target audience: TECH SUPPLIER  Publication date: Mar 2023 - Document type: Taxonomy - Doc  Document number: # US50332523

IDC's Worldwide Security Services Taxonomy, 2023

By: 

  • Craig Robinson Loading
  • Scott Tiazkun Loading
  • Cathy Huang Loading
  • Philip D. Harris, CISSP, CCSK Loading
  • Shilpi Handa Loading
  • Linus Lai Loading
  • Sophia Wang Loading
  • Christian Fam Loading
  • Joel Stradling Loading
  • Yogesh Shivhare Loading

Content



Related Links

Table of Contents


  • IDC's Worldwide Security Services Taxonomy

    • Figure: Security Services Primary Segments

  • Security Services Taxonomy Changes for 2023

  • Taxonomy Overview

    • Hierarchical Mapping: Security Services Primary/Secondary Markets

    • Figure: IDC's Worldwide Security Services Subsegments, 2023

  • Definitions

    • Security Services Market

    • Professional Security Services

    • Consulting

    • Strategy Planning and Program Transformation

    • Cyber-Resilience Consulting

    • Architecture Assessment and Design

    • Governance, Risk, and Compliance

    • Privacy Consulting

    • Governance Consulting

    • Risk Consulting

    • Compliance Consulting

    • Cyberinsurance Consulting

    • Incident Management

    • Incident Response

    • Incident Readiness

    • Forensics

    • Implementation and Integration

    • Deployment and Training (Security) Services

    • Deployment Services

    • Training Services

    • Managed Security Services

    • Managed Detection and Response

    • Pure-Play MDR

    • Managed EDR

    • Managed SIEM

    • Managed Threat Hunting

    • Managed Infrastructure

    • Managed Cloud Workload Protection

    • Managed IPS, UTM, and Firewall

    • Managed Secure Web Gateway

    • Managed Endpoint

    • Managed Email Security

    • Vulnerability Management

    • Other Managed Security Services

    • Managed Identity/PAM

    • Managed Cyber-Recovery

    • Managed Data Security

    • Managed Privacy

    • Managed GRC

    • Managed Application Security

    • Legacy Managed Services

    • Threat Intelligence Services

    • DDoS Mitigation Services

    • Emerging Security Services

    • Compliance as a Service

    • Trust as a Service

  • Learn More

    • Related Research

    • Synopsis