Cover Image
市場調查報告書

南美的行動安全市場 - 2015∼2019年

Mobile Security Market in Latin America 2015-2019

出版商 TechNavio (Infiniti Research Ltd.) 商品編碼 331973
出版日期 內容資訊 英文 97 Pages
訂單完成後即時交付
價格
Back to Top
南美的行動安全市場 - 2015∼2019年 Mobile Security Market in Latin America 2015-2019
出版日期: 2015年06月03日 內容資訊: 英文 97 Pages
簡介

南美的行動安全市場從2014年到2019年的期間預計以32.28%的年複合成長率繼續擴大。

本報告提供南美的行動安全市場、推動市場成長要素、市場課題、市場趨勢,還有市場競爭情形的詳細調查,和取得自許多產業專家的資料和資訊、目前市場方案分析,以及從2015年到2019年的市場成長預測。還有關於這個市場的主要企業,提供包含其商務、策略、最近的企業發展,還有SWOT分析的詳細的企業分析資訊。

第1章 摘要整理

第2章 簡稱表

第3章 本報告涵蓋範圍

  • 市場概要

第4章 市場調查手法

  • 市場調查流程
  • 調查手法

第5章 序論

  • 市場趨勢

第6章 南美: 統計資料

第7章 市場預測

  • 南美的各國行動電話用戶
    • 南美的各國行動電話普及率
  • 南美的行動網際網路用戶

第8章 電腦網路攻擊: 行動安全

  • 行動裝置的安全確保法
    • 行動裝置的加密
    • 行動裝置的加密應用
    • MDM (行動裝置管理)

第9章 新的行動安全技術

  • 容器化
  • 行動多要素認證

第10章 市場概論

  • 行動安全、架構
  • 攻擊的類別
    • 硬體設備中心的攻擊
    • 軟體中心的攻擊
    • 設備不依賴的攻擊
    • 對用戶層的攻擊
  • 威脅的類別
  • 對iOS及Android的攻擊
  • 行動安全的生命週期
  • 帶來行動病毒的原因
  • 行動安全解決方案的優點

第11章 市場概況

第12章 購買標準

第13章 推動市場成長要素

第14章 推動市場成長要素與其造成的影響

第15章 市場課題

第16章 推動市場成長要素和市場課題帶來的影響

第17章 市場趨勢

第18章 市場趨勢與其造成的影響

第19章 供應商情形

  • 市場競爭方案
  • 行動安全的全球市場的最新消息
    • 重要新聞
    • 企業收購合併
  • 主要供應商
  • 主要供應商概論
  • 其他關注供應商

第20章 主要供應商分析

  • Check Point Software
  • Cisco Systems
  • Kaspersky Lab
  • McAfee
  • Symantec

第21章 相關報告

目錄
Product Code: IRTNTR6001

About Mobile Security

The protection of smartphones, tablets, laptops, and the networks they connect to from threats and vulnerabilities associated with wireless computing is known as mobile security. The consequences of a malicious third-party gaining access to personal financial information could be disastrous and irreparable. The three main targets for threats are information, identity, and availability.

Mobile security broadly encompasses the protection of mobile devices (smart devices) from malware threats, data theft, unauthorized access, and accidental loss. Mobile security solutions protect mobile devices against viruses, spyware, hacker attacks, and online identity theft. It also helps block spam calls and messages and eliminate malicious apps that may risk privacy. Mobile security is seen as the key to win the war against new generation of cyber attackers.

Mobile security comes in many forms such as inbuilt in devices. For instance, iPhone comes with a default auto lock feature that requires the user to enter a password after a few minutes of inactivity. Other mobile security protections are built into the network such as strong encryption standards for data travelling across cellular networks.

Technavio's analysts forecast the mobile security market in Latin America to grow at a CAGR of 32.28% over the period 2014-2019.

Covered in this Report

In this report, Technavio analyst covers the present scenario and growth prospects of the mobile security market in Latin America for the period 2015-2019. To calculate the market size, the analyst considers the revenue generated from the sales of mobile security solutions in Latin America. The report also includes market insights, market description, and market landscape of the mobile security market in Latin America.

The market is highly fragmented with the presence of several small and large vendors. The report does not include the market share of all vendors; it only presents the list of key vendors and a corresponding detailed analysis of the same.

Technavio's report, the Mobile Security Market in Latin America 2015-2019, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects in the coming years. The report includes a discussion of the key vendors operating in this market.

Key Vendors

  • Checkpoint Software Technologies
  • Cisco Systems
  • Kaspersky
  • McAfee
  • Symantec

Other Prominent Vendors

  • Citrix Systems
  • FireEye
  • Fortinet
  • F-secure
  • IBM
  • Juniper Networks
  • Palo Alto Networks
  • Panda Security
  • Sophos
  • Wontok

Market Driver

  • Increased Usage of Mobile Devices
  • For a full, detailed list, view our report

Market Challenge

  • Obsolescence of Security Solutions
  • For a full, detailed list, view our report

Market Trend

  • Popularity of SaaS-based Mobile Security Solutions
  • For a full, detailed list, view our report

Key Questions Answered in this Report

  • What will the market size be in 2019 and what will the growth rate be?
  • What are the key market trends?
  • What is driving this market?
  • What are the challenges to market growth?
  • Who are the key vendors in this market space?
  • What are the market opportunities and threats faced by the key vendors?
  • What are the strengths and weaknesses of the key vendors?

Table of Contents

01. Executive Summary

02. List of Abbreviations

03. Scope of the Report

  • 03.1. Market Overview

04. Market Research Methodology

  • 04.1. Market Research Process
  • 04.2. Research Methodology

05. Introduction

  • 05.1. Market Traction

06. Latin America: Statistics

07. Market Insights

  • 07.1. Cellphone Users in Latin America by Country
    • 07.1.1. Cellphone Penetration in Latin America by Country 2013-2014
  • 07.2. Mobile Internet Users in Latin America

08. Cyber Attacks: Mobile Security

  • 08.1. Methods of Securing Mobile Devices
    • 08.1.1. Encrypt Mobile Devices
    • 08.1.2. Mobile Encryption Applications
    • 08.1.3. MDM

09. Emerging Mobile Security Technology

  • 09.1. Containerization
  • 09.2. Mobile Multi-factor Authentication

10. Market Description

  • 10.1. Mobile Security Architecture
  • 10.2. Types of Attacks
    • 10.2.1. Hardware-centric Attacks
    • 10.2.2. Software-centric Attacks
    • 10.2.3. Device Independent Attacks
    • 10.2.4. User Layer Attacks
  • 10.3. Types of Threats
    • 10.3.1. Trojan
    • 10.3.2. Virus
    • 10.3.3. Worms
    • 10.3.4. Adware
    • 10.3.5. Keylogger
    • 10.3.6. Backdoor
    • 10.3.7. Exploit
    • 10.3.8. Dropper
    • 10.3.9. Phishing
    • 10.3.10. Crimeware
    • 10.3.11. Cookies
    • 10.3.12. Bluesnarfing
    • 10.3.13. Boot Sector Virus
    • 10.3.14. Mousetrapping
    • 10.3.15. Browser Hijackers
    • 10.3.16. Obfuscated Spam
  • 10.4. iOS and Android Threats
  • 10.5. Life Cycle of Mobile Security
  • 10.6. Causes of Mobile Viruses
    • 10.6.1. Rogue Apps
    • 10.6.2. Internet Connections
    • 10.6.3. Connecting to Infected Computers
    • 10.6.4. Bluetooth
  • 10.7. Advantages of Mobile Security Solutions

11. Market Landscape

  • 11.1. Market Overview
  • 11.2. Product Life Cycle Analysis
  • 11.3. Global Mobile Security Market
    • 11.3.1. Market Size and Forecast
  • 11.4. Latin America in Global Mobile Security Market 2014
  • 11.5. Latin America in Global Mobile Security Market 2014-2019
  • 11.6. Mobile Security Market in Latin America
    • 11.6.1. Market Size and Forecast
  • 11.7. Five Forces Analysis

12. Buying Criteria

13. Market Growth Drivers

14. Drivers and their Impact

15. Market Challenges

16. Impact of Drivers and Challenges

17. Market Trends

18. Trends and their Impact

19. Vendor Landscape

  • 19.1. Competitive Scenario
  • 19.2. Global Mobile Security News Updates
    • 19.2.1. Key News
    • 19.2.2. Mergers and Acquisitions
  • 19.3. Major Vendors 2014
  • 19.4. Description of Major Vendors
    • 19.4.1. Checkpoint Software Technologies
    • 19.4.2. Mobile Security Product Offerings
    • 19.4.3. Cisco Systems
    • 19.4.4. Mobile Security Product Offerings
    • 19.4.5. Kaspersky Lab
    • 19.4.6. Mobile Security Product Offerings
    • 19.4.7. McAfee
    • 19.4.8. Mobile Security Product Offerings
    • 19.4.9. Symantec
    • 19.4.10. Mobile Security Product Offerings
  • 19.5. Other Prominent Vendors

20. Key Vendor Analysis

  • 20.1. Check Point Software
    • 20.1.1. Key Facts
    • 20.1.2. Business Overview
    • 20.1.3. Business Strategy
    • 20.1.4. Recent Developments
    • 20.1.5. SWOT Analysis
  • 20.2. Cisco Systems
    • 20.2.1. Key Facts
    • 20.2.2. Business Overview
    • 20.2.3. Business Segmentation by Revenue
    • 20.2.4. Geographical Segmentation by Revenue
    • 20.2.5. Business Strategy
    • 20.2.6. Key Information
    • 20.2.7. SWOT Analysis
  • 20.3. Kaspersky Lab
    • 20.3.1. Key Facts
    • 20.3.2. Business Overview
    • 20.3.3. Business Segmentation
    • 20.3.4. Business Strategy
    • 20.3.5. Recent Developments
    • 20.3.6. SWOT Analysis
  • 20.4. McAfee
    • 20.4.1. Key Facts
    • 20.4.2. Business Overview
    • 20.4.3. Product Segmentation
    • 20.4.4. Key Locations
    • 20.4.5. Business Strategy
    • 20.4.6. Recent Developments
    • 20.4.7. SWOT Analysis
  • 20.5. Symantec
    • 20.5.1. Key Facts
    • 20.5.2. Business Overview
    • 20.5.3. Business Segmentation by Revenue 2013
    • 20.5.4. Business Segmentation by Revenue 2013 and 2014
    • 20.5.5. Geographical Segmentation by Revenue 2013
    • 20.5.6. Business Strategy
    • 20.5.7. Recent Developments
    • 20.5.8. SWOT Analysis

21. Other Reports in this Series

List of Exhibits

  • Exhibit 1: Market Research Methodology
  • Exhibit 2: Cellphone Users in Latin America by Country 2013-2014 (Millions)
  • Exhibit 3: Cellphone Penetration in Latin America by Country 2013-2014
  • Exhibit 4: Mobile Internet Users in Latin America (Millions)
  • Exhibit 5: Mobile Security Architecture
  • Exhibit 6: Types of Attacks
  • Exhibit 7: iOS and Android Threats
  • Exhibit 8: Life Cycle of Mobile Security
  • Exhibit 9: Product Life Cycle Analysis
  • Exhibit 10: Global Mobile Security Market 2014-2019 ($ Billions)
  • Exhibit 11: Latin America in Global Mobile Security Market 2014
  • Exhibit 12: Latin America in Global Mobile Security Market 2014-2019
  • Exhibit 13: Mobile Security Market in Latin America 2014-2019 ($ Billions)
  • Exhibit 14: Major Vendors in Mobile Security Market in Latin America 2014
  • Exhibit 15: Business Segmentation of Cisco Systems by Revenue 2013
  • Exhibit 16: Business Segmentation of Cisco Systems by Revenue 2011-2013 ($ billions)
  • Exhibit 17: Geographical Segmentation of Cisco Systems by Revenue 2013
  • Exhibit 18: Kaspersky Lab: Business Segmentation
  • Exhibit 19: McAfee: Product Segmentation 2013
  • Exhibit 20: McAfee: Key Locations
  • Exhibit 21: Symantec: Business Segmentation by Revenue 2013
  • Exhibit 22: Symantec: Business Segmentation by Revenue 2013 and 2014 ($ million)
  • Exhibit 23: Symantec: Geographical Segmentation by Revenue 2013
Back to Top