Demystifying Mobile Security
 

Like this? Share it with your network

Share

Demystifying Mobile Security

on

  • 2,210 views

Frost & Sullivan Analyst Briefing on Demystifying Mobile Security

Frost & Sullivan Analyst Briefing on Demystifying Mobile Security

Statistics

Views

Total Views
2,210
Views on SlideShare
2,207
Embed Views
3

Actions

Likes
2
Downloads
45
Comments
0

2 Embeds 3

http://twitter.com 2
http://us-w1.rockmelt.com 1

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Educating Awareness

Demystifying Mobile Security Presentation Transcript

  • 1. Demystifying Mobile Security
    Aliza Kasim
    Research Analyst
    ICT Practice, Frost & Sullivan
  • 2. Table of Content
    The Rise of Mobility
    Transformation of the Enterprise
    The Need for Mobile Security
    Mobile Security Future Outlook
  • 3. The Rise of Mobility
    Transformation of the Enterprise
    The Need for Mobile Security
    Mobile Security Future Outlook
  • 4. Computing and Mobility Coming Together
    Smart Phones
    &
    Tablets
    Mobile
    Phone
    (2G)
    Laptop/
    Notebook
    Mainframe
    Supercomputer
    Personal
    Computer
    1970s
    1960s
    1980s
    1990s
    2000
    2010
  • 5. The Rise of Mobile Devices
    Source: Frost & Sullivan.
  • 6. Mobile Device Capabilities
    Basic
    Services
    Complex Services
    Cloud
    Enterprise Applications
    Web & Social Media
    Consumer Applications
  • 7. The Rise of Mobility
    Transformation of the Enterprise
    Transformation of the Enterprise
    The Need for Mobile Security
    Mobile Security Future Outlook
  • 8. The Role of the Individual
    Employee, mobile worker, remote user
    Home user, website blogger
    Facebook user, forum contributor
  • 9. The Era of Mobile Enterprise
    Moving from:
    To:
    Fixed, slow and limited connectivity
    Always connected...everywhere
    Devices are provided and given by the cooperation
    Devices chosen by the users
    Devices are fixed and not movable
    Devices are mobile
    Enteprise has full control
    Highly empowered users
    Security within the corporate network
    Securing a dynamic network
  • 10. Mobile ENTERPRISE
    Mobility Factor
    Business
    User
    Technology
    • Competitiveness
    • 11. Productivity
    • 12. Customer reach
    • 13. Speed of delivery
    • 14. Globalization
    • 15. Consumerization
    • 16. Travel more
    • 17. More savvy
    • 18. More option on mobile devices
    • 19. More convenient
    • 20. High speed connection
    • 21. Cheaper bandwidth
    • 22. Applications
  • Challenges for the Enterprise
  • 23. The Rise of Mobility
    The Need for Mobile Security
    Transformation of the Enterprise
    The Need for Mobile Security
    Mobile Security Future Outlook
  • 24. Major Security Risks
    Network and System Abuse
    Unsecured Network
    Lost or Stolen Mobile Devices
    MobileSecurity Risks
    Backdoor to Enteprise Network
    Malicious software
    Device Breaches
    Data Loss and Integrity
    Web-based Attacks
  • 25. Adoption Trends in Mobile Security
    Adoption Trends
    Market Restraints
    Lack of Clear Market Definition
    Device-centric vs User-centric
    Uncertain Attitudes towards Mobility Factor
    Extension of Existing Security Strategy
    Traditional Outlook towards Information Security
    Exploratory Mindset towards Mobile Security
  • 26. What is Mobile Security?
    Malware Protection
    Device Management
    Access Management
    Application Monitoring
    &
    Control
    Data Protection
  • 27. What Should be Secured?
    Mobile Security
  • 28. What Enterprise Should Do…
    Educating & Awareness
    Encryption
    Authenticate Users & Devices
    Secure Connection
    Monitoring & Management
    Policies & Framework
    Securing Enterprise
  • 29. The Rise of Mobility
    Mobile Security Future Outlook
    Transformation of the Enterprise
    The Need for Mobile Security
    Mobile Security Future Outlook
  • 30. Mobile Security Market: Revenue Forecasts (APAC), 2010-2013
    CAGR: 42.8%
    Source: Frost & Sullivan
    Revenue Forecast
  • 31. Market Opportunities in Mobile Security
    High level of awareness and government support
    South Korea
    High
    Still lagging behind but adoption rate is getting higher
    Japan
    Advanced in terms of technology with 3G and 4G connection
    China
    Singapore
    India
    Australia
    Taiwan
    Malaysia
    CAGR
    Hong Kong
    Price for mobile broadband is still markedly expensive
    Indonesia
    Vietnam
    New Zealand
    Vast adoption of mobile devices
    Thailand
    Philippines
    Low
    Low Opportunity
    High Opportunity
    Future Revenue Opportunity
    Source: Frost & Sullivan
  • 32. Mobile Security Players
    • Device-centric
    • 33. Focus on the device
    • 34. Management of the device
    Mobile Device Management Player
    VS
    Information Security Player
    • Network-centric
    • 35. Treating mobile devices as part of the network
    • 36. Mobile security is treated as an extension to end-point security
  • Future of Mobile Security
  • 37. Follow Frost & Sullivan on Facebook, LinkedIn, SlideShare, and Twitter
    http://www.facebook.com/pages/Frost-Sullivan/249995031751?ref=ts
    http://www.linkedin.com/companies/4506
    http://www.slideshare.net/FrostandSullivan
    http://twitter.com/frost_sullivan
  • 38. For Additional Information
    Donna Jeremiah
    Corporate Communications
    Asia Pacific
    +603 6204 5832
    djeremiah@frost.com
    Carrie Low
    Corporate Communications
    Asia Pacific
    +603 6204 5910
    carrie.low@frost.com
    AlizaKasim
    Research Analyst
    ICT
    +603 6205 5800
    apacfrost@frost.com