Mobile Security | BYOD, mCommerce, Consumer & Enterprise 2013-2018 | Research | Statistics | Market research
RSS
Translate this page

Google translations are offered as a guide only and should not be relied upon to make a purchasing decision.

All published materials from Juniper Research are available in English only.

Skip to content

Mobile Security

Mobile Security

BYOD, mCommerce, Consumer & Enterprise 2013-2018

Publisher: Juniper Research
Date Published: 08/10/2013
Category: Networks & Technologies
No of Pages: 135
Coverage: Global ~ 8 key regions
 

Overview

•    Industry Insights & Risks
•    New Country Level Forecasts
•    Free & Paid-for Security Adoption
•    Enterprise & Consumer Segment Analysis

Key Features of the Report
This exciting 3rd edition provides the most detailed view of the mobile security opportunity to date.  It delivers an extensive examination of the mobile security marketplace, sizing the opportunity for tablets, smartphones and feature phones for the next five years. The report provides an exhaustive analysis of the key acute security threats and risks, outlining the clear opportunity towards the creation of a new revenue stream. Customers can also purchase an Interactive Forecast Excel with detailed country level break downs and additional forecasts.

Over 40 Pages of Extensive Forecasts: Juniper's unique and updated forecast suite includes mobile security product sales revenues by device type (Tablet, Smartphone and Featurephone), as well as by ownership (Enterprise or Consumer). It also includes the number of protected vs non-protected devices, again split by device, ownership and region. For the first time, adoption forecasts for the consumer segment is based on the paid-for and free models.

Other key forecast sections include:
•    Consumer and Enterprise owned mobile devices
•    ‘Bring Your Own Device’ Forecasts
•    Mobile Handsets used for Commerce Authentication

BYOD & mCommerce Security Landscape: The new report investigates the two key trends and issues that pose significant security questions: BYOD & mCommerce.
The report provides insights into what is driving the BYOD trend along with the security implications and challenges involved. It also includes a set of associated key forecasts, illustrating the impact and adoption of BYOD. The report highlights the need for mCommerce security with regards to the potential risks surrounding that service. It also provides forecasts for the number of mobile handsets used to authenticate a commerce transaction.

Mobile Security Strategies IFxl 2013-2018
This IFxl, with 75 Tables; 10 What-if-analyses; and nearly 7,000 Data Points, provides additional market data for security adoption for the following countries: US, Canada, France, Germany, UK and Spain. In addition to the number of enterprise and consumer device forecasts, security software adoption based on free and paid-for products are also provided.

Table of Contents

Executive Summary
1. Evolution of Mobile Malware and Insights

1.1 Introduction
1.2 Evolution of Mobile Malware
Figure 1.1: Evolution of Mobile Malware
1.3 How Fast are Mobile Malwares Growing?
Figure 1.2: Growth of PC Malware (m)
Figure 1.3: Growth Mobile Malware (000)
1.3.1 Which OS Platform was the Most Attacked?
Figure 1.4: Variants of Mobile Threats to Mobile OS
Figure 1.5: Family of Mobile Threats to Mobile OS
1.3.2 Type and Composition of Threats
Figure 1.6: Composition of Threats
1.4 Driving the Need for Mobile Security
Figure 1.7: Mobile Security Market Drivers
1.4.1 Increase of Adoption of Open Operating Systems
1.4.2 Increased Smartphone Penetration
Figure 1.8 & Table 1.1: Global Smartphone Installed Base (m) pa Split by 8 Key Regions 2013-2018
1.4.3 The Rise in mCommerce
1.4.4 Increased Data Usage and Availability of Apps
1.4.5 Increase in Device Sophistication
Table 1.2: Security Drivers, Consequences and Implications for Mobile Security
1.4.6 Consumer Awareness, Perception and Behaviour
Figure 1.9: Awareness of Mobile Security Product
1.5 Malware: Origins and Destinations
1.5.1 Which Industry?
Figure 1.10: Malware Attack by Industries
1.5.2 Malware Infection Rate Across the World
Figure 1.11: Mobile Malware Infection Rate across the World

2. What are the Risks?

2.1 Consumer Segment Risks
2.1.1 Lost/Stolen Handsets
2.1.2 Online threats
2.1.3 Mobile Back Doors
2.1.4 The Rise of the Fake App
Figure 2.1: Possible Exposed Data Types (%)
2.1.5 Social Networking
2.1.6 Financial Threats
Figure 2.2: PerkeSecuApp.A Disguised as Banking Apps
2.2 Enterprise Segment Risks
Figure 2.3: Risks Surrounding Mobile Threats

3. BYOD: Trends, Risks and Impact

3.1 What is BYOD?
3. 2 What is Driving the BYOD Trend?
Figure 3.1: Factors Driving BYOD Trends
3.2.1 Consumer Smartphone & Tablet Adoption
Figure 3.2 & Table 3.1: Number of Consumer Owned Smartphone & Tablet Forecast (m)  Split by 8 Key Regions 2013-2018
3.2.2 Change in Employee Attitude & User Experience
3.2.3 Change in Employer Attitude
Figure 3.3: Employer Attitudes to BYOD
3.2.4 Increased Productivity
3.2.5 Cost Management
3.3 Current State of BYOD
Figure 3.4: Adoption of BYOD in Business Segments in 2012
3. 4 The Impact of the BYOD Trend - Market Forecasts
Figure 3.5 & Table 3.2: Number of Consumer Owned Smartphones & Tablets in Business (m)  Split by 8 Key Regions 2013-2018
Figure 3.6 & Table 3.3: Protected Consumer Owned Smartphones & Tablets vs Number of Consumer Owned Smartphones & Tablets in the Business (m), 2013-2018
3.5 BYOD – Risks Landscape
3.5.1 Potential Security Risks
3.5.2 Employee Privacy Issue
3.5.3 Unsecure Wireless Networks
3.5.4 Device Management is Becoming Complex
3.5.5 Information Sprawling
3.6 BYOD – Ways to Mitigate Risks

4. mCommerce Security Landscape

4.1 The Need for mCommerce Security
Figure 4.1: Fake PayPal for Mobile (left) vs Legitimate Site (right)
4.2 Generic Mobile Security Solutions
4.2.1 Third Party Solutions
4.2.2 Mobile OS platforms
4.3 Specific mCommerce Security Measures
4.4 Future mCommerce Fraud Prevention Solutions
Table 4.1: Summary of Current and Future Solutions
4.5 NFC Security
4.6 Mobile as an Authentication Device in Mobile Payments & Banking
4.6.1 Multi-factor Authentication
Figure 4.2: Single-Factor & Two-Factor Authentication
Figure 4.3: Mobile Token Devices - OTP
Figure 4.4: Phone Verification – 2FA (Two Factor Authentication)
4.6.2 Mobile Device Authentication Forecast
Figure 4.5 & Table 4.2: Mobile Channels as Commerce Authentication Mechanisms (%) Split by 8 Key Regions 2013-2018
Figure 4.6 & Table 4.3: Number of Mobile Handsets used for Commerce Authentication Mechanisms (m) Split by 8 Key Regions 2013-2018

5. Business Opportunity & Forecast Summary

5.1 How Big is the Current Market?
Figure 5.1 & Table 5.1: Market Revenue from Total Mobile Security Product Sales ($m) Split by Enterprise and Consumer Segment 2013-2018
Figure 5.2 & Table 5.2: Mobile Security Revenue Contribution (%) Split by 8 Key Regions 2013-2018
5.2 Assumptions and Methodology
Figure 5.3 Mobile Device Security Forecast Methodology
5.3 Mobile Security Forecast Summary
5.3.1 Number of Mobile Devices: Smartphones, Tablets & Featurephones
Figure 5.4 & Table 5.3: Total Number of Smartphones, Tablets & Featurephones (m)  Split by 8 Key Regions 2013-2018
5.3.2 Number of Protected Mobile Devices
Figure 5.5 & Table 5.4: Total Number of Protected Mobile Devices (m) Split by 8 Key Regions 2013-2018
Figure 5.6 & Table 5.5: Number of Protected Devices as a Percentage of Total Mobile Devices (%)  Split by 8 Key Regions 2013-2018
Figure 5.7 & Table 5.6: Total Number of Protected Mobile Devices (m) Split by Tablets, Smartphones & Featurephones 2013-2018
Figure 5.8 & Table 5.7: Total Number of Protected Mobile Devices (m) Split by Segment (Consumer/Enterprise) 2013-2018
5.3.3 Total Mobile Security Product Sales Revenue
Figure 5.9 & Table 5.8: Total Mobile Security Product Sales Revenue Forecast ($m) Split by 8 Key Regions 2013-2018
Figure 5.10 & Table 5.9: Total Mobile Security Product Sales Revenue Forecast ($m) Split by Segment 2013-2018
Figure 5.11 & Table 5.10: Total Mobile Security Product Sales Revenue Forecast ($m) Split by Tablets, Smartphones & Featurephones 2013-2018

6. The Enterprise Market

6.1 Number of Enterprise Mobile Devices
Figure 6.1 & Table 6.1: Total Number of Enterprise Mobile Devices (m) Split by 8 Key Regions 2013-2018
6.2 Enterprise Smartphone Security
6.2.1 Number of Enterprise Smartphones
Figure 6.2 & Table 6.2: Total Number of Enterprise Smartphones (m) Split by 8 Key Regions 2013-2018
6.2.2 Number of Protected Enterprise Smartphones
Figure 6.3 & Table 6.3: Protected Enterprise Smartphones (%) Split by 8 Key Regions 2013-2018
Figure 6.4 & Table 6.4: Protected Enterprise Smartphones (m) Split by 8 Key Regions 2013-2018
6.3 Enterprise Tablet Security
6.3.1 Number of Enterprise Tablets
Figure 6.5 & Table 6.5: Total Number of Enterprise Tablets (m) Split by 8 Key Regions 2013-2018
6.3.2 Number of Protected Enterprise Tablets
Figure 6.6 & Table 6.6: Protected Enterprise Tablets (%) Split by 8 Key Regions 2013-2018
Figure 6.7 & Table 6.7: Protected Enterprise Tablets (m) Split by 8 Key Regions 2013-2018
6.4 Enterprise Featurephone Security
6.4.1 Number of Enterprise Featurephones
Figure 6.8 & Table 6.8: Total Number of Enterprise Featurephones (m) Split by 8 Key Regions 2013-2018
6.4.2 Number of Protected Enterprise Featurephones
Figure 6.9 & Table 6.9: Protected Enterprise Featurephones (%) Split by 8 Key Regions 2013-2018
Figure 6.10 & Table 6.10: Protected Enterprise Featurephones (m) Split by 8 Key Regions 2013-2018
6.5 Total Protected Enterprise Mobile Devices
Figure 6.11 & Table 6.11: Total Protected Enterprise Mobile Devices (m) Split by 8 Key Regions 2013-2018
Figure 6.12 & Table 6.12: Total Protected Enterprise Mobile Devices as a Percentage of Enterprise Mobile Devices (%) Split by 8 Key Regions 2013-2018
6.6 Enterprise Mobile Security Product Revenue
6.6.1 Enterprise Mobile Security Product Pricing
Figure 6.13 & Table 6.13: Enterprise Mobile Security Product Pricing ($) Split by 8 Key Regions 2013-2018
6.6.2 Enterprise Mobile Security Product Sales Revenue
Figure 6.14 & Table 6.14: Total Enterprise Mobile Security Product Sales Revenue Forecast ($m) Split by 8 Key Regions 2013-2018
6.6.3 Enterprise Mobile Security Product Sales Revenue Split By Devices
Figure 6.15 & Table 6.15: Total Enterprise Mobile Security Product Sales Revenue Forecast ($m) Split by Tablets, Smartphones & Featurephones 2013-2018

7. The Consumer Market

7.1 Number of Consumer Mobile Devices
Figure 7.1 & Table 7.1: Total Number of Consumer Mobile Devices (m) Split by 8 Key Regions 2013-2018
7.2 Consumer Smartphone Security
7.2.1 Number of Consumer Smartphones
Figure 7.2 & Table 7.2: Total Number of Consumer Smartphones (m) Split by 8 Key Regions 2013-2018
7.2.2 Number of Protected Consumer Smartphones
Figure 7.3 & Table 7.3: Protected Consumer Smartphones (%) Split by 8 Key Regions 2013-2018
Figure 7.4 & Table 7.4: Protected Consumer Smartphones (m) Split by 8 Key Regions 2013-2018
7.3 Consumer Tablet Security
7.3.1 Number of Consumer Tablets
Figure 7.5 & Table 7.5: Total Number of Consumer Tablets (m) Split by 8 Key Regions 2013-2018
7.3.2 Number of Protected Consumer Tablets
Figure 7.6 & Table 7.6: Protected Consumer Tablets (%) Split by 8 Key Regions 2013-2018
Figure 7.7 & Table 7.7: Protected Consumer Tablets (m) Split by 8 Key Regions 2013-2018
7.4 Consumer Featurephone Security
7.4.1 Number of Consumer Featurephones
Figure 7.8 & Table 7.8: Total Number of Consumer Featurephones (m) Split by 8 Key Regions 2013-2018
7.4.2 Number of Protected Consumer Featurephones
Figure 7.9 & Table 7.9: Protected Consumer Feature phone (%) Split by 8 Key Regions 2013-2018
Figure 7.10 & Table 7.10: Protected Consumer Featurephones (m) Split by 8 Key Regions 2013-2018
7.5 Total Protected Consumer Mobile Devices
Figure 7.11 & Table 7.11: Total Protected Consumer Mobile Devices (m) Split by 8 Key Regions 2013-2018
7.6 Consumer Mobile Security Product Sales Revenue
7.6.1 Consumer Mobile Security Product Pricing
Figure 7.12 & Table 7.12: Consumer Mobile Security Product Pricing ($) Split by 8 Key Regions 2013-2018
7.6.2 Consumer Mobile Security Product Sales Revenue
Figure 7.13 & Table 7.13: Total Consumer Mobile Security Product Sales Revenue Forecast ($m)  Split by 8 Key Regions 2013-2018
7.6.3 Consumer Mobile Security Product Sales Revenue Split By Devices
Figure 7.14 & Table 7.14: Total Consumer Mobile Security Product Sales Revenue Forecast ($m) Split by Tablets, Smartphones & Featurephones 2013-2018

8. Vendor Profiles

8.1 Vendor Analysis
8.1.1 Vendor Assessment Criteria
Table 8.1: Vendor Capability Assessment Factors
8.1.2 Limitations and Interpretation
8.2 Vendor Positioning Matrix
8.2.1 Overall Matrix Position
Figure 8.1: Global Mobile Security Vendor Positioning Matrix
8.2.2 Vendor Groupings
i. Summary
ii. On Track Vendors
iii. Vendors Exceeding Expectations
iv. Vendors with Further Potential
8.2.3 Competitive Dynamics
8.3 AVG
8.4 BullGuard
8.5 ESET
8.6 F-Secure
8.7 Juniper Networks
8.8 Kaspersky Lab
8.9 Lookout
8.10 McAfee
8.11 Sophos
8.12 Symantec
8.13 Trend Micro
8.14 Trusteer

9. Types of Mobile Threats

9.1 Types of Mobile Threats
Figure 9.1: Types of Mobile Security Threats
9.2 Composition of Types of Mobile Threats
9.3 Physical Mobile Threats
9.3.1 Device Loss/Theft
9.4 Web-based Mobile Threats
9.4.1 Malware and Viruses
i. Mobile Trojans
a. Back door Trojan
b. Trojan-SMS
c. Trojan-Banker
Figure 9.2: How Zeus works?
d. Other Trojans:
ii. Mobile Rootkit and Exploit Tools
iii. Worms
a. Worm:SymbOS/Corrior.B
b. iPhoneOS/Ikee.B
c. S.Megoro.gen(drs)
9.4.2 Phishing Scams
Figure 9.4: Mobile Phishing Attack Illustration
Figure 9.5: Top Targeted Websites by Mobile Phishing
9.4.3 Spyware
Figure 9.6: Mobile Spy-Software App
9.5 Other Threats
9.5.1 Spoofing
9.5.2 Spam
Figure 9.7: An Example of a Spam Text Message
9.5.3 Denial of Service Attack

Companies Referenced

Interviewed:  Kaspersky Lab, Lookout, McAfee, Sophos, Symantec, Trusteer.

Profiled: AVG (Anti-Virus Guard), BullGuard Ltd, ESET, F-secure, Juniper Networks, Kaspersky Lab, Lookout, McAfee, Sophos, Symantec, Trusteer.

Mentioned: 7iber, Adobe, Aepona, Alcatel-Lucent, Alt-N, Amazon, Apple, AT&T, AV-Test, BlackBerry, Blue Coat, Bluebox Security, BMW AG, Check Point, Cisco, Consumer Electronics Show, Daimler AG, Deutsche Telekom, Dialogs, D-Link, DroidSecurity, ENISA (European Network and Information Security Agency), Facebook, FFIEC (Federal Financial Institutions Examination Council), Flurry, Georgia Tech University, GFI, Google, GovLoop, Gwava, IBM, Intel, ITU (International Telecommunications Union), Kingston Digital, Lenovo, LinkedIn, Livewire Mobile Inc, Metropolitan Police, Microsoft, MoD (UK Ministry of Defence), NASDAQ, NatWest, Netgear, NFC Forum, Norton, NYSE (New York Stock Exchange), O+K, OMX Helsinki Ltd (Helsinki Stock Exchange), Orange, Parallels, PayPal, PhoneFactor, Ponemone Institute, Qualcomm Technologies Inc, RBI (Reserve Bank of India), RIM, RSA, Safely, Samsung Electronics, Siemens AG, SMobile Systems, SonicWALL, Sprint, Telefónica, Telstra, ThyssenKrupp, T-Mobile, Toshiba, Trend Micro, TrendLabsSM, Twitter, US FTC (Federal Trade Commission), VeriSign, Verizon Wireless, Vodafone, Wind River Software Group, ZyXel

Extra Info

‡ 8 key regions includes:

North America, Latin America, Western Europe, Central & Eastern Europe, Far East & China, Indian Subcontinent, Rest of Asia Pacific and Africa & Middle East

Prices

Single User

Single User License (PDF) £1750
Included:  
Email support - analyst time inc
Additional Products:  
30 minutes - analyst time £100
Mobile Security IFxl 2013 £500
Total: £1750.00
$ 2805.00 *
2302.00 *

Enquire before buy?

Terms & Conditions

Multi User

Multi User Network License (PDF) £2500
Included:  
30 minutes - analyst time inc
Additional Products:  
30 minutes - analyst time £100
Mobile Security IFxl 2013 £250
Total: £2500.00
$ 4007.00 *
3288.00 *

Enquire before buy?

Terms & Conditions

Enterprise Wide

Enterprise Wide License (PDF) £3750
Included:  
45 minutes - analyst time inc
Mobile Security IFxl 2013-2018 inc
Additional Products:  
45 minutes - analyst time £150
Mobile Security IFxl 2013 £0
Total: £3750.00
$ 6010.00 *
4931.00 *

Enquire before buy?

Terms & Conditions

Login

Search In Report

You can now search within each of our reports to find out whether a specific keyword is mentioned in the report.

Simply type a keyword or key phrase into the search field above and click 'GO'.

Key Questions


•    How many mobile devices will have security products installed in them by 2018?
•    How is the mobile security market developing among enterprise users and consumers?
•    What business opportunity does this market offer for the vendors?
•    What will drive the demand for third party security applications among enterprise and consumers?
•    How is the adoption of paid-for and free consumer mobile security products?
•    What is driving the BYOD trend and what are its security implications?
•    What is the adoption of mobile devices in mCommerce authentication?
•    How has the mobile device threat landscape changed over the last year? How is the vendor preparedness?

Any Questions about this report please contact us.

 

Related Reports:

Mobile Security IFxl 2013-2018

Related Categories: There are no related categories for this report.

* Euro and US$ prices are for guidance only. The exact price charged will depend upon your bank exchange rate (to the £) prevailing on the day of order processing.