This IDC study introduces IDC's new industry definitions and provides a detailed description of IDC's security products segmentation methodology and taxonomy. It should be used as a companion piece for IDC's Worldwide Security Spending Guide data deliverables. Technology suppliers may utilize this approach and structure as well to help them build an industry-focused organization."IDC's Worldwide Security Spending Guide taxonomy provides a comprehensive, global, and detailed map of the security marketplace," says Serena Da Rold, research director, IDC Spending Guides. "It is an invaluable resource to help vendors standardize definitions and identify industry and company size segments offering the best opportunities for security products."
IDC's Worldwide Security Spending Guide Taxonomy
Security Spending Guide Taxonomy Changes for 2025 Release V1
Technology Taxonomy Changes
Reminder of Key Taxonomy Changes in Prior Release
New IDC Industry Taxonomy
New Industries Selection Process
Taxonomy Overview
Definitions
What Is a Vertical Industry?
Economic Entities, Enterprises, and Establishments
IDC's Sector View and Associated Primary Vertical Markets
What Is a Sector?
Relationship to the Prior Framework
IDC's Company Size Taxonomy
Employee Count
IDC's Standard Company Size Segmentation
Note on Consumer Industry and Consumer Endpoint Security Software
Geography Taxonomy
Technology Taxonomy
Security Products and Services
Hardware
Information and Data Security Appliances
Information Protection Appliances
Messaging Security Appliances
Network Security Appliances
Trusted Network Access and Protection Appliances
Firewall
IDP
Secure Web Gateway
Unified Threat Management
VPN
Software
Cloud-Native Application Protection Platform
Endpoint Security Software
Consumer Digital Life Protection
Consumer/SOHO
Corporate Endpoint Security
Modern Endpoint Security
GRC and Forensics
eDiscovery and Forensics Applications
Governance, Risk, and Compliance Software
Identity and Access Management Software
Access
Customer Identity and Access Management
Identity Management
Privilege
Authentication
Privileged Access Management
Information and Data Security Software
Digital Trust
Information Protection
Messaging Security Software
Sensitive Data Management and Data Privacy
Network Security Software
Active Application Security
Trusted Network Access and Protection
Secure Access and Segmentation
Zero Trust Edge
Security Analytics Software
Security Information and Event Management
Vulnerability Management
Device Vulnerability Assessment
Software Vulnerability Assessment
Tier 2 SOC Analytics and Cloud-Native XDR
Orchestration and Automation Tools
Network Detection and Response
Threat Intelligence
Cloud-Native Extended Detection and Response
Services
Project Oriented
Consulting Services
Business Consulting
Custom Application Development
IT Consulting
Integration Services
Network Consulting and Integration
Systems Integration
Managed Security Services
Managed Security Business Services
Key Horizontal BPO
Managed Security Technology Services
Application Management
Hosted Application Management
Hosting Infrastructure Services
IT Outsourcing
Network and Endpoint Outsourcing Services
Support Services
IT Education and Training
Support Security Services
Hardware Deploy and Support
Software Deploy and Support
Learn More
Methodology
Exchange Rates
Overlap with Other IDC Spending Guide Research
Note on Alignment with Other IDC Security Forecast Products