[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

The Mobile Security (mSecurity) Market 2012-2017

February 2012 | 184 pages | ID: M0AB8D77931EN
Visiongain

US$ 2,635.00

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
Report Details

Mobile threats are becoming increasingly prolific as the mobile platform continues to gain popularity through the adoption of smart devices. As end-users and businesses come to rely on smartphones and tablets in their personal and business activities, they store valuable information that is attracting the attention of cybercriminals. This has been brought to global attention with the discovery of a spate of mobile malware in the past year, many of which were surreptitiously copying stored mobile data.

The general lack of awareness of mobile vulnerabilities and this increase in mobile malware has driven a nascent yet dynamic market in mobile security products and services. This market is initially driven by business concerns on the protection of corporate assets and information, and has spurred the growth of niche companies offering services such as mobile device management, and cloud based security. Consequently, visiongain has determined that the value of the global mobile security market in 2012 will reach $1.6bn.

Mobile security products will become intrinsic to general cybersecurity in any organisation planning on allowing the use of mobile devices. The different solutions will address malware, spam, spyware applications, unauthorised access and modification at the same level as general cybersecurity measures. The industry is quickly grasping the notion that mobile malware will likely evolve similarly to PC-based threats, and that similar protection and detection measures will be necessary.

National mobile security markets in Europe, North America and the Asia Pacific region will experience the strongest growth. BRIC nations will also show signs of a burgeoning mobile security market, as their populations increasingly adopt smart devices, albeit in the mid to long term. Spending in the rest of the world, such as smaller Latin American countries, the Middle East and Africa will not be quite as significant, with a much smaller market, despite a favourable growth rate. The adoption of broadband networks and the decreasing prices of smart devices will eventually change the situation in the long term.

Unique Selling Points
  • Comprehensive analysis of the prospects for the mobile security market from 2012-2017.
  • Analysis and forecasting informed by extensive expert consultation with industry leaders. You will be able to read full transcripts of interviews from 7 leading companies involved within the mobile security market.
  • 111 tables, charts and figures that quantify, analyse and forecast the changing dynamics of the mobile security market between 2012-2017.
  • Forecasts and analysis for the global mobile security market between 2012-2017
  • Forecasts and analysis for 6 mobile security submarkets from 2012-2017.
  • Forecasts and analysis for 9 national mobile security markets, as well as rest of the world figures and projections for the period 2012-2017
  • Analysis of the forces that influence and characterise the mobile security market
  • Profiles of 30 leading companies operating within the mobile security market.

Methodology

This report has been compiled by combining information obtained from a very wide and rich mixture of primary and secondary research sources, producing a broad industry overview. Visiongain sought opinions from leading figures in the mobile security market to underpin the analysis of market drivers and restraints. The study draws on a diverse range of official corporate and governmental announcements, media reports, policy documents, industry statements and expert opinion as a basis for discussing and predicting developments in the mobile security market between 2012 and 2017.

Visiongain considers that this methodology results in an accurate, objective mixture of analyses and forecasts.

Why you should buy The Mobile Security (mSecurity) Market 2012-2017
  • You will receive a comprehensive analysis of the mobile security market from 2012-2017
  • The analysis and forecasting has been informed by extensive expert consultation with industry leaders. Within the report, you will be able to read full transcripts of interviews from 7 leading companies involved within the mobile security market.
    • Symantec
    • Kaspersky Lab
    • Mobile Active Defense
    • Echoworx
    • Fixmo
    • Odyssey Software
    • Fiberlink
  • You will find 111 tables, charts, and graphs that quantify, analyse and forecast the mobile security market from 2012-2017
  • You will find forecasts and analysis of 6 mobile security submarkets over the period 2012-2017
    • Mobile Data Security
    • Mobile Device Security
    • Mobile Identity Management
    • Mobile Virtual Private Networks
    • Mobile Device Management
    • Mobile Security as a Service
  • You will be presented with forecasts for the 9 leading national mobile security markets, as well as rest of the world figures and projections for the period 2012-2017
    • Russia
    • Germany
    • United Kingdom
    • France
    • United States
    • Canada
    • China
    • India
    • Brazil
  • You will receive a SWOT analysis that examines the mobile security market from 2012-2017
  • You will gain profiles of 30 leading companies operating within the mobile security market

What is the structure of the report?

Executive Summary
Chapter 1 provides an introduction to the mobile security market.
Chapter 2 provides an analysis of mobile threats. The chapter includes analysis of forms of malware, vectors, and threat expansion.
Chapter 3 offers an overview of the global mobile security market. The chapter focuses on six submarkets that constitute the mobile security market.
Chapter 4 provides sales forecasts and analysis of growth over the period 2012 to 2017 for the global mobile security market, as well analysis of regional and national markets.
Chapter 5 provides a SWOT analysis, discussing the main strengths, weaknesses, opportunities and threats to the mobile security market.
Chapter 6 features seven interviews from leading companies within the field of mobile security.
Chapter 7 includes the outline and profile of 30 major companies operating within the mobile security market.
Chapter 8 is a summary of the report, outlining the main conclusions of the analyses.
Chapter 9 is a glossary of acronyms used in the report.

You can order this report today

Anybody with an interest in the mobile security market should gain valuable information and insight from this new study by visiongain, which analyses one of the most exciting markets in the data & cybersecurity markets. Mobile security offers substantial business and investment opportunities and is becoming an increasingly important component of the mobile handset market in several key regional markets.

This visiongain utility report will be valuable both to those already involved in the mobile security market and those wishing to enter the market in the future. Gain an understanding of how to tap into the potential of this market by ordering The Mobile Security (mSecurity) Market 2012-2017

Visiongain is a trading partner with the US Federal Government
CCR Ref number: KD4R6
EXECUTIVE SUMMARY

E.1 The Mobile Security Market Overview
E.2 The Aim & Scope of the Report
E.3 Structure of the Report
E.4 Methodology

1. INTRODUCTION TO THE MOBILE SECURITY MARKET

1.1 Unauthorised Access and Collection of Data
1.2 The Digital Black Market
1.3 A High Risk of Data Breach
1.4 Adapting Security to the Mobile Environment
1.5 Defining Mobile Security
  1.5.1 Device Security
  1.5.2 Data Security
  1.5.3 Network Security
  1.5.4 Mobile Security Tools
  1.5.5 Mobile Security Submarkets
1.6 Mobile Security Value Chain

2. UNDERSTANDING MOBILE THREATS

2.1 Mobile Malware Evolution
2.2 Trojans
2.3 Worms
2.4 Spyware
2.5 Spam
2.6 Mobile Threat Expansion by Platform
  2.6.1 Android
  2.6.2 Symbian
  2.6.3 iOS
  2.6.4 BlackBerry OS
  2.6.5 Windows Mobile
2.7 What are the Malware Vectors for Mobile?
  2.7.1 SMS & MMS
  2.7.2 Wi-Fi & Bluetooth
  2.7.3 Apps & Downloads
  2.7.4 SD & Multimedia Cards
2.8 Digital Fraud through Social Engineering

3. THE GLOBAL MOBILE SECURITY MARKET

3.1 Global Mobile Security Market Forecast
3.2 Global Mobile Security Submarket Forecasts
3.3 Mobile Data Security
  3.3.1 Encryption, Public Key Infrastructure & Certification
  3.3.2 Data Security Market Forecast
  3.3.3 Mobile Data Security Submarket Forecast
3.4 Mobile Device Security
  3.4.1 Antivirus Software
  3.4.2 Firewalls & Filtering
  3.4.3 Authentication through PINs and Passwords
  3.4.4 Endpoint Security Market Forecast
  3.4.5 Mobile Device Security Submarket Forecast
3.5 Mobile ID Management
  3.5.1 Biometrics
  3.5.2 Identity Management Market Forecast
  3.5.3 MIM Submarket Forecast
3.6 Network Security
  3.6.1 Network Security Market Forecast
  3.6.2 Mobile Virtual Private Network
  3.6.3 mVPN Submarket Forecast
3.7 Mobile Device Management
  3.7.1 Enterprise MDM Market
  3.7.2 MDM Submarket Forecast
3.8 Security as a Service
  3.8.1 Cloud Security Market Forecast
  3.8.2 mSaaS Submarket Forecast

4. REGIONAL & NATIONAL MOBILE SECURITY MARKETS

4.1 European Mobile Security Market Forecast
  4.1.1 Russian Mobile Security Market Forecast
  4.1.2 German Mobile Security Market Forecast
  4.1.3 UK Mobile Security Market Forecast
  4.1.4 French Mobile Security Market Forecast
4.2 North American Mobile Security Market Forecast
  4.2.1 US Mobile Security Market Forecast
  4.2.2 Canadian Mobile Security Market Forecast
4.3 Asia Pacific Mobile Security Market Forecast
  4.3.1 Chinese Mobile Security Market Forecast
  4.3.2 Indian Mobile Security Market Forecast
4.4 Latin American Mobile Security Market Forecast
  4.4.1 Brazilian Mobile Security Market Forecast
4.5 Middle East & African Mobile Security Market Forecast
4.6 Leading National Mobile Security Markets Summary

5. SWOT ANALYSIS OF THE MOBILE SECURITY MARKET

5.1 Strengths
  5.1.1 Increasing Number of Attacks and Vulnerabilities
  5.1.2 Applying Past Cybersecurity Experience
  5.1.3 Protecting Corporate Assets
  5.1.4 Regulatory Compliance
  5.1.5 International Markets
5.2 Weaknesses
  5.2.1 Fragmented Mobile Ecosystem
  5.2.2 Lack of Public Awareness
  5.2.3 Lack of Corporate Understanding
  5.2.4 Unfavourable Economic Conditions
5.3 Opportunities
  5.3.1 Increasing Use of Mobile Devices
  5.3.2 Data Protection Legislation
  5.3.3 BYOD Trends
  5.3.4 Securing New Platforms
  5.3.5 Protecting Personal Data and Privacy
5.4 Threats
  5.4.1 Increasing Sophistication of Mobile Exploits
  5.4.2 User Bypass
  5.4.3 Convergence

6. EXPERT OPINIONS

6.1 Symantec
  6.1.1 Symantec's Role in Mobile Security
  6.1.2 Mobile Security Threats
  6.1.3 Most Affected Mobile Platforms
  6.1.4 The Evolution of Mobile Malware
  6.1.5 Best Tools and Practices for Securing Mobile
  6.1.6 Investing in Mobile Security
  6.1.7 Organisational Challenges in the Mobile Security Market
  6.1.8 Symantec Mobile Security Solutions
6.2 Mobile Active Defense
  6.2.1 M.A.D.'s Role in Mobile Security
  6.2.2 Mobile Security Threats
  6.2.3 Most Affected Mobile Platforms
  6.2.4 Best Tools and Practices for Securing Mobile
  6.2.5 Organisational Challenges in the Mobile Security Market
  6.2.6 M.A.D. Mobile Security Solutions
6.3 Echoworx
  6.3.1 Echoworx's Role in Mobile Security
  6.3.2 Mobile Security Threats
  6.3.3 Most Affected Mobile Platforms
  6.3.4 The Evolution of Mobile Malware
  6.3.5 Best Tools and Practices for Securing Mobile
  6.3.6 Organisational Challenges in the Mobile Security Market
  6.3.7 Echoworx Mobile Security Solutions
6.4 Fixmo
  6.4.1 Fixmo's Role in Mobile Security
  6.4.2 Mobile Security Threats
  6.4.3 Most Affected Mobile Platforms
  6.4.4 The Evolution of Mobile Malware
  6.4.5 Best Tools and Practices for Securing Mobile
  6.4.6 Investing in Mobile Security
  6.4.7 Organisational Challenges in the Mobile Security Market
6.5 Odyssey Software
  6.5.1 Odyssey's Role in Mobile Security
  6.5.2 Mobile Security Threats
  6.5.3 Most Affected Mobile Platforms
  6.5.4 The Evolution of Mobile Malware
  6.5.5 Best Tools and Practices for Securing Mobile
  6.5.6 Organisational Challenges in the Mobile Security Market
  6.5.7 Odyssey Mobile Security Solutions
6.6 Fiberlink
  6.6.1 Fiberlink's Role in Mobile Security
  6.6.2 Organisations and Mobile Security
  6.6.3 Trends in 2012
  6.6.4 Organisational Challenges in the Mobile Security Market
6.7 Kaspersky Lab
  6.7.1 Kaspersky's Role in Mobile Security
  6.7.2 Mobile Security Threats
  6.7.3 Most Affected Mobile Platforms
  6.7.4 The Evolution of Mobile Malware
  6.7.5 Best Tools and Practices for Securing Mobile
  6.7.6 Organisational Challenges
  6.7.7 Kaspersky Lab Mobile Security Solutions

7. LEADING COMPANIES IN THE MOBILE SECURITY MARKET

7.1 Apple
7.2 AVG
7.3 BullGuard
7.4 DataViz
7.5 DeviceLock
7.6 Echoworx
7.7 Fiberlink
7.8 Fixmo
7.9 F-Secure
7.10 Google
7.11 InnoPath Software
7.12 Kaspersky Lab
7.13 Lookout
7.14 McAfee
7.15 Mformation
7.16 Microsoft
7.17 Mobile Active Defense
7.18 VeliQ
7.19 MobileIron
7.20 Motorola
7.21 Nokia
7.22 Odyssey Software
7.23 Orange
7.24 Research In Motion
7.25 Sophos
7.26 Symantec
7.27 Telefonica
7.28 T-Mobile
7.29 Trend Micro
7.30 UMU
7.31 Analysis of Mobile Operating Systems
7.32 Analysis of Mobile Security Vendors
7.33 Analysis of the Mobile Security Market

8. CONCLUSIONS

8.1 Key Findings of the Report
  8.1.1 Mobile Data Security Market 2012-2017
  8.1.2 Mobile Device Security Market 2012-2017
  8.1.3 Mobile ID Management Market 2012-2017
  8.1.4 Network Security Market 2012-2017
  8.1.5 Mobile Device Management Market 2012-2017
  8.1.6 Security as a Service Market 2012-2017
  8.1.7 Regional & National Mobile Security Markets
  8.1.8 European Mobile Security Market Forecast
  8.1.9 North American Mobile Security Market Forecast
  8.1.10 Asia Pacific Mobile Security Market Forecast
  8.1.11 Latin American Mobile Security Market Forecast
  8.1.12 Middle East & African Market Forecast

9. GLOSSARY

Appendix A - About visiongain
Appendix B - Visiongain report evaluation form

LIST OF TABLES

Table 1.1 Mobile Security Tools
Table 2.1 Selection of Mobile Malware Variants 2004 - 2010
Table 2.2 Overview of Selected Mobile Trojans in 2010 - 2011
Table 2.3 FlexiSpy Features
Table 2.4 Selection of Recent Mobile Spyware 2011
Table 2.5 Selection of Android Malware 2010 - 2011
Table 2.6 Selection of Symbian Malware 2005 - 2012
Table 2.7 Social Engineering on Mobile Devices
Table 3.1 Global Mobile Security Market Forecast, AGR & CAGR 2012 - 2017 ($bn / %)
Table 3.2 Global Mobile Security Submarket Forecast CAGR 2012 - 2017 (%)
Table 3.3 Global Mobile Security Submarket Forecast & AGR 2012 - 2017 ($mn / %)
Table 3.4 Global Mobile Security Submarket Share Forecast 2012 - 2017 (%)
Table 3.5 Total Data Security Market Forecast, AGR & CAGR 2012 - 2017 ($bn / %)
Table 3.6 Mobile Data Security Submarket Forecast, AGR & CAGR 2012 - 2017 ($mn / %)
Table 3.7 Comparison of Global Total & Mobile Data Security Submarket Forecast 2012 - 2017 (%)
Table 3.8 Antivirus Software - Detection Methods
Table 3.9 Total Endpoint Security Market Forecast, AGR & CAGR 2012 - 2017 ($bn/ %)
Table 3.10 Mobile Device Security Submarket Forecast, AGR & CAGR 2012 - 2017 ($mn / %)
Table 3.11 Comparison of Global Endpoint & Mobile Device Security Submarket Forecast 2012 - 2017 (%)
Table 3.12 Total ID Management Market Forecast, AGR & CAGR 2012 - 2017 ($bn / %)
Table 3.13 MIM Submarket Forecast, AGR & CAGR 2012 - 2017 ($mn / %)
Table 3.14 Comparison of Global ID Management & MIM Security Submarket Forecast 2012 - 2017 (%)
Table 3.15 Total Network Security Market Forecast, AGR & CAGR 2012 - 2017 ($bn / %)
Table 3.16 mVPN Submarket Forecast, AGR & CAGR 2012 - 2017 ($mn / %)
Table 3.17 Comparison of Global Network Security & mVPN Submarket Forecast 2012 - 2017 (%)
Table 3.18 Mobile Device Management Features
Table 3.19 MDM Submarket Forecast, AGR & CAGR 2012 - 2017 ($mn / %)
Table 3.20 Total Cloud Security Market Forecast, AGR & CAGR 2012 - 2017 ($bn / %)
Table 3.21 mSaaS Submarket Forecast, AGR & CAGR 2012 - 2017 ($mn / %)
Table 3.22 Comparison of Global Network Security & mSaaS submarket Forecast 2012 - 2017 (%)
Table 4.1 Regional Mobile Security Market Forecast & AGR 2012 - 2017 ($mn / %)
Table 4.2 Regional Mobile Security Market Forecast CAGR 2012 - 2017 (%)
Table 4.3 Regional Mobile Security Market Share Forecast 2012 - 2017 (%)
Table 4.4 European Mobile Security Market Forecast , AGR & CAGR 2012 - 2017 ($mn / %)
Table 4.5 Leading 4 European Mobile Security Market Forecast & AGR 2012 - 2017 ($mn / %)
Table 4.6 Leading 4 European Mobile Security Market Forecast CAGR 2012 - 2017 (%)
Table 4.7 Russian Mobile Security Market Forecast, AGR & CAGR 2012 - 2017 ($mn / %)
Table 4.8 German Mobile Security Market Forecast , AGR & CAGR 2012 - 2017 ($mn / %)
Table 4.9 UK Mobile Security Market Forecast, AGR & CAGR 2012 - 2017 ($mn / %)
Table 4.10 French Mobile Security Market Forecast, AGR & CAGR 2012 - 2017 ($mn / %)
Table 4.11 North American Mobile Security Market Forecast 2012 - 2017 ($mn / %)
Table 4.12 Leading 2 North American Mobile Security Market Forecast & AGR 2012 - 2017 ($mn / %)
Table 4.13 Leading 2 North American Mobile Security Market CAGR 2012 - 2017 (%)
Table 4.14 US Mobile Security Market Forecast, AGR & CAGR 2012 - 2017 ($mn / %)
Table 4.15 Canadian Mobile Security Market Forecast, AGR & CAGR 2012 - 2017 ($mn / %)
Table 4.16 Asia Pacific Mobile Security Market Forecast, AGR & CAGR 2012 - 2017 ($mn / %)
Table 4.17 Leading 2 Asia Pacific Mobile Security Market Forecast & AGR 2012 - 2017 ($mn / %)
Table 4.18 Leading 2 Asia Pacific Mobile Security Market CAGR 2012 - 2017 (%)
Table 4.19 Chinese Mobile Security Market Forecast, AGR & CAGR 2012 - 2017 ($mn / %)
Table 4.20 Indian Mobile Security Market Forecast, AGR & CAGR 2012 - 2017 ($mn / %)
Table 4.21 Latin American Mobile Security Market Forecast 2012 - 2017 ($mn / %)
Table 4.22 Brazilian Mobile Security Market Forecast 2012 - 2017 ($mn / %)
Table 4.23 Middle East & African Mobile Security Market Forecast 2012 - 2017 ($mn / %)
Table 4.24 Leading National Mobile Security Market Forecast 2012 - 2017 ($mn)
Table 5.1 SWOT Analysis of the Mobile Security Market
Table 7.1 Visiongain Rating of Mobile Operating System by Security (Traditional Access Control, Permission, App Provenance, Encryption, Sandboxing)
Table 7.2 Visiongain Analysis of Leading Mobile Security Software Vendors 2012 (Compatibility, Installation Update & Operation, Ease of Use, Features, Effectiveness)

COMPANIES LISTED

Airwatch
Apple
Avast
AVG Technologies
BitDefender
BT
BullGuard
CA
Check Point Software Technologies
Clearwell Systems
DataViz
DeviceLock
DrWeb
Echoworx
ESET
F-Secure
Fiberlink
Fixmo
Fortinet
Good Technology
Google]
Guardian Edge Technologies
Hewlett Packard (HP)
HTC
IBM
ING Direct
InnoPath Software
Kaspersky Lab
Lookout
McAfee Labs
Mformation
Microsoft Corporation
MobiDM
Mobile Active Defense (M.A.D.)
Mobile Application Development Partners
MobileIron
Motorola
NetQin
Nokia
Odyssey Software
Orange
PCP Corporation
RIM (Research in Motion)
SAP
Sophos
SOTI
Sybase
Symantec Corporation
Telefonica
TELUS Mobility
T-Mobile
Trend Micro
UMU
Veliq
Verisign
Vodafone
Wavelink

GOVERNMENT AGENCIES AND OTHER ORGANISATIONS MENTIONED IN THIS REPORT

Brazilian Ministry of Justice
German Federal Office for Information Security
International Telecommunication Union
News of the World
Organisation for Economic Co-operation and Development
Rotman School of Management
Technical University of Vienna
Union of European Football Associations
University of California

LIST OF CHARTS

Chart 2.1 Recorded Mobile Malware Threats by Security Company 2009 - 2010 (Symantec, Kaspersky, McAfee)
Chart 2.2 Total Malware by Platform 2011 (%)
Chart 3.1 Global Mobile Security Market Forecast 2012 - 2017 ($bn)
Chart 3.2 Global Mobile Security Submarket Forecast 2012 - 2017 ($mn)
Chart 3.3 Global Mobile Security Submarket Share 2012 (%)
Chart 3.4 Global Mobile Security Submarket Share 2017 (%)
Chart 3.5 Total Data Security Market Forecast 2012 - 2017 ($bn)
Chart 3.6 Mobile Data Security Submarket Forecast 2012 - 2017 ($mn)
Chart 3.7 Comparison of Global Total & Mobile Data Security Submarket Forecast 2012 - 2017 ($bn / %)
Chart 3.8 Total Endpoint Security Market Forecast 2012 - 2017 ($bn)
Chart 3.9 Mobile Device Security Submarket Forecast 2012 - 2017 ($mn)
Chart 3.10 Comparison of Global Endpoint & Mobile Device Security Submarket Forecast 2012 - 2017 ($bn / %)
Chart 3.11 Total ID Management Market Forecast 2012 - 2017 ($bn)
Chart 3.12 MIM Submarket Forecast 2012 - 2017 ($mn)
Chart 3.13 Comparison of Global ID Management & MIM Submarket Forecast 2012 - 2017 ($bn / %)
Chart 3.14 Total Network Security Market Forecast 2012 - 2017 ($bn)
Chart 3.15 mVPN Submarket Forecast 2012 - 2017 ($mn)
Chart 3.16 Comparison of Global Network Security & mVPN Submarket Forecast 2012 - 2017 ($bn / %)
Chart 3.17 MDM Submarket Forecast 2012 - 2017 ($mn)
Chart 3.18 Total Cloud Security Market Forecast 2012 - 2017 ($bn)
Chart 3.19 mSaaS Submarket Forecast 2012 - 2017 ($mn)
Chart 3.20 Comparison of Global Cloud Security & mSaaS Submarket Forecast 2012 - 2017 ($bn / %)
Chart 4.1 Regional Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.2 Regional Mobile Security Market Share Forecast 2012 (%)
Chart 4.3 Regional Mobile Security Market Share Forecast 2017 (%)
Chart 4.4 European Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.5 Leading 4 European Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.6 Russian Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.7 German Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.8 UK Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.9 French Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.10 North America Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.11 Leading 2 North American Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.12 US Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.13 Canadian Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.14 Asia Pacific Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.15 Leading 2 Asia Pacific Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.16 Chinese Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.17 Indian Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.18 Latin American Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.19 Brazilian Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.20 Middle East & African Mobile Security Market Forecast 2012 - 2017 ($mn)
Chart 4.21 Leading National Mobile Security Market Share 2012 (%)
Chart 4.22 Leading National Mobile Security Market Share Forecast 2017 (%)

LIST OF FIGURES

Figure 1.1 Catalysts for Mobile Data & ID Theft
Figure 1.2 Mobile Security Tools by Category
Figure 1.3 Mobile Security Value Chain
Figure 2.1 ZeuS Infection Timeline for Mobile Devices 2010-2011
Figure 2.2 Infojack Worm Propagation Method
Figure 2.3 SMS & MMS Exploits
Figure 2.4 Man in the Middle Attack
Figure 3.1 Code Signing Mobile Apps Process
Figure 3.2 Mobile Firewall System Process
Figure 3.3 Mobile ID Management



More Publications