SlideShare une entreprise Scribd logo
1  sur  1
www.firstpartner.net
Mobile Data Security
Market in Numbers
11.2EB
Forecast monthly mobile
data traffic globally in 2017(1)
$2.9Billion
Sales of Mobile Device
Security Client
software in 2017 (2)
67.5%
Mobile data traffic forecast
from smartphones vs
25.7% from tablets & laptops in
2017 (1)
$86Billion
Worldwide Security
Technology &
Services market in 2016(3)
$1Billion
Market for Mobile
Hardware Security by
2014 (4)
$830Million
Market for Data Loss
Prevention
solutions in 2014 (3)
Introduction
As mobile devices become ubiquitous and store more
personal and corporate data, new methods will be
required to secure information both stored on and
transferrred to & from mobile devices.
The tremendous popularity of mobile devices greatly
increases security threats from data-stealing malware
and lost and stolen devices.
Mobile Applications
mHealth mCommerce Utilities Public Sector & Government Enterprise & Corporate IT EducationAutomotive
In car connectivity to
provide telemetry
functions from onboard
systems including
critical safety & security
functions
Sensitive medical
information for in home
care and mobile
diagnostic & patient
management
Secure transaction and
payment information
transfer required from a
variety of unamnaged
devices
Smart Meter & supply
network remote
management M2M
deployments require
resilience from hostile
threats
Deployments to a variety of
mobile workers requires
compliance in information
access and storage security
outside of the firewall
Productivity & service
applications requiring
realtime access to
Enterprise resources &
information
Secure environment for
deployment of learning
platforms to provide
access to learning
materials anywhere
46%
Mobile data to be
offloaded from the cellular
network in 2017 (1)
450Million
Cellular M2M
connections
worldwide by 2018 (3)
iOS
Android
Windows
Blackberry
Linux
QNX
Bada
Symbian
OS Processor
Core
Embedded
Security
Mobile DevicesDevice form Factors
Smartphone Tablet Notebook
Embedded
module
Embedded
system
In Network Management
Embedded
Incorporated during
equipment manufacture
for remote OTA
provisioning and
management
Virtual
Software emulation of
standards by code
resident on device
Physical
Preprogrammed device
for physical insertion
into device
Card OS
Java Card
VM
Java Card
Framework
& APIs
Applet
Secure Elements - SIM / UICC
Over The
Air (OTA)
Platform
Authentication
Access Control
Performance
Management
Operations &
Maintenance
Trusted Service
Management
Influencers
Industry Associations /
Standards
Security Strategies
• Data loss prevention (DLP)
• Device interrogation
• Device controls
• App policy
• Geo-location control
• Data encryption
• User authentication
• App blacklist
Policy Architecture
• Multiple Independent Level of Security (MILS)
• Multiple Level Security (MLS)
• Seperation Kernel between Above & Below OS Levels
• Big Data Monitoring
• Incident investigation
• Real time collection & alerting
Analytics
• Malware analytics
• Compliance reporting
• App analytics
Perimiter Network
Client / Device
Authentication
Firewall -
Edge / Main
Network Intrusion
Detection (NIDS)
Stakeholders
• Energy
• Materials
• Industrial
• Consumer
• Health Care
• Financial
• IT
• Telecommunications
• Utilities
Engaged in:
• Cloud services
• Network & Telecom
• IT Infrastructure
And may outsource:
• Project Management
• Software Development
• Help Desk & Support
• VARs
• Datacentres
• Outsource Service Providers
To:
• Integrators
• Carriers
• Policy & Compliance
• Service Delivery
• Investment costs & Business justification
Who worry about:
• Reputational loss
• Financial loss
• Large Enterprise
• Small & Medium
Enterprises
• National Corporates
• Multi-national
Corporates
Who:
Authentication & session monitoring
Access Control
Influencers
Userconfidenceinsafety
&reliabilityofboththeir
session&anytransferred
information
Userabilitytogain
access&complete
sessionsquickly&easily
UserExperienceIncreasedsecurity
• Device fingerprinting
• IP address checking
• Cookies
Background Checks
• User behaviour
• User session anomally detection
Session Monitoring
User Authentication
• User name & password
• 2 factor out of band
• Hardware based
• Risk or context based
• Biometrics
• Privacy
• Trust
• Transaction security
• Fraud
• Poor experience
User Concerns:
• Mass breaches
• Loss of business
• Regulatory compliance
• Information loss
• Access Security
Owner Concerns:
Mobile Content Management (MCM)
Manages secure mobile access to enterprise content. These
solution are extending to manage secure mobile collaborative
environments including version control & sync.
Enterprise Mobility Management
(EMM)
Formats
Phishing
“Man In The
Middle”
Protocol
Threats
Denial of
Service
Spyware
Surveillance
Ransomware
Source
Malware &
Viruses
NFC &
proximity
based hacking
Cloud data
privacy
Accidental
insider
leakage
Unsecure file
transfer
Data loss from
lost /stolen
devcies
Insecure WiFi
networks &
rogue access
Threats
External Web Portals Internal Enterprise
Mobile
2014 Mobile Data Security Market Map FirstPartnerMarket
Insight
Proposition
Development
Product
Launch
Customer
Engagement
www.firstpartner.net
Tim Ellis
Partner
tellis@firstpartner.net
+44 (0) 870 874 8700
@firstpartner
hello@firstpartner.net
Like what you see?
Contact us for in-depth insight into
your target markets!
Contacts
Author
www.firstpartner.net
Sources
(1) Cisco VNI Global Mobile Forecast 2013
(2) Infonetics Research 04/2013
(3) Gartner 2013
(4) ABI Research 2014
Threatsareconstantlychangingaspreventionmethodsdevelop
Malware
import from
physical device
IT Environment
Delivery
• Business Processes
• Information
• Applications
• Firewall / DMZ
• Cloud (public / Private)
• Administration & Provisioning
Architecture
• Virtualisation
• Data Centres
Security
• Tokenisation
• Digital certificates
• Secure Code Execution
• Credential Management
• Digital Signatures
• Strong Authentication
Device security separation between Enterprise & Personal data
BYOD Policies
Behind the
firewall
Mobile Delivery
Options
Traffic Forwarding Traffic Inspection Reporting
• Work zones (General & Classified) • Personal zone
Acceptable use
Employee Exit Strategy
• Enforced removal of proprietary apps, information & access rights
• Allowed apps & network access methods
Bring Your Own Device (BYOD)
Manages, secures and provides company controlled
productivity and secure connectivity resources on personally
owned devices.
Mobile Application Management (MAM)
Manages internal, public & purchased applications on
enterprise devices throughout their lifecycle. Also includes
applications blacklists to prevent their installation on devices.
Identity
Theft
Enables remote asset audit & IT policy compliance management
before network access is granted. These tools may provide
ongoing automated patch management & reporting functions .
Endpoint Management
Mobile Device Management (MDM)
Provides central administration of mobile asset use, enforces IT
policies manages secure corporate network access using
available preferred connectivity resources.
Cloud Service
Cloud
Security
Services
Connectivity
• DES/3DES
• AES
• DSA
• SHA
• WPA/WPA2
• IPSec
• SSL / TLS
• SSH
• WiMAX
Data
• TrueCrypt
• BitLocker
• boxcryptor
File
• Cellular
• Satellite
• WiMAX
• WiFi
• Bluetooth
• NFC
Wireless Fixed
• Ethernet
• DSL
• ISDN
• Dial Up
• USB
• Firewire
Encryption
FirstPartner
EVALUATION
COPY

Contenu connexe

Dernier

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Dernier (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

En vedette

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

En vedette (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

FirstPartner 2014 Mobile Data Security Market Map

  • 1. www.firstpartner.net Mobile Data Security Market in Numbers 11.2EB Forecast monthly mobile data traffic globally in 2017(1) $2.9Billion Sales of Mobile Device Security Client software in 2017 (2) 67.5% Mobile data traffic forecast from smartphones vs 25.7% from tablets & laptops in 2017 (1) $86Billion Worldwide Security Technology & Services market in 2016(3) $1Billion Market for Mobile Hardware Security by 2014 (4) $830Million Market for Data Loss Prevention solutions in 2014 (3) Introduction As mobile devices become ubiquitous and store more personal and corporate data, new methods will be required to secure information both stored on and transferrred to & from mobile devices. The tremendous popularity of mobile devices greatly increases security threats from data-stealing malware and lost and stolen devices. Mobile Applications mHealth mCommerce Utilities Public Sector & Government Enterprise & Corporate IT EducationAutomotive In car connectivity to provide telemetry functions from onboard systems including critical safety & security functions Sensitive medical information for in home care and mobile diagnostic & patient management Secure transaction and payment information transfer required from a variety of unamnaged devices Smart Meter & supply network remote management M2M deployments require resilience from hostile threats Deployments to a variety of mobile workers requires compliance in information access and storage security outside of the firewall Productivity & service applications requiring realtime access to Enterprise resources & information Secure environment for deployment of learning platforms to provide access to learning materials anywhere 46% Mobile data to be offloaded from the cellular network in 2017 (1) 450Million Cellular M2M connections worldwide by 2018 (3) iOS Android Windows Blackberry Linux QNX Bada Symbian OS Processor Core Embedded Security Mobile DevicesDevice form Factors Smartphone Tablet Notebook Embedded module Embedded system In Network Management Embedded Incorporated during equipment manufacture for remote OTA provisioning and management Virtual Software emulation of standards by code resident on device Physical Preprogrammed device for physical insertion into device Card OS Java Card VM Java Card Framework & APIs Applet Secure Elements - SIM / UICC Over The Air (OTA) Platform Authentication Access Control Performance Management Operations & Maintenance Trusted Service Management Influencers Industry Associations / Standards Security Strategies • Data loss prevention (DLP) • Device interrogation • Device controls • App policy • Geo-location control • Data encryption • User authentication • App blacklist Policy Architecture • Multiple Independent Level of Security (MILS) • Multiple Level Security (MLS) • Seperation Kernel between Above & Below OS Levels • Big Data Monitoring • Incident investigation • Real time collection & alerting Analytics • Malware analytics • Compliance reporting • App analytics Perimiter Network Client / Device Authentication Firewall - Edge / Main Network Intrusion Detection (NIDS) Stakeholders • Energy • Materials • Industrial • Consumer • Health Care • Financial • IT • Telecommunications • Utilities Engaged in: • Cloud services • Network & Telecom • IT Infrastructure And may outsource: • Project Management • Software Development • Help Desk & Support • VARs • Datacentres • Outsource Service Providers To: • Integrators • Carriers • Policy & Compliance • Service Delivery • Investment costs & Business justification Who worry about: • Reputational loss • Financial loss • Large Enterprise • Small & Medium Enterprises • National Corporates • Multi-national Corporates Who: Authentication & session monitoring Access Control Influencers Userconfidenceinsafety &reliabilityofboththeir session&anytransferred information Userabilitytogain access&complete sessionsquickly&easily UserExperienceIncreasedsecurity • Device fingerprinting • IP address checking • Cookies Background Checks • User behaviour • User session anomally detection Session Monitoring User Authentication • User name & password • 2 factor out of band • Hardware based • Risk or context based • Biometrics • Privacy • Trust • Transaction security • Fraud • Poor experience User Concerns: • Mass breaches • Loss of business • Regulatory compliance • Information loss • Access Security Owner Concerns: Mobile Content Management (MCM) Manages secure mobile access to enterprise content. These solution are extending to manage secure mobile collaborative environments including version control & sync. Enterprise Mobility Management (EMM) Formats Phishing “Man In The Middle” Protocol Threats Denial of Service Spyware Surveillance Ransomware Source Malware & Viruses NFC & proximity based hacking Cloud data privacy Accidental insider leakage Unsecure file transfer Data loss from lost /stolen devcies Insecure WiFi networks & rogue access Threats External Web Portals Internal Enterprise Mobile 2014 Mobile Data Security Market Map FirstPartnerMarket Insight Proposition Development Product Launch Customer Engagement www.firstpartner.net Tim Ellis Partner tellis@firstpartner.net +44 (0) 870 874 8700 @firstpartner hello@firstpartner.net Like what you see? Contact us for in-depth insight into your target markets! Contacts Author www.firstpartner.net Sources (1) Cisco VNI Global Mobile Forecast 2013 (2) Infonetics Research 04/2013 (3) Gartner 2013 (4) ABI Research 2014 Threatsareconstantlychangingaspreventionmethodsdevelop Malware import from physical device IT Environment Delivery • Business Processes • Information • Applications • Firewall / DMZ • Cloud (public / Private) • Administration & Provisioning Architecture • Virtualisation • Data Centres Security • Tokenisation • Digital certificates • Secure Code Execution • Credential Management • Digital Signatures • Strong Authentication Device security separation between Enterprise & Personal data BYOD Policies Behind the firewall Mobile Delivery Options Traffic Forwarding Traffic Inspection Reporting • Work zones (General & Classified) • Personal zone Acceptable use Employee Exit Strategy • Enforced removal of proprietary apps, information & access rights • Allowed apps & network access methods Bring Your Own Device (BYOD) Manages, secures and provides company controlled productivity and secure connectivity resources on personally owned devices. Mobile Application Management (MAM) Manages internal, public & purchased applications on enterprise devices throughout their lifecycle. Also includes applications blacklists to prevent their installation on devices. Identity Theft Enables remote asset audit & IT policy compliance management before network access is granted. These tools may provide ongoing automated patch management & reporting functions . Endpoint Management Mobile Device Management (MDM) Provides central administration of mobile asset use, enforces IT policies manages secure corporate network access using available preferred connectivity resources. Cloud Service Cloud Security Services Connectivity • DES/3DES • AES • DSA • SHA • WPA/WPA2 • IPSec • SSL / TLS • SSH • WiMAX Data • TrueCrypt • BitLocker • boxcryptor File • Cellular • Satellite • WiMAX • WiFi • Bluetooth • NFC Wireless Fixed • Ethernet • DSL • ISDN • Dial Up • USB • Firewire Encryption FirstPartner EVALUATION COPY