½ÃÀ庸°í¼­
»óǰÄÚµå
1819932

ÀûÀÀÇü º¸¾È ½ÃÀå º¸°í¼­ : ÄÄÆ÷³ÍÆ®, Àü°³ ¸ðµ¨, ¿ëµµ, ÃÖÁ¾»ç¿ëÀÚ, Áö¿ªº°(2025-2033³â)

Adaptive Security Market Report by Component, Deployment Model, Application, End User, and Region 2025-2033

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IMARC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 145 Pages | ¹è¼Û¾È³» : 2-3ÀÏ (¿µ¾÷ÀÏ ±âÁØ)

    
    
    




¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

¼¼°è ÀûÀÀÇü º¸¾È ½ÃÀå ±Ô¸ð´Â 2024³â 117¾ï ´Þ·¯¿¡ ´ÞÇß½À´Ï´Ù. IMARC GroupÀº ½ÃÀåÀÌ 2033³â±îÁö 365¾ï ´Þ·¯¿¡ ´ÞÇϰí, 2025-2033³â 12.85%ÀÇ ¿¬Æò±Õ ¼ºÀå·ü(CAGR)À» º¸ÀÏ °ÍÀ¸·Î ¿¹ÃøÇß½À´Ï´Ù. »çÀ̹ö °ø°Ý Áõ°¡, Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ µµÀÔ È®´ë, IoT ±â±â º¸±Þ È®´ë, ÷´Ü ±â¼ú ÅëÇÕ µîÀÌ ½ÃÀå ¼ºÀåÀ» ÁÖµµÇϰí ÀÖ½À´Ï´Ù.

ÀûÀÀÇü º¸¾È ½ÃÀå µ¿Çâ :

»çÀ̹ö À§Çù Áõ°¡

Áö´ÉÇü Áö¼Ó À§Çù(APT), Á¦·Îµ¥ÀÌ ÀͽºÇ÷ÎÀÕ, ±âŸ Ç¥ÀûÇü °ø°Ý°ú °°Àº »çÀ̹ö À§Çù Áõ°¡°¡ ½ÃÀå ¼ºÀåÀ» °¡¼ÓÇϰí ÀÖ½À´Ï´Ù. ¿¹¸¦ µé¾î, »çÀ̹ö º¸¾È Åë°è¿¡ µû¸£¸é, ¸ÅÀÏ 2,200°ÇÀÇ »çÀ̹ö °ø°ÝÀÌ ¹ß»ýÇϸç, Æò±Õ 39Ãʸ¶´Ù 1°Ç¾¿ ¹ß»ýÇϰí ÀÖ½À´Ï´Ù. ¶ÇÇÑ, ±â¾÷ÀÇ Àý¹Ý(50%)°ú ÀÚ¼±´ÜüÀÇ ¾à 1/3(32%)ÀÌ 2023³â¿¡ »çÀ̹ö º¸¾È Ä§ÇØ³ª °ø°ÝÀ» ¹ÞÀº ÀûÀÌ ÀÖ´Ù°í ´äÇß½À´Ï´Ù. ÀÌ·¯ÇÑ À§Çù¿¡´Â ÀûÀÀÇü º¸¾È ¼Ö·ç¼ÇÀÌ Á¦°øÇÏ´Â º¸´Ù ¿ªµ¿ÀûÀÌ°í ½Å¼ÓÇÑ º¸¾È ´ëÃ¥ÀÌ ÇÊ¿äÇÕ´Ï´Ù. ±â¾÷µéÀº ±âÁ¸ º¸¾È Á¶Ä¡ÀÇ ÇѰ踦 Á¡Á¡ ´õ ÀνÄÇϰí ÀÖÀ¸¸ç, ÀÌ·¯ÇÑ °íµµÈ­µÈ À§Çù¿¡ ´ëÀÀÇϱâ À§ÇØ ÀûÀÀÇü º¸¾È¿¡ ÅõÀÚÇϰí ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ ¿äÀεé·Î ÀÎÇØ ÇâÈÄ ¸î ³â µ¿¾È ÀûÀÀÇü º¸¾È ½ÃÀåÀÌ È°¼ºÈ­µÉ °ÍÀ¸·Î ¿¹ÃøµË´Ï´Ù.

Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ µµÀÔ

Ŭ¶ó¿ìµå ÄÄÇ»ÆÃÀ¸·ÎÀÇ ÀüȯÀº ÀûÀÀÇü º¸¾È ½ÃÀåÀÇ ¼ºÀå¿¡ Å« ¿µÇâÀ» ¹ÌÄ¡°í ÀÖ½À´Ï´Ù. ¿¹¸¦ µé¾î, Statista¿¡ µû¸£¸é 2023³â ÇöÀç Àü ¼¼°è µðÁöÅÐ ¸®´õÀÇ ¾à 92%°¡ ¼Ò±Ô¸ð ¶Ç´Â ´ë±Ô¸ð·Î Ŭ¶ó¿ìµå ±â¼úÀ» »ç¿ëÇϰí ÀÖ´Ù°í º¸°íÇß½À´Ï´Ù. Ŭ¶ó¿ìµå ±â¹Ý º¸¾È ¼Ö·ç¼ÇÀº À¯¿¬¼º°ú È®À强ÀÌ ¶Ù¾î³ª¸ç, ºÐ»êµÈ ȯ°æ Àü¹Ý¿¡ °ÉÃÄ °­·ÂÇÑ º¸¾È Á¶Ä¡°¡ ÇÊ¿äÇÑ Çö´ë ±â¾÷¿¡°Ô ¸Å¿ì Áß¿äÇÕ´Ï´Ù. ÀÌ·¯ÇÑ ¿äÀεéÀº ÀûÀÀÇü º¸¾È ½ÃÀåÀÇ ¼öÀÍ¿¡ ´õ¿í ±àÁ¤ÀûÀÎ ¿µÇâÀ» ¹ÌÄ¥ °ÍÀÔ´Ï´Ù.

±â¼ú ¹ßÀü

±â¼úÀÇ ¹ßÀüÀº ÀûÀÀÇü º¸¾È ½ÃÀåÀÇ ¼ºÀåÀ» Å©°Ô ÃËÁøÇϰí ÀÖ½À´Ï´Ù. AI¿Í ML ¾Ë°í¸®ÁòÀº ½Ç½Ã°£À¸·Î ÀÌ»ó ¡ÈÄ¿Í ÀáÀçÀû º¸¾È À§ÇùÀ» °¨ÁöÇÏ´Â µ¥ Á¡Á¡ ´õ ¸¹ÀÌ »ç¿ëµÇ°í ÀÖÀ¸¸ç, º¸´Ù ´Éµ¿ÀûÀÎ º¸¾È Á¶Ä¡¸¦ °¡´ÉÇÏ°Ô Çϰí ÀÖ½À´Ï´Ù. ¿¹¸¦ µé¾î, ¸ð¹ÙÀÏ ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È ¼Ö·ç¼Ç Á¦°ø¾÷üÀÎ Build38Àº 2024³â 2¿ù, ¸ð¹ÙÀÏ ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾ÈÀÇ ¹Ì·¡¸¦ ¹Ù²Ü Â÷¼¼´ë AI ±â¹Ý ´Éµ¿Çü °æÈ­ ±â¼úÀ» ¹ßÇ¥Çß½À´Ï´Ù. Active HardeningÀº ¸ð¹ÙÀÏ ¾Û º¸¾ÈÀÇ Áß¿äÇÑ ¹ßÀüÀ¸·Î, AI ±â¹Ý À§Çù µ¥ÀÌÅÍ¿Í ÀûÀÀÇü º¸¾È ÇÁ·ÎÆÄÀÏÀ» °áÇÕÇÏ¿© »õ·Î¿î °ø°Ý¿¡ ´ëÇÑ ¼±Á¦Àû ¹æ¾î¸¦ °¡´ÉÇÏ°Ô Çϰí, ÀûÀÀÇü º¸¾È ½Ã½ºÅÛ ½ÃÀå ¼öÀͼºÀ» Çâ»ó½Ãų ¼ö ÀÖ½À´Ï´Ù. ½ÃÀå ¼öÀÍÀ» ²ø¾î¿Ã¸± ¼ö ÀÖ½À´Ï´Ù.

¸ñÂ÷

Á¦1Àå ¼­¹®

Á¦2Àå Á¶»ç ¹üÀ§¿Í Á¶»ç ¹æ¹ý

  • Á¶»ç ¸ñÀû
  • ÀÌÇØ°ü°èÀÚ
  • µ¥ÀÌÅÍ ¼Ò½º
    • 1Â÷ Á¤º¸
    • 2Â÷ Á¤º¸
  • ½ÃÀå ÃßÁ¤
    • º¸ÅÒ¾÷ Á¢±Ù
    • Åé´Ù¿î Á¢±Ù
  • Á¶»ç ¹æ¹ý

Á¦3Àå ÁÖ¿ä ¿ä¾à

Á¦4Àå ¼­·Ð

Á¦5Àå ¼¼°èÀÇ ÀûÀÀÇü º¸¾È ½ÃÀå

  • ½ÃÀå °³¿ä
  • ½ÃÀå ½ÇÀû
  • COVID-19ÀÇ ¿µÇâ
  • ½ÃÀå ¿¹Ãø

Á¦6Àå ½ÃÀå ºÐ¼® : ÄÄÆ÷³ÍÆ®º°

  • ¼­ºñ½º
  • ¼Ö·ç¼Ç

Á¦7Àå ½ÃÀå ºÐ¼® : Àü°³ ¸ðµ¨º°

  • On-Premise
  • Ŭ¶ó¿ìµå ±â¹Ý

Á¦8Àå ½ÃÀå ºÐ¼® : ¿ëµµº°

  • ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
  • ³×Æ®¿öÅ© º¸¾È
  • ¿£µåÆ÷ÀÎÆ® º¸¾È
  • Ŭ¶ó¿ìµå º¸¾È
  • ±âŸ

Á¦9Àå ½ÃÀå ºÐ¼® : ÃÖÁ¾»ç¿ëÀÚº°

  • ÀºÇà, ±ÝÀ¶¼­ºñ½º ¹× º¸Çè(BFSI)
  • Á¤ºÎ ¹× ¹æÀ§
  • Á¦Á¶
  • ÇコÄɾî
  • ¿¡³ÊÁö ¹× À¯Æ¿¸®Æ¼
  • IT ¹× Åë½Å
  • ±âŸ

Á¦10Àå ½ÃÀå ºÐ¼® : Áö¿ªº°

  • ºÏ¹Ì
    • ¹Ì±¹
    • ij³ª´Ù
  • ¾Æ½Ã¾ÆÅÂÆò¾ç
    • Áß±¹
    • ÀϺ»
    • Àεµ
    • Çѱ¹
    • È£ÁÖ
    • Àεµ³×½Ã¾Æ
    • ±âŸ
  • À¯·´
    • µ¶ÀÏ
    • ÇÁ¶û½º
    • ¿µ±¹
    • ÀÌÅ»¸®¾Æ
    • ½ºÆäÀÎ
    • ·¯½Ã¾Æ
    • ±âŸ
  • ¶óƾ¾Æ¸Þ¸®Ä«
    • ºê¶óÁú
    • ¸ß½ÃÄÚ
    • ±âŸ
  • Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«

Á¦11Àå SWOT ºÐ¼®

Á¦12Àå ¹ë·ùüÀÎ ºÐ¼®

Á¦13Àå PorterÀÇ Five Forces ºÐ¼®

Á¦14Àå °¡°Ý ºÐ¼®

Á¦15Àå °æÀï ±¸µµ

  • ½ÃÀå ±¸Á¶
  • ÁÖ¿ä ±â¾÷
  • ÁÖ¿ä ±â¾÷ °³¿ä
    • Cisco Systems Inc.
    • Cloudwick Technologies Inc
    • FireEye Inc.
    • Hewlett Packard Enterprise Company
    • Illumio Inc.
    • Juniper Networks Inc.
    • Oracle Corporation
    • Rapid7 Inc
    • RSA Security LLC
    • Trend Micro Incorporated
    • WatchGuard Technologies Inc.
LSH 25.09.30

The global adaptive security market size reached USD 11.7 Billion in 2024. Looking forward, IMARC Group expects the market to reach USD 36.5 Billion by 2033, exhibiting a growth rate (CAGR) of 12.85% during 2025-2033. The rising cyber-attacks, increasing adoption of cloud computing, growing proliferation of IoT devices, and integration of advanced technologies are primarily driving the market's growth.

Adaptive Security Market Trends:

Rising Cyber Threats

Rising cyber threats such as advanced persistent threats (APTs), zero-day exploits, and other targeted attacks are driving the market's growth. For instance, cybersecurity statistics show that there are 2,200 cyber-attacks every day, with one occurring every 39 seconds on average. Also, half of companies (50%) and around one-third of charities (32%) report having had a cyber security breach or attack in 2023. These threats necessitate more dynamic and responsive security measures that adaptive security solutions provide. Companies are increasingly aware of the limitations of traditional security measures and are investing in adaptive security to counteract these advanced threats. These factors are expected to propel the adaptive security market in the coming years.

Adoption of Cloud Computing

The shift towards cloud computing has been a major factor in the growth of the adaptive security market. For instance, according to Statista, as of 2023, approximately 92% of worldwide digital leaders reported that their organizations had used cloud technology on a small or large scale. Cloud-based security solutions offer flexibility and scalability, which are crucial for modern enterprises that require robust security measures across distributed environments. These factors further positively influence the adaptive security market revenue.

Technological Advancements

Technological advancements are significantly driving the growth of the adaptive security market. AI and ML algorithms are increasingly being used to detect anomalies and potential security threats in real-time, allowing for more proactive security measures. For instance, in February 2024, Build38, a provider of Mobile Application Security solutions, launched its Next Gen AI-Powered Active Hardening technology, which is poised to alter the future of Mobile App Security. Active Hardening is a significant advancement in Mobile App Security, combining AI-driven threat data with adaptive security profiles to enable proactive protection against emerging attacks, thereby boosting the adaptive security systems market revenue.

Global Adaptive Security Industry Segmentation:

Breakup by Component:

  • Service
  • Solution

According to the adaptive security market outlook, the rising frequency and sophistication of cyber-attacks, including malware, ransomware, and phishing attacks, drive the need for adaptive security services. Moreover, targeted and prolonged cyber-attacks necessitate continuous monitoring and adaptive response mechanisms. Apart from this, adaptive security solution integrates global threat data to identify emerging threats quickly and adjust defenses accordingly. Also, solutions leveraging machine learning and artificial intelligence to identify and respond to threats in real time are in high demand. These technologies can detect unusual patterns and predict potential threats before they cause harm.

Breakup by Deployment Model:

  • On-premises
  • Cloud-based

According to the adaptive security market overview, on-premises adaptive security solutions are hosted within an organization's own physical infrastructure. This means all hardware, software, and data are managed internally. While cloud-based adaptive security solutions are hosted in the cloud, managed by a third-party service provider. The organization accesses these services over the internet.

Breakup by Application:

  • Application Security
  • Network Security
  • End Point Security
  • Cloud Security
  • Others

Application security involves measures taken to improve the security of an application by finding, fixing, and preventing security vulnerabilities. Moreover, network security involves protecting the integrity, confidentiality, and availability of data as it is transmitted across or accessed through a network. Apart from this, endpoint security involves securing endpoints or entry points of end-user devices such as desktops, laptops, and mobile devices from malicious activities.

Breakup by End User:

  • BFSI
  • Government and Defense
  • Manufacturing
  • Healthcare
  • Energy and Utilities
  • IT and Telecom
  • Others

Stringent regulations like GDPR, PCI DSS, and other regional data protection laws in BFSI sector mandate advanced security measures. Moreover, the increasing threat of cyber warfare and espionage in government and defense sector necessitates advanced security measures. Apart from this, the rising use of IoT devices in manufacturing processes which are vulnerable to cyber-attacks is also proliferating the industry's demand.

Breakup by Region:

  • North America
    • United States
    • Canada
  • Asia-Pacific
    • China
    • Japan
    • India
    • South Korea
    • Australia
    • Indonesia
    • Others
  • Europe
    • Germany
    • France
    • United Kingdom
    • Italy
    • Spain
    • Russia
    • Others
  • Latin America
    • Brazil
    • Mexico
    • Others
  • Middle East and Africa

The report has also provided a comprehensive analysis of all the major regional markets, which include North America (the United States and Canada); Europe (Germany, France, the United Kingdom, Italy, Spain, Russia and others); Asia Pacific (China, Japan, India, South Korea, Australia, Indonesia, and others); Latin America (Brazil, Mexico, and others); and the Middle East and Africa.

According to the adaptive security market statistics, North America holds a significant share of the global adaptive security market due to the early adoption of advanced security technologies. Moreover, Europe is also gaining a potential share in adaptive security, driven by stringent data protection regulations. Apart from this, the Asia-Pacific region is expected to see the fastest growth due to increasing digital transformation initiatives.

Competitive Landscape:

The market research report has provided a comprehensive analysis of the competitive landscape. Detailed profiles of all major market companies have also been provided. Some of the key players in the market include:

  • Cisco Systems Inc.
  • Cloudwick Technologies Inc
  • FireEye Inc.
  • Hewlett Packard Enterprise Company
  • Illumio Inc.
  • Juniper Networks Inc.
  • Oracle Corporation
  • Rapid7 Inc
  • RSA Security LLC
  • Trend Micro Incorporated
  • WatchGuard Technologies Inc.

Key Questions Answered in This Report:

  • How has the global adaptive security market performed so far and how will it perform in the coming years?
  • What has been the impact of COVID-19 on the global adaptive security market?
  • What are the key regional markets?
  • What is the breakup of the market based on the component?
  • What is the breakup of the market based on the deployment model?
  • What is the breakup of the market based on the application?
  • What is the breakup of the market based on the end user?
  • What are the various stages in the value chain of the industry?
  • What are the key driving factors and challenges in the industry?
  • What is the structure of the global adaptive security market and who are the key players?
  • What is the degree of competition in the industry?

Table of Contents

1 Preface

2 Scope and Methodology

  • 2.1 Objectives of the Study
  • 2.2 Stakeholders
  • 2.3 Data Sources
    • 2.3.1 Primary Sources
    • 2.3.2 Secondary Sources
  • 2.4 Market Estimation
    • 2.4.1 Bottom-Up Approach
    • 2.4.2 Top-Down Approach
  • 2.5 Forecasting Methodology

3 Executive Summary

4 Introduction

  • 4.1 Overview
  • 4.2 Key Industry Trends

5 Global Adaptive Security Market

  • 5.1 Market Overview
  • 5.2 Market Performance
  • 5.3 Impact of COVID-19
  • 5.4 Market Forecast

6 Market Breakup by Component

  • 6.1 Service
    • 6.1.1 Market Trends
    • 6.1.2 Market Forecast
  • 6.2 Solution
    • 6.2.1 Market Trends
    • 6.2.2 Market Forecast

7 Market Breakup by Deployment Model

  • 7.1 On-premises
    • 7.1.1 Market Trends
    • 7.1.2 Market Forecast
  • 7.2 Cloud-based
    • 7.2.1 Market Trends
    • 7.2.2 Market Forecast

8 Market Breakup by Application

  • 8.1 Application Security
    • 8.1.1 Market Trends
    • 8.1.2 Market Forecast
  • 8.2 Network Security
    • 8.2.1 Market Trends
    • 8.2.2 Market Forecast
  • 8.3 End Point Security
    • 8.3.1 Market Trends
    • 8.3.2 Market Forecast
  • 8.4 Cloud Security
    • 8.4.1 Market Trends
    • 8.4.2 Market Forecast
  • 8.5 Others
    • 8.5.1 Market Trends
    • 8.5.2 Market Forecast

9 Market Breakup by End User

  • 9.1 BFSI
    • 9.1.1 Market Trends
    • 9.1.2 Market Forecast
  • 9.2 Government and Defense
    • 9.2.1 Market Trends
    • 9.2.2 Market Forecast
  • 9.3 Manufacturing
    • 9.3.1 Market Trends
    • 9.3.2 Market Forecast
  • 9.4 Healthcare
    • 9.4.1 Market Trends
    • 9.4.2 Market Forecast
  • 9.5 Energy and Utilities
    • 9.5.1 Market Trends
    • 9.5.2 Market Forecast
  • 9.6 IT and Telecom
    • 9.6.1 Market Trends
    • 9.6.2 Market Forecast
  • 9.7 Others
    • 9.7.1 Market Trends
    • 9.7.2 Market Forecast

10 Market Breakup by Region

  • 10.1 North America
    • 10.1.1 United States
      • 10.1.1.1 Market Trends
      • 10.1.1.2 Market Forecast
    • 10.1.2 Canada
      • 10.1.2.1 Market Trends
      • 10.1.2.2 Market Forecast
  • 10.2 Asia-Pacific
    • 10.2.1 China
      • 10.2.1.1 Market Trends
      • 10.2.1.2 Market Forecast
    • 10.2.2 Japan
      • 10.2.2.1 Market Trends
      • 10.2.2.2 Market Forecast
    • 10.2.3 India
      • 10.2.3.1 Market Trends
      • 10.2.3.2 Market Forecast
    • 10.2.4 South Korea
      • 10.2.4.1 Market Trends
      • 10.2.4.2 Market Forecast
    • 10.2.5 Australia
      • 10.2.5.1 Market Trends
      • 10.2.5.2 Market Forecast
    • 10.2.6 Indonesia
      • 10.2.6.1 Market Trends
      • 10.2.6.2 Market Forecast
    • 10.2.7 Others
      • 10.2.7.1 Market Trends
      • 10.2.7.2 Market Forecast
  • 10.3 Europe
    • 10.3.1 Germany
      • 10.3.1.1 Market Trends
      • 10.3.1.2 Market Forecast
    • 10.3.2 France
      • 10.3.2.1 Market Trends
      • 10.3.2.2 Market Forecast
    • 10.3.3 United Kingdom
      • 10.3.3.1 Market Trends
      • 10.3.3.2 Market Forecast
    • 10.3.4 Italy
      • 10.3.4.1 Market Trends
      • 10.3.4.2 Market Forecast
    • 10.3.5 Spain
      • 10.3.5.1 Market Trends
      • 10.3.5.2 Market Forecast
    • 10.3.6 Russia
      • 10.3.6.1 Market Trends
      • 10.3.6.2 Market Forecast
    • 10.3.7 Others
      • 10.3.7.1 Market Trends
      • 10.3.7.2 Market Forecast
  • 10.4 Latin America
    • 10.4.1 Brazil
      • 10.4.1.1 Market Trends
      • 10.4.1.2 Market Forecast
    • 10.4.2 Mexico
      • 10.4.2.1 Market Trends
      • 10.4.2.2 Market Forecast
    • 10.4.3 Others
      • 10.4.3.1 Market Trends
      • 10.4.3.2 Market Forecast
  • 10.5 Middle East and Africa
    • 10.5.1 Market Trends
    • 10.5.2 Market Breakup by Country
    • 10.5.3 Market Forecast

11 SWOT Analysis

  • 11.1 Overview
  • 11.2 Strengths
  • 11.3 Weaknesses
  • 11.4 Opportunities
  • 11.5 Threats

12 Value Chain Analysis

13 Porters Five Forces Analysis

  • 13.1 Overview
  • 13.2 Bargaining Power of Buyers
  • 13.3 Bargaining Power of Suppliers
  • 13.4 Degree of Competition
  • 13.5 Threat of New Entrants
  • 13.6 Threat of Substitutes

14 Price Analysis

15 Competitive Landscape

  • 15.1 Market Structure
  • 15.2 Key Players
  • 15.3 Profiles of Key Players
    • 15.3.1 Cisco Systems Inc.
      • 15.3.1.1 Company Overview
      • 15.3.1.2 Product Portfolio
      • 15.3.1.3 Financials
      • 15.3.1.4 SWOT Analysis
    • 15.3.2 Cloudwick Technologies Inc
      • 15.3.2.1 Company Overview
      • 15.3.2.2 Product Portfolio
    • 15.3.3 FireEye Inc.
      • 15.3.3.1 Company Overview
      • 15.3.3.2 Product Portfolio
      • 15.3.3.3 Financials
    • 15.3.4 Hewlett Packard Enterprise Company
      • 15.3.4.1 Company Overview
      • 15.3.4.2 Product Portfolio
      • 15.3.4.3 Financials
      • 15.3.4.4 SWOT Analysis
    • 15.3.5 Illumio Inc.
      • 15.3.5.1 Company Overview
      • 15.3.5.2 Product Portfolio
    • 15.3.6 Juniper Networks Inc.
      • 15.3.6.1 Company Overview
      • 15.3.6.2 Product Portfolio
      • 15.3.6.3 Financials
      • 15.3.6.4 SWOT Analysis
    • 15.3.7 Oracle Corporation
      • 15.3.7.1 Company Overview
      • 15.3.7.2 Product Portfolio
      • 15.3.7.3 Financials
      • 15.3.7.4 SWOT Analysis
    • 15.3.8 Rapid7 Inc
      • 15.3.8.1 Company Overview
      • 15.3.8.2 Product Portfolio
      • 15.3.8.3 Financials
    • 15.3.9 RSA Security LLC
      • 15.3.9.1 Company Overview
      • 15.3.9.2 Product Portfolio
    • 15.3.10 Trend Micro Incorporated
      • 15.3.10.1 Company Overview
      • 15.3.10.2 Product Portfolio
      • 15.3.10.3 Financials
      • 15.3.10.4 SWOT Analysis
    • 15.3.11 WatchGuard Technologies Inc.
      • 15.3.11.1 Company Overview
      • 15.3.11.2 Product Portfolio
»ùÇà ¿äû ¸ñ·Ï
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
¸ñ·Ï º¸±â
Àüü»èÁ¦