1 Executive Summary
1.1 MARKET ATTRACTIVENESS ANALYSIS 13
1.1.1 GLOBAL MOBILE SECURITY SOFTWARE MARKET, BY TYPE 14
1.1.2 GLOBAL MOBILE SECURITY SOFTWARE MARKET, BY REGION 15
2 Market Introduction
2.1 DEFINITION 16
2.2 SCOPE OF THE STUDY 16
2.3 RESEARCH OBJECTIVE 16
2.4 MARKET STRUCTURE 16
3 Research Methodology
3.1 RESEARCH PROCESS 17
3.2 PRIMARY RESEARCH 18
3.3 SECONDARY RESEARCH 19
3.4 MARKET SIZE ESTIMATION 21
3.5 FORECAST MODEL 23
3.6 LIST OF ASSUMPTIONS 23
4 MARKET DYNAMICS
4.1 INTRODUCTION 24
4.2 DRIVERS 25
4.2.1 INCREASING SOPHISTICATION OF CYBERATTACKS IN MOBILE DEVICES 25
4.2.2 GROWING TREND OF BRING YOUR OWN DEVICE (BYOD) 25
4.2.3 DRIVERS IMPACT ANALYSIS 25
4.3 RESTRAINTS 26
4.3.1 EASY AVAILABILITY OF FREE MOBILE SECURITY SOLUTIONS 26
4.3.2 RESTRAINTS IMPACT ANALYSIS 26
4.4 OPPORTUNITIES 27
4.4.1 EMERGENCE OF MOBILE SECURITY AS A SERVICE 27
4.5 THREAT OF NEW ENTRANTS IN THE MOBILE SECURITY SOFTWARE MARKET 27
5 MARKET FACTOR ANALYSIS
5.1 VALUE CHAIN ANALYSIS 28
5.1.1 TECHNOLOGY PROVIDERS 29
5.1.2 SERVICE PROVIDERS AND RESELLERS 29
5.1.3 END USERS 29
6 GLOBAL MOBILE SECURITY SOFTWARE MARKET, BY TYPE
6.1 OVERVIEW 30
6.2 MOBILE DATA SECURITY 32
6.3 MOBILE IDENTITY MANAGEMENT 32
6.4 MOBILE DEVICE SECURITY 32
6.5 MOBILE SECURITY AS A SERVICE 32
6.6 EMAIL SPAM BLOCKING 32
6.7 MOBILE VIRTUAL PRIVATE NETWORKS 32
7 GLOBAL MOBILE SECURITY SOFTWARE MARKET, BY REGION
7.1 OVERVIEW 33
7.2 NORTH AMERICA 35
7.3 EUROPE 36
7.4 CHINA 37
7.5 MIDDLE EAST AND AFRICA 38
7.6 INDIA 39
7.7 SOUTH AMERICA 40
7.8 JAPAN 41
8 Competitive Landscape
8.1 COMPETITIVE SCENARIO 42
8.2 OVERVIEW 42
9 Company Profiles
9.1 McAfee, Inc. 44
9.1.1 COMPANY OVERVIEW 44
9.1.2 FINANCIAL OVERVIEW 44
9.1.3 PRODUCTS/SERVICES/SOLUTIONS OFFERED 44
9.1.4 KEY DEVELOPMENTS 45
9.1.5 SWOT ANALYSIS 46
9.1.6 Key Strategies 46
9.2 Apple Inc. 47
9.2.1 COMPANY OVERVIEW 47
9.2.2 FINANCIAL OVERVIEW 47
9.2.3 PRODUCTS/SERVICES/SOLUTIONS OFFERED 48
9.2.4 KEY DEVELOPMENTS 48
9.2.5 SWOT ANALYSIS 49
9.2.6 Key Strategies 49
9.3 SYmantec Corporation 50
9.3.1 COMPANY OVERVIEW 50
9.3.2 FINANCIAL OVERVIEW 51
9.3.3 PRODUCTS/SERVICES/SOLUTIONS OFFERED 51
9.3.4 KEY DEVELOPMENTS 52
9.3.5 SWOT ANALYSIS 53
9.3.6 Key Strategies 53
9.4 VMWARE, Inc. 54
9.4.1 COMPANY OVERVIEW 54
9.4.2 FINANCIAL OVERVIEW 54
9.4.3 PRODUCTS/SERVICES/SOLUTIONS OFFERED 55
9.4.4 KEY DEVELOPMENTS 55
9.4.5 SWOT ANALYSIS 56
9.4.6 Key Strategies 56
9.5 MICROSOFT CORPORATION 57
9.5.1 COMPANY OVERVIEW 57
9.5.2 FINANCIAL OVERVIEW 58
9.5.3 PRODUCTS/SERVICES/SOLUTIONS OFFERED 58
9.5.4 KEY DEVELOPMENTS 59
9.5.5 SWOT ANALYSIS 59
9.5.6 Key Strategies 60
9.6 F-Secure 61
9.6.1 COMPANY OVERVIEW 61
9.6.2 FINANCIAL OVERVIEW 61
9.6.3 PRODUCTS/SERVICES/SOLUTIONS OFFERED 62
9.6.4 KEY DEVELOPMENTS 62
9.6.5 SWOT ANALYSIS 63
9.6.6 Key Strategies 63
9.7 Citrix Systems, Inc. 64
9.7.1 COMPANY OVERVIEW 64
9.7.2 FINANCIAL OVERVIEW 64
9.7.3 PRODUCTS/SERVICES/SOLUTIONS OFFERED 65
9.7.4 KEY DEVELOPMENTS 65
9.7.5 SWOT ANALYSIS 66
9.7.6 Key Strategies 66
9.8 TREND MICRO INC. 67
9.8.1 COMPANY OVERVIEW 67
9.8.2 FINANCIAL OVERVIEW 67
9.8.3 PRODUCTS/SERVICES/SOLUTIONS OFFERED 68
9.8.4 KEY DEVELOPMENTS 68
9.8.5 SWOT ANALYSIS 69
9.8.6 Key Strategies 69
9.9 Sophos Ltd 70
9.9.1 COMPANY OVERVIEW 70
9.9.2 FINANCIAL OVERVIEW 70
9.9.3 PRODUCTS/SERVICES/SOLUTIONS OFFERED 71
9.9.4 KEY DEVELOPMENTS 71
9.9.5 SWOT ANALYSIS 72
9.9.6 Key Strategies 72
9.10 CA Technologies 73
9.10.1 COMPANY OVERVIEW 73
9.10.2 FINANCIAL OVERVIEW 74
9.10.3 PRODUCTS/SERVICES/SOLUTIONS OFFERED 74
9.11 Avast Software S.R.O. 75
9.11.1 COMPANY OVERVIEW 75
9.11.2 FINANCIAL OVERVIEW 75
9.11.3 PRODUCTS/SERVICES/SOLUTIONS OFFERED 76
9.11.4 KEY DEVELOPMENTS 76
9.11.5 SWOT ANALYSIS 77
9.11.6 Key Strategies 77
9.12 AO Kaspersky Lab 78
9.12.1 COMPANY OVERVIEW 78
9.12.2 FINANCIAL OVERVIEW 78
9.12.3 PRODUCTS/SERVICES/SOLUTIONS OFFERED 79
9.12.4 KEY DEVELOPMENTS 79
9.12.5 SWOT ANALYSIS 80
9.12.6 Key Strategies 80
9.13 BullGuard 81
9.13.1 COMPANY OVERVIEW 81
9.13.2 FINANCIAL OVERVIEW 81
9.13.3 PRODUCTS/SERVICES/SOLUTIONS OFFERED 81
9.13.4 KEY DEVELOPMENTS 81
9.13.5 Key Strategies 81
9.14 IBM CORPORATION 82
9.14.1 COMPANY OVERVIEW 82
9.14.2 FINANCIAL OVERVIEW 83
9.14.3 PRODUCTS/SERVICES/SOLUTIONS OFFERED 84
9.14.4 KEY DEVELOPMENTS 84
9.14.5 SWOT ANALYSIS 85
9.14.6 Key Strategies 85
10 Appendix
10.1 Related Reports 86
11 List Of Tables
TABLE 1 PRIMARY INTERVIEWS 18
TABLE 2 SECONDARY SOURCES REFERRED 20
TABLE 3 LIST OF ASSUMPTIONS 23
TABLE 4 GLOBAL MOBILE SECURITY SOFTWARE MARKET, BY TYPE, 2014โ2027 (USD MILLION) 31
TABLE 5 GLOBAL MOBILE SECURITY SOFTWARE MARKET, BY REGION, 2014โ2027 (USD MILLION) 34
TABLE 6 NORTH AMERICA: MOBILE SECURITY SOFTWARE MARKET, BY TYPE, 2014โ2027 (USD MILLION) 35
TABLE 7 EUROPE: MOBILE SECURITY SOFTWARE MARKET, BY TYPE, 2014โ2027 (USD MILLION) 36
TABLE 8 CHINA: MOBILE SECURITY SOFTWARE MARKET, BY TYPE, 2014โ2027 (USD MILLION) 37
TABLE 9 MIDDLE EAST AND AFRICA: MOBILE SECURITY SOFTWARE MARKET, BY TYPE, 2014โ2027 (USD MILLION) 38
TABLE 10 INDIA: MOBILE SECURITY SOFTWARE MARKET, BY TYPE, 2014โ2027 (USD MILLION) 39
TABLE 11 SOUTH AMERICA: MOBILE SECURITY SOFTWARE MARKET, BY TYPE, 2014โ2027 (USD MILLION) 40
TABLE 12 JAPAN: MOBILE SECURITY SOFTWARE MARKET, BY TYPE, 2014โ2027 (USD MILLION) 41
TABLE 13 MCAFEE INC.: SOLUTIONS/PRODUCTS/SERVICES OFFERED 44
TABLE 14 MCAFEE INC.: KEY DEVELOPMENTS 45
TABLE 15 APPLE INC: SOLUTIONS/PRODUCTS/SERVICES OFFERED 48
TABLE 16 APPLE INC: KEY DEVELOPMENTS 48
TABLE 17 SYMANTEC CORPORATION: SOLUTIONS/SERVICES OFFERED 51
TABLE 18 SYMANTEC CORPORATION: KEY DEVELOPMENTS 52
TABLE 19 VMWARE INC.: SOLUTIONS/SERVICES OFFERED 55
TABLE 20 VMWARE INC.: KEY DEVELOPMENTS 55
TABLE 21 MICROSOFT: SOLUTIONS/PRODUCTS/SERVICES OFFERED 58
TABLE 22 MICROSOFT: KEY DEVELOPMENTS 59
TABLE 23 F-SECURE: SOLUTIONS/SERVICES OFFERED 62
TABLE 24 F-SECURE: KEY DEVELOPMENTS 62
TABLE 25 CITRIX: SOLUTIONS/PRODUCTS/SERVICES OFFERED 65
TABLE 26 TREND MICRO INC: SOLUTIONS/PRODUCTS/SERVICES OFFERED 68
TABLE 27 SOPHOS: SOLUTIONS/SERVICES OFFERED 71
TABLE 28 SOPHOS: KEY DEVELOPMENTS 71
TABLE 29 CA TECHNOLOGIES: SOLUTIONS/SERVICES OFFERED 74
TABLE 30 AVAST: SOLUTIONS/PRODUCTS/SERVICES OFFERED 76
TABLE 31 AVAST: KEY DEVELOPMENTS 76
TABLE 32 KASPERSKY: SOLUTIONS/SERVICES OFFERED 79
TABLE 33 KASPERSKY: KEY DEVELOPMENTS 79
TABLE 34 BULLGUARD: SOLUTIONS/SERVICES OFFERED 81
TABLE 35 BULLGUARD: KEY DEVELOPMENTS 81
TABLE 36 IBM CORPORATION: SOLUTIONS/PRODUCTS/SERVICES OFFERED 84
TABLE 37 IBM CORPORATION: KEY DEVELOPMENTS 84
12 List Of Figures
FIGURE 1 MARKET SYNOPSIS 12
FIGURE 2 MARKET ATTRACTIVENESS ANALYSIS: GLOBAL MOBILE SECURITY SOFTWARE MARKET 13
FIGURE 3 GLOBAL MOBILE SECURITY SOFTWARE MARKET ANALYSIS, BY TYPE 14
FIGURE 4 GLOBAL MOBILE SECURITY SOFTWARE MARKET ANALYSIS, BY REGION 15
FIGURE 5 GLOBAL MOBILE SECURITY SOFTWARE MARKET: STRUCTURE 16
FIGURE 6 RESEARCH PROCESS 17
FIGURE 7 TOP-DOWN & BOTTOM-UP APPROACHES 22
FIGURE 8 MARKET DYNAMICS OVERVIEW 24
FIGURE 9 DRIVERS IMPACT ANALYSIS: MOBILE SECURITY SOFTWARE MARKET 25
FIGURE 10 RESTRAINTS IMPACT ANALYSIS: MOBILE SECURITY SOFTWARE MARKET 26
FIGURE 11 VALUE CHAIN: GLOBAL MOBILE SECURITY SOFTWARE MARKET 28
FIGURE 12 GLOBAL MOBILE SECURITY SOFTWARE MARKET, BY TYPE, 2020 (% SHARE) 30
FIGURE 13 GLOBAL MOBILE SECURITY SOFTWARE MARKET, BY TYPE, 2020 VS 2027 (USD MILLION) 31
FIGURE 14 GLOBAL MOBILE SECURITY SOFTWARE MARKET, BY REGION, 2020 (% SHARE) 33
FIGURE 15 GLOBAL MOBILE SECURITY SOFTWARE MARKET, BY REGION, 2020 VS 2027 (USD MILLION) 34
FIGURE 16 TOP 5 VENDOR SHARE ANALYSIS, 2020 43