¼¼°èÀÇ ¼¹ö¸®½º º¸¾È ½ÃÀå ±Ô¸ð, Á¡À¯À² ¹× µ¿Ç⠺м® º¸°í¼ : ¼ºñ½º ¸ðµ¨º°, º¸¾È À¯Çüº°, ¹èÆ÷ À¯Çüº°, ±â¾÷ ±Ô¸ðº°, ÃÖÁ¾»ç¿ëÀÚº°, Áö¿ªº°, ºÎ¹®º° ¿¹Ãø(2024-2030³â)
Serverless Security Market Size, Share & Trends Analysis Report By Service Model (FAAS, BAAS), By Security Type (Data Security, Network Security), By Deployment, By Enterprise Size, By End Use, By Region, And Segment Forecasts, 2024 - 2030
»óǰÄÚµå
:
1530424
¸®¼Ä¡»ç
:
Grand View Research
¹ßÇàÀÏ
:
2024³â 07¿ù
ÆäÀÌÁö Á¤º¸
:
¿µ¹® 120 Pages
¶óÀ̼±½º & °¡°Ý (ºÎ°¡¼¼ º°µµ)
¤± Add-on °¡´É: °í°´ÀÇ ¿äû¿¡ µû¶ó ÀÏÁ¤ÇÑ ¹üÀ§ ³»¿¡¼ CustomizationÀÌ °¡´ÉÇÕ´Ï´Ù. ÀÚ¼¼ÇÑ »çÇ×Àº ¹®ÀÇÇØ Áֽñ⠹ٶø´Ï´Ù.
»ùÇà ¿äû ¸ñ·Ï¿¡ Ãß°¡
¼¹ö¸®½º º¸¾È ½ÃÀå ±Ô¸ð ¹× µ¿Çâ
¼¼°è ¼¹ö¸®½º º¸¾È ½ÃÀå ±Ô¸ð´Â 2023³â 21¾ï 9,000¸¸ ´Þ·¯·Î ÃßÁ¤µÇ¸ç, 2024³âºÎÅÍ 2030³â±îÁö ¿¬Æò±Õ 30.8%ÀÇ ¼ºÀå·üÀ» º¸ÀÏ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. ¿î¿µ ºñ¿ë Àý°¨°ú È®À强 Çâ»óÀ» À§ÇØ ¼¹ö¸®½º ÄÄÇ»ÆÃÀ» ºü¸£°Ô µµÀÔÇÏ´Â Á¶Á÷, ¼¹ö¸®½º ȯ°æÀ» ³ë¸®´Â »çÀ̹ö À§ÇùÀÇ º¹À⼺°ú ºóµµ Áõ°¡, ¼¹ö¸®½º ¾ÆÅ°ÅØÃ³ÀÇ °íÀ¯ÇÑ ¹®Á¦¸¦ ÇØ°áÇÒ ¼ö ÀÖ´Â °·ÂÇÑ º¸¾È ¼Ö·ç¼Ç¿¡ ´ëÇÑ ¼ö¿ä Áõ°¡ µîÀÌ ½ÃÀå ¼ºÀåÀ» °ßÀÎÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. º¸¾È ¼Ö·ç¼Ç¿¡ ´ëÇÑ ¿ä±¸°¡ Áõ°¡ÇÏ¸é¼ ½ÃÀå ¼ºÀåÀ» °ßÀÎÇϰí ÀÖ½À´Ï´Ù.
Ŭ¶ó¿ìµå ÄÄÇ»ÆÃÀÇ »ç¿ë È®´ë´Â ¼¹ö¸®½º º¸¾È ½ÃÀåÀÇ Å« ¼ºÀå ¿äÀÎÀ¸·Î ÀÛ¿ëÇϰí ÀÖ½À´Ï´Ù. È®À强, À¯¿¬¼º, ºñ¿ë È¿À²¼ºÀ» Ȱ¿ëÇϱâ À§ÇØ Å¬¶ó¿ìµå ȯ°æÀ¸·ÎÀÇ ÀüȯÀÌ °¡¼Óȵǰí ÀÖ´Â °¡¿îµ¥, ±â¾÷µéÀº ¿î¿µ È¿À²¼º°ú ¾ÖÇø®ÄÉÀÌ¼Ç °³¹ß ¼Óµµ¸¦ ³ôÀ̱â À§ÇØ ¼¹ö¸®½º ¾ÆÅ°ÅØÃ³¸¦ µµÀÔÇϰí ÀÖ½À´Ï´Ù. ±×·¯³ª Ŭ¶ó¿ìµå ±â¹Ý ¼¹ö¸®½º ÀÎÇÁ¶ó·ÎÀÇ ÀüȯÀº ÀϽÃÀûÀÎ ±â´É º¸È£, Á¢±Ù Á¦¾î °ü¸®, ºÐ»êµÈ ȯ°æ Àü¹ÝÀÇ µ¥ÀÌÅÍ º¸È£ º¸Àå µî »õ·Î¿î º¸¾È ¹®Á¦¸¦ ¾ß±âÇÕ´Ï´Ù. ÀÌ¿¡ µû¶ó ¼¹ö¸®½º¿¡ Æ¯ÈµÈ º¸¾È ¼Ö·ç¼Ç¿¡ ´ëÇÑ ¼ö¿ä°¡ ±ÞÁõÇϰí ÀÖ½À´Ï´Ù. ±â¾÷µéÀº ÁøÈÇÏ´Â »çÀ̹ö À§ÇùÀ¸·ÎºÎÅÍ ¼¹ö¸®½º ¿ëµµ°ú µ¥ÀÌÅ͸¦ º¸È£Çϰí, ¾÷°è ±ÔÁ¤À» ÁؼöÇÏ´Â µ¿½Ã¿¡ ¼¹ö¸®½º ¿ëµµ°ú µ¥ÀÌÅ͸¦ º¸È£ÇϰíÀÚ ÇÕ´Ï´Ù.
¼¹ö¸®½º ȯ°æ¿¡ ¸Â´Â °·ÂÇÑ º¸¾È ´ëÃ¥¿¡ ´ëÇÑ ¿ä±¸°¡ ³ô¾ÆÁö¸é¼ ¼¹ö¸®½º º¸¾È ½ÃÀå È®´ë°¡ °¡¼Óȵǰí ÀÖ½À´Ï´Ù. À¯·´¿¬ÇÕ ÁýÇàÀ§¿øÈ¸¿¡ µû¸£¸é, 2023³â EU ±â¾÷ÀÇ 45.2%°¡ Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ ¼ºñ½º¸¦ ÀÌ¿ëÇϰí ÀÖÀ¸¸ç, ÁÖ·Î À̸ÞÀÏ ½Ã½ºÅÛ È£½ºÆÃ, À̸ÞÀÏ ÆÄÀÏ ÀúÀå, »ç¹«¿ë ¼ÒÇÁÆ®¿þ¾î¿¡ Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ ¼ºñ½º¸¦ ÀÌ¿ëÇÒ °ÍÀ¸·Î ¿¹»óÇß½À´Ï´Ù. ÀÌ Áß 75.3%ÀÇ ±â¾÷ÀÌ µ¥ÀÌÅͺ£À̽º, º¸¾È ¼ÒÇÁÆ®¿þ¾î ¿ëµµ, ¾ÖÇø®ÄÉÀÌ¼Ç °³¹ß, Å×½ºÆ® ¹× ¹èÆ÷¸¦ À§ÇÑ Ç÷§Æû È£½ºÆÃ µî °í±Þ Ŭ¶ó¿ìµå ¼ºñ½º¸¦ ¼±ÅÃÇϰí ÀÖ½À´Ï´Ù. ÀÌ´Â 2021³â ´ëºñ Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ ¼ºñ½º µµÀÔÀÌ 4.2% Áõ°¡ÇÑ ¼öÄ¡ÀÔ´Ï´Ù.
°³¹ß Áֱ⸦ ´ÜÃàÇϰí, Çù¾÷À» °³¼±Çϰí, ¹èÆ÷ È¿À²¼ºÀ» ³ôÀ̱â À§ÇÑ µ¥ºê¿É½º(DevOps)ÀÇ µµÀÔÀÌ Áõ°¡ÇÔ¿¡ µû¶ó ¼¹ö¸®½º ¾ÆÅ°ÅØÃ³¿¡ ´ëÇÑ ÀÇÁ¸µµ°¡ ³ô¾ÆÁö°í ÀÖ½À´Ï´Ù. ¼¹ö¸®½º ÄÄÇ»ÆÃÀº µ¥ºê¿É½º ÆÀÀÌ ±â¹Ý ÀÎÇÁ¶ó¸¦ °ü¸®ÇÒ ÇÊ¿ä ¾øÀÌ ÄÚµå °³¹ß ¹× ¹èÆ÷¿¡ ÁýÁßÇÒ ¼ö ÀÖµµ·Ï Áö¿øÇÏ¿© Çõ½Å ¼Óµµ¸¦ ³ôÀÌ°í ¿î¿µ º¹À⼺À» ÁÙÀÏ ¼ö ÀÖµµ·Ï µ½½À´Ï´Ù. ±×·¯³ª ÀÌ·¯ÇÑ º¯È´Â ½Å¿ø ¹× ¾×¼¼½º Á¦¾î °ü¸®, ÀáÀçÀû Ãë¾àÁ¡ ¸ð´ÏÅ͸µ, ¾÷°è Ç¥ÁØ Áؼö µî »õ·Î¿î º¸¾È ¹®Á¦¸¦ ¾ß±âÇÒ ¼ö ÀÖ½À´Ï´Ù. µû¶ó¼ ±â¾÷µéÀº ¼¹ö¸®½º ¾ÆÅ°ÅØÃ³°¡ Á¦°øÇÏ´Â ¹Îø¼º°ú È®À强À» À¯ÁöÇÏ¸é¼ ÀÌ·¯ÇÑ °úÁ¦¸¦ ÇØ°áÇÒ ¼ö ÀÖ´Â °·ÂÇÑ ¼¹ö¸®½º º¸¾È ¼Ö·ç¼Ç¿¡ ´ëÇÑ ¼ö¿ä°¡ ±ÞÁõÇϰí ÀÖ½À´Ï´Ù.
¿î¿µ È¿À²¼º, È®À强, ºñ¿ë È¿À²¼ºÀ» ³ôÀ̱â À§ÇØ ¼¹ö¸®½º ÄÄÇ»ÆÃÀ» µµÀÔÇÏ´Â ±â¾÷ÀÌ ´Ã°í ÀÖ½À´Ï´Ù. ¼¹ö¸®½º ¾ÆÅ°ÅØÃ³¸¦ ÅëÇØ ±â¾÷Àº ±â¹Ý ÀÎÇÁ¶ó °ü¸®¿¡ ´ëÇÑ ºÎ´ã ¾øÀÌ ¾ÖÇø®ÄÉÀÌ¼Ç °³¹ß ¹× ¹èÆ÷¿¡ ÁýÁßÇÒ ¼ö ÀÖ½À´Ï´Ù. ¼¹ö¸®½º µµÀÔÀÌ Áõ°¡ÇÔ¿¡ µû¶ó, ÀϽÃÀûÀÎ ±â´É º¸È£, ¾×¼¼½º Á¦¾î °ü¸®, ÄÄÇöóÀ̾𽺠º¸Àå µî ¼¹ö¸®½º ¸ðµ¨°ú °ü·ÃµÈ °íÀ¯ÇÑ ¹®Á¦¸¦ ÇØ°áÇϱâ À§ÇÑ Àü¹® º¸¾È ¼Ö·ç¼ÇÀÌ ÇÊ¿äÇÕ´Ï´Ù.
¼¹ö¸®½º ÄÄÇ»ÆÃÀ» ÅëÇØ ±â¾÷Àº ±â¹Ý ÀÎÇÁ¶ó¸¦ °ü¸® ¹× À¯Áöº¸¼öÇÒ Çʿ䰡 ¾ø¾îÁ® ÇÙ½É °³¹ß ¹× Çõ½Å¿¡ ÁýÁßÇÒ ¼ö ÀÖ°Ô µË´Ï´Ù. ¿î¿µÀÇ º¹À⼺À» ÁÙ¿© ºñ¿ëÀ» Àý°¨ÇÏ°í ¸®¼Ò½º ÇÒ´ç ¹× °ü¸®¸¦ °£¼ÒÈÇÒ ¼ö ÀÖ½À´Ï´Ù. ±â¾÷µéÀº ¼¹ö¸®½º ¾ÆÅ°ÅØÃ³¸¦ Ȱ¿ëÇÏ¿© ¿À¹öÇìµå¸¦ ÃÖ¼ÒÈÇϱâ À§ÇØ ¼¹ö¸®½º ¿ëµµ°ú µ¥ÀÌÅ͸¦ º¸È£ÇÒ ¼ö ÀÖ´Â °·ÂÇÑ º¸¾È ¼Ö·ç¼ÇÀÇ Çʿ伺À» ÀνÄÇϰí ÀÖ½À´Ï´Ù. ÀÌ¿¡ µû¶ó ¿î¿µ ºÎ´ãÀ» ´Ã¸®Áö ¾ÊÀ¸¸é¼µµ Á¾ÇÕÀûÀÎ º¸È£ ±â´ÉÀ» Á¦°øÇÏ´Â ¼¹ö¸®½º Àü¿ë º¸¾È Á¦Ç°¿¡ ´ëÇÑ ¼ö¿ä°¡ Áõ°¡Çϰí ÀÖ½À´Ï´Ù. ¼¹ö¸®½º ÄÄÇ»ÆÃÀÇ ºñ¿ë È¿À²¼º°ú ¿î¿µ °£¼ÒÈ´Â È¿°úÀûÀÎ º¸¾È¿¡ ´ëÇÑ Áß¿äÇÑ ¿ä±¸¿Í ÇÔ²² ¼¹ö¸®½º º¸¾È ½ÃÀåÀÇ ¼ºÀå¿¡ Å©°Ô ±â¿©Çϰí ÀÖ½À´Ï´Ù.
¼¼°è ¼¹ö¸®½º º¸¾È ½ÃÀå º¸°í¼ ±¸ºÐ
ÀÌ º¸°í¼´Â 2018³âºÎÅÍ 2030³â±îÁö ¼¼°è, Áö¿ª ¹× ±¹°¡º° ¸ÅÃâ ¼ºÀåÀ» ¿¹ÃøÇÏ°í °¢ ÇÏÀ§ ºÎ¹®ÀÇ ÃֽŠ»ê¾÷ µ¿Çâ¿¡ ´ëÇÑ ºÐ¼®À» Á¦°øÇÕ´Ï´Ù. Grand View Research´Â ¼ºñ½º ¸ðµ¨, º¸¾È À¯Çü, ¹èÆ÷, ±â¾÷ ±Ô¸ð, ÃÖÁ¾ ¿ëµµ, Áö¿ªº°·Î ¼¼°è ¼¹ö¸®½º º¸¾È ½ÃÀåÀ» ¼¼ºÐÈÇß½À´Ï´Ù.
¼ºñ½º ¸ðµ¨ Àü¸Á(¸ÅÃâ¾×, 2018-2030³â)
FaaS(Function as a Service)
¼ºñ½º·Î¼ÀÇ ¹é¿£µå(BaaS)
º¸¾È À¯Çüº° Àü¸Á(¸ÅÃâ¾×, 2018-2030³â)
µ¥ÀÌÅÍ º¸¾È
³×Æ®¿öÅ© º¸¾È
¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
°æ°è º¸¾È
±âŸ
¹ßÀü Àü¸Á(¸ÅÃâ¾×, 2018-2030³â)
Ŭ¶ó¿ìµå
¿ÂÇÁ·¹¹Ì½º
±â¾÷ ±Ô¸ð Àü¸Á(¸ÅÃâ¾×, 2018-2030³â)
Áß¼Ò±â¾÷
´ë±â¾÷
ÃÖÁ¾ ¿ëµµ Àü¸Á(¸ÅÃâ¾×, 2018-2030³â)
ÀºÇà/±ÝÀ¶¼ºñ½º/º¸Çè(BFSI)
°Ç°°ü¸®
¼Ò¸Å ¹× ÀüÀÚ»ó°Å·¡
IT ¹× Åë½Å
Á¤ºÎ ¹× °ø°ø ºÎ¹®
Á¦Á¶¾÷
¿¡³ÊÁö ¹× À¯Æ¿¸®Æ¼
±âŸ
Áö¿ªº° Àü¸Á(¸ÅÃâ¾×, 2018-2030³â)
ºÏ¹Ì
¹Ì±¹
ij³ª´Ù
¸ß½ÃÄÚ
µ¶ÀÏ
¿µ±¹
ÇÁ¶û½º
Áß±¹
Àεµ
ÀϺ»
È£ÁÖ
Çѱ¹
ºê¶óÁú
»ç¿ìµð¾Æ¶óºñ¾Æ
¾Æ¶ø¿¡¹Ì¸®Æ®(UAE)
³²¾ÆÇÁ¸®Ä«°øÈ±¹
¸ñÂ÷
Á¦1Àå Á¶»ç ¹æ¹ý°ú ¹üÀ§
Á¦2Àå ÁÖ¿ä ¿ä¾à
Á¦3Àå ¼¹ö¸®½º º¸¾È ½ÃÀå º¯¼ö, µ¿Çâ, ¹üÀ§
½ÃÀå ¼·Ð/°èÅë Àü¸Á
¾÷°è ¹ë·ùüÀÎ ºÐ¼®
½ÃÀå ¿ªÇÐ
½ÃÀå ¼ºÀå ÃËÁø¿äÀÎ ºÐ¼®
½ÃÀå ¼ºÀå ¾ïÁ¦¿äÀÎ ºÐ¼®
¾÷°è ±âȸ
¼¹ö¸®½º º¸¾È ºÐ¼® Åø
PorterÀÇ Five Forces ºÐ¼®
PESTEL ºÐ¼®
Á¦4Àå ¼¹ö¸®½º º¸¾È : ¼ºñ½º ¸ðµ¨ ÃßÁ¤¡¤µ¿Ç⠺м®
ºÎ¹® ´ë½Ãº¸µå
¼¹ö¸®½º º¸¾È : ¼ºñ½º ¸ðµ¨ º¯µ¿ ºÐ¼®, 2023³â ¹× 2030³â
Function as a Service (FaaS)
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
Backend as a Service (BaaS)
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
Á¦5Àå ¼¹ö¸®½º º¸¾È : º¸¾È À¯Çü ÃßÁ¤¡¤µ¿Ç⠺м®
ºÎ¹® ´ë½Ãº¸µå
¼¹ö¸®½º º¸¾È : º¸¾È À¯Çü º¯µ¿ ºÐ¼®, 2023³â ¹× 2030³â
µ¥ÀÌÅÍ º¸¾È
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
³×Æ®¿öÅ© º¸¾È
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
°æ°è º¸¾È
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
±âŸ
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
Á¦6Àå ¼¹ö¸®½º º¸¾È : µµÀÔ ÃßÁ¤¡¤µ¿Ç⠺м®
ºÎ¹® ´ë½Ãº¸µå
¼¹ö¸®½º º¸¾È : µµÀÔ º¯µ¿ ºÐ¼®, 2023³â ¹× 2030³â
¿ÂÇÁ·¹¹Ì½º
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
Ŭ¶ó¿ìµå
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
Á¦7Àå ¼¹ö¸®½º º¸¾È : ±â¾÷ ±Ô¸ð ÃßÁ¤¡¤µ¿Ç⠺м®
ºÎ¹® ´ë½Ãº¸µå
¼¹ö¸®½º º¸¾È : ±â¾÷ ±Ô¸ð º¯µ¿ ºÐ¼®, 2023³â ¹× 2030³â
Áß¼Ò±â¾÷
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
´ë±â¾÷
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
Á¦8Àå ¼¹ö¸®½º º¸¾È : ÃÖÁ¾ ¿ëµµ ÃßÁ¤¡¤µ¿Ç⠺м®
ºÎ¹® ´ë½Ãº¸µå
2023³â°ú 2030³â ÃÖÁ¾ ¿ëµµº° ¼¹ö¸®½º º¸¾È Á¡À¯À²
ÀºÇà/±ÝÀ¶¼ºñ½º/º¸Çè(BFSI)
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
ÇコÄɾî
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
¼Ò¸Å¾÷ ¹× E-Commerce
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
IT ¹× Åë½Å
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
Á¤ºÎ ¹× °ø°ø ºÎ¹®
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
Á¦Á¶¾÷
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
¿¡³ÊÁö ¹× À¯Æ¿¸®Æ¼
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
±âŸ
½ÃÀå ±Ô¸ð ÃßÁ¤°ú ¿¹Ãø, 2018-2030³â
Á¦9Àå ¼¹ö¸®½º º¸¾È ½ÃÀå : Áö¿ª ÃßÁ¤¡¤µ¿Ç⠺м®
¼¹ö¸®½º º¸¾È ½ÃÀå Á¡À¯À², Áö¿ªº°, 2023³â ¹× 2030³â
ºÏ¹Ì
½ÃÀå Ã߻ꡤ¿¹Ãø, 2018-2030³â
¼ºñ½º ¸ðµ¨º°, 2018³â-2030³â
º¸¾È À¯Çüº°, 2018³â-2030³â
Àü°³ Çüź°, 2018³â-2030³â
±â¾÷ ±Ô¸ðº°, 2018³â-2030³â
ÃÖÁ¾ ¿ëµµº°, 2018³â-2030³â
¹Ì±¹
ij³ª´Ù
¸ß½ÃÄÚ
À¯·´
¼ºñ½º ¸ðµ¨º°, 2018³â-2030³â
º¸¾È À¯Çüº°, 2018³â-2030³â
Àü°³ Çüź°, 2018³â-2030³â
±â¾÷ ±Ô¸ðº°, 2018³â-2030³â
ÃÖÁ¾ ¿ëµµº°, 2018³â-2030³â
¿µ±¹
µ¶ÀÏ
ÇÁ¶û½º
¾Æ½Ã¾ÆÅÂÆò¾ç
½ÃÀå Ã߻ꡤ¿¹Ãø, 2018-2030³â
¼ºñ½º ¸ðµ¨º°, 2018³â-2030³â
º¸¾È À¯Çüº°, 2018³â-2030³â
±â¾÷ ±Ô¸ðº°, 2018³â-2030³â
Àü°³ Çüź°, 2018³â-2030³â
ÃÖÁ¾ ¿ëµµº°, 2018³â-2030³â
Áß±¹
Àεµ
ÀϺ»
È£ÁÖ
Çѱ¹
¶óƾ¾Æ¸Þ¸®Ä«
½ÃÀå Ã߻ꡤ¿¹Ãø, 2018-2030³â
¼ºñ½º ¸ðµ¨º°, 2018³â-2030³â
º¸¾È À¯Çüº°, 2018³â-2030³â
±â¾÷ ±Ô¸ðº°, 2018³â-2030³â
Àü°³ Çüź°, 2018³â-2030³â
ÃÖÁ¾ ¿ëµµº°, 2018³â-2030³â
ºê¶óÁú
Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«
½ÃÀå Ã߻ꡤ¿¹Ãø, 2018-2030³â
¼ºñ½º ¸ðµ¨º°, 2018³â-2030³â
º¸¾È À¯Çüº°, 2018³â-2030³â
±â¾÷ ±Ô¸ðº°, 2018³â-2030³â
Àü°³ Çüź°, 2018³â-2030³â
ÃÖÁ¾ ¿ëµµº°, 2018³â-2030³â
¾Æ¶ø¿¡¹Ì¸®Æ®(UAE)
»ç¿ìµð¾Æ¶óºñ¾Æ
³²¾ÆÇÁ¸®Ä«°øÈ±¹
Á¦10Àå °æÀï ±¸µµ
ÁÖ¿ä ½ÃÀå ÁøÃâ±â¾÷ÀÇ ÃÖ±Ù µ¿Çâ°ú ¿µÇ⠺м®
±â¾÷ ºÐ·ù
±â¾÷ÀÇ ½ÃÀå Á¡À¯À² ºÐ¼®
±â¾÷ È÷Æ®¸Ê ºÐ¼®
Àü·« ¸ÅÇÎ
È®´ë
ÀμöÇÕº´(M&A)
ÆÄÆ®³Ê½Ê°ú Çù¾÷
½ÅÁ¦Ç° ¹ß¸Å
¿¬±¸°³¹ß
±â¾÷ °³¿ä
Aqua Security
Check Point Software Technologies
Datadog
Imperva
Palo Alto Networks
Protego
StackHawk
Thundra
Trend Micro
Zscaler
LSH
¿µ¹® ¸ñÂ÷
Serverless Security Market Size & Trends
The global serverless security market size was estimated at USD 2.19 billion in 2023 and is expected to grow at a CAGR of 30.8% from 2024 to 2030. The rapid adoption of serverless computing by organizations seeking to reduce operational costs and improve scalability, the increasing complexity and frequency of cyber threats targeting serverless environments, and the rising need for robust security solutions that can address the unique challenges of serverless architectures are driving the growth of the market.
The growing use of cloud computing is a significant growth driver for the serverless security market. As businesses increasingly migrate to cloud environments to leverage their scalability, flexibility, and cost-efficiency, they are also adopting serverless architectures to streamline operations and accelerate application development. However, this shift to cloud-based, serverless infrastructures introduces new security challenges, such as securing transient functions, managing access controls, and ensuring data protection across distributed environments. Therefore, the demand for specialized serverless security solutions has surged, as organizations seek to safeguard their serverless applications and data from evolving cyber threats while maintaining compliance with industry regulations.
This heightened need for robust security measures tailored to serverless environments is propelling the expansion of the serverless security market. According to the European Commission, in 2023, 45.2% of EU enterprises utilized cloud computing services, primarily for hosting email systems, storing electronic files, and office software. 75.3% of these enterprises chose advanced cloud services, which included hosting databases, security software applications, and platforms for application development, testing, or deployment. This represents a 4.2% point increase in the adoption of cloud computing services compared to 2021.
As organizations increasingly adopt DevOps methodologies to accelerate development cycles, improve collaboration, and enhance deployment efficiencies, the reliance on serverless architectures has also grown. Serverless computing allows DevOps teams to focus on code development and deployment without the need to manage the underlying infrastructure, leading to faster innovation and reduced operational complexity. However, this shift also introduces new security challenges, such as managing identity and access controls, monitoring for potential vulnerabilities, and ensuring compliance with industry standards. Therefore, the demand for robust serverless security solutions has surged, enabling organizations to address these challenges while maintaining the agility and scalability that serverless architectures provide.
Organizations increasingly use serverless computing to enhance operational efficiency, scalability, and cost-effectiveness. Serverless architectures allow businesses to focus on developing and deploying applications without the burden of managing the underlying infrastructure. As serverless adoption grows, there is a need for specialized security solutions to address the unique challenges associated with this model, such as securing transitory functions, managing access controls, and ensuring compliance.
Serverless computing eliminates the need for businesses to manage and maintain underlying infrastructure, allowing them to focus on core development and innovation. This reduction in operational complexity lowers costs and streamlines resource allocation and management. As organizations leverage serverless architectures to minimize overhead, they recognize the necessity of robust security solutions to protect their serverless applications and data. This drives the demand for specialized serverless security offerings that can provide comprehensive protection without adding to the operational burden. The cost efficiencies and operational simplicity of serverless computing, combined with the critical need for effective security, significantly contribute to the growth of the serverless security market.
Global Serverless Security Market Report Segmentation
The report forecasts revenue growth at global, regional, and country levels and provides an analysis of the latest industry trends in each of the sub-segments from 2018 to 2030. For this study, Grand View Research has segmented the global serverless security market based on service model, security type, deployment, enterprise size, end use, and region.
Service Model Outlook (Revenue, USD Million, 2018 - 2030)
Function as a Service (FaaS)
Backend as a Service (BaaS)
Security Type Outlook (Revenue, USD Million, 2018 - 2030)
Data Security
Network Security
Application Security
Perimeter Security
Others
Deployment Outlook (Revenue, USD Million, 2018 - 2030)
Cloud
On-Premise
Enterprise Size Outlook (Revenue, USD Million, 2018 - 2030)
SMEs
Large Enterprises
End Use Outlook (Revenue, USD Million, 2018 - 2030)
BFSI
Healthcare
Retail and E-commerce
IT and Telecommunications
Government and Public Sector
Manufacturing
Energy and Utilities
Others
Regional Outlook (Revenue, USD Million, 2018 - 2030)
North America
U.S.
Canada
Mexico
Germany
UK
France
China
India
Japan
Australia
South Korea
Brazil
Kingdom of Saudi Arabia
UAE
South Africa
Table of Contents
Chapter 1. Methodology and Scope
1.1. Market Segmentation and Scope
1.2. Market Definitions
1.3. Research Methodology
1.3.1. Information Procurement
1.3.2. Information or Data Analysis
1.3.3. Market Formulation & Data Visualization
1.3.4. Data Validation & Publishing
1.4. Research Scope and Assumptions
1.4.1. List of Data Sources
Chapter 2. Executive Summary
2.1. Market Outlook
2.2. Segment Outlook
2.3. Competitive Insights
Chapter 3. Serverless Security Variables, Trends, & Scope
3.1. Market Introduction/Lineage Outlook
3.2. Industry Value Chain Analysis
3.3. Market Dynamics
3.3.1. Market Drivers Analysis
3.3.2. Market Restraints Analysis
3.3.3. Industry Opportunities
3.4. Serverless Security Analysis Tools
3.4.1. Porter's Analysis
3.4.1.1. Bargaining power of the suppliers
3.4.1.2. Bargaining power of the buyers
3.4.1.3. Threats of substitution
3.4.1.4. Threats from new entrants
3.4.1.5. Competitive rivalry
3.4.2. PESTEL Analysis
3.4.2.1. Political landscape
3.4.2.2. Economic and Social landscape
3.4.2.3. Technological landscape
3.4.2.4. Environmental landscape
3.4.2.5. Legal landscape
Chapter 4. Serverless Security: Service Model Estimates & Trend Analysis
4.1. Segment Dashboard
4.2. Serverless Security: Service Model Movement Analysis, 2023 & 2030 (USD Million)
4.3. Function as a Service (FaaS)
4.3.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
4.4. Backend as a Service (BaaS)
4.4.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
Chapter 5. Serverless Security: Security Type Estimates & Trend Analysis
5.1. Segment Dashboard
5.2. Serverless Security: Security Type Movement Analysis, 2023 & 2030 (USD Million)
5.3. Data Security
5.3.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
5.4. Network Security
5.4.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
5.5. Application Security
5.5.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
5.6. Perimeter Security
5.6.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
5.7. Others
5.7.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
Chapter 6. Serverless Security: Deployment Estimates & Trend Analysis
6.1. Segment Dashboard
6.2. Serverless Security: Deployment Movement Analysis, 2023 & 2030 (USD Million)
6.3. On-premise
6.3.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
6.4. Cloud
6.4.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
Chapter 7. Serverless Security: Enterprise Size Estimates & Trend Analysis
7.1. Segment Dashboard
7.2. Serverless Security: Enterprise Size Movement Analysis, 2023 & 2030 (USD Million)
7.3. SMEs
7.3.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
7.4. Large Enterprises
7.4.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
Chapter 8. Serverless Security: End Use Estimates & Trend Analysis
8.1. Segment Dashboard
8.2. Serverless Security Share by End Use 2023 & 2030 (USD Million)
8.3. BFSI
8.3.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
8.4. Healthcare
8.4.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
8.5. Retail and E-commerce
8.5.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
8.6. IT and Telecommunications
8.6.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
8.7. Government and Public Sector
8.7.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
8.8. Manufacturing
8.8.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
8.9. Energy and Utilities
8.9.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
8.10. Others
8.10.1. Market size estimates and forecasts, 2018 - 2030 (USD Million)
Chapter 9. Serverless Security Market: Regional Estimates & Trend Analysis
9.1. Serverless Security Market Share, By Region, 2023 & 2030 (USD Million)
9.2. North America
9.2.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.2.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.2.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.2.4. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.2.5. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.2.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.2.7. U.S.
9.2.7.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.2.7.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.2.7.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.2.7.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.2.7.5. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.2.7.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.2.8. Canada
9.2.8.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.2.8.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.2.8.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.2.8.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.2.8.5. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.2.8.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.2.9. Mexico
9.2.9.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.2.9.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.2.9.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.2.9.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.2.9.5. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.2.9.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.3. Europe
9.3.1. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.3.2. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.3.3. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.3.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.3.5. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.3.6. UK
9.3.6.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.3.6.2. Market estimates and forecast by type, 2018 - 2030 (Revenue, USD Million)
9.3.6.3. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.3.6.4. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.3.6.5. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.3.7. Germany
9.3.7.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.3.7.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.3.7.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.3.7.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.3.7.5. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.3.7.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.3.8. France
9.3.8.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.3.8.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.3.8.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.3.8.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.3.8.5. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.3.8.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.4. Asia Pacific
9.4.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.4.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.4.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.4.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.4.5. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.4.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.4.7. China
9.4.7.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.4.7.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.4.7.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.4.7.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.4.7.5. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.4.7.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.4.8. India
9.4.8.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.4.8.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.4.8.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.4.8.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.4.8.5. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.4.8.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.4.9. Japan
9.4.9.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.4.9.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.4.9.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.4.9.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.4.9.5. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.4.9.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.4.10. Australia
9.4.10.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.4.10.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.4.10.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.4.10.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.4.10.5. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.4.10.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.4.11. South Korea
9.4.11.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.4.11.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.4.11.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.4.11.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.4.11.5. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.4.11.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.5. Latin America
9.5.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.5.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.5.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.5.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.5.5. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.5.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.5.7. Brazil
9.5.7.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.5.7.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.5.7.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.5.7.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.5.7.5. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.5.7.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.6. Middle East & Africa
9.6.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.6.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.6.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.6.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.6.5. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.6.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.6.7. UAE
9.6.7.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.6.7.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.6.7.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.6.7.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.6.7.5. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.6.7.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.6.8. Kingdom of Saudi Arabia
9.6.8.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.6.8.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.6.8.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.6.8.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.6.8.5. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.6.8.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
9.6.9. South Africa
9.6.9.1. Market Estimates and Forecasts, 2018 - 2030 (USD Million)
9.6.9.2. Market estimates and forecast by service model, 2018 - 2030 (Revenue, USD Million)
9.6.9.3. Market estimates and forecast by security type, 2018 - 2030 (Revenue, USD Million)
9.6.9.4. Market estimates and forecast by enterprise size, 2018 - 2030 (Revenue, USD Million)
9.6.9.5. Market estimates and forecast by deployment, 2018 - 2030 (Revenue, USD Million)
9.6.9.6. Market estimates and forecast by end use, 2018 - 2030 (Revenue, USD Million)
Chapter 10. Competitive Landscape
10.1. Recent Developments & Impact Analysis by Key Market Participants
10.2. Company Categorization
10.3. Company Market Share Analysis
10.4. Company Heat Map Analysis
10.5. Strategy Mapping
10.5.1. Expansion
10.5.2. Mergers & Acquisition
10.5.3. Partnerships & Collaborations
10.5.4. New Product Launches
10.5.5. Research And Development
10.6. Company Profiles
10.6.1. Aqua Security
10.6.1.1. Participant's Overview
10.6.1.2. Financial Performance
10.6.1.3. Product Benchmarking
10.6.1.4. Recent Developments
10.6.2. Check Point Software Technologies
10.6.2.1. Participant's Overview
10.6.2.2. Financial Performance
10.6.2.3. Product Benchmarking
10.6.2.4. Recent Developments
10.6.3. Datadog
10.6.3.1. Participant's Overview
10.6.3.2. Financial Performance
10.6.3.3. Product Benchmarking
10.6.3.4. Recent Developments
10.6.4. Imperva
10.6.4.1. Participant's Overview
10.6.4.2. Financial Performance
10.6.4.3. Product Benchmarking
10.6.4.4. Recent Developments
10.6.5. Palo Alto Networks
10.6.5.1. Participant's Overview
10.6.5.2. Financial Performance
10.6.5.3. Product Benchmarking
10.6.5.4. Recent Developments
10.6.6. Protego
10.6.6.1. Participant's Overview
10.6.6.2. Financial Performance
10.6.6.3. Product Benchmarking
10.6.6.4. Recent Developments
10.6.7. StackHawk
10.6.7.1. Participant's Overview
10.6.7.2. Financial Performance
10.6.7.3. Product Benchmarking
10.6.7.4. Recent Developments
10.6.8. Thundra
10.6.8.1. Participant's Overview
10.6.8.2. Financial Performance
10.6.8.3. Product Benchmarking
10.6.8.4. Recent Developments
10.6.9. Trend Micro
10.6.9.1. Participant's Overview
10.6.9.2. Financial Performance
10.6.9.3. Product Benchmarking
10.6.9.4. Recent Developments
10.6.10. Zscaler
10.6.10.1. Participant's Overview
10.6.10.2. Financial Performance
10.6.10.3. Product Benchmarking
10.6.10.4. Recent Developments
°ü·ÃÀÚ·á