Cover Image
市場調查報告書

企業行動安全的全球市場:方便安全的存取:市場佔有率與成長趨勢

Enterprise Mobility Security - Convenient and Secure Access - Market Shares and Growth Trends to 2021

出版商 Mordor Intelligence LLP 商品編碼 319134
出版日期 內容資訊 英文 166 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
企業行動安全的全球市場:方便安全的存取:市場佔有率與成長趨勢 Enterprise Mobility Security - Convenient and Secure Access - Market Shares and Growth Trends to 2021
出版日期: 2016年10月01日 內容資訊: 英文 166 Pages
簡介

Bring Your Own Device(帶入個人擁有的設備)(BYOD)為企業帶來了革命,不過,同時對重要資料的存取沒有恰當安全對策的各種設備的存在成為風險。2014年為7億3,500萬美元規模的企業行動安全市場,預計2019年規模成長到31億2,000萬美元。

本報告提供全球企業行動安全市場相關調查分析、市場概要、推動市場的要素與抑制因素、市場區隔考察、主要企業等相關彙整。

第1章 簡介

  • 調查方法
  • 調查概要
  • 主要調查結果
  • 摘要整理

第2章 技術相關短評與趨勢

  • 市場概要
  • 目前技術趨勢
  • 藍圖
  • 創新
  • 實施
  • 成長預測
  • 風險VS隱私

第3章 促進要素與抑制因素

  • 促進要素
  • 商務加速器的影響
  • 抑制因素
  • 產業課題的影響

第4章 BYOD的方法

  • 有存取限制的BYOD
  • 混合BYOD
  • CYOD

第5章 BYOD的安全相關產業方針

  • HIPAA
  • CIPA
  • FIPS
  • FISMA

第6章 目前出入控管法

  • 存取政策管理
  • 應用防火牆
  • 認證
  • 分離網路
  • 行動裝置管理
  • 單點登錄
  • VPN存取
  • 代理伺服器

第7章 市場區隔:各產業

  • 銀行/保險
  • 醫療
  • 專門服務
  • 製造
  • 旅遊/交通/物流
  • 法律服務
  • 資訊技術
  • 聯邦政府
  • 通訊
  • 零售
  • 地方機構
  • 生命科學
  • 娛樂/媒體

第8章 市場區隔:設備安全

  • 智慧型手機
  • 筆記型電腦
  • 平板電腦

第9章 相關利益者分析

  • Good Technology
  • MobileIron, Inc.
  • AirWatch
  • Blackberry
  • Citrix Systems, Inc.
  • Microsoft Corporation
  • Cisco Systems, Inc.
  • Fiberlink Communications Corp.
  • McAfee, Inc.
  • Symantec Corporation
  • SAP
  • 其他

第10章 市場方案

  • 競爭情形
  • M&A
  • 主要產業統計

第11章 投資分析

  • 投資者網路
  • 資金籌措模式和詳細內容
  • 今後預測

第12章 主要專利

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

目錄

Computing is becoming prominent, with unlimited access to information from any device, irrespective of the location. To meet this particular demand, an enterprise needs to manage and secure large, complex, distributed, and changing environments both within the traditional and public facilities, with limited visibility into controls.

Over 50% of the corporations in the world allow employees to access company data with some sort of access restriction and this number is only going to grow with the gradual adoption of cloud computing. Small and medium-sized businesses have been at the forefront of the BYOD trend, with almost 62% of the US SMBs having an official Bring Your Own Device (BYOD) policy in place. Spurred by this enormous growth in the BYOD market, the enterprise mobility security market is expected to grow at a CAGR of 32% from USD 735 million in 2014 to USD 3.89 billion by 2020.

BYOD has revolutionized the way corporates function, but it has also opened up the risk of the presence of devices without proper security covering data. This has called for security policies which could assess the risks involved and avoid them. The existing policies are static, resulting in unexpected failures when new threats arise. This situation has resulted in firms looking for devices which can imbibe cognitive mobility that enables appropriate security policy in the right place at the right time. Integrating such cognitive systems could also pose a major challenge because of the different types of platforms involved.

DRIVERS

The driving forces for the mobility security market are:

  • The need for data security
  • Misuse of corporate bandwidth
  • Remote device management
  • Growing adoption of BYOD across industries

RESTRAINTS

Some of the biggest challenges of the mobile security market are:

  • Infrastructure cost of solutions
  • Incompatibility with present-day device management solutions
  • IT support issues
  • Lack of proper skill-set to operate the same

WHAT THE REPORT OFFERS

  • Enterprise mobility security - convenient and secure access market overview and market analysis along with its applications in the industry and information on drivers and restraints.
  • Identification of factors responsible for changing the market scenario, rising prospective opportunities and identification of key companies that can influence the market on a global and regional scale.
  • Extensively researched competitive landscape with profiles of major companies along with their market share.
  • A comprehensive list of key market players along with the analysis of their current strategic interests and key financial information.

Table of Contents

1. Introduction

  • 1.1. Research Methodology
  • 1.2. Research Outline
  • 1.3. Key Findings
  • 1.4. Executive Summary

2. Technology Snapshot and Trends

  • 2.1. Market Overview
  • 2.2. Current Technology Trends
  • 2.3. Roadmap
  • 2.4. Innovations
  • 2.5. Implementation
  • 2.6. Growth Prospects
  • 2.7. Risk vs Privacy

3. Drivers and Restraints

  • 3.1. Driving Forces
    • 3.1.1. Need for Data Security
    • 3.1.2. Misuse of Corporate Bandwidth
    • 3.1.3. Remote Device Management
    • 3.1.4. Adoption of BYOD across Industries
  • 3.2. Impact of Business Accelerators
  • 3.3. Restraints
    • 3.3.1. Infrastructure Cost of Solutions
    • 3.3.2. Incompatibility with Present Day Device Management Solutions
    • 3.3.3. IT Support Issues
    • 3.3.4. Lack of Skillset
  • 3.4. Impact of Business Challenges

4. Approaches to BYOD

  • 4.1. Limited Access BYOD
    • 4.1.1. Security Issues
  • 4.2. Hybrid BYOD
    • 4.2.1. Security Issues
  • 4.3. CYOD
    • 4.3.1. Security Issues

5. Industry Policies Related to BYOD Security

  • 5.1. HIPAA
  • 5.2. CIPA
  • 5.3. FIPS
  • 5.4. FISMA

6. Current Access Control Methods

  • 6.1. Access Policy Management
  • 6.2. Application Firewall
  • 6.3. Authentication
  • 6.4. Segregated Networks
  • 6.5. Mobile Device Management
    • 6.5.1. Approaches
    • 6.5.2. Security
    • 6.5.3. Device Platforms
  • 6.6. Single Sign-on
  • 6.7. VPN Access
  • 6.8. Proxy Server

7. Market segmentation by Industry Usage

  • 7.1. Banking/Insurance
    • 7.1.1. Market Share and Forecast
  • 7.2. Healthcare
    • 7.2.1. Market Share and Forecast
  • 7.3. Professional Services
    • 7.3.1. Market Share and Forecast
  • 7.4. Manufacturing
    • 7.4.1. Market Share and Forecast
  • 7.5. Travel and Transport/Logistics
    • 7.5.1. Market Share and Forecast
  • 7.6. Legal Services
    • 7.6.1. Market Share and Forecast
  • 7.7. Information Technology
    • 7.7.1. Market Share and Forecast
  • 7.8. Federal Government
    • 7.8.1. Market Share and Forecast
  • 7.9. Telecommunications
    • 7.9.1. Market Share and Forecast
  • 7.10. Retail
    • 7.10.1. Market Share and Forecast
  • 7.11. Local Government
    • 7.11.1. Market Share and Forecasts
  • 7.12. Life Sciences
    • 7.12.1. Market Share and Forecast
  • 7.13. Entertainment and Media
    • 7.13.1. Market Share and Forecast

8. Market Segmentation by Device Security

  • 8.1. Smartphones
    • 8.1.1. Market Share and Forecast
  • 8.2. Laptops
    • 8.2.1. Market Share and Forecast
  • 8.3. Tablets
    • 8.3.1. Market Share and Forecast

9. Stakeholder Analysis

  • 9.1. Good Technology
    • 9.1.1. Market Share
    • 9.1.2. Solution Analysis
  • 9.2. MobileIron
    • 9.2.1. Market Share
    • 9.2.2. Solution Analysis
  • 9.3. AirWatch
    • 9.3.1. Market Share
    • 9.3.2. Solution Analysis
  • 9.4. Blackberry
    • 9.4.1. Market Share
    • 9.4.2. Solution Analysis
  • 9.5. Citrix Systems, Inc.
    • 9.5.1. Market Share
    • 9.5.2. Solution Analysis
  • 9.6. Microsoft Corporation
    • 9.6.1. Market Share
    • 9.6.2. Solution Analysis
  • 9.7. Cisco Systems, Inc.
    • 9.7.1. Market Share
    • 9.7.2. Solution Analysis
  • 9.8. Fiberlink Communications Corp.
    • 9.8.1. Market Share
    • 9.8.2. Solution Analysis
  • 9.9. McAfee, Inc.
    • 9.9.1. Market Share
    • 9.9.2. Solution Analysis
  • 9.10. Symantec Corporation
    • 9.10.1. Market Share
    • 9.10.2. Solution Analysis
  • 9.11. SAP
    • 9.11.1. Market Share
    • 9.11.2. Solution Analysis
  • 9.12. Others
    • 9.12.1. Market Share
    • 9.12.2. Solution Analysis

10. Market Scenario

  • 10.1. Competitive Landscape
  • 10.2. Mergers and Acquisitions
  • 10.3. Key Industry Figures

11. Investment Analysis

  • 11.1. Investor Networks
  • 11.2. Funding Patterns and Details
  • 11.3. Expectations for the Future

12. Key Patents

Back to Top