Picture
SEARCH
What are you looking for?
Need help finding what you are looking for? Contact Us
Compare

PUBLISHER: IDC | PRODUCT CODE: 1655885

Cover Image

PUBLISHER: IDC | PRODUCT CODE: 1655885

IDC's Worldwide Security Products Taxonomy, 2025

PUBLISHED:
PAGES: 38 Pages
DELIVERY TIME: 1-2 business days
SELECT AN OPTION
PDF (Single User License)
USD 7500

Add to Cart

This IDC study presents IDC's taxonomy for security products. It provides definitions and a comprehensive detailed framework of security solutions in eight technology category markets. This taxonomy forms the foundation for IDC's market forecast and market shares for security products, IDC's Worldwide Semiannual Software Tracker, and IDC's Worldwide Semiannual Security Products Tracker."IDC's security products taxonomy provides a comprehensive and detailed framework for the security marketplace and is an essential resource for understanding how IDC defines and categorizes security solutions." - Monika Soltysik, senior research analyst, Security and Trust Products at IDC

Product Code: US53164625

IDC's Worldwide Security Products Taxonomy

Security Products Taxonomy Changes for 2025

  • Hierarchical Nomenclature

Definitions

  • Deployment Types
  • Revenue
  • Security Products Market
    • Cloud-Native Application Protection Platform
      • Cloud Security Posture Management
      • Cloud Workload Protection Platform
      • Cloud Infrastructure Entitlements Management
      • Infrastructure as Code (Scanning)
    • Cloud Detection and Response
    • Data Security Posture Management
    • Kubernetes Security Posture Management
    • AI-Security Posture Management
      • Physical Server Security
    • eDiscovery and Forensics
    • Endpoint Security
      • Corporate Endpoint Security
        • Modern Endpoint Security
      • Consumer Digital Life Protection
    • Governance, Risk, and Compliance
    • Network Security
      • Trusted Network Access and Protection
      • Active Application Security
    • Identity and Access Management
      • Access
        • Identity Management
        • Customer Identity and Access Management
      • Legacy/Other
      • Privilege
        • Authentication/Advanced Authentication
        • Privileged Access Management
    • Information and Data Security
      • Information Protection
        • Messaging
        • Data Loss Technologies
        • Data Access Governance
        • Data Privacy and Compliance
      • Digital Trust
        • Encryption and Related Technologies
        • Key Management, Hardware Security Modules (HSMs), and Certificates
        • Database and Storage Security Tools
    • Security Analytics
      • SIEM
      • Vulnerability Management
    • SOC Analytics, Automation, and Cloud-Native XDR
      • Orchestration and Automation Tools
      • Network Security Analytics
        • Network Detection and Response
        • Threat Intelligence
      • Cloud-Native Extended Detection and Response

Learn More

  • Synopsis
Have a question?
Picture

Jeroen Van Heghe

Manager - EMEA

+32-2-535-7543

Picture

Christine Sirois

Manager - Americas

+1-860-674-8796

Questions? Please give us a call or visit the contact form.
Hi, how can we help?
Contact us!