Home > Research > Mobile Security Solutions

Mobile Security Solutions

Market report - 10/05/2016 Mobile Security Solutions

An increasingly insecure mobile environment - Markets, trends & technologies

This report examines the world of mobile security, providing a broad overview of the main players, their strategies and positioning, future trends and the market as a whole – its structuring and value chain (hardware, devices, IT, security, telcos).
It examines the threats for mobile, their reach and assessed prevalence. In parallel, the report details key technologies – in use and those upcoming – aimed to secure mobile platforms.
Finally, the report provides a strategic analysis of the key drivers and hurdles regarding the mobile security solution market, coming along with data and forecast of the market in value.


Reference Language Support Nbr of page Price  
M16136MR ukPDF 82 3000 euros excl. VAT order
1. Executive Summary

2. Methodology and scope
 2.1. General methodology of IDATE's reports
 2.2. Scope

3. Mobile security threats, solutions and applications
 3.1. Mobile security threats
 3.1.1. Specificities of mobile platforms
 3.1.2. Threats and attacks
 3.2. Mobile Security Solutions across platforms
 3.2.1. Overview
 3.2.2. Baseline protection: Mobile OS and mobile networks
 3.2.3. Security frameworks and mobile security applications
 3.2.4. Security key enabling technologies

4. Market structure and player strategies
 4.1. Market structure
 4.1.1. Value chain
 4.1.2. Access to market
 4.1.3. Table of market players
 4.2. Hardware enabler providers
 4.2.1. Secure element and trusted execution environment
 4.2.2. Biometric technology
 4.3. Baseline protection providers
 4.3.1. OS providers
 4.3.2. Device manufacturers
 4.3.3. Mobile network operators
 4.4. Security solution players
 4.4.1. Pure players
 4.4.2. Security solution providers
 4.4.3. IT-solution providers

5. Strategic analysis
 5.1. Key drivers
 5.1.1. Technological push
 5.1.2. New mobile use cases requiring security
 5.1.3. Regulation
 5.1.4. Device market maturity
 5.2. Barriers
 5.2.1. Rising baseline protection
 5.2.2. Lack of strong consumer demand
 5.2.3. Device market cost sensitivity
 5.3. Market development and forecasts
 5.3.1. Key trends
 5.3.2. Major uncertainties
 5.3.3. Market forecast
Tables
Table 1: Type of malware attacks
Table 2: Means of propagation of malware attacks
Table 3: Comparison of Android OS and iOS security features
Table 4: Types of secure elements
Table 5: Compared protection offered by secure elements, TEE and mobile OS
Table 6: Mobile security solutions' market players
Table 7: Gemalto mobileID solution
Table 8: Lookout consumer offering Free and Premium
Table 9: User concerns around mobile identity and personal data

Figures
Figure 1: Mobile platform vulnerabilities
Figure 2: Mobile threats, attacker strategies
Figure 3: Number of Android malwares identified
Figure 4: Number of new mobile malwares identified by McAfee
Figure 5: New malwares (non-mobile) identified by McAfee
Figure 6: Devices with known potential harmful applications
Figure 7: Geography of mobile malware encounter rates, Q3 2015 (% of users attacked)
Figure 8: Web navigation shifts to mobile
Figure 9: Global in-store mobile payment volume
Figure 10: IoT development in volume
Figure 11: Overview of mobile security solutions
Figure 12: iOS security architecture
Figure 13: Abstract overview of mobile networks
Figure 14: Avast Mobile Security and Antivirus
Figure 15: Kaspersky Internet Security
Figure 16: Android Device Manager
Figure 17: Management of mobile devices, content and applications
Figure 18: Protection of corporate network against external mobiles
Figure 19: Using the mobile for authentication
Figure 20: Multifactor authentication
Figure 21: The secure element, as a microSD, UICC embedded in the device
Figure 22: Secure element application domains
Figure 23: Samsung Galaxy S6 Edge, fingerprint sensor
Figure 24: Components of TouchID
Figure 25: Rich OS and TEE comparison
Figure 26: Security in the mobile value chain
Figure 27: NFC positioning on the security market
Figure 28: Synaptics products in the SmartPhone
Figure 29: Fingerprint Cards sensors
Figure 30: AuthenTec, the fingerprint sensor company bought by Apple
Figure 31: Android 6.0 privacy control
Figure 32: Android Pay
Figure 33: Samsung Pay, emulation of a magnetic card swipe
Figure 34: LG Gate Enterprise solution
Figure 35: Keeper partnership with HTC
Figure 36: Sony myXperia software
Figure 37: BlackBerry Priv (Android based)
Figure 38: Blackphone 2
Figure 39: Verizon Total Mobile Protection offering
Figure 40: Telefσnica ElevenPaths Latch security solution
Figure 41: T-Mobile MyWallet
Figure 42: MobileIron telco partnerships
Figure 43: Security multifactor authentication for password management
Figure 44: Kaspersky Android wearables application
Figure 45: Avast mobile application ecosystem
Figure 46: Avast Virtual Mobile Platform
Figure 47: VMWare vision of next EMM challenges: Identity management and virtualisation
Figure 48: Citrix XenMobile security compliance engine
Figure 49: Iris scanner on Fujitsu NX F04G
Figure 50: Parasol, a new application dedicated to privacy protection using Android 6.0+ privacy controls
Figure 51: Increasing convergence in mobile/PC platforms
Figure 52: Mobile device: shipments by region
Figure 53: The threat of rising baseline protections and possible roads to market for B2C solutions
Figure 54: Credibility of players for the provision of online information
Figure 55: Security feeling, age and smart cards
Figure 56: The gap between use and trust
Figure 57: Global mobile security market (2015 - 2020)
Figure 58: Global B2B market for mobile security solutions (2015 - 2020)
Figure 59: Global B2C market for mobile security solutions (2015 - 2020)
• Alipay
• AMD
• Apple
• ARM
• Asurion
• ASUS
• AT&T
• Atmel
• Authentec
• Avast
• Barclays
• bitdefender
• Blackberry
• CA Technologies
• CheckPoint
• Citrix
• Elevenpath
• Ericsson
• Fiberlink
• Fingerprint Card
• FireEye
• Fujitsu
• GDATA
• Gemalto
• Giesecke & Devrient
• GlobalPlatform
• Good
• Google
• GSMA
• HTC
• Huawei
• IBM
• Intel Security / McAfee
• JAMF Software
• Kaspersky
• KDDI
• LedgaCore
• LG
• Lookout Security
• Microsoft
• Mobile Iron
• Motorola
• NVIDIA
• NXP
• Oberthur
• O-film
• Orange
• Parasol
• Precise Biometrics
• Qualcomm
• Samsung
• SAP
• Silent Circle
• Softcard
• Solacia
• Sony
• Sophos
• SOTI
• Sprint
• ST
• Sybase
• Symantec
• Synaptics
• Telefσnica
• T-Mobile
• TPK
• Trustonic
• Trustwave
• Verizon
• VMWare
• Vodafone
• Widepoint
Overview of Mobile Security Solutions - Main solutions and technologies
 • Threats targeting the mobile platform
 • Existing mobile security solutions
 • Mobile security solutions on the value chain
 • Main players

A relatively secure platform - The mobile platform currently appears relatively more secure than the PC
 • Mobile threat prevalence
 • Strong baseline protection

Rising security risks - New threats will challenge the security of the mobile platform
 • A shift in usage
 • A shift in trust sensitivity
 • Mobile Security Solution market

A growing sector with important variation - The growth of the mobile sector hides disparities between sector and technologies
 • Mobile security solutions B2B market
 • Mobile security solutions B2C market
 • Access to the B2C market
See full list of publications related to Future Networks



Top 
rss

News

Contact

Isabel JIMENEZ
Commercial Contact
P: +33 (0)467 144 404
F: +33 (0)467 144 400
E-mail
Bertrand COPIGNEAUX
Senior Innovation Consultant
P: +33 (0)467 144 405
E-mail

Download

Register to our newsletter