Analysis of the Global Mobile Endpoint Protection Market

Analysis of the Global Mobile Endpoint Protection Market

Mass Smartphone Adoption Increases Risk and Drives Demand for Innovative Security Products

RELEASE DATE
31-Oct-2013
REGION
Global
Research Code: NC9E-01-00-00-00
SKU: IT00691-GL-MR_01918
AvailableYesPDF Download

$4,950.00

Special Price $3,712.50 save 25 %

In stock
SKU
IT00691-GL-MR_01918

$4,950.00

$3,712.50save 25 %

DownloadLink
ENQUIRE NOW

Description

The mobile security challenge is complex and multi-faceted. Mobile devices can be infected by malicious software called malware, enabling hackers to gain access or control. Mobile applications (simply called “apps”) on the device can perform unwanted, high-risk actions. Sensitive data stored on the device can also be lost or stolen. This study focuses on mobile endpoint protection products designed to secure the device against malware, cyber attacks, high risk applications, and physical loss or theft.

Table of Contents

Executive Summary

Executive Summary (continued)

Executive Summary—Market Engineering Measurements

Executive Summary—Market Engineering Measurements (continued)

Executive Summary—CEO’s Perspective

Market Overview—Definitions

Market Overview—Definitions (continued)

Market Overview—Definitions (continued)

Market Overview—Definitions (continued)

Market Overview—Definitions (continued)

Market Overview—Key Questions This Study Will Answer

Market Overview—Distribution Channels

Market Overview—Distribution Channel Discussion

Drivers and Restraints

Drivers Explained

Drivers Explained (continued)

Drivers Explained (continued)

Drivers Explained (continued)

Restraints Explained

Restraints Explained (continued)

Restraints Explained (continued)

Restraints Explained (continued)

Forecast Assumptions

Total Mobile Endpoint Protection Market—Unit Shipment and Revenue Forecast

Unit Shipment and Revenue Forecast Discussion

Total Mobile Endpoint Protection Market—Pricing Trends and Forecast

Pricing Trends and Forecast Discussion

Total Mobile Endpoint Protection Market—Percent Revenue Forecast by Region

Regional Percent Revenue Forecast Discussion

Total Mobile Endpoint Protection Market—Percent Revenue Forecast by Distribution Channel

Distribution Channel Discussion

Total Mobile Endpoint Protection Market—Demand Analysis

Demand Analysis Discussion

Competitive Analysis—Market Share

Competitive Environment

Competitive Factors and Assessment

Competitive Landscape

Business Segment Breakdown

Business Segment—Market Engineering Measurements

Business Segment—Unit Shipment and Revenue Forecast

Business Segment—Unit Shipment and Revenue Forecast Discussion

Business Segment—Pricing Trends and Forecast

Business Segment—Pricing Trends and Forecast Discussion

Business Segment—Percent Revenue Forecast by Distribution Channel

Business Segment—Distribution Channel Discussion

Business Segment—Market Share

Business Segment—Competitive Environment

Business Segment—Competitive Factors and Assessment

Business Segment—Competitive Landscape

Consumer Segment Breakdown

Consumer Segment—Market Engineering Measurements

Consumer Segment—Unit Shipment and Revenue Forecast

Consumer Segment—Unit Shipment and Revenue Forecast Discussion

Consumer Segment—Pricing Trends and Forecast

Consumer Segment—Pricing Trends and Forecast Discussion

Consumer Segment—Percent Revenue Forecast by Distribution Channel

Consumer Segment—Distribution Channel Discussion

Consumer Segment—Market Share

Consumer Segment—Competitive Environment

Consumer Segment—Competitive Factors and Assessment

Consumer Segment—Competitive Landscape

The Last Word—Three Big Predictions

The Last Word—Recommendations

Legal Disclaimer

Market Engineering Methodology

Market Engineering Measurements

Market Engineering Measurements (continued)

Additional Sources of Information on Network Security

Partial List of Companies Interviewed

List of Companies Included in “Others”

Learn More—Next Steps

Vendor Profile—ESET

Vendor Profile—Webroot

Vendor Profile—McAfee

Vendor Profile—Kaspersky

Vendor Profile—Symantec

Vendor Profile—Sourcefire

Vendor Profile—Juniper

Vendor Profile—Sophos

Vendor Profile—Lookout

Vendor Profile—F-Secure

Related Research
The mobile security challenge is complex and multi-faceted. Mobile devices can be infected by malicious software called malware, enabling hackers to gain access or control. Mobile applications (simply called apps) on the device can perform unwanted, high-risk actions. Sensitive data stored on the device can also be lost or stolen. This study focuses on mobile endpoint protection products designed to secure the device against malware, cyber attacks, high risk applications, and physical loss or theft.
More Information
No Index No
Podcast No
Author Chris Rodriguez
Industries Information Technology
WIP Number NC9E-01-00-00-00
Is Prebook No