Mobile Device Security 2011-2016: Opportunities and Challenges

Sep 26, 2011, 04:07 ET from Reportlinker

NEW YORK, Sept. 26, 2011 /PRNewswire/ -- Reportlinker.com announces that a new market research report is available in its catalogue:

Mobile Device Security 2011-2016: Opportunities and Challenges

http://www.reportlinker.com/p0629370/Mobile-Device-Security-2011-2016-Opportunities-and-Challenges.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=Security_Systems

Report Details

The Rise of Mobile Malware

2011 is witnessing an explosion of new threats targeting mobile devices. Data and ID theft, SMS fraud, rogue apps and covert espionage are infecting smartphones at an unprecedented rate. Malware such as Trojans, worms, spyware and spam are spreading across mobile platforms, already highly capable of stealing data, corrupting functions and usurping control. 

Visiongain research shows that the number of mobile malware more than doubled in 2011 from 2010 with over 200 new variants in the first half of 2011 alone, out of a total of 800 since 2003.

Securing the Mobile Ecosystem

Cybercriminals are actively exploiting the popularity of smartphones and tablets because of low user awareness of the risks, and lax security enforcement within organisations. This real and growing mobile threat is already a critical issue for the business segment and which CEOs must addressed now. 

By 2016, visiongain expects that almost every employee will have a smartphone that supports e-mail, can access the internet and install a variety of applications. Organisations have to learn to support complex and varied mobile operating systems and efficiently manage the security of all these platforms if they want to leverage the productivity benefits of smart devices.

A Growing Mobile Security Market

Security concerns are driving a fairly new market in mobile protection. The mobile security market is still in its infancy however. The fragmented nature of the mobile OS landscape has allowed for a number of varied companies to offer different mobile security solutions. Most of the leading IT software security specialists have expanded their suite of PC solutions to include mobile devices. 

In parallel, a number of smaller security experts specialising in mobile devices have appeared and their niche area of expertise have been on par with many established IT software security leaders. There is a small but fast-growing market specialising in mobile security which will gain momentum with the rapid adoption of smart devices and mobile internet in the face of a growing cybercriminal menace. Visiongain expects the mobile security market to reach $3.95 billion in global revenues by 2016.

What is Unique about this Report?

The mobile security market is fast growing because protecting mobile devices is rapidly becoming a top priority for both organisations. There are increasing opportunities for monetisation for vendors and security specialists. This report provides extensive insight into the rapidly developing world of mobile malware and the latest technological tools to counter mobile threats.

The report includes exclusive interviews with leading security experts from McAfee, AVG, Panda Security, Lookout, SmrtGuard, Mobile Security Labs, BullGuard, Telefónica and Vodafone, about the state of mobile malware and security.

The report details solutions by security software specialists, MNOs, OEMs, OTT providers and MDM vendors for mobile device and data protection for the individual, SMBs and large organisations. It offers recommendations on how to best counter threats and ensure maximum mobile protection. 

Don't miss out on a chance to anticipate the growing threat menace and efficiently protect endpoints in your organisation by buying Mobile Device Security 2011-2016 now. 

Who needs to read this report?

• SMBs & Large Organisations

• Chief Information Officers / Chief Technology Officers

• Security Software Specialists

• Original Equipment Manufacturers

• Mobile Network Operators

• Over The Top Service Providers

• Mobile Device Management Vendors

Visiongain is a trading partner with the US Federal Government

CCR Ref number: KD4R6 

Companies Listed

Apple

AVG

BitDefender

BullGuard

Check Point

CitiGroup

DataViz

DeviceLock

Enterprise Strategy Group

F-Secure

First Data

Google

Hewlett Packard

HTC

InnoPath

iPass

Kaspersky Labs

Lookout

MasterCard

McAfee

Mformation

Microsoft

MobileIron

Mobile Security Labs

News of the World

Nokia

O2

Orange

Panda Security

PayPal

Ponemon Institute

Retis Consulting

RIM

SANS Institute

SmrtGuard

Sophos

Sprint

Sybase

Symantec

T-Mobile

Telefónica 

Threatpost

Trend Micro

UMU

Unix

VeliQ

Verizon

Vodafone 

Table of Contents

Executive Summary

E.1 The Mobile Revolution

E.2 A New Ecosystem Breeds New Threats

E.3 Countering Mobile Threats

E.4 A Growing Mobile Security Market

E.5 Findings of the Report

Chapter 1: The Changing Security Landscape

1.1 A Technological Evolution

1.2 The Growth of Mobile Devices

1.3 The Rise of the Mobile Worker

1.4 Paradigm Shift in Enterprise

1.5 The Advance of Mobile Malware

1.6 Adapting Security to a New Environment

1.7 The Aim & Scope of the Report

1.8 Questions Answered by the Report

1.9 Structure of the Report

1.10 Methodology

Chapter 2: Security Concerns in the Mobile Ecosystem

2.1 The Cost of Data Breach

2.2 Unauthorised Access and Collection of Data

2.2.1 Targeting Location Based Data

2.2.2 Access through Web Apps

2.3 Poor End-User Awareness

2.4 Enterprise Trends in Mobile Security

2.5 The Digital Black Market 

2.6 Cybercrime Targeting Finance Intensive Industries

2.6.1 Financial Institutions

2.6.2 Industrial & Political Espionage

2.6.3 Mobile Payments

2.6.3.1 SMS/USSD Based Transactional Payments

2.6.3.2 Direct Mobile Billing

2.6.3.3 WAP Payments

2.6.3.4 Contactless NFC

2.6.3.5 Securing Mobile Payments

2.7 Are Convergence & Interoperability Risk Factors?

2.8 Open-Source: A Double Edged Sword? 

2.9 Current Awareness: The UK Phone Hacking Scandal

Chapter 3: Mobile Malware: A threat to Mainstream Industries

3.1 Mobile Malware Evolution 

3.1.1 Trojans

3.1.2 Worms

3.1.3 Spyware

3.1.4 Spam

3.2 The Mobile Threat Expansion by Platform 

3.2.1 Android

3.2.2 Symbian

3.2.3 iOS

3.2.4 BlackBerry

3.2.5 Windows Mobile

3.3 What are the Malware Vectors for Mobile?

3.3.1 SMS & MMS

3.3.2 Wi-Fi & Bluetooth

3.3.3 Apps & Downloads

3.3.4 SD & Multimedia Cards

3.4 Digital Fraud through Social Engineering

Chapter 4: An Emerging Market for Mobile Security Services

4.1 Limiting the Spread of Mobile Malware

4.1.1 Device Security

4.1.2 Data Security

4.1.3 Network Security

4.2 Encryption & Certificates

4.2.1 Code Signing Certificates

4.2.2 Two-Factor Authentication

4.3 Anti-Virus Software 

4.4 Firewalls & Filtering

4.5 Mobile VPN

4.6 Mobile Device Management

4.7 Identity Management

4.8 Biometrics

4.9 Drivers for a Specialised Mobile Security Market

4.9.1 Enterprise Security

4.9.2 Protecting Data & User ID

4.10 Mobile Security Markets Forecast 

4.10.1 Asian, Latin American, African & Middle Eastern Markets

4.10.2 Developed Markets

4.10.3 Mobile Security Software Market by Users

4.11 Mobile Client Software Market

4.12 Mobile Device Management in Enterprise

4.13 Security as a Service

4.14 Global Network Security Market

Chapter 5: Shaping the Mobile Security Landscape

5.1 How are OEMs & OTT Providers Addressing Mobile Security Issues?

5.1.1 RIM BlackBerry OS

5.1.1.1 BlackBerry Enterprise Solution

5.1.1.2 BlackBerry Mobile Data System Services

5.1.1.3 BlackBerry Internet Service

5.1.2 Microsoft Windows Phone

5.1.2.1 Sandbox

5.1.2.2 Application Deployment

5.1.2.3 Application Development

5.1.2.4 Microsoft Exchange ActiveSync (EAS) Security-Related Policies

5.1.2.5 Data Protection Considerations

5.1.2.6 Nokia 

5.1.3 Apple iOS

5.1.4 Hewlett Packard (HP) WebOS

5.1.5 Google Android

5.1.6 Analysis of Mobile OS Based on Security Features

5.2 The Role of Network Operators 

5.2.1 Telefónica

5.2.1.1 Expert Opinion

5.2.2 Vodafone

5.2.3 Orange 

5.3 Security Software Specialists

5.3.1 Symantec

5.3.2 Trend Micro

5.3.3 McAfee

5.3.3.1 Expert Opinion

5.3.4 Kaspersky Labs

5.3.5 AVG Expert Opinion

5.3.5.1 Mobile Threats

5.3.5.2 The Evolution of Mobile Malware

5.3.5.3 How Dangerous is the Open-Source Model?

5.3.5.4 Future Developments in Mobile Malware

5.3.5.5 AVG Product Overview

5.3.6 Sophos

5.3.7 Panda Security Expert Opinion

5.3.7.1 Mobile Threats

5.3.7.2 The Evolution of Mobile Malware

5.3.7.3 How Dangerous is the Open-Source Model?

5.3.7.4 Future Developments in Mobile Malware

5.3.7.5 Panda Security Product Overview

5.3.8 BullGuard Expert Opinion

5.3.8.1 Mobile Threats

5.3.8.2 The Evolution of Mobile Malware

5.3.8.3 How Dangerous is the Open-Source Model?

5.3.8.4 Future Developments in Mobile Malware

5.3.8.5 BullGuard Product Overview

5.3.9 F-Secure

5.3.10 Other Vendors

5.4 Mobile Security Specialists

5.4.1 SmrtGuard

5.4.1.1 Expert Opinion

5.4.2 Lookout

5.4.2.1 Expert Opinion

5.4.3 Mobile Security Labs

5.4.3.1 Mobile Threats

5.4.3.2 The Evolution of Mobile Malware

5.4.3.3 How Dangerous is the Open-Source Model?

5.4.3.4 Future Developments in Mobile Malware

5.4.4 MobileIron

5.4.5 DeviceLock

5.4.6 UMU

5.4.7 MobiDM

5.4.8 DataViz

5.4.9 Mformation

5.4.10 InnoPath

5.4.11 Sybase

5.5 Analysis of Mobile Security Vendors

5.6 Analysis of Mobile Security Market

5.7 The Market for Mobile MDM Vendors

Chapter 6: Conclusion

6.1 Emerging Specialised Markets

6.2 Mitigating Mobile Security Risks

6.3 Deploying Mobile Security Solutions

6.4 Educating End-Users

6.5 Enterprise Policy & Device Management

6.6 Anticipating Future Threats

6.7 Recommendations for Businesses

6.8 Key Findings of the Report

Appendix A

About visiongain

Appendix B

Visiongain Report Evaluation Form

List of Tables, Charts and Figures in this Report

Table 1.1 Supported Formats & Capabilities of Smartphones and Tablets in 2011

Table 1.2 Key Findings of the iPass Mobile Workforce Survey April 2011

Table 2.1 Data Protection Legislation 2011

Table 2.2 AVG & Ponemon Key Survey Findings on Mobile Malware

Table 2.3 Employee Use of Smartphones in Enterprises

Table 2.4 Overview of the News of the World Phone Hacking Scandal 2005 - 2011

Table 3.1 Selection of Mobile Malware Variants 2004 - 2010

Table 3.2 Overview of Selected Mobile Trojans in 2010 - 2011

Table 3.3 FlexiSpy Features

Table 3.4 Selection of Android Malware 2010 - 2011

Table 3.5 Selection of Symbian Malware

Table 3.6 Social Engineering on Mobile Devices

Table 4.1 Antivirus Software- Detection Methods

Table 4.2 Mobile Device Management Features

Table 4.3 Mobile Security Market CAGR for Emerging Economies 2011 - 2016

Table 4.4 Mobile Security Market CAGR for North America & Europe 2011 - 2016

Table 5.1 BlackBerry Key Description

Table 5.2 Windows Phone Security Chambers

Table 5.3 iPhone Security Overview

Table 5.4 Android Security Guidelines for Developers

Table 5.5 Visiongain Rating of OS Security Models

Table 5.6 Telefónica Managed Security Services Overview

Table 5.7 Vodafone Secure Remote Access Service

Table 5.8 Norton Mobile Security

Table 5.9 Trend Micro Mobile Security

Table 5.10 McAfee Mobile Security Solutions

Table 5.11 Sophos Mobile Solutions

Table 5.12 Check Point Mobile Security Solutions

Table 5.13 SmrtGuard Mobile Security Overview

Table 5.14 Mformation Security Service Manager

Table 5.15 InnoPath Solutions

Table 5.16 Visiongain Analysis of Mobile Security Software Vendors 2011

Table 6.1 SWOT Analysis of the Mobile Security Market

Table 6.2 Key Developments in the Mobile Security Market 2010 - 2011 

Table 6.3 Recommendations for Securing Mobile Devices

Chart 1.1 Global Smartphone, PC & Tablet Shipments 2005 - 2016

Chart 1.2 Global Mobile Broadband Subscriptions 2008 - 2016

Chart 1.3 Global Mobile vs. Total Workforce Forecast 2011 - 2016

Chart 1.4 Types of Mobile Devices Supported Within Organisations

Chart 1.5 Need for Integrated Management & Security Solutions: Survey Results in Enterprises

Chart 2.1 Global Apps Market Growth 2008 - 2011

Chart 2.2 Global Mobile App Market Size by Download 2011 - 2016 

Chart 2.3 Apple App Store & Android Market Apps Capable of Accessing Location & Contacts

Chart 2.4 Threatpost & Kaspersky Enterprise Mobile Security Survey

Chart 3.1 Recorded Mobile Threats 2004 - 2010

Chart 3.2 Global Market Share of Mobile App Stores 2011 - 2016

Chart 3.3 Total Malware by Platform 2011

Chart 3.4 Mobile OS Market Share 2011 & 2016

Chart 3.5 Symbian Malware Growth 2009 - 2010 

Chart 3.6 Global App Store Year-on-Year Growth 2010 - 2011

Chart 4.1 Global Mobile Security Market 2011 - 2016 

Chart 4.2 Global Mobile Security Market Share 2011 - 2016 

Chart 4.3 Mobile Security Market for Emerging Economies 2011 - 2016

Chart 4.4 Mobile Security Market for North America & Europe 2011 - 2016

Chart 4.5 Global Mobile Security Client Software Market 2011 - 2016

Chart 4.6 Global Enterprise MDM Revenues (Billions) 2010 & 2015

Chart 4.7 Enterprise MDM Market 2007 - 2015

Chart 4.8 Cloud-based Security Services Market Forecast 2011 - 2016

Chart 4.9 Global Network Security Market Forecast 2011 - 2016 

Chart 5.1 Global Anti-virus Vendor Market Share June 2011

Chart 5.2 Global MDM Vendor Market Share June 2011

Figure 2.1 Typical Offers Available on the Cybercrime Black Market

Figure 2.2 Catalysts for Mobile Data & ID Theft

Figure 2.3 Example of Smishing

Figure 2.4 Two Factor Authentication Security System for Mobile Payments

Figure 2.5 WAP Payments using PayPal Mobile Checkout

Figure 2.4 Google Wallet

Figure 3.1 Number of Mobile Malware Variants 2004 - 2010

Figure 3.2 ZeuS Infection Timeline for Mobile Devices

Figure 3.3 InfoJack Worm

Figure 3.4 Phone Promo Spam

Figure 3.5 Android Malware Growth Chart

Figure 3.6 SMS & MMS Exploits

Figure 3.7 Man in the Middle Attack

Figure 4.1 Mobile Security Categories

Figure 4.2 Code Signing Mobile Apps

Figure 4.3 Mobile Firewall

Figure 4.4 Mobile ID Management

Figure 5.1 BlackBerry Device Connection to Application Server

Figure 5.2 HP webOS Security Overview

Figure 5.3 Telefónica Managed Mobility Service

Figure 5.4 Kaspersky Mobile Security Features by Platform

Figure 5.5 Kaspersky Mobile Security

Figure 5.6 BullGuard Mobile Security Overview

Figure 5.7 F-Secure Mobile Security

Figure 5.8 BitDefender Mobile Security

Figure 5.9 Lookout Mobile Security Solutions

Figure 5.10 DeviceLock Endpoint DLP

Figure 5.11 UMU Mobile Security

Figure 5.12 Sybase Afaria Architecture 

To order this report:

Security Systems Industry: Mobile Device Security 2011-2016: Opportunities and Challenges

Security Systems Business News

More  Market Research Report

Check our  Industry Analysis and Insights

Nicolas Bombourg
Reportlinker
Email: nbo@reportlinker.com
US: (805)652-2626
Intl: +1 805-652-2626

SOURCE Reportlinker



RELATED LINKS

http://www.reportlinker.com