Mobile Device and Network Security Market Assessment

The Mobile Device & Network Security Bible: 2013-2020

SNS Research, Date of Publication: Sep 3, 2013, 284 Pages
US$2,500.00
SNS47

Mobile networks around the globe generate more than 50 Exabytes of traffic annually. The immense volume of traffic together with the growing adoption of open source Operating System (OS) platforms such as Android has opened up new security threats. Mobile malware, SMS spam, cyber attacks and unlawful eavesdropping are an ever-increasing problem for enterprises, consumers and mobile network operators around the globe.

This has in turn led to significant investments in integrated security appliances and content security gateways by both enterprises and mobile network operators,  besides opening doors for emerging submarkets such as mobile Security as a Service (SEaaS).

On the devices front, installation of Anti-Malware/Anti-Virus client software is fast becoming a de-facto requirement for most smartphones and tablets. Furthermore, mobile device OEMs are also integrating advanced biometrics such as fingerprint sensing into their smartphones and tablets, amid growing popularity of security sensitive opportunities such as mobile payments.

Driven by the thriving ecosystem, our research estimates that mobile device and network security investments will account for nearly $9 Billion in 2013 alone. The market is further expected to grow at a CAGR of nearly 21% over the next 7 years.

This report presents in-depth assessment of the global mobile device and network security market, and covers four individual submarkets. In addition to covering key market drivers, challenges, future roadmap, value chain analysis, deployment case studies and vendor service/product strategies for each submarket, the report also presents comprehensive forecasts for the mobile device and network security market from 2013 till 2020. Historical revenue figures for 2010 – 2012 are also presented. The forecasts and historical revenue figures are individually segmented for four submarkets, 17 product/service categories, six geographical regions and 34 countries.

The report comes with an associated Excel datasheet covering quantitative data from all figures presented within the report.


The report covers the following topics:

• An in-depth analysis for four individual submarkets and their associated product/service categories: Mobile Network Infrastructure Security Software & Appliances, Mobile Device Client Security Software, Mobile Device Security Hardware and Mobile Security & MDM Services
• Value chain analysis for each submarket  
• Key market drivers and challenges for each submarket
• Key trends for each submarket
• Case studies on product/service deployment for each submarket
• Profiles and strategies of key players in the market
• Historical revenue figures and forecasts till 2020


Historical Revenue & Forecast Segmentation:

Market forecasts and historical revenue figures are provided for each of the following submarkets and their 17 product/service categories:

• Mobile Network Infrastructure Security Software & Appliances
 - Integrated Security Appliances (Hardware & Software)
 - Content Security Gateways
 - SMS/MMS Content Security Gateways

• Mobile Device Client Security Software
 - Anti-Malware/Anti-Virus Client Software
 - Back Up & Restore Software
 - Privacy Protection Software
 - Mobile VPN Client Software
 - Remote Locking Software
 - Remote Tracking Software
 - Encrypted Communications (Voice/Data) Software
 - Encrypted Storage Software

• Mobile Device Security Hardware
 - Semiconductors/Embedded Chip Security
 - NFC
 - Biometrics

• Mobile Security & MDM (Mobile Device Management) Services
 - On-premises Mobile Security MDM Services
 - Cloud Based Mobile SEaaS (Security as a Service)
 - Mobile Identity Management Services

The following regional and country markets are also covered:

• Regional Markets
 - Asia Pacific
 - Eastern Europe
 - Latin & Central America
 - Middle East & Africa
 - North America
 - Western Europe

• Country Markets
 - Argentina, Australia, Brazil, Canada, China, Czech Republic, Denmark, Finland, France, Germany,  India, Indonesia, Israel, Italy, Japan, Malaysia, Mexico, Norway, Pakistan, Philippines, Poland, Qatar, Russia, Saudi Arabia, Singapore, South Africa, South Korea, Spain, Sweden, Taiwan, Thailand, UAE, UK,  USA


Key Questions Answered:

• How big is the mobile device and network security market, and what particular submarkets does it constitute?
• Who are the key players in each submarket?
• How is the value chain structured for each submarket and how will it evolve overtime?
• Which regions and countries will witness the highest percentage of growth in mobile security spending?
• Will recent privacy scandals have a negative impact on mobile security spending in the coming years?
• What known malware families are most dangerous for modern smartphones?

Companies Mentioned

3M Cogent, aap3 inc, AccelOps, Accuvant, Actiance, AdaptiveMobile, Adtran, AEP, Afore, AhnLab, AirWatch, Akamai, Alcatel-Lucent, Alert Logic, Amazon, American Portwell Technology, Amtel, Anam, Andrisoft, Antiy, Anywr, AppBlade, Apple, AppRiver, Arbor Networks, Array Networks, Arxceo, Asus, AT&T, AuthenTec, Avanquest, Avast, AVG Technologies N.V, Avira, AV-TEST, Axiom Telecom, Barracuda Networks, Barrier Group, Bayometric, Beijing Venustech, Belgacom, Birdstep Technology, BitDefender, Bloove, Blue Coat, BlueCat Networks, Bluefire, Boxtone, Broadcomm, BroadWeb Corporation, Brocade, BullGuard, CA Technologies, Calyptix Security Corporation, Capita, CDW Corporation, Celestix Networks, Cellcrypt, Cellebrite, Cellulike, CelluSys, Centrify, CheckPoint Software Technologies, China Mobile, China Unicom, CipherCloud, Cisco Systems, Citrix, Clavister, Cloud Security Alliance, CloudLock, Cloudmark, Columbitech, Comcast, Commtouch, CommuniTake, Comodo, Core Security Technologies, Corero, CORISECIO, Credant, Cross Match Technologies, CrucialTec, Cryptzone, Cybera, Cyberoam, Damballa, DataViz, Dell, Dell SecureWorks, Dell Sonicwall, Deutsche Telekom, DeviceLock, DHILL, DIALOGS, Digital Defense, D-Link Corporation, Dr. Web, Echoworx, EdgeWave, eEye Digital Security, Elisa, EMC, Enterasys, Entrust, Ericsson, ESET, eSoft, European Network and Information Security Agency (ENISA), Excitor, EyeVerify, F5 Networks, Facebook, FancyFon, FFIEC, Fiberlink, FireHost, Fixmo, ForeScout, Fortinet, Foundation, F-Secure, Fujitsu, Fulcrum Biometerics, Futura Mobility, gateProtect, Gemalto, Genband, GenieNRM, Get Safe Online, Gigamon, Global DataGuard, Global Technology Associates, GlobalPlatform, GMSK, Good Technology, Google, GTA, Hewlett Packard (HP), Hitachi, HTC, Huawei, HyTrust, IBM, iboss, Imation, Imperva, Infineon, InnoPath Software, Inside Secure, Intel, Intrusion, Inc., Iris ID, ISACA, ISS, Juniper Networks, Kaspersky Lab, Kerio Technologies, Kindsight, KoolSpan, Kore Telematics, Korea Telecom (KT), KPN, Layer 7, Level Platforms, LG, Lionic, Lookout, Mahndra Comviva, ManageEngine, Mandiant, Marigold, Marble Security (Formerly IronKey), McAfee, Mformation, Microsoft, Microworld, Mobical, Mobile Active Defense, Mobile Application Development Partners, Mobile Idea Studio, MobileHome, MobileIron, MobileSpaces, Mocana, Motorola, Motorola Solutions, mSpy, Narus, National Institute of Standards and Technology (NIST), NCP engineering GmbH, Netasq, Netgear, Netmotion, Nevis Networks, NexusSafe, NFC Forum, Nokia, Nokia Solutions and Networks (NSN), Nominum, North Carolina State University, Northwestern University, Norton, NQ Mobile, NTT DoCoMo, NXP, OATH, Odyssey Software, Okta, Optenet, Optio Labs, Oracle, Orange (France Telecom), Palm, Palo Alto Networks, Panasonic, Panda Security, Pantech, PerspecSys, PGP Universal, Philips, Phone On Map, PineApp, Ping Identity, Pointsec, Prolexic, ProofPoint, PROTEI, Qualcomm, Qualys, QuickHeal, Radware, RBI, Renesas, Rerware, RIM, RioRey, RSA, SafeNet, Safran, Samsung Electronics, SanDisk, SAP, SecPoint, Secunia, Securitas, SecurStar, SharePoint, Silent Circle, SilverSky, SK Telecom, SkyHigh Telecom, SmithMicro Software, SmoothWall Ltd, Software Security Solutions, Sony, Sophos, Soti, Sourcefire, Spansion, SpyChest, SRA International, Stealth Genie, StillSecure, STMicroelectronics, Stonesoft, Sun Microsystems, SuperValu, Sybase, Symantec, Symplified, Symsoft, Tarmac, Tekelec (Oracle), Telecommunications Industry Association (TIA), Telefonica, Telenor, TeliaSonera, Telit, Telstra, Tenable, Thales, Thales e-Security, The Trusted Computing Group (TCG), TigerText, T-Mobile, Total Defense, Trend Micro, TRITON, Trust Digital, Trusteer, TrustGo, Trustlook, Trustwave, TurkCell, UMU, Untangle, Valimo, VeliQ, Veracode, Verisign, Verizon, Verizon Wireless, Vodafone, Voltage Security, Vormetric, WatchGuard Technologies, Wavelink, Webroot, Websense, Zenprise (now Citrix), Zscaler, ZTE, ZyXEL Communications

TABLE OF CONTENTS

Chapter 1: Introduction
Executive Summary
Topics Covered
Historical Revenue & Forecast Segmentation
Key Questions Answered
Key Findings
Methodology
Target Audience
Companies & Organizations Mentioned

Chapter 2: An Overview of the Mobile Device & Network Security Market
The Importance of Mobile Devices & Networks
Mobile Devices Outnumber PCs & Notebooks
Supporting a Plethora of Applications & Hardware Peripherals
Vulnerability to Attacks: Opening the Market for Mobile Security
What Constitutes the Mobile Device & Network Security Market?
Mobile Network Infrastructure Security Software & Appliances
Overview
What Constitutes this Submarket?
Value Chain
Vendor Landscape: Key Characteristics
Mobile Device Client Security Software
Overview
What Constitutes this Submarket?
Value Chain
Vendor Landscape: Key Characteristics
Mobile Device Security Hardware
Overview
What Constitutes this Submarket?
Value Chain
Vendor Landscape: Key Characteristics
Mobile Security & MDM Services
Overview
What Constitutes this Submarket?
Value Chain
Vendor Landscape: Key Characteristics

Chapter 3: Mobile Network Infrastructure Security Software & Appliances
Integrated Security Appliances
Introduction
How Integrated Security Appliance Help in Securing Mobile Networks?
Integrated Security Appliance Use Cases
Firewall
Intrusion Prevention System (IPS)
Email Protection System
Identity Protection System
Content Filtering
Anti-Virus and Anti-Spyware Protection
Anti-Spam Filtering
Virtual Private Networks (VPN)
Key Market Drivers
Mobility
Small Businesses
Ubiquity
Compliance
Processing Power
Key Market Challenges
Design Trade-offs
Single Point of Failure
Key Players in the Market
Recent Innovations and Developments
Case Study: Sophos
Case Study: Fortinet
Content Security Gateways
Introduction
How Content Security Gateways Protect Mobile Networks?
Delivery Modes
Features
Key Market Drivers
Internet Growth
Granularity of Features
Key Market Challenges
Risk-reward Ratio
Key Players in the Market
Recent Innovations and Developments
Case Study: SaaS based Vendors

Chapter 4: Mobile Device Client Security Software
Anti-Malware/Anti-Virus Client Software
Introduction
Detection Mechanism: How it Works?
Delivery Mode
Performance Barometers
Key Market Drivers
Mobile Device Shipment Volumes
Device Metamorphosis
Application Marketplaces
Key Market Challenges
Limited Resource Availability
Scepticism
Key Players in the Market
Recent Innovations and Developments
Case Study: Antivirus Test Results
Vulnerability Against Malware
Back Up & Restore Software
Introduction
Trend Micro Case Study: How Mobile Back Up & Restore Software Works?
Delivery Mode
Key Market Drivers
Short Replacement Cycles
Maturity of Third Party Hosting Services
Key Market Challenges
Software Usability Issues
Data Security & Confidentiality in the Cloud
Key Players in the Market
Recent Innovations and Developments
Case Study: Axiom and NQ Mobile
Case Study: Cellebrite
Privacy Protection Software
Introduction
How Does Mobile Privacy Protection Software Work?
Key Market Drivers
Proliferation of Mobile User Information
Monitoring & Regulating Access to Personal Data
Key Market Challenges
Ambiguity of Functionality & Software Bundling
Lack of Commercial Instigation
Recent Innovations and Developments
CalOPPA
Mobile VPN Client Software
Introduction
How Mobile VPN Works?
Key Market Drivers
Privacy over Public Mobile Networks
Bypassing Restrictions
Key Market Challenges
Duality of Android
Interoperability
Key Players in the Market
Recent Innovations and Developments
Case Study: Inside Secure
Remote Locking Software
Introduction
How Remote Locking Software Works?
Key Market Drivers
Key Market Challenges
Key Players in the Market
Recent Innovations and Developments
Remote Tracking Software
Introduction
How Remote Tracking Software Works?
Key Market Drivers
Device Recovery
Proactive Location Based Warning
Key Market Challenges
Privacy Concerns
Location Technology Challenges
Key Players in the Market
Recent Innovations and Developments
Case Study: SK Telecom
Encrypted Communications (Voice/Data) Software
Introduction
How Encrypted Communications Software Works?
AT&T’s Approach
Cellcrypt’s Approach
RIM’s Approach
Key Market Drivers
Confidentiality
Wider Stakeholder Participation
Key Market Challenges
Overheads
Managing the Balance
Key Players in the Market
Recent Innovations and Developments
Case Study: Silent Circle
Encrypted Storage Software
Introduction
How Encrypted Storage Software Works?
Key Market Drivers
Preserving Integrity of Personal Data
Remote Functionality
Key Market Challenges
Performance Issues
Key Players in the Market
Recent Innovations and Developments

Chapter 5: Mobile Device Security Hardware
Semiconductors/Embedded Chip Security
Introduction
How Embedded Chip Security Works?
Scenarios to be Catered For
Secure Paths Within the Device
Enforcing DRM Rules
Enforcing Software and Hardware Integrity
Management of Meta-data
Management of Updates
Management of Mobile Payments
Preventing Unauthorized Access to the Device
Role Played by TCG
TPM Mobile
Key Market Drivers
Best Fitment
Advances in Cryptography
Key Market Challenges
Stakeholder Ennui
Key Players in the Market
Recent Innovations and Developments
Barriers to TPM Mobile
Can Embedded Chip Security Deter the Growth of Security Software Applications?
NFC
Introduction
How NFC Works?
Features and Use Cases
Is NFC Immune to Eavesdropping?
Security Measures
Key Market Drivers
Universality & Versatility
Support from Mobile Network Operators
Key Market Challenges
Stakeholder Reluctance to Hardware Modification
Lack of Focus on Robust Encryption Techniques
Key Players in the Market
Early Developers
Mobile Network Operators
Semiconductor Chipset Makers
Mobile OEMs
Recent Innovations and Developments
Google Wallet: Transforming Mobile Devices Into Virtual Wallets
ISIS
Biometrics
Introduction
Representing Identity Data
Fingerprint Capture
Facial Feature Recognition
Usage of Voice Recognition
How Biometrics Work?
Enrollment
Sample Extraction
Biometric Validation
Key Market Drivers
Mobility & Emerging Applications of Biometrics
Mobile Network Operator Interest
Key Market Challenges
Hardware Value Addition
Stakeholder Scepticism
Key Players in the Market
Recent Innovations and Developments
Voice Recognition Software: Lessons for Mobile Biometrics
EyeVerify: Identifying Live Eye Vein Patterns

Chapter 6: Mobile Security and MDM Services
On-Premises Mobile Security MDM Services
Introduction
How MDM Services Work?
Essential Attributes of MDM Services
Accessibility
Should Not be Perceived as an Overhead
Granularity
Ease of Maintenance and Management
Key Market Drivers
Dissolution of Distinction between Personal and Official Devices
The Growing Penetration of the iPhone and Android Devices
BYOD
Need for Policy Framework
Key Market Challenges
Administration Overhead
Distinguishing between Personal and Corporate Usage
Key Players in the Market
Recent Innovations and Developments
Cloud Based Mobile SECaaS MDM Services
Introduction
How Cloud Based Mobile SaaS MDM Services Work?
Desirable Attributes
Integration with Directory Services
Email Access Control
Network Up-time and Availability
Operational and Security Practices
Measures to Reduce Manual Intervention
Key Market Drivers
Freedom from Upfront Investment
Tackling Obsolescence
Operational Synergy
Key Market Challenges
Implications of Hosting
Key Players in the Market
Case Study of Integrated MDM: AirWatch
OS Support
MDM Features
Hosting Models
Licensing Mechanism
Mobile Identity Management Services
Introduction
History
Modus operandii, innovations and key players explained through diverse approaches
Active Directory from Microsoft
SSO from Oracle
Establishing the SIM Card as an Authentication Device
Adding Mobility to Digital Ids: Valimo/Gemalto Case Study
Key Market Drivers
Mobility for Business Users
Ease of Use
Financial Inclusion
Incentive for Mobile Network Operators
Key Market Challenges
Device Vulnerability

Chapter 7: Key Company Profiles
3M Cogent
Actiance
Adtran
AirWatch
Amtel
AT&T
AVG
Barracuda
BullGuard
Cellabrite
Cisco Systems
Dell
Ericsson
ESET
F-Secure
IBM
Inside Secure
Kaspersky Lab
KoolSpan
LookOut
McAfee
Microsoft
MobileIron
Mocana
Motorola Solutions
Netmotion
Nokia
NQ Mobile
NXP
Oracle
Panda Security
RIM
Sophos
Soti
SRA International
Symantec
Trend Micro
Untangle
Webroot
ZyXEL
Others

Chapter 8: Market Analysis & Forecasts
Global Outlook of the Mobile Device & Network Security Market
Submarket Segmentation
Mobile Network Infrastructure Security Software & Appliances Submarket
Integrated Security Appliances for Mobile Networks
Content Security Gateways for Mobile Networks
SMS/MMS Security Gateways for Mobile Networks
Mobile Device Client Security Software Submarket
Anti-Malware/Anti-Virus Client Software
Back Up & Restore Software
Privacy Protection Software
Mobile VPN Client Software
Remote Locking
Remote Tracking Software
Encrypted Communication (Voice/Data) Software
Encrypted Storage Software
Enterprise vs. Consumer Segmentation
Mobile Device Security Hardware Submarket
Semiconductors/Embedded Chip Security
NFC
Biometrics
Mobile Security & MDM Services
On-premises Mobile Security MDM Services
Cloud Based Mobile SECaaS Services
Mobile Identity Management Services
Regional Outlook
Asia Pacific
Submarket Segmentation
Mobile Network Infrastructure Security Software & Appliances
Mobile Device Client Security Software
Mobile Device Security Hardware
Mobile Security & MDM Services
Country Level Segmentation
Australia
China
India
Japan
South Korea
Pakistan
Thailand
Indonesia
Malaysia
Taiwan
Philippines
Rest of Asia Pacific
Eastern Europe
Submarket Segmentation
Mobile Network Infrastructure Security Software & Appliances
Mobile Device Client Security Software
Mobile Device Security Hardware
Mobile Security & MDM Services
Country Level Segmentation
Czech Republic
Poland
Russia
Rest of Eastern Europe
Latin & Central America
Submarket Segmentation
Mobile Network Infrastructure Security Software & Appliances
Mobile Device Client Security Software
Mobile Device Security Hardware
Mobile Security & MDM Services
Country Level Segmentation
Argentina
Brazil
Mexico
Rest of Latin & Central America
Middle East & Africa
Submarket Segmentation
Mobile Network Infrastructure Security Software & Appliances
Mobile Device Client Security Software
Mobile Device Security Hardware
Mobile Security & MDM Services
Country Level Segmentation
South Africa
UAE
Qatar
Saudi Arabia
Israel
Rest of the Middle East & Africa
North America
Submarket Segmentation
Mobile Network Infrastructure Security Software & Appliances
Mobile Device Client Security Software
Mobile Device Security Hardware
Mobile Security & MDM Services
Country Level Segmentation
USA
Canada
Western Europe
Submarket Segmentation
Mobile Network Infrastructure Security Software & Appliances
Mobile Device Client Security Software
Mobile Device Security Hardware
Mobile Security & MDM Services
Country Level Segmentation
Denmark
Finland
France
Germany
Italy
Spain
Sweden
Norway
UK
Rest of Western Europe

LIST OF FIGURES

Figure 1: Global Connected Mobile Device vs. PC Shipments: 2010 – 2020 (Millions of Units)
Figure 2: Annual Global Throughout of Mobile Network Data Traffic by Region: 2010 – 2020 (Exabytes)
Figure 3: Mobile Security Modes for Solution Delivery
Figure 4: Stakeholders in the Mobile Network Infrastructure Security Software & Appliances Value Chain
Figure 5: Stakeholders in the Mobile Device Client Security Software Value Chain
Figure 6: Stakeholders in the Mobile Device Security Hardware Value Chain
Figure 7: Stakeholders in the Mobile Security & MDM Services Value Chain
Figure 8: Global Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 9: Global Mobile Device & Network Security Revenue by Submarket: 2010 - 2020 ($ Million)
Figure 10: Global Mobile Network Infrastructure Security Software & Appliances Submarket Revenue: 2010 - 2020 ($ Million)
Figure 11: Global Mobile Network Infrastructure Security Software & Appliances Submarket Revenue by Product Category: 2010 - 2020 ($ Million)
Figure 12: Global Mobile Network Integrated Security Appliance Revenue: 2010 - 2020 ($ Million)
Figure 13: Global Mobile Network Content Security Gateway Revenue: 2010 - 2020 ($ Million)
Figure 14: Global SMS/MMS Security Gateway Revenue: 2010 - 2020 ($ Million)
Figure 15: Global Mobile Device Client Security Software Submarket Revenue: 2010 - 2020 ($ Million)
Figure 16: Global Mobile Device Client Security Software Submarket Revenue by Product Category: 2010 - 2020 ($ Million)
Figure 17: Global Mobile Device Anti-Malware/Anti-Virus Client Software Revenue: 2010 - 2020 ($ Million)
Figure 18: Global Mobile Device Back Up & Restore Software Revenue: 2010 - 2020 ($ Million)
Figure 19: Global Mobile Privacy Protection Software Revenue: 2010 - 2020 ($ Million)
Figure 20: Global Mobile VPN Client Software Revenue: 2010 - 2020 ($ Million)
Figure 21: Global Mobile Remote Locking Software Revenue: 2010 - 2020 ($ Million)
Figure 22: Global Mobile Remote Tracking Software Revenue: 2010 - 2020 ($ Million)
Figure 23: Global Mobile Encrypted Communication (Voice/Data) Software Revenue: 2010 - 2020 ($ Million)
Figure 24: Global Mobile Encrypted Storage Software Revenue: 2010 - 2020 ($ Million)
Figure 25: Global Mobile Device Client Security Software Submarket Revenue by Enterprise vs. Consumer Segmentation: 2010 - 2020 ($ Million)
Figure 26: Global Enterprise Mobile Device Client Security Software Submarket Revenue: 2010 - 2020 ($ Million)
Figure 27: Global Consumer Mobile Device Client Security Software Submarket Revenue: 2010 - 2020 ($ Million)
Figure 28: Global Mobile Device Security Hardware Submarket Revenue: 2010 - 2020 ($ Million)
Figure 29: Global Mobile Device Security Hardware Submarket Revenue by Product Category: 2010 - 2020 ($ Million)
Figure 30: Global Mobile Semiconductors/Embedded Chip Security Revenue: 2010 - 2020 ($ Million)
Figure 31: Global Mobile NFC Revenue: 2010 - 2020 ($ Million)
Figure 32: Global Mobile Biometrics Revenue: 2010 - 2020 ($ Million)
Figure 33: Global Mobile Security & MDM Services Submarket Revenue: 2010 - 2020 ($ Million)
Figure 34: Global Mobile Security & MDM Services Submarket Revenue by Service Category: 2010 - 2020 ($ Million)
Figure 35: Global On-premises Mobile Security MDM Services Revenue: 2010 - 2020 ($ Million)
Figure 36: Global Cloud Based Mobile SECaaS Revenue: 2010 - 2020 ($ Million)
Figure 37: Global Mobile Identity Management Services Revenue: 2010 - 2020 ($ Million)
Figure 38: Mobile Device & Network Security Revenue by Region: 2010 - 2020 ($ Million)
Figure 39: Asia Pacific Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 40: Asia Pacific Mobile Device & Network Security Revenue by Submarket: 2010 - 2020 ($ Million)
Figure 41: Asia Pacific Mobile Network Infrastructure Security Software & Appliances Revenue: 2010 - 2020 ($ Million)
Figure 42: Asia Pacific Mobile Device Client Security Software Revenue: 2010 - 2020 ($ Million)
Figure 43: Asia Pacific Mobile Device Security Hardware Revenue: 2010 - 2020 ($ Million)
Figure 44: Asia Pacific Mobile Security & MDM Services Revenue: 2010 - 2020 ($ Million)
Figure 45: Asia Pacific Mobile Device & Network Security Revenue by Country: 2010 - 2020 ($ Million)
Figure 46: Australia Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 47: China Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 48: India Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 49: Japan Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 50: South Korea Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 51: Pakistan Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 52: Thailand Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 53: Indonesia Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 54: Malaysia Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 55: Taiwan Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 56: Philippines Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 57: Mobile Device & Network Security Revenue in the Rest of Asia Pacific: 2010 - 2020 ($ Million)
Figure 58: Eastern Europe Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 59: Eastern Europe Mobile Device & Network Security Revenue by Submarket: 2010 - 2020 ($ Million)
Figure 60: Eastern Europe Mobile Network Infrastructure Security Software & Appliances Revenue: 2010 - 2020 ($ Million)
Figure 61: Eastern Europe Mobile Device Client Security Software Revenue: 2010 - 2020 ($ Million)
Figure 62: Eastern Europe Mobile Device Security Hardware Revenue: 2010 - 2020 ($ Million)
Figure 63: Eastern Europe Mobile Security & MDM Services Revenue: 2010 - 2020 ($ Million)
Figure 64: Eastern Europe Mobile Device & Network Security Revenue by Country: 2010 - 2020 ($ Million)
Figure 65: Czech Republic Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 66: Poland Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 67: Russia Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 68: Mobile Device & Network Security Revenue in the Rest of Eastern Europe: 2010 - 2020 ($ Million)
Figure 69: Latin & Central America Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 70: Latin & Central America Mobile Device & Network Security Revenue by Submarket: 2010 - 2020 ($ Million)
Figure 71: Latin & Central America Mobile Network Infrastructure Security Software & Appliances Revenue: 2010 - 2020 ($ Million)
Figure 72: Latin & Central America Mobile Device Client Security Software Revenue: 2010 - 2020 ($ Million)
Figure 73: Latin & Central America Mobile Device Security Hardware Revenue: 2010 - 2020 ($ Million)
Figure 74: Latin & Central America Mobile Security & MDM Services Revenue: 2010 - 2020 ($ Million)
Figure 75: Latin & Central America Mobile Device & Network Security Revenue by Country: 2010 - 2020 ($ Million)
Figure 76: Argentina Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 77: Brazil Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 78: Mexico Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 79: Mobile Device & Network Security Revenue in the Rest of Latin & Central America: 2010 - 2020 ($ Million)
Figure 80: Middle East & Africa Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 81: Middle East & Africa Mobile Device & Network Security Revenue by Submarket: 2010 - 2020 ($ Million)
Figure 82: Middle East & Africa Mobile Network Infrastructure Security Software & Appliances Revenue: 2010 - 2020 ($ Million)
Figure 83: Middle East & Africa Mobile Device Client Security Software Revenue: 2010 - 2020 ($ Million)
Figure 84: Middle East & Africa Mobile Device Security Hardware Revenue: 2010 - 2020 ($ Million)
Figure 85: Middle East & Africa Mobile Security & MDM Services Revenue: 2010 - 2020 ($ Million)
Figure 86: Middle East & Africa Mobile Device & Network Security Revenue by Country: 2010 - 2020 ($ Million)
Figure 87: South Africa Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 88: UAE Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 89: Qatar Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 90: Saudi Arabia Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 91: Israel Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 92: Mobile Device & Network Security Revenue in the Rest of the Middle East & Africa: 2010 - 2020 ($ Million)
Figure 93: North America Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 94: North America Mobile Device & Network Security Revenue by Submarket: 2010 - 2020 ($ Million)
Figure 95: North America Mobile Network Infrastructure Security Software & Appliances Revenue: 2010 - 2020 ($ Million)
Figure 96: North America Mobile Device Client Security Software Revenue: 2010 - 2020 ($ Million)
Figure 97: North America Mobile Device Security Hardware Revenue: 2010 - 2020 ($ Million)
Figure 98: North America Mobile Security & MDM Services Revenue: 2010 - 2020 ($ Million)
Figure 99: North America Mobile Device & Network Security Revenue by Country: 2010 - 2020 ($ Million)
Figure 100: USA Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 101: Canada Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 102: Western Europe Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 103: Western Europe Mobile Device & Network Security Revenue by Submarket: 2010 - 2020 ($ Million)
Figure 104: Western Europe Mobile Network Infrastructure Security Software & Appliances Revenue: 2010 - 2020 ($ Million)
Figure 105: Western Europe Mobile Device Client Security Software Revenue: 2010 - 2020 ($ Million)
Figure 106: Western Europe Mobile Device Security Hardware Revenue: 2010 - 2020 ($ Million)
Figure 107: Western Europe Mobile Security & MDM Services Revenue: 2010 - 2020 ($ Million)
Figure 108: Western Europe Mobile Device & Network Security Revenue by Country: 2010 - 2020 ($ Million)
Figure 109: Denmark Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 110: Finland Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 111: France Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 112: Germany Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 113: Italy Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 114: Spain Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 115: Sweden Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 116: Norway Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 117: UK Mobile Device & Network Security Revenue: 2010 - 2020 ($ Million)
Figure 118: Mobile Device & Network Security Revenue in the Rest of Western Europe: 2010 - 2020 ($ Million)

 

Date of Publication:
Sep 3, 2013
File Format:
PDF, XLS via E-mail
Number of Pages:
284 Pages
Type the characters you see in the picture above.