Mobile security can be defined as the means by which mobile devices such as smartphones, tablets, laptops and others can authenticate users and protect or restrict access to data stored on these devices. This can be done with the use of passwords, personal identification numbers (PINs), pattern screen locks or more advanced forms of authentication such as fingerprint readers, eye scanners and other forms of biometric readers. Advancement in technology in mobile device market concerning storage, performance, application, capability or internet connectivity have tremendously increased over the past few years. Together with its wide range of uses, it has also fostered a growing need for better security and integrity solutions. Research Beam Model: Research Beam Product ID: 248277 3390 USD New
Mobile Security Asia-Pacific Market 2014 - 2020 : Research Beam
 
 

Mobile Security Asia-Pacific Market Research Report, 2014 - 2020

  • Category : ICT & Media
  • Published On : March   2016
  • Pages : 146
  • Publisher : Allied Market Research
 
 
 

Mobile security can be defined as the means by which mobile devices such as smartphones, tablets, laptops and others can authenticate users and protect or restrict access to data stored on these devices. This can be done with the use of passwords, personal identification numbers (PINs), pattern screen locks or more advanced forms of authentication such as fingerprint readers, eye scanners and other forms of biometric readers. Advancement in technology in mobile device market concerning storage, performance, application, capability or internet connectivity have tremendously increased over the past few years. Together with its wide range of uses, it has also fostered a growing need for better security and integrity solutions. Mobile security threats include both physical and software-based threats that can compromise the data stored in smartphones, tablets and other mobile devices. Thus, various security software and hardware solutions such as authentication security, mobile application management and data protection software have been developed by companies. The introduction of BYOD (Bring your own device) policy in various organizations, increasing use of smartphones for conducting day-to-day transactions, rising trend of IoT (Internet of Things), need for data protection and favorable government regulations are major factors triggering the market growth. On the other hand, availability of pirated solutions in the market, deployment cost involved and lack of awareness regarding mobile security systems are likely to restrain the market growth.

On the basis of solutions, Asia-Pacific mobile security market is segmented into authentication, mobile application management and mobile data protection. On the basis of types, the market is segmented into email security and anti-virus. The mobile security market, based on various operating systems is categorized into Android, iOS, Windows, Blackberry and others. Based on the end users, the industry is segmented into individual and enterprise users. Enterprise users segment is further segmented into financial institutions, retail, government, telecommunication and IT, education, manufacturing. automotive, aerospace, defense and intelligence and others. Geographically, the market is segmented into India, Japan, China, Singapore and others (Australia, New Zealand and South Korea).Leading players and their key business strategies have been analyzed in the report in order to gain a competitive insight into the market. Key players covered in the report include IBM, Symantec Corporation, Kaspersky Lab, VMware Inc., Microsoft Corporation, Google Inc. and others.

KEY BENEFITS

  • The study provides an in-depth analysis of the mobile security market in Asia-Pacific region with current and future trends to elucidate the imminent investment pockets in the market
  • Current and future trends have been outlined to determine the overall attractiveness and to single out profitable trends to gain a stronger foothold in the market
  • The report provides information regarding key drivers, restraints and opportunities with impact analysis
  • Quantitative analysis of the current market and forecast during the period of 20152020 have been provided to highlight the financial appetency of the market
  • Porters five forces model analysis of the industry illustrates the potency of buyers and suppliers participating in the market
  • Value chain analysis in the report provides clear understanding of the roles of stakeholders involved in the value chain

MOBILE SECURITY APAC MARKET KEY SEGMENTATION

By Solution

  • Authentication
  • Mobile data protection
  • Mobile application management

By Type

  • E-mail
  • Anti-Virus

By OS

  • Blackberry
  • Android
  • iOS
  • Windows
  • Others

By End Users

  • Individuals
  • Enterprises
    • Retail
    • Telecommunication & IT
    • Financial Institutions
    • Education
    • Government
    • Aerospace & Defense
    • Manufacturing & Automotive
    • Others

By Geography

  • India
  • Japan
  • China
  • Singapore
  • Others (Australia, New Zealand and South Korea)

Key Players

  • International Business Machines (IBM) Corporation
  • MobileIron
  • Symantec Corporation
  • Kaspersky Lab
  • VMware Inc.
  • innoPath Software
  • Microsoft Corporation
  • Apple Inc.
  • Intel Corporation,
  • Google Inc.

Table of Contents

CHAPTER 1 INTRODUCTION

1.1 Report description
1.2 Key benefits
1.3 Key market segmentation
1.4 Research methodology
1.4.1 Secondary research
1.4.2 Primary research
1.4.3 Analyst tools and models

CHAPTER 2 EXECUTIVE SUMMARY

2.1 Executive summary
2.2 CXO perspective
2.3 Market beyond: what to expect by 2025
2.3.1 Base case scenario
2.3.2 Optimistic scenario
2.3.3 Critical scenario

CHAPTER 3 MARKET OVERVIEW

3.1 Market definition and scope
3.2 Key findings
3.2.1 Top factors impacting mobile security market
3.2.2 Top investment pockets
3.2.3 Top winning strategies in the mobile security market
3.2.3.1 Mergers and acquisitions
3.2.3.2 Product innovation
3.2.3.3 Product launch
3.2.3.4 Partnerships and collaborations
3.2.3.5 Expansion in foreign markets
3.3 Porters five force analysis
3.3.1 Large number of suppliers present in market, threat of backward integration of buyer and undifferentiated products reduce the bargaining power of supplier
3.3.2 Low switching cost and buyers capable of designing their own security solutions increases the bargaining power of buyers
3.3.3 Lack of availability of substitute that can replace mobile security solutions lowers the threat of substitution
3.3.4 Low threat of new entrants due to large presence of players offering similar product features at low costs
3.3.5 Numerous competitors, undifferentiated products and low switching cost increase the rivalry within the industry
3.4 Value chain analysis
3.5 Market share analysis, 2014
3.6 Case study
3.7 Market dynamics:
3.7.1 Drivers
3.7.1.1 Increasing adoption of BYOD (Bring Your Own Device)
3.7.1.2 Increasing penetration of smartphones
3.7.1.3 The rising trend of Internet-of-Things (IoT)
3.7.1.4 Government regulations contribute to the growth of APAC mobile security market
3.7.2 Restraints
3.7.2.1 Costs involved in deploying mobile security solutions
3.7.2.2 Easy availibility of pirated solutions
3.7.2.3 Lack of awareness about the available mobile security systems
3.7.3 Opportunities
3.7.3.1 Usage of smartwatches
3.7.3.2 Adoption of cloud computing
3.7.3.3 Usage of BCI technology

CHAPTER 4 BY SOLUTION

4.1 Authentication
4.1.1 Key market trends
4.1.2 Key growth factors and opportunities
4.1.3 SIM (Subscriber Identity Module) card authentication
4.1.4 Market size and forecast
4.2 Mobile application management
4.2.1 Key market trends
4.2.2 Key growth factors and opportunities
4.2.3 Market size and forecast
4.3 Mobile data protection
4.3.1 Key market trends
4.3.2 Key growth factors and opportunities
4.3.3 Firewall
4.3.4 Market size and forecast

CHAPTER 5 BY END USER

5.1 Individual users
5.1.1 Market size and forecast
5.2 Enterprise users
5.2.1 Market size and forecast
5.2.2 Financial institutions
5.2.2.1 Market size and forecast
5.2.3 Retail
5.2.3.1 Market size and forecast
5.2.4 Government
5.2.4.1 Market size and forecast
5.2.5 Telecommunication & IT
5.2.5.1 Market size and forecast
5.2.6 Education
5.2.6.1 Market size and forecast
5.2.7 Manufacturing and Automotive
5.2.7.1 Market size and forecast
5.2.8 Aerospace, Defence and Intelligence
5.2.8.1 Market size and forecast
5.2.9 Others
5.2.9.1 Market size and forecast

CHAPTER 6 BY TYPES

6.1 E-mail
6.1.1 Key market trends
6.1.2 Key growth factors and opportunities
6.1.3 Market size and forecast
6.2 Antivirus
6.2.1 Key market trends
6.2.2 Key growth factors and opportunities
6.2.3 Malware removal
6.2.4 Market size and forecast

CHAPTER 7 BY OPERATING SYSTEM

7.1 iOS
7.1.1 Key market trends
7.1.2 Key growth factors and opportunities
7.1.3 Market size and forecast
7.2 Android
7.2.1 Key market trends
7.2.2 Key growth factors and opportunities
7.2.3 Market size and forecast
7.3 Windows
7.3.1 Key market trends
7.3.2 Key growth factors and opportunities
7.3.3 Market size and forecast
7.4 Blackberry
7.4.1 Key market trends
7.4.2 Key growth factors and opportunities
7.4.3 Market size and forecast
7.5 Others
7.5.1 Key market trends
7.5.2 Key growth factors and opportunities
7.5.3 Market size and forecast

CHAPTER 8 BY GEOGRAPHY

8.1 India
8.1.1 Key market trends
8.1.2 Competitive scenario
8.1.3 Key growth factors and opportunities
8.1.4 Market size and forecast
8.2 Japan
8.2.1 Key market trends
8.2.2 Competitive scenario
8.2.3 Key growth factors and opportunities
8.2.4 Market size and forecast
8.3 China
8.3.1 Key market trends
8.3.2 Competitive scenario
8.3.3 Key growth factors and opportunities
8.3.4 Market size and forecast
8.4 Singapore
8.4.1 Key market trends
8.4.2 Competitive scenario
8.4.3 Key growth factors and opportunities
8.4.4 Market size and forecast
8.5 Others (Australia, New Zealand and South Korea)
8.5.1 Key market trends
8.5.2 Competitive scenario
8.5.3 Key growth factors and opportunities
8.5.4 Market size and forecast

CHAPTER 9 COMPANY PROFILE

9.1 INTERNATIONAL BUSINESS MACHINES (IBM) Corporation
9.1.1 Company overview
9.1.2 Company snapshot
9.1.3 Business performance
9.1.4 Strategic moves and developments
9.1.5 SWOT analysis and strategic conclusion of IBM Corporation
9.2 MobileIron
9.2.1 Company overview:
9.2.2 Company snapshot
9.2.3 Business performance
9.2.4 Strategic moves and developments
9.2.5 SWOT analysis and strategic conclusion of MobileIron Corporation
9.3 Symantec Corporation
9.3.1 Company overview
9.3.2 Company snapshot
9.3.3 Business performance
9.3.4 Strategies moves and developments
9.3.5 SWOT analysis and strategic conclusion of Symantec Corporation
9.4 Kaspersky Lab
9.4.1 Company overview
9.4.2 Company snapshot
9.4.3 Strategies moves and developments
9.4.4 SWOT analysis and strategic conclusion of Kaspersky Lab
9.5 VMware Inc.
9.5.1 Company overview
9.5.2 Company snapshot
9.5.3 Business performance
9.5.4 Strategic moves and developments
9.5.5 SWOT analysis and strategic conclusion of VMware Inc.
9.6 innoPath Software
9.6.1 Company overview
9.6.2 Company snapshot
9.6.3 Business performance
9.6.4 Strategic moves and developments
9.6.5 SWOT analysis and strategic conclusion of innoPath Software
9.7 MICROSOFT CORPORATION
9.7.1 Company overview
9.7.2 Company snapshot
9.7.3 Business performance
9.7.4 Strategies moves and developments
9.7.5 SWOT analysis and strategic conclusion of Microsoft Corporation
9.8 Apple Inc.
9.8.1 Company overview
9.8.2 Company snapshot
9.8.3 Business performance
9.8.4 Strategic moves and developments 
9.8.5 SWOT analysis and strategic conclusion of Apple Inc.
9.9 Intel Corporation
9.9.1 Company overview
9.9.2 Company snapshot
9.9.3 Business performance
9.9.4 Strategic moves and developments
9.9.5 SWOT analysis and strategic conclusion of Intel Corporation
9.10 GOOGLE INC.
9.10.1 Company overview
9.10.2 Company snapshot
9.10.3 Business performance
9.10.4 Strategic moves and developments
9.10.5 SWOT analysis and strategic conclusion of Google Inc.

List of Figures

FIG. 1 TOP IMPACTING FACTORS, BASE CASE SCENARIO (2020-2025)
FIG. 2 TOP IMPACTING FACTORS, OPTIMISTIC CASE SCENARIO (2020-2025)
FIG. 3 TOP IMPACTING FACTORS, CRITICAL CASE SCENARIO (2020-2025)
FIG. 4 TOP IMPACTING FACTORS
FIG. 5 TOP INVESTMENT POCKETS
FIG. 6 TOP WINNING STRATEGIES
FIG. 7 PORTERS FIVE FORCE ANALYSIS
FIG. 8 VALUE CHAIN ANALYSIS OF MOBILE SECURITY MARKET
FIG. 9 MARKET SHARE ANALYSIS, 2014
FIG. 10 USER AUTHENTICATION TYPES
FIG. 11 MOBILE APPLICATION MANAGEMENT CYCLE
FIG. 12 MOBILE APPLICATION MANAGEMENT TYPES
FIG. 13 FIREWALL PROTECTION
FIG. 14 MOBILE DEVICE USAGE BY AGE GROUP
FIG. 15 EMAIL SECURITY PROCESS
FIG. 16 ANTI-VIRUS FUNCTIONS
FIG. 17 REVENUE OF IBM CORPORATION, 2012-2014, $MILLION
FIG. 18 REVENUE OF IBM CORPORATION, BY BUSINESS SEGMENT (%), 2014
FIG. 19 REVENUE OF IBM CORPORATION, BY GEOGRAPHY (%), 2014
FIG. 20 SWOT ANALYSIS OF IBM CORPORATION
FIG. 21 REVENUE OF MOBILEIRON, 2012-2014, $MILLION
FIG. 22 REVENUE OF MOBILEIRON, BY GEOGRAPHY (%), 2014
FIG. 23 SWOT ANALYSIS OF MOBILEIRON
FIG. 24 REVENUE OF SYMANTEC CORPORATION, 2012-2014, $MILLION
FIG. 25 REVENUE OF SYMANTEC CORPORATION, BY BUSINESS SEGMENT (%), 2014
FIG. 26 REVENUE OF SYMANTEC CORPORATION, BY GEOGRAPHY (%), 2014
FIG. 27 SWOT ANALYSIS OF SYMANTEC CORPORATION
FIG. 28 SWOT ANALYSIS OF KASPERSKY LAB
FIG. 29 REVENUE OF VMWARE INC., 2012-2014, $MILLION
FIG. 30 REVENUE OF VMWARE INC., BY BUSINESS SEGMENT (%), 2014
FIG. 31 REVENUE OF VMWARE INC., BY GEOGRAPHY (%), 2014
FIG. 32 SWOT ANALYSIS OF VMWARE INC.
FIG. 33 SWOT ANALYSIS OF INNOPATH SOFTWARE
FIG. 34 REVENUE OF MICROSOFT CORPORATION, 2012-2014, $MILLION
FIG. 35 REVENUE OF MICROSOFT CORPORATION, BY BUSINESS SEGMENT (%), 2014
FIG. 36 REVENUE OF MICROSOFT CORPORATION, BY GEOGRAPHY (%), 2014
FIG. 37 SWOT ANALYSIS OF MICROSOFT CORPORATION
FIG. 38 REVENUE OF APPLE INC., 2012-2014, $MILLION
FIG. 39 REVENUE OF APPLE INC., BY BUSINESS SEGMENT (%), 2014
FIG. 40 SWOT ANALYSIS OF APPLE INC.
FIG. 41 REVENUE OF INTEL CORPORATION, 2012-2014, $MILLION
FIG. 42 REVENUE OF INTEL CORPORATION BY BUSINESS SEGMENT (%), 2014
FIG. 43 REVENUE OF INTEL CORPORATION, BY GEOGRAPHY (%), 2014
FIG. 44 SWOT ANALYSIS OF INTEL CORPORATION
FIG. 45 REVENUE OF GOOGLE INC., 2012-2014, $ MILLION
FIG. 46 REVENUE OF GOOGLE INC., BY GEOGRAPHY (%), 2014
FIG. 47 SWOT ANALYSIS OF GOOGLE INC.

List of Tables

TABLE 1 APAC MOBILE SECURITY MARKET BY GEOGRAPHY 2014 – 2020 ($ MILLION)
TABLE 2 APAC MOBILE SECURITY MARKET, BASE CASE SCENARIO, 2020-2025 ($MILLION)
TABLE 3 APAC MOBILE SECURITY MARKET, OPTIMISTIC CASE SCENARIO, 2020-2025 ($MILLION)
TABLE 4 APAC MOBILE SECURITY MARKET, CRITICAL CASE SCENARIO, 2020-2025 ($MILLION)
TABLE 5 APAC MOBILE SECURITY MARKET BY SOLUTION, 2014 – 2020 ($ MILLION)
TABLE 6 APAC MOBILE SECURITY AUTHENTICATION SOLUTION MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 7 APAC MOBILE SECURITY MOBILE APPLICATION MANAGEMENT MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 8 APAC MOBILE SECURITY MOBILE DATA PROTECTION MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 9 FIREWALL PROTECTION STATISTICS
TABLE 10 APAC MOBILE SECURITY MARKET BY END USER, 2014 – 2020 ($ MILLION)
TABLE 11 APAC MOBILE SECURITY INDIVIDUAL USER MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 12 APAC MOBILE SECURITY ENTERPRISE USER MARKET BY END-USER, 2014 – 2020 ($ MILLION)
TABLE 13 APAC MOBILE SECURITY FINANCIAL INSTITUTION MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 14 APAC MOBILE SECURITY RETAIL MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 15 APAC MOBILE SECURITY GOVERNMENT MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 16 APAC MOBILE SECURITY TELECOMMUNICATION & IT MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 17 APAC MOBILE SECURITY EDUCATION MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 18 APAC MOBILE SECURITY MANUAFCTURING AND AUTOMOTIVE MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 19 APAC MOBILE SECURITY AEROSPACE, DEFENSE AND INTELLIGENCE MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 20 APAC MOBILE SECURITY OTHERS MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 21 APAC MOBILE SECURITY MARKET BY TYPES, 2014 – 2020 ($ MILLION)
TABLE 22 APAC MOBILE SECURITY EMAIL MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 23 APAC MOBILE SECURITY ANTIVIRUS MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 24 APAC MOBILE SECURITY MARKET BY OPERATING SYSTEM, 2014 – 2020 ($ MILLION)
TABLE 25 APAC MOBILE SECURITY IOS MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 26 APAC MOBILE SECURITY ANDROID MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 27 APAC MOBILE SECURITY WINDOWS MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 28 APAC MOBILE SECURITY BLACKBERRY MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 29 APAC MOBILE SECURITY OTHER OS MARKET BY GEOGRAPHY, 2014 – 2020 ($ MILLION)
TABLE 30 APAC MOBILE SECURITY MARKET BY COUNTRY, 2014 – 2020 ($ MILLION)
TABLE 31 INDIA MOBILE SECURITY MARKET BY SOLUTION, 2014 – 2020 ($ MILLION)
TABLE 32 JAPAN MOBILE SECURITY MARKET BY SOLUTION, 2014 – 2020 ($ MILLION)
TABLE 33 CHINA MOBILE SECURITY MARKET BY SOLUTION, 2014 – 2020 ($ MILLION)
TABLE 34 SINGAPORE MOBILE SECURITY MARKET BY SOLUTION, 2014 – 2020 ($ MILLION)
TABLE 35 OTHERS MOBILE SECURITY MARKET BY SOLUTION, 2014 – 2020 ($ MILLION)
TABLE 36 IBM CORPORATION SNAPSHOT
TABLE 37 MOBILEIRON COMPANY SNAPSHOT
TABLE 38 SYMANTEC CORPORATION SNAPAHOT
TABLE 39 KASPERSKY LAB SNAPSHOT
TABLE 40 VMWARE INC. SNAPSHOT
TABLE 41 INNOPATH COMPANY SNAPSHOT
TABLE 42 MICROSOFT CORPORATION COMPANY SNAPSHOT
TABLE 43 APPLE INC SNAPSHOT
TABLE 44 INTEL CORPORATION SNAPSHOT
TABLE 45 GOOGLE INC. SNAPSHOT

PURCHASE OPTIONS
 
 

How can we help you?

Contact us at the Consulting WP office nearest to you or submit a business inquiry online.


  Contact
 

Subscribe to Our Newsletter

 
 
REQUEST SAMPLE    ASK FOR DISCOUNT