¼¼°èÀÇ Â÷¼¼´ë ¹æÈ­º® ½ÃÀå ¿¹Ãø(-2032³â) : À¯Çüº°, ÄÄÆ÷³ÍÆ®º°, Àü°³ Çüź°, Á¶Á÷ ±Ô¸ðº°, ¿ëµµº°, ÃÖÁ¾ »ç¿ëÀÚº°, Áö¿ªº° ºÐ¼®
Next-Generation Firewall Market Forecasts to 2032 - Global Analysis By Type, Component, Deployment Mode, Organization Size, Application, End User and By Geography
»óǰÄÚµå : 1755887
¸®¼­Ä¡»ç : Stratistics Market Research Consulting
¹ßÇàÀÏ : 2025³â 06¿ù
ÆäÀÌÁö Á¤º¸ : ¿µ¹® 200+ Pages
 ¶óÀ̼±½º & °¡°Ý (ºÎ°¡¼¼ º°µµ)
US $ 4,150 £Ü 5,673,000
PDF (Single User License) help
PDF º¸°í¼­¸¦ 1¸í¸¸ ÀÌ¿ëÇÒ ¼ö ÀÖ´Â ¶óÀ̼±½ºÀÔ´Ï´Ù. Àμ⠰¡´ÉÇϸç Àμ⹰ÀÇ ÀÌ¿ë ¹üÀ§´Â PDF ÀÌ¿ë ¹üÀ§¿Í µ¿ÀÏÇÕ´Ï´Ù.
US $ 5,250 £Ü 7,177,000
PDF (2-5 User License) help
PDF º¸°í¼­¸¦ µ¿ÀÏ »ç¾÷Àå¿¡¼­ 5¸í±îÁö ÀÌ¿ëÇÒ ¼ö ÀÖ´Â ¶óÀ̼±½ºÀÔ´Ï´Ù. Àμâ´Â 5ȸ±îÁö °¡´ÉÇϸç Àμ⹰ÀÇ ÀÌ¿ë ¹üÀ§´Â PDF ÀÌ¿ë ¹üÀ§¿Í µ¿ÀÏÇÕ´Ï´Ù.
US $ 6,350 £Ü 8,681,000
PDF & Excel (Site License) help
PDF ¹× Excel º¸°í¼­¸¦ µ¿ÀÏ »ç¾÷ÀåÀÇ ¸ðµç ºÐÀÌ ÀÌ¿ëÇÒ ¼ö ÀÖ´Â ¶óÀ̼±½ºÀÔ´Ï´Ù. Àμâ´Â 5ȸ±îÁö °¡´ÉÇÕ´Ï´Ù. Àμ⹰ÀÇ ÀÌ¿ë ¹üÀ§´Â PDF ¹× Excel ÀÌ¿ë ¹üÀ§¿Í µ¿ÀÏÇÕ´Ï´Ù.
US $ 7,500 £Ü 10,253,000
PDF & Excel (Global Site License) help
PDF ¹× Excel º¸°í¼­¸¦ µ¿ÀÏ ±â¾÷ÀÇ ¸ðµç ºÐÀÌ ÀÌ¿ëÇÒ ¼ö ÀÖ´Â ¶óÀ̼±½ºÀÔ´Ï´Ù. Àμâ´Â 10ȸ±îÁö °¡´ÉÇϸç Àμ⹰ÀÇ ÀÌ¿ë ¹üÀ§´Â PDF ÀÌ¿ë ¹üÀ§¿Í µ¿ÀÏÇÕ´Ï´Ù.


Çѱ۸ñÂ÷

Stratistics MRC¿¡ µû¸£¸é ¼¼°èÀÇ Â÷¼¼´ë ¹æÈ­º® ½ÃÀåÀº 2025³â 49¾ï ´Þ·¯¸¦ Â÷ÁöÇÏ°í ¿¹Ãø ±â°£ µ¿¾È CAGRÀº 13.2%·Î ¼ºÀåÇϰí 2032³â¿¡´Â 116¾ï ´Þ·¯¿¡ ´ÞÇÒ °ÍÀ¸·Î ¿¹ÃøµË´Ï´Ù.

Â÷¼¼´ë ¹æÈ­º®(NGFW)Àº ±âÁ¸ÀÇ ¹æÈ­º® ±â´É°ú Çâ»óµÈ À§Çù °¨Áö ¹× ¹æÁö ±â´ÉÀ» ÅëÇÕÇÑ °í±Þ ³×Æ®¿öÅ© º¸¾È ¼Ö·ç¼ÇÀÔ´Ï´Ù. NGFW´Â ¾ÏȣȭµÈ Æ®·¡ÇÈÀ» ºÐ¼®ÇÏ°í ¾Ç¼ºÄڵ带 °¨ÁöÇÏ¸ç ¼¼ºÐÈ­µÈ ¾×¼¼½º Á¦¾î¸¦ ±¸ÇöÇÒ ¼ö ÀÖ½À´Ï´Ù.

Identity Theft Resource Center¿¡ µû¸£¸é ¹Ì±¹ÀÇ ÀºÇà ¹× ±ÝÀ¶ ¼½ÅÍ¿¡¼­ÀÇ µ¥ÀÌÅÍ À¯Ãâ ÇÇÇØÀÚ ¼ö´Â Áö³­ÇØ 3ºÐ±â¿¡ 1¾ï 6,000¸¸ ¸í¿¡ À̸£·¶À¸¸ç, 1ºÐ±â¿Í 2ºÐ±â¸¦ ´õÇÑ ¼ýÀÚ¿¡¼­ Áõ°¡Çß½À´Ï´Ù.

Ŭ¶ó¿ìµå ¹èÆ÷ È®´ë ¹× ÇÏÀ̺긮µå ȯ°æ

¿£ÅÍÇÁ¶óÀÌÁî°¡ ¿öÅ©·Îµå¸¦ ¸ÖƼŬ¶ó¿ìµå ¾ÆÅ°ÅØÃ³·Î ¸¶À̱׷¹À̼ÇÇÔ¿¡ µû¶ó ¹«´Ü ¾×¼¼½º¸¦ ¹æÁöÇϱâ À§ÇØ ³×Æ®¿öÅ© °æ°è º¸¾ÈÀÌ Áß¿äÇØÁö°í ÀÖ½À´Ï´Ù. ¿ø°Ý ±Ù¹«°ú ºÐ»ê ÀÎÇÁ¶ó½ºÆ®·°Ã³ÀÇ ºÎ»óÀº °ß°íÇÑ ¹æÈ­º® ¼Ö·ç¼ÇÀÇ Çʿ伺À» ´õ¿í ³ô¿©ÁÖ°í ÀÖ½À´Ï´Ù.

³ôÀº Ãʱâ ÅõÀÚ ¹× ÃÑ ¼ÒÀ¯ ºñ¿ë(TCO)

°í±Þ ¹æÈ­º® ¼Ö·ç¼ÇÀº ¹èÆ÷, À¯Áö º¸¼ö ¹× Á¤±âÀû ÀÎ ¾÷±×·¹À̵忡 »ó´çÇÑ ÀÚ±ÝÀ» ÇÊ¿ä·ÎÇÕ´Ï´Ù. NGFW¸¦ ±âÁ¸ IT ½Ã½ºÅÛ°ú ÅëÇÕÇÏ·Á¸é Àü¹® Áö½ÄÀÌ ÇÊ¿äÇÏ¸ç ¿î¿µ º¹À⼺ÀÌ Áõ°¡ÇÕ´Ï´Ù.

°ü¸®Çü º¸¾È ¼­ºñ½º(MSSP ¸ðµ¨) È®Àå

¿£ÅÍÇÁ¶óÀÌÁî°¡ »çÀ̹ö º¸¾È °ü¸® ¾Æ¿ô¼Ò½ÌÀÇ ÀÌÁ¡À» ÀνÄÇÔ¿¡ µû¶ó MSSP´Â ¹æÈ­º® ¼Ö·ç¼ÇÀ» Á¾ÇÕÀûÀÎ ¼­ºñ½º ¸ðµ¨¿¡ ÅëÇÕÇϰí ÀÖ½À´Ï´Ù. ÇÕ¸®ÀûÀÎ º¸¾È ¿î¿µÀ» ¿ä±¸ÇÏ´Â ±â¾÷Àº È®Àå °¡´ÉÇÑ MSSP ¼­ºñ½ºÀÇ ÇýÅÃÀ» ¹Þ°í ¸®¼Ò½º ÇÒ´çÀ» ÃÖÀûÈ­ÇÒ ¼ö ÀÖ½À´Ï´Ù.

´ëü º¸¾È ¼Ö·ç¼ÇÀÇ µîÀå

Á¦·Î Æ®·¯½ºÆ® ¾ÆÅ°ÅØÃ³¿Í AI¸¦ Ȱ¿ëÇÑ À§Çù ¿ÏÈ­ Çõ½ÅÀ¸·Î ³×Æ®¿öÅ© º¸¾È Àü·«ÀÌ À籸¼ºµÇ°í ÀÖ½À´Ï´Ù. Á¶Á÷Àº ÀüÅëÀûÀÎ ¹æÈ­º® ½Ã½ºÅÛ¿¡ ´ëÇÑ ÀÇÁ¸µµ¸¦ ³·Ãâ ¼ö ÀÖ½À´Ï´Ù. ¶ÇÇÑ Â÷¼¼´ë ħÀÔ ¹æ¾î ½Ã½ºÅÛ(NGIPS)°ú ¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ °æ°è(SDP) ±â¼úÀº º¸¾È ż¼¸¦ °­È­ÇÏ°í ½ÃÀå ¼ºÀåÀ» ¹æÇØÇÕ´Ï´Ù.

COVID-19ÀÇ ¿µÇâ:

ÆÒµ¥¹ÍÀº Á¶Á÷ÀÌ µðÁöÅÐ Çõ½Å¿¡ ´ëÇÑ ³ë·Â°ú ¿ø°Ý ±Ù¹« üÁ¦¸¦ °¡¼ÓÈ­ÇÔÀ¸·Î½á NGFW äÅÿ¡ ¿µÇâÀ» ¹ÌÃÆ½À´Ï´Ù. ±×·¯³ª °ø±Þ¸ÁÀÇ È¥¶õÀÌ ÀϽÃÀûÀ¸·Î Çϵå¿þ¾î °¡¿ë¼º¿¡ ¿µÇâÀ» ¹ÌÄ¡°í µµÀÔ ÇÁ·ÎÁ§Æ®°¡ Áö¿¬µÇ¾ú½À´Ï´Ù.

¿¹Ãø ±â°£ µ¿¾È ÅëÇÕ À§Çù °ü¸®(UTM) ºÐ¾ß°¡ ÃÖ´ë°¡ µÉ Àü¸Á

ÅëÇÕ À§Çù °ü¸®(UTM) ¿µ¿ªÀº ¿©·¯ º¸¾È ±â´ÉÀ» ´ÜÀÏ ¼Ö·ç¼Ç¿¡ ÅëÇÕÇÒ ¼ö Àֱ⠶§¹®¿¡ ¿¹Ãø ±â°£ µ¿¾È ÃÖ´ë ½ÃÀå Á¡À¯À²À» Â÷ÁöÇÒ °ÍÀ¸·Î ¿¹ÃøµË´Ï´Ù. ħÀÔ °¨Áö, ÄÁÅÙÃ÷ ÇÊÅ͸µ µîÀÇ ±â´ÉÀ» ÅëÇÕÇÑ UTM ¹æÈ­º®À» ä¿ëÇÏ´Â °æ¿ì°¡ ´Ã¾î³ª°í ÀÖ½À´Ï´Ù.

¿¹Ãø ±â°£ µ¿¾È ¿ëµµ ½Ã°¢È­ ¹× Á¦¾î ºÐ¾ßÀÇ CAGRÀÌ °¡Àå ³ô¾ÆÁú Àü¸Á

¿¹Ãø ±â°£ µ¿¾È ¿ëµµ °¡½Ã¼º ¹× Á¦¾î ºÐ¾ß´Â ±â¾÷ÀÌ ³×Æ®¿öÅ© Æ®·¡ÇÈ ¹× »ç¿ëÀÚ Çൿ¿¡ ´ëÇÑ º¸´Ù ±íÀº ÅëÂû·ÂÀ» ¿ä±¸Çϰí Àֱ⠶§¹®¿¡ °¡Àå ³ôÀº ¼ºÀå·üÀ» ³ªÅ¸³¾ °ÍÀ¸·Î ¿¹ÃøµË´Ï´Ù. °í±Þ ¿ëµµ °èÃþ °Ë»ç ±â´ÉÀ» °®Ãá NGFW¸¦ ÅëÇØ ±â¾÷Àº ¾×¼¼½º¸¦ ±ÔÁ¦ÇÏ°í ´ë¿ªÆø »ç¿ëÀ» ÃÖÀûÈ­ÇÏ¸ç º¸¾È Á¤Ã¥À» È¿°úÀûÀ¸·Î ±¸ÇöÇÒ ¼ö ÀÖ½À´Ï´Ù. ±â¾÷Àº °ü¸®ÀÚ°¡ ¹Î°¨ÇÑ ¿ëµµ¿¡ ´ëÇÑ ¹«´Ü ¾×¼¼½º¸¦ ÁÙÀÏ ¼ö ÀÖ´Â Çâ»óµÈ Á¦¾î ¸ÞÄ¿´ÏÁò¿¡¼­ ÀÌÀÍÀ» ¾òÀ» ¼ö ÀÖ½À´Ï´Ù.

ÃÖ´ë Á¡À¯À²À» Â÷ÁöÇÏ´Â Áö¿ª:

¿¹Ãø±â°£ µ¿¾È IT ÀÎÇÁ¶ó È®´ë, ±Þ¼ÓÇÑ µðÁöÅÐ º¯Çõ, »çÀ̹ö À§Çù Áõ°¡·Î ¾Æ½Ã¾ÆÅÂÆò¾çÀÌ °¡Àå Å« ½ÃÀå Á¡À¯À²À» Â÷ÁöÇÒ °ÍÀ¸·Î ¿¹ÃøµË´Ï´Ù. ÀÌ Áö¿ª Á¤ºÎ¿Í ±â¾÷Àº »çÀ̹ö º¸¾ÈÀÇ ³»¼ºÀ» °­È­Çϱâ À§ÇØ NGFW µµÀÔ¿¡ ÅõÀÚÇϰí ÀÖ½À´Ï´Ù. ¶ÇÇÑ Å¬¶ó¿ìµå ±¸Ãà ¹× µðÁöÅÐ ¹ðÅ· ³ë·ÂÀÇ ±ÞÁõÀ¸·Î °í±Þ ¹æÈ­º® ¼Ö·ç¼Ç¿¡ ´ëÇÑ ¼ö¿ä°¡ Áõ°¡Çϰí ÀÖ½À´Ï´Ù.

CAGRÀÌ °¡Àå ³ôÀº Áö¿ª:

¿¹Ãø ±â°£ µ¿¾È ºÏ¹Ì´Â ¾ö°ÝÇÑ »çÀ̹ö º¸¾È ±ÔÁ¤, º¸¾È ±â¼ú ÅõÀÚ Áõ°¡, NGFWÀÇ ±¤¹üÀ§ÇÑ ±â¾÷ µµÀÔÀ¸·Î °¡Àå ³ôÀº CAGRÀ» ³ªÅ¸³¾ °ÍÀ¸·Î ¿¹ÃøµË´Ï´Ù. ¾÷°è¿¡ °ü°è¾øÀÌ, ±â¾÷Àº »çÀü ´Éµ¿ÀûÀÎ À§Çù °¨Áö ¹× ÄÄÇöóÀ̾𽺠Á᫐ º¸¾È ÇÁ·¹ÀÓ¿öÅ©¸¦ ¼±È£Çϸç Â÷¼¼´ë ¹æÈ­º® ¼ö¿ä¸¦ °­È­Çϰí ÀÖ½À´Ï´Ù. »çÀ̹ö °ø°ÝÀÇ °íµµÈ­¿Í ½Ç½Ã°£ À§Çù ÀÎÅÚ¸®Àü½ºÀÇ Çʿ伺Àº ¹æÈ­º® ¼Ö·ç¼ÇÀÇ Áö¼ÓÀûÀÎ Çõ½ÅÀ» µÞ¹ÞħÇϰí ÀÖ½À´Ï´Ù.

»ç¿ëÀÚ Á¤ÀÇ ¹«·á Á¦°ø:

ÀÌ º¸°í¼­¸¦ ±¸µ¶ÇÏ´Â °í°´Àº ´ÙÀ½ ¹«·á ¸ÂÃã¼³Á¤ ¿É¼Ç Áß Çϳª¸¦ »ç¿ëÇÒ ¼ö ÀÖ½À´Ï´Ù.

¸ñÂ÷

Á¦1Àå ÁÖ¿ä ¿ä¾à

Á¦2Àå ¼­¹®

Á¦3Àå ½ÃÀå µ¿Ç⠺м®

Á¦4Àå Porter's Five Forces ºÐ¼®

Á¦5Àå ¼¼°èÀÇ Â÷¼¼´ë ¹æÈ­º® ½ÃÀå : À¯Çüº°

Á¦6Àå ¼¼°èÀÇ Â÷¼¼´ë ¹æÈ­º® ½ÃÀå : ÄÄÆ÷³ÍÆ®º°

Á¦7Àå ¼¼°èÀÇ Â÷¼¼´ë ¹æÈ­º® ½ÃÀå : Àü°³ Çüź°

Á¦8Àå ¼¼°èÀÇ Â÷¼¼´ë ¹æÈ­º® ½ÃÀå : Á¶Á÷ ±Ô¸ðº°

Á¦9Àå ¼¼°èÀÇ Â÷¼¼´ë ¹æÈ­º® ½ÃÀå : ¿ëµµº°

Á¦10Àå ¼¼°èÀÇ Â÷¼¼´ë ¹æÈ­º® ½ÃÀå : ÃÖÁ¾ »ç¿ëÀÚº°

Á¦11Àå ¼¼°èÀÇ Â÷¼¼´ë ¹æÈ­º® ½ÃÀå : Áö¿ªº°

Á¦12Àå ÁÖ¿ä ¹ßÀü

Á¦13Àå ±â¾÷ ÇÁ·ÎÆÄÀϸµ

JHS
¿µ¹® ¸ñÂ÷

¿µ¹®¸ñÂ÷

According to Stratistics MRC, the Global Next-Generation Firewall Market is accounted for $4.9 billion in 2025 and is expected to reach $11.6 billion by 2032 growing at a CAGR of 13.2% during the forecast period. Next-generation firewall (NGFW) is an advanced network security solution that integrates traditional firewall capabilities with enhanced threat detection and prevention features. It offers deep packet inspection, application-layer filtering, and intrusion prevention to safeguard against sophisticated cyber threats. Unlike conventional firewalls, NGFWs can analyze encrypted traffic, detect malware, and enforce granular access controls. By leveraging AI-driven analytics and real-time monitoring, they strengthen defense mechanisms across networks. NGFWs are essential for enterprises seeking robust security in dynamic digital environments.

According to the Identity Theft Resource Center, the number of data compromise victims in the banking and financial sector of the United States climbed to 160 million in Q3 last year, up from Q1 and Q2 combined. Cyber attackers are looking for the simplest way to build a financial gain assault against many financial services businesses.

Market Dynamics:

Driver:

Growing cloud adoption and hybrid environments

As enterprises shift workloads to multi-cloud architectures, securing network perimeters becomes critical to prevent unauthorized access. NGFWs offer integrated security features, including threat intelligence and behavioral analytics, enhancing protection against evolving cyber threats. The rise of remote work and decentralized infrastructure further reinforces the need for robust firewall solutions. Organizations are prioritizing scalable security measures to adapt to complex digital ecosystems.

Restraint:

High initial investment and total cost of ownership (TCO)

Advanced firewall solutions require substantial financial resources for deployment, maintenance, and periodic upgrades. Smaller businesses may struggle to allocate budgets for security infrastructure, limiting market penetration in certain sectors. Additionally, integrating NGFWs with existing IT systems necessitates specialized expertise, increasing operational complexities. Cost-sensitive organizations often explore alternative security options, affecting NGFW adoption rates in budget-constrained environments.

Opportunity:

Expansion of managed security services (MSSP model)

As businesses recognize the advantages of outsourced cybersecurity management, MSSPs are integrating firewall solutions into comprehensive service models. NGFWs enhance MSSP capabilities by offering real-time threat detection, secure cloud access, and centralized policy enforcement. Enterprises seeking streamlined security operations benefit from scalable MSSP offerings, optimizing resource allocation. The rising popularity of subscription-based security models is further driving demand for outsourced firewall management.

Threat:

Emergence of alternative security solutions

Innovations in zero-trust architecture and AI-driven threat mitigation are reshaping network security strategies. Organizations exploring cloud-native security frameworks and endpoint detection solutions may reduce reliance on traditional firewall systems. Additionally, next-generation intrusion prevention systems (NGIPS) and software-defined perimeter (SDP) technologies offer enhanced security postures hampering the market growth.

Covid-19 Impact:

The pandemic influenced NGFW adoption as organizations accelerated digital transformation efforts and remote work arrangements. Enterprises prioritized cloud security to accommodate distributed teams, increasing demand for advanced firewall solutions. However, supply chain disruptions temporarily affected hardware availability, delaying installation projects. Post-pandemic recovery efforts continue to drive market expansion, as businesses focus on securing hybrid infrastructures.

The unified threat management (UTM) segment is expected to be the largest during the forecast period

The unified threat management (UTM) segment is expected to account for the largest market share during the forecast period driven by its ability to consolidate multiple security functions into a single solution. Enterprises increasingly adopt UTM firewalls to simplify cybersecurity management, integrating features such as malware prevention, intrusion detection, and content filtering. The growing need for comprehensive protection against evolving threats further enhances the appeal of UTM solutions.

The application visibility and control segment is expected to have the highest CAGR during the forecast period

Over the forecast period, the application visibility and control segment is predicted to witness the highest growth rate as enterprises demand greater insights into network traffic and user behavior. NGFWs with advanced application-layer inspection capabilities enable organizations to regulate access, optimize bandwidth utilization, and enforce security policies effectively. Businesses benefit from enhanced control mechanisms, allowing administrators to mitigate unauthorized access to sensitive applications.

Region with largest share:

During the forecast period, the Asia Pacific region is expected to hold the largest market share owing to expanding IT infrastructure, rapid digital transformation, and increasing cyber threats. Governments and enterprises across the region are investing in NGFW deployments to strengthen cybersecurity resilience. Additionally, the surge in cloud adoption and digital banking initiatives amplifies the demand for advanced firewall solutions.

Region with highest CAGR:

Over the forecast period, the North America region is anticipated to exhibit the highest CAGR owing to stringent cybersecurity regulations, growing investment in security technologies, and widespread enterprise adoption of NGFWs. Businesses across industries prioritize proactive threat detection and compliance-driven security frameworks, reinforcing demand for next-generation firewalls. The increasing sophistication of cyberattacks and the need for real-time threat intelligence drive continuous innovation in firewall solutions.

Key players in the market

Some of the key players in Next-Generation Firewall Market include Cisco Systems, Fortinet, Juniper Networks, Palo Alto Networks, Forcepoint, Check Point Software Technologies, Dell Technologies, Huawei Technologies, Trend Micro, F5 Networks, FireEye (Mandiant), Imperva, SonicWall, McAfee (Trellix), Zscaler, Sophos and Barracuda Networks.

Key Developments:

In April 2025, Palo Alto Networks announced its intent to acquire Protect AI, a company specializing in AI-specific security solutions. The acquisition aims to help customers discover, manage, and protect against AI-related security risks.

In June 2025, Fortinet unveiled a new AI-powered Workspace Security Suite to protect modern enterprises. The suite offers comprehensive protection across email, browsers, and collaboration tools, addressing both external threats and insider risks.

In February 2025, Cisco expanded its partnership with NVIDIA to accelerate AI adoption in enterprises, focusing on AI-ready data centers. This collaboration aims to address the technical complexities and security demands of operating AI infrastructure.

Types Covered:

Components Covered:

Deployment Modes Covered:

Organization Sizes Covered:

Applications Covered:

End Users Covered:

Regions Covered:

What our report offers:

Free Customization Offerings:

All the customers of this report will be entitled to receive one of the following free customization options:

Table of Contents

1 Executive Summary

2 Preface

3 Market Trend Analysis

4 Porters Five Force Analysis

5 Global Next-Generation Firewall Market, By Type

6 Global Next-Generation Firewall Market, By Component

7 Global Next-Generation Firewall Market, By Deployment Mode

8 Global Next-Generation Firewall Market, By Organization Size

9 Global Next-Generation Firewall Market, By Application

10 Global Next-Generation Firewall Market, By End User

11 Global Next-Generation Firewall Market, By Geography

12 Key Developments

13 Company Profiling

(ÁÖ)±Û·Î¹úÀÎÆ÷¸ÞÀÌ¼Ç 02-2025-2992 kr-info@giikorea.co.kr
¨Ï Copyright Global Information, Inc. All rights reserved.
PC¹öÀü º¸±â