target audience: TECH SUPPLIER  Publication date: Feb 2024 - Document type: Taxonomy - Doc  Document number: # US51825024

IDC's Worldwide Security Products Taxonomy, 2024

By: 

  • Monika Soltysik Loading
  • Michelle Abraham Loading
  • Philip Bues Loading
  • Jay Bretzmann Loading
  • Frank Dickson Loading
  • Pete Finalle Loading
  • Jennifer Glenn Loading
  • Philip D. Harris, CISSP, CCSK Loading
  • Christopher Kissel Loading
  • Ryan O’Leary Loading
  • Christopher Rodriguez Loading
  • Michael Suby

Content



Related Links

Table of Contents


  • IDC's Worldwide Security Products Taxonomy

    • Figure: Security Products Primary Segments

  • Security Products Taxonomy Changes for 2024

    • Hierarchical Nomenclature

    • Figure: Security Products Taxonomy Hierarchy

  • Definitions

    • Deployment Types

    • Revenue

    • Security Products Market

    • Cloud-Native Application Protection Platform

    • Figure: CNAPP

    • Cloud Security Posture Management

    • Cloud Workload Protection Platform

    • Cloud Infrastructure Entitlements Management

    • Infrastructure as Code (Scanning)

    • eDiscovery and Forensics

    • Figure: eDiscovery and Forensics

    • Endpoint Security

    • Figure: Endpoint Security

    • Corporate Endpoint Security

    • Modern Endpoint Security

    • Consumer Digital Life Protection

    • Governance, Risk, and Compliance

    • Figure: Governance, Risk, and Compliance

    • Network Security

    • Figure: Network Security

    • Trusted Network Access and Protection

    • Active Application Security

    • Identity and Access Management

    • Figure: Identity and Access Management

    • Access

    • Identity Management

    • Customer Identity and Access Management

    • Legacy/Other

    • Privilege

    • Authentication/Advanced Authentication

    • Privileged Access Management

    • Information and Data Security

    • Figure: Information and Data Security

    • Information Protection

    • Messaging

    • Data Loss Technologies

    • Data Access Governance

    • Data Privacy and Compliance

    • Digital Trust

    • Encryption and Related Technologies

    • Key Management, Hardware Security Modules (HSMs), and Certificates

    • Database and Storage Security Tools

    • Security Analytics

    • Figure: Security Analytics

    • SIEM and Vulnerability Management

    • Security Information and Event Management

    • Vulnerability Management

    • Tier 2 SOC Analytics and Cloud-Native XDR

    • Orchestration and Automation Tools

    • Network Security Analytics

    • Network Detection and Response

    • Threat Intelligence

    • Cloud-Native Extended Detection and Response

  • Learn More

    • Synopsis