Picture
SEARCH
What are you looking for?
Need help finding what you are looking for? Contact Us
Compare

PUBLISHER: IDC | PRODUCT CODE: 1432315

Cover Image

PUBLISHER: IDC | PRODUCT CODE: 1432315

IDC's Worldwide Security Products Taxonomy, 2024

PUBLISHED:
PAGES: 24 Pages
DELIVERY TIME: 1-2 business days
SELECT AN OPTION
PDF (Single User License)
USD 7500

Add to Cart

This IDC study presents IDC's taxonomy for security products. It provides definitions and a comprehensive detailed framework of security solutions in eight technology category markets. This taxonomy forms the foundation for IDC's market forecast and market shares for security products, IDC's Worldwide Semiannual Software Tracker, and IDC's Worldwide Semiannual Security Products Tracker."IDC's security products taxonomy provides a comprehensive and detailed framework for the security marketplace and is an essential resource for understanding how IDC defines and categorizes security solutions." - Monika Soltysik, senior research analyst, Security and Trust Products at IDC

Product Code: US51825024

IDC's Worldwide Security Products Taxonomy

Security Products Taxonomy Changes for 2024

  • Hierarchical Nomenclature

Definitions

  • Deployment Types
  • Revenue
  • Security Products Market
    • Cloud-Native Application Protection Platform
      • Cloud Security Posture Management
      • Cloud Workload Protection Platform
      • Cloud Infrastructure Entitlements Management
      • Infrastructure as Code (Scanning)
    • eDiscovery and Forensics
    • Endpoint Security
      • Corporate Endpoint Security
      • Consumer Digital Life Protection
    • Governance, Risk, and Compliance
    • Network Security
      • Trusted Network Access and Protection
      • Active Application Security
    • Identity and Access Management
      • Access
        • Identity Management
        • Customer Identity and Access Management
      • Legacy/Other
      • Privilege
        • Authentication/Advanced Authentication
        • Privileged Access Management
    • Information and Data Security
      • Information Protection
        • Messaging
        • Data Loss Technologies
        • Data Access Governance
        • Data Privacy and Compliance
      • Digital Trust
        • Encryption and Related Technologies
        • Key Management, Hardware Security Modules (HSMs), and Certificates
        • Database and Storage Security Tools
    • Security Analytics
      • SIEM and Vulnerability Management
        • Security Information and Event Management
        • Vulnerability Management
    • Tier 2 SOC Analytics and Cloud-Native XDR
      • Orchestration and Automation Tools
      • Network Security Analytics
        • Network Detection and Response
        • Threat Intelligence
      • Cloud-Native Extended Detection and Response

Learn More

  • Synopsis
Have a question?
Picture

Jeroen Van Heghe

Manager - EMEA

+32-2-535-7543

Picture

Christine Sirois

Manager - Americas

+1-860-674-8796

Questions? Please give us a call or visit the contact form.
Hi, how can we help?
Contact us!