ÀÌ º¸°í¼´Â ÁøÈÇÏ´Â º¸¾È ¼ºñ½º ½ÃÀåÀ» ÀÌÇØÇϱâ À§ÇÑ ÃֽŠÇÁ·¹ÀÓ¿öÅ©¸¦ Á¦°øÇÕ´Ï´Ù. Á¦·Î Æ®·¯½ºÆ® º¸¾È, DevSecOps ÄÁ¼³ÆÃ, »ê¾÷¿ë IoT º¸¾È, µ¥ÀÌÅÍ º¸È£ ¹× °Å¹ö³Í½º ¼ºñ½º µîÀÇ »õ·Î¿î Á¤Àǰ¡ Æ÷ÇԵǾî ÀÖ½À´Ï´Ù. ÀÌ ºÐ·ùü°è´Â º¸¾È ¿î¿µ, ÄÚµå °ËÅä, ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È Å×½ºÆ® µî¿¡¼ GenAI/¿¡ÀÌÀüÆ®Çü AIÀÇ ¿µÇâ¿¡ ÃÊÁ¡À» ¸ÂÃß¾ú½À´Ï´Ù. IDC »çÀ̹ö º¸¾È ÄÁ¼³ÆÃ ¹× Àü¹® º¸¾È ¼ºñ½º ¿¬±¸ Ã¥ÀÓÀÚ Cathy Huxley´Â "º¸¾ÈÀ» À§ÇÑ GenAI/¿¡ÀÌÀüÆ® AI°¡ ¼³¸í°¡´É¼º, ½Å·Ú¼º, ½Å·Ú¼ºÀ» Çâ»ó½ÃÅ´¿¡ µû¶ó Á¶Á÷Àº AI ±â¹Ý º¸¾È Çõ½ÅÀ» äÅÃÇϰí ÀÖÀ¸¸ç, º¸¾È ¼ºñ½º Á¦°ø¾÷ü´Â ÀÌ·¯ÇÑ º¯È¿¡ Áß¿äÇÑ ¿ªÇÒÀ» ´ã´çÇϰí ÀÖ½À´Ï´Ù."¶ó°í ¸»Çß½À´Ï´Ù.
IDCÀÇ ¼¼°è º¸¾È ¼ºñ½º ºÐ·ù
2025³â º¸¾È ¼ºñ½º ºÐ·ù º¯°æ
ºÐ·ù °³¿ä
- »ý¼ºÇü AI/¿¡ÀÌÀüÆ® AIÀÇ ¿µÇâ·Â ÀνÄÇϱâ
°èÃþÀû ¸ÅÇÎ: º¸¾È ¼ºñ½ºÀÇ 1Â÷/2Â÷ ½ÃÀå
Á¤ÀÇ
- Àü¹® º¸¾È ¼ºñ½º
- »çÀ̹ö º¸¾È ÄÁ¼³ÆÃ
- Àü·«°ú °èȹ
- »çÀ̹ö º¸¾È ¾ÆÅ°ÅØÃ³ Æò°¡ ¹× ¼³°è
- »çÀ̹ö º¸¾È Æò°¡
- »çÀ̹ö º¹¿ø·Â ÄÁ¼³ÆÃ
- °Å¹ö³Í½º, ¸®½ºÅ© ¹× ÄÄÇöóÀ̾ð½º
- ÇÁ¶óÀ̹ö½Ã ÄÁ¼³ÆÃ
- °Å¹ö³Í½º ÄÁ¼³ÆÃ
- ¸®½ºÅ© ÄÁ¼³ÆÃ
- ÄÄÇöóÀ̾𽺠ÄÁ¼³ÆÃ
- GRC »çÀ̹ö º¸¾È Æò°¡ ¼ºñ½º
- »ç°í ´ëÀÀ ¹× ´ëºñ
- »ç°í ´ëÀÀ
- »ç°í ´ëÀÀ
- ¹ýÀÇÇÐ
- ±¸Çö ¹× ÅëÇÕ
- º¸¾È ±¸Çö ¼ºñ½º
- µµÀÔ ¼ºñ½º
- ±³À° ¼ºñ½º
- °ü¸®Çü º¸¾È ¼ºñ½º
- °ü¸®Çü °¨Áö ¹× ´ëÀÀ
- Ç»¾îÇ÷¹ÀÌ MDR/MXDR
- °ü¸®Çü EDR
- °ü¸®Çü SIEM
- °ü¸®Çü À§Çù »ç³É
- °ü¸®Çü º¸È£ ¹× Á¦¾î
- °ü¸®Çü ³×Æ®¿öÅ© º¸¾È
- °ü¸®Çü ¿£µåÆ÷ÀÎÆ® º¸¾È
- °ü¸®Çü ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
- °ü¸®Çü µ¥ÀÌÅÍ º¸¾È
- °ü¸®Çü ID/PAM
- °ü¸®Çü º¸¾È ±â´É
- ¸Å´ÏÁöµå Ŭ¶ó¿ìµå º¸¾È ¼ºñ½º
- °ü¸®Çü GRC
- °ü¸®Çü ÇÁ¶óÀ̹ö½Ã
- °ü¸®Çü Ãë¾àÁ¡ °ü¸® ¼ºñ½º
- ¸Å´ÏÁöµå »çÀ̹ö º¹±¸
- ½ÅÈï º¸¾È ¼ºñ½º
Âü°íÀÚ·á
This IDC study provides an updated framework for understanding the evolving security services market. It includes new definitions for zero trust security, DevSecOps consulting, industrial IoT security, and data protection and governance services, among others. The taxonomy highlights the impact of GenAI/agentic AI in security operations, code review, and application security testing, among other security functions. "As GenAI/agentic AI for security advances in explainability, reliability, and trustworthiness, organizations are adopting AI-driven security transformations, with security service providers playing a crucial role in this evolution," said Cathy Huang, research director, Cybersecurity Consulting and Professional Security Services at IDC.
IDC's Worldwide Security Services Taxonomy
Security Services Taxonomy Changes for 2025
Taxonomy Overview
- Recognizing the Impact of Generative AI/Agentic AI
Hierarchical Mapping: Security Services Primary/Secondary Markets
Definitions
- Professional Security Services
- Cybersecurity Consulting
- Strategy and Planning
- Cybersecurity Architecture Assessment and Design
- Cybersecurity Assessments
- Cyber-Resilience Consulting
- Governance, Risk, and Compliance
- Privacy Consulting
- Governance Consulting
- Risk Consulting
- Compliance Consulting
- GRC Cybersecurity Assessment Services
- Incident Response and Readiness
- Incident Response
- Incident Readiness
- Forensics
- Implementation and Integration
- Security Implementation Services
- Deployment Services
- Training Services
- Managed Security Services
- Managed Detection and Response
- Pure-Play MDR/MXDR
- Managed EDR
- Managed SIEM
- Managed Threat Hunting
- Managed Protection and Controls
- Managed Network Security
- Managed Endpoint Security
- Managed Application Security
- Managed Data Security
- Managed Identity/PAM
- Managed Security Functions
- Managed Cloud Security Services
- Managed GRC
- Managed Privacy
- Managed Vulnerability Management Services
- Managed Cyber-Recovery
- Emerging Security Services
- Quantum-Safe Security Services
Learn More
- Related Research
- Synopsis