Upload
frost-sullivan
View
919
Download
1
Tags:
Embed Size (px)
Citation preview
Mobile Devices Security: The Invasion has Started
Jean-Noël Georges
Global Program Director
ICT
28 October 2014
© 2014 Frost & Sullivan. All rights reserved. This document contains highly confidential information and is the sole property of
Frost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan.
2
Today’s Presenter
Jean-Noël Georges, Global Program Director
Frost & Sullivan
FranceSophia Antipolis
� +15 years experience in the fields of corporate strategy, sales optimization and marketing strategy with particular experience in geographic market expansion,
outsourcing business models, online customer experience management, value
proposition creation and benefit models.
� In my spare time I am currently studying Oenology, which has to do with wine
and winemaking.
3
Focus Points
1. What are the different threats?
2. Why is it targeting mobile devices?
3. What are the latest protections and trends?
4. Can we expect revenue from a vertical perspective?
4
Poll Question
Which vertical will drive most important revenues regarding total endpoint security market in 2014?
• Finance, Bank, Insurance
• Healthcare
• Government
• Education
6
Are we Equal in Front of the Invasion?
The number of malware, spyware, virus and Trojan specifically designed for mobile drastically increased in H1 2014
Source: Frost & Sullivan
7
Is my Mobile Device Completely Secure?
In 2014, Trojan SMS will represent 38.1% of the threats followed by the Trojan application with 24.2%
Source: Frost & Sullivan
8
Can I Trust my Mobile to Protect my Privacy?
Users Want to Manage Privacy
60% 65%
Source: Frost & Sullivan
11
Threats to Mobile Devices
Threats to mobile devices will become more sophisticated in the future and specifically designed for the mobile space.
Mobile WalletMobile Banking
BYOD
Source: Frost & Sullivan
12
Companies Need to Protect Mobile Devices
Targeted Regions, Global, H1 2014
Western Europe seems to be the favorite targeted region while the other regions are also in the radar of hackers. “Where the money is the potential threat will be”
Source: Frost & Sullivan
14
What the Mobile Device Could Suffer?
Frost & Sullivan has identified three major categories that describe the potential hacking threats for a mobile device.
Source: Sophos, Frost & Sullivan
$99.99*
*Price charged by the
Android Defender Ransomware
Sophos
$5.4 million*
*Average Cost for data breaches
In the US 2012
Sophos
15
How to Prevent the Threats?
Individuals and companies need to create rules and best practices to prevent potential attacks.
•Anti malware
•Content filtering
•Call and message filtering
•Remote wipe and lock
•Anti-loss and anti-theft
•Content controls
•Mobile VPN
•Encryption
•Application reputation scanning
•Jaibreak and root detection
Ondot Systems
Traditional Approach
Lookout
Androidlost
16
How to Manage Security: Risk Management Approach
Most advanced security protection and alternative approach with the use of secured areas will definitively add higher protection but for a higher integration cost
Hardware Approach
•Qualcomm processor Snapdragon
•Intel SoCs (IdentityProtectionTechnology)
Alternative Software Approach
•ARM Trustzone GlobalPlatformTEE
•Samsung Knox 2.0
Management Approach
•Mobile Device Management
•Mobile Application Management
17
Security by Design
High end products for specific usages and niche market versus new entrants for a mass market strategy
Thales: TeoremSectra: Tiger XSBoeing: Black
Silent Circle: Blackphone
Bull: Hoox m2
18
Which Vertical will Drive Revenues?
Distribution by vertical market is typical of a mature security technology.
Government
18.1%
Healthcare
16.2%
Finance, Bank,
Insurance
9.8%
Education
8.8%Manufacturing
7.9%
Retail
7.8%
Others
31.4%
Percent Revenue by Vertical Market, Global, 2014
19
Which Approach will Drive Revenues?
The freemium model generates price pressures for end point security. Revenues will come from a personalized approach to corporate.
Percent Revenue by Solution Market, Global
2014 2019
Traditional
65%Traditional
44%
Management
17%
Management
28%
Hardware
14%
Hardware
19%Alternative
4%
Alternative
9%
20
Conclusion
• Mobile threat is global
• Attacks are more sophisticated and focus new usages
• Price competition and freemium approach allow a personalized
answer to corporate
• Security by design and encryption
21
Next Steps
Develop Your Visionary and Innovative SkillsGrowth Partnership Service Share your growth thought leadership and ideas or
join our GIL Global Community
Join our GIL Community NewsletterKeep abreast of innovative growth opportunities
22
Your Feedback is Important to Us
Growth Forecasts?
Competitive Structure?
Emerging Trends?
Strategic Recommendations?
Other?
Please inform us by “Rating” this presentation.
What would you like to see from Frost & Sullivan?
23
Follow Frost & Sullivan on Facebook, LinkedIn, SlideShare, and Twitter
http://twitter.com/frost_sullivan
http://www.facebook.com/FrostandSullivan
http://www.slideshare.net/FrostandSullivan
http://www.linkedin.com/groups/Future-Growth-Opportunities-in-ICT-4876870
24
For Additional Information
Edyta GrabowskaCorporate CommunicationsICT
(+48) 22 48 16 203
Jean-Noël GeorgesGlobal Program DirectorICT
(+33) 4 93 00 6187
Adrian DrozdResearch ManagerICT
(+44) 1865 398 699
Ajay SuleEuropean Sales DirectorICT
(+44) 207 343 8301