enterprise mobility security - convenient and secure access - market shares and growth trends (2014...

8
CONVENIENT AND SECURE ACCESS Market Shares And Growth Trends to 2019 ENTERPRISE MOBILITY SECURITY MARKET

Upload: mordor-intelligence

Post on 24-Nov-2015

16 views

Category:

Documents


0 download

DESCRIPTION

Bring Your Own Device (BYOD) has revolutionized the way corporates function but it has opened up the risk of the presence of varied devices without proper security cover accessing secure data. This has called for security policies which could assess the risks involved and avoid them. The existing policies are static, resulting in unexpected failures when new threats arise. This situation has resulted in firms looking for devices which can imbibe cognitive mobility which enables appropriate security policy in the right place at the right time. Integrating such cognitive systems could also pose a major challenge because of the different types of platforms involved. Over 50% of the corporations in the world allow employees to access company data with some sort of access restriction and this number is only going to grow with the gradual adoption of cloud computing. In general, the trends are continuing to grow in all but the most security-restricted organizations. Small and medium-sized businesses have been at the forefront of the BYOD trend, with almost 62 percent of U.S. SMBs having an official BYOD policy in place. Spurred by this enormous growth BYOD market, the enterprise mobility security market is expected to grow at a CAGR of 32% from USD 735 million in 2014 to USD 3.12 billion by 2019. This report also provides an independent analysis of the products of current key players and their impact going forward.

TRANSCRIPT

  • CONVENIENT AND SECURE ACCESS Market Shares And Growth Trends to 2019

    ENTERPRISE MOBILITY SECURITY MARKET

  • 1 | Mordor Intelligence

  • Mordor Intelligence | 2

    4. Introduction

    4.1. Research methodology 4.2. Research outline 4.3. Key Findings 4.4. Executive Summary

    5. Technology Snapshot and Trends

    5.1. Market Overview 5.2. Current technology trends 5.3. Roadmap 5.4. Innovations 5.5. Implementation 5.6. Growth Prospects 5.7. Risk vs. Privacy

    6. Drivers and Restraints

    6.1. Driving forces 6.1.1. Need for data security 6.1.2. Misuse of corporate bandwidth 6.1.3. Remote device management 6.1.4. Adoption of BYOD across industries

    6.2. Impact of business accelerators 6.3. Restraints

    6.3.1. Infrastructure cost of solutions 6.3.2. Incompatibility with present day device

    management solutions 6.3.3. IT support issues 6.3.4. Lack of skillset

    6.4. Impact of business challenges 7. Approaches to BYOD

    7.1. Limited Access BYOD 7.1.1. Security Issues

    7.2. Hybrid BYOD 7.2.1. Security Issues

    7.3. CYOD 7.3.1. Security Issues

    8. Industry Policies related to BYOD security

    8.1. HIPAA 8.2. CIPA 8.3. FIPS 8.4. FISMA

    9. Current Access Control Methods

    9.1. Access Policy Management

    1.1. Application Firewall 1.2. Authentication 1.3. Segregated Networks 1.4. Mobile Device Management

    1.4.1. Approaches 1.4.2. Security 1.4.3. Device Platforms

    1.5. Single Sigh-on 1.6. VPN Access 1.7. Proxy Server

    2. Market segmentation by Industry usage

    2.1. Banking/Insurance 2.1.1. Market Share and Forecast

    2.2. Healthcare 2.2.1. Market Share and Forecast

    2.3. Professional Services 2.3.1. Market Share and Forecast

    2.4. Manufacturing 2.4.1. Market Share and Forecast

    2.5. Travel and Transport/ Logistics 2.5.1. Market Share and Forecast

    2.6. Legal Services 2.6.1. Market Share and Forecast

    2.7. Information Technology 2.7.1. Market Share and Forecast

    2.8. Federal Government 2.8.1. Market Share and Forecast

    2.9. Telecommunications 2.9.1. Market Share and Forecast

    2.10. Retails 2.10.1. Market Share and Forecast

    2.11. Local Government 2.11.1. Market Share and Forecast

    2.12. Life Sciences 2.12.1. Market Share and Forecast

    2.13. Entertainment and Media 2.13.1. Market Share and Forecast

    3. Market Segmentation by Device Security

    3.1. Smartphones 3.1.1. Market Share and Forecast

    3.2. Laptops 3.2.1. Market Share and Forecast

    3.3. Tablets 3.3.1. Market Share and Forecast

    TABLE OF CONTENTS

  • 3 | Mordor Intelligence

    12. Investment Analysis

    12.1. Investor Networks 12.2. Funding patterns and details 12.3. Expectations for the future

    13. Key Patents 14. Appendix

    14.1. Abbreviations 14.2. Sources 14.3. Bibliography 14.4. Disclaimer

    10. Stakeholder Analysis

    10.1. Good Technology 10.1.1. Market Share 10.1.2. Solution Analysis

    10.2. MobileIron, Inc. 10.2.1. Market Share 10.2.2. Solution Analysis

    10.3. Airwatch 10.3.1. Market Share 10.3.2. Solution Analysis

    10.4. Blackberry 10.4.1. Market Share 10.4.2. Solution Analysis

    10.5. Citrix Systems, Inc. 10.5.1. Market Share 10.5.2. Solution Analysis

    10.6. Microsoft Corporation 10.6.1. Market Share 10.6.2. Solution Analysis

    10.7. Cisco Systems, Inc. 10.7.1. Market Share 10.7.2. Solution Analysis

    10.8. Fiberlink Communications Corp. 10.8.1. Market Share 10.8.2. Solution Analysis

    10.9. McAfee, Inc. 10.9.1. Market Share 10.9.2. Solution Analysis

    10.10. Symantec Corporation 10.10.1. Market Share 10.10.2. Solution Analysis

    10.11. SAP 10.11.1. Market Share 10.11.2. Solution Analysis

    10.12. Others 10.12.1. Market Share 10.12.2. Solution Analysis

    11. Market Scenario

    11.1. Competitive Landscape 11.2. Mergers and Acquisitions 11.3. Key Industry Figures

  • Mordor Intelligence | 4

    Bring Your Own Device (BYOD) has revolutionized the way corporates function but it has opened up

    the risk of the presence of varied devices without proper security cover accessing secure data. This

    has called for security policies, which could assess the risks involved and avoid them. The existing

    policies are static, resulting in unexpected failures when new threats arise. This situation has

    resulted in firms looking for devices, which can imbibe cognitive mobility, enabling appropriate

    security policy in the right place at the right time. Integrating such cognitive systems could also

    pose a major challenge because of the different types of platforms involved.

    Over 50% of the corporations in the world allow employees to access company data with some sort

    of access restriction and this number is only going to grow with the gradual adoption of cloud

    computing. In general, the trends are continuing to grow in all but the most security-restricted

    organizations. Small and medium-sized businesses have been at the forefront of the BYOD trend,

    with almost 62 percent of U.S. SMBs having an official BYOD policy in place. Spurred by this

    enormous growth BYOD market, the enterprise mobility security market is expected to grow at a

    CAGR of 32% from USD 735 million in 2014 to USD 3.12 billion by 2019. This report also provides an

    independent analysis of the products of current key players and their impact going forward.

    REPORT DESCRIPTION

  • 5 | Mordor Intelligence

    Year 2011 2012 2013 2014 2015 2016 2017 2018 2019 Smartphones xx xx xx 536.8 xx xx xx xx xx Tablets xx xx xx xx xx xx xx 473.2 xx Laptops xx xx xx xx xx 135.8 xx xx xx

    2011 2012 2013 2014 2015 2016 2017 2018 2019

    $ Millions

    Year

    SAMPLES FIGURES

    Enterprise Mobility Security Solutions Market Forecast by Device type (Value in $ millions)

    Enterprise Mobility Security Market Forecasts to 2019

  • Mordor Intelligence | 6

    Mordor Intelligence is a global market research and consulting firm. Our singular focus is to provide

    research insights for business success.

    Our research team has expertise in diverse fields like Agriculture, Healthcare, ICT, Chemicals,

    Manufacturing, Logistics, Electronics and Automotive. However diverse the expertise maybe, everyone

    in our team shares one common trait - we love data and we love providing solutions to clients using

    that data even more. Seeing your business flourish based on our solutions and strategy is what we

    love the most.

    Disclaimer: Mordor Intelligence Reports and their contents, including all the analysis and research

    containing valuable market information, are provided to a select group of customers in response to

    orders. Our customers acknowledge when ordering that Mordor Intelligence strategic analysis

    services are for our customers internal use and not for general publication or disclosure to third

    parties.

    Quantitative market information is based primarily on interviews and therefore, is subject to

    fluctuation. Mordor Intelligence takes no responsibility for any incorrect information supplied to us

    by manufacturers or users.

    No part of this strategic analysis service may be given, lent, resold or disclosed to non-customers

    without written permission. Reproduction and/or transmission in any form and by any means

    including photocopying, mechanical, electronic, recording or otherwise, without the permission of

    the publisher is prohibited.

    For information regarding permissions and sales, please contact: [email protected]

    ABOUT US

  • 7 | Mordor Intelligence

    Mordor Intelligence LLP No. 30, Padma Nilaya, Chola Nagar Bangalore, Karnataka, India 560032 +1 781 881 1110 | [email protected]

    Copyright 2014 Mordor Intelligence LLP All Rights Reserved. This document contains highly confidential information and is the sole property of Mordor Intelligence LLP. No part of it may be circulated, copied, quoted, or otherwise reproduced without the approval of Mordor Intelligence LLP.