1. Market Research
  2. > Consumer Electronics
  3. > Portable Devices
  4. > Mobile Phone Market Trends
  5. > Hardening Android: Building Security into the Core of Mobile Devices

In this market insight, we will:
· Provide an overview of mobile security and mobile threats
· Discuss the unique role of the application stores and what makes Android especially vulnerable
· Review good mobile security hygiene
· Discuss how hardware technology can be leveraged to improve Android security
· Elaborate on how some companies are leading innovation by using hardware technology to improve Android security

Introduction

Mobile computing devices such as tablets and smartphones enable a high degree of connectivity and
productivity that employees now expect in their jobs. Frost & Sullivan research demonstrates how
pervasive mobile is becoming. Recent research provides the following insights:2

• Nearly three out of every four organizations issue corporate-owned laptops ( %) and
smartphones ( %) to their workforces; while almost half issue tablets ( %).
• Android has taken a surprising lead as the most common mobile operating system supported
for organization-owned devices (at %); followed by iOS ( %); Windows Mobile ( %);
and BlackBerry ( %). The landscape is changing dramatically in this industry.
The use cases of mobile devices result in different risk than traditional PCs. The availability of
Internet-based application stores provides uniquely mobile conduits for mobile malware, with
Android malware being the favored mobile attack vector. Research by the United States Computer
Emergency Readiness Team (US-CERT) confirms that the majority of known mobile threats target
Android devices.

In this market insight, we will:
• Provide an overview of mobile security and mobile threats
• Discuss the unique role of the application stores and what makes Android especially
vulnerable
• Review good mobile security hygiene
• Discuss how hardware technology can be leveraged to improve Android security
• Elaborate on how some companies are leading innovation by using hardware technology to
improve Android security

Table Of Contents

Hardening Android: Building Security into the Core of Mobile Devices
Table of Contents
Introduction ... 5
Overview of Mobile Security 6
What is a Threat in the Mobile World? 6
Contrasting Android and iOS . 8
Android Application Stores .. 9
Rooting and OS Settings to Access Alternative Market .. 9
Third Party App Stores 10
When Mobile Threats Are Not Black and White . 11
Good Security Hygiene Practices for Android . 13
Leveraging Hardware Technology to Improve Android Security ... 14
The Foundation of Security—A Root of Trust 14
Mobile Challenges with Roots of Trust 15
Roots of Trust in Android 15
Companies Leading Innovation . 16
ARM TrustZone . 16
Qualcomm . 19
SecureMSM .. 19
StudioAccess Technology . 20
Enterprise and BYOD security . 20
Samsung. 20
Device and Data Security 20
Container Usability ... 20
Easy Enrollment .. 21
Cloud-based Mobile Device Control 21
Centrify for Samsung KNOX ... 21
Intel ... 21
Intel Identity Protection Technology (IPT) .. 21
Intel Device Protection Technology (DPT) for Android .. 22
Boeing .... 24
Blackphone 26
The Last Word .. 27

List of Figures
Figure 1: F-Secure Labs Mobile Threat Classifications . 7
Figure 2: Mobile Vulnerabilities by Year (2011-2013) . 8
Figure 3: Risk Posture of the Google Play Store ... 9
Figure 4: Analysis of the Malware Content of Android App Store . 10
Figure 5: Mobile Malware Types Common to Sideloading Practices 11
Figure 6: Example Request for Android Application Permissions 12
Figure 7: Changing Face of Mobile Threat Vectors; Malvertising Overtakes Porn . 13
Figure 8: ARM TrustZone Environments .. 17
Figure 9: Attributes and Benefits of TrustZone .. 18
Figure 10: Intel IPT Example ... 22
Figure 11: Intel Device Protection Technology Features and Benefits .. 23
Figure 12: Intel DPT Secure Containerization 24
Figure 13: The Boeing Black Smartphone . 25

View This Report »

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 24 Million searchable statistics with tables, figures & datasets
  • More than 10,000 trusted sources
24/7 Customer Support

Talk to Ahmad

+1 718 618 4302

Purchase Reports From Reputable Market Research Publishers
Middle East and North Africa Mobile Devices Market Analytics to 2020: Mobile Handset Sales by Category, Type of Customer, Price, Vendor, Features, Smartphones, OS, Technology and Generation

Middle East and North Africa Mobile Devices Market Analytics to 2020: Mobile Handset Sales by Category, Type of Customer, Price, Vendor, Features, Smartphones, OS, Technology and Generation

  • $ 8995
  • Industry report
  • September 2016
  • by Pyramid Research

Summary Pyramid Research report "Middle East and North Africa Mobile Devices Market Analytics to 2020: Mobile Handset Sales by Category, Type of Customer, Price, Vendor, Features, Smartphones, OS, Technology ...

Mobile Technologies: Global Markets

Mobile Technologies: Global Markets

  • $ 6650
  • Industry report
  • January 2017
  • by BCC Research

Use this report to: - Understand the underlying operating system and the way it shapes the global mobile applications market. - Learn about the various software development kits offered by manufacturers ...

Central and Eastern Europe Mobile Phone 2016-2020 Forecast

Central and Eastern Europe Mobile Phone 2016-2020 Forecast

  • $ 6000
  • Industry report
  • September 2016
  • by IDC

In this study, we provide a market forecast and analysis of the handset market in the CEE region. This encompasses data on shipments of mobile phones, analysis of the market outlook by product category ...


ref:plp2014

Reportlinker.com © Copyright 2017. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.