Demystifying Mobile Security


Published on

Frost & Sullivan Analyst Briefing on Demystifying Mobile Security

  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Educating Awareness
  • Demystifying Mobile Security

    1. 1. Demystifying Mobile Security<br />Aliza Kasim<br />Research Analyst<br />ICT Practice, Frost & Sullivan <br />
    2. 2. Table of Content <br />The Rise of Mobility <br />Transformation of the Enterprise<br />The Need for Mobile Security<br />Mobile Security Future Outlook<br />
    3. 3. The Rise of Mobility <br />Transformation of the Enterprise <br />The Need for Mobile Security<br />Mobile Security Future Outlook<br />
    4. 4. Computing and Mobility Coming Together<br />Smart Phones <br />& <br />Tablets<br />Mobile <br />Phone<br /> (2G)<br />Laptop/<br />Notebook<br />Mainframe<br />Supercomputer<br />Personal <br />Computer<br />1970s<br />1960s<br />1980s<br />1990s<br />2000<br />2010<br />
    5. 5. The Rise of Mobile Devices <br />Source: Frost & Sullivan.<br />
    6. 6. Mobile Device Capabilities <br />Basic <br />Services<br />Complex Services<br />Cloud<br />Enterprise Applications<br />Web & Social Media<br />Consumer Applications<br />
    7. 7. The Rise of Mobility <br />Transformation of the Enterprise<br />Transformation of the Enterprise<br />The Need for Mobile Security<br />Mobile Security Future Outlook<br />
    8. 8. The Role of the Individual<br />Employee, mobile worker, remote user<br />Home user, website blogger <br />Facebook user, forum contributor<br />
    9. 9. The Era of Mobile Enterprise<br />Moving from: <br />To:<br />Fixed, slow and limited connectivity <br />Always connected...everywhere<br />Devices are provided and given by the cooperation<br />Devices chosen by the users<br />Devices are fixed and not movable<br />Devices are mobile <br />Enteprise has full control <br />Highly empowered users <br />Security within the corporate network<br />Securing a dynamic network <br />
    10. 10. Mobile ENTERPRISE<br />Mobility Factor<br />Business<br />User<br />Technology<br /><ul><li>Competitiveness
    11. 11. Productivity
    12. 12. Customer reach
    13. 13. Speed of delivery
    14. 14. Globalization
    15. 15. Consumerization
    16. 16. Travel more
    17. 17. More savvy
    18. 18. More option on mobile devices
    19. 19. More convenient
    20. 20. High speed connection
    21. 21. Cheaper bandwidth
    22. 22. Applications </li></li></ul><li>Challenges for the Enterprise <br />
    23. 23. The Rise of Mobility <br />The Need for Mobile Security<br />Transformation of the Enterprise <br />The Need for Mobile Security<br />Mobile Security Future Outlook<br />
    24. 24. Major Security Risks <br />Network and System Abuse<br />Unsecured Network<br />Lost or Stolen Mobile Devices<br />MobileSecurity Risks<br />Backdoor to Enteprise Network<br />Malicious software<br />Device Breaches<br />Data Loss and Integrity<br />Web-based Attacks<br />
    25. 25. Adoption Trends in Mobile Security<br />Adoption Trends<br />Market Restraints<br />Lack of Clear Market Definition<br />Device-centric vs User-centric<br />Uncertain Attitudes towards Mobility Factor<br />Extension of Existing Security Strategy<br />Traditional Outlook towards Information Security<br />Exploratory Mindset towards Mobile Security<br />
    26. 26. What is Mobile Security?<br />Malware Protection<br />Device Management<br />Access Management<br />Application Monitoring <br />& <br />Control<br />Data Protection<br />
    27. 27. What Should be Secured? <br />Mobile Security<br />
    28. 28. What Enterprise Should Do…<br />Educating & Awareness<br />Encryption<br />Authenticate Users & Devices<br />Secure Connection<br />Monitoring & Management <br />Policies & Framework<br />Securing Enterprise<br />
    29. 29. The Rise of Mobility <br />Mobile Security Future Outlook<br />Transformation of the Enterprise <br />The Need for Mobile Security<br />Mobile Security Future Outlook<br />
    30. 30. Mobile Security Market: Revenue Forecasts (APAC), 2010-2013<br />CAGR: 42.8%<br />Source: Frost & Sullivan<br />Revenue Forecast<br />
    31. 31. Market Opportunities in Mobile Security<br />High level of awareness and government support<br />South Korea<br />High<br />Still lagging behind but adoption rate is getting higher<br />Japan<br />Advanced in terms of technology with 3G and 4G connection<br />China<br />Singapore<br />India<br />Australia<br />Taiwan<br />Malaysia<br />CAGR<br />Hong Kong<br />Price for mobile broadband is still markedly expensive<br />Indonesia<br />Vietnam<br />New Zealand<br />Vast adoption of mobile devices<br />Thailand<br />Philippines<br />Low<br />Low Opportunity<br />High Opportunity<br />Future Revenue Opportunity<br />Source: Frost & Sullivan<br />
    32. 32. Mobile Security Players <br /><ul><li>Device-centric
    33. 33. Focus on the device
    34. 34. Management of the device</li></ul>Mobile Device Management Player<br />VS<br />Information Security Player<br /><ul><li>Network-centric
    35. 35. Treating mobile devices as part of the network
    36. 36. Mobile security is treated as an extension to end-point security</li></li></ul><li>Future of Mobile Security<br />
    37. 37. Follow Frost & Sullivan on Facebook, LinkedIn, SlideShare, and Twitter<br /><br /><br /><br /><br />
    38. 38. For Additional Information<br />Donna Jeremiah<br />Corporate Communications<br />Asia Pacific<br />+603 6204 5832<br /><br />Carrie Low<br />Corporate Communications<br />Asia Pacific<br />+603 6204 5910<br /><br />AlizaKasim<br />Research Analyst<br />ICT<br />+603 6205 5800<br /><br />