Market Research Logo

Mobile Security and Privacy in 3G & LTE: Strategies, Solutions and Market Forecast Analysis 2012-2017

1.0 Executive Summary
2.0 Mobile Security Threat And Privacy Market Overview
3.0 Understanding Mobile Security:
3.1 Defining Mobile Security:
3.2 Mobile Device Security
4.0 Understanding Mobile Threats
4.1 Web Based Threat
4.2 Phishing Scams
4.3 Drive-by Downloads:
4.4 Browser Exploits:
4.5 Wi-fi Sniffing
4.6 Social Engineering Attacks
4.7 Resource Abuse
4.8 Data Loss
4.9 Data Integrity Threats
5.0 Understanding Mobile Privacy
5.1 The Types Of Threat
5.2 The Threat Smartphones Pose To Businesses
5.3 The Sophistication Of The Mobile Device Is It’s Own Worst Enemy:
5.4 The Big Problem With Downloadable Mobile Apps
5.5 Remotely Hosted Mobile Applications And Data:
5.6 The Problems With Gsm:
5.7 The Growth Of Machine To Machine (M2m)
5.8 The Biggest Myth About Mobile Security
6.0 Mobile Attacks And Vulnerabilities Review 2011
6.1 January To December 2011
6.2 Apple Ios Vulnerabilities
6.3 Direct Attacks
6.4 Browser-based Threats
6.5 The Basic Steps To Perform This Attack Include:
6.6 Threat For Smbs (Small & Medium Businesses)
7.0 Mobile Security Threat By Os Platform
7.1 Ios
7.2 Summary Of Ios Security
7.3 Android
7.4 Summary Of Android’s Security
8.0 Mobile Malware For Devices
9.0 Mobile Device Security: Antivirus Software
9.1 Avg Mobile Security
9.2 Kaspersky Mobile Security
9.3 Eset Mobile Security
9.4 Bullguard Mobile Security
9.5 Mcafee Mobile Security
9.6 Lookout Mobile Security
9.7 F-secure Mobile Security
9.8 Norton Smartphone Security
9.9 Trend Micro Mobile Security
9.10 Dr. Web Mobile Security Suite
10.0 Mobile Security Trend Analysis
10.1 Network Security Trend
10.1.1 Ransomware To Take Mobile Devices Hostage
10.1.2 Worming Into Android
10.1.3 Polymorphism Want A Cracker?
10.1.4 Clampdown On Network-based Money Laundering
10.1.5 Public-private Relationships In Security
10.1.6 Scada Under The Scope
10.1.7 Sponsored Attacks
10.1.8 Hacking A Good Cause
10.2 Mobile Virtual Private Network Trend
10.3 Cloud Base Security:
10.4 Case Analysis: Oblivious Data Loss And The Wild West Of Mobile App Security
10.4.1 In A Worst Case Scenario, Then, Exactly What Are The Risks Of Oblivious Data Loss?
11.0 Top Security Threat Trend In 2012
11.1 Social Media And The Web:
11.2 Security Means More Than Microsoft:
11.3 Mobile Devices In The Spotlight
11.4 New Web And Network Technologies
11.5 Casual Consumerization Causes Backsliding
11.6 More Hacktivism And Targeted Attacks
11.7 Data Regulations Proliferate And Penalties Grow
11.8 Mobile Payment Technology May Be New Target
11.9 Cloud Services Are Back In Vogue
11.10 The Basics Still Go Wrong
12.0 Growth Driver On Today’s Mobile Security & Privacy Landscape
12.1 Proliferation Of Smartphone & Intelligent Mobile Computing Devices
12.2 Increasing Demand Of Data Services
12.3 Growing Demand On Using Of Corporate And Open Networks
12.4 Development Of Mcommerce
12.5 Mobile Entertainment Proliferation
12.6 Mobile Personalization Demand And Msecurity
12.7 Growth Of Open Source Os Like Android
13.0 Mobile Security Market Projection 2012-2017: Global Vs. Regional Vs. National
13.1 Global Market Value On Spending 2012-2017
13.2 Market Value Share Across Eco-system 2012-2017
13.3 Regional Market Value Share In % Vs. Mobile Subscriber % (Apac Vs. Europe Vs. North America Vs. Latin America Vs. Africa)
13.4 Regional Market Value In Usd Mln: Apac Vs. Europe Vs. North America Vs. Latin America Vs. Africa 2012-2017
13.5 Cagr Comparison Of 2012 To 2017(Apac Vs. Europe Vs. North America Vs. Latin America Vs. Africa)
13.6 National Market Value Projection Of Top 13 Countries/Territories 2012-2017
13.7 Security Software Pre-installed Projection Among Total Smartphones & Tablets 2012-2017
13.8 Up-to-date Security Software Use Behavior Among Mobile Device Owner: % Of Installed Vs. Not Installed 2012-2017
13.9 Mobile Related Cyber Crime Victim Vs. Unaware About Mobile Security Measure: % Among Mobile Device Owner
13.10 Mobile Os Ranking As Per Device Security
13.10.1 Which Mobile Os Can Ensure Highest Security?
13.11 Mobile Security Company Merger & Acquisition Trend 2011-2012
13.12 Investment Trend And Option In Mobile Security Business
14.0 Country Specific Mobile Security Market Analysis
14.1 China
14.1.1 Mobile Security Market Share 2012
14.1.2 Total Mobile Security Product User Vs. Active User 2012
14.1.3 Symbian Vs. Android: New Virus Number 2010-2012 Q1
14.1.4 Symbian Vs. Android: Types Of Virus 2012
14.1.5 Mobile Internet User Projection 2012-2017
14.2 Usa
14.2.1 Mobile Internet User 2012-2017
14.2.2 % Of Mobile Antivirus Software User Among Total Mobile Internet User
14.2.3 Botnet On Spreading Virus 2012
14.2.4 Platform Use To Spread Spam On Mobile Device
14.3 Uk
14.3.1 Mobile Internet User 2012 – 2017
14.3.2 Mobile Antivirus Software 2012
14.3.3 Botnet On Spreading Virus
14.4 Russia
14.4.1 Mobile Internet User
14.4.2 Mobile Antivirus Software User 2012
14.4.3 Common Types Of Spam 2012
14.5 France
14.5.1 Mobile Internet User
14.5.2 Mobile Antivirus Software 2012
14.5.3 Common Types Of Spam 2012
14.6 Brazil:
14.6.1 Mobile Internet User
14.6.2 Mobile Antivirus Software:
14.6.3 Platform Use To Spread Spam On Mobile Device
14.7 India
14.7.1 Mobile Internet User
14.7.2 Mobile Antivirus Software 2012
14.7.3 Common Spam Types In India
14.8 Germany
14.8.1 Mobile Internet User
14.8.2 Mobile Antivirus Software
14.8.3 Platform Use To Spread Spam On Mobile Device
14.9 Australia
14.9.1 Mobile Internet User
14.9.2 Mobile Antivirus Software 2012
14.10 Middle East
14.10.1 Mobile Internet User
14.10.2 Mobile Antivirus Software 2012
14.11 South East Asia
14.11.1 Mobile Internet User
14.11.2 Mobile Antivirus Software 2012
14.12 Canada
14.12.1 Mobile Internet User
14.12.2 Mobile Antivirus Software 2012
15.0 Mobile Security Vendor / Solution Provider Analysis
15.1 Vendor Investment Initiative 2012
15.1.1 Lookout Mobile
15.1.2 Symantec
15.1.3 Mcafee
15.1.4 Juniper Networks
15.1.5 Cisco
15.1.6 Trend Micro
15.2 Avast Review
15.3 Worldwide Antivirus Software Market Analysis
16.0 Smartphone Security Vulnerability
17.0 Mobile Security Mergers And Acquisitions (M&A).
18.0 Mobile Handset / Os Provider Initiative Analysis
19.0 Telecom Network Provider Initiative Analysis
19.1 At&T
19.2 Vodafone
19.3 T-mobile
19.4 Orange
19.5 Saudi Telecom
19.6 Verizon
19.7 Telefonica
19.8 Airtel
19.9 Mts
20.0 Mobile Threat Landscape Review Jan-july 2012
20.1 Latest Threats By Type 2012 (Jan – July)
20.2 New Variants Of Already Known Families
21.0 Mobile Privacy Landscape Review: Do-not-track Debate
22.0 Mobile Security Case Analysis
22.1 A Symantec Case: Mobile Hackers In The Value Chain
22.2 A Trojan Case: The Rise Of Mobile Threats With Political Agendas
22.3 British Royal Mobile Phone Hacking Case
22.3.1 Can It Be Stopped?
23.0 Mobile Privacy Case Analysis
23.1 Pandalabs Privacy Violation Prediction Case – The Biggest Security Threat Of 2012
23.1.1 Mobile Malware
23.1.2 Malware For Tablets
23.1.3 Mac Malware
23.1.4 Pc Malware
23.1.5 Smbs Under Attack
23.1.6 Windows 8
23.2 Mobile Privacy Threat Case To Travel Stores
23.2.1 Healthcare Mobile Data Loss Case Study
24.0 Conclusion & Recommendations:
24.1 Conclusion
24.2 Recommended 10 Best Protection Practices Against Mobile Threat
24.3 Recommended Protection Against Mobile Privacy Violation
24.3.1 Mobile Antivirus
24.3.2 Secure Browser
24.3.3 Mobile Device Management (Mdm)
24.3.4 Enterprise Sandbox
24.3.5 Data Loss Prevention (Dlp)
24.3.6 Device Security Models
List of Figures
Figure 1: Mobile device threat Diagram
Figure 2: % of Web Based Threat
Figure 3: User’s email account on an Apple iPad exploited by the Firesheep tool (copyright: Yahoo)
Figure 4: Diagram of Protection against Mobile to Mobile threat
Figure 5: Mobile malware in multipurpose
Figure 6: Mobile Overtaking Web (copyright: Morgan Stanley)
Figure 7: Global Mobile Data Traffic Forecast by Region (copyright: Cisco)
Figure 8: Growth of Mobile commerce
Figure 9: growth of android market share
Figure 10: Global mSecurity Market Value on Spending 2012-2017 (USD $ Bln)
Figure 11: Market Value Share of Smartphone 2012
Figure 12: Market Ecosystem Comparison of Smartphone(Copyright chetan Sharma Consulting)
Figure 13: APAC vs. Europe vs. North America vs. Latin America vs. Africa: mSecurity Market Value % 2012-2017
Figure 14: Mobile Subscriber % of Total Global: APAC vs. Europe vs. North America vs. Latin America vs. Africa 2012-2017
Figure 15: APAC vs. Europe vs. North America vs. Latin America vs. Africa: mSecurity Market Value in USD mln 2012-2017
Figure 16: CAGR comparison of APAC vs. Europe vs. North America vs. Latin America vs. Africa during 2012-2017
Figure 17: Mobile security software pre-installed with smartphones & tablets % projection 2012-2017
Figure 18: % of Mobile Device Owner Installed vs. Not installed up-to-date security software 2012-2017
Figure 19: Mobile Related Cyber Crime Victim vs. Unaware about Mobile Security Measure: % among Mobile Device Owner
Figure 21: Market share of mobile security company in China 2012
Figure 22: Total Mobile Security Product User vs. Active User in China 2012
Figure 23: Symbian vs. Anrroid new virus number 2010-2012 Q1
Figure 24: Type of virus on Symbian vs. Android in China 2012
Figure 25: Mobile Internet User Projection in China 2012-2017
Figure 26: Mobile Internet user of USA 2012-2017
Figure 27: Active vs. Inactive Mobile Antivirus User
Figure 28: Types of Botnet in USA as of 2012
Figure 29: Spam Types In USA as of 2012
Figure 30: Mobile Internet User of UK 2012-2017
Figure 31: Active vs. Inactive Mobile Antivirus software user 2012
Figure 32: Types of Botnet in UK as of 2012
Figure 33: Mobile Internet User of Russia 2012-2017
Figure 34: Mobile Antivirus software user 2012
Figure 35: Platform use to spread Spam on Mobile device
Figure 36: Mobile Internet User 2012-2017
Figure 37: Active vs. Inactive Mobile Antivirus software user 2012
Figure 38: Common types of spam in Russia as of 2012
Figure 39: Mobile Internet User 2012-2017
Figure 40: Mobile Antivirus software user
Figure 41: Common types of spam 2012
Figure 42: Mobile Internet User 2012-2017
Figure 43: Mobile Antivirus software user
Figure 44: Common Spam Types in India 2012
Figure 45: Mobile Internet User 2012-2017
Figure 46: Mobile Antivirus software user
Figure 47: Platform use to spread Spam on Mobile device
Figure 48: Mobile Internet User 2012-2017
Figure 49: Mobile Antivirus software user 2012
Figure 50: Mobile Internet User 2012-2017
Figure 51: Mobile Antivirus software user 2012
Figure 52: Mobile Internet User 2012-2017
Figure 53: Mobile Antivirus software user
Figure 54: Mobile Internet User 2012-2017
Figure 55: Mobile Antivirus software user
Figure 56: Worlwide Antivirus Software Vendors (Copyright: opsvvat)
Figure 57: Worldwide Mobile Device Sales [1st Qtr 2012]
Figure 58: T-Mobile Security Interface (copyright: T-Mobile)
Figure 59: Latest Mobile Threat by Type 2012 (Jan – July)
Figure 60: Mobile Threats vs. Staged Payload (copyright: Symantec)
Figure 61: Mobile Threats: Android.Jmshider (copyright: Symantec)
Figure 62: Mobile Threat: Example of In-App Promotion To Download Threat (copyright: Symantec)
Figure 63: Mobile threats - embedded Trojan (copyright: Symantec)
Figure 64: Mobile threats- Android.Geinimi: a back door Trojan Scenario (copyright: Symantec)
Figure 65: Mobile threats: Group III type mobile threats – storefront apps (copyright: Symantec)
List of Tables
Table 1: Mobile Personalization by Regions
Table 2: Market Value Projection by Countries: top 13 countries
Table 3: Mobile OS ranking while security issue considered top
Table 4: Mobile Handset Unit vs. Market Share by OS platform 2012

This market has been initially driven by business concerns about protection of corporate assets and information. Mobile threats are becoming increasingly prolific as the mobile platform continues to gain popularity through the adoption of smart devices. As end-users and businesses come to rely on smartphones and tablets in their personal and business activities, they store valuable information that is attracting the attention of cybercriminals.

National mobile security markets in Europe, North America and the Asia Pacific region will experience the strongest growth. BRIC nations will also show signs of a burgeoning mobile security market as their populations increasingly adopt smart devices.

This research evaluates the mobile security and privacy ecosystem and vendor/solution analysis including several case studies. It analyzes current and anticipated security and privacy concerns and associated solutions. It identifies most likely and impactful mobile threats and related strategies for defense. The report provides market projection analysis on a global, regional, and country basis for 2012 through 2017.

This report also provide country-specific mobile security market analysis for Australia, Brazil, Canada, China, France, Germany, India, Russia, UK, and USA as well as regional analysis for the Middle East and Southeast Asia. It also includes analysis of the following network operator initiatives in mobile security/privacy: Airtel, AT&T, MTS, Orange, Saudi Telecom, Telefonica, T-Mobile, Verizon, and Vodafone.

Target Audience:

  • Mobile/wireless service providers
  • Mobile security and privacy vendors
  • Mobile/wireless device manufacturers
  • Mobile/wireless application developers
  • Government and regulatory organizations
  • Law enforcement including police and others


General Methodology

Mind Commerce Publishing's research methodology encompasses input from a wide variety of sources.

We rely heavily upon our Subject Matter Experts (SME) in terms of their market knowledge, unique perspective, and vision. We utilize SME industry contacts as well as previous customers and participants in our market surveys and interactive interviews.

In addition, we rely upon our extensive internal database, which contains modeling, qualitative analysis, and quantitative data. We review secondary sources and compare to our primary sources to update previous findings (for prior version reports) and/or compile baseline information for technology and market modeling.

We share preliminary models with industry contacts (select previous clients, experts, and thought leaders) to verify the veracity of initial modeling. Prior to final report production (analysis, findings, and conclusions), we engage in an internal review with internal SMEs as well as cross-expertise, senior staff members to challenge results.

We believe that forecasts should be prepared as part of an integrated process which involves both quantitative as well as qualitative factors. We follow the following 3-step process for forecasting.

Forecasting Methodology

Step 1 - Forecasts Input: The inputs for the present and historical revenues are derived from industry players. Financial and other quantitative data for individual sub-market categories are derived from original research and tested with interviews with major industry constituents.

Step 2 - Forecasting of Future Years: Mind Commerce extends forecasts based on a variety of factors including demand drivers as well as supply side data. Key success factors and assumptions are considered.

Step 3 - Validation of Data: The final step is to validate projections, which is accomplished in consultation with both internal and external industry experts, including both topic and regional experts. Adjustments are made to the forecasts based on factors identified throughout this process.


Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook

Share this report

;