表紙
市場調査レポート

日本のモバイルセキュリティ市場

Mobile Security Market in Japan 2015-2019

発行 TechNavio (Infiniti Research Ltd.) 商品コード 321473
出版日 ページ情報 英文 73 Pages
即納可能
価格
本日の銀行送金レート: 1USD=101.75円で換算しております。
Back to Top
日本のモバイルセキュリティ市場 Mobile Security Market in Japan 2015-2019
出版日: 2014年12月17日 ページ情報: 英文 73 Pages
概要

日本のモバイルセキュリティ市場は、2014年から2019年の間、38.5%の複合年間成長率(CAGR)で拡大する見込みです。

当レポートでは、日本におけるモバイルセキュリティ市場の現状と今後の予測、市場の発展因子や課題、主要企業の分析などを提供しています。

第1章 エグゼクティブサマリー

第2章 略語リスト

第3章 調査範囲

  • 市場概要
  • 主な製品

第4章 市場調査手法

  • 市場調査プロセス
  • 調査手法

第5章 イントロダクション

第6章 市場説明

  • モバイルセキュリティの構造
  • モバイルデバイスセキュリティ・ソフトウェア導入の種類
    • オンプレミス
    • クラウドベース
  • モバイルセキュリティ・ソリューションの利点

第7章 市場情勢

  • 市場概要
  • 日本におけるモバイルセキュリティ・ソリューションの製品ライフサイクル
  • 市場規模と予測
  • ファイブフォース分析

第8章 導入タイプ別の市場区分

  • 日本における導入タイプ別のモバイルセキュリティ市場
  • オンプレミス・モバイルセキュリティ
  • クラウドベース・モバイルセキュリティ

第9章 アプリケーション別の市場区分

  • 日本におけるアプリケーション別のモバイルセキュリティ市場
  • IDおよびアクセス管理
  • データおよび脅威管理
  • セキュリティおよび脆弱性管理

第10章 市場の魅力

第11章 購入基準

第12章 市場成長因子

第13章 成長因子とその影響

第14章 市場の課題

第15章 成長因子と課題の影響

第16章 市場動向

第17章 動向とその影響

第18章 ベンダー情勢

  • 競合シナリオ
  • 競合分析
  • その他の有力ベンダー

第19章 主要ベンダーの分析

  • CA Technologies
  • Fortinet
  • Symantec
  • Trend Micro

第20章 前提条件

第21章 関連レポート

目次
Product Code: IRTNTR4874

About Mobile Security

Mobile security protects mobile devices from malware threats and safeguards mobile devices and their data from theft, unauthorized access, and accidental loss. Mobile security may use personal identification numbers, passwords, or advanced forms of authentication such as eye scanners, fingerprint readers, and other forms of biometric readers. Mobile security is closely associated with mobile device management, which is a term that specifically applies to shielding mobile devices in the enterprise or business surroundings from loss or theft, as well as guarding the data on these devices.

TechNavio's analysts forecast the Mobile Security market in Japan to grow at a CAGR of 38.5 percent over the period 2014-2019.

Covered in this Report

This report covers the present scenario and the growth prospects of the Mobile Security market in Japan for the period 2015-2019. To calculate the market size, the report considers revenue generated from the sales of mobile security solutions.

The report provides a detailed analysis of the following mobile security deployment types:

  • On-premises
  • Cloud-based

The report also provides a detailed analysis of the following mobile security applications:

  • Identity and access management
  • Data and theft management
  • Security and vulnerability management

It also presents the vendor landscape and a corresponding detailed analysis of the top four vendors in the market. In addition, the report discusses the major drivers that influence the growth of the Mobile Security market in Japan. It also outlines the challenges faced by vendors and the market at large, as well as the key trends that are emerging in the market.

Key Regions

  • Japan

Key Vendors

  • CA Technologies
  • Fortinet
  • Symantec
  • Trend Micro

Other Prominent Vendors

  • Check Point Software Technologies
  • EMC
  • Hitachi
  • Juniper Networks
  • McAfee
  • NEC
  • Websense

Market Driver

  • Increase in Adoption of BYOD
  • For a full, detailed list, view our report

Market Challenge

  • Lack of Quantifiable ROI
  • For a full, detailed list, view our report

Market Trend

  • Growing Popularity of Mobile Commerce
  • For a full, detailed list, view our report

Key Questions Answered in this Report

  • What will the market size be in 2018 and what will the growth rate be?
  • What are the key market trends?
  • What is driving this market?
  • What are the challenges to market growth?
  • Who are the key vendors in this market space?
  • What are the market opportunities and threats faced by the key vendors?
  • What are the strengths and weaknesses of the key vendors?

Table of Contents

01. Executive Summary

02. List of Abbreviations

03. Scope of the Report

  • 03.1. Market Overview
  • 03.2. Product Offerings

04. Market Research Methodology

  • 04.1. Market Research Process
  • 04.2. Research Methodology

05. Introduction

06. Market Description

  • 06.1. Mobile Security Architecture
  • 06.2. Types of Mobile Device Security Software Deployment
    • 06.2.1. On-premises
    • 06.2.2. Cloud-based
  • 06.3. Advantages of Mobile Security Solutions

07. Market Landscape

  • 07.1. Market Overview
  • 07.2. Product Lifecycle of Mobile Security Solution in Japan
  • 07.3. Market Size and Forecast
  • 07.4. Five Forces Analysis

08. Market Segmentation by Deployment

  • 08.1. Mobile Security Market in Japan by Deployment Type 2014
  • 08.2. Mobile Security Market in Japan by Deployment Type 2014-2019
  • 08.3. On-premises Mobile Security Market in Japan
    • 08.3.1. Market Size and Forecast
  • 08.4. Cloud-based Mobile Security Market in Japan
    • 08.4.1. Market Size and Forecast

09. Market Segmentation by Application

  • 09.1. Mobile Security Market in Japan by Application 2014
  • 09.2. Mobile Security Market in Japan by Application 2014-2019
  • 09.3. Mobile Security Market in Japan by Identity and Access Management
    • 09.3.1. Market Size and Forecast
  • 09.4. Mobile Security Market in Japan by Data and Theft Management
    • 09.4.1. Market Size and Forecast
  • 09.5. Mobile Security Market in Japan by Security and Vulnerability Management
    • 09.5.1. Market Size and Forecast

10. Market Attractiveness

  • 10.1. Market Attractiveness by Deployment Type
  • 10.2. Market Attractiveness by Application

11. Buying Criteria

12. Market Growth Drivers

13. Drivers and their Impact

14. Market Challenges

15. Impact of Drivers and Challenges

16. Market Trends

17. Trends and their Impact

18. Vendor Landscape

  • 18.1. Competitive Scenario
  • 18.2. Competitive Analysis 2014
  • 18.3. Other Prominent Vendors

19. Key Vendor Analysis

  • 19.1. CA Technologies
    • 19.1.1. Key Facts
    • 19.1.2. Business Overview
    • 19.1.3. Business Segmentation by Revenue 2013
    • 19.1.4. Business Segmentation by Revenue 2012 and 2013
    • 19.1.5. Geographical Segmentation by Revenue 2013
    • 19.1.6. Business Strategy
    • 19.1.7. Recent Developments
    • 19.1.8. SWOT Analysis
  • 19.2. Fortinet
    • 19.2.1. Key Facts
    • 19.2.2. Key Information
    • 19.2.3. Business Overview
    • 19.2.4. Business Segmentation by Revenue
    • 19.2.5. Business Segmentation by Revenue
    • 19.2.6. Geographical Segmentation by Revenue
    • 19.2.7. Business Strategy
    • 19.2.8. Recent Developments
    • 19.2.9. SWOT Analysis
  • 19.3. Symantec
    • 19.3.1. Key Facts
    • 19.3.2. Business Overview
    • 19.3.3. Business Segmentation by Revenue 2013
    • 19.3.4. Business Segmentation by Revenue 2013 and 2014
    • 19.3.5. Geographical Segmentation by Revenue 2013
    • 19.3.6. Business Strategy
    • 19.3.7. Recent Developments
    • 19.3.8. SWOT Analysis
  • 19.4. Trend Micro
    • 19.4.1. Key Facts
    • 19.4.2. Business Overview
    • 19.4.3. Geographical Segmentation by Revenue 2012 and 2013
    • 19.4.4. Geographical Segmentation by Revenue 2013
    • 19.4.5. Business Strategy
    • 19.4.6. Recent Developments
    • 19.4.7. SWOT Analysis

20. Assumptions

21. Other Reports in this Series

List of Exhibits

  • Exhibit 1: Market Research Methodology
  • Exhibit 2: Mobile Security Architecture
  • Exhibit 3: Types of Mobile Device Security Software Deployment
  • Exhibit 4: Product Lifecycle of Mobile Security Solution in Japan
  • Exhibit 5: Mobile Security Market in Japan 2014-2019 (US$ million)
  • Exhibit 6: Mobile Security Market in Japan by Deployment Type 2014
  • Exhibit 7: On-premises Mobile Security Market in Japan 2014-2019 (US$ million)
  • Exhibit 8: Cloud-based Mobile Security Market in Japan 2014-2019 (US$ million)
  • Exhibit 9: Mobile Security Market in Japan by Application 2014
  • Exhibit 10: Mobile Security Market in Japan by Application 2014-2019
  • Exhibit 11: Mobile Security Market in Japan by Identity and Access Management 2014-2019 (US$ million)
  • Exhibit 12: Mobile Security Market in Japan by Data and Theft Management 2014-2019 (US$ million)
  • Exhibit 13: Mobile Security Market in Japan by Security and Vulnerability Management 2014-2019 (US$ million)
  • Exhibit 14: Market Attractiveness by Deployment Type
  • Exhibit 15: Market Attractiveness by Application
  • Exhibit 16: CA Technologies: Business Segmentation by Revenue 2013
  • Exhibit 17: CA Technologies: Business Segmentation by Revenue 2012 and 2013 (US$ million)
  • Exhibit 18: CA Technologies: Geographical Segmentation by Revenue 2013
  • Exhibit 19: Fortinet: Business Segmentation by Revenue 2013
  • Exhibit 20: Fortinet: Business Segmentation by Revenue 2012 and 2013 (US$ million)
  • Exhibit 21: Fortinet: Geographical Segmentation by Revenue 2013
  • Exhibit 22: Symantec: Business Segmentation by Revenue 2013
  • Exhibit 23: Symantec: Business Segmentation by Revenue 2013 and 2014 (US$ million)
  • Exhibit 24: Symantec: Geographical Segmentation by Revenue 2013
  • Exhibit 25: Trend Micro: Geographical Segmentation by Revenue 2012 and 2013 (US$ million)
  • Exhibit 26: Trend Micro: Geographical Segmentation by Revenue 2013
Back to Top