Avoid falling behind your competitors, overlooking critical business opportunities or losing industry influence. The report also assesses technologies, competitive forces and expected product pipeline developments. Read on to discover the prospects for the mobile security sector and find out what its future market prospects are.
1. Report Overview
1.1 Current Mobile Security Market Overview
1.2 Mobile Malware Attacks on the Rise
1.3 Mobile Security Ecosystem
1.4 How This Report Delivers
1.5 Who is This Report For?
1.6 Methodology
1.7 Other Visiongain Reports Published in 2014
1.8 About Visiongain
2. Introduction to the Mobile Security Market
2.1 The Mobile Security Market Growing Rapidly
2.2 Mobile Security Market Definition
2.2.1 Device Security
2.2.2 Data Security
2.2.3 Network Security
2.2.4 Mobile Security Tools
2.3 Proliferation of Mobile Devices Leading to Rise in Security Threats
2.3.1 Mobile Malware Evolution
2.3.2 Trojans
2.3.3 Worms
2.3.4 Spyware
2.3.5 Spam
2.4 Mobile Threats Affect All Platforms
3. The Global Mobile Security Market
3.1 Mobile Security - A Major Concern for Consumers Worldwide
3.2 Extensive Growth in Mobile Security Market from 2013-2024
4. Top 20 Mobile Security (mSecurity) Companies Market Share
4.1 Top 20 Mobile Security (mSecurity) Companies 2013
4.2 Analysis of Mobile Security Vendors
5. Leading 20 Mobile Security Companies
5.1 AirWatch
5.1.1 Awards and Accolades
5.1.2 AirWatch Mobile Security Solution
5.2 Apple
5.2.1 Apple's Best Practices for Mobile Security
5.3 AVG
5.3.1 AVG Mobile Security Applications
5.3.2 AVG Retains Position of #1 Downloaded Security App
5.3.3 MTN Delivers AVG Mobile Security to South African Subscribers
5.4 BullGuard
5.4.1 BullGuard Mobile Security
5.5 ESET
5.5.1 ESET Mobile Security Solutions
5.6 Fiberlink, an IBM Company
5.6.1 MaaS360
5.7 Fixmo
5.7.1 Fixmo Enterprise Mobility Platform (Fixmo EMP)
5.7.1.1 Fixmo Sentinel
5.7.1.2 Fixmo SafeZone
5.7.2 Fixmo Announces Expanded Collaboration with Samsung
5.7.3 Fixmo to Provide Mobile Security to U.S. Department of Defense
5.8 F-Secure
5.8.1 F-Secure's Mobile Security Solutions
5.8.2 Majority Mobile threats are Targeted at Android
5.9 Good Technology
5.9.1 Good Dynamics Secure Mobility Platform
5.9.1.1 Mobile App Containerization
5.9.1.2 Mobile App Management (MAM)
5.9.1.3 Mobile Service Management and Mobile Device Management
5.10 Google
5.10.1 The Next Phase of Android Security
5.11 Kaspersky Lab
5.11.1 Kaspersky Internet Security for Android
5.11.2 Kaspersky Internet Security – Multi-Device
5.11.3 Kaspersky Lab Anticipates Double-Digit Growth in 2014
5.12 Lookout
5.13 McAfee, An Intel Company
5.13.1 McAfee Mobile Security Solutions
5.13.2 McAfee Labs Threats Report Findings
5.14 MobileIron
5.14.1 MobileIron Mobile IT Platform
5.15 NQ Mobile
5.15.1 NQ Mobile Security Products
5.16 Samsung Electronics
5.16.1 Samsung KNOX Workspace
5.16.2 Samsung Teams up with Zscaler and Citrix
5.17 SAP
5.17.1 SAP Mobile Secure
5.17.2 SAP and Samsung Expand Partnership
5.18 Sophos
5.18.1 Sophos Product Portfolio
5.18.2 Sophos Sees Explosive Growth for Mobile Device Management
5.19 Symantec
5.19.1 Symantec Mobile Security
5.19.2 Symantec Showcasing New Security Solutions
5.20 Trend Micro
5.20.1 Trend Micro Smart Protection Network
5.20.2 Trend Micro Mobile Security Solution
5.21 Other Leading Companies in the Mobile Security Arena
5.21.1 Mformation
5.21.2 Microsoft
5.21.3 Mobile Active Defense
5.21.4 Motorola
5.21.5 Orange
5.21.6 BlackBerry
5.21.7 Telefonica
5.21.8 Echoworx
5.21.9 DeviceLock Inc.
5.21.10 DataViz
5.22 Additional Players in the mSecurity Market
6. SWOT Analysis of the Mobile Security Market
7. Expert Opinion
7.1 Visiongain Interview with AVG Technologies
7.1.1 AVG Company Background and Mobile Security Products
7.1.2 Proliferation of Connected Devices Will Drive the Adoption of Mobile Security
7.1.3 Internet of Things is A Major Driver for the mSecurity Market
7.1.4 Key Trends in the Mobile Security Market
7.1.5 Apple's iOS is More Secure than Google's Android
7.2 Visiongain Interview with Kaspersky Lab
7.2.1 Kaspersky Company Background
7.2.2 Mobile Apps and BYOD Driving the Need for Mobile Security
7.2.3 Cybercriminals Increasingly Targeting Android Operating Systems
7.2.4 Mobile Banking Trojans to Grow Significantly in the Coming Years
7.2.5 BYOD Becoming a Popular Trend for Most Businesses
7.2.6 Consumers/Enterprises Becoming More Aware about Internet Security
7.3 Visiongain Interview with Bullguard
7.3.1 Bullguard Company Background and Mobile Security Products
7.3.2 Security Vendors Must be Ready to Tackle Increasing Malware Attacks
7.3.3 Lack of Awareness Regarding mSecurity Will be an Inhibitor
7.3.4 Mobile Device Management & BYOD Gaining Popularity
7.3.5 Antivirus will be Mandatory on all Mobile OS
7.3.6 Mobile Security to Surpass the PC Security Market in the Future
7.3.7 Security and Privacy Issues Should be Given Utmost Priority
8. Conclusion
8.1 Mobile Threats on the Rise
8.2 Market Share & Outlook for the Top 20 Mobile Security Companies
9. Glossary
List of Tables
Table 2.1 Mobile Security Tools
Table 2.3 Selection of Mobile Malware Variants
Table 2.4 Overview of Selected Mobile Trojans
Table 2.6 FlexiSpy Features
Table 3.1: Global Mobile Security (mSecurity) Market Forecast 2013-2024($bn, AGR %, CAGR %)
Table 4.1 Top 20 Mobile Security (mSecurity) Companies 2013 (Market Ranking, Mobile Security Revenues, Market Share %)
Table 4.3 Visiongain Analysis of Leading Mobile Security Software Vendors (Compatibility, Installation Update & Operation, Ease of Use, Features, Effectiveness)
Table 5.1 AirWatch Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, website)
Table 5.3 AirWatch Mobile Security Features
Table 5.4 Apple Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website)
Table 5.6 AVG Company Overview (Mobile security revenues, market ranking, % market share, IR contact, HQ, ticker, website)
Table 5.8 AVG Mobile Apps
Table 5.9 BullGuard Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, website)
Table 5.11 BullGuard Mobile Security Features
Table 5.12 ESET Company Overview (Mobile security revenues, market ranking, % market share, contact, HQ, website)
Table 5.14 ESET Mobile Security Solutions
Table 5.15 Fiberlink, an IBM Company (Mobile security revenues, market ranking, % market share, PR contact, HQ, website)
Table 5.17 Fiberlink Mobile Security Features
Table 5.18 Fixmo Company Overview (Mobile security revenues, market ranking, % market share, media contact, HQ, website)
Table 5.20 F-Secure Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website)
Table 5.22 F-Secure Mobile Security Solutions
Table 5.23 Good Technology Company Overview (Mobile security revenues, market ranking, % market share, media contact, HQ, website)
Table 5.25 Google Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website)
Table 5.27 Kaspersky Lab Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, website)
Table 5.29 Lookout Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, website)
Table 5.31 Lookout Mobile Security Product Overview
Table 5.32 McAfee Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, ticker, website)
Table 5.34 McAfee Enterprise Mobility Management (McAfee EMM)
Table 5.35 MobileIron Company Overview (Mobile security revenues, market ranking, % market share, media contact, HQ, website)
Table 5.37 Components of the Layered Security Model
Table 5.38 NQ Mobile Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website)
Table 5.40 Samsung Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website)
Table 5.42 KNOX 2.0 Platform Features
Table 5.43 SAP Company Overview (Mobile security revenues, market ranking, % market share, ticker, PR contact, HQ, website)
Table 5.45 SAP Mobile Secure Features
Table 5.46 Sophos Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, website)
Table 5.48 Sophos Security Product Overview
Table 5.49 Symantec Company Overview (Mobile security revenues, market ranking, % market share, PR contact, HQ, ticker, website)
Table 5.51 Trend Micro Company Overview (Mobile security revenues, market ranking, % market share, ticker, IR contact, HQ, website)
Table 5.53 How the Smart Protection Network works?
Table 5.54 Trend Micro Mobile Security Features