世界各国のリアルタイムなデータ・インテリジェンスで皆様をお手伝い

モバイルセキュリティソリューションの市場、動向、技術:モバイル環境の不安定化

Mobile Security Solutions

An increasingly insecure mobile environment - Markets, trends & technologies

 

出版社 出版年月電子版価格 ページ数
IDATE
イダテ社
2016年5月Eur3,000
1-5ユーザライセンス (PDF)
82

サマリー

フランスの調査会社イダテ社(IDATE)の調査レポート「モバイルセキュリティソリューションの市場、動向、技術:モバイル環境の不安定化」は、モバイルセキュリティ市場を調査し、主要企業の幅広い概観とその戦略やポジショニング、今後の動向、ハードウェアやデバイス、IT、セキュリティ、通信会社などのバリューチェーンが構成する市場全体について記載しています。モバイルの脅威の範囲や普及、主要な技術の概説、現在使用されているあるいはこれから登場するセキュアなモバイルプラットフォームについても記載しています。モバイルセキュリティソリューション市場の主要な促進要因と阻害要因の戦略的な分析と同時に市場価値のデータや予測も提供しています。

This report examines the world of mobile security, providing a broad overview of the main players, their strategies and positioning, future trends and the market as a whole – its structuring and value chain (hardware, devices, IT, security, telcos).

It examines the threats for mobile, their reach and assessed prevalence. In parallel, the report details key technologies – in use and those upcoming – aimed to secure mobile platforms.

Finally, the report provides a strategic analysis of the key drivers and hurdles regarding the mobile security solution market, coming along with data and forecast of the market in value.



目次

1. Executive Summary

2. Methodology and scope
 2.1. General methodology of IDATE's reports
 2.2. Scope

3. Mobile security threats, solutions and applications
 3.1. Mobile security threats
 3.1.1. Specificities of mobile platforms
 3.1.2. Threats and attacks
 3.2. Mobile Security Solutions across platforms
 3.2.1. Overview
 3.2.2. Baseline protection: Mobile OS and mobile networks
 3.2.3. Security frameworks and mobile security applications
 3.2.4. Security key enabling technologies

4. Market structure and player strategies
 4.1. Market structure
 4.1.1. Value chain
 4.1.2. Access to market
 4.1.3. Table of market players
 4.2. Hardware enabler providers
 4.2.1. Secure element and trusted execution environment
 4.2.2. Biometric technology
 4.3. Baseline protection providers
 4.3.1. OS providers
 4.3.2. Device manufacturers
 4.3.3. Mobile network operators
 4.4. Security solution players
 4.4.1. Pure players
 4.4.2. Security solution providers
 4.4.3. IT-solution providers

5. Strategic analysis
 5.1. Key drivers
 5.1.1. Technological push
 5.1.2. New mobile use cases requiring security
 5.1.3. Regulation
 5.1.4. Device market maturity
 5.2. Barriers
 5.2.1. Rising baseline protection
 5.2.2. Lack of strong consumer demand
 5.2.3. Device market cost sensitivity
 5.3. Market development and forecasts
 5.3.1. Key trends
 5.3.2. Major uncertainties
 5.3.3. Market forecast

 

Report's tables and figures

Tables

Table 1: Type of malware attacks
Table 2: Means of propagation of malware attacks
Table 3: Comparison of Android OS and iOS security features
Table 4: Types of secure elements
Table 5: Compared protection offered by secure elements, TEE and mobile OS
Table 6: Mobile security solutions' market players
Table 7: Gemalto mobileID solution
Table 8: Lookout consumer offering Free and Premium
Table 9: User concerns around mobile identity and personal data

Figures

Figure 1: Mobile platform vulnerabilities
Figure 2: Mobile threats, attacker strategies
Figure 3: Number of Android malwares identified
Figure 4: Number of new mobile malwares identified by McAfee
Figure 5: New malwares (non-mobile) identified by McAfee
Figure 6: Devices with known potential harmful applications
Figure 7: Geography of mobile malware encounter rates, Q3 2015 (% of users attacked)
Figure 8: Web navigation shifts to mobile
Figure 9: Global in-store mobile payment volume
Figure 10: IoT development in volume
Figure 11: Overview of mobile security solutions
Figure 12: iOS security architecture
Figure 13: Abstract overview of mobile networks
Figure 14: Avast Mobile Security and Antivirus
Figure 15: Kaspersky Internet Security
Figure 16: Android Device Manager
Figure 17: Management of mobile devices, content and applications
Figure 18: Protection of corporate network against external mobiles
Figure 19: Using the mobile for authentication
Figure 20: Multifactor authentication
Figure 21: The secure element, as a microSD, UICC embedded in the device
Figure 22: Secure element application domains
Figure 23: Samsung Galaxy S6 Edge, fingerprint sensor
Figure 24: Components of TouchID
Figure 25: Rich OS and TEE comparison
Figure 26: Security in the mobile value chain
Figure 27: NFC positioning on the security market
Figure 28: Synaptics products in the SmartPhone
Figure 29: Fingerprint Cards sensors
Figure 30: AuthenTec, the fingerprint sensor company bought by Apple
Figure 31: Android 6.0 privacy control
Figure 32: Android Pay
Figure 33: Samsung Pay, emulation of a magnetic card swipe
Figure 34: LG Gate Enterprise solution
Figure 35: Keeper partnership with HTC
Figure 36: Sony myXperia software
Figure 37: BlackBerry Priv (Android based)
Figure 38: Blackphone 2
Figure 39: Verizon Total Mobile Protection offering
Figure 40: Telefónica ElevenPaths Latch security solution
Figure 41: T-Mobile MyWallet
Figure 42: MobileIron telco partnerships
Figure 43: Security multifactor authentication for password management
Figure 44: Kaspersky Android wearables application
Figure 45: Avast mobile application ecosystem
Figure 46: Avast Virtual Mobile Platform
Figure 47: VMWare vision of next EMM challenges: Identity management and virtualisation
Figure 48: Citrix XenMobile security compliance engine
Figure 49: Iris scanner on Fujitsu NX F04G
Figure 50: Parasol, a new application dedicated to privacy protection using Android 6.0+ privacy controls
Figure 51: Increasing convergence in mobile/PC platforms
Figure 52: Mobile device: shipments by region
Figure 53: The threat of rising baseline protections and possible roads to market for B2C solutions
Figure 54: Credibility of players for the provision of online information
Figure 55: Security feeling, age and smart cards
Figure 56: The gap between use and trust
Figure 57: Global mobile security market (2015 - 2020)
Figure 58: Global B2B market for mobile security solutions (2015 - 2020)
Figure 59: Global B2C market for mobile security solutions (2015 - 2020)

 

List of players

• Alipay
• AMD
• Apple
• ARM
• Asurion
• ASUS
• AT&T
• Atmel
• Authentec
• Avast
• Barclays
• bitdefender
• Blackberry
• CA Technologies
• CheckPoint
• Citrix
• Elevenpath
• Ericsson
• Fiberlink
• Fingerprint Card
• FireEye
• Fujitsu
• GDATA
• Gemalto
• Giesecke & Devrient
• GlobalPlatform
• Good
• Google
• GSMA
• HTC
• Huawei
• IBM
• Intel Security / McAfee
• JAMF Software
• Kaspersky
• KDDI
• LedgaCore
• LG
• Lookout Security
• Microsoft
• Mobile Iron
• Motorola
• NVIDIA
• NXP
• Oberthur
• O-film
• Orange
• Parasol
• Precise Biometrics
• Qualcomm
• Samsung
• SAP
• Silent Circle
• Softcard
• Solacia
• Sony
• Sophos
• SOTI
• Sprint
• ST
• Sybase
• Symantec
• Synaptics
• Telefónica
• T-Mobile
• TPK
• Trustonic
• Trustwave
• Verizon
• VMWare
• Vodafone
• Widepoint

 

Slideshow contents

Overview of Mobile Security Solutions - Main solutions and technologies
 • Threats targeting the mobile platform
 • Existing mobile security solutions
 • Mobile security solutions on the value chain
 • Main players

A relatively secure platform - The mobile platform currently appears relatively more secure than the PC
 • Mobile threat prevalence
 • Strong baseline protection

Rising security risks - New threats will challenge the security of the mobile platform
 • A shift in usage
 • A shift in trust sensitivity
 • Mobile Security Solution market

A growing sector with important variation - The growth of the mobile sector hides disparities between sector and technologies
 • Mobile security solutions B2B market
 • Mobile security solutions B2C market
 • Access to the B2C market

 

 

ページTOPに戻る

あなたが最近チェックしたレポート一覧

  • 最近チェックしたレポートはありません。

お問合は、お電話またはWEBから承ります。お見積もりの作成もお気軽にご相談ください。

webからのお問合せはこちらのフォームから承ります

このレポートへのお問合せ

03-3582-2531

電話お問合せもお気軽に

<無料>メルマガに登録する

 

 

ページTOPに戻る