Frost & Sullivan: Hackers See Your Smartphone As a Vulnerable Entry Point
Date: Dec 17, 2013
Guest Blog: Cellular News
The mobile security challenge is dynamic and multi-faceted. The proliferation of mobile devices is providing cyber criminals with additional launch points for targeted attacks, spurring demand for mobile endpoint protection solutions globally. Hackers are able to gain access or control of mobile devices via malicious software (malware), while mobile applications (apps) on the device can perform unwanted, high-risk actions. This jeopardizes the safety of sensitive data stored on the device, as it can be lost or stolen. With the ubiquity of mobile devices and trends such as bring your own device (BYOD), industry and government regulations requiring businesses to control network access for all device types and applications adds to market growth.
New analysis from Frost & Sullivan finds the market earned revenue of $433.5 million in 2012, and estimates this to reach $1.0 billion in 2017. The research notes endpoint security specialists McAfee and Symantec lead the market. However, several competitors, including entrepreneurial start-ups, are making progress in this critically strategic market. The analysis features a market overview, external challenges, forecasts and trends, market share and competitive analyses, as well as business and consumer segment breakdowns, unit shipment and revenue forecasts, average prices, and more.
The research focuses on mobile endpoint protection products designed to secure the device against malware, cyber attacks, high risk applications, and physical loss or theft.
With hackers becoming more effective in targeting and exploiting emerging technologies such as smartphones, cloud computing, and virtualization, enterprises are investing in mobile endpoint security software to protect and manage mobile devices. The mobile security challenge requires a layered, defense-in-depth strategy that protects data at rest and in motion, provides protection for the actual device, and includes network-based controls for mobile traffic (including application traffic).
“Smartphones may fail to meet organizational security and compliance policy requirements as they are extremely susceptible to mobile malware breaches and unwanted or high risk mobile applications,” said Frost & Sullivan Network Security Senior Industry Analyst Chris Rodriguez (http://www.frost.com/chrisrodriguez). “The need to counter these new attack vectors presents a tremendous opportunity for developers of endpoint security software.”