Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution.



Similar documents
Global Endpoint Security Products Market: Protecting the Last Line of Defense from Emerging Threats. N July 2011

Introduction (Contd )

Analysis of the Global SSL Certificate Market. The Growing Need for Value-added Solutions

Update on the CRM BPO and Contact Center Outsourcing Services Market in Brazil Moving from Contact Center to Customer Experience

Analysis of the Global Distributed Denial of Service (DDoS) Mitigation Market

Argentinean Automotive Paints and Coatings Market Automotive Industry Growth and Economic Climate Boost the Market

Global Web and Mobile Analytics Market Mobile Emerges as a Stand-alone Segment; Predictive Analytics is the Secret Sauce for Monetization

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Analysis of Chinese Remote Support Applications Market

Electronic Medical Records (EMR) Market in Brazil Increasing Needs of Clinical Systems Expands EMR Bringing Brazil to the Forefront in Latin America

Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors

Analysis of the SSL Certificate Market Balancing Certificate Growth with Declining Revenue Growth Rates and Trust. Global

Analysis of The Telemedicine Market in Asia-Pacific. Affordable Telemedicine Services Are Enabling Business Model Evolution

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.

Asia-Pacific Secure Content Management Market 2012 Stable Growth is Anticipated in the and Web Security Segments

Emerging Trends in the Network Security Market in India, CY 2013

Smart Givaudan. From BYOD experience to new mobile opportunities

Analysis of the Global Security Information and Event Management (SIEM) and Log Management (LM) Market All Information Becomes Actionable

Marketing Automation Solutions Market India Increasing Enterprise Digital Marketing Initiatives Drive Growth at a CAGR of 25% by 2020

Frost & Sullivan. Publisher Sample

Guideline on Safe BYOD Management

Analysis of the Global Learning Management Systems Market Traditional Dichotomy Between Walled Garden and Open-source Products Gives Way to Middle

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Network Security Market in India CY 2014

European Data Centre Services Market Growing Popularity of the Outsourcing Model Fuels Growth of Retail Colocation and Managed Hosting

State of Cloud Computing Security in the UAE IT Spending Habits and Future Outlook of Cloud Customers in the UAE

Mobile Workforce Management Market Prepackaged Mobile Field-based Worker Applications in North America

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

SANS Mobility/BYOD Security Survey

U.S. Hospital Revenue Cycle Management Overview and Outlook,

Device Independence - BYOD -

Kaspersky Security for Mobile

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology

Analysis of the Latin American Information Technology (IT) Infrastructure Outsourcing Services Market Maturity of the Latin American Market Drives

Global Enterprise Content Management Market Mobile and Cloud Platforms are Driving Widespread Adoption

Global Marketing Automation Software Market Marketing Automation Evolves into a True Cross-Channel Marketing Suite

Frost & Sullivan. Publisher Sample

Asia-Pacific Web Application Firewall Market Increasing Attacks on the Application Layer are Driving the Market

BYOD: End-to-End Security

SANS Mobility/BYOD Security Survey

Network Security Platform MSSP Vendor Rankings

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

US Physician Revenue Cycle Management. Overview and Outlook,

Network Security Sandbox Market Analysis APTs Create a Must Have Security Technology

Symantec Mobile Management Suite

Analysis of the Latin American Electronic Medical Record Market Current and Proposed Regulations will Boost the Market in Argentina, Colombia, and

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

Global Managed Security Services Market Regulatory Compliance and Advanced Threat Protection Induce Organizations to Outsource Security

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Cloud Infrastructure as a Service Market Update, United States

Analysis of Healthcare IT Spending in Australia

Phone: Fax:

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

AirWatch Solution Overview

Strategic Analysis of the US Fleet and Vehicle Lease Market Recovery from Financial Crisis Generating Strong Growth

Analysis of the European Audio Conferencing Services Market Increase in Volume of Minutes to Offset Price Decline in the Near Term

SecuRity technologies for mobile and Byod.

Opportunities in Healthcare Cloud Market in the US and Europe. Evolving Regulatory Scene Likely to Boost Healthcare Cloud Adoption

Europe Web Conferencing Services Market. Collaborative Workspaces Drive Growth of Web Conferencing

CHOOSING AN MDM PLATFORM

Tablets: Will They Replace PCs?

Asia-Pacific Application Performance Management Market CY 2013 Rapidly Changing Application Architecture and Business Environment Drives the Market

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Analysis of the Global Active Monitoring Network Performance Market QoS and QoE Drive the Demand for Active Monitoring

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

The Future of Mobile Device Management

W o r l d w i d e a n d U. S. M a n a g e d M o b i l i t y F o r e c a s t : U n i t e d S t a t e s L e a d s i n A d o p t i o n

Feature List for Kaspersky Security for Mobile

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

Transcription:

Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution Global July 2012

Contents Section Slide Numbers Executive Summary 4 Market Overview 11 Total Mobile Endpoint Security Products Market - External Challenges: Drivers and Restraints 20 Forecasts and Trends 29 Market Share and Competitive Analysis 43 Consumer Segment Breakdown 51 Midsize Segment Breakdown 58 Enterprise Segment Breakdown 65 The Last Word 72 Appendix 75 3

Executive Summary Smartphones and other mobile devices are quickly replacing traditional desktop and laptop machines. According to Frost & Sullivan, the global smartphone and tablet market reached million units in 2011. As smartphones and tablets continue to proliferate in the consumer and business segments, security is becoming more of a crucial necessity for mobile devices. Hackers are now targeting smartphone mobile devices for spreading mobile malware. The Android operating system (OS) open application (app) market space makes malware very easy for hackers to distribute. According to Juniper Networks, in 2011 the vast majority of mobile malware was related to Symbian OS and Java ME OS devices and this is now shifting towards Android malware. The market for smartphones and tablets is growing specifically the for the Android system. In 2011, the Android smartphone market reached percent of the global OS market, beating out the traditional Symbian and BlackBerry market. With the growth of the Android market, these devices are now being adopted into the corporate space and introducing new security risks for IT managers. Source: Frost & Sullivan analysis. 5

Executive Summary (continued) Additionally, a new trend of bring your own device (BYOD) creates many more security risks for IT managers because end users now utilize their mobile devices to access corporate data. This increased use of mobile devices is expected to increase purchase in the mobile endpoint security market through 2016. As a result, the mobile endpoint security market is poised to reach $ billion by 2016. The market is in a growth stage, reaching $ million in 2011 with a compound annual growth rate (CAGR) of percent. The business market is quickly realizing the need for managing and protecting the various number of mobile devices entering the corporate network. Vendors are adapting and responding to the trend of a growing amount of mobile and tablet devices entering the market by launching a breadth of mobile security products. The trend of BYOD continues to create new challenges for endpoint security vendors, creating the need for vendors to consolidate and acquire mobile device management (MDM) providers. Source: Frost & Sullivan analysis. 6

Executive Summary Market Engineering Measurements Market Overview Total Mobile Endpoint Security Products Market: Global, 2011 Market Stage Market Revenue Market Units/Volume Average Price Per Unit Market Size at End of Forecast Period Growth $ M M $ $ B (2011) (2011) (2016) Base Year Market Growth Rate Compound Annual Growth Rate Customer Price Sensitivity Degree of Technical Change Market Concentration % % % (CAGR) (scale:1 [Low] to 10 [High]) (scale:1 [Low] to 10 [High]) (% of market share held by top 3 companies) Decreasing Stable Increasing For a tabular version click here. Note: All figures are rounded. The base year is 2011. Source: Frost & Sullivan analysis. 7

Executive Summary Market Engineering Measurements (continued) Competitor Overview Total Addressable Market Number of Competitors Replacement Rate Attachment Rate Maximum Attachment rate (active market competitors in base year) Year (average period of unit replacement) (current number of units per user 2011 (Maximum potential number of units per user) Industry Advancement Average Product Development Time Year Average R&D Spend by Product $M Marketing Spend as a Percent of Market Revenue % Decreasing Stable Increasing Note: All figures are rounded. The base year is 2011. Source: Frost & Sullivan analysis. 8

Executive Summary CEO s Perspective 1 The mobile endpoint security market is a in growth stage with a CAGR percent 2 3 4 5 The mobile endpoint security market is expected to reach $ billion in revenue with million units by 2016 The midsize and enterprise market will demand endpoint security vendors to provide advanced mobile security products The increasing number of mobile devices in the consumer segment will drive demand for mobile security solutions Mobile security management is quickly being adopted within the traditional endpoint security vendors Source: Frost & Sullivan analysis. 9

Market Overview Key Questions This Study Will Answer How fast is the mobile security market growing, how long will it continue to grow, and at what rate? Who are the competitors in the mobile security market and what products do they offer? Will these companies continue to exist or will they get acquired by other companies? Will mobile security products become integrated with traditional endpoint security products? How will this market change with time? Will acquisitions continue to happen? Are the products offered today meeting customer needs? What type of partnerships are vendors engaged with to generate more revenue? Source: Frost & Sullivan analysis. 16

Market Overview Segmentation Percent Sales Breakdown Total Mobile Endpoint Security Products Market: Global, 2011 Midsize % Consumer % Enterprise % Note: All figures are rounded. The base year is 2011. Source: Frost & Sullivan analysis. 17

Market Overview Segmentation (continued) Total Mobile Endpoint Security Products Market: Market Segmentation, Global, 2011 Mobile Endpoint Security Market Consumer Midsize Enterprise Antimalware Firewall Web/ Message Filtering Antimalware Mobile VPN/Firewall Web Filtering Message Filtering Parental Controls Remote Wipe Anti-theft Encryption/ Authentication Data Loss/Antitheft Management and Controls Source: Frost & Sullivan analysis. 18