[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

Global Mobile Security (mSecurity) Market 2013-2018

March 2013 | 130 pages | ID: GAA20AF59DCEN
Visiongain

US$ 2,400.00

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
Report Details

In recent years, there has been a fundamental transformation of the mobile ecosystem. Evolving technologies are constantly presenting new opportunities for applications. Smartphones, tablets, portable gaming consoles, digital media players and cameras can pack powerful integrated computing functionalities which only desktop computers were capable of less than a decade ago. Consequently, the popularity of smart devices is an increasingly attractive target for cybercriminals with regards the potential value of personal data found on a device. Mobile threats may be a relatively new phenomenon, but their emergence is not unexpected. Visiongain has determined that the value of the global mobile security (mSecurity) market in 2013 will reach $3.49bn.

The mobile security market is set for substantial growth over the next five years as research shows that the increasing proliferation of smart mobile devices is driving a market for complementary mobile services in management and security.

What makes this report unique?

Our reports have a unique blend of primary and secondary sources providing informed analysis. This methodology allows insight into the key drivers and restraints behind market dynamics and competitive developments, as well as identifying the technological issues. The report therefore presents an ideal balance of qualitative analysis combined with extensive quantitative data including global, submarket and regional markets forecasts from 2013-2018 - all identifying strategic business opportunities.

Why you should buy Global Mobile Security (mSecurity) Market 2013-2018
  • Stay ahead with this comprehensive analysis of the global mobile security market prospects
    • The report comprises of 130 pages
  • Read 3 exclusive visiongain expert opinion interviews from the leading mobile security industry specialists which informs the analysis
    • AVG
    • McAfee
    • Symantec
  • Get ahead by studying highly quantitative content that delivers solid conclusions benefiting your research and analysis
    • 94 tables, charts, and graphs quantifying and forecasting the mobile security market
  • View global market forecasts from 2013-2018 to keep your knowledge one step ahead of the competition
    • The report provides an analytical overview with detailed market revenue projections and analysis of the market, the competitors, and the commercial drivers and restraints.
  • Keep informed about the potential for each of the 6 mobile security submarkets with forecasts from 2013-2018
    • Mobile Data Security
    • Mobile Device Security
    • Mobile Virtual Private Network (mVPN)
    • Mobile Identity Management (MIM)
    • Mobile Device Management (MDM)
    • Mobile Security as a Service (mSaaS)
  • View a detailed breakdown and analysis of the regional mobile security market forecasts from 2013-2018
    • North America
    • Asia Pacific
    • Europe
    • Middle East & Africa
    • Latin America
  • Understand the competitive landscape with profiles of 30 leading companies examining their positioning, products, services, focus, strategies and outlook.
    • Apple
    • AVG
    • BullGuard
    • DataViz
    • DeviceLock
    • Echoworx
    • Fiberlink
    • Fixmo
    • F-Secure
    • Google
    • InnoPath Software
    • Kaspersky Lab
    • Lookout
    • McAfee
    • Mformation
    • Microsoft
    • Mobile Active Defense
    • MobileIron
    • Motorola
    • Nokia
    • Odyssey Software
    • Orange
    • Research In Motion
    • Sophos
    • Symantec
    • Telefonica
    • T-Mobile
    • Trend Micro
    • UMU
    • VeliQ
  • Discover the qualitative analysis informing the market forecasts
    • SWOT analysis of competitive factors: strengths, weaknesses, opportunities and threats revealing what drives and restraints the industry and the prospects for established companies and new market entrants.
How the Global Mobile Security (mSecurity) Market 2013-2018 report can benefit you

Visiongain's report is for anyone requiring analysis of the global mobile security market. You will discover market forecasts, technological trends, predictions and expert opinion providing you with independent analysis derived from our extensive primary and secondary research. Only by purchasing this report will you receive this critical business intelligence revealing where revenue growth is likely and where the lucrative potential market prospects are.

If you buy our report today your knowledge will stay one step ahead of your competitors. Discover how our report could benefit your research, analyses and strategic decisions, saving you time. To gain an understanding of how to tap into the potential of this market and keep one step ahead of the competition you must order now our report Global Mobile Security (mSecurity) Market 2013-2018.
1. EXECUTIVE SUMMARY

1.1 What is the Current State of Mobile Security Systems?
1.2 Rapid Rise in Mobile Malware Allowing Hackers Unauthorised Access and Collection of Data
1.3 The Digital Black Market
1.4 A High Risk of Data Breach
1.5 Adapting Security to the Mobile Environment
1.6 Methodology
1.7 Benefits of This Report
1.8 Aim of the Report
1.9 Highlights in the report include:
1.10 Structure of the Report
1.11 Report Scope
1.12 Who is This Report For?
1.13 Questions Answered by this Report
1.14 Global Mobile Security Market Forecast 2013-2018
1.15 Global Mobile Security Submarket Forecast 2013-2018
1.16 Regional Mobile Security Market Forecast 2013-2018

2. INTRODUCTION TO THE MOBILE SECURITY MARKET

2.1 The Mobile Security Market Growing Rapidly In the Face of a Plethora of Threats
2.2 Defining Mobile Security
  2.2.1 Device Security
  2.2.2 Data Security
  2.2.3 Network Security
  2.2.4 Mobile Security Tools
  2.2.5 Mobile Security Submarkets
2.3 Mobile Security Value Chain
2.4 Increasing Presence of Mobile Devices Enabling Rise in Security Threats
  2.4.1 Mobile Malware Evolution
  2.4.2 Trojans
  2.4.3 Worms
  2.4.4 Spyware
  2.4.5 Spam
2.5 Mobile Threats Affect All Platforms
2.6 What are the Malware Vectors for Mobile?
  2.6.1 SMS & MMS
  2.6.2 Wi-Fi & Bluetooth
  2.6.3 Apps & Downloads
  2.6.4 SD & Multimedia Cards
2.7 Digital Fraud through Social Engineering

3. THE GLOBAL MOBILE SECURITY MARKET FORECASTS 2013-2018

3.1 Mobile Security Increasingly Becoming a Global Phenomenon
3.2 Extensive Growth in Mobile Security Market from 2013-2108

4. THE GLOBAL MOBILE SECURITY SUBMARKET FORECASTS 2013-2018

4.1 What are the Leading Submarkets in the Global Mobile Security Forecast 2013-2018?
  4.1.1 Global Mobile Security Submarket Forecast AGR & CAGR
  4.1.2 Mobile Security as a Service Submarket Comprising of 21.7% of the Global Market in 2013
4.2 Mobile Data Security
  4.2.1 Encryption, Public Key Infrastructure & Certification
  4.2.2 Global Overall Data Security Market Forecast 2013-2018
  4.2.3 Mobile Data Security Submarket Forecast 2013-2018
  4.2.4 Mobile Data Security Submarket as a Percentage of Total Data Security Market 2013-2018
4.3 Mobile Device Security
  4.3.1 Antivirus Software
  4.3.2 Firewalls & Filtering
  4.3.3 Authentication through PINs and Passwords
  4.3.4 Global Overall Endpoint Security Market Forecast 2013-2018
  4.3.5 Mobile Device Security Submarket Forecast 2013-2018
  4.3.6 Mobile Device Security Submarket as a Percentage of Total Endpoint Security Market 2013-2018
4.4 Mobile ID Management
  4.4.1 Biometrics
  4.4.2 Global Overall Identity Management Market Forecast 2013-2018
  4.4.3 Mobile ID Management Submarket Forecast 2013-2018
  4.4.4 Mobile ID Management Security Submarket as a Percentage of Global ID Management Security Market 2013-2018
4.5 Network Security
  4.5.1 Global Overall Network Security Market Forecast 2013-2018
  4.5.2 Mobile Virtual Private Network (mVPN)
  4.5.3 mVPN Submarket Forecast 2013-2018
  4.5.4 Mobile VPN Security Submarket as a Percentage of Global Network Security Market 2013-2018
4.6 Mobile Device Management
  4.6.1 Enterprise MDM Market
  4.6.2 MDM Security Submarket Forecast 2013-2018
4.7 Security as a Service
  4.7.1 Global Overall Cloud Security Market Forecast 2013-2018
  4.7.2 mSaaS Security Submarket Forecast 2013-2018
  4.7.3 Mobile SaaS Security Submarket as a Percentage of Global Cloud Security Market 2013-2018

5. REGIONAL MOBILE SECURITY MARKET FORECASTS 2013-2018

5.1 Europe Leading the Regional Mobile Security Market Forecasts 2013-2018
  5.1.1 Regional Mobile Security Market Forecast AGR & CAGR
  5.1.2 Europe Leading Regional Mobile Security Market Share in 2013 with 46.2%
5.2 North America Mobile Security Market Driven by Enterprise Adoption
  5.2.1 North America Mobile Security Market Forecast Summary 2013-2018
5.3 Asia Pacific Mobile Security Market is Highly Regional
  5.3.1 Asia Pacific Mobile Security Market Forecast Summary 2013-2018
5.4 European Mobile Security is Leading by Example, Showing Very Strong Adoption Rates
  5.4.1 Europe Mobile Security Market Forecast Summary 2013-2018
5.5 Middle East & Africa Mobile Security Market Still in its Growth Stages
  5.5.1 Middle East & Africa Mobile Security Market Forecast Summary 2013-2018
5.6 Latin America Mobile Security Market Witnessing Slow Adaption, Despite High Level of Interest
  5.6.1 Latin America Mobile Security Market Forecast Summary 2013-2018

6. SWOT ANALYSIS OF THE MOBILE SECURITY MARKET 2013-2018

7. EXPERT OPINION

7.1 AVG
  7.1.1 AVG Company Background and Involvement in Mobile Security Market
  7.1.2 Expected Technological Developments in the Mobile Security Market
  7.1.3 Key Trends & Recent Developments in the Mobile Security Market
  7.1.4 Global Outlook for the Mobile Security Market
  7.1.5 Primary Drivers & Restraints of the Mobile Security Market
  7.1.6 Regional Focus in the Mobile Security Market
  7.1.7 Challenges & Opportunities in the Mobile Security Market
  7.1.8 Lack of Awareness Regarding Mobile Security Threats
7.2 McAfee
  7.2.1 McAfee Company Background and Involvement in Mobile Security Market
  7.2.2 Expected Technological Developments in the Mobile Security Market
  7.2.3 Key Trends & Recent Developments in the Mobile Security Market
  7.2.4 Global Outlook for the Mobile Security Market
  7.2.5 Primary Drivers & Restraints of the Mobile Security Market
  7.2.6 Regional Growth Prospects in the Mobile Security Market
  7.2.7 Challenges & Opportunities in the Mobile Security Market
  7.2.8 Final Thoughts on the Mobile Security Market
7.3 Symantec
  7.3.1 Expected Technological Developments in the Mobile Security Market
  7.3.2 Key Trends & Recent Developments in the Mobile Security Market
  7.3.3 Global Outlook for the Mobile Security Market
  7.3.4 Primary Drivers & Restraints of the Mobile Security Market
  7.3.5 Regional Growth in the Mobile Security Market

8. LEADING COMPANIES IN THE MOBILE SECURITY ECOSYSTEM

8.1 Apple
8.2 AVG
8.3 BullGuard
8.4 DataViz
8.5 DeviceLock
8.6 Echoworx
8.7 Fiberlink
8.8 Fixmo
8.9 F-Secure
8.10 Google
8.11 InnoPath Software
8.12 Kaspersky Lab
8.13 Lookout
8.14 McAfee
8.15 Mformation
8.16 Microsoft
8.17 Mobile Active Defense
8.18 MobileIron
8.19 Motorola
8.20 Nokia
8.21 Odyssey Software
8.22 Orange
8.23 Research In Motion
8.24 Sophos
8.25 Symantec
8.26 Telefonica
8.27 T-Mobile
8.28 Trend Micro
8.29 UMU
8.30 VeliQ
8.31 Analysis of Mobile Operating Systems
8.32 Analysis of Mobile Security Vendors
8.33 Additional Players in the Mobile Security Ecosystem

9. CONCLUSION

9.1 Mobile Security Market Heading For Growth, Making Way For New Entrants
9.2 Points Emerged from this Research
9.3 Global Mobile Security Market Forecast 2013-2018
9.4 Global Mobile Security Submarket Forecast 2013-2018
9.5 Regional Mobile Security Market Forecast 2013-2018

10. GLOSSARY

LIST OF TABLES

Table 1.1 Global Mobile Security Market Forecast Summary 2013, 2015, 2018 ($ million, CAGR %)
Table 1.2 Global Mobile Security Submarket Forecast Summary by Type 2013, 2015, 2018 ($ million, CAGR %)
Table 1.3 Regional Mobile Security Market Forecast Summary 2013, 2015, 2018 ($ million, CAGR %)
Table 2.1 Mobile Security Tools
Table 2.2 Selection of Mobile Malware Variants
Table 2.3 Overview of Selected Mobile Trojans
Table 2.4 FlexiSpy Features
Table 2.5 Social Engineering on Mobile Devices
Table 3.1 Global Mobile Security Market Forecast 2013-2018 ($ m, AGR %, CAGR%, Cumulative)
Table 4.1 Global Mobile Security Submarket Forecast 2013-2018 ($ million)
Table 4.2 Global Mobile Security Submarket Forecast 2013-2018 (AGR %)
Table 4.3 Global Mobile Security Submarket CAGR Forecast (%) 2013-2018, 2013-2015, and 2015-2018
Table 4.4 Global Mobile Security Submarket Share Forecast 2013-2018 (%)
Table 4.5 Global Data Security Market Forecast 2013-2018 ($billion, AGR %, CAGR%, Cumulative)
Table 4.6 Mobile Data Security Submarket Forecast 2013-2018 ($million, AGR %, CAGR%, Cumulative)
Table 4.7 Comparison of Global Data Security & Mobile Data Security Submarket Forecast 2013-2018 (%)
Table 4.8 Antivirus Software - Detection Methods
Table 4.9 Global Endpoint Security Market Forecast 2013-2018 ($billion, AGR %, CAGR%, Cumulative)
Table 4.10 Mobile Device Security Submarket Forecast 2013-2018 ($million, AGR %, CAGR%, Cumulative)
Table 4.11 Comparison of Global Endpoint & Mobile Device Security Submarket Forecast 2013-2018 (%)
Table 4.12 Global ID Management Market Forecast 2013-2018 ($billion, AGR %, CAGR%, Cumulative)
Table 4.13 Mobile ID Management (MIM) Security Submarket Forecast 2013-2018 ($million, AGR %, CAGR%, Cumulative)
Table 4.14 Comparison of Global ID Management & MIM Security Submarket Forecast 2013-2018 (%)
Table 4.15 Global Network Security Market Forecast 2013-2018 ($billion, AGR %, CAGR%, Cumulative)
Table 4.16 mVPN Security Submarket Forecast 2013-2018 ($million, AGR %, CAGR%, Cumulative)
Table 4.17 Comparison of Global Network Security Market & Mobile VPN Security Submarket Forecast 2013-2018 (%)
Table 4.18 Mobile Device Management Features
Table 4.19 MDM Security Submarket Forecast 2013-2018 ($million, AGR %, CAGR%, Cumulative)
Table 4.20 Global Cloud Security Market Forecast 2013-2018 ($billion, AGR %, CAGR%, Cumulative)
Table 4.21 Mobile SaaS Security Submarket Forecast 2013-2018 ($million, AGR %, CAGR%, Cumulative)
Table 4.22 Comparison of Global Cloud Security Market & Mobile SaaS Security Submarket Forecast 2013-2018 (%)
Table 5.1 Regional Mobile Security Market Forecast 2013-2018 ($ million)
Table 5.2 Regional Mobile Security Market Forecast 2013-2018 (AGR %)
Table 5.3 Regional Mobile Security Market CAGR Forecast (%) 2013-2018, 2013-2015, and 2015-2018
Table 5.4 Regional Mobile Security Market Share Forecast 2013-2018 (%)
Table 5.5 North America Mobile Security Market Forecast 2013-2018 ($million, AGR %, CAGR%, Cumulative)
Table 5.6 Asia Pacific Mobile Security Market Forecast 2013-2018 ($million, AGR %, CAGR%, Cumulative)
Table 5.7 Europe Mobile Security Market Forecast 2013-2018 ($million, AGR %, CAGR%, Cumulative)
Table 5.8 Middle East & Africa Mobile Security Market Forecast 2013-2018 ($million, AGR %, CAGR%, Cumulative)
Table 5.9 Latin America Mobile Security Market Forecast 2013-2018 ($million, AGR %, CAGR%, Cumulative)
Table 6.1 SWOT Analysis of the Mobile Security Market 2013-2018
Table 8.1 Visiongain Rating of Mobile Operating System by Security (Traditional Access Control, Permission, App Provenance, Encryption, Sandboxing)
Table 8.2 Visiongain Analysis of Leading Mobile Security Software Vendors 2012 (Compatibility, Installation Update & Operation, Ease of Use, Features, Effectiveness)
Table 8.3 Additional Players in the Mobile Security Ecosystem
Table 9.1 Global Mobile Security Market Forecast Summary 2013, 2015, 2018 ($ million, CAGR %)
Table 9.2 Global Mobile Security Submarket Forecast Summary by Type 2013, 2015, 2018 ($ million, CAGR %)
Table 9.3 Regional Mobile Security Market Forecast Summary 2013, 2015, 2018 ($ million, CAGR %)

LIST OF FIGURES

Figure 1.1 Catalysts for Mobile Data & ID Theft
Figure 2.1 Mobile Security Tools by Category
Figure 2.2 Mobile Security Value Chain
Figure 2.3 ZeuS Infection Timeline for Mobile Devices 2010-2011
Figure 2.4 Infojack Worm Propagation Method
Figure 2.5 SMS & MMS Exploits
Figure 2.6 Man in the Middle Attack
Figure 3.1 Global Mobile Security Market Forecast 2013-2018 ($m, AGR%)
Figure 4.1 Global Mobile Security Submarket Forecast 2013-2018 ($million)
Figure 4.2 Global Mobile Security Submarket Forecast 2013-2018 (AGR %)
Figure 4.3 Global Mobile Security Submarket Share Forecast 2013 (%)
Figure 4.4 Global Mobile Security Submarket Share Forecast 2015 (%)
Figure 4.5 Global Mobile Security Submarket Share Forecast 2018 (%)
Figure 4.6 Code Signing Mobile Apps Process
Figure 4.7 Global Data Security Market Forecast 2013-2018 ($ billion, AGR%)
Figure 4.8 Mobile Data Security Submarket Forecast 2013-2018 ($ million, AGR%)
Figure 4.9 Comparison of Global Data Security & Mobile Data Security Submarket Forecast 2013-2018 ($ billion, %)
Figure 4.10 Mobile Firewall System Process
Figure 4.11 Global Endpoint Security Market Forecast 2013-2018 ($ billion, AGR%)
Figure 4.12 Mobile Device Security Submarket Forecast 2013-2018 ($ million, AGR%)
Figure 4.13 Comparison of Global Endpoint Security & Mobile Device Security Submarket Forecast 2013-2018 ($ billion, %)
Figure 4.14 Mobile ID Management
Figure 4.15 Global ID Management Market Forecast 2013-2018 ($ billion, AGR%)
Figure 4.16 Mobile ID Management (MIM) Security Submarket Forecast 2013-2018 ($ million, AGR%)
Figure 4.17 Comparison of Global ID Management & MIM Submarket Forecast 2013-2018 ($ billion, %)
Figure 4.18 Global Network Security Market Forecast 2013-2018 ($ billion, AGR%)
Figure 4.19 mVPN Security Submarket Forecast 2013-2018 ($ million, AGR%)
Figure 4.20 Comparison of Global Network Security Market & Mobile VPN Security Submarket Forecast 2013-2018 ($ billion, %)
Figure 4.21 MDM Security Submarket Forecast 2013-2018 ($ million, AGR%)
Figure 4.22 Global Cloud Security Market Forecast 2013-2018 ($ billion, AGR%)
Figure 4.23 Mobile SaaS Security Submarket Forecast 2013-2018 ($ million, AGR%)
Figure 4.24 Comparison of Global Cloud Security Market & Mobile SaaS Security Submarket Forecast 2013-2018 ($ billion, %)
Figure 5.1 Regional Mobile Security Market Forecast 2013-2018 ($ million)
Figure 5.2 Regional Mobile Security Market Forecast 2013-2018 (AGR%)
Figure 5.3 Regional Mobile Security Market Share Forecast 2013 (%)
Figure 5.4 Regional Mobile Security Market Share Forecast 2015 (%)
Figure 5.5 Regional Mobile Security Market Share Forecast 2018 (%)
Figure 5.6 North America Mobile Security Market Forecast 2013-2018 ($ million, AGR%)
Figure 5.7 North America Mobile Security Market Share Forecast 2013, 2015 and 2018 (% Share)
Figure 5.8 Asia Pacific Mobile Security Market Forecast 2013-2018 ($ million, AGR%)
Figure 5.9 Asia Pacific Mobile Security Market Share Forecast 2013, 2015 and 2018 (% Share)
Figure 5.10 Europe Mobile Security Market Forecast 2013-2018 ($ million, AGR%)
Figure 5.11 Europe Mobile Security Market Share Forecast 2013, 2015 and 2018 (% Share)
Figure 5.12 Middle East & Africa Mobile Security Market Forecast 2013-2018 ($ million, AGR%)
Figure 5.13 Middle East & Africa Mobile Security Market Share Forecast 2013, 2015 and 2018 (% Share)
Figure 5.14 Latin America Mobile Security Market Forecast 2013-2018 ($ million, AGR%)
Figure 5.15 Latin America Mobile Security Market Share Forecast 2013, 2015 and 2018 (% Share)

COMPANIES LISTED

Airwatch
Alert Logic
Apple
Avast
AVG Security
AVG Technologies
Blackberry
BullGuard
Bump Technologies Inc.
CDW
Cisco
Citrix
Comcast
DataViz
DeviceLock
Echoworx
ENISA
ESET
ETSI
FFIEC
Fiberlink
Fixmo
Foundation
F-Secure
Gemalto
Get Safe Online
Good Technology
Google
Hewlett Packard (HP)
HTC
IBM
InnoPath Software
Intel Corporation
ISACA
Juniper Networks
Kaspersky Lab
Lookout
McAfee Labs
McAfee Security Innovation Alliance (SIA)
Mformation
Microsoft Corporation
Mobile Active Defense (M.A.D.)
Mobile Application Development Partners
MobileIron
Motorola
Nokia
Norton
OATH
Odyssey Software
Orange
Palm
Panda Security
Pointsec
RBI
RIM (Research in Motion)
Samsung
SAP
Secunia
Sophos
SOTI
Sybase
Symantec Corporation
Telefonica
T-Mobile
Trend Micro
Trust Digital
Trusteer
UMU
VeliQ
Verisign
Verizon
Wavelink

GOVERNMENT AGENCIES AND OTHER ORGANISATIONS MENTIONED IN THIS REPORT

News of the World
International Telecommunication Union (ITU)
New York Stock Exchange (NYSE)
NASDAQ


More Publications