1 INTRODUCTION 21
1.1 OBJECTIVES OF THE STUDY 21
1.2 MARKET DEFINITION 21
1.2.1 INCLUSIONS AND EXCLUSIONS 22
1.3 MARKET SCOPE 22
1.3.1 MARKET SEGMENTATION 23
1.3.2 REGIONS COVERED 23
1.4 YEARS CONSIDERED FOR THE STUDY 24
1.5 CURRENCY CONSIDERED 24
1.6 STAKEHOLDERS 25

2 RESEARCH METHODOLOGY 26
2.1 RESEARCH DATA 26
2.1.1 SECONDARY DATA 27
2.1.2 PRIMARY DATA 27
2.1.2.1 Breakup of primary profiles 28
2.1.2.2 Key industry insights 28
2.2 MARKET BREAKUP AND DATA TRIANGULATION 29
2.3 MARKET SIZE ESTIMATION 30
2.4 MARKET FORECAST 33
2.5 COMPETITIVE LEADERSHIP MAPPING METHODOLOGY 34
2.6 ASSUMPTIONS FOR THE STUDY 35
2.7 LIMITATIONS OF THE STUDY 36

3 EXECUTIVE SUMMARY 37

4 PREMIUM INSIGHTS 45
4.1 ATTRACTIVE MARKET OPPORTUNITIES IN THE MOBILE SECURITY MARKET 45
4.2 MOBILE SECURITY MARKET, BY END USER, 2019 VS 2024 45
4.3 MOBILE SECURITY MARKET, BY ENTERPRISE SOLUTION, 2019 VS 2024 46
4.4 MOBILE SECURITY MARKET, BY ENTERPRISE SERVICE, 2019 VS 2024 46
4.5 MOBILE SECURITY MARKET, BY PROFESSIONAL SERVICE, 2019 VS. 2024 47
4.6 MOBILE SECURITY MARKET, BY OPERATING SYSTEM, 2019 47
4.7 MOBILE SECURITY MARKET, BY ENTERPRISE DEPLOYMENT MODE, 2019 48
4.8 MOBILE SECURITY MARKET, BY ORGANIZATION SIZE, 2019 VS. 2024 48
4.9 MOBILE SECURITY MARKET, BY ENTERPRISE VERTICAL, 2017–2024 49
4.10 MARKET INVESTMENT SCENARIO 49

5 MARKET OVERVIEW AND INDUSTRY TRENDS 50
5.1 INTRODUCTION 50
5.2 MARKET DYNAMICS 50
5.2.1 DRIVERS 51
5.2.1.1 Increasing number of mobile phone subscriptions around the world 51
5.2.1.2 Increasing number of mobile threats and breaches 52
5.2.1.3 Increasing adoption of third-party applications 53
5.2.1.4 Increasing productivity of employees and enterprises through BYOD 54
5.2.2 RESTRAINTS 54
5.2.2.1 Use of free mobile security solutions 54
5.2.2.2 Cost of deploying enterprise mobility management solutions 54
5.2.3 OPPORTUNITIES 55
5.2.3.1 Rapid digitalization of emerging economies 55
5.2.3.2 Increasing trend of BYOD 55
5.2.4 CHALLENGES 55
5.2.4.1 Addressing the complexity of advanced threats 55
5.2.4.2 Lack of awareness regarding mobile security solutions among end users 56
5.2.4.3 Interoperability between mobile OS 56
5.3 MOBILE ATTACK VECTORS 57
5.3.1 MALWARE 57
5.3.2 DATA EXFILTRATION 57
5.3.3 DATA TAMPERING 57
5.3.4 DATA LOSS 58
5.4 USE CASES 58
5.4.1 PROVIDE THE RIGHT LEVEL OF ACCESS TO DATA ON MOBILE DEVICES TO THE RIGHT PEOPLE 58
5.4.2 PREVENT DATA FROM INTENTIONALLY OR ACCIDENTALLY LEAKING TO UNAUTHORIZED MOBILE APPS AND/OR THE CLOUD FROM MOBILE DEVICES 58
5.4.3 SHARING SENSITIVE DATA BETWEEN TOP EXECUTIVES IN THE BYOD ENVIRONMENT 59
5.4.4 PROTECT CORPORATE DATA IN BYOD AND CYOD ENVIRONMENTS 59
5.4.5 MOBILE SECURITY APPLICATION TO PROTECT FINANCIAL DATA ON PERSONAL DEVICES 60
5.5 REGULATIONS 60
5.5.1 GENERAL DATA PROTECTION REGULATION (GDPR) 60
5.5.2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) 60
5.5.3 HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) 60
5.5.4 FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA) 61
5.5.5 GRAMM-LEACH-BLILEY ACT (GLBA) 61
5.5.6 SARBANES–OXLEY (SOX) ACT 61
5.5.7 UNDERWRITERS LABORATORIES (UL) 61
5.5.8 DISTRIBUTED MANAGEMENT TASK FORCE (DMTF) 62
5.5.9 ORGANIZATION FOR THE ADVANCEMENT OF STRUCTURED INFORMATION STANDARDS (OASIS) 62

6 MOBILE SECURITY MARKET, BY END USER 63
6.1 INTRODUCTION 64
6.2 INDIVIDUAL USER 65
6.2.1 INDIVIDUAL USER: MOBILE SECURITY MARKET DRIVERS 65
6.3 ENTERPRISE 66
6.3.1 ENTERPRISE: MOBILE SECURITY MARKET DRIVERS 67

7 MOBILE SECURITY MARKET, BY OPERATING SYSTEM 68
7.1 INTRODUCTION 69
7.2 IOS 70
7.2.1 IOS: MOBILE SECURITY MARKET DRIVERS 70
7.3 ANDROID 71
7.3.1 ANDROID: MOBILE SECURITY MARKET DRIVERS 71
7.4 OTHERS 72

8 MOBILE SECURITY MARKET, BY ENTERPRISE SOLUTION 73
8.1 INTRODUCTION 74
8.2 AUTHENTICATION 75
8.2.1 AUTHENTICATION: MOBILE SECURITY MARKET DRIVERS 75
8.3 MOBILE APPLICATION SECURITY 76
8.3.1 MOBILE APPLICATION SECURITY: MOBILE SECURITY MARKET DRIVERS 76
8.4 MOBILE DATA PROTECTION 77
8.4.1 MOBILE DATA PROTECTION: MOBILE SECURITY MARKET DRIVERS 77
8.5 WEB PROTECTION 78
8.5.1 WEB PROTECTION: MOBILE SECURITY MARKET DRIVERS 78
8.6 MOBILE DEVICE SECURITY 79
8.6.1 MOBILE DEVICE SECURITY: MOBILE SECURITY MARKET DRIVERS 79
8.7 OTHER SOLUTIONS 80

9 MOBILE SECURITY MARKET, BY ENTERPRISE SERVICE 82
9.1 INTRODUCTION 83
9.2 PROFESSIONAL SERVICES 84
9.2.1 PROFESSIONAL SERVICES: MOBILE SECURITY MARKET DRIVERS 84
9.2.2 TRAINING AND CONSULTING 86
9.2.3 INTEGRATION AND IMPLEMENTATION 87
9.2.4 SUPPORT AND MAINTENANCE 88
9.3 MANAGED SERVICES 88
9.3.1 MANAGED SERVICES: MOBILE SECURITY MARKET DRIVERS 89

10 MOBILE SECURITY MARKET, BY ENTERPRISE DEPLOYMENT MODE 90
10.1 INTRODUCTION 91
10.2 CLOUD 92
10.2.1 CLOUD: MOBILE SECURITY MARKET DRIVERS 92
10.3 ON-PREMISES 94
10.3.1 ON-PREMISES: MOBILE SECURITY MARKET DRIVERS 94

11 MOBILE SECURITY MARKET, BY ORGANIZATION SIZE 96
11.1 INTRODUCTION 97
11.2 SMALL AND MEDIUM-SIZED ENTERPRISES 98
11.2.1 SMALL AND MEDIUM-SIZED ENTERPRISES: MOBILE SECURITY MARKET DRIVERS 98
11.3 LARGE ENTERPRISES 100
11.3.1 LARGE ENTERPRISES: MOBILE SECURITY MARKET DRIVERS 100

12 MOBILE SECURITY MARKET, BY ENTERPRISE VERTICAL 101
12.1 INTRODUCTION 102
12.2 BANKING, FINANCIAL SERVICES, AND INSURANCE 104
12.2.1 BANKING, FINANCIAL SERVICES, AND INSURANCE: MOBILE SECURITY MARKET DRIVERS 104
12.3 TELECOMMUNICATIONS AND IT 105
12.3.1 TELECOMMUNICATIONS AND IT: MOBILE SECURITY MARKET DRIVERS 105
12.4 RETAIL AND ECOMMERCE 106
12.4.1 RETAIL AND ECOMMERCE: MOBILE SECURITY MARKET DRIVERS 106
12.5 HEALTHCARE AND LIFE SCIENCES 107
12.5.1 HEALTHCARE AND LIFE SCIENCES: MOBILE SECURITY MARKET DRIVERS 108
12.6 GOVERNMENT AND DEFENSE 108
12.6.1 GOVERNMENT AND DEFENSE: MOBILE SECURITY MARKET DRIVERS 109
12.7 MANUFACTURING 109
12.7.1 MANUFACTURING: MOBILE SECURITY MARKET DRIVERS 109
12.8 OTHER ENTERPRISE VERTICALS 110

13 MOBILE SECURITY MARKET, BY REGION 112
13.1 INTRODUCTION 113
13.2 NORTH AMERICA 117
13.2.1 NORTH AMERICA: MOBILE SECURITY MARKET DRIVERS 117
13.2.2 UNITED STATES 124
13.2.3 CANADA 125
13.3 EUROPE 125
13.3.1 EUROPE: MOBILE SECURITY MARKET DRIVERS 126
13.3.2 UNITED KINGDOM 132
13.3.3 GERMANY 133
13.3.4 FRANCE 133
13.3.5 REST OF EUROPE 134
13.4 ASIA PACIFIC 134
13.4.1 ASIA PACIFIC: MOBILE SECURITY MARKET DRIVERS 135
13.4.2 AUSTRALIA AND NEW ZEALAND 142
13.4.3 CHINA 143
13.4.4 JAPAN 144
13.4.5 SINGAPORE 144
13.4.6 REST OF ASIA PACIFIC 145
13.5 MIDDLE EAST AND AFRICA 145
13.5.1 MIDDLE EAST AND AFRICA: MOBILE SECURITY MARKET DRIVERS 146
13.5.2 UNITED ARAB EMIRATES 152
13.5.3 KINGDOM OF SAUDI ARABIA 152
13.5.4 QATAR 153
13.5.5 SOUTH AFRICA 154
13.5.6 REST OF MIDDLE EAST AND AFRICA 154
13.6 LATIN AMERICA 155
13.6.1 LATIN AMERICA: MOBILE SECURITY MARKET DRIVERS 155
13.6.2 BRAZIL 160
13.6.3 MEXICO 161
13.6.4 REST OF LATIN AMERICA 161
14 COMPETITIVE LANDSCAPE 162
14.1 INTRODUCTION 162
14.2 COMPETITIVE LEADERSHIP MAPPING 162
14.2.1 VISIONARY LEADERS 162
14.2.2 INNOVATORS 162
14.2.3 DYNAMIC DIFFERENTIATORS 162
14.2.4 EMERGING COMPANIES 163
14.3 STRENGTH OF PRODUCT PORTFOLIO (25 PLAYERS) 164
14.4 BUSINESS STRATEGY EXCELLENCE (25 PLAYERS) 165
14.5 RANKING OF KEY PLAYERS IN THE MOBILE SECURITY MARKET, 2019 166
15 COMPANY PROFILES 167
(Business Overview, Products Offered, Recent Developments, SWOT Analysis, MnM View)*
15.1 INTRODUCTION 167
15.2 MICROSOFT 168
15.3 IBM 171
15.4 SYMANTEC 174
15.5 TREND MICRO 178
15.6 SOPHOS 181
15.7 MCAFEE 185
15.8 KASPERSKY LAB 187
15.9 ESET 189
15.10 VMWARE 191
15.11 SAMSUNG 193
15.12 CROWDSTRIKE 195
15.13 BLACKBERRY 197
15.14 CITRIX SYSTEMS 200
15.15 MOBILEIRON 203
15.16 QUICK HEAL TECHNOLOGIES 206
15.17 PANDA SECURITY 208
15.18 F-SECURE 210
15.19 FORTINET 210
15.20 CHECK POINT 211
15.21 AMTEL 212
15.22 BITDEFENDER 212
15.23 CODEPROOF 213
15.24 WEBROOT 213
15.25 KEEPER SECURITY 214
15.26 ONESPAN 215
15.27 RIGHT-TO-WIN 216
*Details on Business Overview, Products Offered, Recent Developments, SWOT Analysis, MnM View might not be captured in case of unlisted companies.
16 APPENDIX 219
16.1 INSIGHT OF INDUSTRY EXPERTS 219
16.2 DISCUSSION GUIDE 220
16.3 KNOWLEDGE STORE 225
16.4 AVAILABLE CUSTOMIZATIONS 227
16.5 RELATED REPORTS 227
16.6 AUTHOR DETAILS 228