target audience: TECH SUPPLIER Publication date: Apr 2024 - Document type: Taxonomy - Doc Document number: # US51957424
IDC's Worldwide Security Spending Guide Taxonomy, 2024
Content
List of Tables
List of Figures
Related Links
Table of Contents
-
IDC's Worldwide Security Spending Guide Taxonomy
-
Figure: IDC's Standard Industries
-
-
Security Spending Guide Taxonomy Changes for 2024
-
New IDC Industry Taxonomy
-
New Industries Selection Process
-
Technology Taxonomy Changes
-
-
Taxonomy Overview
-
Definitions
-
What Is a Vertical Industry?
-
Economic Entities, Enterprises, and Establishments
-
IDC's Sector View and Associated Primary Vertical Markets
-
What Is a Sector?
-
Table: IDC's Standard Industry Taxonomy
-
Relationship to the Prior Framework
-
Figure: Relationship to Prior Framework
-
Table: Brief Summary of Industry Mapping
-
IDC's Company Size Taxonomy
-
Employee Count
-
IDC's Standard Company Size Segmentation
-
Table: IDC's Company Size Taxonomy
-
Note on Consumer Industry and Consumer Endpoint Security Software
-
Geography Taxonomy
-
Table: IDC's Worldwide Security Spending Guide Geographic Coverage
-
Technology Taxonomy
-
Security Products and Services
-
Table: IDC's Security Spending Guide Technology Taxonomy
-
Hardware
-
Data Security Appliances
-
Messaging Security Appliances
-
Network Security Appliances
-
Firewall
-
VPN
-
IDP
-
Unified Threat Management
-
Secure Web Gateway
-
Software
-
Data Security Software
-
Data Protection
-
Messaging Security Software
-
Sensitive Data Management and Data Privacy
-
Endpoint Security Software
-
Consumer/SOHO
-
Modern Endpoint Security
-
Server Security
-
GRC and Forensics
-
eDiscovery and Forensics Applications
-
Governance, Risk, and Compliance Software
-
Identity and Access Management Software
-
Identity Management
-
Legacy Identity
-
Authentication
-
Privileged Access Management
-
Network Security Software
-
Active Application Security
-
Secure Access and Segmentation
-
Zero Trust Edge
-
Security Analytics Software
-
Security Information and Event Management
-
Tier 2 SOC Analytics and Cloud-Native XDR
-
Device Vulnerability Assessment
-
Software Vulnerability Assessment
-
Services
-
Consulting Services
-
Business Consulting
-
Custom Application Development
-
IT Consulting
-
Integration Services
-
Network Consulting and Integration
-
Systems Integration
-
Managed Security Business Services
-
Key Horizontal BPO
-
Managed Security Technology Services
-
Application Management
-
Hosted Application Management
-
Hosting Infrastructure Services
-
IT Outsourcing
-
Network and Endpoint Outsourcing Services
-
IT Education and Training
-
IT Education and Training
-
Support Security Services
-
Hardware Deploy and Support
-
Software Deploy and Support
-
-
Learn More
-
Methodology
-
Exchange Rates
-
Overlap with Other IDC Spending Guide Research
-
Note on Alignment with Other IDC Security Forecast Products
-
Table: IDC's Security Spending Guide 2024 Release V1 Technology Detail Map to 2023 Release V1 and Security Products Tracker 1H23
-
Appendix — Legacy Industry Taxonomy
-
Table: IDC's Legacy Worldwide Sector and Industry Taxonomy
-
Related Research
-
Synopsis
-