SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Top 20 Mobile Security (mSecurity)
Companies 2014
Leaders in Software as a Service (SaaS), Mobile Device
Management (MDM) & Bring Your Own Device (BYOD) Security
©notice
This material is copyright by visiongain. It is against the law to reproduce any of this material without the prior
written agreement of visiongain.You cannot photocopy, fax, download to database or duplicate in any other way
any of the material contained in this report. Each purchase and single copy is for personal use only.
www.visiongain.com
Contents
1. Report Overview
1.1 Current Mobile Security Market Overview
1.2 Mobile Malware Attacks on the Rise
1.3 Mobile Security Ecosystem
1.4 How This Report Delivers
1.5 Who is This Report For?
1.6 Methodology
1.7 Other Visiongain Reports Published in 2014
1.8 About Visiongain
2. Introduction to the Mobile Security Market
2.1 The Mobile Security Market Growing Rapidly
2.2 Mobile Security Market Definition
2.2.1 Device Security
2.2.2 Data Security
2.2.3 Network Security
2.2.4 Mobile Security Tools
2.3 Proliferation of Mobile Devices Leading to Rise in Security Threats
2.3.1 Mobile Malware Evolution
2.3.2 Trojans
2.3.3 Worms
2.3.4 Spyware
2.3.5 Spam
2.4 Mobile Threats Affect All Platforms
3. The Global Mobile Security Market
3.1 Mobile Security - A Major Concern for Consumers Worldwide
3.2 Extensive Growth in Mobile Security Market from 2013-2024
4. Top 20 Mobile Security (mSecurity) Companies Market Share
4.1 Top 20 Mobile Security (mSecurity) Companies 2013
www.visiongain.com
Contents
4.2 Analysis of Mobile Security Vendors
5. Leading 20 Mobile Security Companies
5.1 AirWatch
5.1.1 Awards and Accolades
5.1.2 AirWatch Mobile Security Solution
5.2 Apple
5.2.1 Apple’s Best Practices for Mobile Security
5.3 AVG
5.3.1 AVG Mobile Security Applications
5.3.2 AVG Retains Position of #1 Downloaded Security App
5.3.3 MTN Delivers AVG Mobile Security to South African Subscribers
5.4 BullGuard
5.4.1 BullGuard Mobile Security
5.5 ESET
5.5.1 ESET Mobile Security Solutions
5.6 Fiberlink, an IBM Company
5.6.1 MaaS360
5.7 Fixmo
5.7.1 Fixmo Enterprise Mobility Platform (Fixmo EMP)
5.7.1.1 Fixmo Sentinel
5.7.1.2 Fixmo SafeZone
5.7.2 Fixmo Announces Expanded Collaboration with Samsung
5.7.3 Fixmo to Provide Mobile Security to U.S. Department of Defense
5.8 F-Secure
5.8.1 F-Secure’s Mobile Security Solutions
5.8.2 Majority Mobile threats are Targeted at Android
5.9 Good Technology
5.9.1 Good Dynamics Secure Mobility Platform
5.9.1.1 Mobile App Containerization
5.9.1.2 Mobile App Management (MAM)
5.9.1.3 Mobile Service Management and Mobile Device Management
www.visiongain.com
Contents
5.10 Google
5.10.1 The Next Phase of Android Security
5.11 Kaspersky Lab
5.11.1 Kaspersky Internet Security for Android
5.11.2 Kaspersky Internet Security – Multi-Device
5.11.3 Kaspersky Lab Anticipates Double-Digit Growth in 2014
5.12 Lookout
5.13 McAfee, An Intel Company
5.13.1 McAfee Mobile Security Solutions
5.13.2 McAfee Labs Threats Report Findings
5.14 MobileIron
5.14.1 MobileIron Mobile IT Platform
5.15 NQ Mobile
5.15.1 NQ Mobile Security Products
5.16 Samsung Electronics
5.16.1 Samsung KNOX Workspace
5.16.2 Samsung Teams up with Zscaler and Citrix
5.17 SAP
5.17.1 SAP Mobile Secure
5.17.2 SAP and Samsung Expand Partnership
5.18 Sophos
5.18.1 Sophos Product Portfolio
5.18.2 Sophos Sees Explosive Growth for Mobile Device Management
5.19 Symantec
5.19.1 Symantec Mobile Security
5.19.2 Symantec Showcasing New Security Solutions
5.20 Trend Micro
5.20.1 Trend Micro Smart Protection Network
5.20.2 Trend Micro Mobile Security Solution
5.21 Other Leading Companies in the Mobile Security Arena
5.21.1 Mformation
5.21.2 Microsoft
5.21.3 Mobile Active Defense
www.visiongain.com
Contents
5.21.4 Motorola
5.21.5 Orange
5.21.6 BlackBerry
5.21.7 Telefonica
5.21.8 Echoworx
5.21.9 DeviceLock Inc.
5.21.10 DataViz
5.22 Additional Players in the mSecurity Market
6. SWOT Analysis of the Mobile Security Market
7. Expert Opinion
7.1 Visiongain Interview with AVG Technologies
7.1.1 AVG Company Background and Mobile Security Products
7.1.2 Proliferation of Connected Devices Will Drive the Adoption of Mobile Security
7.1.3 Internet of Things is A Major Driver for the mSecurity Market
7.1.4 Key Trends in the Mobile Security Market
7.1.5 Apple's iOS is More Secure than Google’s Android
7.2 Visiongain Interview with Kaspersky Lab
7.2.1 Kaspersky Company Background
7.2.2 Mobile Apps and BYOD Driving the Need for Mobile Security
7.2.3 Cybercriminals Increasingly Targeting Android Operating Systems
7.2.4 Mobile Banking Trojans to Grow Significantly in the Coming Years
7.2.5 BYOD Becoming a Popular Trend for Most Businesses
7.2.6 Consumers/Enterprises Becoming More Aware about Internet Security
7.3 Visiongain Interview with Bullguard
7.3.1 Bullguard Company Background and Mobile Security Products
7.3.2 Security Vendors Must be Ready to Tackle Increasing Malware Attacks
7.3.3 Lack of Awareness Regarding mSecurity Will be a Inhibitor
7.3.4 Mobile Device Management & BYOD Gaining Popularity
7.3.5 Antivirus will be Mandatory on all Mobile OS
7.3.6 Mobile Security to Surpass the PC Security Market in the Future
www.visiongain.com
Contents
7.3.7 Security and Privacy Issues Should be Given Utmost Priority
8. Conclusion
8.1 Mobile Threats on the Rise
8.2 Market Share & Outlook for the Top 20 Mobile Security Companies
9. Glossary
Page 56Www.visiongain.com Page 56
Top 20 Mobile Security (mSecurity) Companies 2014
Leaders in Software as a Service (SaaS), Mobile Device
Management (MDM) & Bring Your Own Device (BYOD) Security
5.6.1 MaaS360
MaaS360 is an enterprise mobility management (EMM) platform that enables IT to deliver end-to-
end security and management through the implementation of:
• Mobile Device Management
• Mobile Application Management
• Mobile Content Management
• Secure Mail
• Secure Browser
• Mobile Expense Management
• Laptop Management
For an overview of mobile security services provided by Fiberlink see Table 5.17 below.
Table 5.17 Fiberlink Mobile Security Features
User & Device Security
• Authenticate against Active Directory/LDAP, one-time passcode or SAML
• Create custom groups & apply specific policies to each group
• Require two-factor authentication
• Require passcode policies with configurable quality, length and duration
• Enforce encryption and password visibility settings
• Set device restrictions on features
• Detect and restrict jailbroken and rooted devices
• Remotely locate, lock and wipe lost or stolen devices
• Selectively wipe corporate data leaving personal data intact
• Define and implement real-time compliance rules with automated actions
• Enable geo-fencing rules to enforce location related compliance
Application Security
• Whitelist/Blacklist of apps
• iCloud controls to prevent app backups
• Enforce app security based on security compliance rules
• Secure on-device app catalog
• SDK for authentication and authorization
• Selective remote wipe of apps
Document Security
• iCloud controls to prevent file backups/syncs
• MaaS360 Doc Catalog isolates files in an encrypted document container
Page 67Www.visiongain.com Page 67
Top 20 Mobile Security (mSecurity) Companies 2014
Leaders in Software as a Service (SaaS), Mobile Device
Management (MDM) & Bring Your Own Device (BYOD) Security
Table 5.23 Good Technology Company Overview(Mobile security revenues, market
ranking, % market share, media contact, HQ, website)
Mobile security revenues $bn
USD 0.096 bn(FY 2013 estimate)
Global market ranking
5
th
Global market share %
4.7%
Media Contact
Becki Leonard
bleonard@good.com
Headquarters Sunnyvale, California
Website http://uk.good.com
Source: Visiongain 2014
Figure 5.24 Good Technology Mobile Security Market Share 2013 (%)
Source: Visiongain 2014
4.7%
Page 115Www.visiongain.com Page 115
Top 20 Mobile Security (mSecurity) Companies 2014
Leaders in Software as a Service (SaaS), Mobile Device
Management (MDM) & Bring Your Own Device (BYOD) Security
7. Expert Opinion
7.1 Visiongain Interview withAVG Technologies
Visiongain conducted an interview with Omri Sigelman, Vice President – Mobile & Marketing at
AVG Technologies about his viewpoint of the mobile security market.
7.1.1 AVG Company Background and Mobile Security Products
Visiongain: Please give us a little background about your company and your mobile
security related product/service offerings.
Omri Sigelman: AVG is the online security company for 177 million active users, securing
devices, data and people. We deliver protection, privacy and performance products for desktop
users and mobile devices users. Our flagship AVG AntiVirus FREE for Android™ app for
smartphones is the number one downloaded security application on the Google Play store with
more than 100 million downloads, which places it in the coveted 100-500 million download
category.
AVG AntiVirus FREE for Android Tablets is also a popular AVG app for those with Android based
devices. We also offer a range of performance apps for smartphones and tablets including AVG
Cleaner, AVG Uninstaller and AVG Battery Saver & TuneUp which help keep connected devices
running smoothly, free of duplicate or unwanted files and apps, and operating at maximum battery
by helping control connectivity and service settings to put them into sleep/turn them off when not in
use.
AVG’s aim is to secure as many end users as possible so ultimately our online protection moves
and develops as they do and their devices evolve. Users have a right to be secure online whatever
device they are using and wherever they are using it. Our approach to mobile therefore is to make
our products as easy to use and as accessible as possible and as part of this, we recently
announced our forthcoming AVG Zen application for mobile devices. AVG Zen is a simple
approach to helping people run their connected lives on all their devices from one central, easily
managed place.
We’re also committed to ensuring our mobile users understand how our mobile apps work and in
particular, being transparent about what data our apps collect and how it is shared. As part of this
commitment, we have just announced our AVG short data privacy notice. AVG is the one of the
first in the industry to pursue this best practice which arises from the National Telecommunications

Weitere ähnliche Inhalte

KĂĽrzlich hochgeladen

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Trucks in Minnesota
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 

KĂĽrzlich hochgeladen (20)

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data ScienceChristy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slidesAlireza Esmikhani
 

Empfohlen (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Top 20 Mobile Security (mSecurity) Companies 2014

  • 1. Top 20 Mobile Security (mSecurity) Companies 2014 Leaders in Software as a Service (SaaS), Mobile Device Management (MDM) & Bring Your Own Device (BYOD) Security ©notice This material is copyright by visiongain. It is against the law to reproduce any of this material without the prior written agreement of visiongain.You cannot photocopy, fax, download to database or duplicate in any other way any of the material contained in this report. Each purchase and single copy is for personal use only.
  • 2. www.visiongain.com Contents 1. Report Overview 1.1 Current Mobile Security Market Overview 1.2 Mobile Malware Attacks on the Rise 1.3 Mobile Security Ecosystem 1.4 How This Report Delivers 1.5 Who is This Report For? 1.6 Methodology 1.7 Other Visiongain Reports Published in 2014 1.8 About Visiongain 2. Introduction to the Mobile Security Market 2.1 The Mobile Security Market Growing Rapidly 2.2 Mobile Security Market Definition 2.2.1 Device Security 2.2.2 Data Security 2.2.3 Network Security 2.2.4 Mobile Security Tools 2.3 Proliferation of Mobile Devices Leading to Rise in Security Threats 2.3.1 Mobile Malware Evolution 2.3.2 Trojans 2.3.3 Worms 2.3.4 Spyware 2.3.5 Spam 2.4 Mobile Threats Affect All Platforms 3. The Global Mobile Security Market 3.1 Mobile Security - A Major Concern for Consumers Worldwide 3.2 Extensive Growth in Mobile Security Market from 2013-2024 4. Top 20 Mobile Security (mSecurity) Companies Market Share 4.1 Top 20 Mobile Security (mSecurity) Companies 2013
  • 3. www.visiongain.com Contents 4.2 Analysis of Mobile Security Vendors 5. Leading 20 Mobile Security Companies 5.1 AirWatch 5.1.1 Awards and Accolades 5.1.2 AirWatch Mobile Security Solution 5.2 Apple 5.2.1 Apple’s Best Practices for Mobile Security 5.3 AVG 5.3.1 AVG Mobile Security Applications 5.3.2 AVG Retains Position of #1 Downloaded Security App 5.3.3 MTN Delivers AVG Mobile Security to South African Subscribers 5.4 BullGuard 5.4.1 BullGuard Mobile Security 5.5 ESET 5.5.1 ESET Mobile Security Solutions 5.6 Fiberlink, an IBM Company 5.6.1 MaaS360 5.7 Fixmo 5.7.1 Fixmo Enterprise Mobility Platform (Fixmo EMP) 5.7.1.1 Fixmo Sentinel 5.7.1.2 Fixmo SafeZone 5.7.2 Fixmo Announces Expanded Collaboration with Samsung 5.7.3 Fixmo to Provide Mobile Security to U.S. Department of Defense 5.8 F-Secure 5.8.1 F-Secure’s Mobile Security Solutions 5.8.2 Majority Mobile threats are Targeted at Android 5.9 Good Technology 5.9.1 Good Dynamics Secure Mobility Platform 5.9.1.1 Mobile App Containerization 5.9.1.2 Mobile App Management (MAM) 5.9.1.3 Mobile Service Management and Mobile Device Management
  • 4. www.visiongain.com Contents 5.10 Google 5.10.1 The Next Phase of Android Security 5.11 Kaspersky Lab 5.11.1 Kaspersky Internet Security for Android 5.11.2 Kaspersky Internet Security – Multi-Device 5.11.3 Kaspersky Lab Anticipates Double-Digit Growth in 2014 5.12 Lookout 5.13 McAfee, An Intel Company 5.13.1 McAfee Mobile Security Solutions 5.13.2 McAfee Labs Threats Report Findings 5.14 MobileIron 5.14.1 MobileIron Mobile IT Platform 5.15 NQ Mobile 5.15.1 NQ Mobile Security Products 5.16 Samsung Electronics 5.16.1 Samsung KNOX Workspace 5.16.2 Samsung Teams up with Zscaler and Citrix 5.17 SAP 5.17.1 SAP Mobile Secure 5.17.2 SAP and Samsung Expand Partnership 5.18 Sophos 5.18.1 Sophos Product Portfolio 5.18.2 Sophos Sees Explosive Growth for Mobile Device Management 5.19 Symantec 5.19.1 Symantec Mobile Security 5.19.2 Symantec Showcasing New Security Solutions 5.20 Trend Micro 5.20.1 Trend Micro Smart Protection Network 5.20.2 Trend Micro Mobile Security Solution 5.21 Other Leading Companies in the Mobile Security Arena 5.21.1 Mformation 5.21.2 Microsoft 5.21.3 Mobile Active Defense
  • 5. www.visiongain.com Contents 5.21.4 Motorola 5.21.5 Orange 5.21.6 BlackBerry 5.21.7 Telefonica 5.21.8 Echoworx 5.21.9 DeviceLock Inc. 5.21.10 DataViz 5.22 Additional Players in the mSecurity Market 6. SWOT Analysis of the Mobile Security Market 7. Expert Opinion 7.1 Visiongain Interview with AVG Technologies 7.1.1 AVG Company Background and Mobile Security Products 7.1.2 Proliferation of Connected Devices Will Drive the Adoption of Mobile Security 7.1.3 Internet of Things is A Major Driver for the mSecurity Market 7.1.4 Key Trends in the Mobile Security Market 7.1.5 Apple's iOS is More Secure than Google’s Android 7.2 Visiongain Interview with Kaspersky Lab 7.2.1 Kaspersky Company Background 7.2.2 Mobile Apps and BYOD Driving the Need for Mobile Security 7.2.3 Cybercriminals Increasingly Targeting Android Operating Systems 7.2.4 Mobile Banking Trojans to Grow Significantly in the Coming Years 7.2.5 BYOD Becoming a Popular Trend for Most Businesses 7.2.6 Consumers/Enterprises Becoming More Aware about Internet Security 7.3 Visiongain Interview with Bullguard 7.3.1 Bullguard Company Background and Mobile Security Products 7.3.2 Security Vendors Must be Ready to Tackle Increasing Malware Attacks 7.3.3 Lack of Awareness Regarding mSecurity Will be a Inhibitor 7.3.4 Mobile Device Management & BYOD Gaining Popularity 7.3.5 Antivirus will be Mandatory on all Mobile OS 7.3.6 Mobile Security to Surpass the PC Security Market in the Future
  • 6. www.visiongain.com Contents 7.3.7 Security and Privacy Issues Should be Given Utmost Priority 8. Conclusion 8.1 Mobile Threats on the Rise 8.2 Market Share & Outlook for the Top 20 Mobile Security Companies 9. Glossary
  • 7. Page 56Www.visiongain.com Page 56 Top 20 Mobile Security (mSecurity) Companies 2014 Leaders in Software as a Service (SaaS), Mobile Device Management (MDM) & Bring Your Own Device (BYOD) Security 5.6.1 MaaS360 MaaS360 is an enterprise mobility management (EMM) platform that enables IT to deliver end-to- end security and management through the implementation of: • Mobile Device Management • Mobile Application Management • Mobile Content Management • Secure Mail • Secure Browser • Mobile Expense Management • Laptop Management For an overview of mobile security services provided by Fiberlink see Table 5.17 below. Table 5.17 Fiberlink Mobile Security Features User & Device Security • Authenticate against Active Directory/LDAP, one-time passcode or SAML • Create custom groups & apply specific policies to each group • Require two-factor authentication • Require passcode policies with configurable quality, length and duration • Enforce encryption and password visibility settings • Set device restrictions on features • Detect and restrict jailbroken and rooted devices • Remotely locate, lock and wipe lost or stolen devices • Selectively wipe corporate data leaving personal data intact • Define and implement real-time compliance rules with automated actions • Enable geo-fencing rules to enforce location related compliance Application Security • Whitelist/Blacklist of apps • iCloud controls to prevent app backups • Enforce app security based on security compliance rules • Secure on-device app catalog • SDK for authentication and authorization • Selective remote wipe of apps Document Security • iCloud controls to prevent file backups/syncs • MaaS360 Doc Catalog isolates files in an encrypted document container
  • 8. Page 67Www.visiongain.com Page 67 Top 20 Mobile Security (mSecurity) Companies 2014 Leaders in Software as a Service (SaaS), Mobile Device Management (MDM) & Bring Your Own Device (BYOD) Security Table 5.23 Good Technology Company Overview(Mobile security revenues, market ranking, % market share, media contact, HQ, website) Mobile security revenues $bn USD 0.096 bn(FY 2013 estimate) Global market ranking 5 th Global market share % 4.7% Media Contact Becki Leonard bleonard@good.com Headquarters Sunnyvale, California Website http://uk.good.com Source: Visiongain 2014 Figure 5.24 Good Technology Mobile Security Market Share 2013 (%) Source: Visiongain 2014 4.7%
  • 9. Page 115Www.visiongain.com Page 115 Top 20 Mobile Security (mSecurity) Companies 2014 Leaders in Software as a Service (SaaS), Mobile Device Management (MDM) & Bring Your Own Device (BYOD) Security 7. Expert Opinion 7.1 Visiongain Interview withAVG Technologies Visiongain conducted an interview with Omri Sigelman, Vice President – Mobile & Marketing at AVG Technologies about his viewpoint of the mobile security market. 7.1.1 AVG Company Background and Mobile Security Products Visiongain: Please give us a little background about your company and your mobile security related product/service offerings. Omri Sigelman: AVG is the online security company for 177 million active users, securing devices, data and people. We deliver protection, privacy and performance products for desktop users and mobile devices users. Our flagship AVG AntiVirus FREE for Android™ app for smartphones is the number one downloaded security application on the Google Play store with more than 100 million downloads, which places it in the coveted 100-500 million download category. AVG AntiVirus FREE for Android Tablets is also a popular AVG app for those with Android based devices. We also offer a range of performance apps for smartphones and tablets including AVG Cleaner, AVG Uninstaller and AVG Battery Saver & TuneUp which help keep connected devices running smoothly, free of duplicate or unwanted files and apps, and operating at maximum battery by helping control connectivity and service settings to put them into sleep/turn them off when not in use. AVG’s aim is to secure as many end users as possible so ultimately our online protection moves and develops as they do and their devices evolve. Users have a right to be secure online whatever device they are using and wherever they are using it. Our approach to mobile therefore is to make our products as easy to use and as accessible as possible and as part of this, we recently announced our forthcoming AVG Zen application for mobile devices. AVG Zen is a simple approach to helping people run their connected lives on all their devices from one central, easily managed place. We’re also committed to ensuring our mobile users understand how our mobile apps work and in particular, being transparent about what data our apps collect and how it is shared. As part of this commitment, we have just announced our AVG short data privacy notice. AVG is the one of the first in the industry to pursue this best practice which arises from the National Telecommunications