The Mobile Device & Network Security Bible: 2013 - 2020

Release Date: September 2013
Number of Pages: 284
Number of Tables and Figures: 118

Synopsis: Mobile networks around the globe generate more than 50 Exabytes of traffic annually. The immense volume of traffic together with the growing adoption of open source Operating System (OS) platforms such as Android has opened up new security threats. Mobile malware, SMS spam, cyber attacks and unlawful eavesdropping are an ever-increasing problem for enterprises, consumers and mobile network operators around the globe.

This has in turn led to significant investments in integrated security appliances and content security gateways by both enterprises and mobile network operators,  besides opening doors for emerging submarkets such as mobile Security as a Service (SECaaS).

On the devices front, installation of Anti-Malware/Anti-Virus client software is fast becoming a de-facto requirement for most smartphones and tablets. Furthermore, mobile device OEMs are also integrating advanced biometrics such as fingerprint sensing into their smartphones and tablets, amid growing popularity of security sensitive opportunities such as mobile payments.

Driven by the thriving ecosystem, SNS Research estimates that mobile device and network security investments will account for nearly $9 Billion in 2013 alone. The market is further expected to grow at a CAGR of nearly 21% over the next 7 years.

This report presents an in-depth assessment of the global mobile device and network security market, and covers four individual submarkets. In addition to covering key market drivers, challenges, future roadmap, value chain analysis, deployment case studies and vendor service/product strategies for each submarket, the report also presents comprehensive forecasts for the mobile device and network security market from 2013 till 2020. Historical revenue figures for 2010 – 2012 are also presented. The forecasts and historical revenue figures are individually segmented for four submarkets, 17 product/service categories, six geographical regions and 34 countries.

The report comes with an associated Excel datasheet covering quantitative data from all figures presented within the report.



For a sample of the report or any further inquiries please contact info@snstelecom.com

Pricing: The report is available for the following price: 

Single User License: USD 2,500

Company Wide License: USD 3,500

Key Findings:
The report has the following key findings:
  • Driven by the thriving ecosystem, SNS Research estimates that mobile device and network security investments will account for nearly $9 Billion in 2013 alone. The market is further expected to grow at a CAGR of nearly 21% over the next 7 years
  • Enterprises and mobile network operators have made significant investments in integrated security appliances and content security gateways (including those specific to SMS/MMS security)
    The installation of Anti-Malware/Anti-Virus client software is fast becoming a de-facto requirement for most smartphones and tablets
  • More than half of all enterprises allow the use of employed owned mobile devices on their networks. Enterprises thus continue to aggressively adopt SSL VPNs in their mobile security strategies to ensure connection security in addition to activity monitoring and control
  • Mobile Device Management (MDM) services providers are eyeing on opportunities for cloud based mobile security services that extend existing security policies to enterprise mobile devices to help secure data, reduce risk and protect the enterprise, which has created a new submarket for mobile Security as a Service (SEaaS)

Topics Covered:
The report covers the following topics:
    • An in-depth analysis for four individual submarkets and their associated product/service categories: Mobile Network Infrastructure Security Software & Appliances, Mobile Device Client Security Software, Mobile Device Security Hardware and Mobile Security & MDM Services
    • Value chain analysis for each submarket   
    • Key market drivers and challenges for each submarket
    • Key trends for each submarket
    • Case studies on product/service deployment for each submarket
    • Profiles and strategies of key players in the market
    • Historical revenue figures and forecasts till 2020

    Historical Revenue & Forecast Segmentation:
    Market forecasts and historical revenue figures are provided for each of the following submarkets and their 17 product/service categories:
    • Mobile Network Infrastructure Security Software & Appliances
      • Integrated Security Appliances (Hardware & Software)
      • Content Security Gateways
      • SMS/MMS Content Security Gateways
    • Mobile Device Client Security Software
      • Anti-Malware/Anti-Virus Client Software
      • Back Up & Restore Software
      • Privacy Protection Software
      • Mobile VPN Client Software
      • Remote Locking Software
      • Remote Tracking Software
      • Encrypted Communications (Voice/Data) Software
      • Encrypted Storage Software
    • Mobile Device Security Hardware
      • Semiconductors/Embedded Chip Security
      • NFC
      • Biometrics
    • Mobile Security & MDM (Mobile Device Management) Services
      • On-premises Mobile Security MDM Services
      • Cloud Based Mobile SECaaS (Security as a Service)
      • Mobile Identity Management Services

    The following regional and country markets are also covered:
    • Regional Markets
      • Asia Pacific
      • Eastern Europe
      • Latin & Central America
      • Middle East & Africa
      • North America
      • Western Europe
    • Country Markets
      • Argentina, Australia, Brazil, Canada, China, Czech Republic, Denmark, Finland, France, Germany,  India, Indonesia, Israel, Italy, Japan, Malaysia, Mexico, Norway, Pakistan, Philippines, Poland, Qatar, Russia, Saudi Arabia, Singapore, South Africa, South Korea, Spain, Sweden, Taiwan, Thailand, UAE, UK,  USA
    Key Questions Answered:
    The report provides answers to the following key questions:
    • How big is the mobile device and network security market, and what particular submarkets does it constitute?
    • Who are the key players in each submarket?
    • How is the value chain structured for each submarket and how will it evolve overtime?
    • Which regions and countries will witness the highest percentage of growth in mobile security spending?
    • Will recent privacy scandals have a negative impact on mobile security spending in the coming years?
    • What known malware families are most dangerous for modern smartphones?

    List of Companies Mentioned:
    The following companies and organizations have been reviewed, discussed or mentioned in the report:

    3M Cogent
    aap3 inc
    AccelOps
    Accuvant
    Actiance
    AdaptiveMobile
    Adtran
    AEP
    Afore
    AhnLab
    AirWatch
    Akamai
    Alcatel-Lucent
    Alert Logic
    Amazon
    American Portwell Technology
    Amtel
    Anam
    Andrisoft
    Antiy
    Anywr
    AppBlade
    Apple
    AppRiver
    Arbor Networks
    Array Networks
    Arxceo
    Asus
    AT&T
    AuthenTec
    Avanquest
    Avast
    AVG Technologies N.V
    Avira
    AV-TEST
    Axiom Telecom
    Barracuda Networks
    Barrier Group
    Bayometric
    Beijing Venustech
    Belgacom
    Birdstep Technology
    BitDefender
    Bloove
    Blue Coat
    BlueCat Networks
    Bluefire
    Boxtone
    Broadcomm
    BroadWeb Corporation
    Brocade
    BullGuard
    CA Technologies
    Calyptix Security Corporation
    Capita
    CDW Corporation
    Celestix Networks
    Cellcrypt
    Cellebrite
    Cellulike
    CelluSys
    Centrify
    CheckPoint Software Technologies
    China Mobile
    China Unicom
    CipherCloud
    Cisco Systems
    Citrix
    Clavister
    Cloud Security Alliance
    CloudLock
    Cloudmark
    Columbitech
    Comcast
    Commtouch
    CommuniTake
    Comodo
    Core Security Technologies
    Corero
    CORISECIO
    Credant
    Cross Match Technologies
    CrucialTec
    Cryptzone
    Cybera
    Cyberoam
    Damballa
    DataViz
    Dell
    Dell SecureWorks
    Dell Sonicwall
    Deutsche Telekom
    DeviceLock
    DHILL
    DIALOGS
    Digital Defense
    D-Link Corporation
    Dr. Web
    Echoworx
    EdgeWave
    eEye Digital Security
    Elisa
    EMC
    Enterasys
    Entrust
    Ericsson
    ESET
    eSoft
    European Network and Information Security Agency (ENISA)
    Excitor
    EyeVerify
    F5 Networks
    Facebook
    FancyFon
    FFIEC
    Fiberlink
    FireHost
    Fixmo
    ForeScout
    Fortinet
    Foundation
    F-Secure
    Fujitsu
    Fulcrum Biometerics
    Futura Mobility
    gateProtect
    Gemalto
    Genband
    GenieNRM
    Get Safe Online
    Gigamon
    Global DataGuard
    Global Technology Associates
    GlobalPlatform
    GMSK
    Good Technology
    Google
    GTA
    Hewlett Packard (HP)
    Hitachi
    HTC
    Huawei
    HyTrust
    IBM
    iboss
    Imation
    Imperva
    Infineon
    InnoPath Software
    Inside Secure
    Intel
    Intrusion, Inc.
    Iris ID
    ISACA
    ISS
    Juniper Networks
    Kaspersky Lab
    Kerio Technologies
    Kindsight
    KoolSpan
    Kore Telematics
    Korea Telecom (KT)
    KPN
    Layer 7
    Level Platforms
    LG
    Lionic
    Lookout
    Mahndra Comviva
    ManageEngine
    Mandiant
    Marigold
    Marble Security (Formerly IronKey)
    McAfee
    Mformation
    Microsoft
    Microworld
    Mobical
    Mobile Active Defense
    Mobile Application Development Partners
    Mobile Idea Studio
    MobileHome
    MobileIron
    MobileSpaces
    Mocana
    Motorola
    Motorola Solutions
    mSpy
    Narus
    National Institute of Standards and Technology (NIST)
    NCP engineering GmbH
    Netasq
    Netgear
    Netmotion
    Nevis Networks
    NexusSafe
    NFC Forum
    Nokia
    Nokia Solutions and Networks (NSN)
    Nominum
    North Carolina State University
    Northwestern University
    Norton
    NQ Mobile
    NTT DoCoMo
    NXP
    OATH
    Odyssey Software
    Okta
    Optenet
    Optio Labs
    Oracle
    Orange (France Telecom)
    Palm
    Palo Alto Networks
    Panasonic
    Panda Security
    Pantech
    PerspecSys
    PGP Universal
    Philips
    Phone On Map
    PineApp
    Ping Identity
    Pointsec
    Prolexic
    ProofPoint
    PROTEI
    Qualcomm
    Qualys
    QuickHeal
    Radware
    RBI
    Renesas
    Rerware
    RIM
    RioRey
    RSA
    SafeNet
    Safran
    Samsung Electronics
    SanDisk
    SAP
    SecPoint
    Secunia
    Securitas
    SecurStar
    SharePoint
    Silent Circle
    SilverSky
    SK Telecom
    SkyHigh Telecom
    SmithMicro Software
    SmoothWall Ltd
    Software Security Solutions
    Sony
    Sophos
    Soti
    Sourcefire
    Spansion
    SpyChest
    SRA International
    Stealth Genie
    StillSecure
    STMicroelectronics
    Stonesoft
    Sun Microsystems
    SuperValu
    Sybase
    Symantec
    Symplified
    Symsoft
    Tarmac
    Tekelec (Oracle)
    Telecommunications Industry Association (TIA)
    Telefonica
    Telenor
    TeliaSonera
    Telit
    Telstra
    Tenable
    Thales
    Thales e-Security
    The Trusted Computing Group (TCG)
    TigerText
    T-Mobile
    Total Defense
    Trend Micro
    TRITON
    Trust Digital
    Trusteer
    TrustGo
    Trustlook
    Trustwave
    TurkCell
    UMU
    Untangle
    Valimo
    VeliQ
    Veracode
    Verisign
    Verizon
    Verizon Wireless
    Vodafone
    Voltage Security
    Vormetric
    WatchGuard Technologies
    Wavelink
    Webroot
    Websense
    Zenprise (now Citrix)
    Zscaler
    ZTE
    ZyXEL Communications



        Comments