The Mobile Security (mSecurity) Bible: 2014 – 2020 - Device Security, Infrastructure Security & Security Services

Published: April 2014
No. of Pages: 304
   

Mobile networks around the globe generate more than 86 Exabytes of traffic annually. The immense volume of traffic together with the growing adoption of open source Operating System (OS) platforms such as Android has opened up new security threats. Mobile malware, SMS spam, cyber attacks and unlawful eavesdropping are an ever-increasing problem for enterprises, consumers and mobile network operators around the globe.

This has in turn led to significant investments in integrated security appliances and content security gateways by both enterprises and mobile network operators,  besides opening doors for emerging submarkets such as mobile Security as a Service (SECaaS).

On the devices front, installation of anti-malware/anti-virus client software is fast becoming a de-facto requirement for most smartphones and tablets. Furthermore, mobile device OEMs are also integrating advanced biometrics such as fingerprint sensing into their smartphones and tablets, amid growing popularity of security sensitive opportunities such as mobile payments.

Driven by the thriving ecosystem, SNS Research estimates that mobile device and network security investments will account for nearly $11 Billion in 2014 alone. The market is further expected to grow at a CAGR of nearly 20% over the next 6 years.

The “Mobile Security (mSecurity) Bible: 2014 - 2020” report presents an in-depth assessment of the global mobile device and network security market, and covers four individual submarkets. In addition to covering key market drivers, challenges, future roadmap, value chain analysis, deployment case studies and vendor service/product strategies for each submarket, the report also presents comprehensive forecasts for the mobile device and network security market from 2014 till 2020. Historical revenue figures for 2010 – 2013 are also presented. The forecasts and historical revenue figures are individually segmented for four submarkets, 17 product/service categories, six geographical regions and 34 countries.

The report comes with an associated Excel datasheet covering quantitative data from all figures presented within the report.

Topics Covered:

The report covers the following topics:

  • An in-depth analysis for four individual submarkets and their associated product/service categories: Mobile Network Infrastructure Security Software & Appliances, Mobile Device Client Security Software, Mobile Device Security Hardware and Mobile Security & MDM Services
  • Value chain analysis for each submarket
  • Key market drivers and challenges for each submarket
  • Key trends for each submarket
  • Case studies on product/service deployment for each submarket
  • Profiles and strategies of over 70 key players in the market
  • Strategic recommendations for vendors, enterprises and wireless carriers
  • Market analysis and forecasts from 2010 till 2020

Historical Revenue & Forecast Segmentation:

Market forecasts and historical revenue figures are provided for each of the following submarkets and their 17 product/service categories:

Mobile Network Infrastructure Security Software & Appliances

  • Integrated Security Appliances (Hardware & Software)
  • Content Security Gateways
  • SMS/MMS Content Security Gateways

Mobile Device Client Security Software

  • Anti-Malware/Anti-Virus Client Software
  • Back Up & Restore Software
  • Privacy Protection Software
  • Mobile VPN Client Software
  • Remote Locking Software
  • Remote Tracking Software
  • Encrypted Communications (Voice/Data) Software
  • Encrypted Storage Software

Mobile Device Security Hardware

  • Semiconductors/Embedded Chip Security
  • NFC
  • Biometrics

Mobile Security & MDM (Mobile Device Management) Services

  • On-premises Mobile Security MDM Services
  • Cloud Based Mobile SEaaS (Security as a Service)
  • Mobile Identity Management Services

The following regional and country markets are also covered:

Regional Markets

  • Asia Pacific
  • Eastern Europe
  • Latin & Central America
  • Middle East & Africa
  • North America
  • Western Europe

Country Markets

Argentina, Australia, Brazil, Canada, China, Czech Republic, Denmark, Finland, France, Germany,  India, Indonesia, Israel, Italy, Japan, Malaysia, Mexico, Norway, Pakistan, Philippines, Poland, Qatar, Russia, Saudi Arabia, Singapore, South Africa, South Korea, Spain, Sweden, Taiwan, Thailand, UAE, UK,  USA

Key Findings:

The report has the following key findings:

  • Driven by the thriving ecosystem, SNS Research estimates that mobile device and network security investments will account for nearly $11 Billion in 2014 alone. The market is further expected to grow at a CAGR of nearly 20% over the next 6 years
  • Enterprises and mobile network operators have made significant investments in integrated security appliances and content security gateways (including those specific to SMS/MMS security)
  • The installation of anti-malware/anti-virus client software is fast becoming a de-facto requirement for most smartphones and tablets
  • More than half of all enterprises allow the use of employed owned mobile devices on their networks. Enterprises thus continue to aggressively adopt SSL VPNs in their mobile security strategies to ensure connection security in addition to activity monitoring and control
  • Mobile Device Management (MDM) services providers are eyeing on opportunities for cloud based mobile security services that extend existing security policies to enterprise mobile devices to help secure data, reduce risk and protect the enterprise, which has created a new submarket for mobile Security as a Service (SEaaS)
  • As mobile networks move towards an all-IP environment, wireless carriers are increasingly taking an interest in RAN centric security products that can mitigate security threats to air interface signaling

Key Questions Answered:

The report provides answers to the following key questions:

  • How big is the mobile device and network security market, and what particular submarkets does it constitute?
  • Who are the key players in each submarket?
  • How is the value chain structured for each submarket and how will it evolve overtime?
  • Which regions and countries will witness the highest percentage of growth in mobile security spending?
  • What is the outlook of anti-virus, anti-malware and VPN client software adoption for mobile devices?
  • Will recent privacy scandals have a negative impact on mobile security spending in the coming years?
  • What known malware families are most dangerous for modern smartphones?
  • What are the prospects of NFC as an authentication solution?
  • What are the security vulnerabilities of LTE and WiFi networks?
  • What are the prospects of RAN centric security products?
  • How will M2M and the associated IoT ecosystem affect the mobile security market?
  • How is BYOD adoption affecting enterprise mobile security strategies?"

List of Companies Mentioned

  • 3M Cogent
  • aap3 inc
  • AccelOps
  • Accuvant
  • Actiance
  • AdaptiveMobile
  • Adtran
  • AEP
  • Afore
  • AhnLab
  • Airbus Defence and Space
  • AirWatch
  • Akamai
  • Alcatel-Lucent
  • Alert Logic
  • Amazon
  • American Portwell Technology
  • Amtel
  • Anam Technologies
  • Andrisoft
  • Antiy
  • Anywr
  • AppBlade
  • Apple
  • AppRiver
  • Arbor Networks
  • Arkoon
  • Array Networks
  • Arxceo
  • Asus
  • AT&T
  • AuthenTec
  • Avanquest
  • AVAST Software
  • AVG Technologies N.V
  • Avira
  • AV-TEST
  • Axiom Telecom
  • Barracuda Networks
  • Barrier Group
  • Bayometric
  • Beijing Venustech
  • Belgacom
  • Birdstep Technology
  • BitDefender
  • BlackBerry
  • Bloove
  • Blue Coat
  • BlueCat Networks
  • Bluefire
  • Boxtone
  • Broadcomm
  • BroadWeb Corporation
  • Brocade
  • BullGuard
  • CA Technologies
  • Calyptix Security Corporation
  • Capita
  • CDW Corporation
  • Celestix Networks
  • Cellcrypt
  • Cellebrite
  • Cellulike
  • Cellusys
  • Centrify
  • Check Point Software Technologies
  • China Mobile
  • China Unicom
  • CipherCloud
  • Cisco Systems
  • Citrix Systems
  • Clavister
  • Cloud Security Alliance
  • CloudLock
  • Cloudmark
  • Columbitech
  • Comcast
  • Commtouch
  • CommuniTake
  • Comodo
  • Core Security Technologies
  • Corero
  • CORISECIO
  • Credant
  • Cross Match Technologies
  • CrucialTec
  • Cryptzone
  • Cybera
  • Cyberoam
  • CYREN
  • Damballa
  • DataViz
  • Dell
  • Dell SecureWorks
  • Dell Sonicwall
  • Deutsche Telekom
  • DeviceLock
  • DHILL
  • DIALOGS
  • Digital Defense
  • D-Link
  • Dr. Web
  • Echoworx
  • EdgeWave
  • eEye Digital Security
  • Elisa
  • EMC
  • Enterasys
  • Entrust
  • Ericsson
  • ESET
  • Extreme Networks
  • eSoft
  • European Network and Information Security Agency (ENISA)
  • Excitor
  • EyeVerify
  • F5 Networks
  • Facebook
  • FancyFon
  • FFIEC
  • Fiberlink
  • FingerQ
  • FireHost
  • Fixmo
  • ForeScout
  • Fortinet
  • Foundation
  • F-Secure
  • Fujitsu
  • Fulcrum Biometerics
  • Futura Mobility
  • gateProtect
  • Gemalto
  • Genband
  • GenieNRM
  • Get Safe Online
  • Gigamon
  • Global DataGuard
  • Global Technology Associates (GTA)
  • GlobalPlatform
  • GMSK
  • Good Technology
  • Google
  • Hewlett Packard (HP)
  • Hitachi
  • HTC
  • Huawei
  • HyTrust
  • IBM
  • iboss
  • Imation
  • Imperva
  • Infineon
  • InnoPath Software
  • Inside Secure
  • Intel
  • Intrusion
  • Iris ID
  • ISACA
  • ISS
  • Juniper Networks
  • Kaspersky Lab
  • Kerio Technologies
  • Kindsight
  • KoolSpan
  • Kore Telematics
  • Korea Telecom (KT)
  • KPN
  • Layer 7
  • Level Platforms
  • LG
  • Lionic
  • Lookout
  • Mahindra Comviva
  • ManageEngine
  • Mandiant
  • Marigold
  • Marble Security (Formerly IronKey)
  • McAfee (Intel Security)
  • Mformation
  • Microsoft
  • Microworld
  • Mobical
  • Mobile Active Defense
  • Mobile Application Development Partners
  • Mobile Idea Studio
  • MobileHome
  • MobileIron
  • MobileSpaces
  • Mocana
  • Motorola Mobility
  • Motorola Solutions
  • Mozilla
  • mSpy
  • Narus
  • National Institute of Standards and Technology (NIST)
  • NCP engineering GmbH
  • NetASQ
  • Netgear
  • Netmotion Wireless
  • Nevis Networks
  • NexusSafe
  • NFC Forum
  • Nokia
  • Nokia Solutions and Networks (NSN)
  • Nominum
  • North Carolina State University
  • Northwestern University
  • Norton
  • NQ Mobile
  • NTT DoCoMo
  • NXP
  • OATH
  • Odyssey Software
  • Okta
  • Optenet
  • Optio Labs
  • Oracle
  • Orange (France Telecom)
  • Palm
  • Palo Alto Networks
  • Panasonic
  • Panda Security
  • Pantech
  • PerspecSys
  • PGP Universal
  • Philips
  • Phone On Map
  • PineApp
  • Ping Identity
  • Pointsec
  • Prolexic
  • ProofPoint
  • PROTEI
  • Qihoo 360
  • Qualcomm
  • Qualys
  • QuickHeal
  • Radware
  • RBI
  • Renesas
  • Rerware
  • RioRey
  • RSA
  • SafeNet
  • Safran
  • Samsung Electronics
  • SanDisk
  • SAP
  • SecPoint
  • Secunia
  • Securitas
  • SecurStar
  • SharePoint
  • Silent Circle
  • SilverSky
  • SK Telecom
  • SkyHigh Telecom
  • SmithMicro Software
  • SmoothWall Ltd
  • Software Security Solutions
  • Sony
  • Sophos
  • Soti
  • Sourcefire
  • Spansion
  • SpyChest
  • SRA International
  • Stealth Genie
  • StillSecure
  • STMicroelectronics
  • Stonesoft
  • Sun Microsystems
  • SuperValu
  • Sybase
  • Symantec
  • Symplified
  • Symsoft
  • Tarmac
  • Tekelec (Oracle)
  • Telecommunications Industry Association (TIA)
  • Telefonica
  • Telenor
  • TeliaSonera
  • Telit
  • Telstra
  • Tenable
  • Thales
  • Thales e-Security
  • The Trusted Computing Group (TCG)
  • TigerText
  • T-Mobile
  • Total Defense
  • Trend Micro
  • TRITON
  • Trust Digital
  • Trusteer
  • TrustGo
  • Trustlook
  • Trustwave
  • TurkCell
  • Ultra Electronics AEP
  • UMU
  • Untangle
  • Valimo
  • VeliQ
  • Veracode
  • Verisign
  • Verizon
  • Verizon Wireless
  • Vodafone
  • Voltage Security
  • Vormetric
  • WatchGuard Technologies
  • Wavelink
  • Webroot
  • Websense
  • WiFi Alliance
  • Zenprise (now Citrix)
  • Zscaler
  • ZTE
  • ZyXEL Communications

Countires Covered

  • Afghanistan
  • Albania
  • Algeria
  • Andorra
  • Angola
  • Anguilla
  • Antigua & Barbuda
  • Argentina
  • Armenia
  • Aruba
  • Australia
  • Austria
  • Azerbaijan
  • Bahamas
  • Bahrain
  • Bangladesh
  • Barbados
  • Belarus
  • Belgium
  • Belize
  • Benin
  • Bermuda
  • Bhutan
  • Bolivia
  • Bosnia Herzegovina
  • Botswana
  • Brazil
  • British Virgin Islands
  • Brunei
  • Bulgaria
  • Burkina Faso
  • Burundi
  • Cambodia
  • Cameroon
  • Canada
  • Cape Verde
  • Cayman Islands
  • Central African Republic
  • Chad
  • Chile
  • China
  • Cocos Islands
  • Colombia
  • Comoros Islands
  • Congo
  • Cook Islands
  • Costa Rica
  • Côte d'Ivoire
  • Croatia
  • Cuba
  • Cyprus
  • Czech Republic
  • Democratic Rep of Congo (ex-Zaire)
  • Denmark
  • Djibouti
  • Dominica
  • Dominican Republic
  • East Timor
  • Ecuador
  • Egypt
  • El Salvador
  • Equatorial Guinea
  • Eritrea
  • Estonia
  • Ethiopia
  • Faroe Islands
  • Federated States of Micronesia
  • Fiji
  • Finland
  • France
  • French Guiana
  • French Polynesia (ex-Tahiti)
  • French West Indies
  • Gabon
  • Gambia
  • Georgia
  • Germany
  • Ghana
  • Gibraltar
  • Greece
  • Greenland
  • Grenada
  • Guam
  • Guatemala
  • Guernsey
  • Guinea Republic
  • Guinea-Bissau
  • Guyana
  • Haiti
  • Honduras
  • Hong Kong
  • Hungary
  • Iceland
  • India
  • Indonesia
  • Iran
  • Iraq
  • Ireland
  • Isle of Man
  • Israel
  • Italy
  • Jamaica
  • Japan
  • Jersey
  • Jordan
  • Kazakhstan
  • Kenya
  • Kirghizstan
  • Kiribati
  • Korea
  • Kosovo
  • Kuwait
  • Laos
  • Latvia
  • Lebanon
  • Lesotho
  • Liberia
  • Libya
  • Liechtenstein
  • Lithuania
  • Luxembourg
  • Macau
  • Macedonia
  • Madagascar
  • Malawi
  • Malaysia
  • Maldives
  • Mali
  • Malta
  • Marshall Islands
  • Mauritania
  • Mauritius
  • Mayotte
  • Mexico
  • Moldova
  • Monaco
  • Mongolia
  • Montenegro
  • Montserrat
  • Morocco
  • Mozambique
  • Myanmar
  • Namibia
  • Nepal
  • Netherlands
  • Netherlands Antilles
  • New Caledonia
  • New Zealand
  • Nicaragua
  • Niger
  • Nigeria
  • Niue
  • North Korea
  • Northern Marianas
  • Norway
  • Oman
  • Pakistan
  • Palau
  • Palestine
  • Panama
  • Papua New Guinea
  • Paraguay
  • Peru
  • Philippines
  • Poland
  • Portugal
  • Puerto Rico
  • Qatar
  • Réunion
  • Romania
  • Russia
  • Rwanda
  • Samoa
  • Samoa (American)
  • Sao Tomé & Principe
  • Saudi Arabia
  • Senegal
  • Serbia
  • Seychelles
  • Sierra Leone
  • Singapore
  • Slovak Republic
  • Slovenia
  • Solomon Islands
  • Somalia
  • South Africa
  • Spain
  • Sri Lanka
  • St Kitts & Nevis
  • St Lucia
  • St Vincent & The Grenadines
  • Sudan
  • Suriname
  • Swaziland
  • Sweden
  • Switzerland
  • Syria
  • Tajikistan
  • Taiwan
  • Tanzania
  • Thailand
  • Togo
  • Tonga
  • Trinidad & Tobago
  • Tunisia
  • Turkey
  • Turkmenistan
  • Turks & Caicos Islands
  • UAE
  • Uganda
  • UK
  • Ukraine
  • Uruguay
  • US Virgin Islands
  • USA
  • Uzbekistan
  • Vanuatu
  • Venezuela
  • Vietnam
  • Yemen
  • Zambia
  • Zimbabwe

The Mobile Security (mSecurity) Bible: 2014 – 2020 - Device Security, Infrastructure Security & Security Services

Table of Contents

1 Chapter 1: Introduction
1.1 Executive Summary
1.2 Topics Covered
1.3 Historical Revenue & Forecast Segmentation
1.4 Key Questions Answered
1.5 Key Findings
1.6 Methodology
1.7 Target Audience
1.8 Companies & Organizations Mentioned

2 Chapter 2: An Overview of the Mobile Device & Network Security Market
2.1 The Importance of Mobile Devices & Networks
2.1.1 Mobile Devices Outnumber PCs & Notebooks
2.1.2 Supporting a Plethora of Applications & Hardware Peripherals
2.1.3 Vulnerability to Attacks: Opening the Market for Mobile Security
2.2 What Constitutes the Mobile Device & Network Security Market?
2.3 Mobile Network Infrastructure Security Software & Appliances
2.3.1 Overview
2.3.2 What Constitutes this Submarket?
2.3.3 Value Chain
2.3.4 Vendor Landscape: Key Characteristics
2.4 Mobile Device Client Security Software
2.4.1 Overview
2.4.2 What Constitutes this Submarket?
2.4.3 Value Chain
2.4.4 Vendor Landscape: Key Characteristics
2.5 Mobile Device Security Hardware
2.5.1 Overview
2.5.2 What Constitutes this Submarket?
2.5.3 Value Chain
2.5.4 Vendor Landscape: Key Characteristics
2.6 Mobile Security & MDM Services
2.6.1 Overview
2.6.2 What Constitutes this Submarket?
2.6.3 Value Chain
2.6.4 Vendor Landscape: Key Characteristics

3 Chapter 3: Mobile Network Infrastructure Security Software & Appliances
3.1 Integrated Security Appliances
3.1.1 Introduction
3.1.2 How Integrated Security Appliance Help in Securing Mobile Networks?
3.1.3 Integrated Security Appliance Use Cases
3.1.3.1 Firewall
3.1.3.2 Intrusion Prevention System (IPS)
3.1.3.3 Email Protection System
3.1.3.4 Identity Protection System
3.1.3.5 Content Filtering
3.1.3.6 Anti-Virus and Anti-Spyware Protection
3.1.3.7 Anti-Spam Filtering
3.1.3.8 Virtual Private Networks (VPN)
3.1.4 Key Market Drivers
3.1.4.1 Mobility
3.1.4.2 Small Businesses
3.1.4.3 Ubiquity
3.1.4.4 Compliance
3.1.4.5 Processing Power
3.1.5 Key Market Challenges
3.1.5.1 Design Trade-offs
3.1.5.2 Single Point of Failure
3.1.6 Key Players in the Market
3.1.7 Recent Innovations and Developments
3.1.7.1 Case Study: Sophos
3.1.7.2 Case Study: Fortinet
3.2 Content Security Gateways
3.2.1 Introduction
3.2.2 How Content Security Gateways Protect Mobile Networks?
3.2.3 Delivery Modes
3.2.4 Features
3.2.5 Key Market Drivers
3.2.5.1 Internet Growth
3.2.5.2 Granularity of Features
3.2.6 Key Market Challenges
3.2.6.1 Risk-reward Ratio
3.2.7 Key Players in the Market
3.2.8 Recent Innovations and Developments
3.2.8.1 Case Study: SECaaS based Vendors

4 Chapter 4: Mobile Device Client Security Software
4.1 Anti-Malware/Anti-Virus Client Software
4.1.1 Introduction
4.1.2 Detection Mechanism: How it Works?
4.1.3 Delivery Mode
4.1.4 Performance Barometers
4.1.5 Key Market Drivers
4.1.5.1 Mobile Device Shipment Volumes
4.1.5.2 Device Metamorphosis
4.1.5.3 Application Marketplaces
4.1.6 Key Market Challenges
4.1.6.1 Limited Resource Availability
4.1.6.2 Scepticism
4.1.7 Key Players in the Market
4.1.8 Recent Innovations and Developments
4.1.8.1 Case Study: Antivirus Test Results
4.1.8.2 Vulnerability Against Malware
4.2 Back Up & Restore Software
4.2.1 Introduction
4.2.2 Trend Micro Case Study: How Mobile Back Up & Restore Software Works?
4.2.3 Delivery Mode
4.2.4 Key Market Drivers
4.2.4.1 Short Replacement Cycles
4.2.4.2 Maturity of Third Party Hosting Services
4.2.5 Key Market Challenges
4.2.5.1 Software Usability Issues
4.2.5.2 Data Security & Confidentiality in the Cloud
4.2.6 Key Players in the Market
4.2.7 Recent Innovations and Developments
4.2.7.1 Case Study: Axiom and NQ Mobile
4.2.7.2 Case Study: Cellebrite
4.3 Privacy Protection Software
4.3.1 Introduction
4.3.2 How Does Mobile Privacy Protection Software Work?
4.3.3 Key Market Drivers
4.3.3.1 Proliferation of Mobile User Information
4.3.3.2 Monitoring & Regulating Access to Personal Data
4.3.4 Key Market Challenges
4.3.4.1 Ambiguity of Functionality & Software Bundling
4.3.4.2 Lack of Commercial Instigation
4.3.5 Recent Innovations and Developments
4.3.5.1 CalOPPA
4.4 Mobile VPN Client Software
4.4.1 Introduction
4.4.2 How Mobile VPN Works?
4.4.3 Key Market Drivers
4.4.3.1 Privacy over Public Mobile Networks
4.4.3.2 Bypassing Restrictions
4.4.4 Key Market Challenges
4.4.4.1 Duality of Android
4.4.4.2 Interoperability
4.4.5 Key Players in the Market
4.4.6 Recent Innovations and Developments
4.4.6.1 Case Study: Inside Secure
4.5 Remote Locking Software
4.5.1 Introduction
4.5.2 How Remote Locking Software Works?
4.5.3 Key Market Drivers
4.5.4 Key Market Challenges
4.5.5 Key Players in the Market
4.5.6 Recent Innovations and Developments
4.6 Remote Tracking Software
4.6.1 Introduction
4.6.2 How Remote Tracking Software Works?
4.6.3 Key Market Drivers
4.6.3.1 Device Recovery
4.6.3.2 Proactive Location Based Warning
4.6.4 Key Market Challenges
4.6.4.1 Privacy Concerns
4.6.4.2 Location Technology Challenges
4.6.5 Key Players in the Market
4.6.6 Recent Innovations and Developments
4.6.6.1 Case Study: SK Telecom
4.7 Encrypted Communications (Voice/Data) Software
4.7.1 Introduction
4.7.2 How Encrypted Communications Software Works?
4.7.2.1 AT&T’s Approach
4.7.2.2 Cellcrypt’s Approach
4.7.2.3 RIM’s Approach
4.7.3 Key Market Drivers
4.7.3.1 Confidentiality
4.7.3.2 Wider Stakeholder Participation
4.7.4 Key Market Challenges
4.7.4.1 Overheads
4.7.4.2 Managing the Balance
4.7.5 Key Players in the Market
4.7.6 Recent Innovations and Developments
4.7.6.1 Case Study: Silent Circle
4.8 Encrypted Storage Software
4.8.1 Introduction
4.8.2 How Encrypted Storage Software Works?
4.8.3 Key Market Drivers
4.8.3.1 Preserving Integrity of Personal Data
4.8.3.2 Remote Functionality
4.8.4 Key Market Challenges
4.8.4.1 Performance Issues
4.8.5 Key Players in the Market
4.8.6 Recent Innovations and Developments

5 Chapter 5: Mobile Device Security Hardware
5.1 Semiconductors/Embedded Chip Security
5.1.1 Introduction
5.1.2 How Embedded Chip Security Works?
5.1.3 Scenarios to be Catered For
5.1.3.1 Secure Paths Within the Device
5.1.3.2 Enforcing DRM Rules
5.1.3.3 Enforcing Software and Hardware Integrity
5.1.3.4 Management of Meta-data
5.1.3.5 Management of Updates
5.1.3.6 Management of Mobile Payments
5.1.3.7 Preventing Unauthorized Access to the Device
5.1.4 Role Played by TCG
5.1.4.1 TPM Mobile
5.1.5 Key Market Drivers
5.1.5.1 Best Fitment
5.1.5.2 Advances in Cryptography
5.1.6 Key Market Challenges
5.1.6.1 Stakeholder Ennui
5.1.7 Key Players in the Market
5.1.8 Recent Innovations and Developments
5.1.8.1 Barriers to TPM Mobile
5.1.8.2 Can Embedded Chip Security Deter the Growth of Security Software Applications?
5.2 NFC
5.2.1 Introduction
5.2.2 How NFC Works?
5.2.2.1 Features and Use Cases
5.2.2.2 Is NFC Immune to Eavesdropping?
5.2.2.3 Security Measures
5.2.3 Key Market Drivers
5.2.3.1 Universality & Versatility
5.2.3.2 Support from Mobile Network Operators
5.2.4 Key Market Challenges
5.2.4.1 Stakeholder Reluctance to Hardware Modification
5.2.4.2 Lack of Focus on Robust Encryption Techniques
5.2.5 Key Players in the Market
5.2.5.1 Early Developers
5.2.5.2 Mobile Network Operators
5.2.5.3 Semiconductor Chipset Makers
5.2.5.4 Mobile OEMs
5.2.6 Recent Innovations and Developments
5.2.6.1 Google Wallet: Transforming Mobile Devices Into Virtual Wallets
5.2.6.2 ISIS
5.3 Biometrics
5.3.1 Introduction
5.3.1.1 Representing Identity Data
5.3.1.2 Fingerprint Capture
5.3.1.3 Facial Feature Recognition
5.3.1.4 Usage of Voice Recognition
5.3.2 How Biometrics Work?
5.3.2.1 Enrollment
5.3.2.2 Sample Extraction
5.3.2.3 Biometric Validation
5.3.3 Key Market Drivers
5.3.3.1 Mobility & Emerging Applications of Biometrics
5.3.3.2 Mobile Network Operator Interest
5.3.4 Key Market Challenges
5.3.4.1 Hardware Value Addition
5.3.4.2 Stakeholder Scepticism
5.3.5 Key Players in the Market
5.3.6 Recent Innovations and Developments
5.3.6.1 Voice Recognition Software: Lessons for Mobile Biometrics
5.3.6.2 EyeVerify: Identifying Live Eye Vein Patterns

6 Chapter 6: Mobile Security and MDM Services
6.1 On-Premises Mobile Security MDM Services
6.1.1 Introduction
6.1.2 How MDM Services Work?
6.1.3 Essential Attributes of MDM Services
6.1.3.1 Accessibility
6.1.3.2 Should Not be Perceived as an Overhead
6.1.3.3 Granularity
6.1.3.4 Ease of Maintenance and Management
6.1.4 Key Market Drivers
6.1.4.1 Dissolution of Distinction between Personal and Official Devices
6.1.4.2 The Growing Penetration of the iPhone and Android Devices
6.1.4.3 BYOD
6.1.4.4 Need for Policy Framework
6.1.5 Key Market Challenges
6.1.5.1 Administration Overhead
6.1.5.2 Distinguishing between Personal and Corporate Usage
6.1.6 Key Players in the Market
6.1.7 Recent Innovations and Developments
6.2 Cloud Based Mobile SECaaS MDM Services
6.2.1 Introduction
6.2.2 How Cloud Based Mobile SaaS MDM Services Work?
6.2.3 Desirable Attributes
6.2.3.1 Integration with Directory Services
6.2.3.2 Email Access Control
6.2.3.3 Network Up-time and Availability
6.2.3.4 Operational and Security Practices
6.2.3.5 Measures to Reduce Manual Intervention
6.2.4 Key Market Drivers
6.2.4.1 Freedom from Upfront Investment
6.2.4.2 Tackling Obsolescence
6.2.4.3 Operational Synergy
6.2.5 Key Market Challenges
6.2.5.1 Implications of Hosting
6.2.6 Key Players in the Market
6.2.7 Case Study of Integrated MDM: AirWatch
6.2.7.1 OS Support
6.2.7.2 MDM Features
6.2.7.3 Hosting Models
6.2.7.4 Licensing Mechanism
6.3 Mobile Identity Management Services
6.3.1 Introduction
6.3.2 History
6.3.3 Modus operandii, innovations and key players explained through diverse approaches
6.3.3.1 Active Directory from Microsoft
6.3.3.2 SSO from Oracle
6.3.3.3 Establishing the SIM Card as an Authentication Device
6.3.3.4 Adding Mobility to Digital Ids: Valimo/Gemalto Case Study
6.3.4 Key Market Drivers
6.3.4.1 Mobility for Business Users
6.3.4.2 Ease of Use
6.3.4.3 Financial Inclusion
6.3.4.4 Incentive for Mobile Network Operators
6.3.5 Key Market Challenges
6.3.5.1 Device Vulnerability

7 Chapter 7: Key Company Profiles
7.1 3M Cogent
7.2 Actiance
7.3 AdaptiveMobile
7.4 Adtran
7.5 Airbus Defence and Space
7.6 AirWatch
7.7 AhnLab
7.8 Alcatel-Lucent
7.9 Amtel
7.10 Anam Technologies
7.11 Apple
7.12 Array Networks
7.13 AVAST Software
7.14 AVG
7.15 Avira
7.16 Barracuda
7.17 BitDefender
7.18 BlackBerry
7.19 BullGuard
7.2 CA Technologies
7.21 Cellebrite
7.22 Cellusys
7.23 Check Point
7.24 Cisco Systems
7.25 Citrix Systems
7.26 Cloudmark
7.27 CYREN
7.28 Dell
7.29 D-Link
7.3 Dr. Web
7.31 Ericsson
7.32 ESET
7.33 Extreme Networks
7.34 F5 Networks
7.35 Fortinet
7.36 FingerQ
7.37 F-Secure
7.38 Global Technology Associates (GTA)
7.39 HP
7.4 IBM
7.41 Inside Secure
7.42 Intel Security (McAfee)
7.43 Intrusion
7.44 Juniper Networks
7.45 Kaspersky Lab
7.46 KoolSpan
7.47 LookOut
7.48 Mahindra Comviva
7.49 Microsoft
7.5 MobileIron
7.51 Mocana
7.52 Motorola Solutions
7.53 Netmotion Wireless
7.54 Nokia
7.55 Nokia Solutions & Networks (NSN)
7.56 NQ Mobile
7.57 NXP
7.58 Oracle
7.59 Palo Alto Networks
7.6 Panda Security
7.61 PROTEI
7.62 Qihoo 360
7.63 Samsung
7.64 Sophos
7.65 Soti
7.66 Sourcefire
7.67 SRA International
7.68 Symantec
7.69 Symsoft
7.70 Trend Micro
7.71 Ultra Electronics AEP
7.72 Untangle
7.73 WatchGuard Technologies
7.74 Webroot
7.75 ZyXEL Communications
7.76 Others

8 Chapter 8: Market Analysis & Forecasts
8.1 Global Outlook of the Mobile Device & Network Security Market
8.2 Submarket Segmentation
8.3 Mobile Network Infrastructure Security Software & Appliances Submarket
8.3.1 Integrated Security Appliances for Mobile Networks
8.3.2 Content Security Gateways for Mobile Networks
8.3.3 SMS/MMS Security Gateways for Mobile Networks
8.4 Mobile Device Client Security Software Submarket
8.4.1 Anti-Malware/Anti-Virus Client Software
8.4.2 Back Up & Restore Software
8.4.3 Privacy Protection Software
8.4.4 Mobile VPN Client Software
8.4.5 Remote Locking
8.4.6 Remote Tracking Software
8.4.7 Encrypted Communication (Voice/Data) Software
8.4.8 Encrypted Storage Software
8.4.9 Enterprise vs. Consumer Segmentation
8.5 Mobile Device Security Hardware Submarket
8.5.1 Semiconductors/Embedded Chip Security
8.5.2 NFC
8.5.3 Biometrics
8.6 Mobile Security & MDM Services
8.6.1 On-premises Mobile Security MDM Services
8.6.2 Cloud Based Mobile SECaaS Services
8.6.3 Mobile Identity Management Services
8.7 Regional Outlook
8.8 Asia Pacific
8.8.1 Submarket Segmentation
8.8.2 Mobile Network Infrastructure Security Software & Appliances
8.8.3 Mobile Device Client Security Software
8.8.4 Mobile Device Security Hardware
8.8.5 Mobile Security & MDM Services
8.8.6 Country Level Segmentation
8.8.7 Australia
8.8.8 China
8.8.9 India
8.8.10 Japan
8.8.11 South Korea
8.8.12 Pakistan
8.8.13 Thailand
8.8.14 Indonesia
8.8.15 Malaysia
8.8.16 Taiwan
8.8.17 Philippines
8.8.18 Rest of Asia Pacific
8.9 Eastern Europe
8.9.1 Submarket Segmentation
8.9.2 Mobile Network Infrastructure Security Software & Appliances
8.9.3 Mobile Device Client Security Software
8.9.4 Mobile Device Security Hardware
8.9.5 Mobile Security & MDM Services
8.9.6 Country Level Segmentation
8.9.7 Czech Republic
8.9.8 Poland
8.9.9 Russia
8.9.10 Rest of Eastern Europe
8.10 Latin & Central America
8.10.1 Submarket Segmentation
8.10.2 Mobile Network Infrastructure Security Software & Appliances
8.10.3 Mobile Device Client Security Software
8.10.4 Mobile Device Security Hardware
8.10.5 Mobile Security & MDM Services
8.10.6 Country Level Segmentation
8.10.7 Argentina
8.10.8 Brazil
8.10.9 Mexico
8.10.10 Rest of Latin & Central America
8.11 Middle East & Africa
8.11.1 Submarket Segmentation
8.11.2 Mobile Network Infrastructure Security Software & Appliances
8.11.3 Mobile Device Client Security Software
8.11.4 Mobile Device Security Hardware
8.11.5 Mobile Security & MDM Services
8.11.6 Country Level Segmentation
8.11.7 South Africa
8.11.8 UAE
8.11.9 Qatar
8.11.10 Saudi Arabia
8.11.11 Israel
8.11.12 Rest of the Middle East & Africa
8.12 North America
8.12.1 Submarket Segmentation
8.12.2 Mobile Network Infrastructure Security Software & Appliances
8.12.3 Mobile Device Client Security Software
8.12.4 Mobile Device Security Hardware
8.12.5 Mobile Security & MDM Services
8.12.6 Country Level Segmentation
8.12.7 USA
8.12.8 Canada
8.13 Western Europe
8.13.1 Submarket Segmentation
8.13.2 Mobile Network Infrastructure Security Software & Appliances
8.13.3 Mobile Device Client Security Software
8.13.4 Mobile Device Security Hardware
8.13.5 Mobile Security & MDM Services
8.13.6 Country Level Segmentation
8.13.7 Denmark
8.13.8 Finland
8.13.9 France
8.13.10 Germany
8.13.11 Italy
8.13.12 Spain
8.13.13 Sweden
8.13.14 Norway
8.13.15 UK
8.13.16 Rest of Western Europe

9 Chapter 9: Conclusion & Strategic Recommendations
9.1 Mobile Device OEM Security Offerings
9.2 OS Vendor Focus: Privacy Protection Services
9.3 The Prospects of NFC as an Authentication Solution
9.4 Security Implications for M2M Devices and IoT
9.5 The Prospects of Mobile Security as a Service (SECaaS)
9.6 The Growing Adoption of Mobile Client Security Software
9.7 Security Vulnerabilities in Public WiFi Networks: Impact on the Mobile Security Market
9.8 The Emerging Market for SMS/MMS Security Gateways: Addressing Messaging Spam
9.9 LTE Security Vulnerabilities: Are Wireless Carriers Addressing the Concern?
9.10 Prospects of RAN Centric Security Products
9.11 Strategic Recommendations
9.11.1 Recommendations for Mobile Infrastructure Security Providers
9.11.2 Recommendations for Mobile Device Security Providers
9.11.3 Recommendations for Mobile Security & MDM Service Providers
9.11.4 Recommendations for Enterprises
9.11.5 Recommendations for Wireless Carriers

List of Figures

Figure 1: Global Connected Mobile Device vs. PC Shipments: 2010 – 2020 (Millions of Units)
Figure 2: Annual Global Throughout of Mobile Network Data Traffic by Region: 2010 – 2020 (Exabytes)
Figure 3: Mobile Security Modes for Solution Delivery
Figure 4: Stakeholders in the Mobile Network Infrastructure Security Software & Appliances Value Chain
Figure 5: Stakeholders in the Mobile Device Client Security Software Value Chain
Figure 6: Stakeholders in the Mobile Device Security Hardware Value Chain
Figure 7: Stakeholders in the Mobile Security & MDM Services Value Chain
Figure 8: Global Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 9: Global Mobile Device & Network Security Revenue by Submarket: 2010 - 2020 ($ Million)
Figure 10: Global Mobile Network Infrastructure Security Software & Appliances Submarket Revenue: 2010 - 2020 ($ Million)
Figure 11: Global Mobile Network Infrastructure Security Software & Appliances Submarket Revenue by Product Category: 2010 - 2020 ($ Million)
Figure 12: Global Mobile Network Integrated Security Appliance Revenue: 2010 - 2020 ($ Million)
Figure 13: Global Mobile Network Content Security Gateway Revenue: 2010 - 2020 ($ Million)
Figure 14: Global SMS/MMS Security Gateway Revenue: 2010 - 2020 ($ Million)
Figure 15: Global Mobile Device Client Security Software Submarket Revenue: 2010 - 2020 ($ Million)
Figure 16: Global Mobile Device Client Security Software Submarket Revenue by Product Category: 2010 - 2020 ($ Million)
Figure 17: Global Mobile Device Anti-Malware/Anti-Virus Client Software Revenue: 2010 - 2020 ($ Million)
Figure 18: Global Mobile Device Back Up & Restore Software Revenue: 2010 - 2020 ($ Million)
Figure 19: Global Mobile Privacy Protection Software Revenue: 2010 - 2020 ($ Million)
Figure 20: Global Mobile VPN Client Software Revenue: 2010 - 2020 ($ Million)
Figure 21: Global Mobile Remote Locking Software Revenue: 2010 - 2020 ($ Million)
Figure 22: Global Mobile Remote Tracking Software Revenue: 2010 - 2020 ($ Million)
Figure 23: Global Mobile Encrypted Communication (Voice/Data) Software Revenue: 2010 - 2020 ($ Million)
Figure 24: Global Mobile Encrypted Storage Software Revenue: 2010 - 2020 ($ Million)
Figure 25: Global Mobile Device Client Security Software Submarket Revenue by Enterprise vs. Consumer Segmentation: 2010 - 2020 ($ Million)
Figure 26: Global Enterprise Mobile Device Client Security Software Submarket Revenue: 2010 - 2020 ($ Million)
Figure 27: Global Consumer Mobile Device Client Security Software Submarket Revenue: 2010 - 2020 ($ Million)
Figure 28: Global Mobile Device Security Hardware Submarket Revenue: 2010 - 2020 ($ Million)
Figure 29: Global Mobile Device Security Hardware Submarket Revenue by Product Category: 2010 - 2020 ($ Million)
Figure 30: Global Mobile Semiconductors/Embedded Chip Security Revenue: 2010 - 2020 ($ Million)
Figure 31: Global Mobile NFC Revenue: 2010 - 2020 ($ Million)
Figure 32: Global Mobile Biometrics Revenue: 2010 - 2020 ($ Million)
Figure 33: Global Mobile Security & MDM Services Submarket Revenue: 2010 - 2020 ($ Million)
Figure 34: Global Mobile Security & MDM Services Submarket Revenue by Service Category: 2010 - 2020 ($ Million)
Figure 35: Global On-premises Mobile Security MDM Services Revenue: 2010 - 2020 ($ Million)
Figure 36: Global Cloud Based Mobile SECaaS Revenue: 2010 - 2020 ($ Million)
Figure 37: Global Mobile Identity Management Services Revenue: 2010 - 2020 ($ Million)
Figure 38: Mobile Device & Network Security Revenue by Region: 2010 - 2020 ($ Million)
Figure 39: Asia Pacific Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 40: Asia Pacific Mobile Device & Network Security Revenue by Submarket: 2010 - 2020 ($ Million)
Figure 41: Asia Pacific Mobile Network Infrastructure Security Software & Appliances Revenue: 2010 - 2020 ($ Million)
Figure 42: Asia Pacific Mobile Device Client Security Software Revenue: 2010 - 2020 ($ Million)
Figure 43: Asia Pacific Mobile Device Security Hardware Revenue: 2010 - 2020 ($ Million)
Figure 44: Asia Pacific Mobile Security & MDM Services Revenue: 2010 - 2020 ($ Million)
Figure 45: Asia Pacific Mobile Device & Network Security Revenue by Country: 2010 - 2020 ($ Million)
Figure 46: Australia Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 47: China Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 48: India Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 49: Japan Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 50: South Korea Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 51: Pakistan Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 52: Thailand Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 53: Indonesia Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 54: Malaysia Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 55: Taiwan Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 56: Philippines Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 57: Mobile Device & Network Security Revenue in the Rest of Asia Pacific: 2010 - 2020 ($ Million)
Figure 58: Eastern Europe Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 59: Eastern Europe Mobile Device & Network Security Revenue by Submarket: 2010 - 2020 ($ Million)
Figure 60: Eastern Europe Mobile Network Infrastructure Security Software & Appliances Revenue: 2010 - 2020 ($ Million)
Figure 61: Eastern Europe Mobile Device Client Security Software Revenue: 2010 - 2020 ($ Million)
Figure 62: Eastern Europe Mobile Device Security Hardware Revenue: 2010 - 2020 ($ Million)
Figure 63: Eastern Europe Mobile Security & MDM Services Revenue: 2010 - 2020 ($ Million)
Figure 64: Eastern Europe Mobile Device & Network Security Revenue by Country: 2010 - 2020 ($ Million)
Figure 65: Czech Republic Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 66: Poland Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 67: Russia Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 68: Mobile Device & Network Security Revenue in the Rest of Eastern Europe: 2010 - 2020 ($ Million)
Figure 69: Latin & Central America Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 70: Latin & Central America Mobile Device & Network Security Revenue by Submarket: 2010 - 2020 ($ Million)
Figure 71: Latin & Central America Mobile Network Infrastructure Security Software & Appliances Revenue: 2010 - 2020 ($ Million)
Figure 72: Latin & Central America Mobile Device Client Security Software Revenue: 2010 - 2020 ($ Million)
Figure 73: Latin & Central America Mobile Device Security Hardware Revenue: 2010 - 2020 ($ Million)
Figure 74: Latin & Central America Mobile Security & MDM Services Revenue: 2010 - 2020 ($ Million)
Figure 75: Latin & Central America Mobile Device & Network Security Revenue by Country: 2010 - 2020 ($ Million)
Figure 76: Argentina Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 77: Brazil Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 78: Mexico Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 79: Mobile Device & Network Security Revenue in the Rest of Latin & Central America: 2010 - 2020 ($ Million)
Figure 80: Middle East & Africa Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 81: Middle East & Africa Mobile Device & Network Security Revenue by Submarket: 2010 - 2020 ($ Million)
Figure 82: Middle East & Africa Mobile Network Infrastructure Security Software & Appliances Revenue: 2010 - 2020 ($ Million)
Figure 83: Middle East & Africa Mobile Device Client Security Software Revenue: 2010 - 2020 ($ Million)
Figure 84: Middle East & Africa Mobile Device Security Hardware Revenue: 2010 - 2020 ($ Million)
Figure 85: Middle East & Africa Mobile Security & MDM Services Revenue: 2010 - 2020 ($ Million)
Figure 86: Middle East & Africa Mobile Device & Network Security Revenue by Country: 2010 - 2020 ($ Million)
Figure 87: South Africa Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 88: UAE Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 89: Qatar Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 90: Saudi Arabia Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 91: Israel Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 92: Mobile Device & Network Security Revenue in the Rest of the Middle East & Africa: 2010 - 2020 ($ Million)
Figure 93: North America Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 94: North America Mobile Device & Network Security Revenue by Submarket: 2010 - 2020 ($ Million)
Figure 95: North America Mobile Network Infrastructure Security Software & Appliances Revenue: 2010 - 2020 ($ Million)
Figure 96: North America Mobile Device Client Security Software Revenue: 2010 - 2020 ($ Million)
Figure 97: North America Mobile Device Security Hardware Revenue: 2010 - 2020 ($ Million)
Figure 98: North America Mobile Security & MDM Services Revenue: 2010 - 2020 ($ Million)
Figure 99: North America Mobile Device & Network Security Revenue by Country: 2010 - 2020 ($ Million)
Figure 100: USA Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 101: Canada Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 102: Western Europe Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 103: Western Europe Mobile Device & Network Security Revenue by Submarket: 2010 - 2020 ($ Million)
Figure 104: Western Europe Mobile Network Infrastructure Security Software & Appliances Revenue: 2010 - 2020 ($ Million)
Figure 105: Western Europe Mobile Device Client Security Software Revenue: 2010 - 2020 ($ Million)
Figure 106: Western Europe Mobile Device Security Hardware Revenue: 2010 - 2020 ($ Million)
Figure 107: Western Europe Mobile Security & MDM Services Revenue: 2010 - 2020 ($ Million)
Figure 108: Western Europe Mobile Device & Network Security Revenue by Country: 2010 - 2020 ($ Million)
Figure 109: Denmark Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 110: Finland Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 111: France Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 112: Germany Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 113: Italy Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 114: Spain Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 115: Sweden Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 116: Norway Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 117: UK Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 118: Mobile Device & Network Security Revenue in the Rest of Western Europe: 2010 - 2020 ($ Million)
Figure 119: Mobile Device Client Security Software Revenue by Region: 2010 - 2020 ($ Million)
Figure 120: SMS/MMS Security Gateways Revenue by Region: 2010 - 2020 ($ Million)

Published By: Signals and Systems Telecom
Product Code: Signals and Systems Telecom49


Did you find what you are/were looking for ? If not, read below and browse through other relevant pages for similar market research reports OR get in touch with us through the form/contact info in your right navigation panel and we’ll share relevant market report titles for you to explore.

Related Reports:


Why ReportsnReports.com?

  • 400,000 market research reports and growing.
  • Top Fortune 500 Organizations trust us for research data.
  • 24/7 support on call as well as emails.
  • Your Details are safe with us.
  • Free support for your research requirements.
  • Report Delivery: Email
  • Delivery Time:
    • Upto 24 hrs - working days
    • Upto 48 hrs max - weekends and public holidays

Research Support / Custom Research

If this business study does not have the data and information analysis you need, contact us with your research requirements. We explore available market research reports to map your needs and share report titles with you. Alternatively, we can also offer custom research that suits your budget and timelines. Share your information requirements here.
Connect With Us
Email: sales@reportsandreports.com Call : + 1 888 391 5441

Subscription Option

Using our subscription option, you get access to market research reports and industry data of IT & Telecommunication market as per your needs. Get the best of IT & Telecommunication research reports by utilizing your research budgets in an optimum way.

More about our Subscription option
Email Alerts

Get Email alerts about market research reports from industries and publishers of your interest:

Live Chat
Live Chat by Comm100