株式会社グローバルインフォメーション
TEL: 044-952-0102
表紙
市場調査レポート

世界のBYODセキュリティ市場:2016年〜2020年

Global BYOD Security Market 2016-2020

発行 TechNavio (Infiniti Research Ltd.) 商品コード 292526
出版日 ページ情報 英文 54 Pages
即納可能
価格
本日の銀行送金レート: 1USD=115.27円で換算しております。
Back to Top
世界のBYODセキュリティ市場:2016年〜2020年 Global BYOD Security Market 2016-2020
出版日: 2016年06月06日 ページ情報: 英文 54 Pages
概要

世界におけるBYODセキュリティ市場は、2016年から2020年の間、24.97%のCAGR(複合年間成長率)で拡大することが予測されています。

当レポートでは、世界のBYODセキュリティ市場について調査分析し、市場規模と成長率、市場動向、市場促進要因・課題、市場機会などを検証するほか、主要ベンダープロファイルなどを提供しています

第1章 エグゼクティブサマリー

第2章 調査範囲

  • 市場概要

第3章 市場調査手法

  • 調査手法
  • 経済指標

第4章 イントロダクション

第5章 市場説明

  • BYODのもたらす脅威の種類
  • 世界のインターネットユーザー数:デバイス別
  • BYOD標的型サイバー攻撃
  • BYODセキュリティの強み

第6章 新しいBYODセキュリティ技術

  • モバイルアプリケーションラッパー/コンテナリゼーション
  • シングルサインオン(SSO)

第7章 市場情勢

  • 市場概要
  • 市場の仮説
  • 世界のBYOD市場
  • 世界のBYODセキュリティ市場
  • 世界のモバイルワークフォース市場

第8章 ソリューション別の市場区分

  • 世界のソリューション別BYODセキュリティ市場
  • MCM市場
  • MDM市場
  • MAM市場

第9章 エンドユーザー別の市場区分

  • 世界のエンドユーザー別BYODセキュリティ市場

第10章 地理区分

  • 世界の地域別BYODセキュリティ市場
  • 世界の地域別BYODセキュリティ市場(収益別)

第11章 購入基準

第12章 市場成長因子

第13章 成長因子とその影響

第14章 市場の課題

第15章 成長因子と課題の影響

第16章 市場動向

第17章 ファイブフォースモデル

  • ファイブフォースモデル

第18章 ベンダー分析

  • 競合シナリオ
  • ベンダーマトリックス
  • ベンダーの競争力評価
  • 主要ベンダーの分析
  • その他の有力ベンダー

第19章 付録

  • 略語リスト

第20章 Technavioについて

図表

このページに掲載されている内容は最新版と異なる場合があります。詳細はお問い合わせください。

目次
Product Code: IRTNTR9128

About the Bring Your Own Device (BYOD) Security Market

The BYOD policy allows employees to use their personal devices to gain access to corporate networks. It helps organizations to enhance operational efficiency and business productivity. Organizations also save on the cost of equipment by allowing employees to use their own mobile devices.

BYOD allows employees to access corporate data and resources without any location or time constraints. It provides users access to e-mails and other shared drives outside the organization. The introduction of mobile devices in workplaces has changed the way users access and consume enterprise resources. The increase in urban population, rise in disposable income, growing penetration of low-cost tablets, and increase in awareness of electronic gadgets are factors that drive the demand for mobile devices and applications, which supports the BYOD security market.

Technavio's analysts forecast the global BYOD security market to grow at a CAGR of 24.97% during the period 2016-2020.

Covered in this report

The report covers the present scenario and the growth prospects of the global BYOD security market for 2016-2020. To calculate the market size, the report considers the revenue generated from the sales of BYOD security solutions used in smartphones, tablets, and laptops. To calculate the market size, the report takes into consideration the revenue generated from the sales of the following BYOD security solutions:

  • Mobile content management (MCM)
  • Mobile device management (MDM)
  • Mobile application management (MAM)

The market is divided into the following segments based on geography:

  • APAC
  • Europe
  • MEA
  • North America
  • South America

Technavio's report, Global Bring Your Own Device (BYOD) Security Market 2016-2020, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects over the coming years. The report also includes a discussion of the key vendors operating in this market.

Key vendors

  • Citrix
  • Good Technology
  • IBM
  • MobileIron
  • VMWare

Other Prominent Vendors

  • Apperian
  • Bluebox
  • Cisco Systems
  • Kaspersky
  • McAfee
  • MOCANA
  • SAP
  • Sophos
  • SOTI
  • Symantec
  • Trend Micro
  • Veracode

Market driver

  • Increased use of mobile devices
  • For a full, detailed list, view our report

Market challenge

  • Lack of awareness about BYOD security among end-users
  • For a full, detailed list, view our report

Market trend

  • Increase in number of DDoS attacks
  • For a full, detailed list, view our report

Key questions answered in this report

  • What will the market size be in 2020 and what will the growth rate be?
  • What are the key market trends?
  • What is driving this market?
  • What are the challenges to market growth?
  • Who are the key vendors in this market space?
  • What are the market opportunities and threats faced by the key vendors?
  • What are the strengths and weaknesses of the key vendors?

You can request one free hour of our analyst's time when you purchase this market report. Details are provided within the report.

Table of Contents

PART 01: Executive summary

  • Highlights

PART 02: Scope of the report

  • Market overview

PART 03: Market research methodology

  • Research methodology
  • Economic indicators

PART 04: Introduction

  • Key market highlights

PART 05: Market insights

  • Types of BYOD threats
  • Global internet users by device type
  • Cyber attacks: Targeting BYOD
  • Advantages of BYOD security

PART 06: Emerging BYOD security technologies

  • Mobile application wrappers or containerization
  • Single sign-on (SSO)

PART 07: Market landscape

  • Market overview
  • Market assumptions
  • Global BYOD market
  • Global BYOD security market
  • Global mobile workforce

PART 08: Market segmentation by solutions

  • Segmentation of global BYOD security market by solutions
  • Global MCM market
  • Global MDM market
  • Global MAM market

PART 09: Market segmentation by end-user

  • Segmentation of global BYOD security market by end-user

PART 10: Geographical segmentation

  • Segmentation of global BYOD security market by geography
  • Segmentation of global BYOD security market by geography (revenue)

PART 11: Buying criteria

  • Buying criteria for BYOD security

PART 12: Market drivers

PART 13: Impact of drivers

PART 14: Market challenges

PART 15: Impact of drivers and challenges

PART 16: Market trends

PART 17: Five forces model

  • Five forces model

PART 18: Key vendor analysis

  • Competitive scenario
  • Vendor matrix
  • Vendor competitive rating
  • Description of major vendors
  • Other prominent vendors

PART 19: Appendix

  • List of abbreviations

PART 20: Explore Technavio

List of Exhibits

  • Exhibit 01: Global internet users by device type 2009-2015 (millions)
  • Exhibit 02: Overview of global BYOD security market
  • Exhibit 03: Market assumptions
  • Exhibit 04: Global BYOD market 2015-2020 ($ billions)
  • Exhibit 05: Global BYOD security market 2015-2020 ($ billions)
  • Exhibit 06: Global mobile workforce 2015-2020 ($ billions)
  • Exhibit 07: Global BYOD security market by solutions 2015-2020 (% share)
  • Exhibit 08: Global MCM market 2015-2020 ($ billions)
  • Exhibit 09: Global MDM market 2015-2020 ($ billions)
  • Exhibit 10: Global MAM market 2015-2020 ($ millions)
  • Exhibit 11: Global BYOD security market by end-user 2015 (% share)
  • Exhibit 12: Global BYOD security market by geography 2015-2020 (% share)
  • Exhibit 13: Global BYOD security market by geography 2015-2020 ($ billions)
  • Exhibit 14: Buying criteria for BYOD security
  • Exhibit 15: Impact of drivers
  • Exhibit 16: Open-source BYOD security solutions
  • Exhibit 17: Impact of drivers and challenges
  • Exhibit 18: Major M&A in global BYOD security market
  • Exhibit 19: Five forces model
  • Exhibit 20: Product offerings
  • Exhibit 21: Product features
  • Exhibit 22: Vendor competitive rating
  • Exhibit 23: Other prominent vendors
Back to Top