Market Research Reports and Industry Reports

Mobile Security Solutions- An increasingly insecure mobile environment - Markets, trends & technologies IDATE

  • DESCRIPTION
  • TABLE OF
    CONTENTS
  • RELATED
    REPORTS
  • SAMPLE REQUEST
  • PURCHASE BY
    SECTION

This report examines the world of mobile security, providing a broad overview of the main players, their strategies and positioning, future trends and the market as a whole – its structuring and value chain (hardware, devices, IT, security, telcos)
 
 It examines the threats for mobile, their reach and assessed prevalence In parallel, the report details key technologies – in use and those upcoming – aimed to secure mobile platforms
 Finally, the report provides a strategic analysis of the key drivers and hurdles regarding the mobile security solution market, coming along with data and forecast of the market in value

 Executive Summary 8
 2 Methodology and scope 9
 
21 General methodology of IDATEs reports 9
 22 Scope 10
 3 Mobile security threats, solutions and applications 11
 
31 Mobile security threats 11
 311 Specificities of mobile platforms 11
 312 Threats and attacks 13
 32 Mobile security solutions across platforms 22
 321 Overview 22
 322 Baseline protection: Mobile OS and mobile networks 23
 323 Security frameworks and mobile security applications 27
 324 Security key enabling technologies 34
 4 Market structure and player strategies 40
 
41 Market structure 40
 411 Value chain 40
 412 Access to market 41
 413 Table of market players 43
 42 Hardware enabler providers 45
 421 Secure element and trusted execution environment 45
 422 Biometric technology 47
 43 Baseline protection providers 50
 431 OS providers 50
 432 Device manufacturers 53
 433 Mobile network operators 57
 44 Security solution players 61
 441 Pure players 61
 442 Security solution providers 64
 443 IT-solution providers 68
 5 Strategic analysis 70
 
51 Key drivers 70
 511 Technological push 70
 512 New mobile use cases requiring security 72
 513 Regulation 73
 514 Device market maturity 74
 52 Barriers 75
 521 Rising baseline protection 75
 522 Lack of strong consumer demand 76
 523 Device market cost sensitivity 78
 53 Market development and forecasts 79
 531 Key trends 79
 532 Major uncertainties 79
 533 Market forecast 81


List Of Tables

 Table 1: Type of malware attacks 15
 Table 2: Means of propagation of malware attacks 16
 Table 3: Comparison of Android OS and iOS security features 24
 Table 4: Types of secure elements 36
 Table 5: Compared protection offered by secure elements, TEE and mobile OS 39
 Table 6: Mobile security solutions market players 43
 Table 7: Gemalto mobileID solution 46
 Table 8: Lookout consumer offering Free and Premium 62
 Table 9: User concerns around mobile identity and personal data 76


List Of Figures

 Figure 1: Mobile platform vulnerabilities 12
 Figure 2: Mobile threats, attacker strategies 14
 Figure 3: Number of Android malwares identified 17
 Figure 4: Number of new mobile malwares identified by McAfee 17
 Figure 5: New malwares (non-mobile) identified by McAfee 18
 Figure 6: Devices with known potential harmful applications 18
 Figure 7: Geography of mobile malware encounter rates, Q3 2015 (% of users attacked) 19
 Figure 8: Web navigation shifts to mobile 20
 Figure 9: Global in-store mobile payment volume 21
 Figure 10: IoT development in volume 21
 Figure 11: Overview of mobile security solutions 22
 Figure 12: iOS security architecture 23
 Figure 13: Abstract overview of mobile networks 26
 Figure 14: Avast Mobile Security and Antivirus 28
 Figure 15: Kaspersky Internet Security 29
 Figure 16: Android Device Manager 30
 Figure 17: Management of mobile devices, content and applications 31
 Figure 18: Protection of corporate network against external mobiles 32
 Figure 19: Using the mobile for authentication 34
 Figure 20: Multifactor authentication 34
 Figure 21: The secure element, as a microSD, UICC embedded in the device 35
 Figure 22: Secure element application domains 35
 Figure 23: Samsung Galaxy S6 Edge, fingerprint sensor 37
 Figure 24: Components of TouchID 37
 Figure 25: Rich OS and TEE comparison 38
 Figure 26: Security in the mobile value chain 40
 Figure 27: NFC positioning on the security market 47
 Figure 28: Synaptics products in the SmartPhone 48
 Figure 29: Fingerprint Cards sensors 49
 Figure 30: AuthenTec, the fingerprint sensor company bought by Apple 50
 Figure 31: Android 60 privacy control 51
 Figure 32: Android Pay 52
 Figure 33: Samsung Pay, emulation of a magnetic card swipe 54
 Figure 34: LG Gate Enterprise solution 54
 Figure 35: Keeper partnership with HTC 55
 Figure 36: Sony myXperia software 55
 Figure 37: BlackBerry Priv (Android based) 56
 Figure 38: Blackphone 2 56
 Figure 39: Verizon Total Mobile Protection offering 58
 Figure 40: Telefónica ElevenPaths Latch security solution 59
 Figure 41: T-Mobile MyWallet 61
 Figure 42: MobileIron telco partnerships 63
 Figure 43: Security multifactor authentication for password management 65
 Figure 44: Kaspersky Android wearables application 66
 Figure 45: Avast mobile application ecosystem 67
 Figure 46: Avast Virtual Mobile Platform 67
 Figure 47: VMWare vision of next EMM challenges: Identity management and virtualisation 68
 Figure 48: Citrix XenMobile security compliance engine 69
 Figure 49: Iris scanner on Fujitsu NX F04G 70
 Figure 50: Parasol, a new application dedicated to privacy protection using Android 60+ privacy controls 71
 Figure 51: Increasing convergence in mobile/PC platforms 72
 Figure 52: Mobile device : shipments by region 74
 Figure 53: The threat of rising baseline protections and possible roads to market for B2C solutions 76
 Figure 54: Credibility of players for the provision of online information 77
 Figure 55: Security feeling, age and smart cards 77
 Figure 56: The gap between use and trust 78
 Figure 57: Global mobile security market (2015 - 2020) 81
 Figure 58: Global B2B market for mobile security solutions (2015 - 2020) 81
 Figure 59: Global B2C market for mobile security solutions (2015 - 2020) 82 


Glu Mobile Inc. Company Profile- Outlook, Business Segments, Competitors, Goods and Services, SWOT and Financial Analysis

Glu Mobile Inc. Company Profile is a complete analysis of the companys operations, strategies, outlook and historic performance. The research work analyzes key strategies in current market conditions, SWOT

USD 200View Report

2016 Market Research Report on Global Automobile Carburetor Industry

As the popularization of electric control fuel injection system, the carburetor market is becoming smaller. In 2015, the global carburetor market size is about 1.64 billion USD. As the decline

USD 2900View Report

United States Mobile Sensors Market Report 2016

Notes:Sales, means the sales volume of Mobile SensorsRevenue, means the sales value of Mobile SensorsThis report studies sales (consumption) of Mobile Sensors in United States market, focuses on the top

USD 3800View Report

Europe Mobile Security Market Report 2016

Notes:Sales, means the sales volume of Mobile SecurityRevenue, means the sales value of Mobile SecurityThis report studies sales (consumption) of Mobile Security in Europe market, especially in Germany, UK, France,

USD 3900View Report

Security Analytics Market - Mobile Security Analytics Outlook (2016-20)

The Security Analytics Market - Mobile Security Analytics report covers a detailed analysis of Security Analytics Market - Mobile Security Analytics size, present & future trends,

USD 2500View Report

Enterprise Mobile Security Market - Cloud Outlook (2016-20)

With the introduction of Mobile Enterprise Application Platform (MEAP) and implementation of programs like Bring Your Own Device (BYOD) and COPE (Corporate-Owned Personally-Enabled), enterprises are shifting their focus on making

USD 2500View Report

Fill The Form For Sample Request
Name*
Email*
Mobile No.*
LandLine No.
If you want to purchase particular section from this report then kindly contact us at contact@aarkstore.com.

Delivery Details

PDF FORMAT REPORTS will be delivered by email within 12 to 24 hours after placing the order (Mon-Fri IST)

CHOOSE FORMAT

  • PDF    $ 3450
$ 3450

Reports Details

Published Date : May 2016
Country :Global
Category :Telecommunications
Publisher :IDATE creates the DigiWorld Institute
Report Delivery By :Email
Report Delivery Time :12 to 24 hours after placing the order.

Customized Research

If you do not find this specific report suitable to your exact needs then you can also opt for customized research report that will befit all your expectation. To specify your requirements CLICK HERE

 

We Accept

payment