Mobile Security Market: Preparing for Dynamic Growth

A new study found that an increasing market for mobile security products, including anti-virus, virtual private networks (VPN), data and file encryption and mobile identity management applications, is expected to reach almost $5 billion, installed in 247 million phones by 2011.

Juniper Research, specialists in providing quality analytical research reports and consultancy services to the telecom industry, gathered information from some of the fastest growing mobile security providers to gain insight into the current and future market. The factors influencing the new market include:

  • The security risk of identity theft
  • Unauthorized access by mobile devices to corporate networks
  • A growing threat of mobile viruses and malware
  • State legislation and corporate governance
  • Increased dependence of mobile phone users on storage and delivery of critical data.

The secure mobile content sector, including anti-virus, anti-spam, anti-spyware and content filtering, will provide the largest mobile security growth opportunity, with 40 percent of the total market. By 2011, Mobile Biometric solutions will account for another $268 million of revenue of the total mobile identity and access management market of $1.36 billion. This is an increase over 2006 of nearly $4 billion.

Alan Goode, author of the report, said, "Initially driven by the data hungry mobile business user who has seen the benefits of data services such as email, predominantly on their Blackberry devices, we will see mobile security products go mainstream by late 2008/early 2009, resulting in a doubling of revenues from 2008 to 2010."

Recent high-profile data leakage news, including social security numbers and personal data, has caused stricter rules within corporations. Security of mobile devices must be considered when developing compliance plans for regulations such as Sarbanes-Oxley (SOX). California State Bill 1386 recognizes the advantages of encrypting stored data, including mobile device data, by not requiring companies to disclose a breach if personal data is encrypted.

In 1999, President Clinton signed the Gramm-Leach-Bliley Act that regulates, via the opt-out option, the sharing of personal information about individuals from financial institutions from which they have obtained products or services. The bill requires companies to protect and take control to enforce appropriate security for customer information stored on mobile devices.

The extent of the security problem is demonstrated by the fact that the Federal Trade Commission (FTC) received 214,905 complaints of identify theft in 2003, up 40 percent from 2002. Since early 2005, the Privacy Rights Clearinhouse (PRC) reports that the personal information in over 93 million records has been compromised, many involving the credit card industry and financial institutions.

The market for mobile phone data and file encryption is evident. Credant, a major vendor, has over 2 million users of its mobile phone encryption services and the market will show continued growth for all vendors.

North America is expected to see the largest growth, from 0.5 percent in 2006, to 2.5 percent in 2011, when 45 million worldwide mobile phone users subscribing to mobile data and file encryption products. The Asia-Pacific region is projected as having the most subscribers by 2007, dominated by Japan and South Korea, however, the emerging markets of India and China are expected to exceed established markets after 2008.

With the growing use of devices like PDA's and SmartPhones with voice capabilities becoming mobile offices in the business world and estimates of 60 percent of workers having mobile access to corporate applications, the need for security can only continue to gain importance.

You may like these other stories...

In need of CPE credits? Well, if you are an enrolled agent or CPA, you could earn as much as 18 credits by attending one of five IRS Nationwide Tax Forums this summer.The IRS Nationwide Tax Forums are three-day events that...
Russia races to dodge sanctions by adapting law to FATCARussia is in a race against the clock to adapt its laws to the Foreign Account Tax Compliance Act (FATCA) and save its banks from financial sanctions, Peter Hobson of...
Read more from Larry Perry here and in the Today's World of Audits archive.One of the most significant analytical procedures is reading, or scanning, the general ledger account activity. Whether it's done manually or...

Upcoming CPE Webinars

Apr 24
In this session Excel expert David Ringstrom, CPA introduces you to a powerful but underutilized macro feature in Excel.
Apr 25
This material focuses on the principles of accounting for non-profit organizations' revenues. It will include discussions of revenue recognition for cash and non-cash contributions as well as other revenues commonly received by non-profit organizations.
Apr 30
During the second session of a four-part series on Individual Leadership, the focus will be on time management- a critical success factor for effective leadership. Each person has 24 hours of time to spend each day; the key is making wise investments and knowing what investments yield the greatest return.
May 1
This material focuses on the principles of accounting for non-profit organizations’ expenses. It will include discussions of functional expense categories, accounting for functional expenses and allocations of joint costs.