SlideShare a Scribd company logo
1 of 9
Download to read offline
Top 20 Mobile Security (mSecurity)
Companies 2014
Leaders in Software as a Service (SaaS), Mobile Device
Management (MDM) & Bring Your Own Device (BYOD) Security
©notice
This material is copyright by visiongain. It is against the law to reproduce any of this material without the prior
written agreement of visiongain.You cannot photocopy, fax, download to database or duplicate in any other way
any of the material contained in this report. Each purchase and single copy is for personal use only.
www.visiongain.com
Contents
1. Report Overview
1.1 Current Mobile Security Market Overview
1.2 Mobile Malware Attacks on the Rise
1.3 Mobile Security Ecosystem
1.4 How This Report Delivers
1.5 Who is This Report For?
1.6 Methodology
1.7 Other Visiongain Reports Published in 2014
1.8 About Visiongain
2. Introduction to the Mobile Security Market
2.1 The Mobile Security Market Growing Rapidly
2.2 Mobile Security Market Definition
2.2.1 Device Security
2.2.2 Data Security
2.2.3 Network Security
2.2.4 Mobile Security Tools
2.3 Proliferation of Mobile Devices Leading to Rise in Security Threats
2.3.1 Mobile Malware Evolution
2.3.2 Trojans
2.3.3 Worms
2.3.4 Spyware
2.3.5 Spam
2.4 Mobile Threats Affect All Platforms
3. The Global Mobile Security Market
3.1 Mobile Security - A Major Concern for Consumers Worldwide
3.2 Extensive Growth in Mobile Security Market from 2013-2024
4. Top 20 Mobile Security (mSecurity) Companies Market Share
4.1 Top 20 Mobile Security (mSecurity) Companies 2013
www.visiongain.com
Contents
4.2 Analysis of Mobile Security Vendors
5. Leading 20 Mobile Security Companies
5.1 AirWatch
5.1.1 Awards and Accolades
5.1.2 AirWatch Mobile Security Solution
5.2 Apple
5.2.1 Apple’s Best Practices for Mobile Security
5.3 AVG
5.3.1 AVG Mobile Security Applications
5.3.2 AVG Retains Position of #1 Downloaded Security App
5.3.3 MTN Delivers AVG Mobile Security to South African Subscribers
5.4 BullGuard
5.4.1 BullGuard Mobile Security
5.5 ESET
5.5.1 ESET Mobile Security Solutions
5.6 Fiberlink, an IBM Company
5.6.1 MaaS360
5.7 Fixmo
5.7.1 Fixmo Enterprise Mobility Platform (Fixmo EMP)
5.7.1.1 Fixmo Sentinel
5.7.1.2 Fixmo SafeZone
5.7.2 Fixmo Announces Expanded Collaboration with Samsung
5.7.3 Fixmo to Provide Mobile Security to U.S. Department of Defense
5.8 F-Secure
5.8.1 F-Secure’s Mobile Security Solutions
5.8.2 Majority Mobile threats are Targeted at Android
5.9 Good Technology
5.9.1 Good Dynamics Secure Mobility Platform
5.9.1.1 Mobile App Containerization
5.9.1.2 Mobile App Management (MAM)
5.9.1.3 Mobile Service Management and Mobile Device Management
www.visiongain.com
Contents
5.10 Google
5.10.1 The Next Phase of Android Security
5.11 Kaspersky Lab
5.11.1 Kaspersky Internet Security for Android
5.11.2 Kaspersky Internet Security – Multi-Device
5.11.3 Kaspersky Lab Anticipates Double-Digit Growth in 2014
5.12 Lookout
5.13 McAfee, An Intel Company
5.13.1 McAfee Mobile Security Solutions
5.13.2 McAfee Labs Threats Report Findings
5.14 MobileIron
5.14.1 MobileIron Mobile IT Platform
5.15 NQ Mobile
5.15.1 NQ Mobile Security Products
5.16 Samsung Electronics
5.16.1 Samsung KNOX Workspace
5.16.2 Samsung Teams up with Zscaler and Citrix
5.17 SAP
5.17.1 SAP Mobile Secure
5.17.2 SAP and Samsung Expand Partnership
5.18 Sophos
5.18.1 Sophos Product Portfolio
5.18.2 Sophos Sees Explosive Growth for Mobile Device Management
5.19 Symantec
5.19.1 Symantec Mobile Security
5.19.2 Symantec Showcasing New Security Solutions
5.20 Trend Micro
5.20.1 Trend Micro Smart Protection Network
5.20.2 Trend Micro Mobile Security Solution
5.21 Other Leading Companies in the Mobile Security Arena
5.21.1 Mformation
5.21.2 Microsoft
5.21.3 Mobile Active Defense
www.visiongain.com
Contents
5.21.4 Motorola
5.21.5 Orange
5.21.6 BlackBerry
5.21.7 Telefonica
5.21.8 Echoworx
5.21.9 DeviceLock Inc.
5.21.10 DataViz
5.22 Additional Players in the mSecurity Market
6. SWOT Analysis of the Mobile Security Market
7. Expert Opinion
7.1 Visiongain Interview with AVG Technologies
7.1.1 AVG Company Background and Mobile Security Products
7.1.2 Proliferation of Connected Devices Will Drive the Adoption of Mobile Security
7.1.3 Internet of Things is A Major Driver for the mSecurity Market
7.1.4 Key Trends in the Mobile Security Market
7.1.5 Apple's iOS is More Secure than Google’s Android
7.2 Visiongain Interview with Kaspersky Lab
7.2.1 Kaspersky Company Background
7.2.2 Mobile Apps and BYOD Driving the Need for Mobile Security
7.2.3 Cybercriminals Increasingly Targeting Android Operating Systems
7.2.4 Mobile Banking Trojans to Grow Significantly in the Coming Years
7.2.5 BYOD Becoming a Popular Trend for Most Businesses
7.2.6 Consumers/Enterprises Becoming More Aware about Internet Security
7.3 Visiongain Interview with Bullguard
7.3.1 Bullguard Company Background and Mobile Security Products
7.3.2 Security Vendors Must be Ready to Tackle Increasing Malware Attacks
7.3.3 Lack of Awareness Regarding mSecurity Will be a Inhibitor
7.3.4 Mobile Device Management & BYOD Gaining Popularity
7.3.5 Antivirus will be Mandatory on all Mobile OS
7.3.6 Mobile Security to Surpass the PC Security Market in the Future
www.visiongain.com
Contents
7.3.7 Security and Privacy Issues Should be Given Utmost Priority
8. Conclusion
8.1 Mobile Threats on the Rise
8.2 Market Share & Outlook for the Top 20 Mobile Security Companies
9. Glossary
Page 56Www.visiongain.com Page 56
Top 20 Mobile Security (mSecurity) Companies 2014
Leaders in Software as a Service (SaaS), Mobile Device
Management (MDM) & Bring Your Own Device (BYOD) Security
5.6.1 MaaS360
MaaS360 is an enterprise mobility management (EMM) platform that enables IT to deliver end-to-
end security and management through the implementation of:
• Mobile Device Management
• Mobile Application Management
• Mobile Content Management
• Secure Mail
• Secure Browser
• Mobile Expense Management
• Laptop Management
For an overview of mobile security services provided by Fiberlink see Table 5.17 below.
Table 5.17 Fiberlink Mobile Security Features
User & Device Security
• Authenticate against Active Directory/LDAP, one-time passcode or SAML
• Create custom groups & apply specific policies to each group
• Require two-factor authentication
• Require passcode policies with configurable quality, length and duration
• Enforce encryption and password visibility settings
• Set device restrictions on features
• Detect and restrict jailbroken and rooted devices
• Remotely locate, lock and wipe lost or stolen devices
• Selectively wipe corporate data leaving personal data intact
• Define and implement real-time compliance rules with automated actions
• Enable geo-fencing rules to enforce location related compliance
Application Security
• Whitelist/Blacklist of apps
• iCloud controls to prevent app backups
• Enforce app security based on security compliance rules
• Secure on-device app catalog
• SDK for authentication and authorization
• Selective remote wipe of apps
Document Security
• iCloud controls to prevent file backups/syncs
• MaaS360 Doc Catalog isolates files in an encrypted document container
Page 67Www.visiongain.com Page 67
Top 20 Mobile Security (mSecurity) Companies 2014
Leaders in Software as a Service (SaaS), Mobile Device
Management (MDM) & Bring Your Own Device (BYOD) Security
Table 5.23 Good Technology Company Overview(Mobile security revenues, market
ranking, % market share, media contact, HQ, website)
Mobile security revenues $bn
USD 0.096 bn(FY 2013 estimate)
Global market ranking
5
th
Global market share %
4.7%
Media Contact
Becki Leonard
bleonard@good.com
Headquarters Sunnyvale, California
Website http://uk.good.com
Source: Visiongain 2014
Figure 5.24 Good Technology Mobile Security Market Share 2013 (%)
Source: Visiongain 2014
4.7%
Page 115Www.visiongain.com Page 115
Top 20 Mobile Security (mSecurity) Companies 2014
Leaders in Software as a Service (SaaS), Mobile Device
Management (MDM) & Bring Your Own Device (BYOD) Security
7. Expert Opinion
7.1 Visiongain Interview withAVG Technologies
Visiongain conducted an interview with Omri Sigelman, Vice President – Mobile & Marketing at
AVG Technologies about his viewpoint of the mobile security market.
7.1.1 AVG Company Background and Mobile Security Products
Visiongain: Please give us a little background about your company and your mobile
security related product/service offerings.
Omri Sigelman: AVG is the online security company for 177 million active users, securing
devices, data and people. We deliver protection, privacy and performance products for desktop
users and mobile devices users. Our flagship AVG AntiVirus FREE for Android™ app for
smartphones is the number one downloaded security application on the Google Play store with
more than 100 million downloads, which places it in the coveted 100-500 million download
category.
AVG AntiVirus FREE for Android Tablets is also a popular AVG app for those with Android based
devices. We also offer a range of performance apps for smartphones and tablets including AVG
Cleaner, AVG Uninstaller and AVG Battery Saver & TuneUp which help keep connected devices
running smoothly, free of duplicate or unwanted files and apps, and operating at maximum battery
by helping control connectivity and service settings to put them into sleep/turn them off when not in
use.
AVG’s aim is to secure as many end users as possible so ultimately our online protection moves
and develops as they do and their devices evolve. Users have a right to be secure online whatever
device they are using and wherever they are using it. Our approach to mobile therefore is to make
our products as easy to use and as accessible as possible and as part of this, we recently
announced our forthcoming AVG Zen application for mobile devices. AVG Zen is a simple
approach to helping people run their connected lives on all their devices from one central, easily
managed place.
We’re also committed to ensuring our mobile users understand how our mobile apps work and in
particular, being transparent about what data our apps collect and how it is shared. As part of this
commitment, we have just announced our AVG short data privacy notice. AVG is the one of the
first in the industry to pursue this best practice which arises from the National Telecommunications

More Related Content

Recently uploaded

Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 

Recently uploaded (20)

Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Top 20 Mobile Security (mSecurity) Companies 2014

  • 1. Top 20 Mobile Security (mSecurity) Companies 2014 Leaders in Software as a Service (SaaS), Mobile Device Management (MDM) & Bring Your Own Device (BYOD) Security ©notice This material is copyright by visiongain. It is against the law to reproduce any of this material without the prior written agreement of visiongain.You cannot photocopy, fax, download to database or duplicate in any other way any of the material contained in this report. Each purchase and single copy is for personal use only.
  • 2. www.visiongain.com Contents 1. Report Overview 1.1 Current Mobile Security Market Overview 1.2 Mobile Malware Attacks on the Rise 1.3 Mobile Security Ecosystem 1.4 How This Report Delivers 1.5 Who is This Report For? 1.6 Methodology 1.7 Other Visiongain Reports Published in 2014 1.8 About Visiongain 2. Introduction to the Mobile Security Market 2.1 The Mobile Security Market Growing Rapidly 2.2 Mobile Security Market Definition 2.2.1 Device Security 2.2.2 Data Security 2.2.3 Network Security 2.2.4 Mobile Security Tools 2.3 Proliferation of Mobile Devices Leading to Rise in Security Threats 2.3.1 Mobile Malware Evolution 2.3.2 Trojans 2.3.3 Worms 2.3.4 Spyware 2.3.5 Spam 2.4 Mobile Threats Affect All Platforms 3. The Global Mobile Security Market 3.1 Mobile Security - A Major Concern for Consumers Worldwide 3.2 Extensive Growth in Mobile Security Market from 2013-2024 4. Top 20 Mobile Security (mSecurity) Companies Market Share 4.1 Top 20 Mobile Security (mSecurity) Companies 2013
  • 3. www.visiongain.com Contents 4.2 Analysis of Mobile Security Vendors 5. Leading 20 Mobile Security Companies 5.1 AirWatch 5.1.1 Awards and Accolades 5.1.2 AirWatch Mobile Security Solution 5.2 Apple 5.2.1 Apple’s Best Practices for Mobile Security 5.3 AVG 5.3.1 AVG Mobile Security Applications 5.3.2 AVG Retains Position of #1 Downloaded Security App 5.3.3 MTN Delivers AVG Mobile Security to South African Subscribers 5.4 BullGuard 5.4.1 BullGuard Mobile Security 5.5 ESET 5.5.1 ESET Mobile Security Solutions 5.6 Fiberlink, an IBM Company 5.6.1 MaaS360 5.7 Fixmo 5.7.1 Fixmo Enterprise Mobility Platform (Fixmo EMP) 5.7.1.1 Fixmo Sentinel 5.7.1.2 Fixmo SafeZone 5.7.2 Fixmo Announces Expanded Collaboration with Samsung 5.7.3 Fixmo to Provide Mobile Security to U.S. Department of Defense 5.8 F-Secure 5.8.1 F-Secure’s Mobile Security Solutions 5.8.2 Majority Mobile threats are Targeted at Android 5.9 Good Technology 5.9.1 Good Dynamics Secure Mobility Platform 5.9.1.1 Mobile App Containerization 5.9.1.2 Mobile App Management (MAM) 5.9.1.3 Mobile Service Management and Mobile Device Management
  • 4. www.visiongain.com Contents 5.10 Google 5.10.1 The Next Phase of Android Security 5.11 Kaspersky Lab 5.11.1 Kaspersky Internet Security for Android 5.11.2 Kaspersky Internet Security – Multi-Device 5.11.3 Kaspersky Lab Anticipates Double-Digit Growth in 2014 5.12 Lookout 5.13 McAfee, An Intel Company 5.13.1 McAfee Mobile Security Solutions 5.13.2 McAfee Labs Threats Report Findings 5.14 MobileIron 5.14.1 MobileIron Mobile IT Platform 5.15 NQ Mobile 5.15.1 NQ Mobile Security Products 5.16 Samsung Electronics 5.16.1 Samsung KNOX Workspace 5.16.2 Samsung Teams up with Zscaler and Citrix 5.17 SAP 5.17.1 SAP Mobile Secure 5.17.2 SAP and Samsung Expand Partnership 5.18 Sophos 5.18.1 Sophos Product Portfolio 5.18.2 Sophos Sees Explosive Growth for Mobile Device Management 5.19 Symantec 5.19.1 Symantec Mobile Security 5.19.2 Symantec Showcasing New Security Solutions 5.20 Trend Micro 5.20.1 Trend Micro Smart Protection Network 5.20.2 Trend Micro Mobile Security Solution 5.21 Other Leading Companies in the Mobile Security Arena 5.21.1 Mformation 5.21.2 Microsoft 5.21.3 Mobile Active Defense
  • 5. www.visiongain.com Contents 5.21.4 Motorola 5.21.5 Orange 5.21.6 BlackBerry 5.21.7 Telefonica 5.21.8 Echoworx 5.21.9 DeviceLock Inc. 5.21.10 DataViz 5.22 Additional Players in the mSecurity Market 6. SWOT Analysis of the Mobile Security Market 7. Expert Opinion 7.1 Visiongain Interview with AVG Technologies 7.1.1 AVG Company Background and Mobile Security Products 7.1.2 Proliferation of Connected Devices Will Drive the Adoption of Mobile Security 7.1.3 Internet of Things is A Major Driver for the mSecurity Market 7.1.4 Key Trends in the Mobile Security Market 7.1.5 Apple's iOS is More Secure than Google’s Android 7.2 Visiongain Interview with Kaspersky Lab 7.2.1 Kaspersky Company Background 7.2.2 Mobile Apps and BYOD Driving the Need for Mobile Security 7.2.3 Cybercriminals Increasingly Targeting Android Operating Systems 7.2.4 Mobile Banking Trojans to Grow Significantly in the Coming Years 7.2.5 BYOD Becoming a Popular Trend for Most Businesses 7.2.6 Consumers/Enterprises Becoming More Aware about Internet Security 7.3 Visiongain Interview with Bullguard 7.3.1 Bullguard Company Background and Mobile Security Products 7.3.2 Security Vendors Must be Ready to Tackle Increasing Malware Attacks 7.3.3 Lack of Awareness Regarding mSecurity Will be a Inhibitor 7.3.4 Mobile Device Management & BYOD Gaining Popularity 7.3.5 Antivirus will be Mandatory on all Mobile OS 7.3.6 Mobile Security to Surpass the PC Security Market in the Future
  • 6. www.visiongain.com Contents 7.3.7 Security and Privacy Issues Should be Given Utmost Priority 8. Conclusion 8.1 Mobile Threats on the Rise 8.2 Market Share & Outlook for the Top 20 Mobile Security Companies 9. Glossary
  • 7. Page 56Www.visiongain.com Page 56 Top 20 Mobile Security (mSecurity) Companies 2014 Leaders in Software as a Service (SaaS), Mobile Device Management (MDM) & Bring Your Own Device (BYOD) Security 5.6.1 MaaS360 MaaS360 is an enterprise mobility management (EMM) platform that enables IT to deliver end-to- end security and management through the implementation of: • Mobile Device Management • Mobile Application Management • Mobile Content Management • Secure Mail • Secure Browser • Mobile Expense Management • Laptop Management For an overview of mobile security services provided by Fiberlink see Table 5.17 below. Table 5.17 Fiberlink Mobile Security Features User & Device Security • Authenticate against Active Directory/LDAP, one-time passcode or SAML • Create custom groups & apply specific policies to each group • Require two-factor authentication • Require passcode policies with configurable quality, length and duration • Enforce encryption and password visibility settings • Set device restrictions on features • Detect and restrict jailbroken and rooted devices • Remotely locate, lock and wipe lost or stolen devices • Selectively wipe corporate data leaving personal data intact • Define and implement real-time compliance rules with automated actions • Enable geo-fencing rules to enforce location related compliance Application Security • Whitelist/Blacklist of apps • iCloud controls to prevent app backups • Enforce app security based on security compliance rules • Secure on-device app catalog • SDK for authentication and authorization • Selective remote wipe of apps Document Security • iCloud controls to prevent file backups/syncs • MaaS360 Doc Catalog isolates files in an encrypted document container
  • 8. Page 67Www.visiongain.com Page 67 Top 20 Mobile Security (mSecurity) Companies 2014 Leaders in Software as a Service (SaaS), Mobile Device Management (MDM) & Bring Your Own Device (BYOD) Security Table 5.23 Good Technology Company Overview(Mobile security revenues, market ranking, % market share, media contact, HQ, website) Mobile security revenues $bn USD 0.096 bn(FY 2013 estimate) Global market ranking 5 th Global market share % 4.7% Media Contact Becki Leonard bleonard@good.com Headquarters Sunnyvale, California Website http://uk.good.com Source: Visiongain 2014 Figure 5.24 Good Technology Mobile Security Market Share 2013 (%) Source: Visiongain 2014 4.7%
  • 9. Page 115Www.visiongain.com Page 115 Top 20 Mobile Security (mSecurity) Companies 2014 Leaders in Software as a Service (SaaS), Mobile Device Management (MDM) & Bring Your Own Device (BYOD) Security 7. Expert Opinion 7.1 Visiongain Interview withAVG Technologies Visiongain conducted an interview with Omri Sigelman, Vice President – Mobile & Marketing at AVG Technologies about his viewpoint of the mobile security market. 7.1.1 AVG Company Background and Mobile Security Products Visiongain: Please give us a little background about your company and your mobile security related product/service offerings. Omri Sigelman: AVG is the online security company for 177 million active users, securing devices, data and people. We deliver protection, privacy and performance products for desktop users and mobile devices users. Our flagship AVG AntiVirus FREE for Android™ app for smartphones is the number one downloaded security application on the Google Play store with more than 100 million downloads, which places it in the coveted 100-500 million download category. AVG AntiVirus FREE for Android Tablets is also a popular AVG app for those with Android based devices. We also offer a range of performance apps for smartphones and tablets including AVG Cleaner, AVG Uninstaller and AVG Battery Saver & TuneUp which help keep connected devices running smoothly, free of duplicate or unwanted files and apps, and operating at maximum battery by helping control connectivity and service settings to put them into sleep/turn them off when not in use. AVG’s aim is to secure as many end users as possible so ultimately our online protection moves and develops as they do and their devices evolve. Users have a right to be secure online whatever device they are using and wherever they are using it. Our approach to mobile therefore is to make our products as easy to use and as accessible as possible and as part of this, we recently announced our forthcoming AVG Zen application for mobile devices. AVG Zen is a simple approach to helping people run their connected lives on all their devices from one central, easily managed place. We’re also committed to ensuring our mobile users understand how our mobile apps work and in particular, being transparent about what data our apps collect and how it is shared. As part of this commitment, we have just announced our AVG short data privacy notice. AVG is the one of the first in the industry to pursue this best practice which arises from the National Telecommunications