½ÃÀ庸°í¼­
»óǰÄÚµå
1798096

¼¼°èÀÇ Å¬¶ó¿ìµå/¾ÖÇø®ÄÉÀÌ¼Ç ·±Å¸ÀÓ º¸¾È(CARS) ½ÃÀå(2025-2029³â)

Cloud/Application Runtime Security (CARS) Market, Global, 2025-2029

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: Frost & Sullivan | ÆäÀÌÁö Á¤º¸: ¿µ¹® 54 Pages | ¹è¼Û¾È³» : 1-2ÀÏ (¿µ¾÷ÀÏ ±âÁØ)

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

CDR°ú ADRÀº Çõ½ÅÀûÀ¸·Î ¼ºÀåÇϰí ÀÖ½À´Ï´Ù.

SecOps ¹× SOC ÆÀÀº À§Çù ¸ð´ÏÅ͸µ, »ç°í ´ëÀÀ, À§Çù ÀÎÅÚ¸®Àü½º ºÐ¼®, º¸¾È Ãë¾àÁ¡ °ü¸® µî À§Çù °ü¸®ÀÇ ÇÙ½É ¾÷¹«¿¡ ÁýÁßÇϰí ÀÖ½À´Ï´Ù. ±âÁ¸¿¡´Â On-Premise ȯ°æÀÇ À§ÇùÀ» °ü¸®Çϱâ À§ÇØ SIEM, UEBA, XDR µîÀÇ Åø¿¡ ÀÇÁ¸ÇØ ¿Ô½À´Ï´Ù.

±×·¯³ª Ŭ¶ó¿ìµå¿Í Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀÌ¼Ç ¼­ºñ½ºÀÇ ±Þ¼ÓÇÑ È®»êÀ¸·Î ÀÎÇØ ±âÁ¸ÀÇ À§Çù °ü¸® Àü·«¸¸À¸·Î´Â ÃæºÐÇÏÁö ¾Ê°Ô µÇ¾ú½À´Ï´Ù. Ŭ¶ó¿ìµå ȯ°æÀÇ µ¿Àû, ºÐ»êÀû, ¼ø°£Àû Ư¼º(ƯÈ÷ ÄÁÅ×ÀÌ³Ê ¹× ¼­¹ö¸®½º ±â´É)À¸·Î ÀÎÇØ °ø°Ý ´ë»óÀº ²÷ÀÓ¾øÀÌ º¯È­Çϰí ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ ¸®¼Ò½º´Â ºü¸£°Ô Áõ°¨Çϱ⠶§¹®¿¡ SecOps ÆÀÀÌ ½Ç½Ã°£ °¡½Ã¼ºÀ» À¯ÁöÇϰí À§Çù¿¡ È¿°úÀûÀ¸·Î ´ëÀÀÇÏ´Â µ¥ ¾î·Á¿òÀ» °Þ°í ÀÖ½À´Ï´Ù.

ÄÁÅ×À̳Ê, ¸¶ÀÌÅ©·Î¼­ºñ½º, Ŭ¶ó¿ìµå ÀÎÇÁ¶ó¸¦ Æ÷ÇÔÇÑ Å¬¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀ̼ÇÀÇ ´Ù°èÃþ ¾ÆÅ°ÅØÃ³´Â °¨Áö ¹× ´ëÀÀÀ» ´õ¿í º¹ÀâÇÏ°Ô ¸¸µé°í ÀÖ½À´Ï´Ù. °ø°ÝÀº Á¾Á¾ ¿ëµµ ·¹º§¿¡¼­ ¾Ç¿ëµÈ API³ª ¾Ë·ÁÁöÁö ¾ÊÀº Ãë¾àÁ¡À¸·ÎºÎÅÍ ½ÃÀ۵Ǿî ÄÁÅ×ÀÌ³Ê¿Í ÀÎÇÁ¶ó¸¦ ÅëÇØ ¿©·¯ °èÃþÀ» °¡·ÎÁö¸£´Â °æ¿ì°¡ ¸¹½À´Ï´Ù. ÀÌ·¯ÇÑ À§ÇùÀ» °ü¸®Çϱâ À§ÇØ SecOps ÆÀÀº ¿©·¯ °èÃþ¿¡ °ÉÃÄ À̺¥Æ®¸¦ »óÈ£ ¿¬°ü½ÃÄÑ¾ß Çϸç, À̸¦ À§Çؼ­´Â ÅëÇÕµÈ °¡½Ã¼º°ú °í±Þ µ¥ÀÌÅÍ »ó°ü°ü°è ±â´ÉÀÌ ÇÊ¿äÇÕ´Ï´Ù.

CNAPP¿Í AppSec Å×½ºÆ® µµ±¸´Â ¸®½ºÅ© ¹× ÄÄÇöóÀ̾𽺠°ü¸®¿¡ Áß¿äÇÑ °¡Ä¡¸¦ Á¦°øÇÏÁö¸¸, ÁÖ·Î ½ÃÇÁÆ® ·¹ÇÁÆ® º¸¾ÈÀ» À§ÇÑ °ÍÀÔ´Ï´Ù. CNAPP(ƯÈ÷ ¿¡ÀÌÀüÆ®¸®½º Ç÷§Æû)Àº Ãë¾àÁ¡°ú ¼³Á¤ ¿À·ù¸¦ ½Äº°Çϰí ȯ°æÀ» °­È­ÇÏ´Â µ¥ ÁßÁ¡À» µÎ°í ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ µµ±¸´Â ½Ç½Ã°£ º¸È£º¸´Ù´Â ¹èÆ÷ Àü À§Çè °¨¼Ò¿¡ ÁßÁ¡À» µÎ±â ¶§¹®¿¡ SecOps ÆÀº¸´Ù Ŭ¶ó¿ìµå ¿£Áö´Ï¾î, DevOps, °³¹ßÀÚ¿¡°Ô ´õ À¯¸®ÇÕ´Ï´Ù.

ÀÌ·¯ÇÑ °ÝÂ÷¸¦ ÇØ¼ÒÇϱâ À§ÇØ Á¶Á÷Àº ÃֽŠ·±Å¸ÀÓ º¸¾È Á¢±Ù ¹æ½Ä¿¡ ÅõÀÚÇØ¾ß ÇÕ´Ï´Ù. CDR ¹× ADR ¼Ö·ç¼ÇÀº CNAPP, AppSec µµ±¸ ¹× WAF, RASP, ·±Å¸ÀÓ Ã¥ÀÓ, EDR µîÀÇ ·¹°Å½Ã ·±Å¸ÀÓ ¹æ¾î¸¦ °­·ÂÇÏ°Ô º¸¿ÏÇÕ´Ï´Ù. ÀÌ µµ±¸µéÀº SecOps ÆÀ¿¡ Ŭ¶ó¿ìµå ½ºÅà Àüü¿¡ ´ëÇÑ ½Ç½Ã°£ °¡½Ã¼º, À§Çù °¨Áö ¹× ´ëÀÀ ±â´ÉÀ» Á¦°øÇÏ¿© ½ÃÇÁÆ® ·¹ÇÁÆ®ÀÇ µµ±¸·Î´Â °¨ÁöÇϰųª ¾ïÁ¦ÇÒ ¼ö ¾ø´Â ´Éµ¿ÀûÀÎ À§Çù¿¡ ´ëÀÀÇÒ ¼ö ÀÖµµ·Ï Áö¿øÇÕ´Ï´Ù.

¼öÀÍ ¹× ¿¹Ãø

±âº» ÃßÁ¤Ä¡(2024³â) ¸ÅÃâ¾×Àº 5¾ï 2,830¸¸ ´Þ·¯À̸ç, Á¶»ç ±â°£ µ¿¾È CAGRÀº 58.2%ÀÔ´Ï´Ù.

CARS ½ÃÀå¿¡ ¹ÌÄ¡´Â Àü·«Àû ¿µÇâ·Â »óÀ§ 3°¡Áö

º¯ÇõÀû ¸Þ°¡Æ®·»µå

  • ÀÌÀ¯: Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ±â¼úÀÇ ±Þ¼ÓÇÑ µµÀÔÀ¸·Î ¾ÖÇø®ÄÉÀÌ¼Ç ·±Å¸ÀÓ È¯°æÀÌ ÀçÆíµÇ°í ÀÖ½À´Ï´Ù.
  • °üÁ¡: °æ°è º¸¾È ¹× ·¹°Å½Ã °¨Áö µµ±¸¿Í °°Àº ±âÁ¸ ¹æ½ÄÀº Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ·±Å¸ÀÓÀ» À§ÇØ Æ¯º°È÷ ¼³°èµÈ °í±Þ ½Ç½Ã°£ °¨Áö ¹× ´ëÀÀ ¼Ö·ç¼ÇÀ¸·Î ´ëüµÇ°í ÀÖ½À´Ï´Ù. ¾÷°èÀÇ Ã¤ÅÃÀº ÇâÈÄ 5³â µ¿¾È Àü ¼¼°èÀûÀ¸·Î ÀÌ·¯ÇÑ º¯È­¸¦ °¡¼ÓÈ­ÇÒ °ÍÀ¸·Î ¿¹ÃøµË´Ï´Ù.

°æÀï ½ÉÈ­

  • ÀÌÀ¯: °æÁ¦ ºÒÈ®½Ç¼º, ¿¹»ê Á¦¾à, ÁöÁ¤ÇÐÀû ±äÀåÀ¸·Î ÀÎÇØ ±â¾÷µéÀº º¸¾È ÁöÃâÀ» ÃÖÀûÈ­ÇØ¾ß Çϸç, È¿°úÀûÀ̰í ÇÕ¸®ÀûÀÎ °¡°ÝÀÇ ·±Å¸ÀÓ º¸¾È ¼Ö·ç¼Ç¿¡ ´ëÇÑ ¼ö¿ä°¡ Áõ°¡Çϰí ÀÖ½À´Ï´Ù. CNADR, CDR, ADR º¥´õ´Â °æÀï·Â ÀÖ´Â °¡°Ý Ã¥Á¤, ÃѼÒÀ¯ºñ¿ë(TCO) Àý°¨, ÀÔÁõ °¡´ÉÇÑ º¸¾È ¼º°ú Á¦°ø, ÁøÈ­ÇÏ´Â °í°´ÀÇ ±â´ë¿¡ ºÎÀÀÇØ¾ß ÇÕ´Ï´Ù.
  • °üÁ¡: ÀÚº» ÁöÃâÀ» ÁÙÀÌ°í ¾÷¹« È¿À²¼ºÀ» ³ôÀ̱â À§ÇØ Å¬¶ó¿ìµå·ÎÀÇ ÀüȯÀÌ ÁøÇàµÇ´Â °¡¿îµ¥, ½ÃÀå °æÀïÀº ´õ ³·Àº ºñ¿ëÀ¸·Î ´õ Å« °¡Ä¡¸¦ Á¦°øÇÏ´Â CNADR, CDR, ADR Åø·ÎÀÇ ÀüȯÀ» ÃËÁøÇÒ °ÍÀ¸·Î º¸ÀÔ´Ï´Ù. °¡°Ý ÀÎÇÏ¿Í Á¢±Ù¼º Çâ»óÀ¸·Î CNADR, CDR, ADR µµ±¸ÀÇ Ã¤ÅÃÀº ÇâÈÄ 3-5³â ³»¿¡ °¡¼ÓÈ­µÉ °ÍÀ¸·Î ¿¹ÃøµË´Ï´Ù.

ÆÄ±«Àû ±â¼ú

  • ÀÌÀ¯: ¸¶ÀÌÅ©·Î¼­ºñ½º, ÄÁÅ×À̳Ê, ¼­¹ö¸®½º ±â´É, K8s·ÎÀÇ ÀüȯÀº ·±Å¸ÀÓ º¸¾ÈÀÇ »óȲÀ» ±Ùº»ÀûÀ¸·Î º¯È­½Ã۰í ÀÖÀ¸¸ç, Àü¹®ÀûÀÎ À§Çù °¨Áö ¹× ´ëÀÀ ¸ÞÄ¿´ÏÁòÀÇ Çʿ伺À» °­Á¶Çϰí ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ »õ·Î¿î ±â¼ú¿¡´Â µ¿ÀûÀÌ°í ¼ø°£ÀûÀΠŬ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀÌ¼Ç ¿öÅ©·Îµå¿¡ ƯȭµÈ ½Ç½Ã°£ °¨Áö ¹× ´ëÀÀÀ» À§ÇÑ º¸¾È Á¢±Ù ¹æ½ÄÀÌ ÇÊ¿äÇÕ´Ï´Ù.
  • °üÁ¡: ´À½¼ÇÏ°Ô °áÇÕµÈ ·±Å¸ÀÓ º¸¾È Àü·«°ú ¸¶ÀÌÅ©·Î ¼¼ºÐÈ­ ¿øÄ¢¿¡ ´ëÇÑ ¼ö¿ä°¡ Å©°Ô Áõ°¡ÇÔ¿¡ µû¶ó ±âÁ¸ ¼Ö·ç¼ÇÀº Á¡Á¡ ´õ ±¸½ÄÀÌ µÉ °ÍÀÔ´Ï´Ù. ±â¾÷µéÀº º¹ÀâÇϰí ÀϽÃÀûÀÎ ·±Å¸ÀÓ È¯°æÀ» º¸È£Çϱâ À§ÇØ ½Ç½Ã°£ À§Çù °¨Áö, ÀÚµ¿ ´ëÀÀ, ¼¼¹ÐÇÑ °¡½Ã¼ºÀ» ¿ì¼±½ÃÇÏ°Ô µÉ °ÍÀÔ´Ï´Ù. ±× °á°ú, º¸¾È ÅõÀÚ´Â ÀüÅëÀûÀÎ Á¢±Ù ¹æ½Ä¿¡¼­ Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê ¾ÖÇø®ÄÉÀ̼ÇÀÇ ½Ç½Ã°£ º¸È£¿¡ ƯȭµÈ Ŭ¶ó¿ìµå ¹× ¾ÖÇø®ÄÉÀÌ¼Ç ·±Å¸ÀÓ º¸¾È µµ±¸·Î °è¼Ó ÀüȯµÉ °ÍÀ¸·Î º¸ÀÔ´Ï´Ù.

ºÐ¼® ¹üÀ§

  • ÀÌ º¸°í¼­´Â CDR, ADR ¹× »õ·Î¿î Ŭ¶ó¿ìµå º¸¾È Ä«Å×°í¸®(CNADR)ÀÇ ÃâÇö °¡´É¼º¿¡ ÃÊÁ¡À» ¸ÂÃß¾î Ŭ¶ó¿ìµå ¹× ¾ÖÇø®ÄÉÀÌ¼Ç ·±Å¸ÀÓ º¸¾È(CARS) ½ÃÀåÀ» Æò°¡ÇÕ´Ï´Ù.
  • À̹ø Á¶»ç¿¡¼­´Â CNAPP ÆÛ½ºÆ® CDR, µ¶¸³Çü CDR, ADR º¥´õ, ±×¸®°í ÅëÇÕ CNADR Ç÷§ÆûÀ» Á¦°øÇÏ´Â ½ºÅ¸Æ®¾÷ µî ±â¼ú º¥´õ¸¦ ´ë»óÀ¸·Î ÇÕ´Ï´Ù.
  • À̹ø Á¶»ç´Â CNADR, CDR, ADRÀ» Áß½ÉÀ¸·Î ÁøÇàµÇ¾úÁö¸¸, CWPP, API º¸¾È, Ŭ¶ó¿ìµå¿¡ ƯȭµÈ EDR, º¸´Ù ±¤¹üÀ§ÇÑ CNAPP »ýŰè¿Í °°Àº ÀÎÁ¢ µµ±¸¿¡ ´ëÇÑ ÅëÂû·Âµµ Æ÷ÇԵǾî ÀÖ½À´Ï´Ù.
  • ÀÌ º¸°í¼­´Â CDR, ADR, CNADR¿¡ ÃÊÁ¡À» ¸ÂÃá Ŭ¶ó¿ìµå ¹× ¾ÖÇø®ÄÉÀÌ¼Ç ·±Å¸ÀÓ º¸¾È ½ÃÀå ¼¼°è ½ÃÀå »óȲ°ú äÅà µ¿Çâ, ±×¸®°í ÀÌµé ±â¼úÀÇ ÇâÈÄ µ¿Çâ¿¡ ´ëÇÑ ÅëÂû·ÂÀ» Á¦°øÇÕ´Ï´Ù. CDR, ADR, CNADRÀº ¾ÆÁ÷ ½Å»ý ±â¼úÀ̱⠶§¹®¿¡ Á¤È®ÇÑ ¸ÅÃâ¾×À» ÃßÁ¤ÇÏ±â ¾î·Æ½À´Ï´Ù. ƯÈ÷ Palo Alto Networks, Wiz, CrowdStrike, Orca, Microsoft¿Í °°Àº CNAPP ÆÛ½ºÆ® º¥´õ¿¡°Ô´Â ´õ¿í ±×·¸´Ù. µû¶ó¼­ º» º¸°í¼­¿¡¼­´Â ´ÙÀ½°ú °°Àº ³ôÀº ¼öÁØÀÇ ÃßÁ¤Ä¡¸¸ Á¦°øÇÕ´Ï´Ù.
  • ARMO, Oligo, Upwind, Sweet Security, Stream Security, Mitiga, Raven, Miggo µî ½ÅÈï º¥´õµéÀÇ ±â¾÷ ¸ÅÃâ ÇÕ°è
  • CrowdStrike, Microsoft, Palo Alto Networks, Wiz µî ±âÁ¸ º¥´õµéÀÇ CNAPP ÃѸÅÃâ¾×
  • °í°´ÀÌ ÇÏÀ̺긮µå ¹× ¸ÖƼ Ŭ¶ó¿ìµå Àü·«À» äÅÃÇÔ¿¡ µû¶ó, Ŭ¶ó¿ìµå ¹× ¾ÖÇø®ÄÉÀÌ¼Ç ·±Å¸ÀÓ º¸¾È ¼Ö·ç¼ÇÀº µÎ ȯ°æÀ» ¸ðµÎ Áö¿øÇÒ ¼ö ÀÖ¾î¾ß ÇÕ´Ï´Ù. À̹ø Á¶»ç´Â ÇÏÀ̺긮µå ¹× ¸ÖƼ Ŭ¶ó¿ìµå µµÀÔÀ» À§ÇØ ¼³°èµÈ Ŭ¶ó¿ìµå¿¡ ±¸¾Ö¹ÞÁö ¾Ê´Â Àü¿ë ¼Ö·ç¼ÇÀ» Á¦°øÇÏ´Â º¥´õ¸¸À» ´ë»óÀ¸·Î Çß½À´Ï´Ù.
  • À̹ø Á¶»ç´Â Frost &SullivanÀÇ 2Â÷ Á¶»ç¿Í º¥´õ, ä³Î ÆÄÆ®³Ê, ±âŸ ¾÷°è ÀÌÇØ°ü°èÀÚÀÇ Á¤º¸¸¦ ¹ÙÅÁÀ¸·Î ÀÛ¼ºµÆ½À´Ï´Ù. ¸ðµç ¼öÀÍ ÃßÁ¤ ¹× ¿¹ÃøÀº Frost & SullivanÀÇ µ¶ÀÚÀûÀÎ ºÐ¼® ¹× ¸ðµ¨¸µÀ» ¹Ý¿µÇÕ´Ï´Ù.

ÁÖ¿ä °æÀï»ç

  • Aqua
  • Security
  • ARMO
  • Contrast
  • Security
  • Crowd
  • Strike
  • Datadog
  • Kodem
  • Fortinet
  • Microsoft
  • Mitiga
  • Miggo
  • Oligo
  • Security
  • Orca
  • Security
  • Palo
  • Alto
  • Networks
  • Qualys
  • Raven
  • Stream
  • Security
  • Sysdig
  • Sweet
  • Security
  • Sentinel
  • One Tenable
  • Uptycs
  • Wiz

¼ºÀå ÃËÁø¿äÀÎ

  • Ŭ¶ó¿ìµå ¼­ºñ½ºÀÇ ±Þ¼ÓÇÑ È®»êÀ¸·Î ÀÎÇØ °­·ÂÇÑ On-CloudÇù °ü¸®¿¡ ´ëÇÑ ¼ö¿ä°¡ Áõ°¡Çϰí ÀÖ½À´Ï´Ù.
  • Ŭ¶ó¿ìµå ±â¹Ý »çÀ̹ö °ø°Ý°ú ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á ¸®½ºÅ©°¡ Áõ°¡ÇÔ¿¡ µû¶ó ±â¾÷µéÀº Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê º¸¾ÈÀ» ¿ì¼±¼øÀ§¿¡ µÎ°í ÀÖ½À´Ï´Ù.
  • ±âÁ¸ º¸¾È Åø·Î´Â Ŭ¶ó¿ìµå ³×ÀÌÆ¼ºê À§Çù °ü¸® ¹®Á¦¸¦ ÇØ°áÇÒ ¼ö ¾ø±â ¶§¹®¿¡ SecOps ÆÀÀº CDR, ADR, CNADR ¼Ö·ç¼ÇÀ» µµÀÔÇϰí ÀÖ½À´Ï´Ù.
  • SOCÀÇ È¿À²¼ºÀ» °³¼±ÇÏ°í °æº¸·Î ÀÎÇÑ ÇǷθ¦ ÁÙ¿©¾ß ÇÒ Çʿ伺 ¶§¹®¿¡ ·±Å¸ÀÓ º¸È£¿Í ½Ç½Ã°£ À§Çù ´ëÀÀÀ¸·ÎÀÇ ÀüȯÀÌ °¡¼ÓÈ­µÇ°í ÀÖ½À´Ï´Ù.
  • Ŭ¶ó¿ìµåÀÇ ¼º¼÷µµ¿Í µ¥ºê¼½¿É½º(DevSecOps) °üÇàÀÇ µµÀÔÀº ½ÃÇÁÆ® ·¹ÇÁÆ®¿¡ ±×Ä¡Áö ¾Ê°í ·±Å¸ÀÓ ¹× À§Çù °ü¸®¸¦ Æ÷ÇÔÇÑ Á¾ÇÕÀûÀÎ º¸¾È Á¢±Ù ¹æ½Ä¿¡ ´ëÇÑ ¼ö¿ä¸¦ ÃËÁøÇϰí ÀÖ½À´Ï´Ù.

¼ºÀå ¾ïÁ¦¿äÀÎ

  • ¸¹Àº Á¶Á÷ÀÌ ½ÃÇÁÆ® ·¹ÇÁÆ®ÀÇ »ç°í¹æ½ÄÀ» °í¼öÇϰí Àֱ⠶§¹®¿¡ °¡Ä¡ Á¦¾È¿¡ ´ëÇÑ ³·Àº Àνİú È¥¶õÀÌ Ã¤¿ëÀ» ¹æÇØÇϰí ÀÖ½À´Ï´Ù.
  • ÅëÇÕÀÇ ¾î·Á¿ò, ³ôÀº ¿î¿µ ºñ¿ë, Àü¿ë ¿¹»ê ¹× ¼ÒÀ¯±Ç ºÎÁ·À¸·Î ÀÎÇØ ÅõÀÚ¸¦ ¸Á¼³ÀÌ°Ô µË´Ï´Ù.
  • ·±Å¸ÀÓ ¿¡ÀÌÀüÆ® ¹èÆ÷¿¡ ´ëÇÑ ¿ì·Á(ƯÈ÷ ADRÀÇ °æ¿ì)·Î ÀÎÇØ ·±Å¸ÀÓ º¸¾È µµ±¸ÀÇ Ã¤ÅÃÀÌ Áö¿¬µÇ°í ÀÖ½À´Ï´Ù.
  • Ç¥ÁØÀÇ ºÎÀç¿Í ±âÁ¸ ÅøÃ¼ÀΰúÀÇ Áߺ¹¿¡ ´ëÇÑ ¿ì·Á´Â ½Å±â¼ú¿¡ ´ëÇÑ ÅõÀÚ¸¦ ÁÖÀúÇÏ°Ô ¸¸µì´Ï´Ù.

¸ñÂ÷

¹üÀ§¿Í ¼¼ºÐÈ­

¼ºÀå ȯ°æ : ¼¼°è Ŭ¶ó¿ìµå/¾Û ·±Å¸ÀÓ º¸¾È ½ÃÀå º¯Çõ

  • ¿Ö ¼ºÀåÀÌ ´õ¿í ´õ ¾î·Á¿öÁö´Â°¡?
  • Àü·«Àû Çʼö ¿ä°Ç
  • ÀÚµ¿Â÷ ½ÃÀå 3°³ Àü·«Àû Çʼö ¿ä°ÇÀÇ ¿µÇâ

¼¼°èÀÇ ÀÚµ¿Â÷ ½ÃÀå »ýŰè

  • Ŭ¶ó¿ìµå º¸¾È ¿î¿µ °úÁ¦
  • ÇöÀç ·±Å¸ÀÓ º¸¾È ¼Ö·ç¼Ç ÇѰè
  • CDR¿Í ADR°¡ °úÁ¦¿¡ ¾î¶»°Ô ´ëóÇÒ±î
  • ÅëÇÕ Å¬¶ó¿ìµå/¾Û ·±Å¸ÀÓ º¸¾È ¼Ö·ç¼Ç Çʿ伺
  • ½ÃÀå Á¤ÀÇ - CNADR
  • ½ÃÀå Á¤ÀÇ - CDR¿Í ADR
  • ½ÃÀå Á¤ÀÇ - CWPP¿Í EDR
  • ½ÃÀå Á¤ÀÇ - CNADR ÁÖ¿ä ±â´É
  • ½ÃÀå Á¤ÀÇ - CNADRÀÇ ÀÌÁ¡
  • ½ÃÀå Á¤ÀÇ - CNADR ¿öÅ©Ç÷οì
  • ½ÃÀå Á¤ÀÇ - CNADR vs. CNAPP
  • CNAPP vs. CNADR
  • Unified CNADR ±¸Çö °úÁ¦
  • Á¶»ç ¹æ¹ý
  • º¥´õ Æ÷ÇÔ°ú Á¦¿Ü
  • CARS ½ÃÀå ¾÷°è Àüü äÅà »óȲ
  • Àüü CARS ½ÃÀå - ±â¼ú µ¿Çâ
  • Àüü CARS ½ÃÀå - ½ÃÀå µ¿Çâ
  • ÁÖ¿ä ÀÌ¿ë »ç·Ê¿Í ±â´É - CDR
  • ÁÖ¿ä ÀÌ¿ë »ç·Ê¿Í ±â´É - ADR
  • ÁÖ¿ä ÀÌ¿ë »ç·Ê¿Í ±â´É - CNADR

¼ºÀå ȯ°æ : C2A, ¼¼°èÀÇ CARS ½ÃÀå

  • ¼ºÀå ȯ°æ
  • ÁÖ¿ä °æÀï

¼¼°èÀÇ ÀÚµ¿Â÷ ½ÃÀå ¼ºÀå ÃËÁø¿äÀÎ

  • ¼ºÀå ÁöÇ¥
  • ¼ºÀå ÃËÁø¿äÀÎ
  • ¼ºÀå ÃËÁø¿äÀÎ ºÐ¼®
  • ¼ºÀå ¾ïÁ¦¿äÀÎ
  • ¼ºÀå ¾ïÁ¦ ºÐ¼®
  • ¿¹Ãø °í·Á»çÇ×
  • ¸ÅÃâ ¿¹Ãø
  • ºÎ¹®º° ÆÇ¸Å·® ¿¹Ãø
  • ¸ÅÃâ ¿¹Ãø ºÐ¼®
  • °¡°Ý µ¿Çâ°ú ¿¹Ãø ºÐ¼®
  • º¥´õº° ¸ÅÃâ
  • º¥´õº° ¸ÅÃ⠺м®

CISO¸¦ À§ÇÑ ÀλçÀÌÆ®

  • Ŭ¶ó¿ìµå ·±Å¸ÀÓ º¸¾È ¹Ì·¡
  • »õ·Î¿î Ä«Å×°í¸®ÀÇ °¡´É¼º
  • Ãßõ »çÇ×
  • ±Ç°í»çÇ× 1: ¸ñÇ¥¿Í »ç¿ë »ç·Ê¸¦ ÀÌÇØ
  • ±Ç°í»çÇ× 2: ½ÃÇÁÆ® ·¹ÇÁÆ®(Shift-left) º¸¾ÈÀ» Æ÷ÇÔÇÑ Æ÷°ýÀûÀÎ ±â´ÉÀ» Á¦°øÇÏ´Â ¼Ö·ç¼Ç ¼±ÅÃ
  • ±Ç°í»çÇ× 3: ±âÁ¸ SOC ÅøÃ¼ÀΰúÀÇ ¿øÈ°ÇÑ ÅëÇÕÀ» Áö¿øÇÏ´Â ¼Ö·ç¼Ç ¿ì¼±¼øÀ§ ºÎ¿©
  • ±Ç°í»çÇ× 4: ³ëÀÌÁî °¨¼Ò ¹× ÀÚµ¿È­µÈ ´ëÀÀ ´É·Â Çâ»ó¿¡ µµ¿òÀÌ µÇ´Â ¼Ö·ç¼Ç ¼±ÅÃ
  • ±Ç°í»çÇ× 5: ºÐ¼®°¡¸¦ À§ÇÑ °£°áÇÏ°í ½ÇÇà °¡´ÉÇÑ ÀλçÀÌÆ®¸¦ Á¦°øÇÏ´Â ¼Ö·ç¼Ç ¿ì¼±¼øÀ§ ºÎ¿©

¼ºÀå ±âȸ

  • ¼ºÀå ±âȸ 1: ·±Å¸ÀÓ º¸¾È ¹× ½Ç½Ã°£ À§Çù °ü¸®¿¡ ´ëÇÑ ¿ä±¸ Áõ°¡
  • ¼ºÀå ±âȸ 2: °ü¸®Çü Ŭ¶ó¿ìµå À§Çù °ü¸® ¼­ºñ½º¿¡ ´ëÇÑ ¼ö¿ä Áõ°¡
  • ¼ºÀå ±âȸ 3: CARS¸¦ º¸´Ù ±¤¹üÀ§ÇÑ CNAPP ¹× ŽÁö¡¤´ëÀÀ Ç÷§Æû¿¡ ÅëÇÕÇØ¾ß ÇÏ´Â ¿ä±¸

ºÎ·Ï°ú ´ÙÀ½ ´Ü°è

LSH 25.09.02

CDR and ADR are Experiencing Transformational Growth

SecOps and SOC teams focus on core threat management tasks, including threat monitoring, incident response, threat intelligence analysis, and security vulnerability management. Traditionally, these teams relied on tools such as SIEM, UEBA, and XDR to manage threats in on-premises environments.

However, the rapid adoption of cloud and cloud-native application services has rendered conventional threat management strategies inadequate. The dynamic, distributed, and ephemeral nature of cloud environments-particularly with containers and serverless functions-has created a constantly shifting attack surface. These resources spin up and down rapidly, making it difficult for SecOps teams to maintain real-time visibility and respond effectively to threats.

The multi-layered architecture of cloud-native applications-including containers, microservices, and cloud infrastructure-further complicates detection and response. Attacks often traverse layers, beginning with an exploited API or unknown vulnerability at the application level, then moving laterally through containers and into infrastructure. To manage these threats, SecOps teams must correlate events across layers, which requires unified visibility and advanced data correlation capabilities.

While CNAPP and AppSec testing tools provide significant value for risk and compliance management, they are primarily geared toward shift-left security. CNAPPs-especially agentless platforms-focus on identifying vulnerabilities and misconfigurations to harden environments. These tools benefit cloud engineers, DevOps, and developers more than SecOps teams, as they emphasize pre-deployment risk mitigation over real-time protection.

To close these gaps, organizations must invest in modern runtime security approaches. CDR and ADR solutions offer a powerful complement to CNAPPs, AppSec tools, and legacy runtime defenses such as WAF, RASP, runtime reachability, and EDR. These tools provide SecOps teams with real-time visibility, threat detection, and response capabilities across the full cloud stack-enabling them to address active threats that shift-left tools cannot detect or contain.

Revenue Forecast

The revenue estimate for the base year (2024) is $528.3 million, with a CAGR of 58.2% for the study period.

The Impact of the Top 3 Strategic Imperatives on the CARS Market

Transformative Megatrends

  • Why: The rapid adoption of cloud-native technologies is reshaping application runtime environments, driven by the demand for agility, scalability, and innovation in digital transformation initiatives.
  • Frost Perspective: Traditional methods-such as perimeter security and legacy detection tools-are being replaced by advanced, real-time detection and response solutions designed specifically for cloud-native runtimes. Industry adoption will accelerate this shift globally over the next 5 years.

Competitive Intensity

  • Why: Economic uncertainty, budget constraints, and geopolitical tensions are prompting organizations to optimize security spending, driving demand for runtime security solutions that are both effective and affordable. CNADR, CDR, and ADR vendors must offer competitive pricing, lower total cost of ownership (TCO), and demonstrable security outcomes to meet evolving customer expectations.
  • Frost Perspective: As organizations continue turning to the cloud to reduce capital expenditures and improve operational efficiency, market competition will push them toward CNADR, CDR, and ADR tools that deliver greater value at lower cost. Reduced pricing and improved accessibility will accelerate adoption of CNADR, CDR, and ADR tools over the next 3 to 5 years.

Disruptive Technologies

  • Why: The shift to microservices, containers, serverless functions, and K8s has fundamentally reshaped the runtime security landscape, underscoring the need for specialized threat detection and response mechanisms. These new technologies demand security approaches designed for real-time detection and response, tailored specifically to dynamic and ephemeral cloud-native application workloads.
  • Frost Perspective: Demand for loosely coupled runtime security strategies and microsegmentation principles will rise significantly, making legacy solutions increasingly obsolete. Organizations will prioritize real-time threat detection, automated response, and granular visibility to secure complex and ephemeral runtime environments. As a result, security investments will continue shifting away from traditional approaches toward specialized cloud and application runtime security tools designed for real-time protection of cloud-native applications.

Scope of Analysis

  • This report provides an assessment of the cloud and application runtime security (CARS) market, focusing on CDR, ADR, and the potential emergence of a new cloud security category-CNADR.
  • Technology vendors covered in this study include CNAPP-first CDR, standalone CDR, ADR vendors, and start-ups offering a converged CNADR platform.
  • While the study centers on CNADR, CDR, and ADR, it also includes insights into adjacent tools such as CWPP, API security, cloud-focused EDR, and the broader CNAPP ecosystem.
  • The study provides insights into the global market landscape and adoption trends within the cloud and application runtime security market, with a focus on CDR, ADR, and CNADR, as well as the future trajectory of these technologies. Given that CDR, ADR, and CNADR are still emerging, estimating precise revenue figures remains challenging-particularly for CNAPP-first vendors such as Palo Alto Networks, Wiz, CrowdStrike, Orca, and Microsoft. As a result, the report will provide only high-level estimates for:
  • Total company revenue for newer start-ups, including ARMO, Oligo, Upwind, Sweet Security, Stream Security, Mitiga, Raven, Miggo, and among others.
  • Total CNAPP revenue for established vendors such as CrowdStrike, Microsoft, Palo Alto Networks, and Wiz.
  • As customers adopt hybrid and multicloud strategies, a cloud and application runtime security solution must be capable of supporting both environments. This study includes only those vendors that offer dedicated, cloud-agnostic solutions designed for hybrid and multicloud deployments.
  • The study draws on Frost & Sullivan's secondary research, along with input from vendors, channel partners, and other industry stakeholders. All revenue estimates and forecasts reflect Frost & Sullivan's independent analysis and modeling.

Key Competitors

  • Aqua
  • Security
  • ARMO
  • Contrast
  • Security
  • Crowd
  • Strike
  • Datadog
  • Kodem
  • Fortinet
  • Microsoft
  • Mitiga
  • Miggo
  • Oligo
  • Security
  • Orca
  • Security
  • Palo
  • Alto
  • Networks
  • Qualys
  • Raven
  • Stream
  • Security
  • Sysdig
  • Sweet
  • Security
  • Sentinel
  • One Tenable
  • Uptycs
  • Wiz

Growth Drivers

  • The rapid and widespread adoption of cloud services is driving demand for robust cloud threat management.
  • The rise in cloud-based cyberattacks and software supply chain risks is pushing organizations to prioritize cloud-native security.
  • The inability of existing security tools to address cloud-native threat management challenges is prompting SecOps teams to adopt CDR, ADR, and CNADR solutions.
  • The need to improve SOC efficiency and reduce alert fatigue is accelerating the shift toward runtime protection and real-time threat response.
  • Growing cloud maturity and the adoption of DevSecOps practices are fueling demand for a holistic security approach that extends beyond shift-left to include runtime and threat management.

Growth Restraints

  • Low awareness and confusion about the value proposition hinder adoption, as many organizations remain committed to a shift-left mindset.
  • Integration challenges, high operational costs, and lack of dedicated budget or ownership create investment hesitancy.
  • Concerns around deploying runtime agents-especially with ADR-slow adoption of runtime security tools.
  • Lack of standards and the concerns over the overlaps with existing toolchains causes the hesitance in investment in new technologies.

Table of Contents

Scope and Segmentation

  • List of Abbreviations
  • Scope of Analysis

Growth Environment: Transformation in the Global Cloud/App Runtime Security Market

  • Why is it Increasingly Difficult to Grow?
  • The Strategic Imperative 8™
  • The Impact of the Top 3 Strategic Imperatives on the CARS Market

Ecosystem in the Global CARS Market

  • Cloud Security Operation Challenges
  • Limitations of Current Runtime Security Solutions
  • How CDR and ADR Address the Challenges
  • The Need for Unified Cloud/App Runtime Security Solution
  • Market Definition-CNADR
  • Market Definition-CDR and ADR
  • Market Definition-CWPP and EDR
  • Market Definition-CNADR's Key Functionalities
  • Market Definition-Benefits of CNADR
  • Market Definition-CNADR Workflows
  • Market Definition-CNADR vs. CNAPP
  • CNAPP vs. CNADR
  • Challenges in Achieving Unified CNADR
  • Research Methodology
  • Vendor Inclusion and Exclusion
  • Total CARS Market-Industry Adoption
  • Total CARS Market-Technology Trends
  • Total CARS Market-Market Developments
  • Top Use Cases and Features-CDR
  • Top Use Cases and Features-ADR
  • Top Use Cases and Features-CNADR

Growth Environment: C2A, Global CARS Market

  • Growth Environment
  • Key Competitors

Growth Generator in the Global CARS Market

  • Growth Metrics
  • Growth Drivers
  • Growth Driver Analysis
  • Growth Restraints
  • Growth Restraint Analysis
  • Forecast Considerations
  • Revenue Forecast
  • Revenue Forecast by Segment
  • Revenue Forecast Analysis
  • Pricing Trends and Forecast Analysis
  • Revenue by Vendor
  • Revenue Analysis by Vendor

Insights for CISOs

  • Future of Cloud Runtime Security
  • The Possibility of a New Category
  • Recommendations
  • Recommendation 1: Understand Your Objectives and Use Cases
  • Recommendation 2: Choose Solutions That Offer Comprehensive Capabilities, Including Shift-left Security
  • Recommendation 3: Prioritize Solutions That Support Seamless Integration with Existing SOC Toolchains
  • Recommendation 4: Choose Solutions That Helps Reduce Noise and Enhance Automated Response Capabilities
  • Recommendation 5: Prioritize Solutions That Offer Simplified and Actionable Insights for Analysts

Growth Opportunity Universe

  • Growth Opportunity 1: Increasing Requirements for Runtime Security and Real-time Threat Management
  • Growth Opportunity 2: Rising Demand for Managed Cloud Threat Management Services
  • Growth Opportunity 3: Requirements for CARS to be Incorporated in Broader CNAPP and Detection & Response Platform

Appendix and Next Steps

  • Benefits and Impacts of Growth Opportunities
  • Next Steps
  • List of Exhibits
  • Legal Disclaimer
»ùÇà ¿äû ¸ñ·Ï
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
¸ñ·Ï º¸±â
Àüü»èÁ¦