Picture
SEARCH
What are you looking for?
Need help finding what you are looking for? Contact Us
Compare

PUBLISHER: IDC | PRODUCT CODE: 1697055

Cover Image

PUBLISHER: IDC | PRODUCT CODE: 1697055

IDC's Worldwide Security Spending Guide Taxonomy, 2025: Release V1, 2025

PUBLISHED:
PAGES: 55 Pages
DELIVERY TIME: 1-2 business days
SELECT AN OPTION
PDF (Single User License)
USD 7500

Add to Cart

This IDC study introduces IDC's new industry definitions and provides a detailed description of IDC's security products segmentation methodology and taxonomy. It should be used as a companion piece for IDC's Worldwide Security Spending Guide data deliverables. Technology suppliers may utilize this approach and structure as well to help them build an industry-focused organization."IDC's Worldwide Security Spending Guide taxonomy provides a comprehensive, global, and detailed map of the security marketplace," says Serena Da Rold, research director, IDC Spending Guides. "It is an invaluable resource to help vendors standardize definitions and identify industry and company size segments offering the best opportunities for security products."

Product Code: US53248825

IDC's Worldwide Security Spending Guide Taxonomy

Security Spending Guide Taxonomy Changes for 2025 Release V1

  • Technology Taxonomy Changes
  • Reminder of Key Taxonomy Changes in Prior Release
  • New IDC Industry Taxonomy
    • New Industries Selection Process

Taxonomy Overview

Definitions

  • What Is a Vertical Industry?
  • Economic Entities, Enterprises, and Establishments
  • IDC's Sector View and Associated Primary Vertical Markets
    • What Is a Sector?
  • Relationship to the Prior Framework
  • IDC's Company Size Taxonomy
    • Employee Count
  • IDC's Standard Company Size Segmentation
  • Note on Consumer Industry and Consumer Endpoint Security Software
  • Geography Taxonomy
  • Technology Taxonomy
  • Security Products and Services
  • Hardware
    • Information and Data Security Appliances
      • Information Protection Appliances
        • Messaging Security Appliances
    • Network Security Appliances
      • Trusted Network Access and Protection Appliances
        • Firewall
        • IDP
        • Secure Web Gateway
        • Unified Threat Management
        • VPN
  • Software
    • Cloud-Native Application Protection Platform
    • Endpoint Security Software
      • Consumer Digital Life Protection
        • Consumer/SOHO
      • Corporate Endpoint Security
        • Modern Endpoint Security
    • GRC and Forensics
      • eDiscovery and Forensics Applications
      • Governance, Risk, and Compliance Software
    • Identity and Access Management Software
      • Access
        • Customer Identity and Access Management
        • Identity Management
      • Privilege
        • Authentication
        • Privileged Access Management
    • Information and Data Security Software
      • Digital Trust
      • Information Protection
        • Messaging Security Software
        • Sensitive Data Management and Data Privacy
    • Network Security Software
      • Active Application Security
      • Trusted Network Access and Protection
        • Secure Access and Segmentation
        • Zero Trust Edge
    • Security Analytics Software
      • Security Information and Event Management
      • Vulnerability Management
        • Device Vulnerability Assessment
        • Software Vulnerability Assessment
      • Tier 2 SOC Analytics and Cloud-Native XDR
        • Orchestration and Automation Tools
        • Network Detection and Response
        • Threat Intelligence
        • Cloud-Native Extended Detection and Response
  • Services
    • Project Oriented
      • Consulting Services
        • Business Consulting
        • Custom Application Development
        • IT Consulting
      • Integration Services
        • Network Consulting and Integration
        • Systems Integration
    • Managed Security Services
      • Managed Security Business Services
        • Key Horizontal BPO
      • Managed Security Technology Services
        • Application Management
        • Hosted Application Management
        • Hosting Infrastructure Services
        • IT Outsourcing
        • Network and Endpoint Outsourcing Services
    • Support Services
      • IT Education and Training
      • Support Security Services
        • Hardware Deploy and Support
        • Software Deploy and Support

Learn More

  • Methodology
    • Exchange Rates
  • Overlap with Other IDC Spending Guide Research
  • Note on Alignment with Other IDC Security Forecast Products
  • Appendix - Legacy Industry Taxonomy
  • Related Research
  • Synopsis
Have a question?
Picture

Jeroen Van Heghe

Manager - EMEA

+32-2-535-7543

Picture

Christine Sirois

Manager - Americas

+1-860-674-8796

Questions? Please give us a call or visit the contact form.
Hi, how can we help?
Contact us!