȯ°æÀÇ º¸¾ÈÀ» Çâ»ó½Ã۰í Software-Defined Networking(SDN) ½Ã½ºÅÛÀ» ¿Ï¼º½Ãŵ´Ï´Ù. µ¿Àû ³×Æ®¿öÅ© ±¸¼ºÀº SDN¿¡ ÀÇÇØ °¡´ÉÇϸç SASE´Â º¯È­ÇÏ´Â ¿ä±¸ »çÇ×À» ¼ö¿ëÇϱâ À§ÇØ º¯È­ÇÏ´Â ³×Æ®¿öÅ©ÀÇ ¾ÈÀü¼ºÀ» º¸ÀåÇÕ´Ï´Ù. SASE´Â »ç¹°ÀÎÅͳÝ(IoT)ÀÇ ¹ßÀü°ú ÇÔ²² IoT µð¹ÙÀ̽º¿Í À̵éÀÌ »ý¼ºÇÏ´Â µ¥ÀÌÅ͸¦ º¸È£ÇÕ´Ï´Ù. IoT ÄÁÅØ½ºÆ®¿¡¼­´Â ¾ÈÀüÇÑ Åë½Å°ú µ¥ÀÌÅÍ º¸È£°¡ ÇʼöÀûÀÔ´Ï´Ù.
  • ¶ÇÇÑ Å¬¶ó¿ìµå ±â¹Ý SASE´Â ä¿ëÀÌ ±ÞÁõÇÒ ¼ö ÀÖ½À´Ï´Ù. ¿¹¸¦ µé¾î, 2024³â 2¿ù, È­¿þÀÌ´Â IP Club Carnival¿¡¼­ »õ·Î¿î HiSec SASE ¼Ö·ç¼ÇÀ» ¹ßÇ¥Çß½À´Ï´Ù. »õ·Ó°Ô ¹ßÇ¥µÈ ÀÌ ¼Ö·ç¼ÇÀº Ŭ¶ó¿ìµå ³×Æ®¿öÅ© ¿§¤¸ ¿£µåÆ÷ÀÎÆ® ÅëÇÕ Áö´ÉÇü º¸È£ ±â´ÉÀ» Á¦°øÇÏ¿© ±â¾÷ÀÇ º»»ç¿Í Áö»ç¿¡ ÀϰüµÈ º¸¾È º¸ÁõÀ» Á¦°øÇÕ´Ï´Ù.
  • ÆÛºí¸¯ Ŭ¶ó¿ìµåÀÇ »ç¿ëÀÌ Áõ°¡ÇÔ¿¡ µû¶ó ¸ðµç ±â¾÷¿¡¼­ Ŭ¶ó¿ìµå¿¡ ´ëÇÑ ÁöÃâÀÌ Áõ°¡Çϰí ÀÖ½À´Ï´Ù. Ŭ¶ó¿ìµå¿¡ ´ëÇÑ ÁöÃâÀº ÀÌ¹Ì IT ¿¹»ê¿¡¼­ Áß¿äÇÑ À§Ä¡¸¦ Â÷ÁöÇϰí ÀÖÀ¸¸ç, ¾à 77%ÀÇ ±â¾÷ÀÌ ¿¬°£ Ŭ¶ó¿ìµå ÁöÃâ¾×ÀÌ 1,200¸¸ ´Þ·¯¸¦ ÃʰúÇϰí, 80%ÀÇ ±â¾÷ÀÌ 120¸¸ ´Þ·¯¸¦ ÃʰúÇÑ´Ù°í ÀÀ´äÇϰí ÀÖ½À´Ï´Ù. Áß¼Ò±â¾÷Àº ¿öÅ©·ÎµåÀÇ ¼ö°¡ Àû°í ±Ô¸ð°¡ À۱⠶§¹®¿¡ Ŭ¶ó¿ìµåÀÇ Àü¹ÝÀûÀÎ ºñ¿ëÀÌ Àú·ÅÇÕ´Ï´Ù.
  • ½ÃÀå °ü°èÀÚ´Â °í°´¿¡°Ô SASE ¼­ºñ½º¸¦ Á¦°øÇϸ鼭 ÀûÀýÇÑ ±ÔÁ¦ Áؼö¸¦ À¯ÁöÇÏ°í ºñ¿ëÀ» ÁýÇàÇÏ´Â µ¥ °ü½ÉÀÌ ÀÖ½À´Ï´Ù. °ø±Þ¾÷ü´Â ÀÚ»çÀÇ ±â¼úÀ» º¸È£ÇÏ°í ¿øÈ°ÇÏ°Ô ¿î¿µÇÏ¸ç ¸ðµç Àû¿ë °¡´ÉÇÑ ¹ý·ü ¹× ±ÔÁ¤À» ÁؼöÇϱⰡ ¾î·Á¿ï ¼ö ÀÖ½À´Ï´Ù. °ø±Þ¾÷ü°¡ ±ÔÄ¢À̳ª ±âÁØÀ» ÁؼöÇÏÁö ¾ÊÀ¸¸é ¼­ºñ½º¿¡ ºÎÁ¤ÀûÀÎ ¿µÇâÀ» ¹ÌÄ¡°í °í°´ÀÇ ºñÁî´Ï½º ¿î¿µÀ» À§Çè¿¡ ºü¶ß¸± ¼ö ÀÖ½À´Ï´Ù. °ø±Þ¾÷ü´Â ÀϹÝÀûÀ¸·Î ÀÎÁ¤µÇ´Â ±âÁذú ¼­ºñ½º Á¦°ø ¸ð¹ü »ç·Ê¸¦ ÁؼöÇÏ¿© ¿ì¼± ¼øÀ§¸¦ Á¤ÇÏ´Â ÇÁ·Î±×·¥°ú ¼­ºñ½º¸¦ Á¦°øÇÕ´Ï´Ù. °ø±Þ¾÷ü´Â ÁøÈ­ÇÏ´Â ±â¼ú°ú Á¤ºÎÀÇ ±ÔÁ¦¿¡ ´ëÀÀÇϱâ À§ÇÑ Áö¿øÀÌ ÇÊ¿äÇÕ´Ï´Ù.
  • Àü ¼¼°èÀûÀ¸·Î ´õ ¸¹Àº ±â¾÷¿¡¼­ ÅõÀÚ Àü·«À» È®´ëÇÏ¸é ºñÁî´Ï½º ¼ºÀåÀ» Áö¿øÇÏ´Â ½ÃÅ¥¾î ¾×¼¼½º ¼­ºñ½º ¿§Áö äÅÃÀ» °¡¼ÓÈ­ÇÒ °ÍÀ¸·Î º¸ÀÔ´Ï´Ù. COVID-19 ÀÌÈÄÀÇ ½Ã´ë¿¡´Â ´ÜÀÏ °ø±Þ¾÷ü¿¡¼­ SASE¸¦ Á¦°øÇÏ´Â °ø±Þ¾÷üÀÇ ¼ö°¡ Å©°Ô Áõ°¡ÇÒ °ÍÀ¸·Î º¸ÀÔ´Ï´Ù. COVID-19 ÀÌÈÄ ½Ã´ëÀÇ SD-WANÀÇ ½Å±Ô ±¸¸Å´Â ½Ì±Û º¥´õ SASE Á¦°ø Á¦Ç°ÀÇ ÀϺΰ¡ µÉ °ÍÀ¸·Î º¸ÀÔ´Ï´Ù.

½ÃÅ¥¾î ¾×¼¼½º ¼­ºñ½º ¿§Áö(SASE) ½ÃÀå µ¿Çâ

´ë±â¾÷ÀÌ Å« ½ÃÀå Á¡À¯À²À» Â÷ÁöÇÕ´Ï´Ù.

  • ¿§Áö ÄÄÇ»ÆÃ äÅà Ȯ´ë, Ŭ¶ó¿ìµå ÀÎÇÁ¶ó·ÎÀÇ Àüȯ, ¿ø°Ý ¿öÅ©ÀÇ ±ÞÁõÀ¸·Î ±âÁ¸ ³×Æ®¿öÅ© ¾ÆÅ°ÅØÃ³¿Í º¸¾È ¸ðµ¨ÀÌ Å©°Ô º¯È­Çϰí ÀÖ½À´Ï´Ù. ´ë±Ô¸ð IT ¿¹»ê°ú ¼÷·ÃµÈ Á÷¿øÀ» ÀÌ¿ëÇÒ ¼ö ÀÖ´Â ´ë±â¾÷Àº ÀÌ ½ÃÀåÀÇ Çö½Ç¿¡ ºü¸£°Ô ÀûÀÀÇϰí ÀÖ½À´Ï´Ù.
  • ºÐ»êÇü ¿öÅ©Æ÷½º ¸ðµ¨À» äÅÃÇÑ ´ë±â¾÷Àº VPN Áý¼º ¿ë·®ÀÌ ¾ö°ÝÇÏ°Ô Á¦ÇÑµÈ ±âÁ¸ WAN ¾ÆÅ°ÅØÃ³¿¡¼­´Â ´ëºÎºÐÀÇ WFA(Work-From-Anywhere) ¿öÅ©Ç÷θ¦ Áö¿øÇÒ ¼ö ¾ø´Ù´Â °ÍÀ» ¾Ë°í ÀÖ½À´Ï´Ù. ±âÁ¸ º¸¾È ¸ðµ¨°ú °íÁ¤ µðÁöÅÐ º¯È¯¿¡ ´ëÇÑ ÅõÀÚ´Â Áö³­ ¸î ³âµ¿¾È ´ë±â¾÷¿¡¼­ SASE äÅÃÀ» ´ÊÃß°í ÀÖ½À´Ï´Ù.
  • ¼¼°è ½ÃÀå¿¡¼­´Â »õ·Î¿î IT ÀÎÇÁ¶ó°¡ È®´ëµÇ°í ÀÖ½À´Ï´Ù. º¸¾È°ú ³×Æ®¿öÅ©¸¦ ´ÜÀÏ Å¬¶ó¿ìµå Ç÷§Æû¿¡ ÅëÇÕÇÏ´Â ´ë±â¾÷ÀÌ ±ÞÁõÇϰí ÀÖ½À´Ï´Ù. ±× °á°ú ¸Ö¿þ¾î ¾ÆÁî ¾î ¼­ºñ½º´Â º´¿ø, ¼®À¯, °¡½ºÀü, Àü·Â¸Á, ¿î¼Û ¼­ºñ½º, ±â¾÷ ³×Æ®¿öÅ© µî ³ëÃâµÈ IoT¿Í OT¿¡ ´ëÇÑ ´ë±Ô¸ð ¿î¿µÀ¸·Î ÀüȯÇϰí ÀÖ½À´Ï´Ù. À§Çù ÇàÀ§ÀÚ´Â ¿î¿µ ȯ°æ°ú ÀÓº£µðµå IoT ¹× OT ÀåÄ¡ÀÇ ±¸¼ºÀ» ¹àÈ÷°í À̸¦ ¾Ç¿ëÇϱâ À§ÇØ »ó´çÇÑ Á¶»ç ³ë·ÂÀÌ ÇÊ¿äÇÕ´Ï´Ù.
  • ¸¶ÀÌÅ©·Î¼ÒÇÁÆ®ÀÇ µðÁöÅÐ µðÆæ½º º¸°í¼­ 2023¿¡ µû¸£¸é ¼¼°èÀûÀ¸·Î °ø°ÝÀÌ Áõ°¡Çϰí ÀÖÀ¸¸ç, ±× Áß¿¡¼­µµ ID °ø°ÝÀÌ °¡Àå ¸¹¾Æ ÀüüÀÇ 42%°¡ ID °ø°Ý»ÓÀ̶ó°í ÇÕ´Ï´Ù. ¶ÇÇÑ »çÀ̹ö °ø°ÝÀº ÇØ¸¶´Ù Áõ°¡Çϰí ÀÖÀ¸¸ç, ·£¼¶¿þ¾î °ü·Ã ÇÇÇØ¾×Àº ¼¼°èÀûÀ¸·Î Áõ°¡Çϰí ÀÖ½À´Ï´Ù. Microsoft°¡ 2024³â¿¡ ¹ßÇ¥ÇÑ º¸°í¼­¿¡ µû¸£¸é ¾ÏÈ£ °ø°Ý ½Ãµµ´Â ÇÑ ´Þ¿¡ ¾à 30¾ï °Ç¿¡¼­ 300¾ï °Ç ÀÌ»óÀ¸·Î ±ÞÁõÇϰí ÀÖ½À´Ï´Ù.
  • ¿¬°áµÈ µðÁöÅÐ ¼¼°è¿¡¼­´Â ÀåÄ¡°¡ ´ë±Ô¸ð ½Ã½ºÅÛ°ú ¿Â¶óÀÎÀ¸·Î Åë½ÅÇÏ°í ´ë·®ÀÇ µ¥ÀÌÅ͸¦ ¼öÁýÇÏ¸ç ´ë±â¾÷¿¡ ºñÁî´Ï½º ±âȸ¸¦ Á¦°øÇÏ´Â °¡½Ã¼ºÀ» âÃâÇÕ´Ï´Ù. ÀÌ »óȲÀº ¶ÇÇÑ »çÀ̹ö À§Çù¿¡ ´ëÇÑ ¹®À» ¿­°í »çÀ̹ö ¹üÁË »ç¾÷À» ¼ö½Ê¾ï ´Þ·¯ ±Ô¸ð·Î ¸¸µì´Ï´Ù. ÄÄÇ»ÅÍ, ¶ó¿ìÅÍ, ÇÁ¸°ÅÍ, À¥Ä·, ¿ø°Ý °ü¸® ÀåÄ¡ µîÀÇ IoT ÀåÄ¡´Â º¸¾È À§Çè¿¡ ³ëÃâµÇ¾î ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ ÀåÄ¡´Â ¸¹Àº Á¶Á÷ÀÇ ¾÷¹«¿¡ Áß¿äÇϱ⠶§¹®¿¡ Áï½Ã Ã¥ÀÓÀ̳ª º¸¾È À§ÇèÀÌ µÉ ¼ö ÀÖ½À´Ï´Ù. ¸ðµç ¾÷°è¿¡¼­ IoT ¼Ö·ç¼ÇÀÌ ºü¸£°Ô äÅõʿ¡ µû¶ó °ø°ÝÀÇ º¤ÅͰ¡ Áõ°¡Çϰí Á¶Á÷ÀÌ À§Çè¿¡ ³ëÃâµÉ ±âȸ°¡ ´Ã¾î³ª°í ÀÖ½À´Ï´Ù. ¿ø°Ý °ü¸® ÀåÄ¡¿¡ ´ëÇÑ °ø°Ý, À¥À» ÅëÇÑ °ø°Ý, µ¥ÀÌÅͺ£À̽º¿¡ ´ëÇÑ °ø°ÝÀº ´ë±â¾÷¿¡¼­ °¡Àå ¸¹ÀÌ ¹ß»ýÇÕ´Ï´Ù.
  • ¾Õ¼­ ¾ð±ÞÇÑ ÀνôøÆ®´Â ´Ù¸¥ º¸¾È ³×Æ®¿öÅ· Àü·«°ú´Â ¹ÐÁ¢ÇÏ°Ô ±¸ºÐÇÒ ¼ö ÀÖ´Â ´É·ÂÀ» °¡Áö°í Àֱ⠶§¹®¿¡ ´ë±â¾÷¿¡¼­ ³×Æ®¿öÅ© ¾ÆÁî ¾î ¼­ºñ½º(NaaS)ÀÇ Ã¤ÅÃÀ» µÞ¹ÞħÇÒ °¡´É¼ºÀÌ ³ô½À´Ï´Ù. SASE´Â µ¥ÀÌÅͼ¾ÅÍÀÇ º¸¾È¿¡ ÀÇÁ¸ÇÏ´Â °ÍÀÌ ¾Æ´Ï¶ó »ç¿ëÀÚÀÇ ÀåÄ¡·ÎºÎÅÍÀÇ Àüü Æ®·¡ÇÈÀÌ ÃÖÁ¾ ¸ñÀûÁö·Î Àü¼ÛµÇ±â Àü¿¡ ±Ùó¿¡ ÀÖ´Â ÁöÁ¡¿¡¼­ °Ë»çµÇ±â ¶§¹®¿¡ Á÷Á¢ÀûÀÎ Á¢±Ù ¹æ½ÄÀ» äÅÃÇϰí ÀÖ½À´Ï´Ù. µû¶ó¼­ Ŭ¶ó¿ìµå¿¡¼­ ºÐ»êµÈ ¿öÅ©Æ÷½º ¹× µ¥ÀÌÅ͸¦ º¸È£Çϱâ À§ÇÑ ÀÌ»óÀûÀÎ ¿É¼ÇÀÔ´Ï´Ù. Çö´ë Ŭ¶ó¿ìµå Áß½ÉÀÇ ´ë±â¾÷¿¡¼­ »ç¿ëÀÚ, µð¹ÙÀ̽º ¹× ¾ÖÇø®ÄÉÀ̼ÇÀº ¾îµð¼­³ª ÀÛ¾÷ÇÒ ¼ö ÀÖ´Â ¾ÈÀüÇÑ ¾×¼¼½º°¡ ÇÊ¿äÇÕ´Ï´Ù. ·¹°Å½Ã ½Ã½ºÅÛÀº ÀÌ·¯ÇÑ À¯¿¬¼ºÀ» Á¦°øÇÏ´Â µ¥ ÇÊ¿äÇÑ ´ë¿ªÆøÀ» °ßµô ¼ö ¾ø½À´Ï´Ù. ±×·¯³ª SASE´Â »ç¿ëÀÚ³ª ÀåÄ¡ÀÇ À§Ä¡¿¡ °ü°è¾øÀÌ ±â¾÷ ¼öÁØÀÇ º¸¾ÈÀ» À¯ÁöÇϸ鼭 ¾×¼¼½ºÇÒ ¼ö ÀÖÀ¸¹Ç·Î ÀÌ ºÎ¹® ¼ö¿ä¸¦ °­È­Çϰí ÀÖ½À´Ï´Ù.

ºÏ¹Ì°¡ Å« Á¡À¯À²À» Â÷ÁöÇÕ´Ï´Ù.

  • ¹Ì±¹Àº ¼±Áø °æÁ¦±ÇÀÌ¸ç ¼±Áø ±â¼úÀÇ µµÀÔ°ú ¼ö¿ë, ³×Æ®¿öÅ© ÀÚµ¿È­ °³¹ß, Ŭ¶ó¿ìµå ±â¹Ý ¼­ºñ½ºÀÇ ±ÞÁõÀÌ ½ÃÅ¥¾î ¾×¼¼½º ¼­ºñ½º ¿§Áö ½ÃÀå¿¡ Å©°Ô ±â¿©Çϰí ÀÖ½À´Ï´Ù. ÃÖÁ¾ »ç¿ëÀÚ ¾÷°èÀÇ µðÁöÅÐÈ­ ÁøÀü ¹× Cisco Systems Inc., Vmware Inc., Palo Alto Networks, Versa Networks Inc., Akamai Technologies µî À¯¸í º¥´õÀÇ Á¸Àç°¡ ½ÃÀåÀÇ ¼ºÀå¿¡ ±â¿©Çϰí ÀÖ½À´Ï´Ù.
  • ±â¾÷ÀÇ µðÁöÅÐ º¯È¯ÀÌ ºü¸£°Ô °¡¼ÓÈ­µÊ¿¡ µû¶ó º¸¾ÈÀº Ŭ¶ó¿ìµå ÄÄÇ»ÆÃÀ¸·Î ÀüȯÇϰí ÀÖ½À´Ï´Ù. ´Ù¼öÀÇ ÃÖÁ¾ »ç¿ëÀÚ »ê¾÷¿¡¼­ Ŭ¶ó¿ìµå ¼­ºñ½º°¡ Å©°Ô äÅõǰí Àֱ⠶§¹®¿¡ ³×Æ®¿öÅ© ÀÎÇÁ¶óÀÇ ¾ÈÀü¼ºÀ» È®º¸ÇÏ°í º¹À⼺À» ÁÙÀÌ°í ¼Óµµ¿Í ¹Îø¼ºÀ» Çâ»ó½ÃÄÑ¾ß ÇÕ´Ï´Ù. À̰ÍÀº ÇâÈÄ ¸î ³âµ¿¾È ½ÃÀå º¥´õ¿¡°Ô Å« ¼ºÀå ±âȸ¸¦ °¡Á®¿Ã °ÍÀ¸·Î ¿¹»óµË´Ï´Ù.
  • ¹Ì±¹¿¡´Â ¼¼ °¡Áö ÁÖ¿ä Ŭ¶ó¿ìµå ¼­ºñ½º Á¦°ø¾÷ü°¡ ÀÖ½À´Ï´Ù. Amazon Web Services(Amazon Web Services), Microsoft Azure(Azure), Google Cloud(Google Cloud)ÀÔ´Ï´Ù. ¶ÇÇÑ 5G, ÀÚÀ²ÁÖÇà, IoT, ºí·ÏüÀÎ, ÀΰøÁö´É, °ÔÀÓ µî ÁÖ¿ä ±â¼ú Çõ½ÅÀÇ °ÅÁ¡À¸·Îµµ »ý°¢µÇ°í ÀÖ½À´Ï´Ù. SASEÀÇ ±â´ÉÀ» ÅëÇÕÇϸé Á¦·Î Æ®·¯½ºÆ® º¸¾È ±â´ÉÀ» ±â¾÷ ¾ÆÅ°ÅØÃ³¿¡ ¼ö·ÅÇÒ ¼ö ÀÖÀ¸¸ç ÀÌ´Â ½Å·ÚÇÒ ¼ö ÀÖ´Â ³×Æ®¿öÅ© º¸¾È ½Ã½ºÅÛÀ» ±¸ÇöÇÏ´Â µ¥ °¡Àå Áß¿äÇÕ´Ï´Ù. µû¶ó¼­ SASE ¼Ö·ç¼ÇÀº ÃÖÁ¾ »ç¿ëÀÚÀÇ ³×Æ®¿öÅ© ¹× º¸¾È ¾ÆÅ°ÅØÃ³¸¦ º¯È­½ÃÄÑ »çÀ̹ö À§Çè, ºñ¿ë ¹× º¹À⼺À» ÁÙÀÌ´Â °ÍÀ¸·Î ºÐ¼®µË´Ï´Ù.
  • Orange Business, Palo Alto Networks, Orange Cyberdefense´Â 2023³â 8¿ù¿¡ Á¦ÈÞÇÏ¿© Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê °ü¸®Çü ½ÃÅ¥¾î ¾×¼¼½º ¼­ºñ½º ¿§Áö(SASE) ¼Ö·ç¼ÇÀ» ¼¼°è ±â¾÷¿¡ Á¦°øÇß½À´Ï´Ù. ±â¾÷ÀÌ ÇÏÀ̺긮µå ¾÷¹«¿¡ ´ëÀÀÇÏ°í °í°´¿¡°Ô ÃֽŠÁ¦Ç°°ú ¼­ºñ½º¸¦ Á¦°øÇϱâ À§ÇØ Å¬¶ó¿ìµå µµÀÔÀ» °¡¼ÓÈ­Çϰí Àֱ⠶§¹®¿¡ µðÁöÅÐ °ø°Ý ´ë»ó ¿µ¿ªÀÌ È®´ëµÇ°í ÀÖ½À´Ï´Ù. ÀÌ ÆÄÆ®³Ê½ÊÀº ¾÷°è¿¡¼­ °¡Àå ¿Ïº®ÇÑ AI¸¦ Ȱ¿ëÇÑ SASE ¼Ö·ç¼Ç, ±Ç°í ¹× ÄÁ¼³ÅÏÆ® ¼­ºñ½º, ¼¼°èÀûÀÎ °ü¸® ³×Æ®¿öÅ©, º¸¾È ¹× µðÁöÅÐ ¼­ºñ½º¸¦ Á¦°øÇÕ´Ï´Ù. ÀÌ ¼­ºñ½º¸¦ Ȱ¿ëÇÏ´Â Á¶Á÷Àº SASE¿¡ ÀÇÇÑ Çõ½ÅÀÇ ÅõÀÚ ¼öÀÍ·ü(ROI)À» ±Ø´ëÈ­ÇÒ ¼ö ÀÖ½À´Ï´Ù.
  • ij³ª´Ù´Â Ŭ¶ó¿ìµå Àü°³ÀÇ ÃÖÀü¼±¿¡ ÀÖ½À´Ï´Ù. ¸¹Àº Á¶Á÷ÀÌ ÆÛºí¸¯, ÇÁ¶óÀ̺ø, ¿§Áö Ŭ¶ó¿ìµå¸¦ Á¶ÇÕÇÏ¿© µµÀÔÇϰí ÀÖ½À´Ï´Ù. ÇÏÀ̺긮µå ¿öÅ©¿Í Ŭ¶ó¿ìµå º¯ÇõÀÇ ´ëµÎ·Î ³×Æ®¿öÅ© °æ°è¸¦ ³Ñ¾î È®ÀåÇÏ´Â º¸¾È ¼­ºñ½º¿¡ ´ëÇÑ ¼ö¿ä°¡ ³ô¾ÆÁö°í ÀÖÀ¸¸ç ij³ª´Ù ½ÃÀåÀÇ ¼ºÀå¿¡ ±àÁ¤ÀûÀÎ ¿µÇâÀ» ¹ÌÄ¡°í ÀÖ½À´Ï´Ù. °Ô´Ù°¡ ÀÌ ³ª¶ó¿¡¼­´Â µ¥ÀÌÅÍ º¸È£ ¹× ±ÔÁ¦¿¡ °üÇÑ ¹ý±Ô°¡ ¾ö°ÝÇÏ¿© ÃÖÁ¾ »ç¿ëÀÚ ¾÷°è¿¡¼­ SASE ¼Ö·ç¼Ç ¼ö¿ä¸¦ ´õ¿í ¹Ð¾î ¿Ã¸®°í ÀÖ½À´Ï´Ù.
  • ÀÚµ¿È­ÀÇ ÁøÀü°ú ¿¬°á ÀåºñÀÇ µµÀÔÀ¸·Î ½ÃÀå ¼ö¿ä°¡ Å©°Ô Áõ°¡ÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. Network-as-a-Service(NaaS) ¸ðµ¨Àº ÀÏ»óÀûÀÎ Àåºñ À¯Áöº¸¼ö ºÎÇϸ¦ ÁÙÀÌ°í °í°´ ¼­ºñ½º¿Í °°Àº ÀÛ¾÷¿¡ ÁýÁßÇÔÀ¸·Î½á Áß¼Ò±â¾÷¿¡ ÀÌÀÍÀ» Á¦°øÇÕ´Ï´Ù. ij³ª´Ù¿¡¼­´Â ¼Ò±Ô¸ð ±â¾÷ÀÌ ¸¹±â ¶§¹®¿¡ NaaS´Â ÇâÈÄ ¸î ³âµ¿¾È Å« µ¿ÇâÀÌ µÉ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù.

½ÃÅ¥¾î ¾×¼¼½º ¼­ºñ½º ¿§Áö(SASE) ½ÃÀå °³¿ä

½ÃÅ¥¾î ¾×¼¼½º ¼­ºñ½º ¿§Áö ½ÃÀå°ø±Þ¾÷ü´Â ´Ù¾çÇÑ ¼­ºñ½º¸¦ Á¦°øÇϰí Àû´çÈ÷ ÅëÇյǾî ÀÖ½À´Ï´Ù. ±×·¯³ª VMware, Palo Alto Networks, Versa Networks Inc. ¹× Cisco Systems Inc.¿Í °°Àº ÁÖ¿ä °ø±Þ¾÷ü´Â ´Ù¾çÇÑ Áö¿ªÀÇ ´Ù¾çÇÑ ÃÖÁ¾ »ç¿ëÀÚ¿¡°Ô ¸Å¿ì ¼±È£µÇ´Â ³×Æ®¿öÅ© ¼­ºñ½º Á¦°ø ¾÷üÀÔ´Ï´Ù.

  • 2024³â 1¿ù-ص叱Àº °í°´ÀÌ º¸¾È °ü¸®¸¦ °³¼±ÇÏ°í »çÀ̹ö ÀνôøÆ®¸¦ »çÀü¿¡ ´ëóÇÏ°í ´ëÀÀÇÒ ¼ö ÀÖµµ·Ï Cisco¿Í Á¦ÈÞÇÏ¿© µÎ °¡Áö »õ·Î¿î º¸¾È ¿¡Áö ¼­ºñ½º¸¦ ½ÃÀÛÇÒ °ÍÀ̶ó°í ¹ßÇ¥Çß½À´Ï´Ù. Kyndryl ¹× CiscoÀÇ °¡¿ë SD-WAN ¼­ºñ½º¿Í ÇÔ²² »õ·Î ½ÃÀÛµÈ º¸¾È ¿¡Áö ¼­ºñ½º´Â ±â¾÷ÀÌ ½ÃÅ¥¾î ¾×¼¼½º ¼­ºñ½º ¿§Áö(SASE) ¾ÆÅ°ÅØÃ³·Î ¸¶À̱׷¹À̼ÇÇÒ ¼ö ÀÖ´Â °ß°íÇÑ ±â¹ÝÀ» ±¸ÃàÇÒ ¼ö ÀÖµµ·Ï ÇÕ´Ï´Ù.
  • 2024³â 1¿ù-AI/MLÀ» Ȱ¿ëÇÑ ÅëÇÕ ½ÃÅ¥¾î ¾×¼¼½º ¼­ºñ½º ¿§Áö(SASE) ¼Ö·ç¼ÇÀÇ ¼±µÎ °ø±ÞÀÚÀÎ ¹ö¼­ ³×Æ®¿÷½º´Â ÅëÇÕ SASE °ÔÀÌÆ®¿þÀÌÀÇ »õ·Î¿î ½Ã¸®Á ¹ßÇ¥Çß½À´Ï´Ù. ÀÌ °ÔÀÌÆ®¿þÀÌ´Â 100Gbps ÀÌ»óÀÇ ³î¶ó¿î 󸮷®À» Á¦°øÇϸç Çâ»óµÈ ÄÄÇ»ÆÃ ±â´É¿¡ ´ëÇÑ ¼ö¿ä Áõ°¡¿¡ ´ëÀÀÇϵµ·Ï ¼³°èµÇ¾ú½À´Ï´Ù. ÀÌ·¯ÇÑ ¼ö¿ä´Â ³×Æ®¿öÅ·°ú º¸¾È ±â´ÉÀÇ ÅëÇÕÀÌ ÁøÇàµÇ´Â ¾÷°è¿¡ ÀÇÇØ °ßÀεǰí ÀÖ½À´Ï´Ù. VersaÀÇ »õ·Î¿î °ÔÀÌÆ®¿þÀÌ´Â °í¼º´É Çϵå¿þ¾î¿Í Versa ¿î¿µ üÁ¦(VOS)¸¦ ÅëÇÕÇÏ°í ´ÜÀÏ °æ·Î ¾ÆÅ°ÅØÃ³¸¦ Ư¡À¸·Î Çϴ ȸ»çÀÇ ÅëÇÕ SASE ¼ÒÇÁÆ®¿þ¾î ½ºÅÃÀÔ´Ï´Ù. ÀÌ ¼º´É Çâ»óÀ¸·Î ±â¾÷Àº óÀ½À¸·Î º¸¾È ±â´É°ú ¿©·¯ ³×Æ®¿öÅ·À» ´ÜÀÏ °ÔÀÌÆ®¿þÀÌ¿¡ ÅëÇÕÇÒ ¼ö ÀÖ½À´Ï´Ù.

±âŸ ÇýÅà :

  • ¿¢¼¿ Çü½Ä ½ÃÀå ¿¹Ãø(ME) ½ÃÆ®
  • 3°³¿ù°£ÀÇ ¾Ö³Î¸®½ºÆ® ¼­Æ÷Æ®

¸ñÂ÷

Á¦1Àå ¼­·Ð

  • Á¶»ç ÀüÁ¦Á¶°Ç ¹× ½ÃÀå Á¤ÀÇ
  • Á¶»ç ¹üÀ§

Á¦2Àå Á¶»ç ¹æ¹ý

Á¦3Àå ÁÖ¿ä ¿ä¾à

Á¦4Àå ½ÃÀå ÀλçÀÌÆ®

  • ½ÃÀå °³¿ä
  • ¾÷°èÀÇ ¸Å·Âµµ-Porter's Five Forces ºÐ¼®
    • °ø±Þ±â¾÷ÀÇ Çù»ó·Â
    • ¼ÒºñÀÚÀÇ Çù»ó·Â
    • ½Å±Ô Âü°¡¾÷üÀÇ À§Çù
    • °æÀï ±â¾÷°£ °æÀï °ü°è
    • ´ëüǰÀÇ À§Çù
  • ½ÃÀå¿¡ ¿µÇâÀ» ¹ÌÄ¡´Â °Å½Ã°æÁ¦ ¿äÀÎ Æò°¡

Á¦5Àå ½ÃÀå ¿ªÇÐ

  • ½ÃÀå ¼ºÀå ÃËÁø¿äÀÎ
    • SD-WAN, FWaaS, SWG, CASB, ZTNA ±â´ÉÀ» °áÇÕÇÑ ´ÜÀÏ ³×Æ®¿öÅ© ¾ÆÅ°ÅØÃ³¿¡ ´ëÇÑ ¿ä±¸ Áõ°¡
    • º¸¾È ÀýÂ÷ ¹× µµ±¸ ºÎÁ·
    • µ¥ÀÌÅÍ º¸È£ ¹× ±ÔÁ¦¹ý¿¡ ´ëÇÑ ÄÄÇöóÀ̾𽺠Àǹ«È­
  • ½ÃÀå ¼ºÀå ¾ïÁ¦¿äÀÎ
    • Ŭ¶ó¿ìµå ¸®¼Ò½º, Ŭ¶ó¿ìµå º¸¾È ¾ÆÅ°ÅØÃ³, SD-WAN Àü·«¿¡ ´ëÇÑ Áö½Ä ºÎÁ·
    • ³ôÀº Ãʱ⠵µÀÔ ºñ¿ë ¹× SASE ¾ÆÅ°ÅØÃ³¿Í ±× ÄÄÆ÷³ÍÆ® Ç¥ÁØÈ­ÀÇ ºÎÁ·

Á¦6Àå ½ÃÀå ¼¼ºÐÈ­

  • Á¦°ø À¯Çüº°
    • ¼­ºñ½º·Î¼­ÀÇ ³×Æ®¿öÅ©
    • ¼­ºñ½º·Î¼­ÀÇ º¸¾È
  • Á¶Á÷ ±Ô¸ðº°
    • ´ë±â¾÷
    • Áß¼Ò±â¾÷
  • ÃÖÁ¾ »ç¿ëÀÚ »ê¾÷º°
    • BFSI
    • IT ¹× Åë½Å
    • ¼Ò¸Å
    • ÇコÄɾî
    • Á¤ºÎ±â°ü
    • Á¦Á¶¾÷
    • ±âŸ ÃÖÁ¾ »ç¿ëÀÚ »ê¾÷º°
  • Áö¿ªº°
    • ºÏ¹Ì
      • ¹Ì±¹
      • ij³ª´Ù
    • À¯·´
      • µ¶ÀÏ
      • ¿µ±¹
      • ÇÁ¶û½º
      • ½ºÆäÀÎ
      • ÀÌÅ»¸®¾Æ
      • º§±â¿¡
      • ³×´ú¶õµå
      • ·è¼ÀºÎ¸£Å©
      • µ§¸¶Å©
      • Çɶõµå
      • ³ë¸£¿þÀÌ
      • ½º¿þµ§
      • ¾ÆÀ̽½¶õµå
    • ¾Æ½Ã¾Æ
      • Àεµ
      • Áß±¹
      • ÀϺ»
      • ´ë¸¸
      • Çѱ¹
      • ¸»·¹À̽þÆ
      • È«Äá
      • È£ÁÖ ¹× ´ºÁú·£µå
    • ¶óƾ¾Æ¸Þ¸®Ä«
    • Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«

Á¦7Àå °æÀï ±¸µµ

  • ±â¾÷ ÇÁ·ÎÆÄÀÏ
    • Cisco Systems Inc.
    • VMWare Inc.
    • Palo Alto Networks.
    • Versa Networks Inc.
    • Akamai Technologies Inc.
    • Cato Networks
    • Fortinet Inc.
    • Check Point Software Technologies Ltd
    • Cloudflare Inc.
    • Forcepoint

Á¦8Àå ÅõÀÚ ºÐ¼®

Á¦9Àå ½ÃÀå Àü¸Á

AJY 25.04.09

The Secure Access Service Edge Market size is estimated at USD 12.94 billion in 2025, and is expected to reach USD 32.60 billion by 2030, at a CAGR of 20.29% during the forecast period (2025-2030).

Secure Access Service Edge (SASE) - Market - IMG1

SASE signifies a paradigm shift in network access security. It combines network and security features, like Firewall-as-a-service (FWaaS) and SD-WAN, further combining network-as-a-service (NaaS) into a single cloud-native service. With this convergence, distributed workforces and cloud-based applications will be protected and connected in a scalable, flexible, and secure manner.

Key Highlights

  • SASE improves security in SDN environments, thereby completing software-defined networking (SDN) systems. Dynamic network configuration is made possible by SDN, and SASE guarantees that these networks are secure as they change in order to meet the changing requirements. SASE protects IoT devices and the data they generate as the Internet of Things (IoT) develops. In the context of the IoT, secure communications and data protection are essential.
  • Furthermore, cloud-based SASE may witness a surge in adoption. For instance, in February 2024, Huawei announced the new HiSec SASE Solution launch at the IP Club Carnival. This newly launched solution comes with cloud-network-edge-endpoint integrated intelligent protection, providing consistent security assurance for the enterprise headquarters and branches.
  • The increasing usage of the public cloud is boosting cloud spending for businesses of all kinds. Cloud spending is already a significant aspect of IT budgets, wherein about 77% of companies stated that their annual cloud spending value surpasses USD 12 million, and 80% of them stated that the value exceeds USD 1.2 million. As SMBs have fewer and smaller workloads, their overall cloud costs are cheaper.
  • The market players are concerned about maintaining proper regulatory compliance while offering clients SASE services and executing expenses. Sometimes, vendors find it difficult to safeguard their technology, keep running smoothly, and comply with all applicable laws and regulations. Vendors' non-compliance with rules and standards can adversely affect their services and jeopardize clients' business operations. By adhering to the accepted standards and best service-delivery practices, they offer programs and services to prioritize them. Vendors need help keeping up with evolving technologies and government regulations.
  • The growth in investment strategies in a larger share of businesses globally will accelerate the adoption of secure access service edge in supporting business growth. In the post-COVID-19 era, there will be a significant increase in the number of vendors with single-vendor SASE offerings. New SD-WAN purchases in the post-COVID-19 era will be part of a single-vendor SASE offering.

Secure Access Service Edge (SASE) Market Trends

Large Enterprises will Hold Major Market Shares

  • Increased adoption of edge computing, the shift to cloud infrastructure, and a surge in remote work have challenged many traditional network architectures and security models. Large enterprises with access to larger IT budgets and skilled employees are rapidly adapting to this market reality.
  • Large enterprises with a distributed workforce model find the traditional WAN architectures with rigidly limited VPN aggregation capacity inadequate for most work-from-anywhere (WFA) workflows. Existing security models and fixed digital transformation investments have slowed down the adoption of SASE among large enterprises over the last few years.
  • The global market is witnessing an expansion in new IT infrastructure. Large enterprises that combine security and networks into a single cloud platform are proliferating. As a result, Malware-as-a-service has moved to large-scale operations against exposed IoT and OT in hospitals, oil and gas fields, electrical grids, transportation services, and corporate networks. Threat actors require significant research efforts to uncover and exploit the configuration of operating environments and embedded IoT and OT devices.
  • According to the Microsoft Digital Defense Report 2023, Microsoft said that globally, there has been a growing number of attacks, of which identity attacks are the most common, and 42% of the total attacks are only identity attacks. Also, every year, there has been an increasing number of cyberattacks, and the cost of ransomware-related damage increases globally. As per the report published by Microsoft in 2024, attempted password attacks have soared to over 30 billion from around 3 billion per month.
  • In a connected digital world, devices communicate online with larger systems, collecting voluminous data and creating visibility to bring business opportunities to large enterprises. This situation also opens the doors for cyber threats, making the cybercrime business worth multi-billion dollars. IoT devices such as computers, routers, printers, web cameras, and remote management devices are at a security risk. These devices are critical to many organizations' operations; hence, they can quickly become a liability and security risk. The rapid adoption of IoT solutions close to every industry has increased the number of attack vectors and organizations' risk exposure. Attacks against remote management devices, attacks via the web, and attacks on databases are most prevalent among large enterprises.
  • The aforementioned incidents are likely to boost the adoption of the network-as-a-service (NaaS) in large enterprises due to its ability to stand out from other secure networking strategies. Rather than relying on data center security, SASE has a direct approach as the overall traffic from the users' devices is inspected at a nearby point of presence before being sent to its final destination. This makes it an ideal option for protecting distributed workforces and data in the cloud. In modern cloud-centric large enterprises, users, devices, and applications require secure access while working from anywhere. Legacy systems cannot tolerate the bandwidth needed to provide this flexibility. However, SASE can do so while maintaining enterprise-level security for users and devices at any location, which bolsters this segment's demand.

North America will Hold a Significant Share

  • The United States is a developed economy with a significant inclination toward implementing and accepting advanced technology, development in network automation, and surge in cloud-based services, thereby contributing to the secure access service edge market. The growing digitization among end-user industries and the presence of prominent market vendors, like Cisco Systems Inc., Vmware Inc., Palo Alto Networks, Versa Networks Inc., and Akamai Technologies, are contributing to the market's growth.
  • Security is moving toward cloud computation due to the fast acceleration of the digital transformation of businesses. The significant adoption of cloud services in several end-user industries necessitates securing the network infrastructure and reducing complexity to improve speed and agility. This is anticipated to create substantial growth opportunities for market vendors in the coming years.
  • The United States is home to three major cloud service providers: Amazon Web Services, Microsoft's Azure, and Google Cloud. It is also considered to be the hub for major technological innovations such as 5G, autonomous driving, IoT, Blockchain, artificial intelligence, and gaming. Integrating SASE capabilities converges zero trust security capabilities into enterprise architectures, which is paramount in achieving a trusted network security posture. Thus, SASE solutions are analyzed to transform the end-users networks and security architectures to reduce cyber risks, costs, and complexities.
  • Orange Business, Palo Alto Networks, and Orange Cyberdefense partnered in August 2023 to deliver a cloud-native managed security access service edge (SASE) solution to enterprises globally. The digital attack surface has expanded as organizations expedite cloud adoption to accommodate hybrid work and deliver the latest products and services to their customers. The partnership provides the industry's most complete AI-powered SASE solutions, advisory and consultant services, and global managed network, security, and digital services. Organizations using this offering can maximize their SASE transformation's return on investments (ROI).
  • Canada is at the forefront of cloud adoption. Many organizations are deploying a mix of public, private, and edge clouds. With the rise of hybrid work and cloud transformation, the demand for security services to expand beyond the network perimeter is increasing, positively impacting the growth of the country's market. In addition, stringent data protection and regulatory legislation in the country further drive the demand for SASE solutions in end-user industries.
  • The market demand is anticipated to rise significantly due to increasing automation and deploying connected devices. The network-as-a-service (NaaS) model benefits small businesses by offloading day-to-day equipment maintenance and focusing on tasks such as customer service. With a large base of small businesses in Canada, NaaS is expected to become a significant trend in the coming years.

Secure Access Service Edge (SASE) Market Overview

The secure access service edge market vendors are moderately consolidated with an array of services. However, major vendors like VMware, Palo Alto Networks, Versa Networks Inc., and Cisco Systems Inc. are highly preferred network service providers for various end users in various regions.

  • January 2024 - Kyndryl announced that the company partnered with Cisco to launch two of its new security edge services in order to help customers improvise their security controls and address and respond to cyber incidents proactively. The newly launched security edge services along with Kyndryl and Cisco's available SD-WAN services, enable organizations to build a solid foundation to transition into a secure access service edge (SASE) architecture.
  • January 2024-Versa Networks, a leading provider of AI/ML-powered Unified Secure Access Service Edge (SASE) solutions, has announced the launch of a new series of Unified SASE gateways. These gateways offer an impressive throughput exceeding 100 Gbps, designed to address the rising demand for enhanced computing capabilities. This demand is driven by the industry's increasing integration of networking and security functions. Versa's new gateways integrate high-performance hardware with the Versa Operating System (VOS), the company's unified SASE software stack, which features a single-pass architecture. This improved performance allows organizations to consolidate security functions and multiple networking into a single gateway for the first time.

Additional Benefits:

  • The market estimate (ME) sheet in Excel format
  • 3 months of analyst support

TABLE OF CONTENTS

1 INTRODUCTION

  • 1.1 Study Assumptions and Market Definition
  • 1.2 Scope of the Study

2 RESEARCH METHODOLOGY

3 EXECUTIVE SUMMARY

4 MARKET INSIGHTS

  • 4.1 Market Overview
  • 4.2 Industry Attractiveness - Porter's Five Forces Analysis
    • 4.2.1 Bargaining Power of Suppliers
    • 4.2.2 Bargaining Power of Consumers
    • 4.2.3 Threat of New Entrants
    • 4.2.4 Intensity of Competitive Rivalry
    • 4.2.5 Threat of Substitute Products and Services
  • 4.3 Assessment of Macro Economic Factors Impact on the Market

5 MARKET DYNAMICS

  • 5.1 Market Drivers
    • 5.1.1 Growing Need for a Single Network Architecture that Combines SD-WAN, FWaaS, SWG, CASB, and ZTNA Capabilities
    • 5.1.2 Lack of Security Procedures and Tools
    • 5.1.3 Mandatory Compliance with Data Protection and Regulatory Legislation
  • 5.2 Market Restraints
    • 5.2.1 Lack of Knowledge of Cloud Resources, Cloud Security Architecture, and SD-WAN Strategy
    • 5.2.2 High Upfront Implementation Costs and Lack of Standardization Around SASE Architecture and Its Components

6 MARKET SEGMENTATION

  • 6.1 By Offering Type
    • 6.1.1 Network as a Service
    • 6.1.2 Security as a Service
  • 6.2 By Organization Size
    • 6.2.1 Large Enterprises
    • 6.2.2 Small and Medium Enterprises
  • 6.3 By End-user Vertical
    • 6.3.1 BFSI
    • 6.3.2 IT and Telecom
    • 6.3.3 Retail
    • 6.3.4 Healthcare
    • 6.3.5 Government
    • 6.3.6 Manufacturing
    • 6.3.7 Other End-user Verticals
  • 6.4 By Geography
    • 6.4.1 North America
      • 6.4.1.1 United States
      • 6.4.1.2 Canada
    • 6.4.2 Europe
      • 6.4.2.1 Germany
      • 6.4.2.2 United Kingdom
      • 6.4.2.3 France
      • 6.4.2.4 Spain
      • 6.4.2.5 Italy
      • 6.4.2.6 Belgium
      • 6.4.2.7 Netherlands
      • 6.4.2.8 Luxembourg
      • 6.4.2.9 Denmark
      • 6.4.2.10 Finland
      • 6.4.2.11 Norway
      • 6.4.2.12 Sweden
      • 6.4.2.13 Iceland
    • 6.4.3 Asia
      • 6.4.3.1 India
      • 6.4.3.2 China
      • 6.4.3.3 Japan
      • 6.4.3.4 Taiwan
      • 6.4.3.5 South Korea
      • 6.4.3.6 Malaysia
      • 6.4.3.7 Hong Kong
      • 6.4.3.8 Australia and New Zealand
    • 6.4.4 Latin America
    • 6.4.5 Middle East and Africa

7 COMPETITIVE LANDSCAPE

  • 7.1 Company Profiles
    • 7.1.1 Cisco Systems Inc.
    • 7.1.2 VMWare Inc.
    • 7.1.3 Palo Alto Networks.
    • 7.1.4 Versa Networks Inc.
    • 7.1.5 Akamai Technologies Inc.
    • 7.1.6 Cato Networks
    • 7.1.7 Fortinet Inc.
    • 7.1.8 Check Point Software Technologies Ltd
    • 7.1.9 Cloudflare Inc.
    • 7.1.10 Forcepoint

8 INVESTMENT ANALYSIS

9 FUTURE OUTLOOK OF THE MARKET

ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦