
IDC's Worldwide Security Products Taxonomy, 2022
Description
IDC's Worldwide Security Products Taxonomy, 2022
This IDC study presents IDC's taxonomy for security products. It provides definitions and a comprehensive detailed framework of security solutions in six technology category markets. This taxonomy forms the foundation for IDC's market forecast and market shares for security products, IDC's Worldwide Semiannual Software Tracker, and IDC's Worldwide Semiannual Security Products Tracker."IDC's security products taxonomy provides a comprehensive and detailed framework for the security marketplace and is an essential resource for understanding how IDC defines and categorizes security solutions." — Monika Soltysik, senior research analyst, Security and Trust Products at IDC
Please Note: Extended description available upon request.
This IDC study presents IDC's taxonomy for security products. It provides definitions and a comprehensive detailed framework of security solutions in six technology category markets. This taxonomy forms the foundation for IDC's market forecast and market shares for security products, IDC's Worldwide Semiannual Software Tracker, and IDC's Worldwide Semiannual Security Products Tracker."IDC's security products taxonomy provides a comprehensive and detailed framework for the security marketplace and is an essential resource for understanding how IDC defines and categorizes security solutions." — Monika Soltysik, senior research analyst, Security and Trust Products at IDC
Please Note: Extended description available upon request.
Table of Contents
24 Pages
- IDC's Worldwide Security Products Taxonomy
- Security Products Taxonomy Changes for 2022
- Hierarchical Nomenclature
- Definitions
- Deployment Types
- Revenue
- Security Products Market
- Network Security
- Secure Access and Segmentation
- Zero Trust Edge
- Active Application Security
- Endpoint Security
- Corporate Endpoint Security
- Modern Endpoint Security
- Server Security
- Consumer Digital Life Protection
- Identity and Digital Trust
- Identity- and Role-Based Access
- Identity Management/Single Sign-On
- Legacy Identity
- Digital Trust
- Authentication
- Privileged Access Management
- Cybersecurity Analytics, Intelligence, Response, and Orchestration
- Security Information and Event Management
- Vulnerability Management
- Tier 2 SOC Analytics and Cloud-Native XDR
- Automation and Orchestration Tools
- Network Intelligence and Threat Analytics
- Cloud-Native Extended Detection and Response
- Information and Data Security
- Information Security
- Messaging
- Sensitive Data Management
- Data Privacy and Compliance
- Data Security
- Encryption and Related Technologies
- Key Management
- Certificates
- Other
- Governance, Risk, and Compliance
- Learn More
- Synopsis
Pricing
Currency Rates
Questions or Comments?
Our team has the ability to search within reports to verify it suits your needs. We can also help maximize your budget by finding sections of reports you can purchase.