target audience: TECH SUPPLIER  Publication date: Sep 2022 - Document type: Taxonomy - Doc  Document number: # US49625822

IDC's Worldwide Security Spending Guide Taxonomy, 2022: Release V2, 2022

By: 

  • Serena Da Rold Loading
  • Jessica Goepfert Loading
  • Stefano Perini Loading
  • Sharad Kotagi Loading
  • Eduardo Puente
  • Kritika Ghildiyal Loading
  • Vladimir Zivadinovic Loading
  • Eman Elshewy Loading
  • Xueqing Zhang Loading
  • Takashi Manabe Loading

Content



Related Links

Table of Contents


  • IDC's Worldwide Security Spending Guide Taxonomy

    • Figure: IDC's Standard Industries

  • Security Spending Guide Taxonomy Changes for 2022 Release V2

  • Taxonomy Overview

  • Definitions

    • What Is a Vertical Industry?

    • Economic Entities, Enterprises, and Establishments

    • IDC's Sector View and Associated Primary Vertical Markets

    • What Is a Sector?

    • Table: IDC's Worldwide Sector and Industry Taxonomy

    • IDC's Company Size Taxonomy

    • Employee Count

    • IDC's Standard Company Size Segmentation

    • Note on Consumer Industry and Consumer Endpoint Security Software

    • Technology Taxonomy

    • Security Products

    • Table: IDC's Security Spending Guide Technology Taxonomy

    • Hardware

    • Information and Data Security Appliances

    • Messaging Security Appliances

    • Network Security Appliances

    • Firewall

    • VPN

    • IDP

    • Unified Threat Management

    • Secure Web Gateway

    • Software

    • Cybersecurity Analytics, Intelligence, Response, and Orchestration

    • Security Information and Event Management

    • Tier 2 SOC Analytics and Cloud-Native XDR

    • Device Vulnerability Assessment

    • Software Vulnerability Assessment

    • Endpoint Security Software

    • Consumer/SOHO

    • Modern Endpoint

    • Server Security

    • GRC and Forensics

    • eDiscovery and Forensics Applications

    • Governance, Risk, and Compliance Software

    • Identity and Digital Trust Software

    • Identity Management

    • Legacy Identity

    • Authentication

    • Privileged Access Management

    • Information and Data Security Software

    • Data Security

    • Messaging Security Software

    • Sensitive Data Management and Data Privacy

    • Network Security Software

    • Secure Access and Segmentation

    • Zero Trust Edge

    • Active Application Security

    • Services

    • Consulting Services

    • Business Consulting

    • Custom Application Development

    • IT Consulting

    • Integration Services

    • Network Consulting and Integration

    • Systems Integration

    • IT Education and Training

    • IT Education and Training

    • Managed Security Services

    • Application Management

    • Hosted Application Management

    • Hosting Infrastructure Services

    • IT Outsourcing

    • Key Horizontal BPO

    • Network and Endpoint Outsourcing Services

    • Support Security Services

    • Hardware Deploy and Support

    • Software Deploy and Support

    • Geography Taxonomy

    • Table: IDC's Worldwide Geographic Coverage

  • Learn More

    • Methodology

    • Note on Alignment with Other IDC Security Products Forecasts

    • Overlap with Other IDC Spending Guide Research

    • Exchange Rates

    • Related Research

    • Synopsis