Your SlideShare is downloading. ×
Endpoint Security for Business Desktops, Laptops
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Endpoint Security for Business Desktops, Laptops

366
views

Published on


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
366
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Find Industry reports, Company profiles ReportLinker and Market Statistics >> Download this market research report on Reportlinker.com Endpoint Security for Business Desktops, Laptops & Mobile Devices 2009-2014 Published on October 2009 Report Summary This report provides a thorough analysis of the entire business security market from the mobile to the business "endpoint", considering key threats for laptops, desktops & PCs as well as mobile phones and other portable devices. It provides a detailed analysis of where the industry is at present and how it will develop over the next five years. Two entire chapters are devoted to the mobile device and the unique characteristics and challenges that will come from increased mobile use in the business environment. For the mobile environment, key forecasts include the total number of enterprise handsets per region, percentage of mobile enterprise users protected, number of corporate mobile users protected and revenues from mobile corporate security. The forecasts for Mobile business IT security are complemented by a detailed set of forecasts for the Business IT Security: The report therefore provides forecast in terms of devices protected and revenues for the following areas: The basic security foundation; Encryption and advanced authorisation; Advanced firewalls, Intrusion detection and prevention; Security policy management, endpoint security updates and provision. Key questions the report answers:How is the business IT security market developing and which areas within the broader business IT security will grow fastest'What new threats are arising in both the mobile environment and the broader business IT security market'How are security applications vendors and operators addressing these threats'What will drive demand for encryption products to protect the mobile device, laptops and desktops'How has the market for network based security to the business device or endpoint developed so far, and how will this continue'What unique challenges emerge when protecting the mobile device' Table of Content Glossary Executive Summary Endpoint Security for Business Report Aims Scope of the Report Endpoint Security Forecasts Overview Figure ES1: Endpoint Security Revenues ($m) Split by 8 Key Regions 2008-2014 Table ES1: Endpoint Security Revenues ($m) Split by 8 Key Regions 2008-2014 Figure ES2: Business IT Security Revenues ($m) Split by Security Category 2008-2014 Table ES2: Business IT Security Revenues ($m) Split by Security Category 2008-2014 Endpoint Security for Business Desktops, Laptops & Mobile Devices 2009-2014 Page 1/8
  • 2. Find Industry reports, Company profiles ReportLinker and Market Statistics Figure ES3: Number of PCs (m) with Basic Antivirus and Firewall Foundation, Split by 8 Key Regions 2008-2014 Table ES3: Number of PCs (m) with Basic Antivirus and Firewall Foundation, Split by 8 Key Regions 2008-2014 Figure ES4: Basic Antivirus and Firewall Foundation Revenues ($m) Split by 8 Key Regions 2008-2014 Table ES4: Basic Antivirus and Firewall Foundation Revenues ($m) Split by 8 Key Regions 2008-2014 Mobile Device Security in the Business Environment Figure ES5: Enterprise Mobile Security Revenues ($m) Split by 8 Key Regions 2008-2014 Table ES5: Enterprise Mobile Security Revenues ($m) Split by 8 Key Regions 2008-2014 Recommendations End Users and IT Managers Security Applications Providers Operators Trends Identified Through Research Interviews Conclusion 1. Enterprise Security: Threats and Security Options 1.1 Introduction 1.2 Trends in Cyber Crime 1.2.1 Changes in Cyber Crime Table 1.1: Cyber Security: Definitions 1.3 Security Parameters 1.4 The Threats 1.4.1 Two Principal Types of Threat Figure 1.1: Internal & External Threat Origins Facing Desktops and Mobile Devices 1.4.2 Current Threat Status by Geographical Region Table 1.2 Threat Status by Geographical Region 1.4.3 The Role of the Browser as a Threat Vector Figure 1.2: The Mechanics of a Browser-based Attack 1.4.4 The Danger of Data Loss and Leakage Figure 1.3: Leading Causes of Data Loss 1.4.5 What Data is For Sale' Table 1.3: Data For Sale From Cyber Crime 1.4.6 Vulnerabilities Figure 1.4: Vulnerabilities by Software Manufacturer Figure 1.5: Vulnerabilities by Threat Type 1.5 Specific Threats 1.5.1 Keystroke Logging Figure 1.6: The Mechanics of Keystroke Logging 1.5.2 The Botnet Figure 1.7: Botnet Economics 1.5.3 Phishing and Spam Figure 1.8: An Example of a Spam Message Linked to an Infected Site 1.6 Endpoint Security Figure 1.9: Endpoint Security, Schematic Diagram 1.6.1 What Endpoint Security Comprises Figure 1.10: The Corporate IT Security Ecosystem 1.7 The Endpoint Security Toolbox 1.7.1 Endpoint Security Levels Figure 1.11: The Increasing Complexity of the Protection Market 1.7.2 Functions of Endpoint Security Solutions Endpoint Security for Business Desktops, Laptops & Mobile Devices 2009-2014 Page 2/8
  • 3. Find Industry reports, Company profiles ReportLinker and Market Statistics i. The Ability to Detect and Block Malware ii. The Ability to Secure Information Stored on Endpoints iii. The Ability to Enforce Policy Compliance iv. The Ability to Provide Secure Remote Access to Networks v. The Ability to Allow for Centralised Management 1.7.3 Data Encryption Figure 1.12: The Encryption Process 1.7.4 AntiVirus 1.7.5 Firewalls Figure 1.13: Traditional Firewall Set Up 1.8 Conclusion 2. The Market for Business IT Security 2.1 Introduction 2.2 The Business IT Security Environment 2.2.1 Issues Specifically Affecting the US 2.2.2 Extending the Security Reach 2.2.3 Increasing Threat Management Complexity i. End to End Mobile Security' ii. Vendor Acquisitions 2.2.4 Companies Reviewing Security Needs 2.3 Business IT Security Market 2.3.1 Service Elements 2.3.2 Market Characteristics 2.3.3 Drivers 2.4 Forecasts 2.4.1 Methodology Figure 2.1: Sizing the Business IT Security Market: Methodology 2.4.2 Trends and Assumptions i. Basic Antivirus and AntiSpamware ii. Encryption iii. Intrusion Detection and Prevention, Advanced Firewall and VPN Iv. Network Based Security and Endpoint Management 2.5 Business IT Security Forecasts 2.5.1 Revenue Forecasts by Security Category Figure 2.2: Business IT Security Revenues ($m) Split by Security Category 2008-2014 (excludes mobile) Table 2.1: Business IT Security Revenues ($m) Split by Security Category 2008-2014 (excludes mobile) 2.5.2 Revenue Forecasts by Region Figure 2.3: Business IT Security Revenues ($m) Split by 8 Key Regions 2008-2014 (excludes mobile) Table 2.2: Business IT Security Revenues ($m) Split by 8 Key Regions 2008-2014 (excludes mobile) 2.5.3 Basic Antivirus and Firewall Security Foundation Forecasts Figure 2.4: Number of PCs with Basic Antivirus and Firewall Foundation (m) Split by 8 Key Regions 2008-2014 Table 2.3: Number of PCs with Basic Antivirus and Firewall Foundation (m) Split by 8 Key Regions 2008-2014 Figure 2.5: Basic Antivirus and Firewall Foundation Revenues ($m) Split by 8 Key Regions 2008-2014 Table 2.4: Basic Antivirus and Firewall Foundation Revenues ($m) Split by 8 Key Regions 2008-2014 2.5.4 Encryption Forecasts Figure 2.6: Number of Enterprise PCs with Encryption Installed (m) Split by 8 Key Regions 2008-2014 Table 2.5: Number of Enterprise PCs with Encryption Installed (m) Split by 8 Key Regions 2008-2014 Figure 2.7: Enterprise Encryption Revenues ($m) Split by 8 Key Regions 2008-2014 Endpoint Security for Business Desktops, Laptops & Mobile Devices 2009-2014 Page 3/8
  • 4. Find Industry reports, Company profiles ReportLinker and Market Statistics Table 2.6: Enterprise Encryption Revenues ($m) Split by 8 Key Regions 2008-2014 2.5.5 Firewall, Intrusion Detection and VPN Forecasts Figure 2.8: Business PCs with Advanced Firewall, Intrusion Detection and VPN Installed (m) Split by 8 Key Regions 2008-2014 Table 2.6: Business PCs with Advanced Firewall, Intrusion Detection and VPN Installed (m) Split by 8 Key Regions 2008-2014 Figure 2.9: Advanced Firewall, Intrusion Detection and VPN Revenues ($m) Split by 8 Key Regions 2008-2014 Table 2.8: Advanced Firewall, Intrusion Detection and VPN Revenues ($m) Split by 8 Key Regions 2008-2014 2.5.6 Security Management Forecasts Figure 2.10: Business PCs with Network Based Security Management to the Endpoint Installed, Split by 8 Key Regions 2008-2014 Table 2.9: Business PCs with Network Based Security Management to the Endpoint Installed, Split by 8 Key Regions 2008-2014 Figure 2.11: Revenues from Network Based Security Management to the Endpoint ($m) Split by 8 Key Regions 2008-2014 Table 2.10: Revenues from Network Based Security Management to the Endpoint ($m) Split by 8 Key Regions 2008-2014 3. Mobile Security in the Enterprise 3.1 Introduction 3.2 Current Status 3.2.1 Mobile Risk Factors 3.2.2 Device Sophistication Figure 3.1: Mobile Subscribers that Browse the Internet Using the Mobile Device (m) Split by 8 Key Regions 2008-2014 Table 3.1: Mobile Subscribers that Browse the Internet Using the Mobile Device (m) Split by 8 Key Regions 2008-2014 3.2.3 New Functionality i. Changing Mobile Internet Access Models 3.2.4 Open Source Architecture 3.2.5 Faster Data Speeds Figure 3.2: Mobile Data Volume Forecasts 2008-2014 3.2.7 Factors Reducing the Security Risk for Mobile Devices Table 3.2: Industry Developments, Consequences and Implications for Mobile Security 3.3 Mobile Security Stakeholders 3.3.1 The Individual Subscriber 3.3.2 The Corporate Subscriber 3.3.3 Mobile Network Operators 3.4 Looking to the Future 3.4.1 Web 2.0, P2P and Cloud Computing 3.4.2 Web 2.0 Security Implications 3.4.3 Social Networking 3.4.4 P2P (Peer to Peer) 3.5 The Mobile Device as an Endpoint 3.5.1 Threats Specific to the Mobile Industry i. Device Loss and Theft ii Denial of Service Attack iii. Mobile Spam a. Levels of Spam Figure 3.3: Top 12 Spam Relaying Countries Fixed Line b. Cloudmark Interview iv. Mobile Spam Drivers v. Phishing and Smishing vi. Mobile Malware 3.6 Mobile Security Breaches Endpoint Security for Business Desktops, Laptops & Mobile Devices 2009-2014 Page 4/8
  • 5. Find Industry reports, Company profiles ReportLinker and Market Statistics 3.6.1 Mobile Viruses- Recent Years 3.6.2 Mobile Viruses in 2009 3.7 Conclusion 4. The Business Mobile Security Market 4.1 Introduction 4.2 The Enterprise and Mobile Security 4.2.1 Operating Systems in Use in the Corporate Environment 4.2.2 Drivers 4.2.3 Changing Priorities 4.2.4 Protecting Data 4.2.5 The Role of the Operator 4.2.6 Macro Economic Trends 4.2.7 Market Shares 4.3 Mobile Enterprise Security Forecasts 4.3.1 Assumptions and Methodology Figure 4.1 Mobile Enterprise Security Forecasts Methodology 4.3.2 Number of Enterprise Handsets Figure 4.2: Total Number of Enterprise Handsets (m) Split by 8 Key Regions 2008-2014 Table 4.1: Total Number of Enterprise Handsets (m) Split by 8 Key Regions 2008-2014 Figure 4.3: Enterprise Mobile Users Protected (%) Split by 8 Key Regions 2008-2014 Table 4.2: Enterprise Mobile Users Protected (%) Split by 8 Key Regions 2008-2014 Figure 4.4: Enterprise Mobile Users Protected (m) Split by 8 Key Regions 2008-2014 Table 4.3: Enterprise Mobile Users Protected (m) Split by 8 Key Regions 2008-2014 Figure 4.5: Enterprise Mobile Security Revenues ($m) Split by 8 Key Regions 2008-2014 Table 4.4: Enterprise Mobile Security Revenues ($m) Split by 8 Key Regions 2008-2014 4.4 Conclusion 5. Security of the Mobile Operating System 5.1 Introduction 5.2 Development of the Mobile OS 5.2.1 RIM and the BlackBerry Figure 5.1: BlackBerry Curve 8900 i. BlackBerry Exchange Server Figure 5.2: Diagrammatic Representation of BlackBerry Security 5.2.2 Symbian i. Symbian Platform Security 5.2.3 Windows Mobile Operating System i. Windows Mobile and Security 5.2.4 iPhone i. Security of the iPhone Operating System 5.2.5 Android i. Security of the Android OS 5.3 Industry-Wide Security Initiatives 5.3.1 Towards a Standard Security Platform i. BONDI ii. The Work of ETSI 5.4 Conclusion Endpoint Security for Business Desktops, Laptops & Mobile Devices 2009-2014 Page 5/8
  • 6. Find Industry reports, Company profiles ReportLinker and Market Statistics 6. Interviews and Profiles 6.1 Key Findings from Interviews 6.2 Profiles 6.2.1 Trend Micro 6.2.2 Sophos Figure 6.1 Sophos Service Offerings 6.2.3 Kaspersky 6.2.4 BullGuard 6.2.5 Symantec 6.2.6 F-Secure 6.2.7 Fortinet Figure 6.2: Fortinet's Security Ecosystem Endpoint Security for Business Desktops, Laptops & Mobile Devices 2009-2014 Page 6/8
  • 7. Find Industry reports, Company profiles ReportLinker and Market Statistics Fax Order Form To place an order via fax simply print this form, fill in the information below and fax the completed form to (805) 617 17 93 . If you have any questions please visit http://www.reportlinker.com/notify/contact Order Information Please verify that the product information is correct and select the format(s) you require. Endpoint Security for Business Desktops, Laptops & Mobile Devices 2009-2014 Product Formats Please select the product formats and the quantity you require. Digital Copy--USD 3 277.50 Quantity: _____ Hard Copy--USD 3 277.50 Quantity: _____ 5 User License--USD 4 377.50 Quantity: _____ Corporate License--USD 6 577.50 Quantity: _____ Contact Information Please enter all the information below in BLOCK CAPITALS Title: Mr Mrs Dr Miss Ms Prof First Name: _____________________________ Last Name: __________________________________ Email Address: __________________________________________________________________________ Job Title: __________________________________________________________________________ Organization: __________________________________________________________________________ Address: __________________________________________________________________________ City: __________________________________________________________________________ Postal / Zip Code: __________________________________________________________________________ Country: __________________________________________________________________________ Phone Number: __________________________________________________________________________ Fax Number: __________________________________________________________________________ Endpoint Security for Business Desktops, Laptops & Mobile Devices 2009-2014 Page 7/8
  • 8. Find Industry reports, Company profiles ReportLinker and Market Statistics Payment Information Please indicate the payment method, you would like to use by selecting the appropriate box. Payment by credit card Card Number: ______________________________________________ Expiry Date __________ / _________ CVV Number _____________________ Card Type (ex: Visa, Amex…) _________________________________ Payment by wire transfer Crédit Mutuel RIB : 10278 07314 00020257701 78 BIC : CMCIFR2A IBAN : FR76 1027 8073 1400 0202 5770 178 Payment by check UBIQUICK SAS 16 rue Grenette – 69002 LYON, FRANCE Customer signature:   Please note that by ordering from Reportlinker you are agreeing to our Terms and Conditions at http://www.reportlinker.com/index/terms Please fax this form to (805) 617 17 93 Endpoint Security for Business Desktops, Laptops & Mobile Devices 2009-2014 Page 8/8