Market Research Logo

Mobile Value-added Services (VAS) in the Cloud: Security Challenges, Market Opportunities and Forecasts 2013 - 2018

Cloud computing has started to play a crucial role in mobile based value-added service (VAS) offering as end-users appetite for applications is ever-increasing and service providers are increasingly moving towards alternative service platforms and support infrastructure.

Mobile VAS in the Cloud includes communications, content, commerce and applications of various types. Leading companies are positioning themselves to take leverage cost improvements as well as enhanced functionality, services integration, and convergence across service types heretofore constrained by device type, network type, and/or service provider. However, ensuring a fast, flexible, and economically viable service delivery via the Cloud is a continuous challenge thanks to security issues, piracy concerns, and the threat of cybercriminals damaging consumer and enterprise data.

Mobile Value-added Services (VAS) in the Cloud: Security Challenges, Market Opportunities and Forecasts 2013 - 2018 evaluates opportunities for mobile VAS in the Cloud, company specific solutions, alliances to combat challenges, market drivers and decision factors for consumer and enterprise customers. The report includes analysis of forecasts as well as recommendations for industry players.

Target Audience:

  • Cloud services companies
  • Mobile network operators
  • Small to Medium Business (SMB)
  • Network infrastructure providers
  • VAS application development companies
  • Large multinational enterprise companies
  • Security and privacy protection companies
Companies in Report:
  • Awareness Technologies
  • Business Innovation Councils
  • CA Technologies
  • CERT
  • CREDANT Technologies
  • Cisco
  • Dell
  • EMC
  • Google
  • GuardTime
  • HP
  • HyTrust
  • IBM
  • McAfee
  • Okta
  • Panda
  • Perkins
  • Rand Group
  • Red Hat
  • Salesforce.com
  • Simplified
  • Soundcloud
  • Symantec
  • Trend Micro
  • VMware
  • Vyatta
  • Xen
Key Findings:
  • Global cloud software security market is predicted to reach US$ 3 billion by 2018
  • Latin America will remain the top growth market for cloud based VAS market over the next 5 years
  • Cloud segment IaaS (Infrastructure as a Service) will hold the highest market share of 44% by 2018
  • Government agencies and large enterprises will be the top users of cloud security software by 2018


General Methodology

Mind Commerce Publishing's research methodology encompasses input from a wide variety of sources.

We rely heavily upon our Subject Matter Experts (SME) in terms of their market knowledge, unique perspective, and vision. We utilize SME industry contacts as well as previous customers and participants in our market surveys and interactive interviews.

In addition, we rely upon our extensive internal database, which contains modeling, qualitative analysis, and quantitative data. We review secondary sources and compare to our primary sources to update previous findings (for prior version reports) and/or compile baseline information for technology and market modeling.

We share preliminary models with industry contacts (select previous clients, experts, and thought leaders) to verify the veracity of initial modeling. Prior to final report production (analysis, findings, and conclusions), we engage in an internal review with internal SMEs as well as cross-expertise, senior staff members to challenge results.

We believe that forecasts should be prepared as part of an integrated process which involves both quantitative as well as qualitative factors. We follow the following 3-step process for forecasting.

Forecasting Methodology

Step 1 - Forecasts Input: The inputs for the present and historical revenues are derived from industry players. Financial and other quantitative data for individual sub-market categories are derived from original research and tested with interviews with major industry constituents.

Step 2 - Forecasting of Future Years: Mind Commerce extends forecasts based on a variety of factors including demand drivers as well as supply side data. Key success factors and assumptions are considered.

Step 3 - Validation of Data: The final step is to validate projections, which is accomplished in consultation with both internal and external industry experts, including both topic and regional experts. Adjustments are made to the forecasts based on factors identified throughout this process.


1.0 Executive Summary
2.0 Mobile Vas Applications In The Cloud
2.1 What Is A Vas Application?
2.1.1 Vas Characteristics
2.1.2 Relationship Of Vas To Other Services
2.1.3 Different Classes Of Vas
2.2 Why Are Vas Important?
2.2.1 The Value Of Voice And Other “bearer” Services
2.3 Mobile Vas In The Cloud
3.0 Major Mobile Value-added Service Types
3.1 Content
3.1.1 Introduction
3.1.2 Content Delivery
3.1.3 Charging Via Premium Content
3.1.4 Online Billing Service Providers
3.2 Commerce
3.3 Communication
3.3.1 Core Services
3.3.2 Value-added Services
3.4 Applications
4.0 Cloud Computing In Mobile Value-added Services
4.1 Structure Of Cloud Computing In Mobile Vas
4.2 Cloud Computing In Vas Models
4.2.1 Category Of Cloud Computing Service Models In Vas
4.3 Growth Of Vas In The Cloud And Service Providers
4.4 Characteristic Of Cloud Computing In Vas
4.5 Decision Factors For Cloud Computing In Vas
4.5.1 Combination Of Database
4.5.2 Auto Scan Of Device
4.5.3 Compliance Standard
4.5.4 Easy Accessibility Of Report
4.5.5 Economical
4.5.6 Transparent
4.5.7 Comprehensive Package
4.6 Seven Elements Of Cloud Computing In Vas
4.6.1 Utility Pricing
4.6.2 Elastic Resource Capacity
4.6.3 Virtualized Resources
4.6.4 Management Automation
4.6.5 Self-service Provisioning
4.6.6 Third-party Ownership
4.6.7 Managed Operations
4.7 Vas Ecosystem In Cloud Computing
5.0 Industry Perspective Of Vas In Cloud
5.1 Overview Of Mobile Vas In Cloud
5.2 Technical Challenges In Cloud-based Vas
5.3 Decision Factors For Cloud By Enterprise Customers
5.4 Opportunities For Vas In The Cloud By Industry Vertical
5.5 Could Access Identity Management In Cloud Vas Chain
6.0 Security Threat Analysis Of Cloud-based Vas
6.1 Insider Threats In The Cloud Vas
6.2 External Threats In Cloud Vas
6.2.1 Data Breaches
6.2.2 Data Loss
6.2.3 Account Hijacking
6.2.4 Insecure Application Programming Interfaces (Apis)
6.2.5 Denial Of Service
6.2.6 Data Handling
6.3 Components Of Information Security In Cloud Vas
6.4 End-user Concerns With Cloud Vas
6.4.1 Loss Of Control
6.4.2 Lack Of Trust In The Cloud
6.5 Common Drawbacks In Cloud Vas
6.6 Strategies To Overcome Security Concerns In Cloud Vas
7.0 Cloud Vas Market Projection
7.1 Cloud Computing Market Value And Usage
7.1.1 Regional Cloud Vas Market 2013-2018
7.1.2 Cloud Vas By Segment 2013 - 2018
7.1.3 Worldwide Cloud Vas Equipment Market Share
7.2 Cloud Security Piracy And Privacy
7.2.1 Global Cloud Security Software Market Value 2013-2018
7.2.2 Global Cloud Security Software Market By End-user Segmentation
7.2.3 Global Cloud Security Software Market By Vendor Segmentation
7.3 Customer’s Responsibilities In Cloud Based Security Management
8.0 Cloud Vas: Next Generation Trend
8.1 Next Generation Growth Driver Analysis And Market Impacts
8.1.1 Increasing Usage Of Cloud Services In Non-traditional Sectors
8.1.2 Growing Adoption Of Cloud Services In Government Departments
8.1.3 Growing Usage Of Cloud Services For Critical Data Storage
8.1.4 Rise In Cloud Service-specific Attacks
8.2 Significant Industry Players/Experts Differences On Market Direction/Vision
8.2.1 Security For Business Innovation Council 2013 Predictions
8.2.2 Perkins Prediction
8.2.3 Gartner Prediction
8.2.4 Georgia Tech And Gartner Prediction On Mobile Browser Vs. Cloud Computing
8.2.5 Gooddata Prediction On Usage Of Public Cloud Among Enterprises
8.2.6 Symantec Prediction On Hacking Vs. Threat Level
9.0 Conclusions And Recommendations
9.1 Recommendations For Market Players
9.1.1 Develop Cloud-based Vas Solutions In Business
9.1.2 Protect Business From Cybercriminal Threats
9.1.3 Integrate Security Protection Issue With Management Strategy
Figures
Figure 1: Cloud Computing Applications in Mobile based VAS
Figure 2: Structure of Cloud Computing Layers & Interdependency in Mobile VAS
Figure 3: Model of Cloud Computing in VAS
Figure 4: Cloud Computing Service Model in VAS
Figure 5: Key Cloud Service Providers and Market Forecast
Figure 6: 7 Elements of Cloud Computing in VAS
Figure 7: VAS Ecosystem in Cloud Computing
Figure 8: Example of Mobile VAS in Cloud Computing
Figure 9: Technical Challenges in Cloud-based VAS
Figure 10: Enterprises’ Priority to use Cloud Services
Figure 11: Cloud-based VAS Opportunities by Segment
Figure 12: Employee-Customer Relationship in Cloud based VAS Service
Figure 13: Insider Threat in Cloud based VAS
Figure 14: External Threats in Cloud Computing VAS
Figure 15: Information Security Components in Cloud-based VAS
Figure 16: End-user Concerns with Cloud Computing VAS
Figure 17: Strategies to Overcome Security Concern in Cloud VAS
Figure 18: Regional Market Share of Cloud Computing VAS 2013-2018
Figure 19: Segment VAS Cloud Service 2013- 2018
Figure 20: Market Share of Cloud VAS Equipment Providers 2013
Figure 21: Global Cloud Security Software Market Value 2013-2018
Figure 22: Global Cloud Security Software Market by End-user Segmentation in VAS 2013
Figure 23: Global Cloud Security Software Market by Vendor Segmentation 2013
Figure 24: Customers Responsibility in Managing Cloud based VAS Security
Figure 25: Cloud Security in VAS: Flowchart of Market Growth Drivers

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook

Share this report