RSS
Translate this page

Google translations are offered as a guide only and should not be relied upon to make a purchasing decision.

All published materials from Juniper Research are available in English only.

Skip to content

Mobile Security Strategies

Mobile Security Strategies

Threats, Solutions & Market Forecasts 2012-2017

Publisher: Juniper Research
Date Published: 06/08/2012
Category: Networks & Technologies
No of Pages: 167
Coverage: Global ~ 8 Key Regions
 

Overview

• BYOD Trend Analysis & Forecast
• Mobile Device Authentication
• Enterprise vs. Consumer Analysis

The Report Covers:
Over 40 Pages of Extensive Forecasts: Juniper's unique forecast suite for the mobile security landscape includes mobile security product sales revenue by device type (Tablet, Smartphone and Featurephone) as well as by ownership (Enterprise or Consumer).  This extensive forecasting suite also includes the number of protected vs. non-protected devices, again split by device, ownership and region.

Other key forecasts include:

• Consumer and Enterprise owned mobile devices
• ‘Bring Your Own Device’ Forecasts
• Mobile Handsets used for Commerce Authentication Mechanisms

Readers will benefit from these five-year calculated projections and their qualified findings regarding the anticipated security adoption among mobile device users. This is vital as a combination of safe practice and modern software to counter increasing security threats is becoming more important by the day.

The BYOD Trend: Termed as both ‘Inevitable’ and as a ‘Security Nightmare’ by industry experts,  this report examines this conundrum in detail, providing insights into what is driving this trend along with the security implications and challenges involved.  Readers will additionally gain unparalleled knowledge of the need for device management along with a set of associated key forecasts, illustrating the impact and adoption of BYOD.

mCommerce Security: The rapid development in mCommerce means that mobile devices are more likely to attract a cyber-criminal’s attention. This new chapter studies both present and future security technologies, along with the use of mobile handsets as an authentication device in mobile payments & banking.

Additional Excel Data Suite – A unique excel product is also available from Juniper, including exclusive unpublished forecast tables in the report.

Table of Contents

Executive Summary
1. The Need for Security

1.1 Introduction 21
Figure 1.1: Need for Mobile Security 21
1.2 Security Parameters and Definitions 22
Table 1.1: Security Definitions 23
1.3 Security Issues & Trends 23
Figure 1.2: Keys to Secure Mobile Working by Palm 23
1.3.1 Storage of Confidential Information 24
Table 1.2: Confidential Information Classification Examples 24
1.3.2 Device Protection 24
1.3.3 Mobile Apps & Software Downloads 25
1.3.4 Device Loss or Theft 25
1.3.5 Always-On access and User Owned Devices 26
1.3.6 BYOD Trend 26
1.3.7 Recent Developments 26
1.4 Summary of Key Trends in Mobile Security 29
Table 1.3: Summary of Key Trends in Mobile Security 29

2. The mSecurity Landscape

2.1 Introduction 31
2.2 Market Drivers 32
Figure 2.1: Mobile Security Market Drivers 32
2.2.1 Adoption of Open Operating Systems is Increasing 32
2.2.2 Increased Smartphone Penetration 33
Figure 2.2: Global Smartphone Installed Base (m) p.a. Split by 8 Key Regions 2012-2016 33
Table 2.1: Global Smartphone Installed Base (m) p.a. Split by 8 Key Regions 2012-2016 33
2.2.3 The Rise in mCommerce 34
2.2.4 Increased Data Usage and Availability of Apps 34
2.2.5 Increase in Device Sophistication 34
Table 2.2: Security Drivers, Consequences and Implications for Mobile Security 35
2.3 Reduced Mobile Device Security Risk 35
2.4 Mobile Security Stakeholders & Opportunities 36
2.4.1 The Individual Subscriber 36
2.4.2 The Corporate Subscriber 36
2.4.3 Mobile Network Operators 37
Figure 2.3 Market Opportunities for Mobile Operators and Service Providers 37
2.4.4 Market Channels 38
Figure 2.4: Mobile Security Market Channels 39
2.5 The BYOD Trend 39
2.5.1 What is BYOD? 39
2.5.2 What is Driving the BYOD Trend? 40
Figure 2.5: Factors Driving BYOD Trends 41
Figure 2.6: Number of Consumer Owned Mobile Device Forecast (m) Split by 8 Key Regions 2012-2017 43
Table 2.3: Number of Consumer Owned Mobile Device Forecast (m) Split by 8 Key Regions 2012-2017 43
2.5.3 Security Implications 43
Figure 2.7: BYOD Management Needs 45
2.5.4 The Impact of BYOD Trend – Market Forecast 47
Figure 2.8: Number of Consumer Owned Smartphones & Tablets in the Enterprise (m), Split by 8 Key Regions 2012-2017 48
Table 2.4: Number of Consumer Owned Smartphones & Tablets in the Enterprise (m), Split by 8 Key Regions 2012-2017 49
Figure 2.9: Protected Consumer Owned Smartphones & Tablets vs. Number of Consumer Owned Smartphones & Tablets in the Enterprise (m), 2012-2017 49
Table 2.5: Protected Consumer Owned Smartphones & Tablets vs. Number of Consumer Owned Smartphones & Tablets in the Enterprise (m), 2012-2017 50

3. The mCommerce Security Landscape

3.1 The Need for Security 51
3.2 Generic Mobile Security Solutions 52
3.2.1 Third Party Solutions 52
3.2.2 Mobile operating system platforms 52
3.3 Specific Mobile Commerce Security Measures 53
3.4 Future Mobile Commerce Fraud Prevention Solutions 54
Table 3.1: Summary of Current and Future Solutions 55
3.5 NFC Security 55
3.6 Mobile as an Authentication Device in Mobile Payments & Banking 56
3.6.1 Multi-factor Authentication 56
Figure 3.1: Single-Factor & Two-Factor Authentication 57
Figure 3.2: Mobile Token Devices - OTP 57
Figure 3.3: Phone Verification – Two Factor Authentication 58
3.6.2 Mobile Device Authentication Forecast 58
Figure 3.4: Mobile Channels as Commerce Authentication Mechanisms (%), Split by 8 Key Regions 2012-2017 60
Table 3.2: Mobile Channels as Commerce Authentication Mechanisms (%), Split by 8 Key Regions 2012-2017 60
Figure 3.5: Number of Mobile Handsets used for Commerce Authentication Mechanisms (m), Split by 8 Key Regions 2012-2017 61
Table 3.3: Number of Mobile Handsets used for Commerce Authentication Mechanisms (m), Split by 8 Key Regions 2012-2017 61

4. Methodology & Forecast Summary

4.1 Assumptions and Methodology 63
Figure 4.1 Mobile Device Security Forecast Methodology 64
4.2 Mobile Security Forecast Summary 65
4.2.1 Number of Mobile Devices: Smartphones, Tablets & Featurephones 65
Figure 4.2: Total Number of Smartphones, Tablets & Featurephones (m) Split by 8 Key Regions 2012-2017 66
Table 4.1: Total Number of Smartphones, Tablets & Featurephones (m) Split by 8 Key Regions 2012-2017 66
4.2.2 Number of Protected Mobile Devices 67
Figure 4.3: Total Number of Protected Mobile Devices (m) Split by 8 Key Regions 2012-2017 67
Table 4.2: Total Number of Protected Mobile Devices (m) Split by 8 Key Regions 2012-2017 68
Figure 4.4: Number of Protected Devices as a Percentage of Total Mobile Devices (%) Split by 8 Key Regions 2012-2017 68
Table 4.3: Number of Protected Devices as a Percentage of Total Mobile Devices (%) Split by 8 Key Regions 2012-2017 69
Figure 4.5: Total Number of Protected Mobile Devices (m) Split by Tablets, Smartphones & Featurephones 2012-2017 69
Table 4.4: Total Number of Protected Mobile Devices (m) Split by Tablets, Smartphones & Featurephones 2012-2017 70
Figure 4.6: Total Number of Protected Mobile Devices (m) Split by Market 2012-2017 70
Table 4.5: Total Number of Protected Mobile Devices (m) Split by Market 2012-2017 70
4.2.3 Total Mobile Security Product Sales Revenue 71
Figure 4.7: Total Mobile Security Product Sales Revenue Forecast ($m) Split by 8 Key Regions 2012-2017 71
Table 4.6: Total Mobile Security Product Sales Revenue Forecast ($m) Split by 8 Key Regions 2012-2017 71
Figure 4.8: Total Enterprise Mobile Security Product Sales Revenue Forecast ($m) Split by Market 2012-2017 72
Table 4.7: Total Mobile Security Product Sales Revenue Forecast ($m) Split by Market 2012-2017 72
Figure 4.9: Total Enterprise Mobile Security Product Sales Revenue Forecast ($m) Split by Tablets, Smartphones & Featurephones 2012-2017 73
Table 4.8: Total Mobile Security Product Sales Revenue Forecast ($m) Split by Tablets, Smartphones & Featurephones 2012-2017 73

5. The Enterprise Market

5.1 Number of Enterprise Mobile Devices 75
Figure 5.1: Total Number of Enterprise Mobile Devices (m) Split by 8 Key Regions 2012-2017 76
Table 5.1: Total Number of Enterprise Mobile Devices (m) Split by 8 Key Regions 2012-2017 76
5.2 Enterprise Smartphone Security 77
5.2.1 Number of Enterprise Smartphones 77
Figure 5.2: Total Number of Enterprise Smartphones (m) Split by 8 Key Regions 2012-2017 77
Table 5.2: Total Number of Enterprise Smartphones (m) Split by 8 Key Regions 2012-2017 77
5.2.2 Number of Protected Enterprise Smartphones 78
Figure 5.3: Protected Enterprise Smartphones (%) Split by 8 Key Regions 2012-2017 78
Table 5.3: Protected Enterprise Smartphones (%) Split by 8 Key Regions 2012-2017 78
Figure 5.4: Protected Enterprise Smartphones (m) Split by 8 Key Regions 2012-2017 79
Table 5.4: Protected Enterprise Smartphones (m) Split by 8 Key Regions 2012-2017 80
5.3 Enterprise Tablet Security 80
5.3.1 Number of Enterprise Tablets 80
Figure 5.5: Total Number of Enterprise Tablets (m) Split by 8 Key Regions 2012-2017 80
Table 5.5: Total Number of Enterprise Tablets (m) Split by 8 Key Regions 2012-2017 81
5.3.2 Number of Protected Enterprise Tablets 81
Figure 5.6: Protected Enterprise Tablets (%) Split by 8 Key Regions 2012-2017 82
Table 5.6: Protected Enterprise Tablets (%) Split by 8 Key Regions 2012-2017 82
Figure 5.7: Protected Enterprise Tablets (m) Split by 8 Key Regions 2012-2017 83
Table 5.7: Protected Enterprise Tablets (m) Split by 8 Key Regions 2012-2017 83
5.4 Enterprise Featurephone Security 84
5.4.1 Number of Enterprise Featurephones 84
Figure 5.8: Total Number of Enterprise Featurephones (m) Split by 8 Key Regions 2012-2017 84
Table 5.8: Total Number of Enterprise Featurephones (m) Split by 8 Key Regions 2012-2017 84
5.4.2 Number of Protected Enterprise Featurephones 85
Figure 5.9: Protected Enterprise Featurephones (%) Split by 8 Key Regions 2012-2017 85
Table 5.9: Protected Enterprise Featurephones (%) Split by 8 Key Regions 2012-2017 85
Figure 5.10: Protected Enterprise Featurephones (m) Split by 8 Key Regions 2012-2017 86
Table 5.10: Protected Enterprise Featurephones (m) Split by 8 Key Regions 2012-2017 86
5.5 Total Protected Enterprise Mobile Devices 87
Figure 5.11: Total Protected Enterprise Mobile Devices (m) Split by 8 Key Regions 2012-2017 87
Table 5.11: Total Protected Enterprise Mobile Devices (m) Split by 8 Key Regions 2012-2017 88
Figure 5.12: Total Protected Enterprise Mobile Devices as a Percentage of Enterprise Devices (%) Split by 8 Key Regions 2012-2017 88
Table 5.12: Total Protected Enterprise Mobile Devices as a Percentage of Enterprise Devices (%) Split by 8 Key Regions 2012-2017 89
5.6 Enterprise Mobile Security Product Revenue 89
5.6.1 Enterprise Mobile Security Product Pricing 89
Figure 5.13: Enterprise Mobile Security Product Pricing ($) Split by 8 Key Regions 2012-2017 90
Table 5.13: Enterprise Mobile Security Product Pricing ($) Split by 8 Key Regions 2012-2017 90
5.6.2 Enterprise Mobile Security Product Sales Revenue 90
Figure 5.14: Total Enterprise Mobile Security Product Sales Revenue Forecast ($m) Split by 8 Key Regions 2012-2017 91
Table 5.14: Total Enterprise Mobile Security Product Sales Revenue Forecast ($m) Split by 8 Key Regions 2012-2017 91
5.6.3 Enterprise Mobile Security Product Sales Revenue Split By Devices 91
Figure 5.15: Total Enterprise Mobile Security Product Sales Revenue Forecast ($m) Split by Tablets, Smartphones & Featurephones 2012-2017 92
Table 5.15: Total Enterprise Mobile Security Product Sales Revenue Forecast ($m) Split by Tablets, Smartphones & Featurephones 2012-2017 92

6. The Consumer Market

6.1 Number of Consumer Mobile Devices 93
Figure 6.1: Total Number of Consumer Mobile Devices (m) Split by 8 Key Regions 2012-2017 93
Table 6.1: Total Number of Consumer Mobile Devices (m) Split by 8 Key Regions 2012-2017 94
6.2 Consumer Smartphone Security 94
6.2.1 Number of Consumer Smartphones 94
Figure 6.2: Total Number of Consumer Smartphones (m) Split by 8 Key Regions 2012-2017 94
Table 6.2: Total Number of Consumer Smartphones (m) Split by 8 Key Regions 2012-2017 95
6.2.2 Number of Protected Consumer Smartphones 95
Figure 6.3: Protected Consumer Smartphones (%) Split by 8 Key Regions 2012-2017 95
Table 6.3: Protected Consumer Smartphones (%) Split by 8 Key Regions 2012-2017 96
Figure 6.4: Smartphone Security Risks Awareness – AVG Survey 97
Figure 6.5: Protected Consumer Smartphones (m) Split by 8 Key Regions 2012-2017 97
Table 6.4: Protected Consumer Smartphones (m) Split by 8 Key Regions 2012-2017 98
6.3 Consumer Tablet Security 98
6.3.1 Number of Consumer Tablets 98
Figure 6.6: Total Number of Consumer Tablets (m) Split by 8 Key Regions 2012-2017 98
Table 6.5: Total Number of Consumer Tablets (m) Split by 8 Key Regions 2012-2017 99
6.3.2 Number of Protected Consumer Tablets 99
Figure 6.7: Protected Consumer Tablets (%) Split by 8 Key Regions 2012-2017 99
Table 6.6: Protected Consumer Tablets (%) Split by 8 Key Regions 2012-2017 100
Figure 6.8: Protected Consumer Tablets (m) Split by 8 Key Regions 2012-2017 100
Table 6.7: Protected Consumer Tablets (m) Split by 8 Key Regions 2012-2017 101
6.4 Consumer Featurephone Security 101
6.4.1 Number of Consumer Featurephones 101
Figure 6.9: Total Number of Consumer Featurephones (m) Split by 8 Key Regions 2012-2017 102
Table 6.8: Total Number of Consumer Featurephones (m) Split by 8 Key Regions 2012-2017 102
6.4.2 Number of Protected Consumer Featurephones 102
Figure 6.10: Protected Consumer Feature phone (%) Split by 8 Key Regions 2012-2017 103
Table 6.9: Protected Consumer Featurephones (%) Split by 8 Key Regions 2012-2017 104
Figure 6.11: Protected Consumer Featurephones (m) Split by 8 Key Regions 2012-2017 104
Table 6.10: Protected Consumer Featurephones (m) Split by 8 Key Regions 2012-2017 105
6.5 Total Protected Consumer Mobile Devices 105
Figure 6.12: Total Protected Consumer Mobile Devices (m) Split by 8 Key Regions 2012-2017 105
Table 6.11: Total Protected Consumer Mobile Devices (m) Split by 8 Key Regions 2012-2017 106
6.6 Consumer Mobile Security Product Sales Revenue 106
6.6.1 Consumer Mobile Security Product Pricing 106
Figure 6.13: Consumer Mobile Security Product Pricing ($) Split by 8 Key Regions 2012-2017 107
Table 6.12: Consumer Mobile Security Product Pricing ($) Split by 8 Key Regions 2012-2017 107
6.6.2 Consumer Mobile Security Product Sales Revenue 107
Figure 6.14: Total Consumer Mobile Security Product Sales Revenue Forecast ($m) Split by 8 Key Regions 2012-2017 108
Table 6.13: Total Consumer Mobile Security Product Sales Revenue Forecast ($m) Split by 8 Key Regions 2012-2017 108
6.6.3 Consumer Mobile Security Product Sales Revenue Split By Devices 108
Figure 6.15: Total Consumer Mobile Security Product Sales Revenue Forecast ($m) Split by Tablets, Smartphones & Featurephones 2012-2017 109
Table 6.14: Total Consumer Mobile Security Product Sales Revenue Forecast ($m) Split by Tablets, Smartphones & Featurephones 2012-2017 109

7. Vendor Profiles

7.1 Vendor Analysis 111
7.1.1 Vendor Assessment Criteria 111
Table 7.1: Vendor Capability Assessment Factors 112
7.1.2 Limitations and Interpretation 112
7.2 Vendor Positioning Matrix Results 113
7.2.1 Overall Matrix Position 113
Figure 7.1: Global Mobile Security Vendor Positioning Matrix 113
7.2.2 Vendor Groupings 114
i. Summary 114
ii. On Track Vendors 114
iii. Vendors Exceeding Expectations 114
iv. Vendors with Further Potential 115
7.2.3 Competitive Dynamics 115
7.3 AVG 116
Figure 7.2: AVG Mobilation for Android Smartphones and Tablets 117
7.4 BullGuard 117
Figure 7.3: BullGuard Mobile Security Snapshots 118
7.5 ESET 119
Figure 7.4: ESET Mobile Security 120
7.6 F-Secure 121
Figure 7.5: F-Secure Mobile Security 121
7.7 Juniper Networks 123
7.8 Kaspersky 124
Figure 7.6: Kaspersky Mobile Security 125
7.9 Lookout 126
Figure 7.7: Lookout Mobile Security 127
Table 7.2: Lookout Subscription Models and Features 127
7.10 McAfee 128
Figure 7.8: McAfee WaveSecure Product Snapshot 130
7.11 PhoneFactor 131
Figure 7.9: PhoneFactor Out-of-Band Authentication Methods 132
7.12 Sophos 133
Figure 7.10: Sophos Mobile Control Management Dashboard Snapshot 134
7.13 Symantec 135
Figure 7.11: Norton Mobile Security 136
7.14 Trend Micro 137
Figure 7.12: Trend Micro Mobile Security 138
7.15 Trusteer 139

8. The Security Threats

8.1 Device Loss/Theft 141
Table 8.1: Top 20 US Cities for Mobile Phone Loss/Theft 142
8.2 Phishing 142
Figure 8.1: Mobile Phishing Attack Illustration 142
8.3 Malware and Viruses 143
Figure 8.2: Mobile Malware Infected Apps Growth - 2011 143
Table 8.2: Recently Identified Malwares 144
Figure 8.3: Mobile Malware, Percentage Split by Platform, 2011 145
8.3.1 Mobile Trojans 145
i. Trojan:SymbOS/Zitmo.A 145
ii. TrojanSpy:AndroidOS/Pjapps.A 146
Figure 8.4: Android Market Security Tool 146
Figure 8.5: Pirated and Trojanised Android Market Security Tool 146
8.3.2 Spyware 147
Figure 8.6: Mobile Spy-Software Application 147
i. MobileSpyBB.a 148
ii. A.MobileSpy.gen(drs) 148
Table 8.3: Mobile Spy for Android & BlackBerry – Spying Capabilities 148
Figure 8.7: Mobile Spy Spyware for Android Devices Posted on Android Market 148
8.3.3 Worms 149
i. Worm:SymbOS/Corrior.B 149
ii. iPhoneOS/Ikee.B 149
iii. S.Megoro.gen(drs) 149
8.4 Other Threats 150
8.4.1 Spoofing 150
8.4.2 Spam 150
Figure 8.8: An Example of a Spam Text Message 150
8.4.3 Denial of Service Attack 150

9. Solutions & Technology

9.1 Introduction 153
9.1.1 Functions of Mobile Security 153
9.2 Security Solutions 154
9.2.1 Data Encryption 154
Figure 9.1: Example of an Encryption Process 155
9.2.2 Device Loss or Theft Protection 155
Figure 9.2 Anti-Theft Protection by Kaspersky 155
9.2.3 Virus and Malware Protection 156
Figure 9.3: Mobile Anti-Virus Protection Example 156
9.2.4 Firewall and Policy Control 156
Figure 9.4: Example for Firewall Protection on Mobile Devices 157
9.2.5 Sandboxing by Device Vendors 157
9.2.6 Remote Application Removal – Remote Kill Switch 157
9.3 Mobile Operating System Security 158
9.3.1 Development of the Mobile OS 158
9.3.2 RIM and the BlackBerry 158
Figure 9.5: BlackBerry Bold 158
i. BlackBerry Exchange Server 159
Figure 9.6:  Diagrammatic Representation of BlackBerry Security 159
9.3.3 Symbian 160
i. Symbian Platform Security 160
9.3.4 Windows Mobile Operating System 160
i. Windows Mobile and Security 161
Table 9.1: Windows Phone OS 7.0 Security Model – Chambers & Functions 161
9.3.5 iPhone 162
i. Security of the iPhone Operating System 162
9.3.6 Android 163
i. Security of the Android OS 163

10. Security Standards & Forums

10.1 ETSI 165
i. GSM 166
ii. UMTS 166
iii. Next Generation Networks 166
10.2 ENISA 166
10.3 APWG 167
10.4 OATH 167
Figure 10.1: Strong Authentication: OATH 167

Companies Referenced

Companies Mentioned
Alert Logic; Apple; APWG; AVG; BBC; BullGuard; Bump Technologies Inc.; CDW; Cisco; ENISA; ESET; ETSI; FFIEC; F-Secure; Gemalto; Get Safe Online; Google; ISACA; Juniper Networks; Kaspersky; Lookout; McAfee; Microsoft; Nokia; Norton; OATH; Palm; Panda Security; Pointsec; Rabobank Group; RBI; RIM; SAMSUNG; Sybase; Symantec; Symbian Foundation; Trend Micro; Trust Digital; Trusteer; VeriSign; Vodafone

Companies Profiled
F-Secure; Symantec; BullGuard; Kaspersky; McAfee; Juniper Networks; ESET; Lookout; Trusteer; Trend Micro; AVG; Sophos; PhoneFactor

Extra Info

‡ 8 key regions includes:

North America, Latin America, Western Europe, Central & Eastern Europe, Far East & China, Indian Subcontinent, Rest of Asia Pacific and Africa & Middle East.

Prices

Please note: This product is not available to be purchased individually, or it may have been superceded.
Please see: Mobile Security BYOD, mCommerce, Consumer & Enterprise 2013-2018

Login

Search In Report

You can now search within each of our reports to find out whether a specific keyword is mentioned in the report.

Simply type a keyword or key phrase into the search field above and click 'GO'.

Key Questions

1. How many mobile devices will have security products installed in them by 2017?
2. How is the mobile security market developing among enterprise users and consumers?
3. What will drive the demand for third party security applications among enterprise and consumers?
4. What is driving the BYOD trend and what are its security implications?
5. What is the adoption of mobile devices in mCommerce authentication?
6. How has the mobile device threat landscape changed over the last year?
7. How are operators, application vendors and OS vendors addressing these challenges?
8. What are the market drivers and opportunities?

Any Questions about this report please contact us.

 

Related Reports:

The Mobile Security Strategies Briefing 2012-2017, Mobile Security Strategies Excel 2012-2017

Related Categories: Networks & Technologies

* Euro and US$ prices are for guidance only. The exact price charged will depend upon your bank exchange rate (to the £) prevailing on the day of order processing.