Feb 2018 - Taxonomy - Doc # US43535614
IDC's Worldwide Security Products Taxonomy, 2018
By: Frank DicksonResearch Vice President, Security Products, Robert Ayoub, Pete FinalleSenior Research Analyst, Maureen Kelledy, Sean PikeProgram Vice President, Security Products, Christina Richmond, Martha VazquezSenior Research Analyst, Infrastructure Services, Robert WesterveltResearch Director, Security Products
This IDC study presents IDC's taxonomy of the security products market. It provides definitions of security products across four major platforms: software licenses, virtualization, appliances, and software as a service. It is the foundation for IDC's forecast and market share documents for security in 2018. IDC market sizing, forecasts, and company models are generated by IDC analysts around the world using this taxonomy.
"IDC's security products taxonomy provides a comprehensive and detailed framework for the security marketplace and is an essential resource for understanding how IDC defines security products in terms of software, hardware, virtualized products, and SaaS," says Frank Dickson, research director for IDC's Worldwide Security Products and Services group.
Endpoint Security , Executive Information , Identity and Access Management, Digital Trust and Safety , Internet of Things: Security Practices , Middle East and Africa Quarterly Security Appliance Tracker , Network Security Products and Strategies , Security Analytics, Intelligence, Response, and Orchestration , Security Products , Security Services , Security Solutions: Security as a Service , Security Solutions: Security in the Cloud
Advanced authentication, Encryption toolkits, Endpoint security, Enterprise single sign-on, Firewall and VPN security appliance products, Information protection and control, Intrusion detection and prevention, Messaging security, Messaging security appliances, Mobile identity and access management, Mobile secure content and threat management, Mobile security and vulnerability management, Network security, Security management, Unified threat management, User provisioning, Virtual private network products, Web and messaging WAM security appliances, Web security