24
Mobile Devices Security: The Invasion has Started Jean-Noël Georges Global Program Director ICT 28 October 2014 © 2014 Frost & Sullivan. All rights reserved. This document contains highly confidential information and is the sole property of Frost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan.

Mobile Devices Security: The Invasion has Started

Embed Size (px)

Citation preview

Mobile Devices Security: The Invasion has Started

Jean-Noël Georges

Global Program Director

ICT

28 October 2014

© 2014 Frost & Sullivan. All rights reserved. This document contains highly confidential information and is the sole property of

Frost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan.

2

Today’s Presenter

Jean-Noël Georges, Global Program Director

Frost & Sullivan

FranceSophia Antipolis

� +15 years experience in the fields of corporate strategy, sales optimization and marketing strategy with particular experience in geographic market expansion,

outsourcing business models, online customer experience management, value

proposition creation and benefit models.

� In my spare time I am currently studying Oenology, which has to do with wine

and winemaking.

3

Focus Points

1. What are the different threats?

2. Why is it targeting mobile devices?

3. What are the latest protections and trends?

4. Can we expect revenue from a vertical perspective?

4

Poll Question

Which vertical will drive most important revenues regarding total endpoint security market in 2014?

• Finance, Bank, Insurance

• Healthcare

• Government

• Education

5

A Brief History of Mobile Attacks

6

Are we Equal in Front of the Invasion?

The number of malware, spyware, virus and Trojan specifically designed for mobile drastically increased in H1 2014

Source: Frost & Sullivan

7

Is my Mobile Device Completely Secure?

In 2014, Trojan SMS will represent 38.1% of the threats followed by the Trojan application with 24.2%

Source: Frost & Sullivan

8

Can I Trust my Mobile to Protect my Privacy?

Users Want to Manage Privacy

60% 65%

Source: Frost & Sullivan

9

The Future of Mobile Attacks

10

Mobile Usages Quick Overview

Source: Orange Business Services, Frost & Sullivan

11

Threats to Mobile Devices

Threats to mobile devices will become more sophisticated in the future and specifically designed for the mobile space.

Mobile WalletMobile Banking

BYOD

Source: Frost & Sullivan

12

Companies Need to Protect Mobile Devices

Targeted Regions, Global, H1 2014

Western Europe seems to be the favorite targeted region while the other regions are also in the radar of hackers. “Where the money is the potential threat will be”

Source: Frost & Sullivan

13

Mobile Security Strategy

14

What the Mobile Device Could Suffer?

Frost & Sullivan has identified three major categories that describe the potential hacking threats for a mobile device.

Source: Sophos, Frost & Sullivan

$99.99*

*Price charged by the

Android Defender Ransomware

Sophos

$5.4 million*

*Average Cost for data breaches

In the US 2012

Sophos

15

How to Prevent the Threats?

Individuals and companies need to create rules and best practices to prevent potential attacks.

•Anti malware

•Content filtering

•Call and message filtering

•Remote wipe and lock

•Anti-loss and anti-theft

•Content controls

•Mobile VPN

•Encryption

•Application reputation scanning

•Jaibreak and root detection

Ondot Systems

Traditional Approach

Lookout

Androidlost

16

How to Manage Security: Risk Management Approach

Most advanced security protection and alternative approach with the use of secured areas will definitively add higher protection but for a higher integration cost

Hardware Approach

•Qualcomm processor Snapdragon

•Intel SoCs (IdentityProtectionTechnology)

Alternative Software Approach

•ARM Trustzone GlobalPlatformTEE

•Samsung Knox 2.0

Management Approach

•Mobile Device Management

•Mobile Application Management

17

Security by Design

High end products for specific usages and niche market versus new entrants for a mass market strategy

Thales: TeoremSectra: Tiger XSBoeing: Black

Silent Circle: Blackphone

Bull: Hoox m2

18

Which Vertical will Drive Revenues?

Distribution by vertical market is typical of a mature security technology.

Government

18.1%

Healthcare

16.2%

Finance, Bank,

Insurance

9.8%

Education

8.8%Manufacturing

7.9%

Retail

7.8%

Others

31.4%

Percent Revenue by Vertical Market, Global, 2014

19

Which Approach will Drive Revenues?

The freemium model generates price pressures for end point security. Revenues will come from a personalized approach to corporate.

Percent Revenue by Solution Market, Global

2014 2019

Traditional

65%Traditional

44%

Management

17%

Management

28%

Hardware

14%

Hardware

19%Alternative

4%

Alternative

9%

20

Conclusion

• Mobile threat is global

• Attacks are more sophisticated and focus new usages

• Price competition and freemium approach allow a personalized

answer to corporate

• Security by design and encryption

21

Next Steps

Develop Your Visionary and Innovative SkillsGrowth Partnership Service Share your growth thought leadership and ideas or

join our GIL Global Community

Join our GIL Community NewsletterKeep abreast of innovative growth opportunities

22

Your Feedback is Important to Us

Growth Forecasts?

Competitive Structure?

Emerging Trends?

Strategic Recommendations?

Other?

Please inform us by “Rating” this presentation.

What would you like to see from Frost & Sullivan?

23

Follow Frost & Sullivan on Facebook, LinkedIn, SlideShare, and Twitter

http://twitter.com/frost_sullivan

http://www.facebook.com/FrostandSullivan

http://www.slideshare.net/FrostandSullivan

http://www.linkedin.com/groups/Future-Growth-Opportunities-in-ICT-4876870

24

For Additional Information

Edyta GrabowskaCorporate CommunicationsICT

(+48) 22 48 16 203

[email protected]

Jean-Noël GeorgesGlobal Program DirectorICT

(+33) 4 93 00 6187

[email protected]

Adrian DrozdResearch ManagerICT

(+44) 1865 398 699

[email protected]

Ajay SuleEuropean Sales DirectorICT

(+44) 207 343 8301

[email protected]