Mobile Security solutions

Mobile Security solutions

An increasingly insecure mobile environment - Markets, trends & technologies

This report examines the world of mobile security, providing a broad overview of the main players, their strategies and positioning, future trends and the market as a whole – its structuring and value chain (hardware, devices, IT, security, telcos).

It examines the threats for mobile, their reach and assessed prevalence. In parallel, the report details key technologies – in use and those upcoming – aimed to secure mobile platforms.

Finally, the report provides a strategic analysis of the key drivers and hurdles regarding the mobile security solution market, coming along with data and forecast of the market in value.

1. Executive Summary
2. Methodology and scope
2.1. General methodology of IDATE's reports
2.2. Scope
3. Mobile security threats, solutions and applications
3.1. Mobile security threats
3.1.1. Specificities of mobile platforms
3.1.2. Threats and attacks
3.2. Mobile Security Solutions across platforms
3.2.1. Overview
3.2.2. Baseline protection: Mobile OS and mobile networks
3.2.3. Security frameworks and mobile security applications
3.2.4. Security key enabling technologies
4. Market structure and player strategies
4.1. Market structure
4.1.1. Value chain
4.1.2. Access to market
4.1.3. Table of market players
4.2. Hardware enabler providers
4.2.1. Secure element and trusted execution environment
4.2.2. Biometric technology
4.3. Baseline protection providers
4.3.1. OS providers
4.3.2. Device manufacturers
4.3.3. Mobile network operators
4.4. Security solution players
4.4.1. Pure players
4.4.2. Security solution providers
4.4.3. IT-solution providers
5. Strategic analysis
5.1. Key drivers
5.1.1. Technological push
5.1.2. New mobile use cases requiring security
5.1.3. Regulation
5.1.4. Device market maturity
5.2. Barriers
5.2.1. Rising baseline protection
5.2.2. Lack of strong consumer demand
5.2.3. Device market cost sensitivity
5.3. Market development and forecasts
5.3.1. Key trends
5.3.2. Major uncertainties
5.3.3. Market forecast
Report's tables and figures
Table 1: Type of malware attacks
Table 2: Means of propagation of malware attacks
Table 3: Comparison of Android OS and iOS security features
Table 4: Types of secure elements
Table 5: Compared protection offered by secure elements, TEE and mobile OS
Table 6: Mobile security solutions' market players
Table 7: Gemalto mobileID solution
Table 8: Lookout consumer offering Free and Premium
Table 9: User concerns around mobile identity and personal data
Figure 1: Mobile platform vulnerabilities
Figure 2: Mobile threats, attacker strategies
Figure 3: Number of Android malwares identified
Figure 4: Number of new mobile malwares identified by McAfee
Figure 5: New malwares (non-mobile) identified by McAfee
Figure 6: Devices with known potential harmful applications
Figure 7: Geography of mobile malware encounter rates, Q3 2015 (% of users attacked)
Figure 8: Web navigation shifts to mobile
Figure 9: Global in-store mobile payment volume
Figure 10: IoT development in volume
Figure 11: Overview of mobile security solutions
Figure 12: iOS security architecture
Figure 13: Abstract overview of mobile networks
Figure 14: Avast Mobile Security and Antivirus
Figure 15: Kaspersky Internet Security
Figure 16: Android Device Manager
Figure 17: Management of mobile devices, content and applications
Figure 18: Protection of corporate network against external mobiles
Figure 19: Using the mobile for authentication
Figure 20: Multifactor authentication
Figure 21: The secure element, as a microSD, UICC embedded in the device
Figure 22: Secure element application domains
Figure 23: Samsung Galaxy S6 Edge, fingerprint sensor
Figure 24: Components of TouchID
Figure 25: Rich OS and TEE comparison
Figure 26: Security in the mobile value chain
Figure 27: NFC positioning on the security market
Figure 28: Synaptics products in the SmartPhone
Figure 29: Fingerprint Cards sensors
Figure 30: AuthenTec, the fingerprint sensor company bought by Apple
Figure 31: Android 6.0 privacy control
Figure 32: Android Pay
Figure 33: Samsung Pay, emulation of a magnetic card swipe
Figure 34: LG Gate Enterprise solution
Figure 35: Keeper partnership with HTC
Figure 36: Sony myXperia software
Figure 37: BlackBerry Priv (Android based)
Figure 38: Blackphone 2
Figure 39: Verizon Total Mobile Protection offering
Figure 40: Telefónica ElevenPaths Latch security solution
Figure 41: T-Mobile MyWallet
Figure 42: MobileIron telco partnerships
Figure 43: Security multifactor authentication for password management
Figure 44: Kaspersky Android wearables application
Figure 45: Avast mobile application ecosystem
Figure 46: Avast Virtual Mobile Platform
Figure 47: VMWare vision of next EMM challenges: Identity management and virtualisation
Figure 48: Citrix XenMobile security compliance engine
Figure 49: Iris scanner on Fujitsu NX F04G
Figure 50: Parasol, a new application dedicated to privacy protection using Android 6.0+ privacy controls
Figure 51: Increasing convergence in mobile/PC platforms
Figure 52: Mobile device: shipments by region
Figure 53: The threat of rising baseline protections and possible roads to market for B2C solutions
Figure 54: Credibility of players for the provision of online information
Figure 55: Security feeling, age and smart cards
Figure 56: The gap between use and trust
Figure 57: Global mobile security market (2015 - 2020)
Figure 58: Global B2B market for mobile security solutions (2015 - 2020)
Figure 59: Global B2C market for mobile security solutions (2015 - 2020)

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook