ȸ¿ø°¡ÀÔ | ¿¬¶ôó | »çÀÌÆ®¸Ê | English

      È¸»ç¼Ò°³ | ¸®Æ÷Æ® | Ä¿½ºÅÒ ¸®¼­Ä¡ | °í°´Áö¿ø


·Î±×ÀÎ

Ä«Å×°í¸®

À¯/¹«¼±Åë½Å

Àü±â/ÀüÀÚ

µðÁöÅбâ±â/¹Ìµð¾î/¹æ¼Û

Information Technology

¿¡³ÊÁö

»ý¸í°øÇÐ

È­ÇÐ/½Å¼ÒÀç

ÀÚµ¿Â÷

ȯ°æ

ÀϹݼҺñÀç

¸¶ÄÉÆÃ/±¤°í

±ÝÀ¶

°Ç¼³

±³Åë/¿î¼Û

¼ÒºñÀÚÁ¶»ç

¹æÀ§/Ç×°ø/¿ìÁÖ

½ÄÀ½·á

Áß°ø¾÷

±³À°

±â°è

¹«¿ª

½ºÆ÷Ã÷/·¹Àú

ÇØ¿î/Á¶¼±

ÆмÇ

Á¤ºÎ/Á¤Ã¥

°ø¿¹/±Í±Ý¼Ó

ÄÄÆÛ´Ï ÇÁ·ÎÆÄÀÏ

±âŸ»ê¾÷

 
ÇöÀçÀ§Ä¡ : HOME > ¸®Æ÷Æ® > Information Technology > º¸¾È
Mobile Security Solutions
¹ßÇà»ç IDATE

¹ßÇàÀÏ 2016-05-10
ºÐ·® 82 pages
¼­ºñ½ºÇüÅ Report
ÆǸŰ¡°Ý

ÀμâÇϱâ

Table of Contents

1. Executive Summary

2. Methodology and scope
2.1. General methodology of IDATE's reports
2.2. Scope

3. Mobile security threats, solutions and applications
3.1. Mobile security threats
3.1.1. Specificities of mobile platforms
3.1.2. Threats and attacks
3.2. Mobile Security Solutions across platforms
3.2.1. Overview
3.2.2. Baseline protection: Mobile OS and mobile networks
3.2.3. Security frameworks and mobile security applications
3.2.4. Security key enabling technologies

4. Market structure and player strategies
4.1. Market structure
4.1.1. Value chain
4.1.2. Access to market
4.1.3. Table of market players
4.2. Hardware enabler providers
4.2.1. Secure element and trusted execution environment
4.2.2. Biometric technology
4.3. Baseline protection providers
4.3.1. OS providers
4.3.2. Device manufacturers
4.3.3. Mobile network operators
4.4. Security solution players
4.4.1. Pure players
4.4.2. Security solution providers
4.4.3. IT-solution providers

5. Strategic analysis
5.1. Key drivers
5.1.1. Technological push
5.1.2. New mobile use cases requiring security
5.1.3. Regulation
5.1.4. Device market maturity
5.2. Barriers
5.2.1. Rising baseline protection
5.2.2. Lack of strong consumer demand
5.2.3. Device market cost sensitivity
5.3. Market development and forecasts
5.3.1. Key trends
5.3.2. Major uncertainties
5.3.3. Market forecast

Tables and Figures

Tables
Table 1: Type of malware attacks
Table 2: Means of propagation of malware attacks
Table 3: Comparison of Android OS and iOS security features
Table 4: Types of secure elements
Table 5: Compared protection offered by secure elements, TEE and mobile OS
Table 6: Mobile security solutions' market players
Table 7: Gemalto mobileID solution
Table 8: Lookout consumer offering Free and Premium
Table 9: User concerns around mobile identity and personal data

Figures
Figure 1: Mobile platform vulnerabilities
Figure 2: Mobile threats, attacker strategies
Figure 3: Number of Android malwares identified
Figure 4: Number of new mobile malwares identified by McAfee
Figure 5: New malwares (non-mobile) identified by McAfee
Figure 6: Devices with known potential harmful applications
Figure 7: Geography of mobile malware encounter rates, Q3 2015 (% of users attacked)
Figure 8: Web navigation shifts to mobile
Figure 9: Global in-store mobile payment volume
Figure 10: IoT development in volume
Figure 11: Overview of mobile security solutions
Figure 12: iOS security architecture
Figure 13: Abstract overview of mobile networks
Figure 14: Avast Mobile Security and Antivirus
Figure 15: Kaspersky Internet Security
Figure 16: Android Device Manager
Figure 17: Management of mobile devices, content and applications
Figure 18: Protection of corporate network against external mobiles
Figure 19: Using the mobile for authentication
Figure 20: Multifactor authentication
Figure 21: The secure element, as a microSD, UICC embedded in the device
Figure 22: Secure element application domains
Figure 23: Samsung Galaxy S6 Edge, fingerprint sensor
Figure 24: Components of TouchID
Figure 25: Rich OS and TEE comparison
Figure 26: Security in the mobile value chain
Figure 27: NFC positioning on the security market
Figure 28: Synaptics products in the SmartPhone
Figure 29: Fingerprint Cards sensors
Figure 30: AuthenTec, the fingerprint sensor company bought by Apple
Figure 31: Android 6.0 privacy control
Figure 32: Android Pay
Figure 33: Samsung Pay, emulation of a magnetic card swipe
Figure 34: LG Gate Enterprise solution
Figure 35: Keeper partnership with HTC
Figure 36: Sony myXperia software
Figure 37: BlackBerry Priv (Android based)
Figure 38: Blackphone 2
Figure 39: Verizon Total Mobile Protection offering
Figure 40: Telefónica ElevenPaths Latch security solution
Figure 41: T-Mobile MyWallet
Figure 42: MobileIron telco partnerships
Figure 43: Security multifactor authentication for password management
Figure 44: Kaspersky Android wearables application
Figure 45: Avast mobile application ecosystem
Figure 46: Avast Virtual Mobile Platform
Figure 47: VMWare vision of next EMM challenges: Identity management and virtualisation
Figure 48: Citrix XenMobile security compliance engine
Figure 49: Iris scanner on Fujitsu NX F04G
Figure 50: Parasol, a new application dedicated to privacy protection using Android 6.0+ privacy controls
Figure 51: Increasing convergence in mobile/PC platforms
Figure 52: Mobile device: shipments by region
Figure 53: The threat of rising baseline protections and possible roads to market for B2C solutions
Figure 54: Credibility of players for the provision of online information
Figure 55: Security feeling, age and smart cards
Figure 56: The gap between use and trust
Figure 57: Global mobile security market (2015 - 2020)
Figure 58: Global B2B market for mobile security solutions (2015 - 2020)
Figure 59: Global B2C market for mobile security solutions (2015 - 2020)

List of Players

Alipay
AMD
Apple
ARM
Asurion
ASUS
AT&T
Atmel
Authentec
Avast
Barclays
bitdefender
Blackberry
CA Technologies
CheckPoint
Citrix
Elevenpath
Ericsson
Fiberlink
Fingerprint Card
FireEye
Fujitsu
GDATA
Gemalto
Giesecke & Devrient
GlobalPlatform
Good
Google
GSMA
HTC
Huawei
IBM
Intel Security / McAfee
JAMF Software
Kaspersky
KDDI
LedgaCore
LG
Lookout Security
Microsoft
Mobile Iron
Motorola
NVIDIA
NXP
Oberthur
O-film
Orange
Parasol
Precise Biometrics
Qualcomm
Samsung
SAP
Silent Circle
Softcard
Solacia
Sony
Sophos
SOTI
Sprint
ST
Sybase
Symantec
Synaptics
Telefónica
T-Mobile
TPK
Trustonic
Trustwave
Verizon
VMWare
Vodafone
Widepoint

Slideshow Contents

Overview of Mobile Security Solutions - Main solutions and technologies
Threats targeting the mobile platform
Existing mobile security solutions
Mobile security solutions on the value chain
Main players

A relatively secure platform - The mobile platform currently appears relatively more secure than the PC
Mobile threat prevalence
Strong baseline protection

Rising security risks - New threats will challenge the security of the mobile platform
A shift in usage
A shift in trust sensitivity
Mobile Security Solution market

A growing sector with important variation - The growth of the mobile sector hides disparities between sector and technologies
Mobile security solutions B2B market
Mobile security solutions B2C market
Access to the B2C market


ȸ»ç¼Ò°³ | °³ÀÎÁ¤º¸º¸È£Á¤Ã¥ | ÀÌ¿ë¾à°ü | ¹è¼Û/°áÁ¦¾È³» | ÀÌ¿ë¾È³»

¼­¿ï½Ã °­³²±¸ ³íÇöµ¿ 210-1 »ï¿øºôµù | ȸ»ç¸í : (ÁÖ)¿¤¾Ø¿¡Ä¡
´ëÇ¥ÀüÈ­ : 02-554-0001 / Æѽº : 02-3444-5501 / À̸ÞÀÏ : sales@landh.co.kr
Copyright ¨Ï 2008 LNH, Inc. All rights reserved.