Product Code: US53248825
This IDC study introduces IDC's new industry definitions and provides a detailed description of IDC's security products segmentation methodology and taxonomy. It should be used as a companion piece for IDC's Worldwide Security Spending Guide data deliverables. Technology suppliers may utilize this approach and structure as well to help them build an industry-focused organization."IDC's Worldwide Security Spending Guide taxonomy provides a comprehensive, global, and detailed map of the security marketplace," says Serena Da Rold, research director, IDC Spending Guides. "It is an invaluable resource to help vendors standardize definitions and identify industry and company size segments offering the best opportunities for security products."
IDC's Worldwide Security Spending Guide Taxonomy
Security Spending Guide Taxonomy Changes for 2025 Release V1
- Technology Taxonomy Changes
- Reminder of Key Taxonomy Changes in Prior Release
- New IDC Industry Taxonomy
- New Industries Selection Process
Taxonomy Overview
Definitions
- What Is a Vertical Industry?
- Economic Entities, Enterprises, and Establishments
- IDC's Sector View and Associated Primary Vertical Markets
- Relationship to the Prior Framework
- IDC's Company Size Taxonomy
- IDC's Standard Company Size Segmentation
- Note on Consumer Industry and Consumer Endpoint Security Software
- Geography Taxonomy
- Technology Taxonomy
- Security Products and Services
- Hardware
- Information and Data Security Appliances
- Information Protection Appliances
- Messaging Security Appliances
- Network Security Appliances
- Trusted Network Access and Protection Appliances
- Firewall
- IDP
- Secure Web Gateway
- Unified Threat Management
- VPN
- Software
- Cloud-Native Application Protection Platform
- Endpoint Security Software
- Consumer Digital Life Protection
- Corporate Endpoint Security
- GRC and Forensics
- eDiscovery and Forensics Applications
- Governance, Risk, and Compliance Software
- Identity and Access Management Software
- Access
- Customer Identity and Access Management
- Identity Management
- Privilege
- Authentication
- Privileged Access Management
- Information and Data Security Software
- Digital Trust
- Information Protection
- Messaging Security Software
- Sensitive Data Management and Data Privacy
- Network Security Software
- Active Application Security
- Trusted Network Access and Protection
- Secure Access and Segmentation
- Zero Trust Edge
- Security Analytics Software
- Security Information and Event Management
- Vulnerability Management
- Device Vulnerability Assessment
- Software Vulnerability Assessment
- Tier 2 SOC Analytics and Cloud-Native XDR
- Orchestration and Automation Tools
- Network Detection and Response
- Threat Intelligence
- Cloud-Native Extended Detection and Response
- Services
- Project Oriented
- Consulting Services
- Business Consulting
- Custom Application Development
- IT Consulting
- Integration Services
- Network Consulting and Integration
- Systems Integration
- Managed Security Services
- Managed Security Business Services
- Managed Security Technology Services
- Application Management
- Hosted Application Management
- Hosting Infrastructure Services
- IT Outsourcing
- Network and Endpoint Outsourcing Services
- Support Services
- IT Education and Training
- Support Security Services
- Hardware Deploy and Support
- Software Deploy and Support
Learn More
- Methodology
- Overlap with Other IDC Spending Guide Research
- Note on Alignment with Other IDC Security Forecast Products
- Appendix - Legacy Industry Taxonomy
- Related Research
- Synopsis