IDCÀÇ ¼¼°è º¸¾È ÁöÃâ °¡ÀÌµå ºÐ·ù : Release V1(2025³â)
IDC¢¥s Worldwide Security Spending Guide Taxonomy, 2025: Release V1, 2025
»óǰÄÚµå
:
1697055
¸®¼Ä¡»ç
:
IDC
¹ßÇàÀÏ
:
2025³â 03¿ù
ÆäÀÌÁö Á¤º¸
:
¿µ¹® 55 Pages
¶óÀ̼±½º & °¡°Ý (ºÎ°¡¼¼ º°µµ)
ÀÌ Á¶»ç º¸°í¼´Â IDCÀÇ »õ·Î¿î »ê¾÷ Á¤ÀǸ¦ ¼Ò°³Çϰí IDCÀÇ º¸¾È Á¦Ç° ¼¼ºÐÈ ±â¹ý°ú ºÐ·ù¹ý¿¡ ´ëÇØ ÀÚ¼¼È÷ ¼³¸íÇÕ´Ï´Ù. IDCÀÇ Àü ¼¼°è º¸¾È ÁöÃâ °¡À̵å(Worldwide Security Spending Guide) µ¥ÀÌÅÍ ¾ÆÆ¼ÆÑÆ®ÀÇ ÄÄÆÐ´Ï¾ð Á¶°¢À¸·Î »ç¿ëÇØ¾ß ÇÕ´Ï´Ù. ¡°IDCÀÇ Worldwide Security Spending Guide ºÐ·ù¹ýÀº º¸¾È ½ÃÀåÀÇ Á¾ÇÕÀûÀÌ°í ¼¼°èÀûÀÌ°í »ó¼¼ÇÑ Áöµµ¸¦ Á¦°øÇÕ´Ï´Ù. °ø±Þ¾÷ü°¡ Á¤ÀǸ¦ Ç¥ÁØÈÇÏ°í º¸¾È Á¦Ç°¿¡ ÃÖ»óÀÇ ±âȸ¸¦ Á¦°øÇÏ´Â ¾÷°è ¹× ±â¾÷ ±Ô¸ðÀÇ ºÎ¹®À» ½Äº°ÇÏ´Â µ¥ µµ¿òÀÌ µÇ´Â ±ÍÁßÇÑ ÀÚ¿øÀÔ´Ï´Ù.¡±¶ó°í IDC Spending Guides Á¶»ç ÀÌ»ç, ¼¿·¹³ª ´Ù ·Ñµå´Â ¸»ÇÕ´Ï´Ù.
IDCÀÇ Àü ¼¼°è º¸¾È ÁöÃâ °¡ÀÌµå ºÐ·ù
º¸¾È ÁöÃâ °¡ÀÌµå ºÐ·ù º¯°æ Release V1(2025³â)
- ±â¼ú ºÐ·ù º¯°æ
- ÀÌÀü ¸±¸®½ºÀÇ ÁÖ¿ä ºÐ·ù º¯°æ¿¡ ´ëÇÑ ¾Ë¸²
- »õ·Î¿î IDC ¾÷°è ºÐ·ù
- ½Å±Ô »ê¾÷ÀÇ ¼±Á¤ ÇÁ·Î¼¼½º
ºÐ·ù °³¿ä
Á¤ÀÇ
- ¼öÁ÷ »ê¾÷À̶õ ¹«¾ùÀΰ¡?
- °æÁ¦ ÁÖü, ±â¾÷, »ç¾÷ü
- IDCÀÇ ¼½ÅÍ ºä¿Í °ü·ÃµÈ ÁÖ¿ä ¼öÁ÷ ½ÃÀå
- ÀÌÀü ÇÁ·¹ÀÓ¿öÅ©¿ÍÀÇ °ü°è
- IDCÀÇ ±â¾÷ ±Ô¸ð ºÐ·ù
- IDCÀÇ Ç¥ÁØ ±â¾÷ ±Ô¸ð ±¸ºÐ
- ¼ÒºñÀÚ ¾÷°è¿Í ¼ÒºñÀÚ ¿£µåÆ÷ÀÎÆ® º¸¾È ¼ÒÇÁÆ®¿þ¾î¿¡ °üÇÑ ÁÖÀÇ»çÇ×
- Áö¿ª ºÐ·ù
- ±â¼ú ºÐ·ù
- º¸¾È Á¦Ç° ¹× ¼ºñ½º
- Çϵå¿þ¾î
- Á¤º¸ ¹× µ¥ÀÌÅÍ º¸¾È ±ÔÁ¤ Áؼö
- ³×Æ®¿öÅ© º¸¾È ±ÔÁ¤ Áؼö
- ½Å·ÚÇÒ ¼ö ÀÖ´Â ³×Æ®¿öÅ© ¾×¼¼½º ¹× º¸È£ ±ÔÁ¤ Áؼö
- ¹æÈº®
- IDP
- º¸¾È À¥ °ÔÀÌÆ®¿þÀÌ
- ÅëÇÕ À§Çù °ü¸®
- VPN
- ¼ÒÇÁÆ®¿þ¾î
- Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀÌ¼Ç º¸È£ Ç÷§Æû
- ¿£µåÆ÷ÀÎÆ® º¸¾È ¼ÒÇÁÆ®¿þ¾î
- ¼ÒºñÀÚ µðÁöÅÐ ¶óÀÌÇÁ º¸È£
- ±â¾÷ ¿£µåÆ÷ÀÎÆ® º¸¾È
- GRC¿Í Æ÷·»½Ä
- eDiscovery ¹× Æ÷·»½Ä ¾ÖÇø®ÄÉÀ̼Ç
- °Å¹ö³Í½º, ¸®½ºÅ©, ±ÔÁ¤ Áؼö ¼ÒÇÁÆ®¿þ¾î
- ¾ÆÀ̵§Æ¼Æ¼ ¹× ¾×¼¼½º °ü¸® ¼ÒÇÁÆ®¿þ¾î
- ¾×¼¼½º
- °í°´ ID ¹× ¾×¼¼½º °ü¸®
- ¾ÆÀ̵§Æ¼Æ¼ °ü¸®
- 񀀥
- Á¤º¸ ¹× µ¥ÀÌÅÍ º¸¾È ¼ÒÇÁÆ®¿þ¾î
- µðÁöÅÐ Æ®·¯½ºÆ®
- Á¤º¸ º¸È£
- ¸Þ½Ã¡ º¸¾È ¼ÒÇÁÆ®¿þ¾î
- ±â¹Ð µ¥ÀÌÅÍ °ü¸® ¹× µ¥ÀÌÅÍ ÇÁ¶óÀ̹ö½Ã
- ³×Æ®¿öÅ© º¸¾È ¼ÒÇÁÆ®¿þ¾î
- ¾×Ƽºê ¿ëµµ º¸¾È
- ½Å·ÚÇÒ ¼ö ÀÖ´Â ³×Æ®¿öÅ© ¾×¼¼½º ¹× º¸È£
- ¾ÈÀüÇÑ Á¢±Ù°ú ¼¼ºÐÈ
- Á¦·Î Æ®·¯½ºÆ® ¿§Áö
- º¸¾È ºÐ¼® ¼ÒÇÁÆ®¿þ¾î
- º¸¾È Á¤º¸ ¹× À̺¥Æ® °ü¸®
- Ãë¾à¼º °ü¸®
- µð¹ÙÀ̽ºÀÇ Ãë¾à¼º Æò°¡
- ¼ÒÇÁÆ®¿þ¾î Ãë¾à¼º Æò°¡
- Tier 2 SOC ºÐ¼® ¹× Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê XDR
- ¿ÀÄɽºÆ®·¹ÀÌ¼Ç ¹× ÀÚµ¿È µµ±¸
- ³×Æ®¿öÅ© °ËÃâ ¹× ÀÀ´ä
- À§Çù ÀÎÅÚ¸®Àü½º
- Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºêÀÇ È®Àå °ËÃâ°ú ´ëÀÀ
- ¼ºñ½º
- ÇÁ·ÎÁ§Æ® ÁöÇâ
- ÄÁ¼³ÆÃ ¼ºñ½º
- ºñÁî´Ï½º ÄÁ¼³ÆÃ
- Ä¿½ºÅÒ ¾ÖÇø®ÄÉÀÌ¼Ç °³¹ß
- ITÄÁ¼³ÆÃ
- ÅëÇÕ¼ºñ½º
- ³×Æ®¿öÅ© ÄÁ¼³ÆÃ°ú ÅëÇÕ
- ½Ã½ºÅÛ ÅëÇÕ
- ¸Å´ÏÁöµå ½ÃÅ¥¸®Æ¼ ¼ºñ½º
- °ü¸® º¸¾È ºñÁî´Ï½º ¼ºñ½º
- ¸Å´ÏÁöµå ½ÃÅ¥¸®Æ¼ ±â¼ú ¼ºñ½º
- ¾ÖÇø®ÄÉÀÌ¼Ç °ü¸®
- È£½ºÆ®Çü ¾ÖÇø®ÄÉÀÌ¼Ç °ü¸®
- È£½ºÆÃ ÀÎÇÁ¶ó ¼ºñ½º
- IT ¾Æ¿ô¼Ò½Ì
- ³×Æ®¿öÅ© ¹× ¿£µåÆ÷ÀÎÆ® ¾Æ¿ô¼Ò½Ì ¼ºñ½º
- Áö¿ø ¼ºñ½º
- IT ±³À° ¹× ±³À°
- º¸¾È ¼ºñ½º Áö¿ø
- Çϵå¿þ¾î µµÀÔ ¹× Áö¿ø
- ¼ÒÇÁÆ®¿þ¾î µµÀÔ ¹× Áö¿ø
Âü°í ÀÚ·á
- Á¶»ç ¹æ¹ý
- ´Ù¸¥ IDC ÁöÃâ °¡À̵å Á¶»ç¿ÍÀÇ Áߺ¹
- ´Ù¸¥ IDC º¸¾È ¿¹Ãø Á¦Ç°°úÀÇ ¹«°á¼º¿¡ °üÇÑ ÁÖ¼®
- ºÎ·Ï - ·¹°Å½Ã ¾÷°è ºÐ·ù
- °ü·Ã Á¶»ç
- ¿ä¾à
KTH
¿µ¹® ¸ñÂ÷
This IDC study introduces IDC's new industry definitions and provides a detailed description of IDC's security products segmentation methodology and taxonomy. It should be used as a companion piece for IDC's Worldwide Security Spending Guide data deliverables. Technology suppliers may utilize this approach and structure as well to help them build an industry-focused organization."IDC's Worldwide Security Spending Guide taxonomy provides a comprehensive, global, and detailed map of the security marketplace," says Serena Da Rold, research director, IDC Spending Guides. "It is an invaluable resource to help vendors standardize definitions and identify industry and company size segments offering the best opportunities for security products."
IDC's Worldwide Security Spending Guide Taxonomy
Security Spending Guide Taxonomy Changes for 2025 Release V1
- Technology Taxonomy Changes
- Reminder of Key Taxonomy Changes in Prior Release
- New IDC Industry Taxonomy
- New Industries Selection Process
Taxonomy Overview
Definitions
- What Is a Vertical Industry?
- Economic Entities, Enterprises, and Establishments
- IDC's Sector View and Associated Primary Vertical Markets
- Relationship to the Prior Framework
- IDC's Company Size Taxonomy
- IDC's Standard Company Size Segmentation
- Note on Consumer Industry and Consumer Endpoint Security Software
- Geography Taxonomy
- Technology Taxonomy
- Security Products and Services
- Hardware
- Information and Data Security Appliances
- Information Protection Appliances
- Messaging Security Appliances
- Network Security Appliances
- Trusted Network Access and Protection Appliances
- Firewall
- IDP
- Secure Web Gateway
- Unified Threat Management
- VPN
- Software
- Cloud-Native Application Protection Platform
- Endpoint Security Software
- Consumer Digital Life Protection
- Corporate Endpoint Security
- GRC and Forensics
- eDiscovery and Forensics Applications
- Governance, Risk, and Compliance Software
- Identity and Access Management Software
- Access
- Customer Identity and Access Management
- Identity Management
- Privilege
- Authentication
- Privileged Access Management
- Information and Data Security Software
- Digital Trust
- Information Protection
- Messaging Security Software
- Sensitive Data Management and Data Privacy
- Network Security Software
- Active Application Security
- Trusted Network Access and Protection
- Secure Access and Segmentation
- Zero Trust Edge
- Security Analytics Software
- Security Information and Event Management
- Vulnerability Management
- Device Vulnerability Assessment
- Software Vulnerability Assessment
- Tier 2 SOC Analytics and Cloud-Native XDR
- Orchestration and Automation Tools
- Network Detection and Response
- Threat Intelligence
- Cloud-Native Extended Detection and Response
- Services
- Project Oriented
- Consulting Services
- Business Consulting
- Custom Application Development
- IT Consulting
- Integration Services
- Network Consulting and Integration
- Systems Integration
- Managed Security Services
- Managed Security Business Services
- Managed Security Technology Services
- Application Management
- Hosted Application Management
- Hosting Infrastructure Services
- IT Outsourcing
- Network and Endpoint Outsourcing Services
- Support Services
- IT Education and Training
- Support Security Services
- Hardware Deploy and Support
- Software Deploy and Support
Learn More
- Methodology
- Overlap with Other IDC Spending Guide Research
- Note on Alignment with Other IDC Security Forecast Products
- Appendix - Legacy Industry Taxonomy
- Related Research
- Synopsis
°ü·ÃÀÚ·á