target audience: TECH SUPPLIER  Publication date: Oct 2023 - Document type: Taxonomy - Doc  Document number: # US50098323

IDC's Worldwide Security Spending Guide Taxonomy, 2023

By: 

  • Serena Da Rold Loading
  • Stefano Perini Loading
  • Jessica Goepfert Loading
  • Takashi Manabe Loading
  • Sharad Kotagi Loading
  • Vladimir Zivadinovic Loading
  • Emanuel Figueroa Loading
  • Jing Qian Loading
  • Eman Elshewy Loading
  • Kasturi Rawool Loading

Content



Related Links

Table of Contents


  • IDC's Worldwide Security Spending Guide Taxonomy

    • Figure: IDC's Standard Industries

  • Security Spending Guide Taxonomy Changes for 2023

  • Taxonomy Overview

  • Definitions

    • What Is a Vertical Industry?

    • Economic Entities, Enterprises, and Establishments

    • IDC's Sector View and Associated Primary Vertical Markets

    • What Is a Sector?

    • Table: IDC's Worldwide Sector and Industry Taxonomy

    • IDC's Company Size Taxonomy

    • Employee Count

    • IDC's Standard Company Size Segmentation

    • Note on Consumer Industry and Consumer Endpoint Security Software

    • Technology Taxonomy

    • Security Products

    • Table: IDC's Security Spending Guide Technology Taxonomy

    • Hardware

    • Data Security Appliances

    • Messaging Security Appliances

    • Network Security Appliances

    • Firewall

    • VPN

    • IDP

    • Unified Threat Management

    • Secure Web Gateway

    • Software

    • Data Security Software

    • Data Protection

    • Messaging Security Software

    • Sensitive Data Management and Data Privacy

    • Endpoint Security Software

    • Consumer/SOHO

    • Modern Endpoint Security

    • Server Security

    • GRC and Forensics

    • eDiscovery and Forensics Applications

    • Governance, Risk, and Compliance Software

    • Identity and Access Management Software

    • Identity Management

    • Legacy Identity

    • Authentication

    • Privileged Access Management

    • Network Security Software

    • Active Application Security

    • Secure Access and Segmentation

    • Zero Trust Edge

    • Security Analytics Software

    • Security Information and Event Management

    • Tier 2 SOC Analytics and Cloud-Native XDR

    • Device Vulnerability Assessment

    • Software Vulnerability Assessment

    • Services

    • Consulting Services

    • Business Consulting

    • Custom Application Development

    • IT Consulting

    • Integration Services

    • Network Consulting and Integration

    • Systems Integration

    • IT Education and Training

    • IT Education and Training

    • Managed Security Services

    • Application Management

    • Hosted Application Management

    • Hosting Infrastructure Services

    • IT Outsourcing

    • Key Horizontal BPO

    • Network and Endpoint Outsourcing Services

    • Support Security Services

    • Hardware Deploy and Support

    • Software Deploy and Support

    • Geography Taxonomy

    • Table: IDC's Worldwide Geographic Coverage

  • Learn More

    • Methodology

    • Exchange Rates

    • Overlap with Other IDC Spending Guide Research

    • Note on Alignment with Other IDC Security Products Forecasts

    • Table: IDC's Security Spending Guide Technology Detail Map to 2023 V1 Release and Security Products Tracker, 2H22

    • Related Research

    • Synopsis