¾Æ½Ã¾ÆÅÂÆò¾ç(ÀϺ», Áß±¹ Á¦¿Ü)ÀÇ ID ¹× ¾×¼¼½º °ü¸® ½ÃÀå Á¡À¯À²(»ó¹Ý±â) : ID »ýŰèÀÇ ¼ºÀå°ú È¥¶õ ÆÄ¾Ç
Asia/Pacific (Excluding Japan and China) Identity and Access Management Market Shares, 1H24: Identifying Growth and Disruption in the Identity Ecosystem
»óǰÄÚµå : 1691005
¸®¼­Ä¡»ç : IDC
¹ßÇàÀÏ : 2025³â 03¿ù
ÆäÀÌÁö Á¤º¸ : ¿µ¹® 20 Pages
 ¶óÀ̼±½º & °¡°Ý (ºÎ°¡¼¼ º°µµ)
US $ 7,500 £Ü 10,851,000
PDF (Single User License) help
PDF º¸°í¼­¸¦ 1¸í¸¸ ÀÌ¿ëÇÒ ¼ö ÀÖ´Â ¶óÀ̼±½ºÀÔ´Ï´Ù. Àμâ´Â °¡´ÉÇϸç Àμ⹰ÀÇ ÀÌ¿ë ¹üÀ§´Â PDF ÀÌ¿ë ¹üÀ§¿Í µ¿ÀÏÇÕ´Ï´Ù.


Çѱ۸ñÂ÷

24³â »ó¹Ý±â¿¡ IAM ¼Ö·ç¼ÇÀº ´õ ÀÌ»ó ´Ü¼øÇÑ »çÀ̹ö º¸¾È ¿ä±¸»çÇ×ÀÌ ¾Æ´Ï¶ó ºñÁî´Ï½º Çõ½ÅÀÇ ÇÙ½É ÃàÀÌ µÇ¾ú½À´Ï´Ù. ±â¾÷µéÀº AI, ÀÚµ¿È­, ID ¸®½ºÅ© ºÐ¼®À» Ȱ¿ëÇÏ¿© »çÀ̹ö º¸¾È º¹¿ø·ÂÀ» °­È­Çϰí, Á¢¼Ó °Å¹ö³Í½º¸¦ °£¼ÒÈ­Çϸç, ±ÔÁ¤ Áؼö¸¦ ÃßÁøÇϰí ÀÖ½À´Ï´Ù. IAM ½ÃÀåÀÌ °è¼Ó ÁøÈ­ÇÔ¿¡ µû¶ó ±â¾÷Àº »çÀ̹ö À§ÇùÀÌ È®´ëµÇ´Â ½Ã´ë¿¡ µðÁöÅÐ ID, Ŭ¶ó¿ìµå µµÀÔ, ºÐ»êÇü Á¢¼Ó ¸ðµ¨ÀÇ ¹Ì·¡¸¦ È®º¸Çϱâ À§ÇØ ID Àü·«À» Çö´ëÈ­ÇØ¾ß ÇÕ´Ï´Ù. "ID °ü·Ã À§ÇùÀÌ Áõ°¡ÇÔ¿¡ µû¶ó ¾Æ½Ã¾ÆÅÂÆò¾ç(ÀϺ», Áß±¹ Á¦¿Ü)(APEJC)ÀÇ ±â¾÷µéÀº ÁøÈ­ÇÏ´Â °ø°Ý º¤Å͸¦ ¿ÏÈ­Çϱâ À§ÇØ AI ±â¹Ý ID À§Çù ŽÁö ¹× ´ëÀÀ(ITDR), À§Çè ÀûÀÀÇü ÀÎÁõ, ÀÚµ¿È­µÈ ID °Å¹ö³Í½º¿¡ ¿ì¼±¼øÀ§¸¦ µÎ°í ÀÖ½À´Ï´Ù. ¸ÖƼŬ¶ó¿ìµå ¹× ÇÏÀ̺긮µå ȯ°æ Àü¹Ý¿¡¼­ À߸øµÈ ±¸¼º, °úµµÇÑ ±ÇÇÑ, ÀÚ°ÝÁõ¸í ±â¹Ý °ø°Ý Ç¥¸éÀ» ÇØ°áÇϱâ À§ÇØ ID º¸¾È ż¼ °ü¸®(ISPM)·ÎÀÇ ÀüȯÀÌ ÀÌ·ç¾îÁö°í ÀÖ½À´Ï´Ù. ÇÑÆí, °³¹ß ¿î¿µ(DevOps), ¾ÖÇø®ÄÉÀÌ¼Ç ÇÁ·Î±×·¡¹Ö ÀÎÅÍÆäÀ̽º(API) ÅëÇÕ, AI ±â¹Ý ¿öÅ©·Îµå°¡ °ø°Ý Ç¥¸éÀ» È®ÀåÇÔ¿¡ µû¶ó ¸Ó½Å ID º¸¾ÈÀÌ Áß¿äÇØÁö°í ÀÖ½À´Ï´Ù. IDC ¾Æ½Ã¾ÆÅÂÆò¾çÀÇ »çÀ̹ö º¸¾È Á¦Ç° ¹× ¼­ºñ½º ºÎ¹® ¼ö¼® ¸®¼­Ä¡ ¸Å´ÏÀúÀÎ »ç½Ã ±×·Î¹ö´Â "°ø°ÝÀڵ麸´Ù ¾Õ¼­ ³ª°¡·Á¸é Á¶Á÷Àº IAM°ú º¸¾È ºÐ¼®À» ÅëÇÕÇϰí, Çൿ À§Çè ¸ðµ¨À» ÅëÇØ Áö¼ÓÀûÀÎ ÀÎÁõÀ» ½ÃÇàÇϸç, Àû½Ã Á¢¼Ó Á¦¾î ¹× ½Ç½Ã°£ ÀÌ»ó ¡ÈÄ Å½Áö¸¦ Áö¿øÇÏ´Â Á¦·Î Æ®·¯½ºÆ® ÇÁ·¹ÀÓ¿öÅ©¸¦ äÅÃÇØ¾ß ÇÕ´Ï´Ù."¶ó°í ¸»ÇÕ´Ï´Ù.

IDC ½ÃÀå Á¡À¯À² ¼öÄ¡

ÁÖ¿ä ¿ä¾à

±â¼ú °ø±Þ¾÷ü¿¡ ´ëÇÑ Á¶¾ð

½ÃÀå Á¡À¯À²

¿ÃÇØ¸¦ Çü¼ºÇÑ ±â¾÷

½ÃÀå »óȲ

Á¶»ç¹æ¹ý

½ÃÀå Á¤ÀÇ

°ü·Ã Á¶»ç

ksm
¿µ¹® ¸ñÂ÷

¿µ¹®¸ñÂ÷

In 1H24, IAM solutions were no longer just a cybersecurity requirement but a core pillar of business transformation. Organizations are leveraging AI, automation, and identity risk analytics to enhance cybersecurity resilience, streamline access governance, and drive compliance alignment. As the IAM market continues to evolve, enterprises must modernize their identity strategies to secure the future of digital identity, cloud adoption, and decentralized access models in an era of expanding cyberthreats."As identity-related threats escalate, enterprises in Asia/Pacific (excluding Japan and China) (APEJC) are prioritizing AI-driven identity threat detection and response (ITDR), risk-adaptive authentication, and automated identity governance to mitigate evolving attack vectors. The shift toward identity security posture management (ISPM) is addressing misconfigurations, excessive entitlements, and credential-based attack surfaces across multicloud and hybrid environments. Meanwhile, machine identity security is becoming critical, as development operations (DevOps), application programming interface (API) integrations, and AI-driven workloads expand the attack surface. To stay ahead of adversaries, organizations must integrate IAM with security analytics, enforce continuous authentication through behavioral risk models, and adopt a zero trust framework that enables just-in-time (JIT) access controls and real-time anomaly detection," says Sakshi Grover, senior research manager, Cybersecurity Products and Services, IDC Asia/Pacific.

IDC Market Share Figure

Executive Summary

Advice for Technology Suppliers

Market Share

Who Shaped the Year

Market Context

Methodology

Market Definition

Related Research

(ÁÖ)±Û·Î¹úÀÎÆ÷¸ÞÀÌ¼Ç 02-2025-2992 kr-info@giikorea.co.kr
¨Ï Copyright Global Information, Inc. All rights reserved.
PC¹öÀü º¸±â