Cover Image
市場調查報告書

企業的行動安全解決方案的全球市場

The Global Market for Mobile Security Solutions in the Enterprise

出版商 VDC Research Group, Inc. 商品編碼 282867
出版日期 內容資訊 英文 51 Pages, 23 Exhibits
商品交期: 最快1-2個工作天內
價格
Back to Top
企業的行動安全解決方案的全球市場 The Global Market for Mobile Security Solutions in the Enterprise
出版日期: 2014年08月25日 內容資訊: 英文 51 Pages, 23 Exhibits
簡介

商務上使用的行動裝置數、種類飛躍性地增加,堅牢安全的必要性前所未有地顯著。對企業來說,正確的行動策略增加利益和生產率,可改善客戶關係與服務。可是,現代的移動平台,對日益程度提高、多樣化的安全風險變得脆弱。建立正確的安全方法,有助於由公司應對這些威脅,同時有效利用行動可能進行服務的巨大優點。

本報告提供全球行動安全市場相關調查、行動安全形勢的發展趨勢、尋求行動安全的企業、主要的市場參與企業、安全供應商的企業BYOD課題的措施,及供應商各級的競爭情形等分析。

摘要整理

行動安全的發展

  • 行動安全的促進要素
  • 行動安全預算擴大
  • 對MDM滿足的終端用戶 - 但這是不夠的
  • 行動的威脅
  • 異種引進環境增加複雜性
  • 把安全列入考慮之內的應用設計

競爭情形

  • 分層行動安全:設備、應用及網路的保證

競爭情形:各供應商等級

  • 終端OEM:OS的強化
    • Apple
    • BlackBerry
    • Google
    • HTC
    • Samsung
    • Microsoft
    • Motorola Solutions Inc. (MSI)
  • EMM/kontenaraizeshon
    • VMware/AirWatch
    • Citrix
    • Good Technology
    • IBM
    • LANDesk
    • MobileIron
    • Oracle
    • SAP
    • SOTI
  • 網路存取控制(NAC)
    • Aruba Networks
    • ForeScout
    • Juniper Networks (Pulse Secure LLC)
    • NetMotion Wireless
    • Trustwave Holdings
  • 雙重個人/虛擬化方法
    • AT&T
    • Cellrox
    • MobileSpaces
  • 行動安全專業公司
    • Bluebox
    • Mocana
    • Arxan
    • MobileO2
    • Websense
  • 認證
    • Okta
    • Ping Identity
    • Symplified
    • SecureAuth
    • Centrify

流通管道分析

關於本調查

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

目錄

The transformation of mobile solutions has been one of the more dramatic in the history of technology. With the number and variety of mobile devices used to conduct business growing at an exponential rate, the need for robust security could not be more pronounced. For the enterprise, the correct mobile strategy can boost profits and productivity and improve customer relations and service. However, modern mobile platforms are different and are vulnerable to an increased level and a greater variety of security risks than the established world of IT. These threats are not specific to mobile security, but mobility itself brings additional risks. Creating the right security approach will help enterprises to address these threats while taking advantage of the huge benefits mobile enablement offers.

There are three main targets for threats - information, identity, and availability. Mobile devices are personal and used for both private and business productivity even more in the context of a bring-your-own-device (BYOD) company scenario. Devices typically store valuable and often sensitive information; keeping that information secure is vital. The consequences of a malicious third party gaining access to personal financial information, for example, could be disastrous and irreparable. With mobile devices gathering personal, often photographic, information about where the owner lives, works, and spends his or her leisure time, the consequences of a mobile device getting into the wrong hands could be truly catastrophic. And with devices being used for work and leisure, the possibility of sensitive business information getting into the wrong hands could have much, much wider - and potentially massive - implications.

What questions are addressed

  • How is the mobile security landscape evolving
  • Who will enterprises turn to for their mobile security
  • How will large and established vendors participate
  • Are EMM vendors positioned to cater to the mobile security needs in the enterprise
  • How critical is application security
  • How are security vendors tackling the challenges of BYOD in the enterprise

Executive Summary

The line between the personal computers and mobile devices has already blurred. While the mobile hardware race is in full swing, so too is the battle among mobile ISVs, who aim to be the primary provider for an increasingly broad range of mobile solutions for today's enterprise. Mobile device deployments continue to expand in enterprise environments and are being integrated into workers' daily activities in companies of all sizes. This trend is making mobile IT infrastructure investments for mobile management and security a priority for CIOs, CISOs, and IT leaders. Protecting data on a server is one thing, but protecting data in motion is another. The increasing use of mobile devices in the enterprise has us carrying around (and potentially exposing) more information than ever. A typical mobile device is likely to contain both personal and work-related data including emails, email attachments, voice mails, text messages, and private corporate data. Every mobile-enabled worker is holding a gateway into the enterprise network and access to sensitive and/or confidential data. Safeguarding intellectual property and business information from theft and misuse is a critical management issue, making security a core business function, regardless of whether a user is in the C-suite or on the lowest rung on the corporate ladder.

The cost of data breaches can be enormous, not only in dollars but also in lost time, productivity, and an overall feeling of organizational well-being. These trends make crafting and implementing comprehensive mobile policies critical for sustainable and effective mobile enablement.

[Data available in full report.]

Key Findings

  • Ownership models such as BYOD are continuing to impact mobile security investments as manually managing mobile platforms in heterogeneous deployment environments is not viable or cost-effective. XX% of respondents expect their investments in mobile security to expand in the next 12 months.
  • Application security practitioners will be best served by embracing the fact that mobile apps require new protections beyond the use of traditional secure coding techniques.
  • EMM vendors are challenged to keep pace with the changing security requirements in larger deployment environments as mobility becomes strategic to the business.
  • Mobile enablement introduces threats to enterprise IT that cannot be offset, mitigated, or prevented by a single technology solution. This has made a layered approach to security crucial to ensure the protection of the corporate data.
  • Just X% of survey respondents had an application security program in place that was specific to mobile applications. Mobile security investments are being driven by the need for enterprises to conform to stricter data protection and compliance practices.
  • Handset OEMs are not only innovating on design but are implementing hardware-enhanced security techniques. These vendors are also partnering effectively to successfully bring to fruition the concept of an enterprise-grade smartphone.

Table of Contents

Executive Summary

Mobile Security's Evolution

  • Mobile Security Drivers
    • Exhibit 1: Budget Determinants Driving Mobile Security Investments
    • Exhibit 2: Top 3 Barriers to Organization's Recognition/Implementation of Mobility Objectives
  • Mobile Security Budgets are Expanding
    • Exhibit 3: Anticipated Change in Mobile Security Budget (next 12 months)
    • Exhibit 4: Satisfaction with Level of Security Provided in Current MDM Solution
  • End Users are Satisfied with MDM - But It's Not Enough
    • Exhibit 5: Confidence in Mobile Security Policies Currently in Place
    • Exhibit 6: Which of the following mobile management controls/capabilities does your organization have in place
  • Mobile Threats
    • Exhibit 7: Greatest Threat to Mobile IT Security
  • Heterogeneous Deployment Environments Add Complexity
    • Exhibit 8: Impact of Supporting Multiple Mobile Platforms
  • App Design with Security in Mind
    • Exhibit 9: Tenure of App Security Program
    • Exhibit 10: Security Practices Implemented During Mobile Application Development

Competitive Landscape

  • Layered Mobile Security: Securing Devices, the Applications, and the Network
    • Exhibit 11: A Layered Approach to Mobile Security Required
    • Exhibit 12: The OWASP Top 10 Mobile Security Risks for 2014

Competitive Landscape by Vendor Class

  • Handset OEMs - Hardening the OS
    • Apple
    • BlackBerry
    • Google
    • HTC
    • Samsung
    • Microsoft
    • Motorola Solutions Inc. (MSI)
  • EMM/Containerization
    • VMware/AirWatch
    • Citrix
    • Good Technology
    • IBM
    • LANDesk
    • MobileIron
    • Oracle
    • SAP
    • SOTI
  • Network Access Control (NAC)
    • Aruba Networks
    • ForeScout
    • Juniper Networks (Pulse Secure LLC)
    • NetMotion Wireless
    • Trustwave Holdings
  • Dual Persona/Virtualization Approach
    • AT&T
    • Cellrox
    • MobileSpaces
  • Mobile Security Specialists
    • Bluebox
    • Mocana
    • Arxan
    • MobileO2
    • Websense
  • Authentication
    • Okta
    • Ping Identity
    • Symplified
    • SecureAuth
    • Centrify

Channel Insights

Back to Top