[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

Mobile Device Security 2011-2016: Opportunities and Challenges

August 2011 | 181 pages | ID: M4916F7BED1EN
Visiongain

US$ 2,325.00

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
The Rise of Mobile Malware

2011 is witnessing an explosion of new threats targeting mobile devices. Data and ID theft, SMS fraud, rogue apps and covert espionage are infecting smartphones at an unprecedented rate. Malware such as Trojans, worms, spyware and spam are spreading across mobile platforms, already highly capable of stealing data, corrupting functions and usurping control.

Visiongain research shows that the number of mobile malware more than doubled in 2011 from 2010 with over 200 new variants in the first half of 2011 alone, out of a total of 800 since 2003.

Securing the Mobile Ecosystem

Cybercriminals are actively exploiting the popularity of smartphones and tablets because of low user awareness of the risks, and lax security enforcement within organisations. This real and growing mobile threat is already a critical issue for the business segment and which CEOs must addressed now.

By 2016, visiongain expects that almost every employee will have a smartphone that supports e-mail, can access the internet and install a variety of applications. Organisations have to learn to support complex and varied mobile operating systems and efficiently manage the security of all these platforms if they want to leverage the productivity benefits of smart devices.

A Growing Mobile Security Market

Security concerns are driving a fairly new market in mobile protection. The mobile security market is still in its infancy however. The fragmented nature of the mobile OS landscape has allowed for a number of varied companies to offer different mobile security solutions. Most of the leading IT software security specialists have expanded their suite of PC solutions to include mobile devices.

In parallel, a number of smaller security experts specialising in mobile devices have appeared and their niche area of expertise have been on par with many established IT software security leaders. There is a small but fast-growing market specialising in mobile security which will gain momentum with the rapid adoption of smart devices and mobile internet in the face of a growing cybercriminal menace. Visiongain expects the mobile security market to reach $3.95 billion in global revenues by 2016.

What is Unique about this Report?

The mobile security market is fast growing because protecting mobile devices is rapidly becoming a top priority for both organisations. There are increasing opportunities for monetisation for vendors and security specialists. This report provides extensive insight into the rapidly developing world of mobile malware and the latest technological tools to counter mobile threats.

The report includes exclusive interviews with leading security experts from McAfee, AVG, Panda Security, Lookout, SmrtGuard, Mobile Security Labs, BullGuard, Telefуnica and Vodafone, about the state of mobile malware and security.

The report details solutions by security software specialists, MNOs, OEMs, OTT providers and MDM vendors for mobile device and data protection for the individual, SMBs and large organisations. It offers recommendations on how to best counter threats and ensure maximum mobile protection.

Don't miss out on a chance to anticipate the growing threat menace and efficiently protect endpoints in your organisation by buying Mobile Device Security 2011-2016 now.

Who needs to read this report?
  • SMBs & Large Organisations
  • Chief Information Officers / Chief Technology Officers
  • Security Software Specialists
  • Original Equipment Manufacturers
  • Mobile Network Operators
  • Over The Top Service Providers
  • Mobile Device Management Vendors
EXECUTIVE SUMMARY

E.1 The Mobile Revolution
E.2 A New Ecosystem Breeds New Threats
E.3 Countering Mobile Threats
E.4 A Growing Mobile Security Market
E.5 Findings of the Report

CHAPTER 1: THE CHANGING SECURITY LANDSCAPE

1.1 A Technological Evolution
1.2 The Growth of Mobile Devices
1.3 The Rise of the Mobile Worker
1.4 Paradigm Shift in Enterprise
1.5 The Advance of Mobile Malware
1.6 Adapting Security to a New Environment
1.7 The Aim & Scope of the Report
1.8 Questions Answered by the Report
1.9 Structure of the Report
1.10 Methodology

CHAPTER 2: SECURITY CONCERNS IN THE MOBILE ECOSYSTEM

2.1 The Cost of Data Breach
2.2 Unauthorised Access and Collection of Data
  2.2.1 Targeting Location Based Data
  2.2.2 Access through Web Apps
2.3 Poor End-User Awareness
2.4 Enterprise Trends in Mobile Security
2.5 The Digital Black Market
2.6 Cybercrime Targeting Finance Intensive Industries
  2.6.1 Financial Institutions
  2.6.2 Industrial & Political Espionage
  2.6.3 Mobile Payments
    2.6.3.1 SMS/USSD Based Transactional Payments
    2.6.3.2 Direct Mobile Billing
    2.6.3.3 WAP Payments
    2.6.3.4 Contactless NFC
    2.6.3.5 Securing Mobile Payments
2.7 Are Convergence & Interoperability Risk Factors?
2.8 Open-Source: A Double Edged Sword?
2.9 Current Awareness: The UK Phone Hacking Scandal

CHAPTER 3: MOBILE MALWARE: A THREAT TO MAINSTREAM INDUSTRIES

3.1 Mobile Malware Evolution
  3.1.1 Trojans
  3.1.2 Worms
  3.1.3 Spyware
  3.1.4 Spam
3.2 The Mobile Threat Expansion by Platform
  3.2.1 Android
  3.2.2 Symbian
  3.2.3 iOS
  3.2.4 BlackBerry
  3.2.5 Windows Mobile
3.3 What are the Malware Vectors for Mobile?
  3.3.1 SMS & MMS
  3.3.2 Wi-Fi & Bluetooth
  3.3.3 Apps & Downloads
  3.3.4 SD & Multimedia Cards
3.4 Digital Fraud through Social Engineering

CHAPTER 4: AN EMERGING MARKET FOR MOBILE SECURITY SERVICES

4.1 Limiting the Spread of Mobile Malware
  4.1.1 Device Security
  4.1.2 Data Security
  4.1.3 Network Security
4.2 Encryption & Certificates
  4.2.1 Code Signing Certificates
  4.2.2 Two-Factor Authentication
4.3 Anti-Virus Software
4.4 Firewalls & Filtering
4.5 Mobile VPN
4.6 Mobile Device Management
4.7 Identity Management
4.8 Biometrics
4.9 Drivers for a Specialised Mobile Security Market
  4.9.1 Enterprise Security
  4.9.2 Protecting Data & User ID
4.10 Mobile Security Markets Forecast
  4.10.1 Asian, Latin American, African & Middle Eastern Markets
  4.10.2 Developed Markets
  4.10.3 Mobile Security Software Market by Users
4.11 Mobile Client Software Market
4.12 Mobile Device Management in Enterprise
4.13 Security as a Service
4.14 Global Network Security Market

CHAPTER 5: SHAPING THE MOBILE SECURITY LANDSCAPE

5.1 How are OEMs & OTT Providers Addressing Mobile Security Issues?
  5.1.1 RIM BlackBerry OS
    5.1.1.1 BlackBerry Enterprise Solution
    5.1.1.2 BlackBerry Mobile Data System Services
    5.1.1.3 BlackBerry Internet Service
  5.1.2 Microsoft Windows Phone
    5.1.2.1 Sandbox
    5.1.2.2 Application Deployment
    5.1.2.3 Application Development
    5.1.2.4 Microsoft Exchange ActiveSync (EAS) Security-Related Policies
    5.1.2.5 Data Protection Considerations
    5.1.2.6 Nokia
  5.1.3 Apple iOS
  5.1.4 Hewlett Packard (HP) WebOS
  5.1.5 Google Android
  5.1.6 Analysis of Mobile OS Based on Security Features
5.2 The Role of Network Operators
  5.2.1 Telefуnica
    5.2.1.1 Expert Opinion
  5.2.2 Vodafone
  5.2.3 Orange
5.3 Security Software Specialists
  5.3.1 Symantec
  5.3.2 Trend Micro
  5.3.3 McAfee
    5.3.3.1 Expert Opinion
  5.3.4 Kaspersky Labs
  5.3.5 AVG Expert Opinion
    5.3.5.1 Mobile Threats
    5.3.5.2 The Evolution of Mobile Malware
    5.3.5.3 How Dangerous is the Open-Source Model?
    5.3.5.4 Future Developments in Mobile Malware
    5.3.5.5 AVG Product Overview
  5.3.6 Sophos
  5.3.7 Panda Security Expert Opinion
    5.3.7.1 Mobile Threats
    5.3.7.2 The Evolution of Mobile Malware
    5.3.7.3 How Dangerous is the Open-Source Model?
    5.3.7.4 Future Developments in Mobile Malware
    5.3.7.5 Panda Security Product Overview
  5.3.8 BullGuard Expert Opinion
    5.3.8.1 Mobile Threats
    5.3.8.2 The Evolution of Mobile Malware
    5.3.8.3 How Dangerous is the Open-Source Model?
    5.3.8.4 Future Developments in Mobile Malware
    5.3.8.5 BullGuard Product Overview
  5.3.9 F-Secure
  5.3.10 Other Vendors
5.4 Mobile Security Specialists
  5.4.1 SmrtGuard
    5.4.1.1 Expert Opinion
  5.4.2 Lookout
    5.4.2.1 Expert Opinion
  5.4.3 Mobile Security Labs
    5.4.3.1 Mobile Threats
    5.4.3.2 The Evolution of Mobile Malware
    5.4.3.3 How Dangerous is the Open-Source Model?
    5.4.3.4 Future Developments in Mobile Malware
  5.4.4 MobileIron
  5.4.5 DeviceLock
  5.4.6 UMU
  5.4.7 MobiDM
  5.4.8 DataViz
  5.4.9 Mformation
  5.4.10 InnoPath
  5.4.11 Sybase
5.5 Analysis of Mobile Security Vendors
5.6 Analysis of Mobile Security Market
5.7 The Market for Mobile MDM Vendors

CHAPTER 6: CONCLUSION

6.1 Emerging Specialised Markets
6.2 Mitigating Mobile Security Risks
6.3 Deploying Mobile Security Solutions
6.4 Educating End-Users
6.5 Enterprise Policy & Device Management
6.6 Anticipating Future Threats
6.7 Recommendations for Businesses
6.8 Key Findings of the Report
Appendix A About visiongain
Appendix B Visiongain Report Evaluation Form

LIST OF TABLES, CHARTS AND FIGURES IN THIS REPORT

Table 1.1 Supported Formats & Capabilities of Smartphones and Tablets in 2011
Table 1.2 Key Findings of the iPass Mobile Workforce Survey April 2011
Table 2.1 Data Protection Legislation 2011
Table 2.2 AVG & Ponemon Key Survey Findings on Mobile Malware
Table 2.3 Employee Use of Smartphones in Enterprises
Table 2.4 Overview of the News of the World Phone Hacking Scandal 2005 - 2011
Table 3.1 Selection of Mobile Malware Variants 2004 - 2010
Table 3.2 Overview of Selected Mobile Trojans in 2010 - 2011
Table 3.3 FlexiSpy Features
Table 3.4 Selection of Android Malware 2010 - 2011
Table 3.5 Selection of Symbian Malware
Table 3.6 Social Engineering on Mobile Devices
Table 4.1 Antivirus Software- Detection Methods
Table 4.2 Mobile Device Management Features
Table 4.3 Mobile Security Market CAGR for Emerging Economies 2011 - 2016
Table 4.4 Mobile Security Market CAGR for North America & Europe 2011 - 2016
Table 5.1 BlackBerry Key Description
Table 5.2 Windows Phone Security Chambers
Table 5.3 iPhone Security Overview
Table 5.4 Android Security Guidelines for Developers
Table 5.5 Visiongain Rating of OS Security Models
Table 5.6 Telefуnica Managed Security Services Overview
Table 5.7 Vodafone Secure Remote Access Service
Table 5.8 Norton Mobile Security
Table 5.9 Trend Micro Mobile Security
Table 5.10 McAfee Mobile Security Solutions
Table 5.11 Sophos Mobile Solutions
Table 5.12 Check Point Mobile Security Solutions
Table 5.13 SmrtGuard Mobile Security Overview
Table 5.14 Mformation Security Service Manager
Table 5.15 InnoPath Solutions
Table 5.16 Visiongain Analysis of Mobile Security Software Vendors 2011
Table 6.1 SWOT Analysis of the Mobile Security Market
Table 6.2 Key Developments in the Mobile Security Market 2010 - 2011
Table 6.3 Recommendations for Securing Mobile Devices
Chart 1.1 Global Smartphone, PC & Tablet Shipments 2005 - 2016
Chart 1.2 Global Mobile Broadband Subscriptions 2008 - 2016
Chart 1.3 Global Mobile vs. Total Workforce Forecast 2011 - 2016
Chart 1.4 Types of Mobile Devices Supported Within Organisations
Chart 1.5 Need for Integrated Management & Security Solutions: Survey Results in Enterprises
Chart 2.1 Global Apps Market Growth 2008 - 2011
Chart 2.2 Global Mobile App Market Size by Download 2011 - 2016
Chart 2.3 Apple App Store & Android Market Apps Capable of Accessing Location & Contacts
Chart 2.4 Threatpost & Kaspersky Enterprise Mobile Security Survey
Chart 3.1 Recorded Mobile Threats 2004 - 2010
Chart 3.2 Global Market Share of Mobile App Stores 2011 - 2016
Chart 3.3 Total Malware by Platform 2011
Chart 3.4 Mobile OS Market Share 2011 & 2016
Chart 3.5 Symbian Malware Growth 2009 - 2010
Chart 3.6 Global App Store Year-on-Year Growth 2010 - 2011
Chart 4.1 Global Mobile Security Market 2011 - 2016
Chart 4.2 Global Mobile Security Market Share 2011 - 2016
Chart 4.3 Mobile Security Market for Emerging Economies 2011 - 2016
Chart 4.4 Mobile Security Market for North America & Europe 2011 - 2016
Chart 4.5 Global Mobile Security Client Software Market 2011 - 2016
Chart 4.6 Global Enterprise MDM Revenues (Billions) 2010 & 2015
Chart 4.7 Enterprise MDM Market 2007 - 2015
Chart 4.8 Cloud-based Security Services Market Forecast 2011 - 2016
Chart 4.9 Global Network Security Market Forecast 2011 - 2016
Chart 5.1 Global Anti-virus Vendor Market Share June 2011
Chart 5.2 Global MDM Vendor Market Share June 2011
Figure 2.1 Typical Offers Available on the Cybercrime Black Market
Figure 2.2 Catalysts for Mobile Data & ID Theft
Figure 2.3 Example of Smishing
Figure 2.4 Two Factor Authentication Security System for Mobile Payments
Figure 2.5 WAP Payments using PayPal Mobile Checkout
Figure 2.4 Google Wallet
Figure 3.1 Number of Mobile Malware Variants 2004 - 2010
Figure 3.2 ZeuS Infection Timeline for Mobile Devices
Figure 3.3 InfoJack Worm
Figure 3.4 Phone Promo Spam
Figure 3.5 Android Malware Growth Chart
Figure 3.6 SMS & MMS Exploits
Figure 3.7 Man in the Middle Attack
Figure 4.1 Mobile Security Categories
Figure 4.2 Code Signing Mobile Apps
Figure 4.3 Mobile Firewall
Figure 4.4 Mobile ID Management
Figure 5.1 BlackBerry Device Connection to Application Server
Figure 5.2 HP webOS Security Overview
Figure 5.3 Telefуnica Managed Mobility Service
Figure 5.4 Kaspersky Mobile Security Features by Platform
Figure 5.5 Kaspersky Mobile Security
Figure 5.6 BullGuard Mobile Security Overview
Figure 5.7 F-Secure Mobile Security
Figure 5.8 BitDefender Mobile Security
Figure 5.9 Lookout Mobile Security Solutions
Figure 5.10 DeviceLock Endpoint DLP
Figure 5.11 UMU Mobile Security
Figure 5.12 Sybase Afaria Architecture

COMPANIES LISTED

Apple
AVG
BitDefender
BullGuard
Check Point
CitiGroup
DataViz
DeviceLock
Enterprise Strategy Group
F-Secure
First Data
Google
Hewlett Packard
HTC
InnoPath
iPass
Kaspersky Labs
Lookout
MasterCard
McAfee
Mformation
Microsoft
MobileIron
Mobile Security Labs
News of the World
Nokia
O2
Orange
Panda Security
PayPal
Ponemon Institute
Retis Consulting
RIM
SANS Institute
SmrtGuard
Sophos
Sprint
Sybase
Symantec
T-Mobile
Telefуnica
Threatpost
Trend Micro
UMU
Unix
VeliQ
Verizon
Vodafone


More Publications