Analysis of the Global Mobile Endpoint Protection Market

  • October 2013
  • -
  • Frost & Sullivan
  • -
  • 96 pages

Mass Smartphone Adoption Increases Risk and Drives Demand for Innovative Security Products

The mobile security challenge is complex and multi-faceted. Mobile devices can be infected by malicious software called malware, enabling hackers to gain access or control. Mobile applications (simply called “apps”) on the device can perform unwanted, high-risk actions. Sensitive data stored on the device can also be lost or stolen. This study focuses on mobile endpoint protection products designed to secure the device against malware, cyber attacks, high risk applications, and physical loss or theft.

Executive Summary

•Highly mobile computing devices such as tablets and smartphones enable a high degree of connectivity and productivity that employees now expect in their jobs, whether companies support personal-owned devices or provide corporate-owned devices.
•An organization’s mobile device access and support policies are of critical consideration for enabling a highly productive, motivated, and connected workforce.
•At a minimum, employees expect the flexibility to use their personally owned devices to access corporate network resources and files. As a result, many IT organizations are adopting a practice called Bring-Your-Own-Device (BYOD).
•The ability to provide corporate issued mobile devices or implement a BYOD strategy is essential for any organization to stay competitive in a highly connected world.
•Unfortunately, these same mobile devices represent new attack vectors for opportunistic and skilled hacker organizations.
•Mobile devices are now being targeted by hackers for data theft and fraudulent activity or as part of a sophisticated multi-stage cyber attack.
•As a result, awareness of mobile device security is growing rapidly amongst consumer and business customers alike.
•However, there is little consensus on an appropriate approach to mobile security.
•The mobile security challenge is complex and multi-faceted. Mobile devices can be infected by malicious software (malware), enabling hackers to gain access or control. Mobile applications (called “apps”) on the device can perform unwanted, high-risk actions. Sensitive data stored on the device can also be lost or stolen.
•Ideally, this challenge requires a layered, defense-in-depth strategy that protects data at rest and in motion, provides protection for the actual device, and includes network-based controls for mobile network traffic including application traffic.
•This study focuses on mobile endpoint protection products designed to secure the device against malware, cyber attacks, high risk applications, and physical loss or theft.
•As an essential component in an enterprise mobile security architecture, the mobile endpoint protection market has achieved excellent growth rates in its formative years.
•Despite strong early adoption, however, sales growth in the mobile endpoint protection market has not matched the explosive growth in the number of mobile devices sold in recent years.
•This indicates much unrealized opportunity for market growth as well as the need for end-user education, ongoing product and feature development, and sales strategies.
•Incidentally, the competitive nature of the nascent mobile endpoint protection market holds tremendous potential for innovative companies to rapidly advance in the competitive landscape.

CEO’s Perspective

1. The mobile security challenge is multi-faceted and will affect the entire security industry.
2. The market is highly competitive and will face consolidation in coming years.
3. Innovative vendors can displace incumbent security companies in the mobile endpoint protection market.
4. Mobile endpoint protection products compete on many factors including aggressive pricing strategies.
5. The mobile endpoint protection market holds tremendous potential for growth.

Key Questions This Study Will Answer

• What is the vendor opportunity for growth in the mobile endpoint protection market?
• What product features and functionality do customers expect in the product?
• How are customer perceptions of the mobile endpoint threat changing?
• Which vendors offer comprehensive product portfolios?
• What distribution channels are most effective and how will this change in the future?
• How do pricing and product features vary from consumer and business segments?

Table Of Contents

Table Of Contents

1. Executive Summary
2. Market Overview
3. Total Mobile Endpoint Protection Market
• External Challenges: Drivers and Restraints
• Forecast and Trends
• Market Share and Competitive Analysis
4. Business Segment Breakdown
5. Consumer Segment Breakdown
6. The Last Word
7. Appendix



List of Exhibits

1. Total Mobile Endpoint Protection Market: Market Engineering Measurements, Global, 2012
2. Total Mobile Endpoint Protection Market: Product Functionality by Market Segment, Global, 2012
3. Total Mobile Endpoint Protection Market: Mobile Security Strategy Topology, Global, 2012
4. Total Mobile Endpoint Protection Market: Distribution Channel Analysis, Global, 2012
5. Total Mobile Endpoint Protection Market: Key Market Drivers and Restraints, Global, 2012-2017
6. Total Mobile Endpoint Protection Market: Unit Shipment and Revenue Forecast, Global, 2009-2017
7. Total Mobile Endpoint Protection Market: Average Price for Mobile Endpoint Protection, Global, 2009-2017
8. Total Mobile Endpoint Protection Market: Percent Revenue Forecast by Region, Global, 2012 and 2017
9. Total Mobile Endpoint Protection Market: Percent Revenue Forecast by Distribution Channel, Global, 2009-2017
10. Total Mobile Endpoint Protection Market: Paid Product Penetration, Global, 2009-2017
11. Total Mobile Endpoint Protection Market: Percent of Revenue, Global, 2012
12. Total Mobile Endpoint Protection Market: Competitive Structure, Global, 2012
13. Total Mobile Endpoint Protection Market: Competitive Landscape, Global, 2012
14. Business Segment: Percent Sales Breakdown, Global, 2012
15. Business Segment: Market Engineering Measurements, Global, 2012
16. Business Segment: Unit Shipment and Revenue Forecast, Global, 2009-2017
17. Business Segment: Average Price for Mobile Endpoint Protection, Global, 2009-2017
18. Business Segment: Percent Revenue Forecast by Distribution Channel, Global, 2009-2017
19. Business Segment: Percent of Revenue, Global, 2012
20. Business Segment: Competitive Structure, Global, 2012
21. Business Mobile Endpoint Protection Market: Competitive Landscape, Global, 2012
22. Consumer Segment: Percent Sales Breakdown, Global, 2012
23. Consumer Segment: Market Engineering Measurements, Global, 2012
24. Consumer Segment: Unit Shipment and Revenue Forecast, Global, 2009-2017
25. Consumer Segment: Average Price for Mobile Endpoint Protection, Global, 2009-2017
26. Consumer Segment: Percent Revenue Forecast by Distribution Channel, Global, 2009-2017
27. Consumer Segment: Percent of Revenue, Global, 2012
28. Consumer Segment: Competitive Structure, Global, 2012
29. Consumer Mobile Endpoint Protection Market: Competitive Landscape, Global, 2012

View This Report »

Find all the market research you need - instantly, in one place.

+1.2 Million Research Documents & Statistics +200,000 Trusted Public Sources 350 Industries With Global Coverage

24/7 Customer Support

Talk to Louis

+1 718 618 4302

Purchase Reports From Reputable Market Research Publishers

M2M and Telematics Solutions and Market Opportunities

M2M and Telematics Solutions and Market Opportunities

  • $ 9 995
  • Industry report
  • December 2014
  • by Mind Commerce Publishing

Overview: Machine-to-Machine (M2M) communications represents and increasingly important revenue opportunity for service providers, and with the introduction of the Internet of Things (IoT), M2M is rapidly ...

The Wireless network traffic worldwide: forecasts and analysis 2014-2019

The Wireless network traffic worldwide: forecasts and analysis 2014-2019

  • $ 7 999
  • Industry report
  • October 2014
  • by Analysys Mason

"Mobile data traffic growth is developing in divergent ways, reflecting the differing strategic investment decisions taken by operators in different regions. This report analyses these trends, highlighting ...

Global LTE Technology Assessment, Market Analysis, and Forecasts 2014 - 2019

Global LTE Technology Assessment, Market Analysis, and Forecasts 2014 - 2019

  • $ 6 995
  • Industry report
  • October 2014
  • by Mind Commerce Publishing

Fourth generation (4G) cellular technology represents a huge leap compared to previous generations. The Long Term Evolution (LTE) standard for 4G provides significant capacity gains as well as true end-to-end ...


ReportLinker is an award-winning market research solution that finds, filters and organizes the latest industry data so you get all the market research you need - quickly, in one place.