Net motion wireless-and_frost-sullivan_a-new-mobilty_ps


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Net motion wireless-and_frost-sullivan_a-new-mobilty_ps

  1. 1. The New Mobility
  2. 2. Speakers Sarah Howland, Editor‐In‐Chief Field Technologies Magazine Martha Vazquez, Industry Analyst Frost & Sullivan Andy Willett, Senior Vice President NetMotion Wireless 2
  3. 3. Global Mobile VPN Products Market: The New Mobility: How Mobile Applications and Devices are Changing Your Business. Martha Vazquez, Industry Analyst Network Security June 17, 2012© 2012 Frost & Sullivan. All rights reserved. This document contains highly confidential information and is the sole property ofFrost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan.
  4. 4. Today’s Presenter Functional Expertise • Experience in market research, consulting sales and business development with expertise in the Information Communications and Technology Network Security sector. • Developing research and analysis in the Network Security industry in areas such as: - Technology and Demand Trends - Market Sizing - Market Forecasting and Strategic Analysis Industry Expertise  Experience base in the information communication technologies sector, leveraging long-standing working relationships with leading industry participants’ Senior Executives - Mobile SecurityMartha Vazquez - Endpoint SecurityIndustry Analyst - Managed Security Service Providers (MSSPs) - Content FilteringFrost & Sullivan What I bring to the TeamNorth America  Expertise in managing executive level relationshipsSan Antonio, TX  In-depth understanding of the network security market  Experience in understanding market trends and forecasting Career Highlights  Sales Consultant in several leading Wireless firms: - AT&T - Verizon Wireless Education • Master of Business Administration from Our Lady of the Lake University, San Antonio, Texas • Bachelor of Science from Texas State University, San Marcos, Texas 4
  5. 5. Focus Points• The rise in mobile field workers• The needs and challenges for the remote worker• The evolving security landscape• Security solutions used to support the mobile field worker• Defining a Mobile VPN• The future outlook for the Mobile VPN market• The Last Word 5
  6. 6. Poll Question• What is the status of your mobile security strategy in place? 1. In place today 2. Don’t have one and are assessing what to do. 3. To be completed in 3 months 4. To be completed in 6 months• Do you believe that remote workers threaten your corporate environment? 1. Yes, we need to ensure employees securely access our network 2. No, we don’t believe the threat is significant 6
  7. 7. The Rise in Mobile Field Workers Proliferation of Wireless Devices Source: Frost & Sullivan analysis 7
  8. 8. The needs and challenges for the remote worker Mobile VPN Market: Key Market Drivers and Restraints Global, 2011-2020 Increase in advanced and complex threats drives 1-2 years 3-5 years 6-10 years demand for Mobile VPN solutions to help manage security on wireless devicesMarket Drivers Use of mobile or wireless devices within organizations drives the demand for Mobile VPN solutions Compliance regulations requires organizations to implement products such as mobile VPNs Need for remote accessibility drives the need for secure and continuous access to critical data Budget Concerns due to the global 2011/12 economic slowdown impacts the purchase ofMarket Restraints mobile VPN solutions The need to support multiple operating systems slows down mobile VPN development and sales Customer confusion about the importance of mobile security solutions delays spending on products including mobile VPNs Impact: High Medium Low Source: Frost & Sullivan analysis. 8
  9. 9. The Evolving Threat Landscape *Malware-as-a-Service (MaaS) Malware becomes more sophisticated over time, while malware tools emerge as a popular commodity. APT & *MaaS Mobile Malware Trojans, Botnets, Root kits (Zeus)2006 2011 Beyond 2012 Source: Frost & Sullivan analysis 9
  10. 10. Security solutions that support the remote worker Mobile VPN Anti-malware Application and Content Security Device Control Central Management Data Loss Network Access Prevention Control Complete Mobile Security Solution Source: Frost & Sullivan analysis 10
  11. 11. Defining a Mobile VPN• A Mobile VPN is defined as a specific type of VPN that is based on security standards such as Mobile IP, IPSec or SSL but us built for wireless or mobile coverage. o Security o Session Persistence o Application Persistence o Network Transparency o Bandwidth Optimization Source: Frost & Sullivan analysis 11
  12. 12. Global Mobile VPN Market Key Takeaway: An increase in using wireless devices will fuel revenue growth through 2016 Source: Frost & Sullivan analysis 12
  13. 13. Global Mobile VPN Market Key Takeaway: The highest penetration rates are expected to come from Cisco, Juniper, and NetMotion Wireless Competitor Growth Analysis Total Mobile VPN Products Market: Global, 2010 Growth rate 2009-2010 Juniper Cisco Networks NetMotion Wireless IBM Smith Micro Software Birdstep Radio IP Technologies Check Point Software Technologies Columbitech Revenue ($ Million) > 10% growth 10-20% Growth > 20% Growth Note: Bubble size represents relative capitalization. The base year is 2010. Source: Frost & Sullivan analysis.<N9B3-74> 13
  14. 14. The Future Outlook for the Mobile VPN Market As the need for mobile device security continues to increase, the mobile 1 VPN market will experience a healthy CAGR of 18.4 percent The value of the mobile VPN market is expected to reach $522M by 2 2017. Demand for mobile VPN technologies is increasing as businesses adopt 3 more mobile devices. Mobile VPN will be integrated into security solutions suites and will not 4 remain a separate product. Adoption in the mobile VPN market remains high for telecoms and 5 government markets. Source: Frost & Sullivan analysis.<N9B3-74> 14
  15. 15. For Additional Information Mireya Espinoza Martha Vazquez Global Director Industry Analyst Corporate Communications Network Security- ICT (210) 247-3870 (210) 247-3864 Jennifer Bates Craig Hays Director of Consulting VP of Sales, North America Information and Communication Information and Communications Technologies Technologies (940) 455-7475 (210)247-2460<N9B3-74> 15
  16. 16. The New MobilityAndy Willet, SVP, NetMotion Wireless
  17. 17. Agenda Background Common Challenges to Mobile Deployments Considerations for Mobile VPN Software Q&A 17
  18. 18. Background NetMotion Wireless • Based in Seattle, WA • Software provider focused  on challenges of mobile field  workers and wireless Andy Willett • 11 years at NetMotion  Wireless • 11 years at AT&T Wireless  and Sprint Wireless 18
  19. 19. Common Challenges to Mobile DeploymentsFor Mobile Workers:  • Frequent log‐ins, coverage drops  hurts productivity ▪ Time taken away from project ▪ Drain on IT helpdesk Case Study: Regional Public Utility ▪ Application crashes The math added up: • Complexity of technology leads to  • ~ 200 field workers low adoption • ~ 1 hour per day troubleshooting ▪ Field workers revert to old methods connectivity issues/re-logins ▪ Solution too complex • Multiplied by hourly rate • Added to IT helpdesk requests • Equaled large amounts of lost productivity each day 7/23/2012 19
  20. 20. Common Challenges to Mobile DeploymentsFor IT Managers:  • Limited visibility, management and  control into mobile workforce  activities and devices ▪ Limited control of data access while  mobile ▪ Limited insight into bandwidth drains ▪ No application control • Limited control over at‐risk data and  anti‐virus support ▪ Users and networks at greater risk ▪ Limited ability to enforce policies ▪ Limited control over device upgrades 7/23/2012 20
  21. 21. Considerations for Mobile VPN Software Management • Centralized web‐based console • Granular view into all devices and usage • Ability to generate historical reports Security • Advanced encryption and authentication • Ability to quarantine, verify, and control  devices and applications • Ability to create and enforce security policies Productivity • Low complexity, single sign‐on • Application persistence through suspend • Optimization of bandwidth and connections
  22. 22. Summary  Overcoming Common Challenges • Dropped coverage, application freezes hurt productivity • Limited visibility into workforce activities limits policy control • Lack of application level data control creates security risks Requirements you Need • Create granular visibility into your mobile workforce  activities with Management tools • Ensure seamless roaming coverage to increase Productivity • Get complete application level control of data in transit  with stringent Security coverage  227/23/2012
  23. 23. Q&A
  24. 24. More Information… (866) 262-7626 7/23/2012 24
  25. 25. Thank You