Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

7/24/2012
08:45 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Analysis Of The Mobile Endpoint Security Products Market

Report examines drivers and restraints for growth, pricing, distribution, and demand

NEW YORK, July 24, 2012 /PRNewswire/ -- Reportlinker.com announces that a new market research report is available in its catalogue:

Analysis of the Mobile Endpoint Security Products Market http://www.reportlinker.com/p0936212/Analysis-of-the-Mobile-Endpoint-Security-Products-Market.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=Wireless_Technology

The explosion of mobile devices has drastically changed how end users are accessing data and communicating today while quickly becoming alternative vectors for spreading malware or other malicious threats. This research service covers the global mobile endpoint security products market. It examines drivers and restraints for growth, pricing, distribution and demand. Additionally, the study contains an in-depth analysis of the competitive situation, including vendors' market shares and profiles of the key vendors in the industry. The market is further divided into the following three segments: consumer, midsize, and enterprise. The base year is 2011, and forecasts run through 2016.

Executive Summary

-- Smartphones and other mobile devices are quickly replacing traditional desktop and laptop machines. According to Frost & Sullivan, the global smartphone and tablet market reached X million units in 2011. -- As smartphones and tablets continue to proliferate in the consumer and business segments, security is becoming more of a crucial necessity for mobile devices. Hackers are now targeting smartphone mobile devices for spreading mobile malware. -- The Android operating system (OS) open application (app) market space makes malware very easy for hackers to distribute. According to Juniper Networks, in 2011 the vast majority of mobile malware was related to Symbian OS and Java ME OS devices and this is now shifting towards Android malware. -- The market for smartphones and tablets is growing specifically the for the Android system. In 2011, the Android smartphone market reached X percent of the global OS market, beating out the traditional Symbian and BlackBerry market. -- With the growth of the Android market, these devices are now being adopted into the corporate space and introducing new security risks for IT managers. -- Additionally, a new trend of bring your own device (BYOD) creates many more security risks for IT managers because end users now utilize their mobile devices to access corporate data. -- This increased use of mobile devices is expected to increase purchase in the mobile endpoint security market through 2016. As a result, the mobile endpoint security market is poised to reach $ X billion by 2016. -- The market is in a growth stage, reaching $ X million in 2011 with a compound annual growth rate (CAGR) of percent. -- The business market is quickly realizing the need for managing and protecting the various number of mobile devices entering the corporate network. -- Vendors are adapting and responding to the trend of a growing amount of mobile and tablet devices entering the market by launching a breadth of mobile security products. -- The trend of BYOD continues to create new challenges for endpoint security vendors, creating the need for vendors to consolidate and acquire mobile device management (MDM) providers Executive Summary Market Overview Total Mobile Endpoint Security Products Market

-- External Challenges: Drivers and Restraints -- Forecasts and Trends -- Market Share and Competitive Analysis Consumer Segment Breakdown Midsize Segment Breakdown Enterprise Segment Breakdown The Last Word Appendix

To order this report: Wireless Technology Industry: Analysis of the Mobile Endpoint Security Products Market

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
The Data-Centric Path to Zero Trust
Altaz Valani, Director of Insights Research, Security Compass,  1/13/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).