Release Date: September 2013
Number of Pages: 284
Number of Tables and Figures: 118
Synopsis: Mobile networks around the globe generate more than 50 Exabytes of traffic annually. The immense volume of traffic together with the growing adoption of open source Operating System (OS) platforms such as Android has opened up new security threats. Mobile malware, SMS spam, cyber attacks and unlawful eavesdropping are an ever-increasing problem for enterprises, consumers and mobile network operators around the globe.
This has in turn led to significant investments in integrated security appliances and content security gateways by both enterprises and mobile network operators, besides opening doors for emerging submarkets such as mobile Security as a Service (SECaaS).
On the devices front, installation of Anti-Malware/Anti-Virus client software is fast becoming a de-facto requirement for most smartphones and tablets. Furthermore, mobile device OEMs are also integrating advanced biometrics such as fingerprint sensing into their smartphones and tablets, amid growing popularity of security sensitive opportunities such as mobile payments.
Driven by the thriving ecosystem, SNS Research estimates that mobile device and network security investments will account for nearly $9 Billion in 2013 alone. The market is further expected to grow at a CAGR of nearly 21% over the next 7 years.
This report presents an in-depth assessment of the global mobile device and network security market, and covers four individual submarkets. In addition to covering key market drivers, challenges, future roadmap, value chain analysis, deployment case studies and vendor service/product strategies for each submarket, the report also presents comprehensive forecasts for the mobile device and network security market from 2013 till 2020. Historical revenue figures for 2010 – 2012 are also presented. The forecasts and historical revenue figures are individually segmented for four submarkets, 17 product/service categories, six geographical regions and 34 countries.
The report comes with an associated Excel datasheet covering quantitative data from all figures presented within the report.
Sample Request:
For a sample of the report or any further inquiries please contact info@snstelecom.com
Pricing:
The report is available for the following price:
Key Findings:
The report has the following key findings:
Topics Covered:
The report covers the following topics:
Forecast Segmentation:
Market forecasts and historical revenue figures are provided for each of the following submarkets and their 17 product/service categories:
The following regional and country markets are also covered:
Key Questions Answered:
The report provides answers to the following key questions:
List of Companies Mentioned:
The following companies and organizations have been reviewed, discussed or mentioned in the report:
3M Cogent
aap3 inc
AccelOps
Accuvant
Actiance
AdaptiveMobile
Adtran
AEP
Afore
AhnLab
AirWatch
Akamai
Alcatel-Lucent
Alert Logic
Amazon
American Portwell Technology
Amtel
Anam
Andrisoft
Antiy
Anywr
AppBlade
Apple
AppRiver
Arbor Networks
Array Networks
Arxceo
Asus
AT&T
AuthenTec
Avanquest
Avast
AVG Technologies N.V
Avira
AV-TEST
Axiom Telecom
Barracuda Networks
Barrier Group
Bayometric
Beijing Venustech
Belgacom
Birdstep Technology
BitDefender
Bloove
Blue Coat
BlueCat Networks
Bluefire
Boxtone
Broadcomm
BroadWeb Corporation
Brocade
BullGuard
CA Technologies
Calyptix Security Corporation
Capita
CDW Corporation
Celestix Networks
Cellcrypt
Cellebrite
Cellulike
CelluSys
Centrify
CheckPoint Software Technologies
China Mobile
China Unicom
CipherCloud
Cisco Systems
Citrix
Clavister
Cloud Security Alliance
CloudLock
Cloudmark
Columbitech
Comcast
Commtouch
CommuniTake
Comodo
Core Security Technologies
Corero
CORISECIO
Credant
Cross Match Technologies
CrucialTec
Cryptzone
Cybera
Cyberoam
Damballa
DataViz
Dell
Dell SecureWorks
Dell Sonicwall
Deutsche Telekom
DeviceLock
DHILL
DIALOGS
Digital Defense
D-Link Corporation
Dr. Web
Echoworx
EdgeWave
eEye Digital Security
Elisa
EMC
Enterasys
Entrust
Ericsson
ESET
eSoft
European Network and Information Security Agency (ENISA)
Excitor
EyeVerify
F5 Networks
FancyFon
FFIEC
Fiberlink
FireHost
Fixmo
ForeScout
Fortinet
Foundation
F-Secure
Fujitsu
Fulcrum Biometerics
Futura Mobility
gateProtect
Gemalto
Genband
GenieNRM
Get Safe Online
Gigamon
Global DataGuard
Global Technology Associates
GlobalPlatform
GMSK
Good Technology
GTA
Hewlett Packard (HP)
Hitachi
HTC
Huawei
HyTrust
IBM
iboss
Imation
Imperva
Infineon
InnoPath Software
Inside Secure
Intel
Intrusion, Inc.
Iris ID
ISACA
ISS
Juniper Networks
Kaspersky Lab
Kerio Technologies
Kindsight
KoolSpan
Kore Telematics
Korea Telecom (KT)
KPN
Layer 7
Level Platforms
LG
Lionic
Lookout
Mahndra Comviva
ManageEngine
Mandiant
Marigold
Marble Security (Formerly IronKey)
McAfee
Mformation
Microsoft
Microworld
Mobical
Mobile Active Defense
Mobile Application Development Partners
Mobile Idea Studio
MobileHome
MobileIron
MobileSpaces
Mocana
Motorola
Motorola Solutions
mSpy
Narus
National Institute of Standards and Technology (NIST)
NCP engineering GmbH
Netasq
Netgear
Netmotion
Nevis Networks
NexusSafe
NFC Forum
Nokia
Nokia Solutions and Networks (NSN)
Nominum
North Carolina State University
Northwestern University
Norton
NQ Mobile
NTT DoCoMo
NXP
OATH
Odyssey Software
Okta
Optenet
Optio Labs
Oracle
Orange (France Telecom)
Palm
Palo Alto Networks
Panasonic
Panda Security
Pantech
PerspecSys
PGP Universal
Philips
Phone On Map
PineApp
Ping Identity
Pointsec
Prolexic
ProofPoint
PROTEI
Qualcomm
Qualys
QuickHeal
Radware
RBI
Renesas
Rerware
RIM
RioRey
RSA
SafeNet
Safran
Samsung Electronics
SanDisk
SAP
SecPoint
Secunia
Securitas
SecurStar
SharePoint
Silent Circle
SilverSky
SK Telecom
SkyHigh Telecom
SmithMicro Software
SmoothWall Ltd
Software Security Solutions
Sony
Sophos
Soti
Sourcefire
Spansion
SpyChest
SRA International
Stealth Genie
StillSecure
STMicroelectronics
Stonesoft
Sun Microsystems
SuperValu
Sybase
Symantec
Symplified
Symsoft
Tarmac
Tekelec (Oracle)
Telecommunications Industry Association (TIA)
Telefonica
Telenor
TeliaSonera
Telit
Telstra
Tenable
Thales
Thales e-Security
The Trusted Computing Group (TCG)
TigerText
T-Mobile
Total Defense
Trend Micro
TRITON
Trust Digital
Trusteer
TrustGo
Trustlook
Trustwave
TurkCell
UMU
Untangle
Valimo
VeliQ
Veracode
Verisign
Verizon
Verizon Wireless
Vodafone
Voltage Security
Vormetric
WatchGuard Technologies
Wavelink
Webroot
Websense
Zenprise (now Citrix)
Zscaler
ZTE
ZyXEL Communications