TECH SUPPLIER Nov 2018 - Taxonomy - Doc # US44382318
IDC's Worldwide Cybersecurity Products Taxonomy, 2019
By: Frank DicksonProgram Vice President, Cybersecurity Products, Sean Pike, Pete FinalleSenior Research Analyst, Martha VazquezSenior Research Analyst, Infrastructure Services, Christina Richmond, Robyn WesterveltResearch Director, Security & Trust, Christopher KisselResearch Director, Security Products
This IDC study presents IDC's taxonomy of the security products market. It provides definitions of security products across four major platforms: software licenses, virtualization, appliances, and software as a service. It is the foundation for IDC's forecast and market share documents for security in 2018. IDC market sizing, forecasts, and company models are generated by IDC analysts around the world using this taxonomy.
"IDC's cybersecurity products taxonomy provides a comprehensive and detailed framework for the security marketplace and is an essential resource for understanding how IDC defines security products in terms of software, hardware, virtualized products, and SaaS," says Frank Dickson, research director for IDC's Worldwide Security Products and Services group.
Application Security and DevSecOps , Cybersecurity Analytics, Intelligence, Response and Orchestration , Data Security , DevOps Analytics, Automation and Security , Endpoint Security , Executive Information , Identity and Digital Trust Software , Internet of Things and OT Security Products , Network Security Products and Strategies , Security Products , Security Services
Advanced authentication, Analytic applications, Endpoint encryption, Endpoint security, Enterprise single sign-on, Federated single sign-on, Firewall and VPN security appliance products, Governance, risk and compliance infrastructure, Identity and access management, Information protection and control, Intrusion detection and prevention, Legacy authorization, Messaging security, Messaging security appliances, Mobile identity and access management, Mobile secure content and threat management, Mobile security and vulnerability management, Network security, Security and vulnerability management software, Security management, Unified threat management, User provisioning, Virtual private network products, Web and messaging WAM security appliances, Web security, Web single sign-on