SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
The New Mobility
Speakers
  Sarah Howland, Editor‐In‐Chief
  Field Technologies Magazine
  Martha Vazquez, Industry Analyst
  Frost & Sullivan
  Andy Willett, Senior Vice President
  NetMotion Wireless




                                        2
Global Mobile VPN Products Market:
         The New Mobility: How Mobile Applications and Devices are Changing
                                  Your Business.


                                           Martha Vazquez, Industry Analyst
                                                  Network Security
                                                   June 17, 2012




© 2012 Frost & Sullivan. All rights reserved. This document contains highly confidential information and is the sole property of
Frost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan.
Today’s Presenter

                   Functional Expertise
                   • Experience in market research, consulting sales and business development with expertise in the
                     Information Communications and Technology Network Security sector.
                   • Developing research and analysis in the Network Security industry in areas such as:
                       - Technology and Demand Trends
                       - Market Sizing
                       - Market Forecasting and Strategic Analysis

                   Industry Expertise
                      Experience base in the information communication technologies sector, leveraging long-standing
                       working relationships with leading industry participants’ Senior Executives
                        - Mobile Security

Martha Vazquez          - Endpoint Security

Industry Analyst        - Managed Security Service Providers (MSSPs)
                        - Content Filtering

Frost & Sullivan   What I bring to the Team
North America         Expertise in managing executive level relationships
San Antonio, TX       In-depth understanding of the network security market
                      Experience in understanding market trends and forecasting
                   Career Highlights
                      Sales Consultant in several leading Wireless firms:
                        - AT&T
                        - Verizon Wireless

                   Education
                   • Master of Business Administration from Our Lady of the Lake University, San Antonio, Texas
                   • Bachelor of Science from Texas State University, San Marcos, Texas




                                                                                                                        4
Focus Points


•   The rise in mobile field workers

•   The needs and challenges for the remote worker

•   The evolving security landscape

•   Security solutions used to support the mobile field worker

•   Defining a Mobile VPN

•   The future outlook for the Mobile VPN market

•   The Last Word




                                                                 5
Poll Question


•   What is the status of your mobile security strategy in place?
     1.   In place today
     2.   Don’t have one and are assessing what to do.
     3.   To be completed in 3 months
     4.   To be completed in 6 months


•   Do you believe that remote workers threaten your corporate
    environment?
     1.   Yes, we need to ensure employees securely access our
          network
     2.   No, we don’t believe the threat is significant




                                                                    6
The Rise in Mobile Field Workers


           Proliferation of Wireless Devices




                                               Source: Frost & Sullivan analysis


                                                                                   7
The needs and challenges for the remote worker

                                          Mobile VPN Market: Key Market Drivers and Restraints Global, 2011-2020
                          Increase in advanced and complex threats drives               1-2 years     3-5 years             6-10 years
                          demand for Mobile VPN solutions to help manage security
                          on wireless devices
Market Drivers




                               Use of mobile or wireless devices within organizations
                               drives the demand for Mobile VPN solutions

                                   Compliance regulations requires organizations to
                                    implement products such as mobile VPNs
                                            Need for remote accessibility drives the
                                            need for secure and continuous access to
                                            critical data


                                    Budget Concerns due to the global 2011/12
                                    economic slowdown impacts the purchase of
Market Restraints




                                    mobile VPN solutions


                                 The need to support multiple operating systems
                                 slows down mobile VPN development and sales

                               Customer confusion about the importance of
                               mobile security solutions delays spending on
                               products including mobile VPNs
                     Impact:       High       Medium      Low                                                      Source: Frost & Sullivan analysis.



                                                                                                                                                 8
The Evolving Threat Landscape

                                                                          *Malware-as-a-Service (MaaS)
                                        Malware becomes more
                                        sophisticated over time,
                                        while malware tools
                                        emerge as a popular
                                        commodity.


                                                                           APT & *MaaS



                                               Mobile Malware

   Trojans, Botnets, Root kits
             (Zeus)




2006                             2011                              Beyond 2012

                                                                                 Source: Frost & Sullivan analysis


                                                                                                                     9
Security solutions that support the remote worker




                            Mobile VPN    Anti-malware


                                                     Application and
         Content Security
                                                     Device Control
                                    Central
                                  Management
    Data Loss                                              Network Access
    Prevention                                                Control




                      Complete Mobile Security Solution




                                                              Source: Frost & Sullivan analysis


                                                                                              10
Defining a Mobile VPN


•   A Mobile VPN is defined as a specific type of VPN that is
    based on security standards such as Mobile IP, IPSec or
    SSL but us built for wireless or mobile coverage.

    o   Security

    o   Session Persistence

    o   Application Persistence

    o   Network Transparency

    o   Bandwidth Optimization

                                                  Source: Frost & Sullivan analysis


                                                                                  11
Global Mobile VPN Market

  Key Takeaway: An increase in using wireless devices will fuel revenue growth
                                 through 2016




                                                                Source: Frost & Sullivan analysis


                                                                                                12
Global Mobile VPN Market

                          Key Takeaway: The highest penetration rates are expected to come from Cisco,
                                               Juniper, and NetMotion Wireless
                                                       Competitor Growth Analysis
                                                 Total Mobile VPN Products Market: Global, 2010
  Growth rate 2009-2010




                                                                                   Juniper               Cisco
                                                                                   Networks

                                                                                                               NetMotion Wireless
                                                                           IBM
                                                                                               Smith Micro
                                                                                               Software
                                  Birdstep        Radio IP
                                  Technologies
                                                                                  Check Point Software
                                                                                  Technologies
                                                             Columbitech



                                                                                              Revenue ($ Million)
                                 > 10% growth    10-20% Growth             > 20% Growth
                                                                                                  Note: Bubble size represents relative capitalization. The
                                                                                                    base year is 2010. Source: Frost & Sullivan analysis.

<N9B3-74>                                                                                                                                                 13
The Future Outlook for the Mobile VPN Market


            As the need for mobile device security continues to increase, the mobile
      1     VPN market will experience a healthy CAGR of 18.4 percent


            The value of the mobile VPN market is expected to reach $522M by
      2     2017.


            Demand for mobile VPN technologies is increasing as businesses adopt
      3     more mobile devices.


            Mobile VPN will be integrated into security solutions suites and will not
      4     remain a separate product.


            Adoption in the mobile VPN market remains high for telecoms and
      5     government markets.
                                                                               Source: Frost & Sullivan analysis.

<N9B3-74>                                                                                                      14
For Additional Information



 Mireya Espinoza                 Martha Vazquez
 Global Director                 Industry Analyst
 Corporate Communications        Network Security- ICT
 (210) 247-3870                  (210) 247-3864
 Mireya.espinoza@frost.com       Martha.vazquez@frost.com




 Jennifer Bates                  Craig Hays
 Director of Consulting          VP of Sales, North America
 Information and Communication   Information and Communications
 Technologies                    Technologies
 (940) 455-7475                  (210)247-2460
 Jennifer.bates@frost.com        chays@frost.com




<N9B3-74>                                                         15
The New Mobility
Andy Willet, SVP, NetMotion Wireless
Agenda
  Background
  Common Challenges to Mobile Deployments
  Considerations for Mobile VPN Software
  Q&A




                                            17
Background
  NetMotion Wireless
   • Based in Seattle, WA
   • Software provider focused 
     on challenges of mobile field 
     workers and wireless

  Andy Willett
   • 11 years at NetMotion 
     Wireless
   • 11 years at AT&T Wireless 
     and Sprint Wireless




                                      18
Common Challenges to Mobile Deployments
For Mobile Workers: 
  •     Frequent log‐ins, coverage drops 
        hurts productivity
        ▪ Time taken away from project
        ▪ Drain on IT helpdesk                  Case Study:
                                                Regional Public Utility
        ▪ Application crashes
                                                The math added up:
      • Complexity of technology leads to 
                                                • ~ 200 field workers
        low adoption
                                                • ~ 1 hour per day troubleshooting
        ▪ Field workers revert to old methods     connectivity issues/re-logins
        ▪ Solution too complex                  • Multiplied by hourly rate
                                                • Added to IT helpdesk requests
                                                • Equaled large amounts of lost
                                                  productivity each day




   7/23/2012                                                                         19
Common Challenges to Mobile Deployments
For IT Managers: 
   • Limited visibility, management and 
     control into mobile workforce 
     activities and devices
       ▪ Limited control of data access while 
         mobile
       ▪ Limited insight into bandwidth drains
       ▪ No application control
   • Limited control over at‐risk data and 
     anti‐virus support
       ▪ Users and networks at greater risk
       ▪ Limited ability to enforce policies
       ▪ Limited control over device upgrades




   7/23/2012                                     20
Considerations for Mobile VPN Software
   Management
   • Centralized web‐based console
   • Granular view into all devices and usage
   • Ability to generate historical reports

   Security
   • Advanced encryption and authentication
   • Ability to quarantine, verify, and control 
     devices and applications
   • Ability to create and enforce security policies

   Productivity
   • Low complexity, single sign‐on
   • Application persistence through suspend
   • Optimization of bandwidth and connections
Summary 
       Overcoming Common Challenges
            • Dropped coverage, application freezes hurt productivity
            • Limited visibility into workforce activities limits policy control
            • Lack of application level data control creates security risks

       Requirements you Need
            • Create granular visibility into your mobile workforce 
              activities with Management tools
            • Ensure seamless roaming coverage to increase Productivity
            • Get complete application level control of data in transit 
              with stringent Security coverage 




                                                                                   22
7/23/2012
Q&A
More Information…
 www.NetMotionWireless.com/Resources   (866) 262-7626




   7/23/2012                                            24
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochuretmcleland
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
Testing cloud services - EuroSTAR
Testing cloud services - EuroSTARTesting cloud services - EuroSTAR
Testing cloud services - EuroSTARJeroen Mengerink
 
Industrial cyber threat landscape
Industrial cyber threat landscapeIndustrial cyber threat landscape
Industrial cyber threat landscapebayshorenet
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security Ben Rothke
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Ricardo Resnik
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Global Business Events
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmgNeha Dhawan
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD OpportunityJuniper Networks
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management ServicesMarlabs
 
Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Enterprise
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution BriefJuniper Networks
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 

Was ist angesagt? (20)

BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
Sophos
SophosSophos
Sophos
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Testing cloud services - EuroSTAR
Testing cloud services - EuroSTARTesting cloud services - EuroSTAR
Testing cloud services - EuroSTAR
 
Industrial cyber threat landscape
Industrial cyber threat landscapeIndustrial cyber threat landscape
Industrial cyber threat landscape
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD Opportunity
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
 
Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security Myths
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution Brief
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 

Andere mochten auch

Erasure codes fast 2012
Erasure codes fast 2012Erasure codes fast 2012
Erasure codes fast 2012Accenture
 
Gdfs sg246374
Gdfs sg246374Gdfs sg246374
Gdfs sg246374Accenture
 
Na vsc install
Na vsc installNa vsc install
Na vsc installAccenture
 
WSC Net App storage for windows challenges and solutions
WSC Net App storage for windows challenges and solutionsWSC Net App storage for windows challenges and solutions
WSC Net App storage for windows challenges and solutionsAccenture
 
PAM g.tr 3832
PAM g.tr 3832PAM g.tr 3832
PAM g.tr 3832Accenture
 
Silverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storageSilverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storageAccenture
 
Migrate volume in akfiler7
Migrate volume in akfiler7Migrate volume in akfiler7
Migrate volume in akfiler7Accenture
 
Eiu china country_report_april_2012
Eiu china country_report_april_2012Eiu china country_report_april_2012
Eiu china country_report_april_2012Accenture
 
Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Accenture
 
Empowered customer
Empowered customerEmpowered customer
Empowered customerAccenture
 
Ibm 1129-the big data zoo
Ibm 1129-the big data zooIbm 1129-the big data zoo
Ibm 1129-the big data zooAccenture
 
Guide to design_global_infrastructure
Guide to design_global_infrastructureGuide to design_global_infrastructure
Guide to design_global_infrastructureAccenture
 
Pg cloud sla040512mgreer
Pg cloud sla040512mgreerPg cloud sla040512mgreer
Pg cloud sla040512mgreerAccenture
 
Annual report full_11
Annual report full_11Annual report full_11
Annual report full_11Accenture
 
Perf stat windows
Perf stat windowsPerf stat windows
Perf stat windowsAccenture
 
C mode class
C mode classC mode class
C mode classAccenture
 
Tr 3749 -net_app_storage_best_practices_for_v_mware_vsphere,_dec_11
Tr 3749 -net_app_storage_best_practices_for_v_mware_vsphere,_dec_11Tr 3749 -net_app_storage_best_practices_for_v_mware_vsphere,_dec_11
Tr 3749 -net_app_storage_best_practices_for_v_mware_vsphere,_dec_11Accenture
 
Catalogue formations altasys_conseil2013_
Catalogue formations altasys_conseil2013_Catalogue formations altasys_conseil2013_
Catalogue formations altasys_conseil2013_Novabuild
 

Andere mochten auch (20)

Erasure codes fast 2012
Erasure codes fast 2012Erasure codes fast 2012
Erasure codes fast 2012
 
Gdfs sg246374
Gdfs sg246374Gdfs sg246374
Gdfs sg246374
 
Na vsc install
Na vsc installNa vsc install
Na vsc install
 
WSC Net App storage for windows challenges and solutions
WSC Net App storage for windows challenges and solutionsWSC Net App storage for windows challenges and solutions
WSC Net App storage for windows challenges and solutions
 
PAM g.tr 3832
PAM g.tr 3832PAM g.tr 3832
PAM g.tr 3832
 
Silverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storageSilverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storage
 
Migrate volume in akfiler7
Migrate volume in akfiler7Migrate volume in akfiler7
Migrate volume in akfiler7
 
Eiu china country_report_april_2012
Eiu china country_report_april_2012Eiu china country_report_april_2012
Eiu china country_report_april_2012
 
Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Veriphyr bright talk 20120523
Veriphyr bright talk 20120523
 
Empowered customer
Empowered customerEmpowered customer
Empowered customer
 
Ibm 1129-the big data zoo
Ibm 1129-the big data zooIbm 1129-the big data zoo
Ibm 1129-the big data zoo
 
Guide to design_global_infrastructure
Guide to design_global_infrastructureGuide to design_global_infrastructure
Guide to design_global_infrastructure
 
Pg cloud sla040512mgreer
Pg cloud sla040512mgreerPg cloud sla040512mgreer
Pg cloud sla040512mgreer
 
Ak13 pam
Ak13 pamAk13 pam
Ak13 pam
 
Annual report full_11
Annual report full_11Annual report full_11
Annual report full_11
 
Perf stat windows
Perf stat windowsPerf stat windows
Perf stat windows
 
C mode class
C mode classC mode class
C mode class
 
Tr 3749 -net_app_storage_best_practices_for_v_mware_vsphere,_dec_11
Tr 3749 -net_app_storage_best_practices_for_v_mware_vsphere,_dec_11Tr 3749 -net_app_storage_best_practices_for_v_mware_vsphere,_dec_11
Tr 3749 -net_app_storage_best_practices_for_v_mware_vsphere,_dec_11
 
Keynotes Le Mobile 2013
Keynotes Le Mobile 2013Keynotes Le Mobile 2013
Keynotes Le Mobile 2013
 
Catalogue formations altasys_conseil2013_
Catalogue formations altasys_conseil2013_Catalogue formations altasys_conseil2013_
Catalogue formations altasys_conseil2013_
 

Ähnlich wie Net motion wireless-and_frost-sullivan_a-new-mobilty_ps

Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...NetMotion Wireless
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityarms8586
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
Junos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJunos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJuniper Networks
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...cVidya Networks
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Securitytbeckwith
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problemPositiveTechnologies
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Mobile Security Report 2009
Mobile Security Report 2009Mobile Security Report 2009
Mobile Security Report 2009findram
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationLeigh Williamson
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network SecurityDjadja Sardjana
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: YamanaSoftweb Solutions
 

Ähnlich wie Net motion wireless-and_frost-sullivan_a-new-mobilty_ps (20)

Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile security
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Junos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJunos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite Launch
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Mobile Security Report 2009
Mobile Security Report 2009Mobile Security Report 2009
Mobile Security Report 2009
 
Level3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation SnapshotLevel3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation Snapshot
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentation
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 

Mehr von Accenture

Certify 2014trends-report
Certify 2014trends-reportCertify 2014trends-report
Certify 2014trends-reportAccenture
 
Calabrio analyze
Calabrio analyzeCalabrio analyze
Calabrio analyzeAccenture
 
Tier 2 net app baseline design standard revised nov 2011
Tier 2 net app baseline design standard   revised nov 2011Tier 2 net app baseline design standard   revised nov 2011
Tier 2 net app baseline design standard revised nov 2011Accenture
 
Performance problems on ethernet networks when the e0m management interface i...
Performance problems on ethernet networks when the e0m management interface i...Performance problems on ethernet networks when the e0m management interface i...
Performance problems on ethernet networks when the e0m management interface i...Accenture
 
NetApp system installation workbook Spokane
NetApp system installation workbook SpokaneNetApp system installation workbook Spokane
NetApp system installation workbook SpokaneAccenture
 
Migrate vol in akfiler7
Migrate vol in akfiler7Migrate vol in akfiler7
Migrate vol in akfiler7Accenture
 
Data storage requirements AK
Data storage requirements AKData storage requirements AK
Data storage requirements AKAccenture
 
Akfiler upgrades providence july 2012
Akfiler upgrades providence july 2012Akfiler upgrades providence july 2012
Akfiler upgrades providence july 2012Accenture
 
Reporting demo
Reporting demoReporting demo
Reporting demoAccenture
 
Net app virtualization preso
Net app virtualization presoNet app virtualization preso
Net app virtualization presoAccenture
 
Providence net app upgrade plan PPMC
Providence net app upgrade plan PPMCProvidence net app upgrade plan PPMC
Providence net app upgrade plan PPMCAccenture
 
50,000-seat_VMware_view_deployment
50,000-seat_VMware_view_deployment50,000-seat_VMware_view_deployment
50,000-seat_VMware_view_deploymentAccenture
 
Tr 3998 -deployment_guide_for_hosted_shared_desktops_and_on-demand_applicatio...
Tr 3998 -deployment_guide_for_hosted_shared_desktops_and_on-demand_applicatio...Tr 3998 -deployment_guide_for_hosted_shared_desktops_and_on-demand_applicatio...
Tr 3998 -deployment_guide_for_hosted_shared_desktops_and_on-demand_applicatio...Accenture
 
Snap mirror source to tape to destination scenario
Snap mirror source to tape to destination scenarioSnap mirror source to tape to destination scenario
Snap mirror source to tape to destination scenarioAccenture
 
Ref arch for ve sg248155
Ref arch for ve sg248155Ref arch for ve sg248155
Ref arch for ve sg248155Accenture
 
NetApp VM .tr-3749
NetApp VM .tr-3749NetApp VM .tr-3749
NetApp VM .tr-3749Accenture
 
Na audit phs 06 dec11
Na audit phs 06 dec11Na audit phs 06 dec11
Na audit phs 06 dec11Accenture
 
Go further ds 2465
Go further ds 2465Go further ds 2465
Go further ds 2465Accenture
 
Data ontap 8.x 7 mode cook book v1 1
Data ontap 8.x 7 mode cook book v1 1Data ontap 8.x 7 mode cook book v1 1
Data ontap 8.x 7 mode cook book v1 1Accenture
 

Mehr von Accenture (20)

Certify 2014trends-report
Certify 2014trends-reportCertify 2014trends-report
Certify 2014trends-report
 
Calabrio analyze
Calabrio analyzeCalabrio analyze
Calabrio analyze
 
Tier 2 net app baseline design standard revised nov 2011
Tier 2 net app baseline design standard   revised nov 2011Tier 2 net app baseline design standard   revised nov 2011
Tier 2 net app baseline design standard revised nov 2011
 
Performance problems on ethernet networks when the e0m management interface i...
Performance problems on ethernet networks when the e0m management interface i...Performance problems on ethernet networks when the e0m management interface i...
Performance problems on ethernet networks when the e0m management interface i...
 
NetApp system installation workbook Spokane
NetApp system installation workbook SpokaneNetApp system installation workbook Spokane
NetApp system installation workbook Spokane
 
Migrate vol in akfiler7
Migrate vol in akfiler7Migrate vol in akfiler7
Migrate vol in akfiler7
 
Data storage requirements AK
Data storage requirements AKData storage requirements AK
Data storage requirements AK
 
Akfiler upgrades providence july 2012
Akfiler upgrades providence july 2012Akfiler upgrades providence july 2012
Akfiler upgrades providence july 2012
 
NA notes
NA notesNA notes
NA notes
 
Reporting demo
Reporting demoReporting demo
Reporting demo
 
Net app virtualization preso
Net app virtualization presoNet app virtualization preso
Net app virtualization preso
 
Providence net app upgrade plan PPMC
Providence net app upgrade plan PPMCProvidence net app upgrade plan PPMC
Providence net app upgrade plan PPMC
 
50,000-seat_VMware_view_deployment
50,000-seat_VMware_view_deployment50,000-seat_VMware_view_deployment
50,000-seat_VMware_view_deployment
 
Tr 3998 -deployment_guide_for_hosted_shared_desktops_and_on-demand_applicatio...
Tr 3998 -deployment_guide_for_hosted_shared_desktops_and_on-demand_applicatio...Tr 3998 -deployment_guide_for_hosted_shared_desktops_and_on-demand_applicatio...
Tr 3998 -deployment_guide_for_hosted_shared_desktops_and_on-demand_applicatio...
 
Snap mirror source to tape to destination scenario
Snap mirror source to tape to destination scenarioSnap mirror source to tape to destination scenario
Snap mirror source to tape to destination scenario
 
Ref arch for ve sg248155
Ref arch for ve sg248155Ref arch for ve sg248155
Ref arch for ve sg248155
 
NetApp VM .tr-3749
NetApp VM .tr-3749NetApp VM .tr-3749
NetApp VM .tr-3749
 
Na audit phs 06 dec11
Na audit phs 06 dec11Na audit phs 06 dec11
Na audit phs 06 dec11
 
Go further ds 2465
Go further ds 2465Go further ds 2465
Go further ds 2465
 
Data ontap 8.x 7 mode cook book v1 1
Data ontap 8.x 7 mode cook book v1 1Data ontap 8.x 7 mode cook book v1 1
Data ontap 8.x 7 mode cook book v1 1
 

Net motion wireless-and_frost-sullivan_a-new-mobilty_ps

  • 2. Speakers Sarah Howland, Editor‐In‐Chief Field Technologies Magazine Martha Vazquez, Industry Analyst Frost & Sullivan Andy Willett, Senior Vice President NetMotion Wireless 2
  • 3. Global Mobile VPN Products Market: The New Mobility: How Mobile Applications and Devices are Changing Your Business. Martha Vazquez, Industry Analyst Network Security June 17, 2012 © 2012 Frost & Sullivan. All rights reserved. This document contains highly confidential information and is the sole property of Frost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan.
  • 4. Today’s Presenter Functional Expertise • Experience in market research, consulting sales and business development with expertise in the Information Communications and Technology Network Security sector. • Developing research and analysis in the Network Security industry in areas such as: - Technology and Demand Trends - Market Sizing - Market Forecasting and Strategic Analysis Industry Expertise  Experience base in the information communication technologies sector, leveraging long-standing working relationships with leading industry participants’ Senior Executives - Mobile Security Martha Vazquez - Endpoint Security Industry Analyst - Managed Security Service Providers (MSSPs) - Content Filtering Frost & Sullivan What I bring to the Team North America  Expertise in managing executive level relationships San Antonio, TX  In-depth understanding of the network security market  Experience in understanding market trends and forecasting Career Highlights  Sales Consultant in several leading Wireless firms: - AT&T - Verizon Wireless Education • Master of Business Administration from Our Lady of the Lake University, San Antonio, Texas • Bachelor of Science from Texas State University, San Marcos, Texas 4
  • 5. Focus Points • The rise in mobile field workers • The needs and challenges for the remote worker • The evolving security landscape • Security solutions used to support the mobile field worker • Defining a Mobile VPN • The future outlook for the Mobile VPN market • The Last Word 5
  • 6. Poll Question • What is the status of your mobile security strategy in place? 1. In place today 2. Don’t have one and are assessing what to do. 3. To be completed in 3 months 4. To be completed in 6 months • Do you believe that remote workers threaten your corporate environment? 1. Yes, we need to ensure employees securely access our network 2. No, we don’t believe the threat is significant 6
  • 7. The Rise in Mobile Field Workers Proliferation of Wireless Devices Source: Frost & Sullivan analysis 7
  • 8. The needs and challenges for the remote worker Mobile VPN Market: Key Market Drivers and Restraints Global, 2011-2020 Increase in advanced and complex threats drives 1-2 years 3-5 years 6-10 years demand for Mobile VPN solutions to help manage security on wireless devices Market Drivers Use of mobile or wireless devices within organizations drives the demand for Mobile VPN solutions Compliance regulations requires organizations to implement products such as mobile VPNs Need for remote accessibility drives the need for secure and continuous access to critical data Budget Concerns due to the global 2011/12 economic slowdown impacts the purchase of Market Restraints mobile VPN solutions The need to support multiple operating systems slows down mobile VPN development and sales Customer confusion about the importance of mobile security solutions delays spending on products including mobile VPNs Impact: High Medium Low Source: Frost & Sullivan analysis. 8
  • 9. The Evolving Threat Landscape *Malware-as-a-Service (MaaS) Malware becomes more sophisticated over time, while malware tools emerge as a popular commodity. APT & *MaaS Mobile Malware Trojans, Botnets, Root kits (Zeus) 2006 2011 Beyond 2012 Source: Frost & Sullivan analysis 9
  • 10. Security solutions that support the remote worker Mobile VPN Anti-malware Application and Content Security Device Control Central Management Data Loss Network Access Prevention Control Complete Mobile Security Solution Source: Frost & Sullivan analysis 10
  • 11. Defining a Mobile VPN • A Mobile VPN is defined as a specific type of VPN that is based on security standards such as Mobile IP, IPSec or SSL but us built for wireless or mobile coverage. o Security o Session Persistence o Application Persistence o Network Transparency o Bandwidth Optimization Source: Frost & Sullivan analysis 11
  • 12. Global Mobile VPN Market Key Takeaway: An increase in using wireless devices will fuel revenue growth through 2016 Source: Frost & Sullivan analysis 12
  • 13. Global Mobile VPN Market Key Takeaway: The highest penetration rates are expected to come from Cisco, Juniper, and NetMotion Wireless Competitor Growth Analysis Total Mobile VPN Products Market: Global, 2010 Growth rate 2009-2010 Juniper Cisco Networks NetMotion Wireless IBM Smith Micro Software Birdstep Radio IP Technologies Check Point Software Technologies Columbitech Revenue ($ Million) > 10% growth 10-20% Growth > 20% Growth Note: Bubble size represents relative capitalization. The base year is 2010. Source: Frost & Sullivan analysis. <N9B3-74> 13
  • 14. The Future Outlook for the Mobile VPN Market As the need for mobile device security continues to increase, the mobile 1 VPN market will experience a healthy CAGR of 18.4 percent The value of the mobile VPN market is expected to reach $522M by 2 2017. Demand for mobile VPN technologies is increasing as businesses adopt 3 more mobile devices. Mobile VPN will be integrated into security solutions suites and will not 4 remain a separate product. Adoption in the mobile VPN market remains high for telecoms and 5 government markets. Source: Frost & Sullivan analysis. <N9B3-74> 14
  • 15. For Additional Information Mireya Espinoza Martha Vazquez Global Director Industry Analyst Corporate Communications Network Security- ICT (210) 247-3870 (210) 247-3864 Mireya.espinoza@frost.com Martha.vazquez@frost.com Jennifer Bates Craig Hays Director of Consulting VP of Sales, North America Information and Communication Information and Communications Technologies Technologies (940) 455-7475 (210)247-2460 Jennifer.bates@frost.com chays@frost.com <N9B3-74> 15
  • 17. Agenda Background Common Challenges to Mobile Deployments Considerations for Mobile VPN Software Q&A 17
  • 18. Background NetMotion Wireless • Based in Seattle, WA • Software provider focused  on challenges of mobile field  workers and wireless Andy Willett • 11 years at NetMotion  Wireless • 11 years at AT&T Wireless  and Sprint Wireless 18
  • 19. Common Challenges to Mobile Deployments For Mobile Workers:  • Frequent log‐ins, coverage drops  hurts productivity ▪ Time taken away from project ▪ Drain on IT helpdesk Case Study: Regional Public Utility ▪ Application crashes The math added up: • Complexity of technology leads to  • ~ 200 field workers low adoption • ~ 1 hour per day troubleshooting ▪ Field workers revert to old methods connectivity issues/re-logins ▪ Solution too complex • Multiplied by hourly rate • Added to IT helpdesk requests • Equaled large amounts of lost productivity each day 7/23/2012 19
  • 20. Common Challenges to Mobile Deployments For IT Managers:  • Limited visibility, management and  control into mobile workforce  activities and devices ▪ Limited control of data access while  mobile ▪ Limited insight into bandwidth drains ▪ No application control • Limited control over at‐risk data and  anti‐virus support ▪ Users and networks at greater risk ▪ Limited ability to enforce policies ▪ Limited control over device upgrades 7/23/2012 20
  • 21. Considerations for Mobile VPN Software Management • Centralized web‐based console • Granular view into all devices and usage • Ability to generate historical reports Security • Advanced encryption and authentication • Ability to quarantine, verify, and control  devices and applications • Ability to create and enforce security policies Productivity • Low complexity, single sign‐on • Application persistence through suspend • Optimization of bandwidth and connections
  • 22. Summary  Overcoming Common Challenges • Dropped coverage, application freezes hurt productivity • Limited visibility into workforce activities limits policy control • Lack of application level data control creates security risks Requirements you Need • Create granular visibility into your mobile workforce  activities with Management tools • Ensure seamless roaming coverage to increase Productivity • Get complete application level control of data in transit  with stringent Security coverage  22 7/23/2012
  • 23. Q&A