表紙
市場調査レポート

企業におけるモバイルセキュリティソリューションの世界市場

The Global Market for Mobile Security Solutions in the Enterprise

発行 VDC Research Group, Inc. 商品コード 282867
出版日 ページ情報 英文 51 Pages, 23 Exhibits
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=101.32円で換算しております。
Back to Top
企業におけるモバイルセキュリティソリューションの世界市場 The Global Market for Mobile Security Solutions in the Enterprise
出版日: 2014年08月25日 ページ情報: 英文 51 Pages, 23 Exhibits
概要

ビジネスで利用されるモバイルデバイスの数・種類が飛躍的に増加しているため、堅牢なセキュリティの必要性がこれまでになく顕著になっています。企業にとって、正しいモバイル戦略は利益と生産性を増加させ、顧客関係とサービスの改善が可能です。しかし、現代のモバイルプラットフォームは、ますます度化・多様化するセキュリティリスクに対して脆弱です。正しいセキュリティアプローチの創造は、企業によるこれらの脅威への対処と同時にモバイルが可能にするサービスの大きなメリットの活用にとっても役立つでしょう。

当レポートでは、世界のモバイルセキュリティ市場について調査し、モバイルセキュリティ情勢の発展動向、モバイルセキュリティを求める企業、主要な市場参入企業、セキュリティベンダーの企業におけるBYODの課題への取り組み、およびベンダークラス別の競合情勢などを分析しています。

エグゼクティブサマリー

モバイルセキュリティの発展

  • モバイルセキュリティの促進因子
  • モバイルセキュリティ予算が拡大
  • MDMに満足しているエンドユーザー - しかし十分ではない
  • モバイルの脅威
  • 異種導入環境が複雑性を加える
  • セキュリティを考慮に入れたアプリケーション設計

競合情勢

  • レイヤードモバイルセキュリティ:デバイス、アプリケーションおよびネットワークの保証

競合情勢:ベンダークラス別

  • 端末OEM:OSの強化
    • Apple
    • BlackBerry
    • Google
    • HTC
    • Samsung
    • Microsoft
    • Motorola Solutions Inc. (MSI)
  • EMM/コンテナライゼーション
    • VMware/AirWatch
    • Citrix
    • Good Technology
    • IBM
    • LANDesk
    • MobileIron
    • Oracle
    • SAP
    • SOTI
  • ネットワークアクセスコントロール(NAC)
    • Aruba Networks
    • ForeScout
    • Juniper Networks (Pulse Secure LLC)
    • NetMotion Wireless
    • Trustwave Holdings
  • デュアルパーソナル/仮想化アプローチ
    • AT&T
    • Cellrox
    • MobileSpaces
  • モバイルセキュリティ専門企業
    • Bluebox
    • Mocana
    • Arxan
    • MobileO2
    • Websense
  • 認証
    • Okta
    • Ping Identity
    • Symplified
    • SecureAuth
    • Centrify

チャネル分析

本調査について

このページに掲載されている内容は最新版と異なる場合があります。詳細はお問い合わせください。

目次

The transformation of mobile solutions has been one of the more dramatic in the history of technology. With the number and variety of mobile devices used to conduct business growing at an exponential rate, the need for robust security could not be more pronounced. For the enterprise, the correct mobile strategy can boost profits and productivity and improve customer relations and service. However, modern mobile platforms are different and are vulnerable to an increased level and a greater variety of security risks than the established world of IT. These threats are not specific to mobile security, but mobility itself brings additional risks. Creating the right security approach will help enterprises to address these threats while taking advantage of the huge benefits mobile enablement offers.

There are three main targets for threats - information, identity, and availability. Mobile devices are personal and used for both private and business productivity even more in the context of a bring-your-own-device (BYOD) company scenario. Devices typically store valuable and often sensitive information; keeping that information secure is vital. The consequences of a malicious third party gaining access to personal financial information, for example, could be disastrous and irreparable. With mobile devices gathering personal, often photographic, information about where the owner lives, works, and spends his or her leisure time, the consequences of a mobile device getting into the wrong hands could be truly catastrophic. And with devices being used for work and leisure, the possibility of sensitive business information getting into the wrong hands could have much, much wider - and potentially massive - implications.

What questions are addressed

  • How is the mobile security landscape evolving
  • Who will enterprises turn to for their mobile security
  • How will large and established vendors participate
  • Are EMM vendors positioned to cater to the mobile security needs in the enterprise
  • How critical is application security
  • How are security vendors tackling the challenges of BYOD in the enterprise

Executive Summary

The line between the personal computers and mobile devices has already blurred. While the mobile hardware race is in full swing, so too is the battle among mobile ISVs, who aim to be the primary provider for an increasingly broad range of mobile solutions for today's enterprise. Mobile device deployments continue to expand in enterprise environments and are being integrated into workers' daily activities in companies of all sizes. This trend is making mobile IT infrastructure investments for mobile management and security a priority for CIOs, CISOs, and IT leaders. Protecting data on a server is one thing, but protecting data in motion is another. The increasing use of mobile devices in the enterprise has us carrying around (and potentially exposing) more information than ever. A typical mobile device is likely to contain both personal and work-related data including emails, email attachments, voice mails, text messages, and private corporate data. Every mobile-enabled worker is holding a gateway into the enterprise network and access to sensitive and/or confidential data. Safeguarding intellectual property and business information from theft and misuse is a critical management issue, making security a core business function, regardless of whether a user is in the C-suite or on the lowest rung on the corporate ladder.

The cost of data breaches can be enormous, not only in dollars but also in lost time, productivity, and an overall feeling of organizational well-being. These trends make crafting and implementing comprehensive mobile policies critical for sustainable and effective mobile enablement.

[Data available in full report.]

Key Findings

  • Ownership models such as BYOD are continuing to impact mobile security investments as manually managing mobile platforms in heterogeneous deployment environments is not viable or cost-effective. XX% of respondents expect their investments in mobile security to expand in the next 12 months.
  • Application security practitioners will be best served by embracing the fact that mobile apps require new protections beyond the use of traditional secure coding techniques.
  • EMM vendors are challenged to keep pace with the changing security requirements in larger deployment environments as mobility becomes strategic to the business.
  • Mobile enablement introduces threats to enterprise IT that cannot be offset, mitigated, or prevented by a single technology solution. This has made a layered approach to security crucial to ensure the protection of the corporate data.
  • Just X% of survey respondents had an application security program in place that was specific to mobile applications. Mobile security investments are being driven by the need for enterprises to conform to stricter data protection and compliance practices.
  • Handset OEMs are not only innovating on design but are implementing hardware-enhanced security techniques. These vendors are also partnering effectively to successfully bring to fruition the concept of an enterprise-grade smartphone.

Table of Contents

Executive Summary

Mobile Security's Evolution

  • Mobile Security Drivers
    • Exhibit 1: Budget Determinants Driving Mobile Security Investments
    • Exhibit 2: Top 3 Barriers to Organization's Recognition/Implementation of Mobility Objectives
  • Mobile Security Budgets are Expanding
    • Exhibit 3: Anticipated Change in Mobile Security Budget (next 12 months)
    • Exhibit 4: Satisfaction with Level of Security Provided in Current MDM Solution
  • End Users are Satisfied with MDM - But It's Not Enough
    • Exhibit 5: Confidence in Mobile Security Policies Currently in Place
    • Exhibit 6: Which of the following mobile management controls/capabilities does your organization have in place
  • Mobile Threats
    • Exhibit 7: Greatest Threat to Mobile IT Security
  • Heterogeneous Deployment Environments Add Complexity
    • Exhibit 8: Impact of Supporting Multiple Mobile Platforms
  • App Design with Security in Mind
    • Exhibit 9: Tenure of App Security Program
    • Exhibit 10: Security Practices Implemented During Mobile Application Development

Competitive Landscape

  • Layered Mobile Security: Securing Devices, the Applications, and the Network
    • Exhibit 11: A Layered Approach to Mobile Security Required
    • Exhibit 12: The OWASP Top 10 Mobile Security Risks for 2014

Competitive Landscape by Vendor Class

  • Handset OEMs - Hardening the OS
    • Apple
    • BlackBerry
    • Google
    • HTC
    • Samsung
    • Microsoft
    • Motorola Solutions Inc. (MSI)
  • EMM/Containerization
    • VMware/AirWatch
    • Citrix
    • Good Technology
    • IBM
    • LANDesk
    • MobileIron
    • Oracle
    • SAP
    • SOTI
  • Network Access Control (NAC)
    • Aruba Networks
    • ForeScout
    • Juniper Networks (Pulse Secure LLC)
    • NetMotion Wireless
    • Trustwave Holdings
  • Dual Persona/Virtualization Approach
    • AT&T
    • Cellrox
    • MobileSpaces
  • Mobile Security Specialists
    • Bluebox
    • Mocana
    • Arxan
    • MobileO2
    • Websense
  • Authentication
    • Okta
    • Ping Identity
    • Symplified
    • SecureAuth
    • Centrify

Channel Insights

Back to Top