Stratistics MRC¿¡ µû¸£¸é ¼¼°èÀÇ »çÀ̹ö º¸¾È¿ë ºí·ÏüÀÎ ½ÃÀåÀº 2025³â¿¡ 1,230¾ï ´Þ·¯¸¦ Â÷ÁöÇÏ¸ç ¿¹Ãø ±â°£ Áß CAGRÀº 39.6%·Î ¼ºÀåÇϸç, 2032³â¿¡´Â 1Á¶ 2,707¾ï ´Þ·¯¿¡ ´ÞÇÒ °ÍÀ¸·Î ¿¹ÃøµË´Ï´Ù.
»çÀ̹ö º¸¾È¿ë ºí·ÏüÀÎÀº µ¥ÀÌÅÍÀÇ ¹«°á¼º, Åõ¸í¼º, »çÀ̹ö À§Çù¿¡ ´ëÇÑ º¹¿ø·ÂÀ» °ÈÇϱâ À§ÇÑ ºÐ»ê¿øÀå ±â¼úÀÇ ÀÀ¿ëÀÔ´Ï´Ù. ºÐ»êµÈ ³ëµå¿¡ °ÉÃÄ Á¤º¸¸¦ ÀúÀåÇÏ°í ¾ÏÈ£È ÇØ½Ã¸¦ »ç¿ëÇÔÀ¸·Î½á ºí·ÏüÀÎÀº º¯Á¶, ¹«´Ü Á¢±Ù, ´ÜÀÏ ÁöÁ¡ Àå¾ÖÀÇ À§ÇèÀ» ÁÙÀÔ´Ï´Ù. º»ÀÎ È®ÀÎ, ¾ÈÀüÇÑ µ¥ÀÌÅÍ °øÀ¯, °Å·¡ ÀÎÁõ¿¡ Ȱ¿ëµµ°¡ ³ô¾ÆÁö°í ÀÖ½À´Ï´Ù. ºí·ÏüÀÎ ±â·ÏÀÇ ºÒº¯¼º°ú ÃßÀû °¡´É¼ºÀº ¼½Å͸¦ ÃÊ¿ùÇÑ °ß°íÇÑ º¸¾È ÇÁ·¹ÀÓ¿öÅ©¸¦ Áö¿øÇϰí, Áß¿äÇÑ ½Ã½ºÅÛ ¹× µðÁöÅÐ ÀÎÇÁ¶ó¿¡ ´ëÇÑ ½Å·Ú¸¦ °ÈÇÕ´Ï´Ù.
ºí·ÏüÀÎ ±â¹Ý »çÀ̹ö º¸¾È ½Ã½ºÅÛ¿¡ ´ëÇÑ ¿¬±¸¿¡ µû¸£¸é ºÐ»êµÇ°í ºÒº¯ÀÇ ¿øÀåÀ» µµÀÔÇÏ¸é ¸ðµç »óÈ£ ÀÛ¿ëÀÌ °ËÁõ °¡´ÉÇϰí ÃßÀû °¡´ÉÇÑ À§Çù ÀÎÅÚ¸®Àü½º¸¦ ¾ÈÀüÇÏ°Ô °øÀ¯ÇÏ¿© ³»ºÎ À§ÇùÀ» ¿ÏÈÇÏ°í °øµ¿ ¹æ¾î¸¦ °³¼±ÇÒ ¼ö ÀÖ´Ù°í ÇÕ´Ï´Ù. °³¼±µÇ¾ú½À´Ï´Ù.
µ¥ÀÌÅÍ ¹«°á¼º ¹× Åõ¸í¼º Çâ»ó¿¡ ´ëÇÑ ¿ä±¸
ºí·ÏüÀÎÀÇ ºÒº¯ÀÇ ¿øÀå ±â´ÉÀº ¸ðµç °Å·¡°¡ ±â·ÏµÇ°í ÃßÀû °¡´ÉÇÑ Åõ¸íÇÑ ÇÁ·¹ÀÓ¿öÅ©¸¦ Á¦°øÇÏ¿© ºÎÁ¤ Á¶ÀÛÀÇ °¡´É¼ºÀ» ÁÙ¿©ÁÝ´Ï´Ù. ±â¾÷ÀÌ ±ÔÁ¦ Áؼö¿Í °¨»ç ´ëÀÀÀ» ¿ì¼±½ÃÇÏ´Â °¡¿îµ¥, ºí·ÏüÀÎÀº ³×Æ®¿öÅ© Àü¹ÝÀÇ µ¥ÀÌÅÍ °ËÁõÀ» À§ÇÑ ½Å·ÚÇÒ ¼ö ÀÖ´Â ¸ÞÄ¿´ÏÁòÀ» Á¦°øÇÕ´Ï´Ù. ±â¾÷Àº Á¢±Ù ÀÚ°Ý Áõ¸í ÀÎÁõ°ú ±â¹Ð ±â·Ï º¸È£¿¡ ÀÖÀ¸¸ç, ºí·ÏüÀÎÀÇ À¯¿ë¼ºÀ» ÀνÄÇϰí ÀÖ½À´Ï´Ù. ºÐ»êÇü ½Å¿ø È®ÀÎ ¹× °ËÁõ °¡´ÉÇÑ µ¥ÀÌÅÍ ±³È¯¿¡ ´ëÇÑ ¼ö¿ä°¡ Áõ°¡ÇÔ¿¡ µû¶ó »çÀ̹ö º¸¾È ºÐ¾ß¿¡¼ ºí·ÏüÀÎÀÇ Ã¤ÅÃÀÌ Áõ°¡Çϰí ÀÖ½À´Ï´Ù.
³ôÀº µµÀÔ ºñ¿ë°ú ÀÚ¿øÀ» ÇÊ¿ä·Î Çϴ Ư¼º
°³¹ß ±â¾÷Àº ºÐ»êÇü ¾ÆÅ°ÅØÃ³¿¡ ´ëÀÀÇϱâ À§ÇØ ±âÁ¸ ·¹°Å½Ã ½Ã½ºÅÛÀ» Àç°ËÅäÇØ¾ß Çϸç, ¸¹Àº °æ¿ì Ä¿½ºÅÒ °³¹ßÀÌ ÇÊ¿äÇÕ´Ï´Ù. ³ëµå ¹èÄ¡ ¹× ³×Æ®¿öÅ© È®À强À» Æ÷ÇÔÇÑ ÀÎÇÁ¶ó ºñ¿ëÀº Áß¼Ò±â¾÷¿¡°Ô À庮ÀÌ µÉ ¼ö ÀÖ½À´Ï´Ù. ¶ÇÇÑ ºí·ÏüÀΠȯ°æÀ» °ü¸®Çϱâ À§ÇØ ¼÷·ÃµÈ Àü¹®°¡¸¦ °í¿ëÇÏ´Â °ÍÀº ¿î¿µ ºñ¿ëÀ» Áõ°¡½Ãŵ´Ï´Ù. ƯÈ÷ ÆÛºí¸¯ ºí·ÏüÀÎÀÇ ¿¡³ÊÁö ¼Òºñ´Â ±â¾÷ º¸¾È ȯ°æÀÇ Áö¼Ó°¡´É¼º°ú ½ÇÇö °¡´É¼º¿¡ ´ëÇÑ ¿ì·Á¸¦ ´õ¿í ³ôÀ̰í ÀÖ½À´Ï´Ù.
ºÐ»êÇü º¸¾È µ¥ÀÌÅÍ ÀúÀå ¹× °¨»ç ÃßÀû
ºí·ÏüÀÎÀÇ ºÐ»êÇü ¿øÀå ÇÁ·¹ÀÓ¿öÅ©´Â Áß¾Ó ÁýÁᫎ ¼¹ö¿¡ ÀÇÁ¸ÇÏÁö ¾Ê°í ¾ÈÀüÇÑ µ¥ÀÌÅÍ ÀúÀåÀ» °¡´ÉÇÏ°Ô Çϸç, ´ÜÀÏ ÁöÁ¡ Àå¾Ö·Î ÀÎÇÑ Ãë¾à¼ºÀ» ÃÖ¼ÒÈÇÕ´Ï´Ù. ÀÌ ±â¼úÀº ½Ã½ºÅÛÀÇ ¸ðµç »óÈ£ ÀÛ¿ëÀ» ±â·ÏÇÏ´Â »ó¼¼ÇÑ °¨»ç ÃßÀûÀ» »ý¼ºÇÏ¿© °¡½Ã¼º°ú Ã¥ÀÓ¼ºÀ» °ÈÇÕ´Ï´Ù. ÀÌ·¯ÇÑ ±â´ÉÀº ÀÇ·á, ±ÝÀ¶, Á¤ºÎ µî ¹Î°¨ÇÑ Á¤º¸¸¦ ´Ù·ç´Â ºÐ¾ß¿¡¼ ¸Å¿ì Áß¿äÇÕ´Ï´Ù. °í±Þ ÇÕÀÇ ÇÁ·ÎÅäÄÝÀº °ËÁõµÈ Æ®·£Àè¼Ç¸¸ ±â·ÏµÇµµ·Ï º¸ÀåÇÏ¿© »çÀ̹ö º¸¾È ½Ã½ºÅÛÀÇ Á¤È®¼º°ú ½Å·Ú¼ºÀ» Çâ»ó½Ãŵ´Ï´Ù.
°³ÀÎŰ °ü¸®¿Í ÀÎÀû ¿À·ù
°³ÀÎŰÀÇ ºÐ½Ç, µµ³, À߸øµÈ °ü¸®´Â µ¹ÀÌų ¼ö ¾ø´Â µ¥ÀÌÅÍ À¯Ãâ ¹× Àڻ꿡 ´ëÇÑ Á¢±Ù Àå¾Ö¸¦ À¯¹ßÇÒ ¼ö ÀÖ½À´Ï´Ù. Ű º¸°ü ¹ÌÈí, ¼³Á¤ ¿À·ù¿Í °°Àº ÀÎÀ§ÀûÀÎ ½Ç¼ö´Â ±×·¸Áö ¾Ê¾Æµµ ¾ÈÀüÇÑ ½Ã½ºÅÛÀ» À§Çè¿¡ ºü¶ß¸± ¼ö ÀÖ½À´Ï´Ù. ¶ÇÇÑ Å»Áß¾ÓÈ È¯°æ¿¡¼ ÀÎÁõ Á¤º¸¸¦ Å»ÃëÇϱâ À§ÇÑ ÇÇ½Ì ¹æ¹ý¿¡ ´ëÇÑ ¿ì·Áµµ Ä¿Áö°í ÀÖ½À´Ï´Ù. °·ÂÇÑ ID º¹±¸ ¸ÞÄ¿´ÏÁòÀÌ ¾ø´Ù¸é, ºí·ÏüÀÎ ±â¹Ý »çÀ̹ö º¸¾È Ç÷§ÆûÀº ±âÁ¸ ½Ã½ºÅÛ°ú´Â ´Ù¸¥ ¹æ½ÄÀ¸·Î ¿ÏÈÇÒ ¼ö ÀÖ´Â À§Çè¿¡ ³ëÃâµÉ ¼ö ÀÖ½À´Ï´Ù.
ÆÒµ¥¹ÍÀº ±â¾÷ ¿î¿µÀÇ µðÁöÅÐȸ¦ °¡¼ÓÈÇϰí, »çÀ̹ö º¸¾È¿¡ ´ëÇÑ ¼ö¿ä ±ÞÁõ°ú ±âÁ¸ ÇÁ·¹ÀÓ¿öÅ©¿¡ ´ëÇÑ ÀçÆò°¡¸¦ Ã˹ßÇß½À´Ï´Ù. ¿ø°Ý ±Ù¹« ȯ°æÀ¸·Î ÀÎÇØ ±âÁ¸ º¸¾È ¸ðµ¨ÀÇ ÇѰ谡 µå·¯³ª¸é¼ ºí·ÏüÀÎÀÇ Å»Áß¾ÓÈ Á¢±Ù ¹æ½Ä¿¡ ´ëÇÑ °ü½ÉÀÌ ³ô¾ÆÁ³½À´Ï´Ù. ±×·¯³ª COVID-19 ±â°£ Áß ÀÚ¿øÀÌ Àü¿ëµÇ¸é¼ ÀϺΠºÐ¾ß¿¡¼ ºí·ÏüÀÎ ÅëÇÕ ÇÁ·ÎÁ§Æ®°¡ Áö¿¬µÇ°í ÀÖ½À´Ï´Ù. ź·ÂÀûÀ̰í ÃßÀû °¡´ÉÇÑ º¸¾È ÇÁ·ÎÅäÄÝÀÇ Çʿ伺ÀÌ ´ëµÎµÇ¸é¼ ºí·ÏüÀÎÀ» Àü·«ÀûÀÎ ·Îµå¸ÊÀ¸·Î ´Ù½Ã ²ø¾î¿Ã·È½À´Ï´Ù.
¿¹Ãø ±â°£ Áß ¼ÒÇÁÆ®¿þ¾î ¼Ö·ç¼Ç ºÎ¹®ÀÌ °¡Àå Å« ½ÃÀåÀ¸·Î ¼ºÀåÇÒ °ÍÀ¸·Î ¿¹ÃøµË´Ï´Ù.
¼ÒÇÁÆ®¿þ¾î ¼Ö·ç¼Ç ºÐ¾ß´Â È®À强°ú µµÀÔ ¿ëÀ̼ºÀ¸·Î ÀÎÇØ ¿¹Ãø ±â°£ Áß °¡Àå Å« ½ÃÀå Á¡À¯À²À» Â÷ÁöÇÒ °ÍÀ¸·Î ¿¹ÃøµË´Ï´Ù. ÀÌ·¯ÇÑ ¼Ö·ç¼ÇÀº ´ë±Ô¸ð Çϵå¿þ¾î º¯°æ ¾øÀÌ ¾ÏÈ£È, µ¥ÀÌÅÍ °ËÁõ, ID ÀÎÁõÀ» °ü¸®ÇÕ´Ï´Ù. º¥´õµéÀº ºí·ÏüÀÎÀÇ ÇÙ½É ÀÌÁ¡À» Á¦°øÇÏ¸é¼ ±âÁ¸ IT ÀÎÇÁ¶ó¿Í ÅëÇÕÇÒ ¼ö ÀÖ´Â ¸ðµâ½Ä Ç÷§ÆûÀ» ±¸ÃàÇϰí ÀÖ½À´Ï´Ù. »ç¿ëÀÚ Á¤ÀÇ °¡´ÉÇÑ ´ë½Ãº¸µå, ºÐ¼® Åø, API ±â¹Ý ÇÁ·¹ÀÓ¿öÅ©¸¦ ÅëÇØ ¸ð´ÏÅ͸µ ¹× À§Çù °¨Áö ±â´ÉÀ» °ÈÇß½À´Ï´Ù.
¿¹Ãø ±â°£ Áß ºÐ»ê¿øÀå±â¼ú(DLT) Ç÷§Æû ºÐ¾ß°¡ °¡Àå ³ôÀº CAGRÀ» ³ªÅ¸³¾ °ÍÀ¸·Î ¿¹ÃøµË´Ï´Ù.
¿¹Ãø ±â°£ Áß ºÐ»ê¿øÀå±â¼ú(DLT) Ç÷§Æû ºÐ¾ß´Â ¾ÈÀüÇÑ P2P Åë½Å, ¹®¼ °ËÁõ, Á¢±Ù Á¦¾î¸¦ À§ÇÑ °·ÂÇÑ ¾ÆÅ°ÅØÃ³¸¦ Á¦°øÇϹǷΠ°¡Àå ³ôÀº ¼ºÀå·üÀ» ³ªÅ¸³¾ °ÍÀ¸·Î ¿¹ÃøµË´Ï´Ù. ÇÕÀÇ ¾Ë°í¸®Áò°ú È®À强 ¼Ö·ç¼ÇÀÇ Çõ½ÅÀ¸·Î DLT´Â ´õ¿í ±â¾÷ Ä£ÈÀûÀ¸·Î º¯¸ðÇϰí ÀÖ½À´Ï´Ù. ±â¾÷Àº Ç÷§ÆûÀ» Ȱ¿ëÇÏ¿© ÃßÀû¼º°ú º¸¾ÈÀ» º¸ÀåÇÏ¸é¼ ºÎ¼¿Í ÆÄÆ®³Ê °£ µ¥ÀÌÅ͸¦ °øÀ¯ÇÒ ¼ö ÀÖ´Â Çã°¡ »ýŰ踦 ±¸ÃàÇϰí ÀÖ½À´Ï´Ù.
¿¹Ãø ±â°£ Áß ¾Æ½Ã¾ÆÅÂÆò¾çÀº ºí·ÏüÀÎ ¿¬±¸°³¹ß¿¡ ¸¹Àº ÅõÀÚ¸¦ Çϰí ÀÖÀ¸¹Ç·Î °¡Àå Å« ½ÃÀå Á¡À¯À²À» Â÷ÁöÇÒ °ÍÀ¸·Î ¿¹ÃøµË´Ï´Ù. ÀÌ Áö¿ªÀÇ Á¤ºÎ¿Í ±â¾÷Àº »çÀ̹ö À§ÇùÀ¸·ÎºÎÅÍ µðÁöÅÐ ÀÎÇÁ¶ó¸¦ º¸È£Çϱâ À§ÇÑ ½Ã¹ü ÇÁ·ÎÁ§Æ®¸¦ ÁøÇàÇϰí ÀÖ½À´Ï´Ù. Áß±¹, Àεµ, Çѱ¹ µîÀÇ ±¹°¡µéÀº °ø°ø¼ºñ½º, ±ÝÀ¶, Åë½Å ºÐ¾ß¿¡¼ ºí·ÏüÀÎÀ» µµÀÔÇϰí ÀÖ½À´Ï´Ù. ÀÌ Áö¿ªÀÇ ¿ªµ¿ÀûÀÎ ½ºÅ¸Æ®¾÷ »ýŰè¿Í À¯¸®ÇÑ ±ÔÁ¦ ±¸»óÀÌ ½ÃÀåÀÇ ¼º¼÷À» Áö¿øÇϰí ÀÖ½À´Ï´Ù.
¿¹Ãø ±â°£ Áß ºÏ¹Ì´Â ÷´Ü ±â¼ú ´ë±â¾÷ÀÇ ÁýÀû, ¼º¼÷ÇÑ µðÁöÅÐ »ýŰè, ±ÔÁ¦ ¸íÈ®¼º µîÀÇ ÇýÅÃÀ» ´©¸®°í ÀÖÀ¸¸ç, °¡Àå ³ôÀº CAGRÀ» º¸ÀÏ °ÍÀ¸·Î ¿¹ÃøµË´Ï´Ù. »çÀ̹ö º¸¾È ½ºÅ¸Æ®¾÷µéÀº ƯÈ÷ Ŭ¶ó¿ìµå º¸¾È°ú ID ÀÎÁõ ºÐ¾ß¿¡¼ ¼ºñ½º Æ÷Æ®Æú¸®¿À¸¦ °ÈÇϱâ À§ÇØ ºí·ÏüÀÎÀ» ºü¸£°Ô µµÀÔÇϰí ÀÖ½À´Ï´Ù. ¹Ì±¹ ¿¬¹æÁ¤ºÎ ±â°ü°ú ±ÝÀ¶±â°üÀº ¾ÈÀüÇÑ µ¥ÀÌÅÍ °ü¸®¿Í ºÎÁ¤ÇàÀ§ °¨Áö¸¦ À§ÇØ ºí·ÏüÀÎÀ» ¸ð»öÇϰí ÀÖ½À´Ï´Ù. µðÁöÅÐ ÀüȯÀÇ ÁøÇà°ú Àû±ØÀûÀÎ À§Çù ¿ÏÈ ³ë·ÂÀ¸·Î ºÏ¹Ì´Â »çÀ̹ö º¸¾È ºÐ¾ß¿¡¼ ºí·ÏüÀÎ Çõ½ÅÀÇ ºñ¿ÁÇÑ Åä¾çÀÌ µÇ°í ÀÖ½À´Ï´Ù.
According to Stratistics MRC, the Global Blockchain in Cybersecurity Market is accounted for $123.0 billion in 2025 and is expected to reach $1270.7 billion by 2032 growing at a CAGR of 39.6% during the forecast period. Blockchain in cybersecurity is the application of decentralized ledger technology to enhance data integrity, transparency, and resilience against cyber threats. By storing information across distributed nodes and using cryptographic hashing, blockchain mitigates risks of tampering, unauthorized access, and single-point failures. It is increasingly used for identity verification, secure data sharing, and transaction authentication. The immutability and traceability of blockchain records support robust security frameworks across sectors, bolstering trust in critical systems and digital infrastructures.
According to study on blockchain-based cybersecurity systems, implementing decentralized, immutable ledgers enabled secure sharing of threat intelligence ensuring all interactions were verifiable and traceable, thereby mitigating insider threats and improving collaborative defense.
Demand for enhanced data integrity and transparency
Blockchain's immutable ledger capabilities offer a transparent framework where every transaction is recorded and traceable, reducing the scope for unauthorized alterations. As businesses prioritize regulatory compliance and audit readiness, blockchain provides a trusted mechanism for data validation across networks. Enterprises are recognizing its utility in authenticating access credentials and securing sensitive records. The rising demand for decentralized identity verification and verifiable data exchange is propelling blockchain adoption in cybersecurity.
High implementation costs and resource intensive nature
Organizations must overhaul existing legacy systems to accommodate decentralized architectures, often requiring custom development. The cost of infrastructure, including node deployment and network scalability, presents a barrier for small and mid-sized enterprises. Moreover, on boarding skilled professionals to manage blockchain environments adds to operational expenses. Energy consumption, especially in public blockchains, has further raised concerns around sustainability and feasibility in enterprise security settings.
Decentralized secure data storage and audit trails
Blockchain's distributed ledger framework enables secure data storage without reliance on centralized servers, minimizing vulnerabilities from single-point failures. The technology creates detailed audit trails that log every system interaction, enhancing visibility and accountability. Such capabilities are crucial in sectors handling sensitive information, including healthcare, finance, and government. Advanced consensus protocols ensure only verified transactions are recorded, improving the accuracy and trustworthiness of cybersecurity systems.
Private key management and human error
Loss, theft, or mismanagement of private keys can result in irreversible data breaches or asset access failures. Human error, such as poor key storage or incorrect configuration, may compromise an otherwise secure system. There's also growing concern around phishing tactics designed to steal credentials in decentralized environments. Without robust identity recovery mechanisms, blockchain-based cybersecurity platforms face risk exposure that traditional systems may mitigate differently.
The pandemic accelerated the digitalization of enterprise operations, prompting a surge in cybersecurity demand and a re-evaluation of existing frameworks. Remote work setups exposed gaps in traditional security models, driving interest in blockchain's decentralized approach. However, resource diversion during COVID-19 delayed blockchain integration projects in several sectors. The need for resilient and traceable security protocols became evident, pushing blockchain back into strategic roadmaps.
The software solutions segment is expected to be the largest during the forecast period
The software solutions segment is expected to account for the largest market share during the forecast period due to their scalability and ease of deployment. These solutions manage encryption, data validation, and identity authentication without requiring extensive hardware modifications. Vendors are building modular platforms that can integrate with existing IT infrastructure while delivering blockchain's core benefits. Customizable dashboards, analytics tools, and API-driven frameworks enhance monitoring and threat detection capabilities.
The distributed ledger technology (DLT) platforms segment is expected to have the highest CAGR during the forecast period
Over the forecast period, the distributed ledger technology (DLT) platforms segment is predicted to witness the highest growth rate owing to the platforms offer robust architectures for secure peer-to-peer communication, document verification, and access control. Innovations in consensus algorithms and scalability solutions are making DLT more enterprise-friendly. Businesses are leveraging platforms to build permission ecosystems where data can be shared across departments or partners with traceability and security.
During the forecast period, the Asia Pacific region is expected to hold the largest market share due to substantial investments in blockchain research and development. Governments and enterprises in the region are rolling out pilot projects to secure digital infrastructure against cyber threats. Countries like China, India, and South Korea are implementing blockchain in public services, finance, and telecom sectors. The region's dynamic startup ecosystem and favorable regulatory initiatives are supporting market maturity.
Over the forecast period, the North America region is anticipated to exhibit the highest CAGR due to the region benefits from a concentration of tech giants, mature digital ecosystems, and regulatory clarity. Cybersecurity startups are rapidly adopting blockchain to enhance service portfolios, especially in cloud security and identity verification. U.S. federal agencies and financial institutions are exploring blockchain for secure data management and fraud detection. With ongoing digital transformation and proactive threat mitigation efforts, North America remains a fertile ground for blockchain innovation in cybersecurity.
Key players in the market
Some of the key players in Blockchain in Cybersecurity Market include IBM, Trail of Bits, SlowMist, SAP, Quantstamp, Oracle, OpenZeppelin, Microsoft, Hewlett Packard Enterprise (HPE), Halborn, Guardtime, Empirica S.A., Digital Asset Holdings, Cyber Infrastructure Pvt. Ltd., CertiK, BlockSec, Bitfury Group and Accenture.
In July 2025, IBM launched its new Power11 data center chips and servers, offering energy efficiency and near-zero planned software downtime. The Power11 line includes advanced ransomware detection (within a minute) and aims to simplify AI deployment with integrated software chip design.
In June 2025, Oracle and AMD announced a collaboration to offer Instinct MI355X GPU clusters on Oracle Cloud Infrastructure, enabling zettascale AI workloads. OCI users can access high-density AI training and inference capacity up to 131,072 MI355X GPUs with improved price-performance.
In April 2025, Accenture announced the Brainstorm AI 2025 series of global conferences, scheduled for London. Brainstorm AI highlights Accenture's position at the forefront of enabling AI transformation.