Table of Contents 1. Executive Summary
2. Methodology and scope 2.1. General methodology of IDATE's reports 2.2. Scope
3. Mobile security threats, solutions and applications 3.1. Mobile security threats 3.1.1. Specificities of mobile platforms 3.1.2. Threats and attacks 3.2. Mobile Security Solutions across platforms 3.2.1. Overview 3.2.2. Baseline protection: Mobile OS and mobile networks 3.2.3. Security frameworks and mobile security applications 3.2.4. Security key enabling technologies
4. Market structure and player strategies 4.1. Market structure 4.1.1. Value chain 4.1.2. Access to market 4.1.3. Table of market players 4.2. Hardware enabler providers 4.2.1. Secure element and trusted execution environment 4.2.2. Biometric technology 4.3. Baseline protection providers 4.3.1. OS providers 4.3.2. Device manufacturers 4.3.3. Mobile network operators 4.4. Security solution players 4.4.1. Pure players 4.4.2. Security solution providers 4.4.3. IT-solution providers
5. Strategic analysis 5.1. Key drivers 5.1.1. Technological push 5.1.2. New mobile use cases requiring security 5.1.3. Regulation 5.1.4. Device market maturity 5.2. Barriers 5.2.1. Rising baseline protection 5.2.2. Lack of strong consumer demand 5.2.3. Device market cost sensitivity 5.3. Market development and forecasts 5.3.1. Key trends 5.3.2. Major uncertainties 5.3.3. Market forecast Tables and Figures Tables Table 1: Type of malware attacks Table 2: Means of propagation of malware attacks Table 3: Comparison of Android OS and iOS security features Table 4: Types of secure elements Table 5: Compared protection offered by secure elements, TEE and mobile OS Table 6: Mobile security solutions' market players Table 7: Gemalto mobileID solution Table 8: Lookout consumer offering Free and Premium Table 9: User concerns around mobile identity and personal data
Figures Figure 1: Mobile platform vulnerabilities Figure 2: Mobile threats, attacker strategies Figure 3: Number of Android malwares identified Figure 4: Number of new mobile malwares identified by McAfee Figure 5: New malwares (non-mobile) identified by McAfee Figure 6: Devices with known potential harmful applications Figure 7: Geography of mobile malware encounter rates, Q3 2015 (% of users attacked) Figure 8: Web navigation shifts to mobile Figure 9: Global in-store mobile payment volume Figure 10: IoT development in volume Figure 11: Overview of mobile security solutions Figure 12: iOS security architecture Figure 13: Abstract overview of mobile networks Figure 14: Avast Mobile Security and Antivirus Figure 15: Kaspersky Internet Security Figure 16: Android Device Manager Figure 17: Management of mobile devices, content and applications Figure 18: Protection of corporate network against external mobiles Figure 19: Using the mobile for authentication Figure 20: Multifactor authentication Figure 21: The secure element, as a microSD, UICC embedded in the device Figure 22: Secure element application domains Figure 23: Samsung Galaxy S6 Edge, fingerprint sensor Figure 24: Components of TouchID Figure 25: Rich OS and TEE comparison Figure 26: Security in the mobile value chain Figure 27: NFC positioning on the security market Figure 28: Synaptics products in the SmartPhone Figure 29: Fingerprint Cards sensors Figure 30: AuthenTec, the fingerprint sensor company bought by Apple Figure 31: Android 6.0 privacy control Figure 32: Android Pay Figure 33: Samsung Pay, emulation of a magnetic card swipe Figure 34: LG Gate Enterprise solution Figure 35: Keeper partnership with HTC Figure 36: Sony myXperia software Figure 37: BlackBerry Priv (Android based) Figure 38: Blackphone 2 Figure 39: Verizon Total Mobile Protection offering Figure 40: Telefónica ElevenPaths Latch security solution Figure 41: T-Mobile MyWallet Figure 42: MobileIron telco partnerships Figure 43: Security multifactor authentication for password management Figure 44: Kaspersky Android wearables application Figure 45: Avast mobile application ecosystem Figure 46: Avast Virtual Mobile Platform Figure 47: VMWare vision of next EMM challenges: Identity management and virtualisation Figure 48: Citrix XenMobile security compliance engine Figure 49: Iris scanner on Fujitsu NX F04G Figure 50: Parasol, a new application dedicated to privacy protection using Android 6.0+ privacy controls Figure 51: Increasing convergence in mobile/PC platforms Figure 52: Mobile device: shipments by region Figure 53: The threat of rising baseline protections and possible roads to market for B2C solutions Figure 54: Credibility of players for the provision of online information Figure 55: Security feeling, age and smart cards Figure 56: The gap between use and trust Figure 57: Global mobile security market (2015 - 2020) Figure 58: Global B2B market for mobile security solutions (2015 - 2020) Figure 59: Global B2C market for mobile security solutions (2015 - 2020) List of Players • Alipay • AMD • Apple • ARM • Asurion • ASUS • AT&T • Atmel • Authentec • Avast • Barclays • bitdefender • Blackberry • CA Technologies • CheckPoint • Citrix • Elevenpath • Ericsson • Fiberlink • Fingerprint Card • FireEye • Fujitsu • GDATA • Gemalto • Giesecke & Devrient • GlobalPlatform • Good • Google • GSMA • HTC • Huawei • IBM • Intel Security / McAfee • JAMF Software • Kaspersky • KDDI • LedgaCore • LG • Lookout Security • Microsoft • Mobile Iron • Motorola • NVIDIA • NXP • Oberthur • O-film • Orange • Parasol • Precise Biometrics • Qualcomm • Samsung • SAP • Silent Circle • Softcard • Solacia • Sony • Sophos • SOTI • Sprint • ST • Sybase • Symantec • Synaptics • Telefónica • T-Mobile • TPK • Trustonic • Trustwave • Verizon • VMWare • Vodafone • Widepoint Slideshow Contents Overview of Mobile Security Solutions - Main solutions and technologies • Threats targeting the mobile platform • Existing mobile security solutions • Mobile security solutions on the value chain • Main players
A relatively secure platform - The mobile platform currently appears relatively more secure than the PC • Mobile threat prevalence • Strong baseline protection
Rising security risks - New threats will challenge the security of the mobile platform • A shift in usage • A shift in trust sensitivity • Mobile Security Solution market
A growing sector with important variation - The growth of the mobile sector hides disparities between sector and technologies • Mobile security solutions B2B market • Mobile security solutions B2C market • Access to the B2C market
|