株式会社グローバルインフォメーション
TEL: 044-952-0102
市場調査レポート

エンタープライズモビリティセキュリティの世界市場:便利で安全なアクセス:市場シェアと成長動向

Enterprise Mobility Security - Convenient and Secure Access - Market Shares and Growth Trends to 2021

発行 Mordor Intelligence LLP 商品コード 319134
出版日 ページ情報 英文 166 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=115.18円で換算しております。
Back to Top
エンタープライズモビリティセキュリティの世界市場:便利で安全なアクセス:市場シェアと成長動向 Enterprise Mobility Security - Convenient and Secure Access - Market Shares and Growth Trends to 2021
出版日: 2016年10月01日 ページ情報: 英文 166 Pages
概要

Bring Your Own Device(個人所有の機器の持ち込み)(BYOD)は企業に革命をもたらしましたが、一方で重要なデータへのアクセスに適切なセキュリティ対策がされていない様々なデバイスの存在がリスクとなっております。2014年に7億3,500万米ドル規模のエンタープライズモビリティセキュリティ市場は、2019年には31億2,000万米ドル規模に成長する見込みとなっております。

当レポートでは、世界のエンタープライズモビリティセキュリティ市場について調査分析を行い、市場概要、市場促進因子と抑制因子、セグメンテーション別考察、主要企業などについてまとめています。

第1章 イントロダクション

  • 調査方法
  • 調査概要
  • 主な調査結果
  • エグゼクティブサマリー

第2章 技術に関する寸評と動向

  • 市場概要
  • 現在の技術動向
  • ロードマップ
  • 革新
  • 実施
  • 成長見通し
  • リスクVSプライバシー

第3章 促進因子と抑制因子

  • 促進因子
  • ビジネス・アクセラレーターの影響
  • 抑制因子
  • 事業課題の影響

第4章 BYODへのアプローチ

  • アクセス制限のあるBYOD
  • ハイブリッドBYOD
  • CYOD

第5章 BYODのセキュリティに関する産業方針

  • HIPAA
  • CIPA
  • FIPS
  • FISMA

第6章 現在のアクセスコントロール法

  • アクセスポリシー管理
  • アプリケーションファイアウォール
  • 認証
  • 分離ネットワーク
  • モバイルデバイス管理
  • シングルサインオン
  • VPNアクセス
  • プロキシサーバー

第7章 市場セグメンテーション:産業別

  • 銀行/保険
  • 医療
  • 専門サービス
  • 製造
  • 旅行/交通/ロジスティクス
  • 法律サービス
  • 情報技術
  • 連邦政府
  • 通信
  • 小売
  • 地方自治体
  • 生命科学
  • エンターテインメント/メディア

第8章 市場セグメンテーション:デバイスセキュリティ

  • スマートフォン
  • ノートPC
  • タブレット

第9章 ステークホルダー分析

  • Good Technology
  • MobileIron, Inc.
  • AirWatch
  • Blackberry
  • Citrix Systems, Inc.
  • Microsoft Corporation
  • Cisco Systems, Inc.
  • Fiberlink Communications Corp.
  • McAfee, Inc.
  • Symantec Corporation
  • SAP
  • その他

第10章 市場シナリオ

  • 競合状況
  • M&A
  • 主要産業統計

第11章 投資分析

  • 投資家ネットワーク
  • 資金調達パターンと詳細
  • 今後の見通し

第12章 主な特許

このページに掲載されている内容は最新版と異なる場合があります。詳細はお問い合わせください。

目次

Computing is becoming prominent, with unlimited access to information from any device, irrespective of the location. To meet this particular demand, an enterprise needs to manage and secure large, complex, distributed, and changing environments both within the traditional and public facilities, with limited visibility into controls.

Over 50% of the corporations in the world allow employees to access company data with some sort of access restriction and this number is only going to grow with the gradual adoption of cloud computing. Small and medium-sized businesses have been at the forefront of the BYOD trend, with almost 62% of the US SMBs having an official Bring Your Own Device (BYOD) policy in place. Spurred by this enormous growth in the BYOD market, the enterprise mobility security market is expected to grow at a CAGR of 32% from USD 735 million in 2014 to USD 3.89 billion by 2020.

BYOD has revolutionized the way corporates function, but it has also opened up the risk of the presence of devices without proper security covering data. This has called for security policies which could assess the risks involved and avoid them. The existing policies are static, resulting in unexpected failures when new threats arise. This situation has resulted in firms looking for devices which can imbibe cognitive mobility that enables appropriate security policy in the right place at the right time. Integrating such cognitive systems could also pose a major challenge because of the different types of platforms involved.

DRIVERS

The driving forces for the mobility security market are:

  • The need for data security
  • Misuse of corporate bandwidth
  • Remote device management
  • Growing adoption of BYOD across industries

RESTRAINTS

Some of the biggest challenges of the mobile security market are:

  • Infrastructure cost of solutions
  • Incompatibility with present-day device management solutions
  • IT support issues
  • Lack of proper skill-set to operate the same

WHAT THE REPORT OFFERS

  • Enterprise mobility security - convenient and secure access market overview and market analysis along with its applications in the industry and information on drivers and restraints.
  • Identification of factors responsible for changing the market scenario, rising prospective opportunities and identification of key companies that can influence the market on a global and regional scale.
  • Extensively researched competitive landscape with profiles of major companies along with their market share.
  • A comprehensive list of key market players along with the analysis of their current strategic interests and key financial information.

Table of Contents

1. Introduction

  • 1.1. Research Methodology
  • 1.2. Research Outline
  • 1.3. Key Findings
  • 1.4. Executive Summary

2. Technology Snapshot and Trends

  • 2.1. Market Overview
  • 2.2. Current Technology Trends
  • 2.3. Roadmap
  • 2.4. Innovations
  • 2.5. Implementation
  • 2.6. Growth Prospects
  • 2.7. Risk vs Privacy

3. Drivers and Restraints

  • 3.1. Driving Forces
    • 3.1.1. Need for Data Security
    • 3.1.2. Misuse of Corporate Bandwidth
    • 3.1.3. Remote Device Management
    • 3.1.4. Adoption of BYOD across Industries
  • 3.2. Impact of Business Accelerators
  • 3.3. Restraints
    • 3.3.1. Infrastructure Cost of Solutions
    • 3.3.2. Incompatibility with Present Day Device Management Solutions
    • 3.3.3. IT Support Issues
    • 3.3.4. Lack of Skillset
  • 3.4. Impact of Business Challenges

4. Approaches to BYOD

  • 4.1. Limited Access BYOD
    • 4.1.1. Security Issues
  • 4.2. Hybrid BYOD
    • 4.2.1. Security Issues
  • 4.3. CYOD
    • 4.3.1. Security Issues

5. Industry Policies Related to BYOD Security

  • 5.1. HIPAA
  • 5.2. CIPA
  • 5.3. FIPS
  • 5.4. FISMA

6. Current Access Control Methods

  • 6.1. Access Policy Management
  • 6.2. Application Firewall
  • 6.3. Authentication
  • 6.4. Segregated Networks
  • 6.5. Mobile Device Management
    • 6.5.1. Approaches
    • 6.5.2. Security
    • 6.5.3. Device Platforms
  • 6.6. Single Sign-on
  • 6.7. VPN Access
  • 6.8. Proxy Server

7. Market segmentation by Industry Usage

  • 7.1. Banking/Insurance
    • 7.1.1. Market Share and Forecast
  • 7.2. Healthcare
    • 7.2.1. Market Share and Forecast
  • 7.3. Professional Services
    • 7.3.1. Market Share and Forecast
  • 7.4. Manufacturing
    • 7.4.1. Market Share and Forecast
  • 7.5. Travel and Transport/Logistics
    • 7.5.1. Market Share and Forecast
  • 7.6. Legal Services
    • 7.6.1. Market Share and Forecast
  • 7.7. Information Technology
    • 7.7.1. Market Share and Forecast
  • 7.8. Federal Government
    • 7.8.1. Market Share and Forecast
  • 7.9. Telecommunications
    • 7.9.1. Market Share and Forecast
  • 7.10. Retail
    • 7.10.1. Market Share and Forecast
  • 7.11. Local Government
    • 7.11.1. Market Share and Forecasts
  • 7.12. Life Sciences
    • 7.12.1. Market Share and Forecast
  • 7.13. Entertainment and Media
    • 7.13.1. Market Share and Forecast

8. Market Segmentation by Device Security

  • 8.1. Smartphones
    • 8.1.1. Market Share and Forecast
  • 8.2. Laptops
    • 8.2.1. Market Share and Forecast
  • 8.3. Tablets
    • 8.3.1. Market Share and Forecast

9. Stakeholder Analysis

  • 9.1. Good Technology
    • 9.1.1. Market Share
    • 9.1.2. Solution Analysis
  • 9.2. MobileIron
    • 9.2.1. Market Share
    • 9.2.2. Solution Analysis
  • 9.3. AirWatch
    • 9.3.1. Market Share
    • 9.3.2. Solution Analysis
  • 9.4. Blackberry
    • 9.4.1. Market Share
    • 9.4.2. Solution Analysis
  • 9.5. Citrix Systems, Inc.
    • 9.5.1. Market Share
    • 9.5.2. Solution Analysis
  • 9.6. Microsoft Corporation
    • 9.6.1. Market Share
    • 9.6.2. Solution Analysis
  • 9.7. Cisco Systems, Inc.
    • 9.7.1. Market Share
    • 9.7.2. Solution Analysis
  • 9.8. Fiberlink Communications Corp.
    • 9.8.1. Market Share
    • 9.8.2. Solution Analysis
  • 9.9. McAfee, Inc.
    • 9.9.1. Market Share
    • 9.9.2. Solution Analysis
  • 9.10. Symantec Corporation
    • 9.10.1. Market Share
    • 9.10.2. Solution Analysis
  • 9.11. SAP
    • 9.11.1. Market Share
    • 9.11.2. Solution Analysis
  • 9.12. Others
    • 9.12.1. Market Share
    • 9.12.2. Solution Analysis

10. Market Scenario

  • 10.1. Competitive Landscape
  • 10.2. Mergers and Acquisitions
  • 10.3. Key Industry Figures

11. Investment Analysis

  • 11.1. Investor Networks
  • 11.2. Funding Patterns and Details
  • 11.3. Expectations for the Future

12. Key Patents

Back to Top