グローバルモバイルセキュリティ市場(2014 – 2020):端末、インフラ、サービス...市場調査レポートについてご紹介

【英文タイトル】The Mobile Security (mSecurity) Bible: 2014 – 2020 - Device Security, Infrastructure Security & Security Services

▼当市場調査レポートの詳細内容確認、お問い合わせ及びご購入申込は下記ページでお願いします。▼マーケットレポート

【レポートの概要(一部)】

1 Chapter 1: Introduction
1.1 Executive Summary
1.2 Topics Covered
1.3 Historical Revenue & Forecast Segmentation
1.4 Key Questions Answered
1.5 Key Findings
1.6 Methodology
1.7 Target Audience
1.8 Companies & Organizations Mentioned
2 Chapter 2: An Overview of the Mobile Device & Network Security Market
2.1 The Importance of Mobile Devices & Networks
2.1.1 Mobile Devices Outnumber PCs & Notebooks
2.1.2 Supporting a Plethora of Applications & Hardware Peripherals
2.1.3 Vulnerability to Attacks: Opening the Market for Mobile Security
2.2 What Constitutes the Mobile Device & Network Security Market?
2.3 Mobile Network Infrastructure Security Software & Appliances
2.3.1 Overview
2.3.2 What Constitutes this Submarket?
2.3.3 Value Chain
2.3.4 Vendor Landscape: Key Characteristics
2.4 Mobile Device Client Security Software
2.4.1 Overview
2.4.2 What Constitutes this Submarket?
2.4.3 Value Chain
2.4.4 Vendor Landscape: Key Characteristics
2.5 Mobile Device Security Hardware
2.5.1 Overview
2.5.2 What Constitutes this Submarket?
2.5.3 Value Chain
2.5.4 Vendor Landscape: Key Characteristics
2.6 Mobile Security & MDM Services
2.6.1 Overview
2.6.2 What Constitutes this Submarket?
2.6.3 Value Chain
2.6.4 Vendor Landscape: Key Characteristics
3 Chapter 3: Mobile Network Infrastructure Security Software & Appliances
3.1 Integrated Security Appliances
3.1.1 Introduction
3.1.2 How Integrated Security Appliance Help in Securing Mobile Networks?
3.1.3 Integrated Security Appliance Use Cases
3.1.3.1 Firewall
3.1.3.2 Intrusion Prevention System (IPS)
3.1.3.3 Email Protection System
3.1.3.4 Identity Protection System
3.1.3.5 Content Filtering
3.1.3.6 Anti-Virus and Anti-Spyware Protection
3.1.3.7 Anti-Spam Filtering
3.1.3.8 Virtual Private Networks (VPN)
3.1.4 Key Market Drivers
3.1.4.1 Mobility
3.1.4.2 Small Businesses
3.1.4.3 Ubiquity
3.1.4.4 Compliance
3.1.4.5 Processing Power
3.1.5 Key Market Challenges
3.1.5.1 Design Trade-offs
3.1.5.2 Single Point of Failure
3.1.6 Key Players in the Market
3.1.7 Recent Innovations and Developments
3.1.7.1 Case Study: Sophos
3.1.7.2 Case Study: Fortinet
3.2 Content Security Gateways
3.2.1 Introduction
3.2.2 How Content Security Gateways Protect Mobile Networks?
3.2.3 Delivery Modes
3.2.4 Features
3.2.5 Key Market Drivers
3.2.5.1 Internet Growth
3.2.5.2 Granularity of Features
3.2.6 Key Market Challenges
3.2.6.1 Risk-reward Ratio
3.2.7 Key Players in the Market
3.2.8 Recent Innovations and Developments
3.2.8.1 Case Study: SECaaS based Vendors
4 Chapter 4: Mobile Device Client Security Software
4.1 Anti-Malware/Anti-Virus Client Software
4.1.1 Introduction
4.1.2 Detection Mechanism: How it Works?
4.1.3 Delivery Mode
4.1.4 Performance Barometers
4.1.5 Key Market Drivers
4.1.5.1 Mobile Device Shipment Volumes
4.1.5.2 Device Metamorphosis
4.1.5.3 Application Marketplaces
4.1.6 Key Market Challenges
4.1.6.1 Limited Resource Availability
4.1.6.2 Scepticism
4.1.7 Key Players in the Market
4.1.8 Recent Innovations and Developments
4.1.8.1 Case Study: Antivirus Test Results
4.1.8.2 Vulnerability Against Malware
4.2 Back Up & Restore Software
4.2.1 Introduction
4.2.2 Trend Micro Case Study: How Mobile Back Up & Restore Software Works?
4.2.3 Delivery Mode
4.2.4 Key Market Drivers
4.2.4.1 Short Replacement Cycles
4.2.4.2 Maturity of Third Party Hosting Services
4.2.5 Key Market Challenges
4.2.5.1 Software Usability Issues
4.2.5.2 Data Security & Confidentiality in the Cloud
4.2.6 Key Players in the Market
4.2.7 Recent Innovations and Developments
4.2.7.1 Case Study: Axiom and NQ Mobile
4.2.7.2 Case Study: Cellebrite
4.3 Privacy Protection Software
4.3.1 Introduction
4.3.2 How Does Mobile Privacy Protection Software Work?
4.3.3 Key Market Drivers
4.3.3.1 Proliferation of Mobile User Information
4.3.3.2 Monitoring & Regulating Access to Personal Data
4.3.4 Key Market Challenges
4.3.4.1 Ambiguity of Functionality & Software Bundling
4.3.4.2 Lack of Commercial Instigation
4.3.5 Recent Innovations and Developments
4.3.5.1 CalOPPA
4.4 Mobile VPN Client Software
4.4.1 Introduction
4.4.2 How Mobile VPN Works?
4.4.3 Key Market Drivers
4.4.3.1 Privacy over Public Mobile Networks
4.4.3.2 Bypassing Restrictions
4.4.4 Key Market Challenges
4.4.4.1 Duality of Android
4.4.4.2 Interoperability
4.4.5 Key Players in the Market
4.4.6 Recent Innovations and Developments
4.4.6.1 Case Study: Inside Secure
4.5 Remote Locking Software
4.5.1 Introduction
4.5.2 How Remote Locking Software Works?
4.5.3 Key Market Drivers
4.5.4 Key Market Challenges
4.5.5 Key Players in the Market
4.5.6 Recent Innovations and Developments
4.6 Remote Tracking Software
4.6.1 Introduction
4.6.2 How Remote Tracking Software Works?
4.6.3 Key Market Drivers
4.6.3.1 Device Recovery
4.6.3.2 Proactive Location Based Warning
4.6.4 Key Market Challenges
4.6.4.1 Privacy Concerns
4.6.4.2 Location Technology Challenges
4.6.5 Key Players in the Market
4.6.6 Recent Innovations and Developments
4.6.6.1 Case Study: SK Telecom
4.7 Encrypted Communications (Voice/Data) Software
4.7.1 Introduction
4.7.2 How Encrypted Communications Software Works?
4.7.2.1 AT&T’s Approach
4.7.2.2 Cellcrypt’s Approach
4.7.2.3 RIM’s Approach
4.7.3 Key Market Drivers
4.7.3.1 Confidentiality
4.7.3.2 Wider Stakeholder Participation
4.7.4 Key Market Challenges
4.7.4.1 Overheads
4.7.4.2 Managing the Balance
4.7.5 Key Players in the Market
4.7.6 Recent Innovations and Developments
4.7.6.1 Case Study: Silent Circle
4.8 Encrypted Storage Software
4.8.1 Introduction
4.8.2 How Encrypted Storage Software Works?
4.8.3 Key Market Drivers
4.8.3.1 Preserving Integrity of Personal Data
4.8.3.2 Remote Functionality
4.8.4 Key Market Challenges
4.8.4.1 Performance Issues
4.8.5 Key Players in the Market
4.8.6 Recent Innovations and Developments
5 Chapter 5: Mobile Device Security Hardware
5.1 Semiconductors/Embedded Chip Security
5.1.1 Introduction
5.1.2 How Embedded Chip Security Works?
5.1.3 Scenarios to be Catered For
5.1.3.1 Secure Paths Within the Device
5.1.3.2 Enforcing DRM Rules
5.1.3.3 Enforcing Software and Hardware Integrity
5.1.3.4 Management of Meta-data
5.1.3.5 Management of Updates
5.1.3.6 Management of Mobile Payments
5.1.3.7 Preventing Unauthorized Access to the Device
5.1.4 Role Played by TCG
5.1.4.1 TPM Mobile
5.1.5 Key Market Drivers
5.1.5.1 Best Fitment
5.1.5.2 Advances in Cryptography
5.1.6 Key Market Challenges
5.1.6.1 Stakeholder Ennui
5.1.7 Key Players in the Market
5.1.8 Recent Innovations and Developments
5.1.8.1 Barriers to TPM Mobile
5.1.8.2 Can Embedded Chip Security Deter the Growth of Security Software Applications?
5.2 NFC
5.2.1 Introduction
5.2.2 How NFC Works?
5.2.2.1 Features and Use Cases
5.2.2.2 Is NFC Immune to Eavesdropping?
5.2.2.3 Security Measures
5.2.3 Key Market Drivers
5.2.3.1 Universality & Versatility
5.2.3.2 Support from Mobile Network Operators
5.2.4 Key Market Challenges
5.2.4.1 Stakeholder Reluctance to Hardware Modification
5.2.4.2 Lack of Focus on Robust Encryption Techniques
5.2.5 Key Players in the Market
5.2.5.1 Early Developers
5.2.5.2 Mobile Network Operators
5.2.5.3 Semiconductor Chipset Makers
5.2.5.4 Mobile OEMs
5.2.6 Recent Innovations and Developments
5.2.6.1 Google Wallet: Transforming Mobile Devices Into Virtual Wallets
5.2.6.2 ISIS
5.3 Biometrics
5.3.1 Introduction
5.3.1.1 Representing Identity Data
5.3.1.2 Fingerprint Capture
5.3.1.3 Facial Feature Recognition
5.3.1.4 Usage of Voice Recognition
5.3.2 How Biometrics Work?
5.3.2.1 Enrollment
5.3.2.2 Sample Extraction
5.3.2.3 Biometric Validation
5.3.3 Key Market Drivers
5.3.3.1 Mobility & Emerging Applications of Biometrics
5.3.3.2 Mobile Network Operator Interest
5.3.4 Key Market Challenges
5.3.4.1 Hardware Value Addition
5.3.4.2 Stakeholder Scepticism
5.3.5 Key Players in the Market
5.3.6 Recent Innovations and Developments
5.3.6.1 Voice Recognition Software: Lessons for Mobile Biometrics
5.3.6.2 EyeVerify: Identifying Live Eye Vein Patterns
6 Chapter 6: Mobile Security and MDM Services
6.1 On-Premises Mobile Security MDM Services
6.1.1 Introduction
6.1.2 How MDM Services Work?
6.1.3 Essential Attributes of MDM Services
6.1.3.1 Accessibility
6.1.3.2 Should Not be Perceived as an Overhead
6.1.3.3 Granularity
6.1.3.4 Ease of Maintenance and Management
6.1.4 Key Market Drivers
6.1.4.1 Dissolution of Distinction between Personal and Official Devices
6.1.4.2 The Growing Penetration of the iPhone and Android Devices
6.1.4.3 BYOD
6.1.4.4 Need for Policy Framework
6.1.5 Key Market Challenges
6.1.5.1 Administration Overhead
6.1.5.2 Distinguishing between Personal and Corporate Usage
6.1.6 Key Players in the Market
6.1.7 Recent Innovations and Developments
6.2 Cloud Based Mobile SECaaS MDM Services
6.2.1 Introduction
6.2.2 How Cloud Based Mobile SaaS MDM Services Work?
6.2.3 Desirable Attributes
6.2.3.1 Integration with Directory Services
6.2.3.2 Email Access Control
6.2.3.3 Network Up-time and Availability
6.2.3.4 Operational and Security Practices
6.2.3.5 Measures to Reduce Manual Intervention
6.2.4 Key Market Drivers
6.2.4.1 Freedom from Upfront Investment
6.2.4.2 Tackling Obsolescence
6.2.4.3 Operational Synergy
6.2.5 Key Market Challenges
6.2.5.1 Implications of Hosting
6.2.6 Key Players in the Market
6.2.7 Case Study of Integrated MDM: AirWatch
6.2.7.1 OS Support
6.2.7.2 MDM Features
6.2.7.3 Hosting Models
6.2.7.4 Licensing Mechanism
6.3 Mobile Identity Management Services
6.3.1 Introduction
6.3.2 History
6.3.3 Modus operandii, innovations and key players explained through diverse approaches
6.3.3.1 Active Directory from Microsoft
6.3.3.2 SSO from Oracle
6.3.3.3 Establishing the SIM Card as an Authentication Device
6.3.3.4 Adding Mobility to Digital Ids: Valimo/Gemalto Case Study
6.3.4 Key Market Drivers
6.3.4.1 Mobility for Business Users
6.3.4.2 Ease of Use
6.3.4.3 Financial Inclusion
6.3.4.4 Incentive for Mobile Network Operators
6.3.5 Key Market Challenges
6.3.5.1 Device Vulnerability
7 Chapter 7: Key Company Profiles
7.1 3M Cogent
7.2 Actiance
7.3 AdaptiveMobile
7.4 Adtran
7.5 Airbus Defence and Space
7.6 AirWatch
7.7 AhnLab
7.8 Alcatel-Lucent
7.9 Amtel
7.10 Anam Technologies
7.11 Apple
7.12 Array Networks
7.13 AVAST Software
7.14 AVG
7.15 Avira
7.16 Barracuda
7.17 BitDefender
7.18 BlackBerry
7.19 BullGuard
7.2 CA Technologies
7.21 Cellebrite
7.22 Cellusys
7.23 Check Point
7.24 Cisco Systems
7.25 Citrix Systems
7.26 Cloudmark
7.27 CYREN
7.28 Dell
7.29 D-Link
7.3 Dr. Web
7.31 Ericsson
7.32 ESET
7.33 Extreme Networks
7.34 F5 Networks
7.35 Fortinet
7.36 FingerQ
7.37 F-Secure
7.38 Global Technology Associates (GTA)
7.39 HP
7.4 IBM
7.41 Inside Secure
7.42 Intel Security (McAfee)
7.43 Intrusion
7.44 Juniper Networks
7.45 Kaspersky Lab
7.46 KoolSpan
7.47 LookOut
7.48 Mahindra Comviva
7.49 Microsoft
7.5 MobileIron
7.51 Mocana
7.52 Motorola Solutions
7.53 Netmotion Wireless
7.54 Nokia
7.55 Nokia Solutions & Networks (NSN)
7.56 NQ Mobile
7.57 NXP
7.58 Oracle
7.59 Palo Alto Networks
7.6 Panda Security
7.61 PROTEI
7.62 Qihoo 360
7.63 Samsung
7.64 Sophos
7.65 Soti
7.66 Sourcefire
7.67 SRA International
7.68 Symantec
7.69 Symsoft
7.70 Trend Micro
7.71 Ultra Electronics AEP
7.72 Untangle
7.73 WatchGuard Technologies
7.74 Webroot
7.75 ZyXEL Communications
7.76 Others
8 Chapter 8: Market Analysis & Forecasts
8.1 Global Outlook of the Mobile Device & Network Security Market
8.2 Submarket Segmentation
8.3 Mobile Network Infrastructure Security Software & Appliances Submarket
8.3.1 Integrated Security Appliances for Mobile Networks
8.3.2 Content Security Gateways for Mobile Networks
8.3.3 SMS/MMS Security Gateways for Mobile Networks
8.4 Mobile Device Client Security Software Submarket
8.4.1 Anti-Malware/Anti-Virus Client Software
8.4.2 Back Up & Restore Software
8.4.3 Privacy Protection Software
8.4.4 Mobile VPN Client Software
8.4.5 Remote Locking
8.4.6 Remote Tracking Software
8.4.7 Encrypted Communication (Voice/Data) Software
8.4.8 Encrypted Storage Software
8.4.9 Enterprise vs. Consumer Segmentation
8.5 Mobile Device Security Hardware Submarket
8.5.1 Semiconductors/Embedded Chip Security
8.5.2 NFC
8.5.3 Biometrics
8.6 Mobile Security & MDM Services
8.6.1 On-premises Mobile Security MDM Services
8.6.2 Cloud Based Mobile SECaaS Services
8.6.3 Mobile Identity Management Services
8.7 Regional Outlook
8.8 Asia Pacific
8.8.1 Submarket Segmentation
8.8.2 Mobile Network Infrastructure Security Software & Appliances
8.8.3 Mobile Device Client Security Software
8.8.4 Mobile Device Security Hardware
8.8.5 Mobile Security & MDM Services
8.8.6 Country Level Segmentation
8.8.7 Australia
8.8.8 China
8.8.9 India
8.8.10 Japan
8.8.11 South Korea
8.8.12 Pakistan
8.8.13 Thailand
8.8.14 Indonesia
8.8.15 Malaysia
8.8.16 Taiwan
8.8.17 Philippines
8.8.18 Rest of Asia Pacific
8.9 Eastern Europe
8.9.1 Submarket Segmentation
8.9.2 Mobile Network Infrastructure Security Software & Appliances
8.9.3 Mobile Device Client Security Software
8.9.4 Mobile Device Security Hardware
8.9.5 Mobile Security & MDM Services
8.9.6 Country Level Segmentation
8.9.7 Czech Republic
8.9.8 Poland
8.9.9 Russia
8.9.10 Rest of Eastern Europe
8.10 Latin & Central America
8.10.1 Submarket Segmentation
8.10.2 Mobile Network Infrastructure Security Software & Appliances
8.10.3 Mobile Device Client Security Software
8.10.4 Mobile Device Security Hardware
8.10.5 Mobile Security & MDM Services
8.10.6 Country Level Segmentation
8.10.7 Argentina
8.10.8 Brazil
8.10.9 Mexico
8.10.10 Rest of Latin & Central America
8.11 Middle East & Africa
8.11.1 Submarket Segmentation
8.11.2 Mobile Network Infrastructure Security Software & Appliances
8.11.3 Mobile Device Client Security Software
8.11.4 Mobile Device Security Hardware
8.11.5 Mobile Security & MDM Services
8.11.6 Country Level Segmentation
8.11.7 South Africa
8.11.8 UAE
8.11.9 Qatar
8.11.10 Saudi Arabia
8.11.11 Israel
8.11.12 Rest of the Middle East & Africa
8.12 North America
8.12.1 Submarket Segmentation
8.12.2 Mobile Network Infrastructure Security Software & Appliances
8.12.3 Mobile Device Client Security Software
8.12.4 Mobile Device Security Hardware
8.12.5 Mobile Security & MDM Services
8.12.6 Country Level Segmentation
8.12.7 USA
8.12.8 Canada
8.13 Western Europe
8.13.1 Submarket Segmentation
8.13.2 Mobile Network Infrastructure Security Software & Appliances
8.13.3 Mobile Device Client Security Software
8.13.4 Mobile Device Security Hardware
8.13.5 Mobile Security & MDM Services
8.13.6 Country Level Segmentation
8.13.7 Denmark
8.13.8 Finland
8.13.9 France
8.13.10 Germany
8.13.11 Italy
8.13.12 Spain
8.13.13 Sweden
8.13.14 Norway
8.13.15 UK
8.13.16 Rest of Western Europe
9 Chapter 9: Conclusion & Strategic Recommendations
9.1 Mobile Device OEM Security Offerings
9.2 OS Vendor Focus: Privacy Protection Services
9.3 The Prospects of NFC as an Authentication Solution
9.4 Security Implications for M2M Devices and IoT
9.5 The Prospects of Mobile Security as a Service (SECaaS)
9.6 The Growing Adoption of Mobile Client Security Software
9.7 Security Vulnerabilities in Public WiFi Networks: Impact on the Mobile Security Market
9.8 The Emerging Market for SMS/MMS Security Gateways: Addressing Messaging Spam
9.9 LTE Security Vulnerabilities: Are Wireless Carriers Addressing the Concern?
9.10 Prospects of RAN Centric Security Products
9.11 Strategic Recommendations
9.11.1 Recommendations for Mobile Infrastructure Security Providers
9.11.2 Recommendations for Mobile Device Security Providers
9.11.3 Recommendations for Mobile Security & MDM Service Providers
9.11.4 Recommendations for Enterprises
9.11.5 Recommendations for Wireless Carriers


【レポート販売概要】

■ タイトル:グローバルモバイルセキュリティ市場(2014 – 2020):端末、インフラ、サービス
■ 英文:The Mobile Security (mSecurity) Bible: 2014 – 2020 - Device Security, Infrastructure Security & Security Services
■ 発行日:2014年4月
■ 調査会社:Signals and Systems Telecom
■ 商品コード:Signals-405072
■ 調査対象地域:グローバル
※当サイトは世界の市場調査レポート紹介サイトです。市場規模、市場動向、市場予測など、多様な分析データを含むグローバル調査レポートをご案内致します。日本国内を含むアジア太平洋、中国、ヨーロッパ、アメリカ、北米、中南米、中東、アフリカ地域などにおける、製品、サービス、技術、企業(メーカー、ベンダー)、市場シェア、市場環境など多様な項目に対応致します。当サイトでご紹介するレポートは「市場調査レポート販売サイトのMarketReport.jp」でお問い合わせ及びご購入可能です。