Securing all things “i”  The Emerging Market for Apple Security Products Martha Vazquez Research Analyst, Network Security...
Focus Points <ul><li>Overview of Endpoint Security Market </li></ul><ul><li>The Emerging Market For Apple Security Product...
Overview of the Endpoint Security Market  <ul><li>In 2010, endpoint security remains the foundation of protection for cons...
The PC VS Mac Endpoint Market   Firewall, Full Disk  Encryption, HIPS, Content Filtering  Anti- Malware, Anti-Spam, Anti-S...
The Emerging Market For Apple Security Products <ul><li>Apple products have a history of being relatively safe, free from ...
The Mac OS Threat Landscape 1982   1990   2004   2010 Mac OS Endpoint Security Products Market: History of Mac Viruses (Wo...
The Apple Threat Landscape  <ul><ul><li>Main concerns:  </li></ul></ul><ul><ul><li>Data Control </li></ul></ul><ul><ul><li...
What is driving the need for Apple Product Security? <ul><li>Increase in complex attacks and threats due to advanced  cybe...
Challenges for the Growth of the Market <ul><li>Apple marketing still implies that their products are safer than Windows, ...
Market Trends <ul><li>Entrance of  “I” devices and Macs into the enterprise market  </li></ul><ul><li>Management of all ty...
Vendors in the Market  Mac OS Endpoint Security Products  Market:  List of Companies (World), 2009 Source: Frost & Sulliva...
Vendors in the Market iOS Endpoint Security Products Market:  List of Companies (World), 2009 Source: Frost & Sullivan iOS...
Various Security Applications for the iOS Trend Micro Mobile Active Defense Spam Arrest, LLC Smart Surfing for the iPhone ...
Conclusions Key Conclusins for the Apple endpoint security market Vendors will enhance their Mac products to include more ...
Recommendations  <ul><li>From the Consumer Perspective  </li></ul><ul><li>Adding additional anti- virus software is highly...
Next Steps <ul><li>Request a proposal for a  Growth Partnership Service  to support you and your team to accelerate the gr...
Your Feedback is Important to Us <ul><li>Growth Forecasts? </li></ul><ul><li>Competitive Structure? </li></ul><ul><li>Emer...
For Additional Information Jake Wengroff Corporate Communications (210) 247-3806 [email_address] Craig Hays Sales Manager ...
Upcoming SlideShare
Loading in...5
×

Securing all things “i” The Emerging Market for Apple Security Products

1,706

Published on

Frost & Sullivan analysis of the emerging market for Apple security products.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,706
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
16
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Securing all things “i” The Emerging Market for Apple Security Products

  1. 1. Securing all things “i” The Emerging Market for Apple Security Products Martha Vazquez Research Analyst, Network Security Frost & Sullivan 2010
  2. 2. Focus Points <ul><li>Overview of Endpoint Security Market </li></ul><ul><li>The Emerging Market For Apple Security Products </li></ul><ul><li>Market Trends </li></ul><ul><li>Available Solutions </li></ul><ul><li>Conclusions </li></ul>
  3. 3. Overview of the Endpoint Security Market <ul><li>In 2010, endpoint security remains the foundation of protection for consumers and enterprises. </li></ul><ul><li>The increasing popularity of social networks such as Facebook and Twitter have contributed to the increasing number of threats entering corporate and home networks. </li></ul><ul><li>Due to the increasingly mobile workforce, endpoints have become an attractive target for attackers. </li></ul><ul><li>The introduction of lifestyle devices like the iPhone and iPad from Apple has increased the interest of users to purchase Apple products </li></ul>
  4. 4. The PC VS Mac Endpoint Market Firewall, Full Disk Encryption, HIPS, Content Filtering Anti- Malware, Anti-Spam, Anti-Spyware Typical PC Endpoint Security Product Device/ Application, Data Parental and Port Control Management & Reporting Capabilities Source: Frost & Sullivan Typical Mac OS Endpoint Security Product Anti- Virus, Anti- Phishing <ul><li>Limited functionality is found in most Mac products due to its internal security and lack of malware attacks to the Mac </li></ul><ul><li>Some vendors will offer dual protection for Mac users who run Windows hence offering protection for both </li></ul><ul><li>operating systems </li></ul><ul><li>Although Safari offers safe Internet browsing, some products will include advanced URL filtering as </li></ul><ul><li>an extra layer of protection. </li></ul>Firewall/ Application Control/ Data Protection/ Parental Controls Management & Reporting Capabilities
  5. 5. The Emerging Market For Apple Security Products <ul><li>Apple products have a history of being relatively safe, free from viruses or any malicious programs. </li></ul><ul><li>Since 2007, the Mac overall global market share has been growing from about 3% in 2007 to over 5% in 2009 </li></ul><ul><li>Since 2006, malware focused on Apple operating systems has been found in the wild. </li></ul>
  6. 6. The Mac OS Threat Landscape 1982 1990 2004 2010 Mac OS Endpoint Security Products Market: History of Mac Viruses (World), 1980-2010 Elk Cloner Virus was created to Infect the boot sector of Apple II Computers. HyperCard virus was created and could run on Mac OS9 First Word macro virus, Concept is shipped by Microsoft infecting Macs and PCs. nVIR virus infected Macs. The virus mainly spread through floppy disks MDEF Virus (Garfield) virus was created, infecting Mac application and system files. Laroux, an Excel file is launched, affecting Excel 98 Sevendust (666) infected Mac Applications Leap-A, the first Virus for Mac OS X and could spread via iChat Renepo script worm disabled Mac Security Inquitana Amphimix Financial Malware Found by Sophos for the Mac OSX/ Hovdy- A Trojan Horse Troj/RKOSX-A Phishing attacks and other trojans continue to be found MacSweeper is created and known as scareware BadBunny Worm Source: Frost & Sullivan
  7. 7. The Apple Threat Landscape <ul><ul><li>Main concerns: </li></ul></ul><ul><ul><li>Data Control </li></ul></ul><ul><ul><li>Privacy Control </li></ul></ul><ul><ul><li>Entrance into the Enterprise – Management of Apple Devices </li></ul></ul>
  8. 8. What is driving the need for Apple Product Security? <ul><li>Increase in complex attacks and threats due to advanced cybercrime techniques create the need for users to protect against malware and attacks </li></ul><ul><li>The increase in adoption of the iPhone and iPad </li></ul><ul><li>Compliance Requirements for Businesses </li></ul>
  9. 9. Challenges for the Growth of the Market <ul><li>Apple marketing still implies that their products are safer than Windows, thus influencing buyers </li></ul><ul><li>Apple users lack education around the various threats to their products </li></ul><ul><li>Apple products are not included in the traditional security operations for most enterprises, leaving them vulnerable </li></ul>
  10. 10. Market Trends <ul><li>Entrance of “I” devices and Macs into the enterprise market </li></ul><ul><li>Management of all type of nodes including Mobile Devices </li></ul><ul><li>Freeware </li></ul>
  11. 11. Vendors in the Market Mac OS Endpoint Security Products Market: List of Companies (World), 2009 Source: Frost & Sullivan Mac OS Anti- Virus Security Vendors Sophos.com Sophos Drweb.com Dr. Web AV Clamxav.com Clam Xav PCtools.com PC Tools AVG.com AVG Avast.com avast! Trendmicro.com Trend Micro Eset.com ESET Intego.com Intego Kaspersky.com Kaspersky Lab Bitdefender.com BitDefender Mcafee.com McAfee Symantec.com Symantec
  12. 12. Vendors in the Market iOS Endpoint Security Products Market: List of Companies (World), 2009 Source: Frost & Sullivan iOS Application Security Vendors Trendmicro.com Trend Micro Sophos.com Sophos Cisco.com Cisco Internetsafety.com InternetSafety.com Clownware.com Clownware Splashdata.com SplashData Selznick.com Selznick Scientific Software, LLC www.apple.com Apple mobileactivedefense.com Mobile Application Development Partners, LLC Spamarrest.com Spam Arrest, LLC Agilewebsolutions.com Agile Web Solutions Mcafee.com McAfee Symantec.com Symantec
  13. 13. Various Security Applications for the iOS Trend Micro Mobile Active Defense Spam Arrest, LLC Smart Surfing for the iPhone Spam Arrest MobileMe Agile Web Solutions SplashID Selznick Scientific Software, LLC Apple 1Password SplashData Password Wallet Mobile Application Development Partners, LLC Cisco SIO ToGo Cisco Sophos Security Threat Monitor McAfee McAfee Family Protection for the iPhone, iPod touch iOS Endpoint Security Products Market: List of Companies and Application Name, (World), 2009 Source: Frost & Sullivan
  14. 14. Conclusions Key Conclusins for the Apple endpoint security market Vendors will enhance their Mac products to include more advanced security features such as parental controls, web filtering and data encryption. As Mac malware and other threats increase, the Mac OS will eventually offer patches and updates to users The adoption of Mac products is shifting into the SMB and Enterprise market causing the increase of demand for Mac AV products In the cloud services or hybrid services will be of importance in the Mac endpoint security market Apple is expected to enhance its operating system to include stronger intrinsic security features The introduction of the iOS into the enterprise will increase the demand for better management and security tools Source: Frost & Sullivan
  15. 15. Recommendations <ul><li>From the Consumer Perspective </li></ul><ul><li>Adding additional anti- virus software is highly suggested as both the threat and malware targeting Apple products grows. </li></ul><ul><li>Consumers should be careful about downloading questionable applications </li></ul><ul><li>Consumer should never give personal information out such as SS#, bank account numbers or passcodes to unidentified person through email or if your bank is requesting the information, call your bank to verify this. </li></ul><ul><li>For iPhones users, its best not to jailbreak the phone. There is really no point in gaining more applications- If you really want more applications the then move to an android phone and a different provider </li></ul><ul><li>From a Business Perspective </li></ul><ul><li>Look beyond Macs gaining malware, view them more as carriers or vectors that can spread malware to other PCs. Adding anti- virus to these Macs is the best bet </li></ul><ul><li>Look for a vendors that can help manage these devices easily </li></ul><ul><li>For iPhone and iPad users, use management tools that can use device or application control </li></ul><ul><li>Don’t let the user have too much freedom in adding applications and it would be best not to allow any jailbreaking phones onto your network </li></ul>
  16. 16. Next Steps <ul><li>Request a proposal for a Growth Partnership Service to support you and your team to accelerate the growth of your company. ( [email_address] ) 1-877-GoFrost (1-877-463-7678) </li></ul><ul><li>Register for Frost & Sullivan’s Growth Opportunity Newsletter and keep abreast of innovative growth opportunities ( www.frost.com /news ) </li></ul>
  17. 17. Your Feedback is Important to Us <ul><li>Growth Forecasts? </li></ul><ul><li>Competitive Structure? </li></ul><ul><li>Emerging Trends? </li></ul><ul><li>Strategic Recommendations? </li></ul><ul><li>Other? </li></ul>Please inform us by taking our survey. What would you like to see from Frost & Sullivan?
  18. 18. For Additional Information Jake Wengroff Corporate Communications (210) 247-3806 [email_address] Craig Hays Sales Manager (210) 348-6420 [email_address] Robert Ayoub Industry Manager Network Security (210) 247-3808 [email_address]
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×