½ÃÀ庸°í¼­
»óǰÄÚµå
1308683

µ¥ÀÌÅÍ Á᫐ º¸¾È ½ÃÀå ¿¹Ãø(-2030³â) - ÄÄÆ÷³ÍÆ®º°, Àü°³º°, Á¶Á÷ ±Ô¸ðº°, ÃÖÁ¾»ç¿ëÀÚº°, Áö¿ªº° ¼¼°è ºÐ¼®

Data-centric Security Market Forecasts to 2030 - Global Analysis By Component, Deployment, Organization Size, End User and By Geography

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: Stratistics Market Research Consulting | ÆäÀÌÁö Á¤º¸: ¿µ¹® 175+ Pages | ¹è¼Û¾È³» : 2-3ÀÏ (¿µ¾÷ÀÏ ±âÁØ)

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

Stratistics MRC¿¡ µû¸£¸é, ¼¼°è µ¥ÀÌÅÍ Á᫐ º¸¾È ½ÃÀåÀº 2023³â 51¾ï 1,000¸¸ ´Þ·¯·Î ¿¹Ãø ±â°£ µ¿¾È 21.9%ÀÇ CAGR·Î ¼ºÀåÇÏ¿© 2030³â¿¡´Â 204¾ï 7,000¸¸ ´Þ·¯¿¡ ´ÞÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. Àü¸ÁÇϰí ÀÖ½À´Ï´Ù.

µ¥ÀÌÅÍ Á᫐ º¸¾ÈÀº ±â¹Ð µ¥ÀÌÅÍÀÇ µµ³­°ú ¾Ç¿ëÀ» ¹æÁöÇÒ ¼ö ÀÖ´Â »õ·Î¿î ¹æ¹ýÀÔ´Ï´Ù. ¾ö°ÝÇÑ ÄÄÇöóÀ̾𽺠¹× ±ÔÁ¦ ¿ä°Ç, ºòµ¥ÀÌÅÍ ºÐ¼®, ¸Ó½Å·¯´×, ÀΰøÁö´ÉÀÇ È°¿ëÀ¸·Î ÀÎÇÑ ±â¾÷ µ¥ÀÌÅÍ¿¡ ´ëÇÑ À§Çè Áõ°¡ µî ´Ù¾çÇÑ ¿äÀÎÀ¸·Î ÀÎÇØ Àü ¼¼°èÀûÀ¸·Î µ¥ÀÌÅÍ Á᫐ º¸¾È¿¡ ´ëÇÑ ¼ö¿ä°¡ Áõ°¡Çϰí ÀÖ½À´Ï´Ù.

ÀÎÆ÷¸ÅƼī¿¡ µû¸£¸é 2019³â ÇÑ ÇØ µ¿¾È 5,000°Ç ÀÌ»óÀÇ µ¥ÀÌÅÍ Ä§ÇØ°¡ ¹ß»ýÇÏ¿© 80¾ï °ÇÀÇ ±â·ÏÀÌ À¯ÃâµÇ¾ú´Ù°í ÇÕ´Ï´Ù.

½ÃÀå ¿ªÇÐ:

ÃËÁø¿äÀÎ:

Ŭ¶ó¿ìµå ±â¹Ý µ¥ÀÌÅÍ º¸¾È¿¡ ´ëÇÑ µ¥ÀÌÅÍ Áß½ÉÀû º¸¾È ¿É¼Ç¿¡ ´ëÇÑ ¼ö¿ä Áõ°¡

¼¼°è µ¥ÀÌÅÍ Á᫐ º¸¾È ½ÃÀåÀº ¿¹Ãø ±â°£ µ¿¾È ¼ºÀåÀ» ÃËÁøÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. Ŭ¶ó¿ìµå¿¡¼­ µ¥ÀÌÅÍ´Â ´õ ºü¸£°Ô È®ÀåµÇ°í ¸ð¹ÙÀÏÈ­µÇ´Â Á÷¿øµéÀÌ ÇÊ¿ä·Î ÇÏ´Â °÷À¸·Î ÀÚÀ¯·Ó°Ô À̵¿Çϸç, IBM, ¸¶ÀÌÅ©·Î¼ÒÇÁÆ®, ±¸±Û°ú °°Àº ±â¾÷µéÀº 2020³â Ŭ¶ó¿ìµå ½ÃÀåÀ» Àå¾ÇÇϰí AI, ML°ú °°Àº ÷´Ü ±â¼úÀ» »ç¿ëÇÏ¿© µ¥ÀÌÅ͸¦ ºÐ¼®ÇÏ¿´½À´Ï´Ù. µ¥ÀÌÅÍ Á᫐ º¸¾È ½ÃÀåÀº Ŭ¶ó¿ìµå¿¡¼­ µ¥ÀÌÅ͸¦ º¸È£ÇϰíÀÚ ÇÏ´Â ´ë±â¾÷°ú Áß¼Ò±â¾÷ÀÇ ¿ä±¸°¡ Áõ°¡ÇÔ¿¡ µû¶ó ÁÖµµÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. ÀÎÆ÷¸ÅƼī´Â ¿î¿µÃ¼Á¦, µ¥ÀÌÅͺ£À̽º, ¾ÖÇø®ÄÉÀÌ¼Ç ¼öÁØÀÇ ¾Ïȣȭ´Â ¹°·Ð ÆäÀÏ¿À¹ö µ¥ÀÌÅͼ¾ÅÍ, »ç¿ëÀÚ ÀÎÁõ, ¾×¼¼½º Á¦¾î¸¦ Æ÷ÇÔÇÑ ÀÎÅÚ¸®ÀüÆ® Ŭ¶ó¿ìµå ¼­ºñ½º(Intelligent Cloud ServicesSM)¸¦ Á¦°øÇϰí ÀÖ½À´Ï´Ù. ±×·¯³ª »õ·Î¿î µð¹ÙÀ̽º, º¸¾È, ¾×¼¼½º ÆÐÅÏ, ÀçÅñٹ« Áß Å¬¶ó¿ìµå ȯ°æÀ» À¯ÁöÇÏ´Â µ¥ »ç¿ëµÇ´Â ÇÁ·Î¼¼½ºÀÇ Ã¤ÅÃÀ¸·Î ÀÎÇØ µ¥ÀÌÅÍ Ä§ÇØÀÇ À§ÇèÀº Áõ°¡Çϰí ÀÖ½À´Ï´Ù.

¾ïÁ¦¿äÀÎ:

Á¶Á÷ÀÇ ºÒÆíÇÔ ¹× ³»ºÎ Ãë¾àÁ¡º° º¸¾È Ä§ÇØ¿¡ ´ëÇÑ ÀúÇ×·Â

¼¼°è µ¥ÀÌÅÍ Á᫐ º¸¾È ½ÃÀåÀº ¿¹Ãø ±â°£ µ¿¾È ¼ºÀåÀ» ÀúÇØÇÒ °ÍÀ¸·Î ¿¹»óµÇ¸ç, IT´Â µ¥ÀÌÅÍ º¸¾È ¹®Á¦ÀÇ ±Ù¿øÀÎ µ¿½Ã¿¡ ÇØ°áÃ¥À̱⵵ ÇÕ´Ï´Ù. ÷´Ü ±â¼ú ±â¹ÝÀÇ º¸¾È Á¶Ä¡¸¸À¸·Î Á¶Á÷ÀÌ À§ÇùÀ¸·ÎºÎÅÍ º¸È£¹ÞÀ» ¼ö ÀÖ´Ù°í »ý°¢Çϱ⠽±½À´Ï´Ù. ÀÌ·¯ÇÑ Åµµ¸¦ ÃëÇϸé Á¶Á÷Àº Á¤º¸ º¸¾È À§ÇèÀÇ ¿øÀÎÀÌ µÇ´Â Á¶Á÷ ¹®È­¿Í ÇൿÀ» ÇÇÇÒ ¼ö ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ ¾î·Á¿ò ¶§¹®¿¡ ¸¹Àº Á¶Á÷ÀÌ µ¥ÀÌÅÍ Áß½ÉÀû º¸¾È Á¢±Ù ¹æ½ÄÀ» äÅÃÇÏÁö ¸øÇϰí ÀÖ½À´Ï´Ù. ¸¹Àº CISOµéÀÌ µ¥ÀÌÅÍ º¸¾ÈÀ» ÀÌÇØÇÏ´Â ´ë½Å ȸ»ç Àüü¿¡¼­ µ¥ÀÌÅͰ¡ ¾î¶»°Ô »ç¿ëµÇ´ÂÁö ¸ð¸£±â ¶§¹®¿¡ À̸¦ ½ÇõÇÏÁö ¸øÇϰí ÀÖ½À´Ï´Ù. ±× °á°ú µð½ºÅ©, ¾ÖÇø®ÄÉÀÌ¼Ç ¹× ±âŸ ±â¼ú ¿µ¿ªÀÇ µ¥ÀÌÅ͸¸ º¸È£ÇÒ ¼ö ÀÖÀ¸¸ç, °èÃþ °£ À̵¿ÇÏ´Â µ¥ÀÌÅÍ´Â ½±°Ô ¼Õ»óµÉ ¼ö ÀÖ½À´Ï´Ù.

±âȸ:

µ¥ÀÌÅÍ Ä§ÇØÀÇ Áõ°¡

¼¼°è µ¥ÀÌÅÍ Á᫐ º¸¾È ½ÃÀåÀº ¿¹Ãø ±â°£ µ¿¾È ¼ºÀåÀ» ÃËÁøÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. ÇÁ¶óÀ̹ö½Ã °ü·Ã µ¥ÀÌÅÍ º¸È£¸¦ À§ÇÑ ÀÎÇÁ¶ó¿¡ ´ëÇÑ ¸·´ëÇÑ ÅõÀÚ¿¡µµ ºÒ±¸Çϰí Áß¿äÇÑ µ¥ÀÌÅÍ´Â ¿©ÀüÈ÷ À§Çè¿¡ ³ëÃâµÇ¾î ÀÖÀ¸¸ç, 2019³â Informatica¿¡ µû¸£¸é 5,000°Ç ÀÌ»óÀÇ µ¥ÀÌÅÍ Ä§ÇØ°¡ º¸°íµÇ¾î 80¾ï °ÇÀÇ ±â·ÏÀÌ ³ëÃâµÇ¾ú½À´Ï´Ù. Æ®·»µå¸¶ÀÌÅ©·Î¿¡ µû¸£¸é, Àüü Á¶Á÷ÀÇ 4ºÐÀÇ 1ÀÌ Àü³âµµ¿¡ ½É°¢ÇÑ »çÀ̹ö °ø°ÝÀ» °æÇèÇß½À´Ï´Ù. ÀÌ È¸»çÀÇ Á¶»ç¿¡ µû¸£¸é, ÀÀ´äÀÚÀÇ 83%´Â ÀÌ·¯ÇÑ °ø°ÝÀÌ ÇâÈÄ ¸î ³â µ¿¾È °è¼ÓµÉ °ÍÀ̶ó°í ´äÇß½À´Ï´Ù. Ŭ¶ó¿ìµå ±â¹Ý µ¥ÀÌÅÍ´Â ±â¾÷ÀÌ °¡Àå ¿ì·ÁÇØ¾ß ÇÒ ÁÖ¿äÇÑ °Í Áß ÇϳªÀÔ´Ï´Ù. Á¶Á÷ ³» µ¥ÀÌÅÍ Ä§ÇØ°¡ Áõ°¡ÇÔ¿¡ µû¶ó ÇâÈÄ ¸î ³â µ¿¾È µ¥ÀÌÅÍ Á᫐ º¸¾È ¼Ö·ç¼ÇÀÌ Ã¤ÅÃµÉ °ÍÀÔ´Ï´Ù.

À§Çù:

µ¥ÀÌÅÍ Á᫐ º¸¾È ¼Ö·ç¼Ç¿¡ ´ëÇÑ Áö½ÄÀÇ ºÎÁ·

¼¼°è µ¥ÀÌÅÍ Á᫐ º¸¾È ½ÃÀåÀº ¿¹Ãø ±â°£ µ¿¾È ¼ºÀåÀ» ÀúÇØÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. Àü ¼¼°è ´ëºÎºÐÀÇ Á¶Á÷Àº ÀáÀçÀûÀÎ À§Çù°ú µ¥ÀÌÅÍ Á᫐ º¸¾È ¼Ö·ç¼ÇÀ» ¾ËÁö ¸øÇϰųª, ¾Ë°í ÀÖ´õ¶óµµ ¿©·¯ °¡Áö ÀÌÀ¯·Î À̸¦ ÇÇÇÏ·Á°í ÇÕ´Ï´Ù. ±× °á°ú µ¥ÀÌÅÍ À¯Ãâ°ú Çù¹ÚÀÌ Å©°Ô Áõ°¡Çϰí ÀÖÀ¸¸ç, FBI´Â Á¶Á÷ ³» ÀÎ½Ä ºÎÁ·À¸·Î ÀÎÇØ 2018³â¿¡ 125¾ï ´Þ·¯ÀÇ ³î¶ó¿î ¼Õ½ÇÀÌ ¹ß»ýÇß´Ù°í ¹àÇû½À´Ï´Ù. ÀÌ´Â µ¥ÀÌÅÍ À¯Ãâ°ú ÀáÀçÀûÀÎ µ¥ÀÌÅÍ ¾Ç¿ëÀÇ ¿øÀÎÀÌ µÇ°í ÀÖ½À´Ï´Ù.

COVID-19ÀÇ ¿µÇâ:

COVID-19ÀÇ ÆÒµ¥¹ÍÀº µðÁöÅÐ ±â¼ú »ç¿ë°ú ¿ø°Ý ±Ù¹« °üÇàÀ» º¯È­½ÃÄ×½À´Ï´Ù. ÀÌ¿¡ µû¶ó ±â¾÷µéÀº ÀÚ»êÀ» Ŭ¶ó¿ìµå¿Í µðÁöÅÐ Ç÷§ÆûÀ¸·Î ÀÌÀüÇϰí, °æ°è º¸¾È, ³×Æ®¿öÅ© º¸¾È µî ÇÊ¿äÇÑ º¸¾È Á¶Ä¡¸¦ ÃëÇÏ´Â °ÍÀÌ ¸Å¿ì Áß¿äÇØÁ³½À´Ï´Ù. COVID-19·Î ÀÎÇÑ µ¥ÀÌÅÍ À¯ÃâÀÌ Áõ°¡ÇÔ¿¡ µû¶ó ±â¾÷µéÀº º¸¾È ÁöÃâÀ» ´Ã¸®°í µ¥ÀÌÅÍ º¸È£¸¦ À§ÇØ µ¥ÀÌÅÍ Á᫐ ¼Ö·ç¼ÇÀ» µµÀÔÇß½À´Ï´Ù. ±× °á°ú, COVID-19´Â µ¥ÀÌÅÍ Á᫐ º¸¾È ½ÃÀå¿¡ ±àÁ¤ÀûÀÎ ¿µÇâÀ» ¹ÌÄ¡°í ÀÖ½À´Ï´Ù. ÀÌ´Â °¡±î¿î ½ÃÀÏ ³»¿¡ µ¥ÀÌÅÍ Á᫐ º¸¾È ¼¼°è ½ÃÀåÀ» °£Á¢ÀûÀ¸·Î °ßÀÎÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù.

¿¹Ãø ±â°£ µ¿¾È ¿ÂÇÁ·¹¹Ì½º ºÎ¹®ÀÌ °¡Àå Å« ºñÁßÀ» Â÷ÁöÇÒ °ÍÀ¸·Î ¿¹»ó:

¿ÂÇÁ·¹¹Ì½º ºÎ¹®Àº ¿¹Ãø ±â°£ µ¿¾È °¡Àå Å« ºñÁßÀ» Â÷ÁöÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. ¿ÂÇÁ·¹¹Ì½º ¹èÆ÷´Â Á¶Á÷ ³» IT ´ã´çÀÚ°¡ ó¸®Çϰí À¯ÁöÇÒ ¼ö ÀÖ´Â ¸ðµç Ç÷§Æû, ¾ÖÇø®ÄÉÀ̼Ç, ½Ã½ºÅÛ, µ¥ÀÌÅÍ´Â Á¶Á÷ ³» IT ´ã´çÀÚ°¡ ¿ÏÀüÈ÷ ÅëÁ¦ÇÒ ¼ö ÀÖ´Â ¹üÀ§¿¡ ¼ÓÇÕ´Ï´Ù. Á¶Á÷¿¡ º¸¾È ¼Ö·ç¼Ç°ú µ¥ÀÌÅÍ Á᫐ ±â¼úÀ» µµÀÔÇϴ ǥÁØ ÀýÂ÷¸¦ ¿ÂÇÁ·¹¹Ì½º ±¸ÃàÀ̶ó°í ÇÕ´Ï´Ù. ÀÎÁõ°ú ÀÎÁõÀ» Áß½ÃÇÏ´Â ±â¾÷µéÀº ¿ÂÇÁ·¹¹Ì½º ±¸ÃàÀ» ¼±È£ÇÕ´Ï´Ù. Á¤ºÎ, ±¹¹æ, BFSI µîÀÇ »ê¾÷¿¡¼­´Â °³ÀÎÁ¤º¸, À繫 ¹®¼­, À繫Á¦Ç¥, °Å·¡ µ¥ÀÌÅÍ µîÀ» ºÐ½ÇÇÏÁö ¾Ê±â À§ÇØ ¿ÂÇÁ·¹¹Ì½º º¸¾ÈÀÌ ¿ä±¸µË´Ï´Ù. ÀÌ·¯ÇÑ ¿äÀÎÀ¸·Î ÀÎÇØ ¿ÂÇÁ·¹¹Ì½º º¸¾È Á¦Ç°¿¡ ´ëÇÑ ¼ö¿ä´Â Àü ¼¼°èÀûÀ¸·Î Áõ°¡Çϰí ÀÖ½À´Ï´Ù.

¿¹Ãø ±â°£ µ¿¾È ÇコÄÉ¾î ¹× Á¦¾à ºÎ¹®ÀÌ °¡Àå ³ôÀº CAGRÀ» ±â·ÏÇÒ °ÍÀ¸·Î ¿¹»ó:

ÇコÄÉ¾î ¹× Á¦¾à ºÐ¾ß´Â ¿¹Ãø ±â°£ µ¿¾È °¡Àå ºü¸¥ CAGRÀ» ±â·ÏÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. ÇコÄÉ¾î »ê¾÷¿¡¼­ µ¥ÀÌÅÍ º¸¾ÈÀº ¸Å¿ì Áß¿äÇÕ´Ï´Ù. ÇコÄÉ¾î »ê¾÷Àº °íµµÀÇ º¸¾ÈÀÌ ¿ä±¸µÇ´Â ¹Î°¨ÇÑ È¯ÀÚ Á¤º¸ ¹× °³ÀÎ °Ç°­ Á¤º¸¸¦ ´Ù·ç±â ¶§¹®ÀÔ´Ï´Ù. ´ëºÎºÐÀÇ ÇコÄɾî Á¶Á÷Àº ³»ºÎ µ¥ÀÌÅÍ º¸¾Èº¸´Ù °í°´ µ¥ÀÌÅÍ º¸È£¿¡ ´õ ÁßÁ¡À» µÎ±â ¶§¹®¿¡ Á¶Á÷ ³»¿¡¼­ ÇコÄÉ¾î µ¥ÀÌÅ͸¦ º¸È£ÇØ¾ß ÇÒ Çʿ伺ÀÌ Áõ°¡Çϰí ÀÖÀ¸¸ç, HIPAA¿Í °°Àº ±ÔÁ¤ Áؼö¸¦ µµÀÔÇÏ´Â °ÍÀº µ¥ÀÌÅͺ£À̽º ¹× ³×Æ®¿öÅ© °ÔÀÌÆ®¿þÀ̸¦ º¸È£ÇÑ´Ù, µðÁöÅÐ ¼­¸íÀ» »ç¿ëÇÏ¿© ±â¹Ð µ¥ÀÌÅÍ º¸¾È ¹× ½Å¿ø º¸È£¿¡ µµ¿òÀÌ µÉ ¼ö ÀÖ½À´Ï´Ù.

°¡Àå ³ôÀº Á¡À¯À²À» º¸ÀÌ´Â Áö¿ª:

µ¥ÀÌÅÍ Á᫐ º¸¾È ½ÃÀå¿¡¼­ ºÏ¹Ì´Â ¿¹Ãø ±â°£ µ¿¾È °¡Àå Å« Á¡À¯À²À» Â÷ÁöÇÏ¸ç ½ÃÀå È®´ë¿¡ Å« ±â¿©¸¦ ÇÒ °ÍÀ¸·Î º¸ÀÔ´Ï´Ù. ÀÌ·¯ÇÑ ¹è°æ¿¡´Â Ŭ¶ó¿ìµå ±â¹Ý ¼­ºñ½º »ç¿ë Áõ°¡, »çÀ̹ö °ø°Ý Áõ°¡, ¾ö°ÝÇÑ µ¥ÀÌÅÍ º¸È£¹ý Áؼö ¿ä°Ç µî ´Ù¾çÇÑ ¿äÀÎÀÌ ÀÖ½À´Ï´Ù. ƯÈ÷ ¹Ì±¹Àº ÁÖ¿ä ½ÃÀå ±â¾÷ÀÇ Á¸Àç¿Í ÷´Ü ±â¼ú¿¡ ´ëÇÑ ¸·´ëÇÑ ÅõÀÚ·Î ÀÎÇØ ºÏ¹Ì¿¡¼­ °¡Àå Å« µ¥ÀÌÅÍ Á᫐ º¸¾È ½ÃÀåÀ¸·Î ºÎ»óÇß½À´Ï´Ù. ÇコÄɾî¿Í ±ÝÀ¶ ºÐ¾ß´Â ¹Î°¨ÇÑ µ¥ÀÌÅ͸¦ ¸¹ÀÌ ´Ù·ç±â ¶§¹®¿¡ ºÏ¹Ì¿¡¼­ µ¥ÀÌÅÍ Á᫐ º¸¾È ½ÃÀåÀÇ ¼ºÀåÀ» ÁÖµµÇÏ´Â ÁÖ¿ä »ê¾÷ Áß ÇϳªÀÔ´Ï´Ù.

CAGRÀÌ °¡Àå ³ôÀº Áö¿ª:

¿¹Ãø ±â°£ µ¿¾È ¾Æ½Ã¾ÆÅÂÆò¾çÀÌ °¡Àå ³ôÀº CAGRÀ» ±â·ÏÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. ¾Æ½Ã¾ÆÅÂÆò¾çÀº ¸ð¹ÙÀÏ ±â±âÀÇ º¸±ÞÀÌ È®´ëµÊ¿¡ µû¶ó ¸ð¹ÙÀÏ ÀηÂÀÌ °¡Àå ºü¸£°Ô Áõ°¡ÇÏ´Â Áö¿ª Áß ÇϳªÀÔ´Ï´Ù. µ¥ÀÌÅÍ µµ³­À» ¹æÁöÇϱâ À§ÇØ È£ÁÖ, Áß±¹, ÀϺ» µî ¾Æ½Ã¾ÆÅÂÆò¾ç ±¹°¡µéÀº ¾Ïȣȭ ±â¼úÀ» ±¤¹üÀ§ÇÏ°Ô Ã¤ÅÃÇϰí ÀÖ½À´Ï´Ù. ½Ì°¡Æ÷¸£¿Í Àεµ¿Í °°Àº Àαâ ÀÖ´Â APAC ±¹°¡µéÀº ¿ì¼öÇÑ µ¥ÀÌÅÍ Á᫐ º¸¾È ¼Ö·ç¼ÇÀ» äÅÃÇϰí ÀÖÀ¸¸ç, APAC ±â¾÷ ¹× Áß¼Ò±â¾÷Àº ¹Î°¨ÇÑ ºñÁö´Ï½º µ¥ÀÌÅ͸¦ »çÀ̹ö À§Çù, »ó¾÷Àû ½ºÆÄÀÌ, ÄÄÇ»ÅÍ ÇØÄ¿ÀÇ ±ÝÀüÀû À̵æÀ» À§ÇÑ µ¥ÀÌÅÍ ¾Ç¿ëÀ¸·ÎºÎÅÍ º¸È£Çϰí ÀÖ½À´Ï´Ù. µ¥ÀÌÅÍ Á᫐ º¸¾È ¼Ö·ç¼ÇÀ» Àû±ØÀûÀ¸·Î µµÀÔÇÏ¿© »çÀ̹ö À§Çù, »ó¾÷Àû ½ºÆÄÀÌ, ÄÄÇ»ÅÍ ÇØÄ¿ÀÇ ±ÝÀüÀû À̵æÀ» À§ÇÑ µ¥ÀÌÅÍ ¾Ç¿ëÀ» ¹æÁöÇϰí ÀÖ½À´Ï´Ù. ¶ÇÇÑ, µ¥ÀÌÅÍ Á᫐ º¸¾ÈÀÇ Á߿伺¿¡ ´ëÇÑ Àνĵµ ³ô¾ÆÁö°í ÀÖ½À´Ï´Ù.

ÁÖ¿ä ¹ßÀü:

2022³â 5¿ù, ÀÎÆ÷¸ÅƼī´Â Oracle°úÀÇ ÆÄÆ®³Ê½ÊÀ» ¹ßÇ¥Çß½À´Ï´Ù. À̸¦ ÅëÇØ Oracle°ú ÀÎÆ÷¸ÅƼī´Â ÀÎÆ÷¸ÅƼīÀÇ ÀÎÅÚ¸®ÀüÆ® µ¥ÀÌÅÍ °ü¸® Ŭ¶ó¿ìµå¸¦ OracleÀÇ ¿ÀÅä³ë¸Ó½º µ¥ÀÌÅͺ£À̽º, Oracle ¿¢»çµ¥ÀÌÅÍ µ¥ÀÌÅͺ£À̽º ¼­ºñ½º(Oracle Exadata Database Service) ¹× Oracle ¿ÀºêÁ§Æ® ½ºÅ丮Áö¿Í ÅëÇÕÇß½À´Ï´Ù. ÀÌ »õ·Î¿î ÆÄÆ®³Ê½ÊÀº OCI·ÎÀÇ ÀüȯÀ» °£¼ÒÈ­Çϰí OCI¿Í IDMCÀÇ µ¥ÀÌÅÍ °Å¹ö³Í½º ±â´ÉÀ» °­È­ÇÕ´Ï´Ù.

2022³â 4¿ù, µ¥ÀÌÅÍ Å¬¶ó¿ìµå ±â¾÷ ½º³ë¿ìÇ÷¹ÀÌÅ©´Â ÀÎÆ÷¸ÅƼī(Informatica)¿ÍÀÇ Á¦ÈÞ¸¦ ÅëÇØ µ¥ÀÌÅÍ Å¬¶ó¿ìµå¿Í ÀÎÆ÷¸ÅƼīÀÇ Áö´ÉÇü µ¥ÀÌÅÍ °ü¸® Ŭ¶ó¿ìµå(IDMC)¸¦ ÅëÇÕÇÑ´Ù°í ¹ßÇ¥Çß½À´Ï´Ù.

2021³â 4¿ù, ±¸±Û Ŭ¶ó¿ìµå¿Í ºê·ÎµåÄÄÀº ºê·ÎµåÄÄÀÇ ¼ÒÇÁÆ®¿þ¾î ÇÁ·£Â÷ÀÌÁîÀÇ Çõ½Å È®´ë¿Í Ŭ¶ó¿ìµå ¼­ºñ½º ÅëÇÕÀ» À§ÇÑ Àü·«Àû Á¦ÈÞ¸¦ ¹ßÇ¥Çß½À´Ï´Ù. À̹ø Á¦ÈÞÀÇ ÀåÁ¡Àº ºê·ÎµåÄÄÀÌ ±¸±Û Ŭ¶ó¿ìµå¿¡¼­ º¸¾È ¹× ±â¾÷ ¿î¿µ ¼ÒÇÁÆ®¿þ¾î Á¦Ç°±ºÀ» Á¦°øÇϰí, ±¸±Û Ŭ¶ó¿ìµåÀÇ µ¥ÀÌÅÍ ¹× ºÐ¼® ¼­ºñ½º°¡ ºê·ÎµåÄÄÀÇ ºñÁö´Ï½º ÀÇ»ç°áÁ¤°ú °í°´À» Áö¿øÇÒ ¼ö ÀÖ´Ù´Â °ÍÀÔ´Ï´Ù.

º¸°í¼­ ³»¿ë

  • Áö¿ª ¹× ±¹°¡º° ½ÃÀå Á¡À¯À² Æò°¡
  • ½Å±Ô ÁøÀÔ±â¾÷¿¡ ´ëÇÑ Àü·«Àû Á¦¾ð
  • 2021³â, 2022³â, 2023³â, 2026³â, 2030³â ½ÃÀå µ¥ÀÌÅ͸¦ Æ÷ÇÔ
  • ½ÃÀå µ¿Çâ(½ÃÀå ÃËÁø¿äÀÎ, Á¦¾à¿äÀÎ, ±âȸ, À§Çù, °úÁ¦, ÅõÀÚ±âȸ, Á¦¾ð)
  • ½ÃÀå ÃßÁ¤¿¡ ±â¹ÝÇÑ ÁÖ¿ä »ç¾÷ ºÎ¹®¿¡ ´ëÇÑ Àü·«Àû Á¦¾ð
  • ÁÖ¿ä °øÅë Æ®·»µå¸¦ ¸ÅÇÎÇÑ °æÀï »óȲ
  • »ó¼¼ÇÑ Àü·«, À繫 ¹× ÃÖ±Ù µ¿ÇâÀ» Æ÷ÇÔÇÑ ±â¾÷ °³¿ä
  • Ãֽбâ¼ú µ¿ÇâÀ» ¸ÅÇÎÇÑ °ø±Þ¸Á Æ®·»µå

¹«·á ¸ÂÃãÇü ¼­ºñ½º:

ÀÌ º¸°í¼­¸¦ ±¸µ¶ÇÏ´Â °í°´¿¡°Ô´Â ´ÙÀ½ Áß ÇϳªÀÇ ¹«·á ¸ÂÃãÈ­ ¿É¼ÇÀ» Á¦°øÇÕ´Ï´Ù:

  • ±â¾÷ °³¿ä
    • Ãß°¡ ½ÃÀå ±â¾÷ÀÇ Á¾ÇÕÀûÀÎ ÇÁ·ÎÆÄÀϸµ(ÃÖ´ë 3°³»ç±îÁö)
    • ÁÖ¿ä ±â¾÷ SWOT ºÐ¼®(3°³»ç±îÁö)
  • Áö¿ª ¼¼ºÐÈ­
    • °í°´ÀÇ °ü½É¿¡ µû¸¥ ÁÖ¿ä ±¹°¡º° ½ÃÀå ÃßÁ¤ ¹× ¿¹Ãø, CAGR(Âü°í: Ÿ´ç¼º °ËÅä¿¡ µû¸¥)
  • °æÀï»ç º¥Ä¡¸¶Å·
    • Á¦Ç° Æ÷Æ®Æú¸®¿À, Áö¸®Àû ÀÔÁö, Àü·«Àû Á¦ÈÞ¸¦ ±â¹ÝÀ¸·Î ÇÑ ÁÖ¿ä ±â¾÷ º¥Ä¡¸¶Å·

¸ñÂ÷

Á¦1Àå ÁÖ¿ä ¿ä¾à

Á¦2Àå ¼­¹®

  • °³¿ä
  • ÀÌÇØ°ü°èÀÚ
  • Á¶»ç ¹üÀ§
  • Á¶»ç ¹æ¹ý
    • µ¥ÀÌÅÍ ¸¶ÀÌ´×
    • µ¥ÀÌÅÍ ºÐ¼®
    • µ¥ÀÌÅÍ °ËÁõ
    • Á¶»ç Á¢±Ù¹ý
  • Á¶»ç ¼Ò½º

Á¦3Àå ½ÃÀå µ¿Ç⠺м®

  • ¼ºÀå ÃËÁø¿äÀÎ
  • ¼ºÀå ¾ïÁ¦¿äÀÎ
  • ±âȸ
  • À§Çù
  • ÃÖÁ¾»ç¿ëÀÚ ºÐ¼®
  • ½ÅÈï ½ÃÀå
  • ½ÅÁ¾ Äڷγª¹ÙÀÌ·¯½º °¨¿°Áõ(COVID-19)ÀÇ ¿µÇâ

Á¦4Àå Porter's Five Forces ºÐ¼®

  • °ø±Þ ±â¾÷ÀÇ ±³¼··Â
  • ±¸¸ÅÀÚÀÇ ±³¼··Â
  • ´ëüǰÀÇ À§Çù
  • ½Å±Ô Âü¿©¾÷üÀÇ À§Çù
  • °æÀï ±â¾÷°£ °æÀï °ü°è

Á¦5Àå ¼¼°èÀÇ µ¥ÀÌÅÍ Á᫐ º¸¾È ½ÃÀå : ÄÄÆ÷³ÍÆ®º°

  • ¼ÒÇÁÆ®¿þ¾î¿Í ¼Ö·ç¼Ç
    • µ¥ÀÌÅÍ ¹ß°ß°ú ºÐ·ù
    • µ¥ÀÌÅÍ º¸È£
    • µ¥ÀÌÅÍ °Å¹ö³Í½º
    • µ¥ÀÌÅÍ ¸®½ºÅ©¿Í ÄÄÇöóÀ̾ð½º
    • µ¥ÀÌÅÍ ÇÁ¶óÀ̹ö½Ã
  • Àü¹® ¼­ºñ½º
  • ±âŸ ÄÄÆ÷³ÍÆ®

Á¦6Àå ¼¼°èÀÇ µ¥ÀÌÅÍ Á᫐ º¸¾È ½ÃÀå : Àü°³º°

  • ¿ÂÇÁ·¹¹Ì½º
  • ¿ÂŬ¶ó¿ìµå
  • ±âŸ Àü°³

Á¦7Àå ¼¼°èÀÇ µ¥ÀÌÅÍ Á᫐ º¸¾È ½ÃÀå : Á¶Á÷ ±Ô¸ðº°

  • ´ë±â¾÷
  • Áß¼Ò±â¾÷(SME)
  • ±âŸ Á¶Á÷ ±Ô¸ð

Á¦8Àå ¼¼°èÀÇ µ¥ÀÌÅÍ Á᫐ º¸¾È ½ÃÀå : ÃÖÁ¾»ç¿ëÀÚº°

  • BFSI(ÀºÇà, ±ÝÀ¶ ¼­ºñ½º, º¸Çè)
  • Á¤ºÎ¿Í ¹æÀ§
  • ÇコÄɾî¿Í ÀǾàǰ
  • IT¿Í ±â¾÷
  • Á¦Á¶¾÷
  • ¿¡³ÊÁö¿Í À¯Æ¿¸®Æ¼
  • Æ÷Àå
  • Åë½Å
  • ¼Ò¸Å ¹× ¼ÒºñÀç
  • ±âŸ ÃÖÁ¾»ç¿ëÀÚ

Á¦9Àå ¼¼°èÀÇ µ¥ÀÌÅÍ Á᫐ º¸¾È ½ÃÀå : Áö¿ªº°

  • ºÏ¹Ì
    • ¹Ì±¹
    • ij³ª´Ù
    • ¸ß½ÃÄÚ
  • À¯·´
    • µ¶ÀÏ
    • ¿µ±¹
    • ÀÌÅ»¸®¾Æ
    • ÇÁ¶û½º
    • ½ºÆäÀÎ
    • ±âŸ À¯·´
  • ¾Æ½Ã¾ÆÅÂÆò¾ç
    • ÀϺ»
    • Áß±¹
    • Àεµ
    • È£ÁÖ
    • ´ºÁú·£µå
    • Çѱ¹
    • ±âŸ ¾Æ½Ã¾ÆÅÂÆò¾ç
  • ³²¹Ì
    • ¾Æ¸£ÇîÆ¼³ª
    • ºê¶óÁú
    • Ä¥·¹
    • ±âŸ ³²¹Ì
  • Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«
    • »ç¿ìµð¾Æ¶óºñ¾Æ
    • ¾Æ¶ø¿¡¹Ì¸®Æ®
    • īŸ¸£
    • ³²¾ÆÇÁ¸®Ä«°øÈ­±¹
    • ±âŸ Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«

Á¦10Àå ÁÖ¿ä ¹ßÀü

  • °è¾à, ÆÄÆ®³Ê½Ê, Çù¾÷, ÇÕÀÛÅõÀÚ
  • Àμö¿Í ÇÕº´
  • ½ÅÁ¦Ç° ¹ß¸Å
  • »ç¾÷ È®´ë
  • ±âŸ ÁÖ¿ä Àü·«

Á¦11Àå ±â¾÷ °³¿ä

  • Broadcom Inc.
  • Concentric.AI
  • Digital Guardian
  • Forcepoint Corporation
  • HelpSystem
  • IBM Corporation
  • Imperva Inc.
  • Informatica Corporation
  • INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Micro Focus International PLC
  • Netwrix Corporation
  • Nucleus Cyber
  • Orange Cyberdefense Inc.
  • SealPath
  • Seclore Inc.
  • Talend S.A.
  • Varonis Systems.
ksm 23.08.07

According to Stratistics MRC, the Global Data-centric Security Market is accounted for $5.11 billion in 2023 and is expected to reach $20.47 billion by 2030 growing at a CAGR of 21.9% during the forecast period. A novel method of preventing the theft or misuse of sensitive data is data-centric security. Global demand for data-centric security will increase due to a number of factors, including strict compliance and regulatory requirements and rising risks to enterprise data from the use of big data analytics, machine learning, and artificial intelligence.

According to Informatica, in 2019, the company noted over 5,000 data breaches with 8 billion records exposed.

Market Dynamics:

Driver:

Expanding demand for data-centric security options for cloud-based data security

The global Data-centric Security market expected to drive growth during the forecast period. In the cloud, data is expanding more quickly and is free to flow wherever it is needed by a workforce that is becoming more mobile. Businesses like IBM, Microsoft, and Google dominated the cloud market in 2020 and used cutting-edge technologies like AI and ML to analyze data. The market for data-centric security is anticipated to be driven by large and small businesses' growing need to protect data in the cloud. As an illustration, Informatica offers Intelligent Cloud ServicesSM, which include encryption at the operating system, database, and application levels, as well as failover data centers, user authentication, and access controls. However, the risk of data breaches has increased with the adoption of new devices, security and access patterns, and processes used to maintain cloud environments while working from home.

Restraint:

Organization's tolerance for inconvenience and security breaches caused by internal weaknesses

The global Data-centric Security market expected to hinder growth during the forecast period. IT can be viewed as both the root of and the solution to data security issues. It is seductive to think that an organization can only be protected from threats by using high-tech security measures. By adopting this attitude, organizations are able to avoid the organizational culture and behavior that contribute to information security risk. Due to the difficulty of the task, many organizations have not adopted a data-centric security approach. Instead of understanding data security, many CISOs are unable to put it into practice because they are unaware of how their data is used throughout the company. They only safeguard data on disks, applications, and other technology areas as a result, and data that moves between layers could easily become corrupt.

Opportunity:

Increased number of data breaches

The global Data-centric Security market expected to drive growth during the forecast period. Critical data is still at risk despite significant investments in infrastructure for privacy-related data protection. In 2019, over 5,000 data breaches were reported by Informatica, exposing 8 billion records. A quarter of all organizations experienced serious cyberattacks in the previous year, according to Trend Micro. 83% of respondents to their survey said they thought those attacks would be successful in the coming years. Cloud-based data is one of the main things businesses need to be concerned about. Data-centric security solutions will be adopted in the upcoming years as a result of the rise in data breaches within organizations.

Threat:

Lack of knowledge regarding data-centric security solutions

The global Data-centric Security market expected to hamper growth during the forecast period. The majority of organizations around the world are either unaware of potential threats and data-centric security solutions or, even when aware, still attempt to avoid them for a variety of reasons. The FBI claimed that, as a result, data leakage and extortion have significantly increased. The FBI also disclosed a startling USD 12.5 billion loss in 2018 as a result of a lack of awareness within an organization. This has caused data leakage and potential data misuse.

COVID-19 Impact:

The COVID-19 pandemic has altered digital technology usage and remote working practices. For the first time ever, millions of employees are working from home, and as a result, it is crucial for businesses to move their assets to the cloud and digital platforms while also taking the necessary security precautions, such as perimeter security and network security. Due to the rise in data breaches caused by the pandemic, businesses increased their security spending and adopted data-centric solutions to safeguard their data. Consequently, COVID-19 has a favorable effect on the market for data-centric security. In the near future, this is anticipated to indirectly drive the global market for data-centric security.

The On-Premises segment is expected to be the largest during the forecast period:

The On-Premises segment is expected to be the largest share during the forecast period. When it comes to on-premises deployments, all platforms, applications, systems, and data that can be handled and maintained by an organization's own IT staff are entirely within their control. The standard procedure for implementing security solutions and data-centric technology within an organization is called on-premises deployment. Companies that place a high priority on authentication and authorization will prefer an on-premises deployment because it gives them more control over the system. Because they cannot take the chance of losing private information, financial documents, financial statements, or transactional data, the government, defense, and BFSI industries demand on-site security. The demand for on-premises security products is growing on a global scale as a result of these factors.

The healthcare & pharmaceutical segment is expected to have the highest CAGR during the forecast period:

The healthcare & pharmaceutical segment is anticipated to witness the fastest CAGR growth during the forecast period. Data security is crucial to the healthcare vertical because it deals with sensitive patient information and personal health information that requires high security. Since most healthcare organizations place a greater emphasis on protecting customer data than internal data security, there is an increasing need to protect healthcare data within an organization. Implementing regulatory compliance, like HIPAA, aids in protecting databases and network gateways, as well as sensitive data security and identity protection through the use of digital signatures.

Region with largest share:

In the market for data-centric security, North America will hold the largest share during the forecast period, contributing significantly to market expansion. This is caused by a number of things, such as the rising use of cloud-based services, an increase in cyberattacks, and the requirement to adhere to strict data protection laws. Due to the presence of significant market players and significant investments in cutting-edge technologies, the United States in particular is the largest market in North America for data-centric security. Due to the significant amounts of sensitive data they handle, the healthcare and financial sectors are two of the main industries in North America driving the growth of the data-centric security market.

Region with highest CAGR:

During the forecast period, Asia-Pacific is anticipated to have the highest CAGR. Due to the increasing adoption of mobile devices in the region, APAC has been one of the regions with the fastest growth rates for the expansion of the mobile workforce. In order to prevent data theft, nations in the Asia-Pacific region like Australia, China, and Japan have widely adopted encryption technologies. Popular APAC nations like Singapore and India are moving forward with the adoption of superior data-centric security solutions. Businesses and SMEs in APAC are willing to implement specialized data-centric security solutions to safeguard their sensitive and important business data from cyberthreats, commercial espionage, and data misuse for financial gain by computer hackers. They are also acknowledging the significance of data-centric security.

Key players in the market

Some of the key players in Data-centric Security market include Broadcom Inc., Concentric.AI, Digital Guardian, Forcepoint Corporation, HelpSystem, IBM Corporation, Imperva Inc., Informatica Corporation, International Business Machines Corporation, Micro Focus International PLC, Netwrix Corporation, Nucleus Cyber, Orange Cyberdefense Inc., SealPath, Seclore Inc., Talend S.A. and Varonis Systems.

Key Developments:

In May 2022, Informatica announced a partnership with Oracle. Through this initiative, Oracle and Informatica have integrated Informatica's Intelligent Data Management Cloud with Oracle autonomous database, Oracle Exadata Database Service, and Oracle Object Storage. This new partnership will allow simplified migrations to OCI and increased data governance facility on OCI and IDMC.

In April 2022, Snowflake, a data cloud company, announced a partnership with Informatica leading to integration between the data cloud and Informatica's Intelligent Data Management Cloud (IDMC).

In April 2021, Google Cloud and Broadcom announce a strategic collaboration to increase innovation and broaden cloud services integration within the software franchises of Broadcom. The benefits of this partnership would be Broadcom being able to provide its suite of security and enterprise operations software on Google Cloud and Google Cloud's data and analytics services will support Broadcom's business decisions and its customers.

Components Covered:

  • Software and Solution
  • Professional Services
  • Other Components

Deployments Covered:

  • On-Premise
  • On Cloud
  • Other Deployments

Organization Sizes Covered:

  • Large Enterprise
  • Small and Medium-sized Enterprises (SME's)
  • Other Organization Sizes

End Users Covered:

  • BFSI (Banking, Financial Services and Insurance)
  • Government & Defense
  • Healthcare and Pharmaceuticals
  • IT and Enterprises
  • Manufacturing
  • Energy & Utilities
  • Packaging
  • Telecommunication
  • Retail & Consumer Goods
  • Other End Users

Regions Covered:

  • North America
    • US
    • Canada
    • Mexico
  • Europe
    • Germany
    • UK
    • Italy
    • France
    • Spain
    • Rest of Europe
  • Asia Pacific
    • Japan
    • China
    • India
    • Australia
    • New Zealand
    • South Korea
    • Rest of Asia Pacific
  • South America
    • Argentina
    • Brazil
    • Chile
    • Rest of South America
  • Middle East & Africa
    • Saudi Arabia
    • UAE
    • Qatar
    • South Africa
    • Rest of Middle East & Africa

What our report offers:

  • Market share assessments for the regional and country-level segments
  • Strategic recommendations for the new entrants
  • Covers Market data for the years 2021, 2022, 2023, 2026, and 2030
  • Market Trends (Drivers, Constraints, Opportunities, Threats, Challenges, Investment Opportunities, and recommendations)
  • Strategic recommendations in key business segments based on the market estimations
  • Competitive landscaping mapping the key common trends
  • Company profiling with detailed strategies, financials, and recent developments
  • Supply chain trends mapping the latest technological advancements

Free Customization Offerings:

All the customers of this report will be entitled to receive one of the following free customization options:

  • Company Profiling
    • Comprehensive profiling of additional market players (up to 3)
    • SWOT Analysis of key players (up to 3)
  • Regional Segmentation
    • Market estimations, Forecasts and CAGR of any prominent country as per the client's interest (Note: Depends on feasibility check)
  • Competitive Benchmarking
    • Benchmarking of key players based on product portfolio, geographical presence, and strategic alliances

Table of Contents

1 Executive Summary

2 Preface

  • 2.1 Abstract
  • 2.2 Stake Holders
  • 2.3 Research Scope
  • 2.4 Research Methodology
    • 2.4.1 Data Mining
    • 2.4.2 Data Analysis
    • 2.4.3 Data Validation
    • 2.4.4 Research Approach
  • 2.5 Research Sources
    • 2.5.1 Primary Research Sources
    • 2.5.2 Secondary Research Sources
    • 2.5.3 Assumptions

3 Market Trend Analysis

  • 3.1 Introduction
  • 3.2 Drivers
  • 3.3 Restraints
  • 3.4 Opportunities
  • 3.5 Threats
  • 3.6 End User Analysis
  • 3.7 Emerging Markets
  • 3.8 Impact of Covid-19

4 Porters Five Force Analysis

  • 4.1 Bargaining power of suppliers
  • 4.2 Bargaining power of buyers
  • 4.3 Threat of substitutes
  • 4.4 Threat of new entrants
  • 4.5 Competitive rivalry

5 Global Data-centric Security Market, By Component

  • 5.1 Introduction
  • 5.2 Software and Solution
    • 5.2.1 Data Discovery and Classification
    • 5.2.2 Data Protection
    • 5.2.3 Data Governance
    • 5.2.4 Data Risk & Compliance
    • 5.2.5 Data Privacy
  • 5.3 Professional Services
  • 5.4 Other Components

6 Global Data-centric Security Market, By Deployment

  • 6.1 Introduction
  • 6.2 On-Premise
  • 6.3 On Cloud
  • 6.4 Other Deployments

7 Global Data-centric Security Market, By Organization Size

  • 7.1 Introduction
  • 7.2 Large Enterprise
  • 7.3 Small and Medium-sized Enterprises (SME's)
  • 7.4 Other Organization Sizes

8 Global Data-centric Security Market, By End User

  • 8.1 Introduction
  • 8.2 BFSI (Banking, Financial Services and Insurance)
  • 8.3 Government & Defense
  • 8.4 Healthcare and Pharmaceuticals
  • 8.5 IT and Enterprises
  • 8.6 Manufacturing
  • 8.7 Energy & Utilities
  • 8.8 Packaging
  • 8.9 Telecommunication
  • 8.10 Retail & Consumer Goods
  • 8.11 Other End Users

9 Global Data-centric Security Market, By Geography

  • 9.1 Introduction
  • 9.2 North America
    • 9.2.1 US
    • 9.2.2 Canada
    • 9.2.3 Mexico
  • 9.3 Europe
    • 9.3.1 Germany
    • 9.3.2 UK
    • 9.3.3 Italy
    • 9.3.4 France
    • 9.3.5 Spain
    • 9.3.6 Rest of Europe
  • 9.4 Asia Pacific
    • 9.4.1 Japan
    • 9.4.2 China
    • 9.4.3 India
    • 9.4.4 Australia
    • 9.4.5 New Zealand
    • 9.4.6 South Korea
    • 9.4.7 Rest of Asia Pacific
  • 9.5 South America
    • 9.5.1 Argentina
    • 9.5.2 Brazil
    • 9.5.3 Chile
    • 9.5.4 Rest of South America
  • 9.6 Middle East & Africa
    • 9.6.1 Saudi Arabia
    • 9.6.2 UAE
    • 9.6.3 Qatar
    • 9.6.4 South Africa
    • 9.6.5 Rest of Middle East & Africa

10 Key Developments

  • 10.1 Agreements, Partnerships, Collaborations and Joint Ventures
  • 10.2 Acquisitions & Mergers
  • 10.3 New Product Launch
  • 10.4 Expansions
  • 10.5 Other Key Strategies

11 Company Profiling

  • 11.1 Broadcom Inc.
  • 11.2 Concentric.AI
  • 11.3 Digital Guardian
  • 11.4 Forcepoint Corporation
  • 11.5 HelpSystem
  • 11.6 IBM Corporation
  • 11.7 Imperva Inc.
  • 11.8 Informatica Corporation
  • 11.9 INTERNATIONAL BUSINESS MACHINES CORPORATION
  • 11.10 Micro Focus International PLC
  • 11.11 Netwrix Corporation
  • 11.12 Nucleus Cyber
  • 11.13 Orange Cyberdefense Inc.
  • 11.14 SealPath
  • 11.15 Seclore Inc.
  • 11.16 Talend S.A.
  • 11.17 Varonis Systems.
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦