1. Market Research
  2. > Computer Security Market Trends
  3. > Wireless Security Companies and Solutions 2014

Wireless Security Companies and Solutions 2014

  • February 2014
  • -
  • Mind Commerce Publishing
  • -
  • 52 pages

Overview:

Collectively speaking, wireless security represents technologies and solutions designed to prevent unauthorized access or information damage for computers connected to wireless networks. Increasingly, wireless security is targeted to the emerging needs of the handheld wireless ecosystem, which includes wireless tablets, smartphones, and other devices. These devices typically rely upon an operating system that is optimized and/or integrated with mobile communications, content, applications, and commerce.

Within the enterprise mobility market, chief security concerns are driven by policy decision and end-user behavior associated with the Bring Your Own Device (BYOD) trend and the need for corporations to execute a mobile device management plan. Complications intensify as enterprise deals with third-party applications running on the same devices as corporate devices.

This report evaluates wireless security technologies, company offerings, and solutions. The report analyzes wireless security for different business models, analyzes key players and solutions within the wireless security industry. The report also presents a future outlook for wireless security based on important technologies and solution trending and anticipated developments.

Target Audience:

Mobile network operators
Mobile application developers
Wireless device manufacturers
Enterprise mobility management
Wireless security application developers
Wireless security management companies

Report Benefits:

SWOT analysis of security companies/solutions
Analysis of wireless security trends and industry outlook
Assessment of companies and solutions for wireless security
Evaluation of wireless security technologies, protocols, challenges, and types
Evaluation of wireless security requirements for different levels of business models

Companies in Report:

AirPatrol
AirTight Networks
Apple
AT&T
Blue Coat
Cisco
Enterasys Networks
Ericsson
Google
Hewlett Packard
IBM
Juniper Networks
Microsoft
Nokia
RIM
Symantec
Verizon Business

Table Of Contents

Wireless Security Companies and Solutions 2014
OVERVIEW 2
KEY BENEFITS 2
TARGET AUDIENCE 2
TABLE OF CONTENTS 2
OVERVIEW OF WIRELESS TECHNOLOGY 7
WIRELESS NETWORK ADVANTAGES 7
Popularity 7
Mobility 7
Ease of Deployment 8
WIRELESS NETWORK THREATS 8
WIRELESS TECHNOLOGIES 9
Wireless LANs 10
Ad Hoc Networks 10
Wireless Devices 11
Mobile Phones 11
PDAs 12
Palm 12
PocketPC 12
Other Mobile Devices 13
WIRELESS LAN 13
Security Features of 802.11 Wireless LANs 14
Security Requirements and Threats 14
Passive Attack 14
Eavesdropping 14
Traffic analysis 14
Active Attack 15
Masquerading 15
Replay 15
Message modification 15
Denial-of-service 15
Loss of Confidentiality 15
Loss of Integrity 16
Loss of Network Availability 16
WIRELESS PERSONAL AREA NETWORKS 16
Bluetooth Security Features 17
Security Requirements and Threats 18
Loss of Confidentiality 18
Loss of Integrity 19
Loss of Availability 19
MOBILE DEVICES 19
Mobile Device Requirements and Threats 20
Loss and theft 20
Disposal 20
Malware 20
Spam 21
Private ownership 21
TELECOM MOBILE COMMUNICATIONS 21
1st generation (1G) 21
2nd generation (2G) 22
SIM 24
Speech Coding 24
Authentications and Security in GSM networks 24
WAP (Wireless Applicant Protocol) 25
3rd generation (3G) 25
Applications in 3G system 25
4th Generation (4G) 26
Applications and Services of 4G system 27
Tele Presence 27
Information Access 27
Inter-Machine Communication 27
Intelligent Shopping 27
Location-Based Services 27
Globalization of Products 27
Communicating Appliances 28
Telecom Mobile Security 28
GSM security 28
UMTS security 29
WAP SECURITY 29
MOBILE CLOUD 30
Mobile Cloud Characteristics 30
On-demand self service 30
Broad network access 30
Resource pooling 30
Mobile Cloud Enabling Technologies 31
4G 31
HTML5 and CSS3 31
Hypervisor 31
Cloudlets 31
Web 4.0 32
Mobile Cloud Service Models 32
Software as a Service (SaaS) 32
Platform as a Service (PaaS) 32
Infrastructure as a Service (IaaS) 32
Monitoring-as-a-Service (MaaS) 32
Mobile Cloud Platforms 33
Smart phones 33
Tablets 34
Mobile Cloud Deployment 34
Private Cloud 34
Community Cloud 34
Public Cloud 34
Hybrid Cloud 34
Mobile Cloud Challenges 35
Resource poverty 35
Data storage capacity and processing power: 35
Division of application services 35
Absence of standards 36
Access Schemes 37
Security 37
WIRELESS SECURITY COMPANIES AND SOLUTIONS 38
ENTERASYS NETWORKS 38
Enterasys Networks Security Solutions 38
Dynamic Intrusion Response Solution 38
Secure Open Convergence Solution 38
Acceptable Use Policy Solution 38
SWOT Analysis 38
AIRTIGHT NETWORKS 40
AirTight Networks Security Solutions 40
Intelligent Edge Wi-Fi 40
Top-ranked Security 40
AirTight Networks' SpectraGuard 40
SWOT Analysis 41
VERIZON BUSINESS 41
VeriZon Wireless Security Solutions for Retail 41
SWOT Analysis 42
AIRPATROL 42
AirPatrol Security Solution 43
SWOT Analysis 43
BLUE COAT 44
Blue Coat Security Solution 44
SWOT Analysis 45
CISCO 46
Cisco Wireless Security Solution 46
SWOT Analysis 46
SYMANTEC 47
Symantec Wireless Security Solution 47
SWOT Analysis 47
JUNIPER NETWORKS 48
Juniper Networks Wireless Security Solution 48
SWOT Analysis 49
WIRELESS SECURITY FUTURE TRENDS 50
WPA2 50
LOCATION AND SITUATIONAL AWARENESS 50
MORE PROTECTION FOR CLOUD 50
Proactive Application Monitoring 50
Enhanced Data center physical security 50
Enhanced Data Transfer Protection 51
Disaster Recover and the Cloud 51

View This Report »

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 24 Million searchable statistics with tables, figures & datasets
  • More than 10,000 trusted sources
24/7 Customer Support

Talk to Veronica

+1 718 514 2762

Purchase Reports From Reputable Market Research Publishers
Asia-Pacific Distributed Denial of Service (DDoS) Solutions Market

Asia-Pacific Distributed Denial of Service (DDoS) Solutions Market

  • $ 13500
  • Industry report
  • September 2016
  • by Frost & Sullivan

Rise of Volumetric, Sophisticated, and Ransom DDoS Attacks Toward Organizations Driving the Market Growth momentum in the Asia-Pacific Distributed Denial of Services (DDoS) solutions market remained strong ...

Cyber Security: Technologies and Global Markets

Cyber Security: Technologies and Global Markets

  • $ 6650
  • Industry report
  • October 2016
  • by BCC Research

Use this report to: - Analyze regulatory and standardization issues that impact the software-defined radio (SDR) market. - Receive market sizes for cellular SDR base station infrastructure, cellula ...

Analysis of the India Secure Content Management Market

Analysis of the India Secure Content Management Market

  • $ 4950
  • Industry report
  • September 2016
  • by Frost & Sullivan

Targeted and Ransomware Attacks are Driving the SCM Market The Indian SCM market grew strongly at 11.7% year-on-year in 2015 with the web security segment growing at 12.4% and the email security segment ...


ref:plp2014

Reportlinker.com © Copyright 2016. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.