The Mobile Security (mSecurity) Bible: 2014 – 2020 - Device Security, Infrastructure Security & Security Services

Release Date: April 2014

Number of Pages: 304

Number of Tables and Figures: 120

Synopsis: Mobile networks around the globe generate more than 86 Exabytes of traffic annually. The immense volume of traffic together with the growing adoption of open source Operating System (OS) platforms such as Android has opened up new security threats. Mobile malware, SMS spam, cyber attacks and unlawful eavesdropping are an ever-increasing problem for enterprises, consumers and mobile network operators around the globe.

This has in turn led to significant investments in integrated security appliances and content security gateways by both enterprises and mobile network operators, besides opening doors for emerging submarkets such as mobile Security as a Service (SECaaS).

On the devices front, installation of anti-malware/anti-virus client software is fast becoming a de-facto requirement for most smartphones and tablets. Furthermore, mobile device OEMs are also integrating advanced biometrics such as fingerprint sensing into their smartphones and tablets, amid growing popularity of security sensitive opportunities such as mobile payments.

Driven by the thriving ecosystem, SNS Research estimates that mobile device and network security investments will account for nearly $11 Billion in 2014 alone. The market is further expected to grow at a CAGR of nearly 20% over the next 6 years.

The “Mobile Security (mSecurity) Bible: 2014 - 2020” report presents an in-depth assessment of the global mobile device and network security market, and covers four individual submarkets. In addition to covering key market drivers, challenges, future roadmap, value chain analysis, deployment case studies and vendor service/product strategies for each submarket, the report also presents comprehensive forecasts for the mobile device and network security market from 2014 till 2020. Historical revenue figures for 2010 – 2013 are also presented. The forecasts and historical revenue figures are individually segmented for four submarkets, 17 product/service categories, six geographical regions and 34 countries.

The report comes with an associated Excel datasheet covering quantitative data from all figures presented within the report.

Sample Request:

For a sample of the report or any further inquiries please contact info@snstelecom.com

Pricing:

The report is available for the following price:

  • Single User License: USD 2,500
  • Company Wide License: USD 3,500

Key Findings:

The report has the following key findings:

  • Driven by the thriving ecosystem, SNS Research estimates that mobile device and network security investments will account for nearly $11 Billion in 2014 alone. The market is further expected to grow at a CAGR of nearly 20% over the next 6 years
  • Enterprises and mobile network operators have made significant investments in integrated security appliances and content security gateways (including those specific to SMS/MMS security)
  • The installation of anti-malware/anti-virus client software is fast becoming a de-facto requirement for most smartphones and tablets
  • More than half of all enterprises allow the use of employed owned mobile devices on their networks. Enterprises thus continue to aggressively adopt SSL VPNs in their mobile security strategies to ensure connection security in addition to activity monitoring and control
  • Mobile Device Management (MDM) services providers are eyeing on opportunities for cloud based mobile security services that extend existing security policies to enterprise mobile devices to help secure data, reduce risk and protect the enterprise, which has created a new submarket for mobile Security as a Service (SEaaS)
  • As mobile networks move towards an all-IP environment, wireless carriers are increasingly taking an interest in RAN centric security products that can mitigate security threats to air interface signaling

Topics Covered:

The report covers the following topics:

  • An in-depth analysis for four individual submarkets and their associated product/service categories: Mobile Network Infrastructure Security Software & Appliances, Mobile Device Client Security Software, Mobile Device Security Hardware and Mobile Security & MDM Services
  • Value chain analysis for each submarket
  • Key market drivers and challenges for each submarket
  • Key trends for each submarket
  • Case studies on product/service deployment for each submarket
  • Profiles and strategies of over 70 key players in the market
  • Strategic recommendations for vendors, enterprises and wireless carriers
  • Market analysis and forecasts from 2010 till 2020

Forecast Segmentation:

Market forecasts and historical revenue figures are provided for each of the following submarkets and their 17 product/service categories:

  • Mobile Network Infrastructure Security Software & Appliances
    • Integrated Security Appliances (Hardware & Software)
    • Content Security Gateways
    • SMS/MMS Content Security Gateways
  • Mobile Device Client Security Software
    • Anti-Malware/Anti-Virus Client Software
    • Back Up & Restore Software
    • Privacy Protection Software
    • Mobile VPN Client Software
    • Remote Locking Software
    • Remote Tracking Software
    • Encrypted Communications (Voice/Data) Software
    • Encrypted Storage Software
  • Mobile Device Security Hardware
    • Semiconductors/Embedded Chip Security
    • NFC
    • Biometrics
  • Mobile Security & MDM (Mobile Device Management) Services
    • On-premises Mobile Security MDM Services
    • Cloud Based Mobile SECaaS (Security as a Service)
    • Mobile Identity Management Services

The following regional and country markets are also covered:

  • Regional Markets
    • Asia Pacific
    • Eastern Europe
    • Latin & Central America
    • Middle East & Africa
    • North America
    • Western Europe
  • Country Markets
    • Argentina, Australia, Brazil, Canada, China, Czech Republic, Denmark, Finland, France, Germany, India, Indonesia, Israel, Italy, Japan, Malaysia, Mexico, Norway, Pakistan, Philippines, Poland, Qatar, Russia, Saudi Arabia, Singapore, South Africa, South Korea, Spain, Sweden, Taiwan, Thailand, UAE, UK, USA

Key Questions Answered:

The report provides answers to the following key questions:

  • How big is the mobile device and network security market, and what particular submarkets does it constitute?
  • Who are the key players in each submarket?
  • How is the value chain structured for each submarket and how will it evolve overtime?
  • Which regions and countries will witness the highest percentage of growth in mobile security spending?
  • What is the outlook of anti-virus, anti-malware and VPN client software adoption for mobile devices?
  • Will recent privacy scandals have a negative impact on mobile security spending in the coming years?
  • What known malware families are most dangerous for modern smartphones?
  • What are the prospects of NFC as an authentication solution?
  • What are the security vulnerabilities of LTE and WiFi networks?
  • What are the prospects of RAN centric security products?
  • How will M2M and the associated IoT ecosystem affect the mobile security market?
  • How is BYOD adoption affecting enterprise mobile security strategies?

List of Companies Mentioned:

The following companies and organizations have been reviewed, discussed or mentioned in the report:

3M Cogent

aap3 inc

AccelOps

Accuvant

Actiance

AdaptiveMobile

Adtran

AEP

Afore

AhnLab

Airbus Defence and Space

AirWatch

Akamai

Alcatel-Lucent

Alert Logic

Amazon

American Portwell Technology

Amtel

Anam Technologies

Andrisoft

Antiy

Anywr

AppBlade

Apple

AppRiver

Arbor Networks

Arkoon

Array Networks

Arxceo

Asus

AT&T

AuthenTec

Avanquest

AVAST Software

AVG Technologies N.V

Avira

AV-TEST

Axiom Telecom

Barracuda Networks

Barrier Group

Bayometric

Beijing Venustech

Belgacom

Birdstep Technology

BitDefender

BlackBerry

Bloove

Blue Coat

BlueCat Networks

Bluefire

Boxtone

Broadcomm

BroadWeb Corporation

Brocade

BullGuard

CA Technologies

Calyptix Security Corporation

Capita

CDW Corporation

Celestix Networks

Cellcrypt

Cellebrite

Cellulike

Cellusys

Centrify

Check Point Software Technologies

China Mobile

China Unicom

CipherCloud

Cisco Systems

Citrix Systems

Clavister

Cloud Security Alliance

CloudLock

Cloudmark

Columbitech

Comcast

Commtouch

CommuniTake

Comodo

Core Security Technologies

Corero

CORISECIO

Credant

Cross Match Technologies

CrucialTec

Cryptzone

Cybera

Cyberoam

CYREN

Damballa

DataViz

Dell

Dell SecureWorks

Dell Sonicwall

Deutsche Telekom

DeviceLock

DHILL

DIALOGS

Digital Defense

D-Link

Dr. Web

Echoworx

EdgeWave

eEye Digital Security

Elisa

EMC

Enterasys

Entrust

Ericsson

ESET

Extreme Networks

eSoft

European Network and Information Security Agency (ENISA)

Excitor

EyeVerify

F5 Networks

Facebook

FancyFon

FFIEC

Fiberlink

FingerQ

FireHost

Fixmo

ForeScout

Fortinet

Foundation

F-Secure

Fujitsu

Fulcrum Biometerics

Futura Mobility

gateProtect

Gemalto

Genband

GenieNRM

Get Safe Online

Gigamon

Global DataGuard

Global Technology Associates (GTA)

GlobalPlatform

GMSK

Good Technology

Google

Hewlett Packard (HP)

Hitachi

HTC

Huawei

HyTrust

IBM

iboss

Imation

Imperva

Infineon

InnoPath Software

Inside Secure

Intel

Intrusion

Iris ID

ISACA

ISS

Juniper Networks

Kaspersky Lab

Kerio Technologies

Kindsight

KoolSpan

Kore Telematics

Korea Telecom (KT)

KPN

Layer 7

Level Platforms

LG

Lionic

Lookout

Mahindra Comviva

ManageEngine

Mandiant

Marigold

Marble Security (Formerly IronKey)

McAfee (Intel Security)

Mformation

Microsoft

Microworld

Mobical

Mobile Active Defense

Mobile Application Development Partners

Mobile Idea Studio

MobileHome

MobileIron

MobileSpaces

Mocana

Motorola Mobility

Motorola Solutions

Mozilla

mSpy

Narus

National Institute of Standards and Technology (NIST)

NCP engineering GmbH

NetASQ

Netgear

Netmotion Wireless

Nevis Networks

NexusSafe

NFC Forum

Nokia

Nokia Solutions and Networks (NSN)

Nominum

North Carolina State University

Northwestern University

Norton

NQ Mobile

NTT DoCoMo

NXP

OATH

Odyssey Software

Okta

Optenet

Optio Labs

Oracle

Orange (France Telecom)

Palm

Palo Alto Networks

Panasonic

Panda Security

Pantech

PerspecSys

PGP Universal

Philips

Phone On Map

PineApp

Ping Identity

Pointsec

Prolexic

ProofPoint

PROTEI

Qihoo 360

Qualcomm

Qualys

QuickHeal

Radware

RBI

Renesas

Rerware

RioRey

RSA

SafeNet

Safran

Samsung Electronics

SanDisk

SAP

SecPoint

Secunia

Securitas

SecurStar

SharePoint

Silent Circle

SilverSky

SK Telecom

SkyHigh Telecom

SmithMicro Software

SmoothWall Ltd

Software Security Solutions

Sony

Sophos

Soti

Sourcefire

Spansion

SpyChest

SRA International

Stealth Genie

StillSecure

STMicroelectronics

Stonesoft

Sun Microsystems

SuperValu

Sybase

Symantec

Symplified

Symsoft

Tarmac

Tekelec (Oracle)

Telecommunications Industry Association (TIA)

Telefonica

Telenor

TeliaSonera

Telit

Telstra

Tenable

Thales

Thales e-Security

The Trusted Computing Group (TCG)

TigerText

T-Mobile

Total Defense

Trend Micro

TRITON

Trust Digital

Trusteer

TrustGo

Trustlook

Trustwave

TurkCell

Ultra Electronics AEP

UMU

Untangle

Valimo

VeliQ

Veracode

Verisign

Verizon

Verizon Wireless

Vodafone

Voltage Security

Vormetric

WatchGuard Technologies

Wavelink

Webroot

Websense

WiFi Alliance

Zenprise (now Citrix)

Zscaler

ZTE

ZyXEL Communications