target audience: TECH SUPPLIER  Publication date: Jan 2023 - Document type: Taxonomy - Doc  Document number: # US49998922

IDC's Worldwide Security Products Taxonomy, 2023

By: 

  • Monika Soltysik Loading
  • Michelle Abraham Loading
  • Jay Bretzmann Loading
  • Amy Cravens Loading
  • Frank Dickson Loading
  • Pete Finalle Loading
  • Jennifer Glenn Loading
  • Ryan O‚ÄôLeary Loading
  • Christopher Kissel Loading
  • Christopher Rodriguez Loading
  • Michael Suby

Content



Related Links

Table of Contents


  • IDC's Worldwide Security Products Taxonomy

    • Figure: Security Products Primary Segments

  • Security Products Taxonomy Changes for 2023

    • Technology Category Name Changes

    • Technology Category Addition

    • Hierarchical Nomenclature

    • Figure: Security Products Taxonomy Hierarchy

  • Definitions

    • Deployment Types

    • Revenue

    • Security Products Market

    • Network Security

    • Figure: Network Security

    • Trusted Network Access and Protection

    • Active Application Security

    • Endpoint Security

    • Figure: Endpoint Security

    • Corporate Endpoint Security

    • Modern Endpoint Security

    • Server Security

    • Consumer Digital Life Protection

    • Identity and Access Management

    • Figure: Identity and Access Management

    • Access

    • Identity Management

    • Customer Identity and Access Management

    • Legacy/Other

    • Privilege

    • Authentication/Advanced Authentication

    • Privileged Access Management

    • Security Analytics

    • Figure: Security Analytics

    • Security Information and Event Management

    • Vulnerability Management

    • Tier 2 SOC Analytics and Cloud-Native XDR

    • Orchestration and Automation Tools

    • Network Intelligence and Threat Analytics

    • Cloud-Native XDR

    • Data Security

    • Figure: Data Security

    • Information Protection

    • Messaging

    • Data Loss Technologies

    • Data Access Governance

    • Data Privacy and Compliance

    • Digital Trust

    • Encryption and Related Technologies

    • Key Management

    • Certificates

    • Database and Tools

    • Governance, Risk, and Compliance

    • Figure: Governance, Risk, and Compliance

    • eDiscovery and Forensics

    • Figure: eDiscovery and Forensics

  • Learn More

    • Synopsis