sponsored by ComputerWeekly.com
Posted:  09 Nov 2012
Published:  09 Nov 2012
Format:  PDF
Length:  13  Page(s)
Type:  Analyst Report
Language:  English



Smartphones currently possess many of the powerful capabilities similar to a PC and as new features and functionalities are being added, smartphones are becoming more vulnerable to certain kinds of attack.


As smartphones are increasingly used for accessing remote data and carrying sensitive business and personal data, security apps are becoming an essential and integral part of the smartphone to make it less vulnerable to the different types of threats.


Similarly, as both consumer and enterprise adoption of tablets has risen – following the success of Apple‟s iPad – there is a pressing need to provide security solutions for these devices.



  • Security Issues & Trends
  • Storage of Confidential Information
  • Device Protection
  • Mobile Apps & Software Downloads
  • Device Loss or Theft
  • Always-On access and User Owned Devices
  • The BYOD Trend
  • Security Threats
  • Mobile Security Stakeholders & Opportunities
  • Market Drivers
  • Mobile Security Software Market



Click on the button below to download this report


Juniper Research specialises in identifying and appraising new high growth market sectors within the mobile ecosystem. The cornerstones of Juniper's research are market sizing and forecasting, together with competitive analysis, strategic assessment and business modelling. Juniper provides independent and impartial analysis of current and emerging opportunities through a team of dedicated specialists.

Anti-Spam Software | Anti-Spyware Software | Applications Software | Consumer Telephony Equipment | Firewall Appliances | Fraud Protection | Hackers | Identity Theft | Internet Security | Loss Prevention | Malware | mCommerce | Mobile Device Management | Mobile Payments | Phishing | Security | Security Best Practices | Security Management | Security Policies | Security Threats | Smart Phones | Tablet PC | Vulnerability Assessments | Vulnerability Management

View All Resources sponsored by ComputerWeekly.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement