Market Research Logo

Japan Mobile Security 2014–2018 Forecast and 2013 Review

IDC Opinion
In This Study
Methodology
User Survey
Vendor Survey
Mobile Security Market Definitions
Past Data Revision and Correction
Executive Summary
Mobile Security Market Trends 2013
Mobile Security Market Trends Based on User Survey Results
Mobile Security Market Forecast
SItuation Overview
2013 Mobile Security Market Trends
Mobile Device Market Trends
Security Threat Trends in Mobile Environment
Mobile Security Market Trends
Mobile Security Market User Enterprise Usage Trends Survey
Profile of Respondent Companies
Concerns Regarding IT Security Threats
IT Security Spending Focus Areas
Authorization of Personal Mobile Devices for Business Use
Challenges Faced in Mobile Device Implementation
Security Implementation in Mobile Devices
Japan Mobile Security Market Vendor Profile
Consumer Products
Symantec
McAfee
Trend Micro
Enterprise Products
Symantec
McAfee
Trend Micro
CA Technologies
EMC (RSA)
CheckPoint Software Technologies
Future Outlook
Forecast and Assumptions
Mobile Security Market
Market Context
Essential Guidance
Learn More
Related Research
Synopsis
Table: Japan Mobile Security Market Revenue by Function, 2011–2013
Table: Top 3 Assumptions for the Japan Mobile Security Market, 2014–2018
Table: Key Forecast Assumptions for Japan Mobile Security Market, 2014–2018
Table: Japan Mobile Security Market Revenue by Functional Segment, 2011–2018
Table: Japan Mobile Security Revenue and YoY Growth Rate: Comparison of September 2013 and October 2014 Forecast, 2010–2018
Figure: Japan Mobile Security Market Revenue by Function, 2011–2013
Figure: Respondent Profile by Position
Figure: Respondent Distribution by Level of Authority in Implementation of IT Security Solutions
Figure: Respondent Distribution by Industry
Figure: Respondent Company by Company Size
Figure: Level of Concerns Regarding IT Security Threats
Figure: Level of Concern Regarding IT Security Threats in Mobile Devices by Company Size
Figure: Future IT Security Spending Focus Areas
Figure: Authorization of Personal Mobile Devices for Business Use by Industry
Figure: Authorization of Personal Mobile Devices for Business Use by Company Size
Figure: Presence or Absence of Challenges during Mobile Device Deployment by Company Size
Figure: Challenges Faced During Mobile Device Deployment
Figure: Challenges Faced During Deployment of Mobile Devices by Company Size
Figure: Functions Necessary for Mobile Device Management
Figure: Mobile Device Security Measures by Company Size: Antivirus
Figure: Mobile Device Security Measures by Company Size: Antispam and Messaging Security
Figure: Mobile Device Security Measures by Company Size: URL Filtering and Web Security
Figure: Mobile Device Security Measures by Company Size: Identity and Access Management (Authentication, Authorization)
Figure: Mobile Device Security Measures by Company Size: Policy Management and Compliance Management
Figure: Mobile Device Security Measures by Company Size: Device Wipe (Data Deletion)
Figure: Mobile Device Security Measures by Company Size: Device Lock
Figure: Japan Mobile Security Market Revenue, 2011–2018
Figure: Japan Mobile Identity and Access Management Market, 2011–2018
Figure: Japan Mobile Secure Content and Threat Management Market, 2011–2018
Figure: Japan Mobile Security and Vulnerability Management Market Revenue, 2011–2018
Figure: Japan Mobile Security Market YoY Growth Rate: Comparison of September 2013 and October 2014, 2012–2018

Japan Mobile Security 2014–2018 Forecast and 2013 Review

This IDC study analyzes the 2013 Japan mobile security market and presents market forecast for the period 2014–2018. The study classifies the Japan mobile security market into four segments, namely mobile identity and access management (MIAM), mobile secure access and threat management (MSCTM), mobile security and vulnerability management (MSVM), and other mobile security and also analyzes each segment.

User companies are migrating to business systems that use new technologies such as cloud, mobility, and social media. Tablets, in particular, are increasingly being used for specific business solutions. "User companies and vendors ought to involve the business department that is responsible for the day-to-day execution of the business, along with the IT systems department, while deploying security solutions right from the design phase of mobile device implementation," says Tsuneo Tosaka, research manager, Software & Security, IDC Japan.

Please Note: Extended description available upon request.


Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook

Share this report

;