target audience: TECH SUPPLIER Publication date: Sep 2022 - Document type: Taxonomy - Doc Document number: # US49625822
IDC's Worldwide Security Spending Guide Taxonomy, 2022: Release V2, 2022
Content
List of Tables
List of Figures
Related Links
Table of Contents
-
IDC's Worldwide Security Spending Guide Taxonomy
-
Figure: IDC's Standard Industries
-
-
Security Spending Guide Taxonomy Changes for 2022 Release V2
-
Taxonomy Overview
-
Definitions
-
What Is a Vertical Industry?
-
Economic Entities, Enterprises, and Establishments
-
IDC's Sector View and Associated Primary Vertical Markets
-
What Is a Sector?
-
Table: IDC's Worldwide Sector and Industry Taxonomy
-
IDC's Company Size Taxonomy
-
Employee Count
-
IDC's Standard Company Size Segmentation
-
Note on Consumer Industry and Consumer Endpoint Security Software
-
Technology Taxonomy
-
Security Products
-
Table: IDC's Security Spending Guide Technology Taxonomy
-
Hardware
-
Information and Data Security Appliances
-
Messaging Security Appliances
-
Network Security Appliances
-
Firewall
-
VPN
-
IDP
-
Unified Threat Management
-
Secure Web Gateway
-
Software
-
Cybersecurity Analytics, Intelligence, Response, and Orchestration
-
Security Information and Event Management
-
Tier 2 SOC Analytics and Cloud-Native XDR
-
Device Vulnerability Assessment
-
Software Vulnerability Assessment
-
Endpoint Security Software
-
Consumer/SOHO
-
Modern Endpoint
-
Server Security
-
GRC and Forensics
-
eDiscovery and Forensics Applications
-
Governance, Risk, and Compliance Software
-
Identity and Digital Trust Software
-
Identity Management
-
Legacy Identity
-
Authentication
-
Privileged Access Management
-
Information and Data Security Software
-
Data Security
-
Messaging Security Software
-
Sensitive Data Management and Data Privacy
-
Network Security Software
-
Secure Access and Segmentation
-
Zero Trust Edge
-
Active Application Security
-
Services
-
Consulting Services
-
Business Consulting
-
Custom Application Development
-
IT Consulting
-
Integration Services
-
Network Consulting and Integration
-
Systems Integration
-
IT Education and Training
-
IT Education and Training
-
Managed Security Services
-
Application Management
-
Hosted Application Management
-
Hosting Infrastructure Services
-
IT Outsourcing
-
Key Horizontal BPO
-
Network and Endpoint Outsourcing Services
-
Support Security Services
-
Hardware Deploy and Support
-
Software Deploy and Support
-
Geography Taxonomy
-
Table: IDC's Worldwide Geographic Coverage
-
-
Learn More
-
Methodology
-
Note on Alignment with Other IDC Security Products Forecasts
-
Overlap with Other IDC Spending Guide Research
-
Exchange Rates
-
Related Research
-
Synopsis
-