Top 20 Mobile Security (mSecurity) Companies 2014 Report
Top 20 Mobile Security (mSecurity) Companies 2014 Leaders in Software as a Service (SaaS), Mobile Device Management (MDM) & Bring Your Own Device (BYOD) Security Publication date: 27 May 2014 Number of Pages: 139 ------------------------------------------------------------ |
Mobile devices have become an intrinsic part of everyday life, for individual consumers and large organisations alike. Consequently, the popularity of smart devices is an increasingly attractive target for cybercriminals with regards the potential value of personal data found on a device. The increasing demand for mobile security software is seeing the emergence of security specialists offering solutions aimed at mobile as well as PC. Established market players in internet security are adapting their services to mobile, while a number of new companies are specialising specifically in smartphone and tablet security. Solutions including software, device management and security as a service are looking to answer this nascent security demand. The complex nature of the mobile ecosystem and the close affinity to the broader cybersecurity market has made the mobile security sector a relatively fragmented market, with overlaps between the different submarkets. As a result, visiongain has determined that the top 20 companies in the global mobile security market account for $2.06 billion, or 58.9% of annual market revenue which illustrates a highly competitive and fragmented market. Why you should buy Top 20 Mobile Security (mSecurity) Companies 2014: Leaders in Software as a Service (SaaS), Mobile Device Management (MDM) & Bring Your Own Device (BYOD) Security Who are the leading players in the mobile security market? Visiongain's comprehensive analysis contains highly quantitative content delivering solid conclusions benefiting your analysis and illustrates new opportunities and potential reve nue streams helping you to remain competitive. This definitive report will benefit your decision making and help to direct your future business strategy. Avoid falling behind your competitors, missing critical business opportunities or losing industry influence. The report assesses technologies, competitive forces and expected product pipeline developments. Discover Information found nowhere else in this independent assessment of the mobile security market competitive landscape The Top 20 Mobile Security (mSecurity) Companies 2014: Leaders in Software as a Service (SaaS), Mobile Device Management (MDM) & Bring Your Own Device (BYOD) Security report provides impartial analysis of the competitive landscape in the mobile security arena. With the independent business intelligence found only in our work, you will discover where the prospects are for profit. In particular, our new research provides you with key strategic advantages: Our informed market shares, indepen dent and objective analysis, exclusive interviews and revealing company profiles will provide you with that necessary edge, allowing you to gain ground over your competitors. With this report you are less likely to fall behind in knowledge or miss crucial business opportunities. You will save time and receive recognition for your market insight. See how you this report could benefit and enhance your research, analysis, company presentations and ultimately your individual business decisions and your company's prospects. What makes this report unique? Visiongain consulted widely with leading industry experts and full transcripts from these exclusive interviews with AVG, Bullguard and with Kaspersky are included in the report. Visiongain's research methodology involves an exclusive blend of primary and secondary sources providing informed analysis. This methodology allows insight into the key drivers and restraints behind market dynamics and competitive developm ents. The report therefore presents an ideal balance of qualitative analysis combined with extensive quantitative data including global markets forecasts from 2013-2024. Why choose visiongain business intelligence? Visiongain's increasingly diverse sector coverage strengthens our research portfolio. The growing cross-sector convergence of key verticals and the interplay of game changing technologies across hitherto unrelated industries are creating new synergies, resulting in new business opportunities for you to leverage. ------------------------------------------------------------ |
Table of Contents 1. Report Overview 1.1 Current Mobile Security Market Overview 1.2 Mobile Malware Attacks on the Rise 1.3 Mobile Security Ecosystem 1.4 How This Report Delivers 1.5 Who is This Report For? 1.6 Methodology 1.7 Other Visiongain Reports Published in 2014 1.8 About Visiongain 2. Introduction to the Mobile Security Market 2.1 The Mobile Security Market Growing Rapidly 2.2 Mobile Security Market Definition 2.2.1 Device Security 2.2.2 Data Security 2.2.3 Network Security 2.2.4 Mobile Security Tools 2.3 Proliferation of Mobile Devices Leading to Rise in Security Threats 2.3.1 Mobile Malware Evolution 2.3.2 Trojans 2.3.3 Worms 2.3.4 Spyware 2.3.5 Spam 2.4 Mobile Threats Affect All Platforms 3. The Global Mobile Security Market 3.1 Mobile Security - A Major Concern for Consumers Worldwide 3.2 Extensive Growth in Mobile Security Market from 2013-2024 4. Top 20 M obile Security (mSecurity) Companies Market Share 4.1 Top 20 Mobile Security (mSecurity) Companies 2013 4.2 Analysis of Mobile Security Vendors 5. Leading 20 Mobile Security Companies 5.1 AirWatch 5.1.1 Awards and Accolades 5.1.2 AirWatch Mobile Security Solution 5.2 Apple 5.2.1 Apple's Best Practices for Mobile Security 5.3 AVG 5.3.1 AVG Mobile Security Applications 5.3.2 AVG Retains Position of #1 Downloaded Security App 5.3.3 MTN Delivers AVG Mobile Security to South African Subscribers 5.4 BullGuard 5.4.1 BullGuard Mobile Security 5.5 ESET 5.5.1 ESET Mobile Security Solutions 5.6 Fiberlink, an IBM Company 5.6.1 MaaS360 5.7 Fixmo 5.7.1 Fixmo Enterprise Mobility Platform (Fixmo EMP) 5.7.1.1 Fixmo Sentinel 5.7.1.2 Fixmo SafeZone 5.7.2 Fixmo Announces Expanded Collaboration with Samsung 5.7.3 Fixmo to Provide Mobile Security to U.S. Department of Defense 5.8 F-Secure 5.8.1 F-Secure's Mobile Security Solutions 5.8.2 Majority Mobile threats are Targeted at Android 5.9 Good Technology 5.9.1 Good Dynamics Secure Mobility Platform 5.9.1.1 Mobile App Containerization 5.9.1.2 Mobile App Management (MAM) 5.9.1.3 Mobile Service Management and Mobile Device Management 5.10 Google 5.10.1 The Next Phase of Android Security 5.11 Kaspersky Lab 5.11.1 Kaspersky Internet Security for Android 5.11.2 Kaspersky Internet Security Multi-Device 5.11.3 Kaspersky Lab Anticipates Double-Digit Growth in 2014 5.12 Lookout 5.13 McAfee, An Intel Company 5.13.1 McAfee Mobile Security Solutions 5.13.2 McAfee Labs Threats Report Findings 5.14 MobileIron 5.14.1 MobileIron Mobile IT Platform 5.15 NQ Mobile 5.15.1 NQ Mobile Security Products 5.16 Samsung Electronics 5.16.1 Samsung KNOX Workspace 5.16.2 Samsung Teams up with Zscaler and Citrix 5.17 SAP 5.17.1 SAP Mobile Secure 5.17.2 SAP and Samsung Expand Partnership 5.18 Sophos 5.18.1 Sophos Product Portfolio 5.18.2 Sophos Sees Explosive Growth for Mobile Device Management 5.19 Symantec 5.19.1 Symantec Mobile Security 5.19.2 Symantec Showcasing New Security Solutions 5.20 Trend Micro 5.20.1 Trend Micro Smart Protection Network 5.20.2 Trend Micro Mobile Security Solution 5.21 Other Leading Companies in the Mobile Security Arena 5.21.1 Mformation 5.21.2 Microsoft 5.21.3 Mobile Active Defense 5.21.4 Motorola 5.21.5 Orange 5.21.6 BlackBerry 5.21.7 Telefonica 5.21.8 Echoworx 5.21.9 DeviceLock Inc. 5.21.10 DataViz 5.22 Additional Players in the mSecurity Market 6. SWOT Analysis of the Mobile Security Market 7. Expert Opinion 7.1 Visiongain Interview with AVG Technologies 7.1.1 AVG Company Background and Mobile Security Products 7.1.2 Proliferation of Connected Devices Will Drive the Adoption of Mobile Security 7.1.3 Internet of Things is A Major Driver for the mSecurity Market 7.1.4 Key Trends in the Mobile Security Market 7.1.5 Apple's iOS is More Secure than Google's Android 7.2 Visiongain Interview with Kaspersky Lab 7.2.1 Kaspersky Company Background 7.2.2 Mobile Apps and BYOD Driving the Need for Mobile Security 7.2.3 Cybercriminals Increasingly Targeting Android Operating Systems 7.2.4 Mobile Banking Trojans to Grow Significantly in the Coming Years 7.2.5 BYOD Becoming a Popular Trend for Most Businesses 7.2.6 Consumers/Enterprises Becoming More Aware about Internet Security 7.3 Visiongain Interview with Bullguard 7.3.1 Bullguard Company Background and Mobile Security Products 7.3.2 Security Vendors Must be Ready to Tackle Increasing Malware Attacks 7.3.3 Lack of Awareness Regarding mSecurity Will be an Inhibitor 7.3.4 Mobile Device Management & BYOD Gaining Popularity 7.3.5 Antivirus will be Mandatory on all Mobile OS 7.3.6 Mobile Security to Surpass the PC Security Market in the Future 7.3.7 Security and Privacy Issues Should be Given Utmost Priority 8. Conclusion 8.1 Mobile Threats on the Rise 8.2 Market Share & Outlook for the Top 20 Mobile Security Companies 9. Glossary ------------------------------------------------------------ |
List of Tables Table 2.1 Mobile Security Tools Table 2.3 Selection of Mobile Malware Variants Table 2.4 Overview of Selected Mobile Trojans Table 2.6 FlexiSpy Features Table 3.1: Global Mobile Security (mSecurity) Market Forecast 2013-2024($bn, AGR %, CAGR %) Table 4.1 Top 20 Mobile S ecurity (mSecurity) Companies 2013 (Market Ranking, Mobile Security Revenues, Market Share %) Table 4.3 Visiongain Analysis of Leading Mobile Security Software Vendors (Compatibility, Installation Update & Operation, Ease of Use, Features, Effectiveness) Table 5.1 AirWatch Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, website) Table 5.3 AirWatch Mobile Security Features Table 5.4 Apple Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website) Table 5.6 AVG Company Overview (Mobile security revenues, market ranking, % market share, IR contact, HQ, ticker, website) Table 5.8 AVG Mobile Apps Table 5.9 BullGuard Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, website) Table 5.11 BullGuard Mobile Security Features Table 5.12 ESET Company Overview (Mobile security revenues, market ranking, % market share, contact, HQ, w ebsite) Table 5.14 ESET Mobile Security Solutions Table 5.15 Fiberlink, an IBM Company (Mobile security revenues, market ranking, % market share, PR contact, HQ, website) Table 5.17 Fiberlink Mobile Security Features Table 5.18 Fixmo Company Overview (Mobile security revenues, market ranking, % market share, media contact, HQ, website) Table 5.20 F-Secure Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website) Table 5.22 F-Secure Mobile Security Solutions Table 5.23 Good Technology Company Overview (Mobile security revenues, market ranking, % market share, media contact, HQ, website) Table 5.25 Google Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website) Table 5.27 Kaspersky Lab Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, website) Table 5.29 Lookout Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, website) Table 5.31 Lookout Mobile Security Product Overview Table 5.32 McAfee Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, ticker, website) Table 5.34 McAfee Enterprise Mobility Management (McAfee EMM) Table 5.35 MobileIron Company Overview (Mobile security revenues, market ranking, % market share, media contact, HQ, website) Table 5.37 Components of the Layered Security Model Table 5.38 NQ Mobile Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website) Table 5.40 Samsung Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website) Table 5.42 KNOX 2.0 Platform Features Table 5.43 SAP Company Overview (Mobile security revenues, market ranking, % market share, ticker, PR contact, HQ, website) Table 5.45 SAP Mobile Secure Features Table 5.46 Sophos Company Overview (M obile security revenues, market ranking, % market share, PR contact, HQ, website) Table 5.48 Sophos Security Product Overview Table 5.49 Symantec Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, ticker, website) Table 5.51 Trend Micro Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website) Table 5.53 How the Smart Protection Network works? Table 5.54 Trend Micro Mobile Security Features Table 5.55 Additional Players in the Mobile Security Ecosystem Table 6.1 SWOT Analysis of the Mobile Security Market 2014-2024 Table 8.1 Top 20 Companies in the Mobile Security Market 2013 (Market Ranking, Mobile Security Revenues, Market Share %) ------------------------------------------------------------ |
List of Figures Figure 1.1 Catalysts for Mobile Data & ID Theft Figure 1.2 Mobile Security Value Chain Figure 2.2 Mobile Security Tools by Category Figure 2.5 Infojack Worm Propagation Method Figure 3.2 Global Mobile Security (mSecurity) Market Forecast 2013-2024 ($ bn, AGR %) Figure 4.2 Top 20 Mobile Security (mSecurity) Companies 2013 (% share) Figure 5.2 AirWatch Mobile Security Market Share 2013 (%) Figure 5.5 Apple Mobile Security Market Share 2013 (%) Figure 5.7 AVG Mobile Security Market Share 2013 (%) Figure 5.10 Bullguard Mobile Security Market Share 2013 (%) Figure 5.13 ESET Mobile Security Market Share 2013 (%) Figure 5.16 Fiberlink Mobile Security Market Share 2013 (%) Figure 5.19 Fixmo Mobile Security Market Share 2013 ( %) Figure 5.21 F-Secure Mobile Security Market Share 2013 (%) Figure 5.24 Good Technology Mobile Security Market Share 2013 (%) Figure 5.26 Google Mobile Security Market Share 2013 (%) Figure 5.28 Kaspersky Mobile Security Market Share 2013 (%) Figure 5.30 Lookout Mobile Security Market Share 2013 (%) Figure 5.33 McAfee Mobile Security Market Share 2013 (%) Figure 5.36 MobileIron Mobile Security Market Share 2013 (%) Figure 5.39 NQ Mobile mSecurity Market Share 2013 (%) Figure 5.41 Samsung Mobile Security Market Share 2013 (%) Figure 5.44 SAP Mobile Security Market Share 2013 (%) Figure 5.47 Sophos Mobile Security Market Share 2013 (%) Figure 5.50 Symantec Mobile Security Market Share 2013 (%) Figure 5.52 Trend Micro Mobile Security Market Share 2013 (%) ------------------------------------------------------------ |
Companies Mentioned in this report Airwatch Airtel Adobe AT&T Alert Logic Accel Partners Apple AuthenTec Avast Avis AVG Security Andreessen Horowitz Blackberry Bell Mobility Baidu BullGuard Bump Technologies Inc. CDW Cisco Citrix Comcast Clearwire Digital Management Inc. DataViz DeviceLock Deloitte Deutsche Telekom Echoworx ENISA ESET ETSI Fiberlink Communications Fixmo Foundation Ford F-Secure Gemalto Greylock Partners Get Safe Online General Dynamics Good Technology Hewlett Packard (HP) HTC IBM InnoPath Software Intel Corporation Intel Security Index Ventures ISACA Juniper Networks Khosla Ventures Kaspersky Lab Kaspersky Lab North America Lookout Lockheed Martin McAfee Labs Mformation Microsoft Corporation Mithril Capital Management Mobile Active Defense (M.A.D.) MobileIron Mocana MTN Motorola Nokia Northrop Grumman NQ Mobile (NQ) Nukona OATH Odyssey Software Palm Panda Security Pixar Pointsec Qihoo360 Qualcomm Technologies Inc. RBI RIM (Research in Motion) Samsung Electronics SAP Salesforce.com Skype Sprint Secunia Sophos Sony Ericsson Symantec Corporation Telefonica Toshiba T-Mobile Trend Micro Tencent (TCEHY) Trust Digital Trusteer UMU Under Armour VeliQ VMware Verisign Verizon Wavelink Xerox Zscaler Government Agencies and Other Organizations Mentioned in This Report Federal Trade Commission (FTC) GSM Association (GSMA) International Telecommunication Union (ITU) Intelligence and National Security Alliance (INSA) MEF Global forum Mobile World Congress (MWC) National Telecommunications and Information Administration (NTIA) New York Stock Exchange (NYSE) NASDAQ Security Innovation Network (SINET) U.S. Department of Defense (DOD) U.S Defence Industry Security Association (DISA) World Economic Forum ------------------------------------------------------------ |
Pricing Single User License: Single user copies of this report are available for EUR1369/ USD1649/ GBP1099 Departmental License: Entitles up to 5 individual users to access this r eport for EUR3599/ USD4499/ GBP2999 (Not suitable for library usage) Site License: Allow your company to have access to this report at one location for EUR5999/ USD7499/ GBP4999 (Suitable for library storage and use) Global License: Have your whole company worldwide to access this information for EUR8399/ USD9999/ GBP6999 ------------------------------------------------------------ |
Ordering All you need to do to order this report is to contact Dorottya Szalai on: Telephone: +44(0)207 549 9964 o r email: dorottya.szalai@vgtelecomreports.com And provide the following information: Report Title: Report License (Single User/Departmental/Site/Global): Name: User Email: Job Title: Company: Invoice Address: Telephone and Fax number: EEC VAT Number (only for E.U.): Please contact me should you have any questions or wish to receive an executive summary of this report. I look forward to hearing from you. Best Regards, Dorottya Szalai Telecoms Industry Consultant |
Terms and Conditions By replying to this e-mail submitting your order for this product you have agreed without limitation or qualification to be bound by and to comply with these Terms and Conditions. You agree that you will not fail to complete any transaction after submitting an order to purchase a product or submit any order to purchase a product where you do not intend to complete the transaction. Management Reports will only be sent on receipt of payment. You are currently subscribed to this list as ali.ali-an@yandex.by . As a valued contact or customer, you are receiving this email with information that we believe will be relevant to you. If however, you wish to stop future messages, please reply to this email typing "REMOVE" in the subject box. Registered Office: BSG House, 230 City Road, London, EC1V 2QY, U.K. |
Отправить комментарий