Skip to main content

Mobile Device Security Revenue to Reach $1B by 2017

With hackers becoming more effective in targeting and exploiting emerging technologies -- such as smartphones, media tablets and associated cloud services -- enterprises are investing in mobile endpoint security software to protect and manage mobile devices.

Hackers are able to gain access or control of mobile devices via malicious software (malware), while mobile applications (apps) on the device can perform unwanted, high-risk actions. This threat jeopardizes the safety of sensitive data stored on the mobile device, as it can be lost or stolen.

With the ubiquity of mobile devices and trends such as bring your own device (BYOD) to work, industry and government regulations requiring businesses to control network access for all device types and applications adds to market growth.

According to the latest market study by Frost & Sullivan, the mobile endpoint protection market earned revenue of $433.5 million in 2012, and estimates this to reach $1.0 billion in 2017. They note that endpoint security specialists -- McAfee and Symantec -- lead the market. However, several innovative competitors, including entrepreneurial start-ups, are making progress in this market.

"Smartphones may fail to meet organizational security and compliance policy requirements as they are extremely susceptible to mobile malware breaches and unwanted or high-risk mobile applications," said Chris Rodriguez, senior industry analyst at Frost & Sullivan.

However, the mobile endpoint solutions market faces competition from other mobile security products. For instance, mobile device management (MDM) capabilities are considered an essential first step in addressing mobile security needs and a suitable replacement for mobile endpoint security solutions.

Unfortunately, MDM does not address mobile malware and unwanted or high-risk mobile applications. Businesses worldwide severely underestimate the risk presented by truly smart smartphones and media tablets, and therefore delay the adoption of comprehensive solutions.

Mobile endpoint protection vendors could acquire MDM companies to enable a robust enterprise endpoint security and device management portfolio. Plus, new technologies such as cloud-based malware analysis, application wrapping, and containerization will further widen the global customer base.

While end users from the business segment are opting for established security vendors that offer enterprise central management and reporting capabilities, emerging start-ups are gaining traction in the strategically important consumer market with inventive, free or low-priced solutions.

Popular posts from this blog

Digital Transformation Spending Reaches $1.8 Trillion

Ongoing investment in business technology will remain on track, despite concerns about the global economic outlook which continues to evolve in 2022. Enterprise CIOs and CTOs are focused on operational profitability and digital business growth goals that are enabled by strategic IT initiatives. Global spending on the Digital Transformation (DX) of business practices, products, and organizations is forecast to reach $1.8 trillion in 2022 -- that's an increase of 17.6 percent over 2021, according to the latest market study by International Data Corporation (IDC). Many anticipated DX investments will sustain this pace of growth throughout the 2021-2025 forecast period, with a five-year compound annual growth rate (CAGR) of 16.6 percent. Digital Transformation Global Market Development "IDC expects to see aggressive DX technology investment growth in 2022 following a minor slowdown during the pandemic period," said Craig Simpson, senior research manager at IDC . "As orga

Flexible Working: Why Company Culture Matters

The main reasons for the Great Resignation are obsolete leadership, fearful middle managers, and a toxic culture that hinders employee engagement. Perhaps that's why some organizations are still struggling with the consideration and development of a flexible working model.  They're incapable of evolving to a more enlightened approach to work where employees are treated with respect. They're stuck in a bygone era of the 20th-century industrial revolution where 'shareholder value' tops all other values, and where spreadsheets and financial data analysis drives all key decision making. We should not be surprised that 76 percent of human resource (HR) leaders now feel that hybrid work challenges an employee's connection to organizational culture, according to a recent survey by Gartner. A 2022 poll of HR leaders reveals the most challenging aspect of setting their hybrid strategy is adjusting the current organizational culture to support a hybrid workforce. In fact,

Energy Sector IoT Cybersecurity Gains Momentum

The electric distribution industry continues to invest in digital transformation projects. Advanced Metering Infrastructure (AMI) technology is becoming a driver for connected electricity meters, which will reach an installed base of 1.3 billion by 2027. AMI growth is prompting utilities and energy suppliers to revisit their IT infrastructure security and device management operations, according to the latest worldwide market study by ABI Research. Energy Infrastructure Security Market Development Digitization of traditional electricity grids and the modernization of the aging energy infrastructure is among the top concerns for utility operators and governments worldwide. Security for last-mile energy consumption applications was frequently overlooked. "However, the introduction of AMI, smart metering, and grid digitization is steadily increasing spending for secure management services, assisting implementers to transition to IT (information technologies) and OT (operational techno