The Rise of Mobile Malware

2011 is witnessing an explosion of new threats targeting mobile devices. Data and ID theft, SMS fraud, rogue apps and covert espionage are infecting smartphones at an unprecedented rate. Malware such as Trojans, worms, spyware and spam are spreading across mobile platforms, already highly capable of stealing data, corrupting functions and usurping control. 

Visiongain research shows that the number of mobile malware more than doubled in 2011 from 2010 with over 200 new variants in the first half of 2011 alone, out of a total of 800 since 2003.

Securing the Mobile Ecosystem

Cybercriminals are actively exploiting the popularity of smartphones and tablets because of low user awareness of the risks, and lax security enforcement within organisations. This real and growing mobile threat is already a critical issue for the business segment and which CEOs must addressed now. 

By 2016, visiongain expects that almost every employee will have a smartphone that supports e-mail, can access the internet and install a variety of applications. Organisations have to learn to support complex and varied mobile operating systems and efficiently manage the security of all these platforms if they want to leverage the productivity benefits of smart devices.

A Growing Mobile Security Market

Security concerns are driving a fairly new market in mobile protection. The mobile security market is still in its infancy however. The fragmented nature of the mobile OS landscape has allowed for a number of varied companies to offer different mobile security solutions. Most of the leading IT software security specialists have expanded their suite of PC solutions to include mobile devices. 

In parallel, a number of smaller security experts specialising in mobile devices have appeared and their niche area of expertise have been on par with many established IT software security leaders. There is a small but fast-growing market specialising in mobile security which will gain momentum with the rapid adoption of smart devices and mobile internet in the face of a growing cybercriminal menace. Visiongain expects the mobile security market to reach $3.95 billion in global revenues by 2016.

What is Unique about this Report?

The mobile security market is fast growing because protecting mobile devices is rapidly becoming a top priority for both organisations. There are increasing opportunities for monetisation for vendors and security specialists. This report provides extensive insight into the rapidly developing world of mobile malware and the latest technological tools to counter mobile threats.

The report includes exclusive interviews with leading security experts from McAfee, AVG, Panda Security, Lookout, SmrtGuard, Mobile Security Labs, BullGuard, Telefónica and Vodafone, about the state of mobile malware and security.

The report details solutions by security software specialists, MNOs, OEMs, OTT providers and MDM vendors for mobile device and data protection for the individual, SMBs and large organisations. It offers recommendations on how to best counter threats and ensure maximum mobile protection. 

Don't miss out on a chance to anticipate the growing threat menace and efficiently protect endpoints in your organisation by buying Mobile Device Security 2011-2016 now. 

Who needs to read this report?

• SMBs & Large Organisations
• Chief Information Officers / Chief Technology Officers
• Security Software Specialists
• Original Equipment Manufacturers
• Mobile Network Operators
• Over The Top Service Providers
• Mobile Device Management Vendors

Visiongain is a trading partner with the US Federal Government
CCR Ref number: KD4R6 
 
NB: All visiongain reports are password locked so please let us know what licence is most suitable for your business needs
 

Table Of Contents

Table of Contents

Executive Summary
E.1 The Mobile Revolution
E.2 A New Ecosystem Breeds New Threats
E.3 Countering Mobile Threats
E.4 A Growing Mobile Security Market
E.5 Findings of the Report

Chapter 1: The Changing Security Landscape
1.1 A Technological Evolution
1.2 The Growth of Mobile Devices
1.3 The Rise of the Mobile Worker
1.4 Paradigm Shift in Enterprise
1.5 The Advance of Mobile Malware
1.6 Adapting Security to a New Environment
1.7 The Aim and Scope of the Report
1.8 Questions Answered by the Report
1.9 Structure of the Report
1.10 Methodology

Chapter 2: Security Concerns in the Mobile Ecosystem
2.1 The Cost of Data Breach
2.2 Unauthorised Access and Collection of Data
2.2.1 Targeting Location Based Data
2.2.2 Access through Web Apps
2.3 Poor End-User Awareness
2.4 Enterprise Trends in Mobile Security
2.5 The Digital Black Market 
2.6 Cybercrime Targeting Finance Intensive Industries
2.6.1 Financial Institutions
2.6.2 Industrial and Political Espionage
2.6.3 Mobile Payments
2.6.3.1 SMS/USSD Based Transactional Payments
2.6.3.2 Direct Mobile Billing
2.6.3.3 WAP Payments
2.6.3.4 Contactless NFC
2.6.3.5 Securing Mobile Payments
2.7 Are Convergence and Interoperability Risk Factors?
2.8 Open-Source: A Double Edged Sword? 
2.9 Current Awareness: The UK Phone Hacking Scandal

Chapter 3: Mobile Malware: A threat to Mainstream Industries
3.1 Mobile Malware Evolution 
3.1.1 Trojans
3.1.2 Worms
3.1.3 Spyware
3.1.4 Spam
3.2 The Mobile Threat Expansion by Platform 
3.2.1 Android
3.2.2 Symbian
3.2.3 iOS
3.2.4 BlackBerry
3.2.5 Windows Mobile
3.3 What are the Malware Vectors for Mobile?
3.3.1 SMS and MMS
3.3.2 Wi-Fi and Bluetooth
3.3.3 Apps and Downloads
3.3.4 SD and Multimedia Cards
3.4 Digital Fraud through Social Engineering

Chapter 4: An Emerging Market for Mobile Security Services
4.1 Limiting the Spread of Mobile Malware
4.1.1 Device Security
4.1.2 Data Security
4.1.3 Network Security
4.2 Encryption and Certificates
4.2.1 Code Signing Certificates
4.2.2 Two-Factor Authentication
4.3 Anti-Virus Software 
4.4 Firewalls and Filtering
4.5 Mobile VPN
4.6 Mobile Device Management
4.7 Identity Management
4.8 Biometrics
4.9 Drivers for a Specialised Mobile Security Market
4.9.1 Enterprise Security
4.9.2 Protecting Data and User ID
4.10 Mobile Security Markets Forecast 
4.10.1 Asian, Latin American, African and Middle Eastern Markets
4.10.2 Developed Markets
4.10.3 Mobile Security Software Market by Users
4.11 Mobile Client Software Market
4.12 Mobile Device Management in Enterprise
4.13 Security as a Service
4.14 Global Network Security Market

Chapter 5: Shaping the Mobile Security Landscape
5.1 How are OEMs and OTT Providers Addressing Mobile Security Issues?
5.1.1 RIM BlackBerry OS
5.1.1.1 BlackBerry Enterprise Solution
5.1.1.2 BlackBerry Mobile Data System Services
5.1.1.3 BlackBerry Internet Service
5.1.2 Microsoft Windows Phone
5.1.2.1 Sandbox
5.1.2.2 Application Deployment
5.1.2.3 Application Development
5.1.2.4 Microsoft Exchange ActiveSync (EAS) Security-Related Policies
5.1.2.5 Data Protection Considerations
5.1.2.6 Nokia 
5.1.3 Apple iOS
5.1.4 Hewlett Packard (HP) WebOS
5.1.5 Google Android
5.1.6 Analysis of Mobile OS Based on Security Features
5.2 The Role of Network Operators 
5.2.1 Telefónica
5.2.1.1 Expert Opinion
5.2.2 Vodafone
5.2.3 Orange 
5.3 Security Software Specialists
5.3.1 Symantec
5.3.2 Trend Micro
5.3.3 McAfee
5.3.3.1 Expert Opinion
5.3.4 Kaspersky Labs
5.3.5 AVG Expert Opinion
5.3.5.1 Mobile Threats
5.3.5.2 The Evolution of Mobile Malware
5.3.5.3 How Dangerous is the Open-Source Model?
5.3.5.4 Future Developments in Mobile Malware
5.3.5.5 AVG Product Overview
5.3.6 Sophos
5.3.7 Panda Security Expert Opinion
5.3.7.1 Mobile Threats
5.3.7.2 The Evolution of Mobile Malware
5.3.7.3 How Dangerous is the Open-Source Model?
5.3.7.4 Future Developments in Mobile Malware
5.3.7.5 Panda Security Product Overview
5.3.8 BullGuard Expert Opinion
5.3.8.1 Mobile Threats
5.3.8.2 The Evolution of Mobile Malware
5.3.8.3 How Dangerous is the Open-Source Model?
5.3.8.4 Future Developments in Mobile Malware
5.3.8.5 BullGuard Product Overview
5.3.9 F-Secure
5.3.10 Other Vendors
5.4 Mobile Security Specialists
5.4.1 SmrtGuard
5.4.1.1 Expert Opinion
5.4.2 Lookout
5.4.2.1 Expert Opinion
5.4.3 Mobile Security Labs
5.4.3.1 Mobile Threats
5.4.3.2 The Evolution of Mobile Malware
5.4.3.3 How Dangerous is the Open-Source Model?
5.4.3.4 Future Developments in Mobile Malware
5.4.4 MobileIron
5.4.5 DeviceLock
5.4.6 UMU
5.4.7 MobiDM
5.4.8 DataViz
5.4.9 Mformation
5.4.10 InnoPath
5.4.11 Sybase
5.5 Analysis of Mobile Security Vendors
5.6 Analysis of Mobile Security Market
5.7 The Market for Mobile MDM Vendors

Chapter 6: Conclusion
6.1 Emerging Specialised Markets
6.2 Mitigating Mobile Security Risks
6.3 Deploying Mobile Security Solutions
6.4 Educating End-Users
6.5 Enterprise Policy and Device Management
6.6 Anticipating Future Threats
6.7 Recommendations for Businesses
6.8 Key Findings of the Report

Appendix A
About visiongain

Appendix B
Visiongain Report Evaluation Form

List of Tables, Charts and Figures in this Report

Table 1.1 Supported Formats and Capabilities of Smartphones and Tablets in 2011
Table 1.2 Key Findings of the iPass Mobile Workforce Survey April 2011
Table 2.1 Data Protection Legislation 2011
Table 2.2 AVG and Ponemon Key Survey Findings on Mobile Malware
Table 2.3 Employee Use of Smartphones in Enterprises
Table 2.4 Overview of the News of the World Phone Hacking Scandal 2005 - 2011
Table 3.1 Selection of Mobile Malware Variants 2004 - 2010 
Table 3.2 Overview of Selected Mobile Trojans in 2010 - 2011
Table 3.3 FlexiSpy Features
Table 3.4 Selection of Android Malware 2010 - 2011 
Table 3.5 Selection of Symbian Malware
Table 3.6 Social Engineering on Mobile Devices
Table 4.1 Antivirus Software- Detection Methods
Table 4.2 Mobile Device Management Features
Table 4.3 Mobile Security Market CAGR for Emerging Economies 2011 - 2016
Table 4.4 Mobile Security Market CAGR for North America and Europe 2011 - 2016
Table 5.1 BlackBerry Key Description
Table 5.2 Windows Phone Security Chambers
Table 5.3 iPhone Security Overview
Table 5.4 Android Security Guidelines for Developers
Table 5.5 Visiongain Rating of OS Security Models
Table 5.6 Telefónica Managed Security Services Overview
Table 5.7 Vodafone Secure Remote Access Service
Table 5.8 Norton Mobile Security
Table 5.9 Trend Micro Mobile Security
Table 5.10 McAfee Mobile Security Solutions
Table 5.11 Sophos Mobile Solutions
Table 5.12 Check Point Mobile Security Solutions
Table 5.13 SmrtGuard Mobile Security Overview
Table 5.14 Mformation Security Service Manager
Table 5.15 InnoPath Solutions
Table 5.16 Visiongain Analysis of Mobile Security Software Vendors 2011
Table 6.1 SWOT Analysis of the Mobile Security Market 
Table 6.2 Key Developments in the Mobile Security Market 2010 - 2011 
Table 6.3 Recommendations for Securing Mobile Devices
Chart 1.1 Global Smartphone, PC and Tablet Shipments 2005 - 2016
Chart 1.2 Global Mobile Broadband Subscriptions 2008 - 2016
Chart 1.3 Global Mobile vs. Total Workforce Forecast 2011 - 2016
Chart 1.4 Types of Mobile Devices Supported Within Organisations
Chart 1.5 Need for Integrated Management and Security Solutions: Survey Results in Enterprises
Chart 2.1 Global Apps Market Growth 2008 - 2011
Chart 2.2 Global Mobile App Market Size by Download 2011 - 2016 
Chart 2.3 Apple App Store and Android Market Apps Capable of Accessing Location and Contacts
Chart 2.4 Threatpost and Kaspersky Enterprise Mobile Security Survey
Chart 3.1 Recorded Mobile Threats 2004 - 2010
Chart 3.2 Global Market Share of Mobile App Stores 2011 - 2016
Chart 3.3 Total Malware by Platform 2011
Chart 3.4 Mobile OS Market Share 2011 and 2016
Chart 3.5 Symbian Malware Growth 2009 - 2010 
Chart 3.6 Global App Store Year-on-Year Growth 2010 - 2011
Chart 4.1 Global Mobile Security Market 2011 - 2016 
Chart 4.2 Global Mobile Security Market Share 2011 - 2016 
Chart 4.3 Mobile Security Market for Emerging Economies 2011 - 2016
Chart 4.4 Mobile Security Market for North America and Europe 2011 - 2016
Chart 4.5 Global Mobile Security Client Software Market 2011 - 2016
Chart 4.6 Global Enterprise MDM Revenues (Billions) 2010 and 2015
Chart 4.7 Enterprise MDM Market 2007 - 2015
Chart 4.8 Cloud-based Security Services Market Forecast 2011 - 2016
Chart 4.9 Global Network Security Market Forecast 2011 - 2016 
Chart 5.1 Global Anti-virus Vendor Market Share June 2011
Chart 5.2 Global MDM Vendor Market Share June 2011
Figure 2.1 Typical Offers Available on the Cybercrime Black Market
Figure 2.2 Catalysts for Mobile Data and ID Theft
Figure 2.3 Example of Smishing
Figure 2.4 Two Factor Authentication Security System for Mobile Payments
Figure 2.5 WAP Payments using PayPal Mobile Checkout
Figure 2.4 Google Wallet
Figure 3.1 Number of Mobile Malware Variants 2004 - 2010
Figure 3.2 ZeuS Infection Timeline for Mobile Devices
Figure 3.3 InfoJack Worm
Figure 3.4 Phone Promo Spam
Figure 3.5 Android Malware Growth Chart
Figure 3.6 SMS and MMS Exploits
Figure 3.7 Man in the Middle Attack
Figure 4.1 Mobile Security Categories
Figure 4.2 Code Signing Mobile Apps
Figure 4.3 Mobile Firewall
Figure 4.4 Mobile ID Management
Figure 5.1 BlackBerry Device Connection to Application Server
Figure 5.2 HP webOS Security Overview
Figure 5.3 Telefónica Managed Mobility Service
Figure 5.4 Kaspersky Mobile Security Features by Platform
Figure 5.5 Kaspersky Mobile Security
Figure 5.6 BullGuard Mobile Security Overview
Figure 5.7 F-Secure Mobile Security
Figure 5.8 BitDefender Mobile Security
Figure 5.9 Lookout Mobile Security Solutions
Figure 5.10 DeviceLock Endpoint DLP
Figure 5.11 UMU Mobile Security
Figure 5.12 Sybase Afaria Architecture 
 
Companies Listed

Apple
AVG
BitDefender
BullGuard
Check Point
CitiGroup
DataViz
DeviceLock 
Enterprise Strategy Group
F-Secure
First Data
Google
Hewlett Packard
HTC
InnoPath
iPass
Kaspersky Labs
Lookout
MasterCard
McAfee
Mformation
Microsoft
MobileIron
Mobile Security Labs
News of the World
Nokia
O2
Orange
Panda Security
PayPal
Ponemon Institute
Retis Consulting
RIM
SANS Institute
SmrtGuard
Sophos
Sprint
Sybase
Symantec
T-Mobile
Telefónica 
Threatpost
Trend Micro
UMU
Unix
VeliQ
Verizon
Vodafone 

View This Report »

Find all the market research you need - instantly, in one place.

+1.2 Million Research Documents & Statistics +200,000 Trusted Public Sources 350 Industries With Global Coverage

24/7 Customer Support

Talk to Amrita

+1 718 303 2019

Purchase Reports From Reputable Market Research Publishers

The Wireless network traffic worldwide: forecasts and analysis 2014-2019

The Wireless network traffic worldwide: forecasts and analysis 2014-2019

  • $ 7 999
  • Industry report
  • October 2014
  • by Analysys Mason

"Mobile data traffic growth is developing in divergent ways, reflecting the differing strategic investment decisions taken by operators in different regions. This report analyses these trends, highlighting ...

Global LTE Technology Assessment, Market Analysis, and Forecasts 2014 - 2019

Global LTE Technology Assessment, Market Analysis, and Forecasts 2014 - 2019

  • $ 6 995
  • Industry report
  • October 2014
  • by Mind Commerce Publishing

Fourth generation (4G) cellular technology represents a huge leap compared to previous generations. The Long Term Evolution (LTE) standard for 4G provides significant capacity gains as well as true end-to-end ...

Antennas for Systems and Devices: Technologies and Global Markets

Antennas for Systems and Devices: Technologies and Global Markets

  • $ 6 650
  • Industry report
  • September 2014
  • by BCC Research

This BCC Research report quantifies the market for smart antennas, presenting the forecasts for antennas for 2014 through 2019 on a volume and value basis. The multiplicity of influencing factors and the ...


ReportLinker is an award-winning market research solution that finds, filters and organizes the latest industry data so you get all the market research you need - quickly, in one place.