вторник, 20 октября 2015 г.

Top 20 Mobile Security (mSecurity) Companies 2014 Report


Top 20 Mobile Security (mSecurity) Companies 2014
Leaders in Software as a Service (SaaS), Mobile Device Management (MDM) & Bring Your Own Device (BYOD) Security

Publication date: 27 May 2014
Number of Pages: 139

------------------------------------------------------------
Mobile devices have become an intrinsic part of everyday life, for individual consumers and large organisations alike. Consequently, the popularity of smart devices is an increasingly attractive target for cybercriminals with regards the potential value of personal data found on a device.

The increasing demand for mobile security software is seeing the emergence of security specialists offering solutions aimed at mobile as well as PC. Established market players in internet security are adapting their services to mobile, while a number of new companies are specialising specifically in smartphone and tablet security. Solutions including software, device management and security as a service are looking to answer this nascent security demand.

The complex nature of the mobile ecosystem and the close affinity to the broader cybersecurity market has made the mobile security sector a relatively fragmented market, with overlaps between the different submarkets. As a result, visiongain has determined that the top 20 companies in the global mobile security market account for $2.06 billion, or 58.9% of annual market revenue which illustrates a highly competitive and fragmented market.

Why you should buy Top 20 Mobile Security (mSecurity) Companies 2014: Leaders in Software as a Service (SaaS), Mobile Device Management (MDM) & Bring Your Own Device (BYOD) Security
Who are the leading players in the mobile security market? Visiongain's comprehensive analysis contains highly quantitative content delivering solid conclusions benefiting your analysis and illustrates new opportunities and potential reve nue streams helping you to remain competitive. This definitive report will benefit your decision making and help to direct your future business strategy. Avoid falling behind your competitors, missing critical business opportunities or losing industry influence. The report assesses technologies, competitive forces and expected product pipeline developments.

Discover Information found nowhere else in this independent assessment of the mobile security market competitive landscape
The Top 20 Mobile Security (mSecurity) Companies 2014: Leaders in Software as a Service (SaaS), Mobile Device Management (MDM) & Bring Your Own Device (BYOD) Security report provides impartial analysis of the competitive landscape in the mobile security arena. With the independent business intelligence found only in our work, you will discover where the prospects are for profit. In particular, our new research provides you with key strategic advantages: Our informed market shares, indepen dent and objective analysis, exclusive interviews and revealing company profiles will provide you with that necessary edge, allowing you to gain ground over your competitors.

With this report you are less likely to fall behind in knowledge or miss crucial business opportunities. You will save time and receive recognition for your market insight. See how you this report could benefit and enhance your research, analysis, company presentations and ultimately your individual business decisions and your company's prospects.

What makes this report unique?
Visiongain consulted widely with leading industry experts and full transcripts from these exclusive interviews with AVG, Bullguard and with Kaspersky are included in the report. Visiongain's research methodology involves an exclusive blend of primary and secondary sources providing informed analysis. This methodology allows insight into the key drivers and restraints behind market dynamics and competitive developm ents. The report therefore presents an ideal balance of qualitative analysis combined with extensive quantitative data including global markets forecasts from 2013-2024.

Why choose visiongain business intelligence?
Visiongain's increasingly diverse sector coverage strengthens our research portfolio. The growing cross-sector convergence of key verticals and the interplay of game changing technologies across hitherto unrelated industries are creating new synergies, resulting in new business opportunities for you to leverage.


------------------------------------------------------------
Table of Contents

1. Report Overview
1.1 Current Mobile Security Market Overview
1.2 Mobile Malware Attacks on the Rise
1.3 Mobile Security Ecosystem
1.4 How This Report Delivers
1.5 Who is This Report For?
1.6 Methodology
1.7 Other Visiongain Reports Published in 2014
1.8 About Visiongain

2. Introduction to the Mobile Security Market
2.1 The Mobile Security Market Growing Rapidly
2.2 Mobile Security Market Definition
2.2.1 Device Security
2.2.2 Data Security
2.2.3 Network Security
2.2.4 Mobile Security Tools
2.3 Proliferation of Mobile Devices Leading to Rise in Security Threats
2.3.1 Mobile Malware Evolution
2.3.2 Trojans
2.3.3 Worms
2.3.4 Spyware
2.3.5 Spam
2.4 Mobile Threats Affect All Platforms

3. The Global Mobile Security Market
3.1 Mobile Security - A Major Concern for Consumers Worldwide
3.2 Extensive Growth in Mobile Security Market from 2013-2024

4. Top 20 M obile Security (mSecurity) Companies Market Share
4.1 Top 20 Mobile Security (mSecurity) Companies 2013
4.2 Analysis of Mobile Security Vendors

5. Leading 20 Mobile Security Companies
5.1 AirWatch
5.1.1 Awards and Accolades
5.1.2 AirWatch Mobile Security Solution
5.2 Apple
5.2.1 Apple's Best Practices for Mobile Security
5.3 AVG
5.3.1 AVG Mobile Security Applications
5.3.2 AVG Retains Position of #1 Downloaded Security App
5.3.3 MTN Delivers AVG Mobile Security to South African Subscribers
5.4 BullGuard
5.4.1 BullGuard Mobile Security
5.5 ESET
5.5.1 ESET Mobile Security Solutions
5.6 Fiberlink, an IBM Company
5.6.1 MaaS360
5.7 Fixmo
5.7.1 Fixmo Enterprise Mobility Platform (Fixmo EMP)
5.7.1.1 Fixmo Sentinel
5.7.1.2 Fixmo SafeZone
5.7.2 Fixmo Announces Expanded Collaboration with Samsung
5.7.3 Fixmo to Provide Mobile Security to U.S. Department of Defense
5.8 F-Secure
5.8.1 F-Secure's Mobile Security Solutions
5.8.2 Majority Mobile threats are Targeted at Android
5.9 Good Technology
5.9.1 Good Dynamics Secure Mobility Platform
5.9.1.1 Mobile App Containerization
5.9.1.2 Mobile App Management (MAM)
5.9.1.3 Mobile Service Management and Mobile Device Management
5.10 Google
5.10.1 The Next Phase of Android Security
5.11 Kaspersky Lab
5.11.1 Kaspersky Internet Security for Android
5.11.2 Kaspersky Internet Security – Multi-Device
5.11.3 Kaspersky Lab Anticipates Double-Digit Growth in 2014
5.12 Lookout
5.13 McAfee, An Intel Company
5.13.1 McAfee Mobile Security Solutions
5.13.2 McAfee Labs Threats Report Findings
5.14 MobileIron
5.14.1 MobileIron Mobile IT Platform
5.15 NQ Mobile
5.15.1 NQ Mobile Security Products
5.16 Samsung Electronics
5.16.1 Samsung KNOX Workspace
5.16.2 Samsung Teams up with Zscaler and Citrix
5.17 SAP
5.17.1 SAP Mobile Secure
5.17.2 SAP and Samsung Expand Partnership
5.18 Sophos
5.18.1 Sophos Product Portfolio
5.18.2 Sophos Sees Explosive Growth for Mobile Device Management
5.19 Symantec
5.19.1 Symantec Mobile Security
5.19.2 Symantec Showcasing New Security Solutions
5.20 Trend Micro
5.20.1 Trend Micro Smart Protection Network
5.20.2 Trend Micro Mobile Security Solution
5.21 Other Leading Companies in the Mobile Security Arena
5.21.1 Mformation
5.21.2 Microsoft
5.21.3 Mobile Active Defense
5.21.4 Motorola
5.21.5 Orange
5.21.6 BlackBerry
5.21.7 Telefonica
5.21.8 Echoworx
5.21.9 DeviceLock Inc.
5.21.10 DataViz
5.22 Additional Players in the mSecurity Market

6. SWOT Analysis of the Mobile Security Market

7. Expert Opinion
7.1 Visiongain Interview with AVG Technologies
7.1.1 AVG Company Background and Mobile Security Products
7.1.2 Proliferation of Connected Devices Will Drive the Adoption of Mobile Security
7.1.3 Internet of Things is A Major Driver for the mSecurity Market
7.1.4 Key Trends in the Mobile Security Market
7.1.5 Apple's iOS is More Secure than Google's Android
7.2 Visiongain Interview with Kaspersky Lab
7.2.1 Kaspersky Company Background
7.2.2 Mobile Apps and BYOD Driving the Need for Mobile Security
7.2.3 Cybercriminals Increasingly Targeting Android Operating Systems
7.2.4 Mobile Banking Trojans to Grow Significantly in the Coming Years
7.2.5 BYOD Becoming a Popular Trend for Most Businesses
7.2.6 Consumers/Enterprises Becoming More Aware about Internet Security
7.3 Visiongain Interview with Bullguard
7.3.1 Bullguard Company Background and Mobile Security Products
7.3.2 Security Vendors Must be Ready to Tackle Increasing Malware Attacks
7.3.3 Lack of Awareness Regarding mSecurity Will be an Inhibitor
7.3.4 Mobile Device Management & BYOD Gaining Popularity
7.3.5 Antivirus will be Mandatory on all Mobile OS
7.3.6 Mobile Security to Surpass the PC Security Market in the Future
7.3.7 Security and Privacy Issues Should be Given Utmost Priority

8. Conclusion
8.1 Mobile Threats on the Rise
8.2 Market Share & Outlook for the Top 20 Mobile Security Companies

9. Glossary


------------------------------------------------------------
List of Tables

Table 2.1 Mobile Security Tools
Table 2.3 Selection of Mobile Malware Variants
Table 2.4 Overview of Selected Mobile Trojans
Table 2.6 FlexiSpy Features
Table 3.1: Global Mobile Security (mSecurity) Market Forecast 2013-2024($bn, AGR %, CAGR %)
Table 4.1 Top 20 Mobile S ecurity (mSecurity) Companies 2013 (Market Ranking, Mobile Security Revenues, Market Share %)
Table 4.3 Visiongain Analysis of Leading Mobile Security Software Vendors (Compatibility, Installation Update & Operation, Ease of Use, Features, Effectiveness)
Table 5.1 AirWatch Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, website)
Table 5.3 AirWatch Mobile Security Features
Table 5.4 Apple Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website)
Table 5.6 AVG Company Overview (Mobile security revenues, market ranking, % market share, IR contact, HQ, ticker, website)
Table 5.8 AVG Mobile Apps
Table 5.9 BullGuard Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, website)
Table 5.11 BullGuard Mobile Security Features
Table 5.12 ESET Company Overview (Mobile security revenues, market ranking, % market share, contact, HQ, w ebsite)
Table 5.14 ESET Mobile Security Solutions
Table 5.15 Fiberlink, an IBM Company (Mobile security revenues, market ranking, % market share, PR contact, HQ, website)
Table 5.17 Fiberlink Mobile Security Features
Table 5.18 Fixmo Company Overview (Mobile security revenues, market ranking, % market share, media contact, HQ, website)
Table 5.20 F-Secure Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website)
Table 5.22 F-Secure Mobile Security Solutions
Table 5.23 Good Technology Company Overview (Mobile security revenues, market ranking, % market share, media contact, HQ, website)
Table 5.25 Google Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website)
Table 5.27 Kaspersky Lab Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, website)
Table 5.29 Lookout Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, website)
Table 5.31 Lookout Mobile Security Product Overview
Table 5.32 McAfee Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, ticker, website)
Table 5.34 McAfee Enterprise Mobility Management (McAfee EMM)
Table 5.35 MobileIron Company Overview (Mobile security revenues, market ranking, % market share, media contact, HQ, website)
Table 5.37 Components of the Layered Security Model
Table 5.38 NQ Mobile Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website)
Table 5.40 Samsung Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website)
Table 5.42 KNOX 2.0 Platform Features
Table 5.43 SAP Company Overview (Mobile security revenues, market ranking, % market share, ticker, PR contact, HQ, website)
Table 5.45 SAP Mobile Secure Features
Table 5.46 Sophos Company Overview (M obile security revenues, market ranking, % market share, PR contact, HQ, website)
Table 5.48 Sophos Security Product Overview
Table 5.49 Symantec Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, ticker, website)
Table 5.51 Trend Micro Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website)
Table 5.53 How the Smart Protection Network works?
Table 5.54 Trend Micro Mobile Security Features
Table 5.55 Additional Players in the Mobile Security Ecosystem
Table 6.1 SWOT Analysis of the Mobile Security Market 2014-2024
Table 8.1 Top 20 Companies in the Mobile Security Market 2013 (Market Ranking, Mobile Security Revenues, Market Share %)

------------------------------------------------------------
List of Figures

Figure 1.1 Catalysts for Mobile Data & ID Theft
Figure 1.2 Mobile Security Value Chain
Figure 2.2 Mobile Security Tools by Category
Figure 2.5 Infojack Worm Propagation Method
Figure 3.2 Global Mobile Security (mSecurity) Market Forecast 2013-2024 ($ bn, AGR %)
Figure 4.2 Top 20 Mobile Security (mSecurity) Companies 2013 (% share)
Figure 5.2 AirWatch Mobile Security Market Share 2013 (%)
Figure 5.5 Apple Mobile Security Market Share 2013 (%)
Figure 5.7 AVG Mobile Security Market Share 2013 (%)
Figure 5.10 Bullguard Mobile Security Market Share 2013 (%)
Figure 5.13 ESET Mobile Security Market Share 2013 (%)
Figure 5.16 Fiberlink Mobile Security Market Share 2013 (%)
Figure 5.19 Fixmo Mobile Security Market Share 2013 ( %)
Figure 5.21 F-Secure Mobile Security Market Share 2013 (%)
Figure 5.24 Good Technology Mobile Security Market Share 2013 (%)
Figure 5.26 Google Mobile Security Market Share 2013 (%)
Figure 5.28 Kaspersky Mobile Security Market Share 2013 (%)
Figure 5.30 Lookout Mobile Security Market Share 2013 (%)
Figure 5.33 McAfee Mobile Security Market Share 2013 (%)
Figure 5.36 MobileIron Mobile Security Market Share 2013 (%)
Figure 5.39 NQ Mobile mSecurity Market Share 2013 (%)
Figure 5.41 Samsung Mobile Security Market Share 2013 (%)
Figure 5.44 SAP Mobile Security Market Share 2013 (%)
Figure 5.47 Sophos Mobile Security Market Share 2013 (%)
Figure 5.50 Symantec Mobile Security Market Share 2013 (%)
Figure 5.52 Trend Micro Mobile Security Market Share 2013 (%)


------------------------------------------------------------
Companies Mentioned in this report

Airwatch
Airtel
Adobe
AT&T
Alert Logic
Accel Partners
Apple
AuthenTec
Avast
Avis
AVG Security
Andreessen Horowitz
Blackberry
Bell Mobility
Baidu
BullGuard
Bump Technologies Inc.
CDW
Cisco
Citrix
Comcast
Clearwire
Digital Management Inc.
DataViz
DeviceLock
Deloitte
Deutsche Telekom
Echoworx
ENISA
ESET
ETSI
Facebook
Fiberlink Communications
Fixmo
Foundation
Ford
F-Secure
Gemalto
Greylock Partners
Get Safe Online
General Dynamics
Good Technology
Google
Hewlett Packard (HP)
HTC
IBM
InnoPath Software
Intel Corporation
Intel Security
Index Ventures
ISACA
Juniper Networks
Khosla Ventures
Kaspersky Lab
Kaspersky Lab North America
Lookout
Lockheed Martin
McAfee Labs
Mformation
Microsoft Corporation
Mithril Capital Management
Mobile Active Defense (M.A.D.)
MobileIron
Mocana
MTN
Motorola
Nokia
Northrop Grumman
NQ Mobile (NQ)
Nukona
OATH
Odyssey Software
Palm
Panda Security
Pixar
Pointsec
Qihoo360
Qualcomm Technologies Inc.
RBI
RIM (Research in Motion)
Samsung Electronics
SAP
Salesforce.com
Skype
Sprint
Secunia
Sophos
Sony Ericsson
Symantec Corporation
Telefonica
Toshiba
T-Mobile
Trend Micro
Tencent (TCEHY)
Trust Digital
Trusteer
UMU
Under Armour
VeliQ
VMware
Verisign
Verizon
Wavelink
Xerox
Zscaler

Government Agencies and Other Organizations Mentioned in This Report
Federal Trade Commission (FTC)
GSM Association (GSMA)
International Telecommunication Union (ITU)
Intelligence and National Security Alliance (INSA)
MEF Global forum
Mobile World Congress (MWC)
National Telecommunications and Information Administration (NTIA)
New York Stock Exchange (NYSE)
NASDAQ
Security Innovation Network (SINET)
U.S. Department of Defense (DOD)
U.S Defence Industry Security Association (DISA)
World Economic Forum


------------------------------------------------------------
Pricing

Single User License:
Single user copies of this report are available for EUR1369/ USD1649/ GBP1099

Departmental License:
Entitles up to 5 individual users to access this r eport for EUR3599/ USD4499/ GBP2999 (Not suitable for library usage)

Site License:
Allow your company to have access to this report at one location for EUR5999/ USD7499/ GBP4999 (Suitable for library storage and use)

Global License:
Have your whole company worldwide to access this information for EUR8399/ USD9999/ GBP6999

------------------------------------------------------------
Ordering

All you need to do to order this report is to contact Dorottya Szalai on:
Telephone: +44(0)207 549 9964 o r email: dorottya.szalai@vgtelecomreports.com
And provide the following information:


Report Title:
Report License (Single User/Departmental/Site/Global):
Name:
User Email:
Job Title:
Company:
Invoice Address:
Telephone and Fax number:
EEC VAT Number (only for E.U.):


Please contact me should you have any questions or wish to receive an executive summary of this report.

I look forward to hearing from you.


Best Regards,

Dorottya Szalai
Telecoms Industry Consultant


Terms and Conditions


By replying to this e-mail submitting your order for this product you have agreed without limitation or qualification to be bound by and to comply with these Terms and Conditions. You agree that you will not fail to complete any transaction after submitting an order to purchase a product or submit any order to purchase a product where you do not intend to complete the transaction. Management Reports will only be sent on receipt of payment.


You are currently subscribed to this list as ali.ali-an@yandex.by . As a valued contact or customer, you are receiving this email with information that we believe will be relevant to you. If however, you wish to stop future messages, please reply to this email typing "REMOVE" in the subject box.



Registered Office: BSG House, 230 City Road, London, EC1V 2QY, U.K.

Комментариев нет:

Отправить комментарий