Cover Image
市場調查報告書

YOD安全的全球市場 (終端、解決方案、安全軟體、終端用戶,及地區) - 規模、佔有率、全球趨勢、企業簡介、需求、考察、分析、調查、報告、市場機會、分類、市場預測:2013∼2020年

Global BYOD Security Market (Device, Solutions, Security Software, End User and Geography) Size, Share, Global Trends, Company Profiles, Demand, Insights, Analysis, Research, Report, Opportunities, Segmentation and Forecast, 2013 - 2020

出版商 Allied Market Research 商品編碼 329494
出版日期 內容資訊 英文 128 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
YOD安全的全球市場 (終端、解決方案、安全軟體、終端用戶,及地區) - 規模、佔有率、全球趨勢、企業簡介、需求、考察、分析、調查、報告、市場機會、分類、市場預測:2013∼2020年 Global BYOD Security Market (Device, Solutions, Security Software, End User and Geography) Size, Share, Global Trends, Company Profiles, Demand, Insights, Analysis, Research, Report, Opportunities, Segmentation and Forecast, 2013 - 2020
出版日期: 2015年03月15日 內容資訊: 英文 128 Pages
簡介

BYOD市場在北美和歐洲等地區大幅發展。企業的生產率提高,使各種產業引進BYOD,這成為市場迅速發展的理由。隨著BYOD的概念受到廣泛地區認識,BYOD的安全解決方案的實施變得極為重要。BYOD安全解決方案,可遠程管理商務利用的智慧型手機和平板電腦、筆記型電腦等終端。為了保護行動終端上重要的企業資料,BYOD安全策略發揮重要作用,支持員工個人終端的業務利用。新興市場的BYOD概念引進的擴大,成為BYOD安全市場主要促進要素之一。

本報告提供BYOD安全的全球市場概要和趨勢、結構、抑制因素與市場機會分析、到2020年的定量分析、價值鏈分析等。

第1章 簡介

  • 本報告概要
  • 調查的目的
  • 主要的優點
  • 主要市場分類
  • 調查手法
    • 一次調查
    • 二次調查
    • 分析工具和模式

第2章 摘要整理

  • CXO的見解
  • 今後的市場:到2025年的期待
    • 緩慢的成長方案
    • 急速成長方案
    • 停頓方案

第3章 市場概要

  • 市場定義和調查範圍
  • 主要調查結果
    • 主要的影響因素
    • 主要的投資策略
    • 主要的勝策略
  • 波特的五力分析
    • 集中的提供者和自訂產品的需求,提高提供者談判力
    • 低價格意識與個性化的產品,降低買主談判力
    • 許多競爭公司與低轉換成本,使激烈競爭
    • 進入的門檻低使新加入廠商的威脅提高
    • 無替代品的程度使市場替代品的威脅降低
  • 價值鏈分析
  • 市場佔有率分析 (2013年)
  • 市場動態
    • 促進要素
    • 抑制因素
    • 市場機會

第4章 BYOD安全的全球市場 (終端的各類型)

  • 筆記型電腦
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測
  • 平板電腦
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測
  • 智慧型手機
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測

第5章 BYOD安全的全球市場 (各解決方案)

  • 行動終端管理 (MDM)
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測
  • 行動、應用管理 (MAM)
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測
  • 行動、內容管理 (MCM)
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測
  • 行動個人認證管理
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測

第6章 BYOD安全的全球市場 (各類軟體)

  • 行動數據的安全
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測
  • 行動終端的安全
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測
  • 網路的安全
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測

第7章 BYOD安全的全球市場 (各終端用戶)

  • 大企業
    • 市場規模與預測
  • 中小企業 (SME)
    • 市場規模與預測
  • 政府企業
    • 市場規模與預測

第8章 BYOD安全的全球市場 (各地區)

  • 北美
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測
  • 歐洲
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測
  • 亞太地區
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測
  • 南美、中東、非洲
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測

第9章 企業簡介

  • SAP
    • 概要
    • 短評
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略性結論
  • Citrix Systems
    • 概要
    • 短評
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略性結論
  • Trend Micro
    • 概要
    • 短評
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略性結論
  • INTERNATIONAL BUSINESS MACHINE (IBM)
    • 概要
    • 短評
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略性結論
  • VMware
    • 概要
    • 短評
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略性結論
  • Good Technology
    • 概要
    • 短評
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略性結論
  • Mobile iron
    • 概要
    • 短評
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略性結論
  • Alcatel Lucent
    • 概要
    • 短評
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略性結論
  • Cisco Systems
    • 概要
    • 短評
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略性結論
  • Symantec Corporation
    • 概要
    • 短評
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略性結論
目錄
Product Code: IC 15637

The market for BYOD has significantly evolved in regions such as North America and Europe. Rise in the productivity of the organizations has led to the BYOD adoption across varied industry verticals. This ultimately helps the market to grow at a rapid pace. As BYOD concept is gaining popularity across various regions, implementation of BYOD security solutions has become highly important. These BYOD security solutions allow remote management of mobile devices used for business purposes viz., smartphones, tablets and laptops. To protect the important corporate data over the mobile devices, BYOD security policies play an important role and support the use of employee's own devices at their work places. Increasing adoption of BYOD concept across emerging markets is one of the key drivers for BYOD security market.

The vendors presently are manufacturing mobile devices that are integrated with security solutions. These in-built security policies allow employees to access both their personal and corporate data from a single device and from various access points. Additionally, the vendors in the market are acquiring and collaborating with the top companies in the market to enhance their product portfolio. For instance, on 26 January, 2014, VMware acquired AirWatch, which is a leader in delivering secure and enterprise-mobile management solutions, for $1.175 billion. This acquisition has helped VMware to boost mobile security offerings to the customers. Similarly, In August, 2014, SAP in collaboration with VMware has developed a mobile security software platform for mobile applications, which offers simplified user experience for all mobile applications. Key players in the market are SAP, Symantec, VMware, Citrix systems, Mobile Iron, Good Technology, Trend Micro, IBM, Alcatel Lucent and Cisco Systems.

The global BYOD security market is segmented based on the type of device used for business purposes, BYOD solution required for the implementation of BYOD in enterprises, security software, end users and geography. Smartphones, tablets and laptop are usually preferred by the employees at their workplaces. Solution segment is classified as mobile device management, mobile application management, mobile content management and mobile identity management. The segment of security software is classified as mobile data security, mobile device security and network security. The end users for the BYOD security market are large enterprises, small and medium enterprises (SME's) and government organizations. The microscopic analysis of the market has been performed by examining various regions such as North America, Europe, Asia-Pacific and LAMEA.

KEY BENEFITS

The analysis of the global market provides an overview of the global BYOD security market with special reference to market trends, market structure, limiting factors and opportunities

The global market has been analyzed in a comprehensive manner to help the stakeholders identify the key market opportunities

Quantitative analysis of the current market and estimations through 2013-2020 would determine the financial caliber of the market

Porter's five forces model has been used to analyze the potential of buyers and suppliers, and the competitive structure of the market, to guide the market players in developing effective strategies

Value chain analysis provides a systematic study on the key intermediaries involved, which would in turn help the stakeholders to make appropriate strategies

KEY MARKET SEGMENTS

  • The market is segmented on the basis of device type, solutions, security software, end user and geography.

MARKET BY DEVICE TYPE

  • Smartphone
  • Tablet
  • Laptop

MARKET BY SOLUTION

  • Mobile Device Management (MDM)
  • Mobile Application Management (MAM)
  • Mobile Content Management (MCM)
  • Mobile Identity Management (MIM)

MARKET BY SECURITY SOFTWARE

  • Mobile data security
  • Mobile device security
  • Network security

MARKET BY END USERS

  • Large enterprises
  • Small and medium Enterprises (SMEs)
  • Government organizations

MARKET BY GEOGRAPHY

  • North America
  • Europe
  • Asia-Pacific
  • LAMEA

KEY MARKET PLAYERS

  • Symantec
  • VMware
  • Citrix systems
  • Mobile Iron
  • Good Technology
  • SAP
  • Trend Micro
  • IBM
  • Alcatel Lucent
  • Cisco Systems

Table of Contents

CHAPTER 1 - INTRODUCTION

  • 1.1. Report Description
  • 1.2. Reason for doing the study
  • 1.3. Key Benefits
  • 1.4. Key Segments
  • 1.5. Research methodology
    • 1.5.1. Secondary research
    • 1.5.2. Primary research
    • 1.5.3. Analyst tools and models

CHAPTER 2 - EXECUTIVE SUMMARY

  • 2.1. CXO Perspective
  • 2.2. Market Beyond what to expect by 2025($ Million)
    • 2.2.1. Moderate Growth Scenario
    • 2.2.2. Rapid Growth Scenario
    • 2.2.3. Diminishing Growth Scenario

CHAPTER 3 - MARKET OVERVIEW

  • 3.1. Market Definition and Scope
  • 3.2. Key Findings
    • 3.2.1. Top Impacting Factors
    • 3.2.2. Top Investment Pockets
    • 3.2.3. Top Winning Strategies
  • 3.3. Porter's Five Force Analysis
    • 3.3.1. Concentrated suppliers and demand for customized product increases the bargaining power of supplier
    • 3.3.2. Low price sensitivity and differentiated product lowers down the bargaining power of buyer
    • 3.3.3. Numerous competitors and low switching costs intensifies rivalry
    • 3.3.4. Low entry barriers increases the threat of new entrant in the industry
    • 3.3.5. No substitute availability lowers the threat of substitute in the market.
  • 3.4. Value Chain Analysis
  • 3.5. Market Share Analysis, 2013
  • 3.6. Market Dynamics
    • 3.6.1. Drivers
      • 3.6.1.1. Increased adoption of BYOD by Organizations
      • 3.6.1.2. Implementing BYOD policies Reduces hardware cost
      • 3.6.1.3. Increased productivity
      • 3.6.1.4. Popularity of BYOD in varied industry verticals
      • 3.6.1.5. Increased penetration of smartphones and tablets
    • 3.6.2. Restraints
      • 3.6.2.1. Low awareness about BYOD security tools
      • 3.6.2.2. Lack in trust harming BYOD adoption
    • 3.6.3. Opportunities
      • 3.6.3.1. Common BYOD security tool

CHAPTER 4 - GLOBAL BYOD SECURITY MAKRET BY DEVICE TYPE

  • 4.1. Laptop
    • 4.1.1. Key Market Trends
    • 4.1.2. Competitive Scenario
    • 4.1.3. Key Growth factors and opportunities
    • 4.1.4. Market size and forecast
  • 4.2. Tablet
    • 4.2.1. Key Market Trends
    • 4.2.2. Competitive Scenario
    • 4.2.3. Key Growth factors and opportunities
    • 4.2.4. Market size and forecast
  • 4.3. Smart Phone
    • 4.3.1. Key Market Trends
    • 4.3.2. Competitive Scenario
    • 4.3.3. Key Growth factors and opportunities
    • 4.3.4. Market size and forecast

CHAPTER 5 - GLOBAL BYOD SECURITY BY SOLUTION

  • 5.1. Mobile Device Management (MDM)
    • 5.1.1. Key Market Trends
    • 5.1.2. Competitive Scenario
    • 5.1.3. Key Growth factors and opportunities
    • 5.1.4. Market size and forecast
  • 5.2. Mobile Application Management (MAM)
    • 5.2.1. Key Market Trends
    • 5.2.2. Competitive Scenario
    • 5.2.3. Key Growth factors and opportunities
    • 5.2.4. Market size and forecast
  • 5.3. Mobile Content Management (MCM)
    • 5.3.1. Key Market Trends
    • 5.3.2. Competitive Scenario
    • 5.3.3. Key Growth factors and opportunities
    • 5.3.4. Market size and forecast
  • 5.4. Mobile Identity Management
    • 5.4.1. Key Market Trends
    • 5.4.2. Competitive Scenario
    • 5.4.3. Key Growth factors and opportunities
    • 5.4.4. Market size and forecast

CHAPTER 6 - GLOBAL BYOD SECURITY MARKET BY SECURITY SOFTWARE

  • 6.1. Mobile Data Security
    • 6.1.1. Key market trends
    • 6.1.2. Competitive Scenario
    • 6.1.3. Key growth factors and opportunities
    • 6.1.4. Market size and forecast
  • 6.2. Mobile Device Security
    • 6.2.1. Key market trends
    • 6.2.2. Key growth factors and opportunities
    • 6.2.3. Competitive Scenario
    • 6.2.4. Market size and forecast
  • 6.3. Network Security
    • 6.3.1. Key market trends
    • 6.3.2. Key growth factors and opportunities
    • 6.3.3. Competitive Scenario
    • 6.3.4. Market size and forecast

CHAPTER 7 - GLOBAL BYOD SECURITY BY END USER

  • 7.1. Large Enterprises
    • 7.1.1. Market Size and Forecast
  • 7.2. Small and Medium Enterprises (SMEs)
    • 7.2.1. Market Size and Forecast
  • 7.3. Government Enterprises
    • 7.3.1. Market Size and Forecast

CHAPTER 8 - GLOBAL BYOD SECURITY MARKET BY GEOGRAPHY

  • 8.1. North America
    • 8.1.1. Key Market Trends
    • 8.1.2. Competitive Scenario
    • 8.1.3. Key Growth Factors and Opportunities
    • 8.1.4. Market Size and Forecast
  • 8.2. Europe
    • 8.2.1. Key Market Trends
    • 8.2.2. Competitive Scenario
    • 8.2.3. Key Growth Factors and Opportunities
    • 8.2.4. Market Size and Forecast
  • 8.3. Asia-Pacific
    • 8.3.1. Key Market Trends
    • 8.3.2. Competitive Scenario
    • 8.3.3. Key Growth Factors and Opportunities
    • 8.3.4. Market Size and Forecast
  • 8.4. LAMEA
    • 8.4.1. Key Market Trends
    • 8.4.2. Competitive Scenario
    • 8.4.3. Key Growth Factors and Opportunities
    • 8.4.4. Market Size and Forecast

CHAPTER 9 - COMPANY PROFILES

  • 9.1. SAP
    • 9.1.1. Company Overview
    • 9.1.2. Company snapshot
    • 9.1.3. Business performance
    • 9.1.4. Strategic moves and development
    • 9.1.5. SWOT analysis and Strategic Conclusion of SAP
  • 9.2. Citrix Systems
    • 9.2.1. Company Overview
    • 9.2.2. Business Performance
    • 9.2.3. Strategic Moves and Developments
    • 9.2.4. SWOT Analysis and Strategic Conclusion of Citrix Systems Inc.
  • 9.3. Trend Micro
    • 9.3.1. Company Overview
    • 9.3.2. Business Performance
    • 9.3.3. Key strategies of Trend Micro
    • 9.3.4. SWOT analysis and strategic conclusion
  • 9.4. INTERNATIONAL BUSINESS MACHINE (IBM)
    • 9.4.1. Company overview
    • 9.4.2. Business Performance
    • 9.4.3. Strategic Moves and Developments
    • 9.4.4. SWOT Analysis and Strategic Conclusion Of IBM
  • 9.5. VMware
    • 9.5.1. Company Overview
    • 9.5.3. Strategic Moves and Developments
    • 9.5.4. SWOT Analysis and Strategic Conclusion of VMware Inc.
  • 9.6. Good Technology
    • 9.6.1. Company Overview
    • 9.6.2. Strategic Moves and Developments
    • 9.6.3. SWOT Analysis and Strategic Conclusion of Good Technology
  • 9.7. Mobile iron
    • 9.7.1. Company Overview
    • 9.7.2. Strategic moves and developments
    • 9.7.3. SWOT analysis of Mobile Iron
    • 9.7.4. Swot analysis of Mobile Iron
  • 9.8. Alcatel Lucent
    • 9.8.1. Company Overview
    • 9.8.2. Business Performance
    • 9.8.3. Strategic Moves and Developments
    • 9.8.4. SWOT analysis and strategic conclusion of Alcatel lucent
    • 9.8.5. Swot analysis of Alcatel lucent
  • 9.9. Cisco Systems
    • 9.9.1. Company Overview
    • 9.9.2. Business performance
    • 9.9.3. Strategic moves and developments
    • 9.9.4. SWOT analysis of Cisco System Inc.
  • 9.10. Symantec Corporation
    • 9.10.1. Company Overview
    • 9.10.2. Business Performance
    • 9.10.3. Key strategies of Symantec Corporation
    • 9.10.4. SWOT analysis and strategic conclusion

List of Tables

  • TABLE 1: GLOBAL BYOD SECURITY MARKET REVENUE BY GEOGRAPHY, 2013-2020 ($ MILLION)
  • TABLE 2: GLOBAL BYOD SECURITY MARKET MODERATE GROWTH SCENARIO REVENUE BY GEOGRAPHY,2020-2025 ($ MILLION)
  • TABLE 3: GLOBAL BYOD SECURITY MARKET RAPID GROWTH SCENARIO REVENUE BY GEOGRAPHY, 2020-2025 ($ MILLION)
  • TABLE 4: GLOBAL BYOD SECURITY MARKET DIMINISHING GROWTH SCENARIO REVENUE BY GEOGRAPHY, 2020-2025 ($ MILLION)
  • TABLE 5: GLOBAL BYOD SECURITY MARKET REVENUE BY DEVICE TYPE, 2013-2020 ($ MILLION)
  • TABLE 6: GLOBAL BYOD SECURITY LAPTOP MARKET REVENUE BY GROGRAPHY, 2013-2020 ($ MILLION)
  • TABLE 7: GLOBAL BYOD SECURITY TABLET MARKET REVENUE BY GROGRAPHY, 2013-2020 ($ MILLION)
  • TABLE 8: GLOBAL BYOD SECURITY SMARTPHONE MARKET REVENUE BY GROGRAPHY, 2013-2020 ($ MILLION)
  • TABLE 9: GLOBAL BYOD SECURITY MARKET REVENUE BY SOLUTION, 2013-2020 ($ MILLION)
  • TABLE 10: GLOBAL BYOD SECURITY MOBILE DEVICE MANAGEMENT SOLUTION MARKET REVENUE BY GEOGRAPHY, 2013-2020 ($ MILLION)
  • TABLE 11: COMPANIES WITH MAM SOFTWARE WITH ITS SUITABLE INSTALLATION ENVIRONMENT:
  • TABLE 12: GLOBAL BYOD SECURITY MOBILE APPLICATION MANAGEMENT SOLUTION MARKET REVENUE BY GEOGRAPHY, 2013-2020 ($ MILLION)
  • TABLE 13: GLOBAL BYOD SECURITY MOBILE CONTENT MANAGEMENT SOLUTION MARKET REVENUE BY GEOGRAPHY, 2013-2020 ($ MILLION)
  • TABLE 14: GLOBAL BYOD SECURITY MOBILE IDENTITY MANAGEMENT SOLUTION MARKET REVENUE BY GEOGRAPHY, 2013-2020 ($ MILLION)
  • TABLE 15: GLOBAL BYOD SECURITY MARKET REVENUE BY SECURITY SOFTWARE, 2013-2020 ($ MILLION)
  • TABLE 16: GLOBAL BYOD SECURITY MOBILE DATA SECURITY MARKET REVENUE BY GEOGRAPHY, 2013-2020 ($ MILLION)
  • TABLE 17: GLOBAL BYOD SECURITY MOBILE DEVICE SECURITY MARKET REVENUE BY GEOGRAPHY, 2013-2020 ($ MILLION)
  • TABLE 18: GLOBAL BYOD SECURITY NETWORK SECURITY MARKET REVENUE BY GEOGRAPHY, 2013-2020 ($ MILLION)
  • TABLE 19: GLOBAL BYOD SECURITY MARKET REVENUE BY END USER, 2013-2020 ($ MILLION)
  • TABLE 20: GLOBAL LARGE ENETRPRISES BYOD SECURITY MARKET REVENUE BY GEOGRAPHY, 2013-2020 ($ MILLION)
  • TABLE 21: GLOBAL SMALL AND MEDIUM (SME'S) ENETRPRISES BYOD SECURITY MARKET REVENUE BY GEOGRAPHY, 2013-2020 ($ MILLION)
  • TABLE 22: GLOBAL GOVERNMENT ENETRPRISES BYOD SECURITY MARKET REVENUE BY GEOGRAPHY, 2013-2020 ($ MILLION)
  • TABLE 23: NORTH AMERICAN BYOD SECURITY MARKET REVENUE BY SOLUTION, 2013-2020 ($ MILLION)
  • TABLE 24: ASIA PACIFIC BYOD SECURITY MARKET REVENUE BY SOLUTION, 2013-2020 ($ MILLION)
  • TABLE 25: LAMEA BYOD SECURITY MARKET REVENUE BY SOLUTION, 2013-2020 ($ MILLION)
  • TABLE 26: SAP SNAPSHOT
  • TABLE 27: CITRIX SYSTEMS INC. SNAPSHOT
  • TABLE 28: TREND MICRO SNAPAHOT
  • TABLE 29: IBM SNAPSHOT
  • TABLE 30: VMWARE INC. SNAPSHOT
  • TABLE 31: GOOD TECHNOLOGY SNAPSHOT
  • TABLE 32: MOBILE IRON SANPSHOT
  • TABLE 33: ALCATEL LUCENT SNAPSHOT
  • TABLE 34: CISCO SYSTEMS INC. SANPSHOT
  • TABLE 35: SYMANTEC CORPORATION SNAPAHOT

List of Figures

  • FIG. 1: TOP IMPACTING FACTORS, MODERATE GROWTH SCENARIO (2020-2025)
  • FIG. 2: TOP IMPACTING FACTORS, RAPID GROWTH SCENARIO (2020-2025)
  • FIG. 3: TOP IMPACTING FACTORS, DIMINISHING GROWTH SCENARIO (2020-2025)
  • FIG. 4: TOP IMPACTING FACTORS
  • FIG. 5: TOP WINING STRATEGIES
  • FIG. 6: TOP WINNING STRATEGIES ANALYSIS
  • FIG. 7: PORTERS FIVE FORCE MODEL
  • FIG. 8: VALUE CHAIN ANALYSIS
  • FIG. 9: MARKET SHARE ANALYSIS, 2013
  • FIG. 10: SUPPORT FOR BRING YOUR OWN DEVICE, 2013
  • FIG. 11: ADOPTION OF BYOD ACROSS INDUSTRY VERTICALS IN PERCENTAGE, 2012
  • FIG. 12: UNIT SHIPMENT OF MOBILE DEVICES IN MILLION, 2013
  • FIG. 13: COUNTRY WISE USE OF MOBILE DEVICE FOR BUSINESS PURPOSE IN PERCENTAGE, 2012
  • FIG. 14: COMPARISION OF MOBILE DEVICES AT WORKPLACE (PERCENTAGE, 2013)
  • FIG. 15: COMPARISON OF DEVICES USED AT WORKPLACES BY THE EMPLOYEES IN PERCENTAGE (2011)
  • FIG. 16: ORGANIZATIONS ALLOWING BYOD (PERCENTAGE)
  • FIG. 17: FREQUENCY OF SMARTPHONES FOR PERSONAL USE AND BUSINESS USE (2012)
  • FIG. 18: COMPARISION FOR THE FUNCTIONS OF MOBILE DEVICE MANAGEMENT AND MOBILE DEVICE SECURITY
  • FIG. 19: BYOD ADOPTION BY COMPANY SIZE IN PERCENTAGE, 2013
  • FIG. 20: BYOD ADOPTION BY ENTERPRISES IN PERCENTAGE, 2014
  • FIG. 21: BYOD ADOPTION BY INDUSTRIES IN PERCENTAGE, 2014
  • FIG. 22: DESIGNATED MOBILE WORKERS VS EMPLOYEES WHO USE MOBILE DEVICE FOR WORK, 2012 (PERCENTAGE)
  • FIG. 23: USE OF PERSONALLY OWNED DEVICES AT WORK PLACES IN VARIOUS COUNTRIES,2012 (PERCENTAGE)
  • FIG. 24: EUROPEAN BYOD SECURITY MARKET REVENUE BY SOLUTION, 2013-2020 ($ MILLION)
  • FIG. 25: REGION WISE % OF COMPANIES CONSIDERING SECURITY AS TOP CHALLENGE IN BYOD, 2012
  • FIG. 26: PERCENTAGE OF COMPANIES ADOPTING BYOD ACROSS REGIONS
  • FIG. 27: KEY FINANCIALS OF SAP REVENUE PERCENTAGE BY REGIONS
  • FIG. 28: KEY FINANCIALS OF SAP REVENUE PERCENTAGE BY INDUSTRIES
  • FIG. 29: SWOT ANALYSIS OF SAP
  • FIG. 30: REVENUE GENERATED BY CITRIX SYSTEMS INC., 2013-2011, $ MILLION
  • FIG. 31: REVENUE OF CITRIX SYSTEMS INC. BY BUSINESS SEGMENT, 2013
  • FIG. 32: REVENUE OF CITRIX SYSTEMS INC. BY GEOGRAPHY, 2013
  • FIG. 33: SWOT ANALYSIS OF CITRIX SYSTEMS INC.
  • FIG. 34: KEY FINANCIALS OF TREND MICRO NET SALES, 2012-2013, $MILLION
  • FIG. 35: SWOT ANALYSIS OF TREND MICRO
  • FIG. 36: KEY FINANCIALS OF IBM REVENUE BY PRODUCTS AND SERVICES
  • FIG. 37: SWOT ANALYSIS OF IBM
  • FIG. 38: REVENUE GENERATED BY VMWARE INC., 2013-2011, $ MILLION
  • FIG. 39: REVENUE OF VMWARE INC. BY BUSINESS SEGMENT, 2013
  • FIG. 40: REVENUE OF VMWARE INC. BY GEOGRAPHY, 2013
  • FIG. 41: SWOT ANALYSIS OF VMWARE
  • FIG. 42: SWOT ANALYSIS OF GOOD TECHNOLOGY
  • FIG. 43: SWOT ANALYSIS OF MOBILE IRON
  • FIG. 44: REVENUE GENERATED BY ALCATEL-LUCENT, 2013-2011, $ MILLION
  • FIG. 45: REVENUE OF ALCATEL-LUCENT BY BUSINESS SEGMENT, 2013
  • FIG. 46: REVENUE OF ALCATEL-LUCENT BY GEOGRAPHY, 2013
  • FIG. 47: SWOT ANALYSIS OF ALCATEL LUCENT
  • FIG. 48: KEY FINANCIALS OF CISCO SYSTEMS INC. REVENUE, 2011-2013, $MILLION
  • FIG. 49: REVENUE BY PRODUCTS AND SERVICES FOR CISCO SYSTEM INC.
  • FIG. 50: REVENUE BY GEOGRAPHY FOR CISCO SYSTEM INC.
  • FIG. 51: SWOT ANALYSIS OF CISCO SYSTEM INC.
  • FIG. 52: KEY FINANCIALS OF SYMANTEC CORPORATION REVENUE, 2011-2013, $MILLION
  • FIG. 53: REVENUE BY PRODUCTS AND SERVICES FOR SYMANTEC CORPORATION
  • FIG. 54: SWOT ANALYSIS OF SYMANTEC CORPORATION
Back to Top