Cover Image
市場調查報告書

行動安全解決方案:愈來愈變得不穩定的行動環境 - 市場、趨勢、技術

Mobile Security Solutions: An Increasingly Insecure Mobile Environment - Markets, Trends & Technologies

出版商 IDATE DigiWorld 商品編碼 357775
出版日期 內容資訊 英文 82 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
行動安全解決方案:愈來愈變得不穩定的行動環境 - 市場、趨勢、技術 Mobile Security Solutions: An Increasingly Insecure Mobile Environment - Markets, Trends & Technologies
出版日期: 2016年05月12日 內容資訊: 英文 82 Pages
簡介

本報告提供全球行動安全解決方案市場的相關調查,對行動的威脅,保護行動平台的主要的與技術,市場結構與價值鏈,主要企業的策略定位,市場上未來趨勢,及市場主要影響因素等相關分析。

第1章 摘要整理

第2章 調查手法、範圍

第3章 行動安全的威脅、解決方案、應用

  • 行動安全的威脅
    • 行動平台的規格
    • 威脅、攻擊
  • 平台整體行動安全解決方案
    • 概要
    • 基準保護:行動OS、行動網路
    • 安全的組成架構、行動安全的應用
    • 安全鑰匙賦能技術

第4章 市場結構、企業策略

  • 市場結構
    • 價值鏈
    • 市場進入
    • 市場參與企業的圖
  • 硬體設備啟用供應商
    • 安全要素、可信任執行環境
    • 生物識別技術
  • 基準保護供應商
    • OS供應商
    • 設備廠商
    • 行動網路業者
  • 安全解決方案企業
    • 專業公司
    • 安全解決方案供應商
    • IT解決方案供應商

第5章 策略分析

  • 主要的促進要素
    • 技術的推動
    • 要求安全的新的行動利用案例
    • 法規
    • 設備市場成熟
  • 障礙
    • 基準保護的增加
    • 穩定的消費者需求的不足
    • 設備市場價格敏銳度
  • 市場發展、預測
    • 主要趨勢
    • 主要的不確定性
    • 市場預測

圖表

目錄
Product Code: M16136MR

This report examines the world of mobile security, providing a broad overview of the main players, their strategies and positioning, future trends and the market as a whole - its structuring and value chain (hardware, devices, IT, security, telcos).

It examines the threats for mobile, their reach and assessed prevalence. In parallel, the report details key technologies - in use and those upcoming - aimed to secure mobile platforms.

Finally, the report provides a strategic analysis of the key drivers and hurdles regarding the mobile security solution market, coming along with data and forecast of the market in value.

Table of Contents

1. Executive Summary

2. Methodology and scope

  • 2.1. General methodology of IDATE's reports
  • 2.2. Scope

3. Mobile security threats, solutions and applications

  • 3.1. Mobile security threats
  • 3.1.1. Specificities of mobile platforms
  • 3.1.2. Threats and attacks
  • 3.2. Mobile Security Solutions across platforms
    • 3.2.1. Overview
    • 3.2.2. Baseline protection: Mobile OS and mobile networks
    • 3.2.3. Security frameworks and mobile security applications
    • 3.2.4. Security key enabling technologies

4. Market structure and player strategies

  • 4.1. Market structure
    • 4.1.1. Value chain
    • 4.1.2. Access to market
    • 4.1.3. Table of market players
  • 4.2. Hardware enabler providers
    • 4.2.1. Secure element and trusted execution environment
    • 4.2.2. Biometric technology
  • 4.3. Baseline protection providers
    • 4.3.1. OS providers
    • 4.3.2. Device manufacturers
    • 4.3.3. Mobile network operators
  • 4.4. Security solution players
    • 4.4.1. Pure players
    • 4.4.2. Security solution providers
    • 4.4.3. IT-solution providers

5. Strategic analysis

  • 5.1. Key drivers
    • 5.1.1. Technological push
    • 5.1.2. New mobile use cases requiring security
    • 5.1.3. Regulation
    • 5.1.4. Device market maturity
  • 5.2. Barriers
    • 5.2.1. Rising baseline protection
    • 5.2.2. Lack of strong consumer demand
    • 5.2.3. Device market cost sensitivity
  • 5.3. Market development and forecasts
    • 5.3.1. Key trends
    • 5.3.2. Major uncertainties
    • 5.3.3. Market forecast

List of Tables

  • Table 1: Type of malware attacks
  • Table 2: Means of propagation of malware attacks
  • Table 3: Comparison of Android OS and iOS security features
  • Table 4: Types of secure elements
  • Table 5: Compared protection offered by secure elements, TEE and mobile OS
  • Table 6: Mobile security solutions' market players
  • Table 7: Gemalto mobileID solution
  • Table 8: Lookout consumer offering Free and Premium
  • Table 9: User concerns around mobile identity and personal data

List of Figures

  • Figure 1: Mobile platform vulnerabilities
  • Figure 2: Mobile threats, attacker strategies
  • Figure 3: Number of Android malwares identified
  • Figure 4: Number of new mobile malwares identified by McAfee
  • Figure 5: New malwares (non-mobile) identified by McAfee
  • Figure 6: Devices with known potential harmful applications
  • Figure 7: Geography of mobile malware encounter rates, Q3 2015 (% of users attacked)
  • Figure 8: Web navigation shifts to mobile
  • Figure 9: Global in-store mobile payment volume
  • Figure 10: IoT development in volume
  • Figure 11: Overview of mobile security solutions
  • Figure 12: iOS security architecture
  • Figure 13: Abstract overview of mobile networks
  • Figure 14: Avast Mobile Security and Antivirus
  • Figure 15: Kaspersky Internet Security
  • Figure 16: Android Device Manager
  • Figure 17: Management of mobile devices, content and applications
  • Figure 18: Protection of corporate network against external mobiles
  • Figure 19: Using the mobile for authentication
  • Figure 20: Multifactor authentication
  • Figure 21: The secure element, as a microSD, UICC embedded in the device
  • Figure 22: Secure element application domains
  • Figure 23: Samsung Galaxy S6 Edge, fingerprint sensor
  • Figure 24: Components of TouchID
  • Figure 25: Rich OS and TEE comparison
  • Figure 26: Security in the mobile value chain
  • Figure 27: NFC positioning on the security market
  • Figure 28: Synaptics products in the SmartPhone
  • Figure 29: Fingerprint Cards sensors
  • Figure 30: AuthenTec, the fingerprint sensor company bought by Apple
  • Figure 31: Android 6.0 privacy control
  • Figure 32: Android Pay
  • Figure 33: Samsung Pay, emulation of a magnetic card swipe
  • Figure 34: LG Gate Enterprise solution
  • Figure 35: Keeper partnership with HTC
  • Figure 36: Sony myXperia software
  • Figure 37: BlackBerry Priv (Android based)
  • Figure 38: Blackphone 2
  • Figure 39: Verizon Total Mobile Protection offering
  • Figure 40: Telefónica ElevenPaths Latch security solution
  • Figure 41: T-Mobile MyWallet
  • Figure 42: MobileIron telco partnerships
  • Figure 43: Security multifactor authentication for password management
  • Figure 44: Kaspersky Android wearables application
  • Figure 45: Avast mobile application ecosystem
  • Figure 46: Avast Virtual Mobile Platform
  • Figure 47: VMWare vision of next EMM challenges: Identity management and virtualisation
  • Figure 48: Citrix XenMobile security compliance engine
  • Figure 49: Iris scanner on Fujitsu NX F04G
  • Figure 50: Parasol, a new application dedicated to privacy protection using Android 6.0+ privacy controls
  • Figure 51: Increasing convergence in mobile/PC platforms
  • Figure 52: Mobile device: shipments by region
  • Figure 53: The threat of rising baseline protections and possible roads to market for B2C solutions
  • Figure 54: Credibility of players for the provision of online information
  • Figure 55: Security feeling, age and smart cards
  • Figure 56: The gap between use and trust
  • Figure 57: Global mobile security market (2015 - 2020)
  • Figure 58: Global B2B market for mobile security solutions (2015 - 2020)
  • Figure 59: Global B2C market for mobile security solutions (2015 - 2020)

List of players

  • Alipay
  • AMD
  • Apple
  • ARM
  • Asurion
  • ASUS
  • AT&T
  • Atmel
  • Authentec
  • Avast
  • Barclays
  • bitdefender
  • Blackberry
  • CA Technologies
  • CheckPoint
  • Citrix
  • Elevenpath
  • Ericsson
  • Fiberlink
  • Fingerprint Card
  • FireEye
  • Fujitsu
  • GDATA
  • Gemalto
  • Giesecke & Devrient
  • GlobalPlatform
  • Good
  • Google
  • GSMA
  • HTC
  • Huawei
  • IBM
  • Intel Security / McAfee
  • JAMF Software
  • Kaspersky
  • KDDI
  • LedgaCore
  • LG
  • Lookout Security
  • Microsoft
  • Mobile Iron
  • Motorola
  • NVIDIA
  • NXP
  • Oberthur
  • O-film
  • Orange
  • Parasol
  • Precise Biometrics
  • Qualcomm
  • Samsung
  • SAP
  • Silent Circle
  • Softcard
  • Solacia
  • Sony
  • Sophos
  • SOTI
  • Sprint
  • ST
  • Sybase
  • Symantec
  • Synaptics
  • Telefónica
  • T-Mobile
  • TPK
  • Trustonic
  • Trustwave
  • Verizon
  • VMWare
  • Vodafone
  • Widepoint

Slideshow contents

Overview of Mobile Security Solutions - Main solutions and technologies

  • Threats targeting the mobile platform
  • Existing mobile security solutions
  • Mobile security solutions on the value chain
  • Main players

A relatively secure platform - The mobile platform currently appears relatively more secure than the PC

  • Mobile threat prevalence
  • Strong baseline protection

Rising security risks - New threats will challenge the security of the mobile platform

  • A shift in usage
  • A shift in trust sensitivity
  • Mobile Security Solution market

A growing sector with important variation - The growth of the mobile sector hides disparities between sector and technologies

  • Mobile security solutions B2B market
  • Mobile security solutions B2C market
  • Access to the B2C market
Back to Top