Analysis of the Global Mobile Endpoint Protection Market

  • Publication Date:October 2013
  • Publisher:Frost & Sullivan
  • Product Type: Report
  • Pages:96
  • ISBN:1870915

Analysis of the Global Mobile Endpoint Protection Market

Mass Smartphone Adoption Increases Risk and Drives Demand for Innovative Security Products

The mobile security challenge is complex and multi-faceted. Mobile devices can be infected by malicious software called malware, enabling hackers to gain access or control. Mobile applications (simply called “apps”) on the device can perform unwanted, high-risk actions. Sensitive data stored on the device can also be lost or stolen. This study focuses on mobile endpoint protection products designed to secure the device against malware, cyber attacks, high risk applications, and physical loss or theft.

Executive Summary

•Highly mobile computing devices such as tablets and smartphones enable a high degree of connectivity and productivity that employees now expect in their jobs, whether companies support personal-owned devices or provide corporate-owned devices.
•An organization's mobile device access and support policies are of critical consideration for enabling a highly productive, motivated, and connected workforce.
•At a minimum, employees expect the flexibility to use their personally owned devices to access corporate network resources and files. As a result, many IT organizations are adopting a practice called Bring-Your-Own-Device (BYOD).
•The ability to provide corporate issued mobile devices or implement a BYOD strategy is essential for any organization to stay competitive in a highly connected world.
•Unfortunately, these same mobile devices represent new attack vectors for opportunistic and skilled hacker organizations.
•Mobile devices are now being targeted by hackers for data theft and fraudulent activity or as part of a sophisticated multi-stage cyber attack.
•As a result, awareness of mobile device security is growing rapidly amongst consumer and business customers alike.
•However, there is little consensus on an appropriate approach to mobile security.
•The mobile security challenge is complex and multi-faceted. Mobile devices can be infected by malicious software (malware), enabling hackers to gain access or control. Mobile applications (called “apps”) on the device can perform unwanted, high-risk actions. Sensitive data stored on the device can also be lost or stolen.
•Ideally, this challenge requires a layered, defense-in-depth strategy that protects data at rest and in motion, provides protection for the actual device, and includes network-based controls for mobile network traffic including application traffic.
•This study focuses on mobile endpoint protection products designed to secure the device against malware, cyber attacks, high risk applications, and physical loss or theft.
•As an essential component in an enterprise mobile security architecture, the mobile endpoint protection market has achieved excellent growth rates in its formative years.
•Despite strong early adoption, however, sales growth in the mobile endpoint protection market has not matched the explosive growth in the number of mobile devices sold in recent years.
•This indicates much unrealized opportunity for market growth as well as the need for end-user education, ongoing product and feature development, and sales strategies.
•Incidentally, the competitive nature of the nascent mobile endpoint protection market holds tremendous potential for innovative companies to rapidly advance in the competitive landscape.

CEO's Perspective

1. The mobile security challenge is multi-faceted and will affect the entire security industry.
2. The market is highly competitive and will face consolidation in coming years.
3. Innovative vendors can displace incumbent security companies in the mobile endpoint protection market.
4. Mobile endpoint protection products compete on many factors including aggressive pricing strategies.
5. The mobile endpoint protection market holds tremendous potential for growth.

Key Questions This Study Will Answer

• What is the vendor opportunity for growth in the mobile endpoint protection market?
• What product features and functionality do customers expect in the product?
• How are customer perceptions of the mobile endpoint threat changing?
• Which vendors offer comprehensive product portfolios?
• What distribution channels are most effective and how will this change in the future?
• How do pricing and product features vary from consumer and business segments?

Table Of Contents

1. Executive Summary
2. Market Overview
3. Total Mobile Endpoint Protection Market
• External Challenges: Drivers and Restraints
• Forecast and Trends
• Market Share and Competitive Analysis
4. Business Segment Breakdown
5. Consumer Segment Breakdown
6. The Last Word
7. Appendix



List of Exhibits

1. Total Mobile Endpoint Protection Market: Market Engineering Measurements, Global, 2012
2. Total Mobile Endpoint Protection Market: Product Functionality by Market Segment, Global, 2012
3. Total Mobile Endpoint Protection Market: Mobile Security Strategy Topology, Global, 2012
4. Total Mobile Endpoint Protection Market: Distribution Channel Analysis, Global, 2012
5. Total Mobile Endpoint Protection Market: Key Market Drivers and Restraints, Global, 2012-2017
6. Total Mobile Endpoint Protection Market: Unit Shipment and Revenue Forecast, Global, 2009-2017
7. Total Mobile Endpoint Protection Market: Average Price for Mobile Endpoint Protection, Global, 2009-2017
8. Total Mobile Endpoint Protection Market: Percent Revenue Forecast by Region, Global, 2012 and 2017
9. Total Mobile Endpoint Protection Market: Percent Revenue Forecast by Distribution Channel, Global, 2009-2017
10. Total Mobile Endpoint Protection Market: Paid Product Penetration, Global, 2009-2017
11. Total Mobile Endpoint Protection Market: Percent of Revenue, Global, 2012
12. Total Mobile Endpoint Protection Market: Competitive Structure, Global, 2012
13. Total Mobile Endpoint Protection Market: Competitive Landscape, Global, 2012
14. Business Segment: Percent Sales Breakdown, Global, 2012
15. Business Segment: Market Engineering Measurements, Global, 2012
16. Business Segment: Unit Shipment and Revenue Forecast, Global, 2009-2017
17. Business Segment: Average Price for Mobile Endpoint Protection, Global, 2009-2017
18. Business Segment: Percent Revenue Forecast by Distribution Channel, Global, 2009-2017
19. Business Segment: Percent of Revenue, Global, 2012
20. Business Segment: Competitive Structure, Global, 2012
21. Business Mobile Endpoint Protection Market: Competitive Landscape, Global, 2012
22. Consumer Segment: Percent Sales Breakdown, Global, 2012
23. Consumer Segment: Market Engineering Measurements, Global, 2012
24. Consumer Segment: Unit Shipment and Revenue Forecast, Global, 2009-2017
25. Consumer Segment: Average Price for Mobile Endpoint Protection, Global, 2009-2017
26. Consumer Segment: Percent Revenue Forecast by Distribution Channel, Global, 2009-2017
27. Consumer Segment: Percent of Revenue, Global, 2012
28. Consumer Segment: Competitive Structure, Global, 2012
29. Consumer Mobile Endpoint Protection Market: Competitive Landscape, Global, 2012

+44 20 8816 8548

Ask a question about Analysis of the Global Mobile Endpoint Protection Market

Enter the characters you see in the picture below
Captcha