CHAPTER 1 INTRODUCTION
1.1 Report description
1.2 Key benefits
1.3 Key market segmentation
1.4 Research methodology
1.4.1 Secondary research
1.4.2 Primary research
1.4.3 Analyst tools and models
CHAPTER 2 EXECUTIVE SUMMARY
2.1 CXO perspective
2.2 Market beyond: what to expect by 2025
2.2.1 Base case scenario
2.2.2 Optimistic case scenario
2.2.3 Critical case scenario
CHAPTER 3 MARKET OVERVIEW
3.1 Market definition and scope
3.2 Key findings
3.2.1 Top Factors impacting mobile security market
3.2.2 Top winning strategies in the mobile security market
3.2.2.1 Acquisitions
3.2.2.2 Partnerships and collaborations
3.2.2.3 Product launch
3.2.3 Top investment pockets of the mobile security market
3.3 Porters five force analysis
3.3.1 Large number of suppliers present in market, low switching cost, threat of backward integration of buyer and undifferentiated product reduce the bargaining power of supplier
3.3.2 Low switching cost, capability to perform backward integration, price sensitive consumer, well-educated buyer and undifferentiated products increase the bargaining power of buyer to a moderate level
3.3.3 Lack of availability of substitute lowers the threat of substitution
3.3.4 Undifferentiated product, low switching cost and easy access to distribution channel increases the threat of new entrant
3.3.5 Numerous competitors, undifferentiated products and low switching cost increase the rivalry within the industry
3.4 Value chain analysis
3.5 Market share analysis, 2013
3.6 Case study
3.7 Market dynamics
3.7.1 Drivers
3.7.2 Restrains
3.7.3 Opportunities
CHAPTER 4 GLOBAL MOBILE SECURITY MARKET BY SOLUTION
4.1 Authentication
4.1.1 Key market trends
4.1.2 Key growth factors and opportunities
4.1.3 SIM (subscriber identity module) card authentication
4.1.4 Market size and forecast
4.2 Mobile application management
4.2.1 Key market trends
4.2.2 Key growth factors and opportunities
4.2.3 Market size and forecast
4.3 Mobile data protection
4.3.1 Key market trends
4.3.2 Key growth factors and opportunities
4.3.3 Firewall
4.3.4 Market size and forecast
CHAPTER 5 GLOBAL MOBILE SECURITY MARKET BY TYPES
5.1 E-mail
5.1.1 Key market trends
5.1.2 Key growth factors and opportunities
5.1.3 Market size and forecast
5.2 Anti-virus
5.2.1 Key market trends
5.2.2 Key growth factors and opportunities
5.2.3 Malware removal
5.2.4 Market size and forecast
CHAPTER 6 GLOBAL MOBILE SECURITY MARKET BY END USER
6.1 Individual users
6.1.1 Market size and forecast
6.2 Enterprise users
6.2.1 Market size and forecast
6.2.2 Financial institutions
6.2.2.1 Market size and forecast
6.2.3 Retail
6.2.3.1 Market size and forecast
6.2.4 Government
6.2.4.1 Market size and forecast
6.2.5 Telecommunication & IT
6.2.5.1 Market size and forecast
6.2.6 Education
6.2.6.1 Market size and forecast
6.2.7 Manufacturing and automotive
6.2.7.1 Market size and Forecast
6.2.8 Aerospace, DEFENSE and Intelligence
6.2.8.1 Market size and Forecast
6.2.9 Others
6.2.9.1 Market size and forecast
CHAPTER 7 GLOBAL MOBILE SECURITY MARKET BY OPERATING SYSTEM
7.1 iOS
7.1.1 Key market trends
7.1.2 Key growth factors and opportunities
7.1.3 Market size and forecast
7.2 Android
7.2.1 Key market trends
7.2.2 Key growth factors and opportunities
7.2.3 Market size and forecast
7.3 Windows
7.3.1 Key market trends
7.3.2 Key growth factors and opportunities
7.3.3 Market size and forecast
7.4 Blackberry
7.4.1 Key market trends
7.4.2 Key growth factors and opportunities
7.4.3 Market size and forecast
7.5 Others
7.5.1 Key market trends
7.5.2 Key growth factors and opportunities
7.5.3 Market size and forecast
CHAPTER 8 GLOBAL MOBILE SECURITY MARKET BY GEOGRAPHY
8.1 North America
8.1.1 Key market trends
8.1.2 Key growth factors and opportunities
8.1.3 Market size and forecast
8.2 Europe
8.2.1 Key market trends
8.2.2 Key growth factors and opportunities
8.2.3 Market size and forecast
8.3 Asia-Pacific
8.3.1 Key market trends
8.3.2 Key growth factors and opportunities
8.3.3 Market size and forecast
8.4 LAMEA
8.4.1 Key market trends
8.4.2 Key growth factors and opportunities
8.4.3 Market size and forecast
CHAPTER 9 COMPANY PROFILE
9.1 innoPath Software Inc.
9.1.1 Company overview
9.1.2 Company snapshot
9.1.3 Strategic moves and developments
9.1.4 SWOT analysis of innoPath Software Inc.
9.2 International Business Machine Corporation (IBM)
9.2.1 Company overview
9.2.2 Company snapshot
9.2.3 Financial performance
9.2.4 Strategic moves and developments
9.2.5 SWOT analysis of IBM
9.3 Microsoft Corporation
9.3.1 Company overview
9.3.2 Company snapshot
9.3.3 Financial performance
9.3.4 Strategic moves and developments
9.3.5 SWOT analysis of Microsoft Corporation
9.4 Google Inc.
9.4.1 Company overview:
9.4.2 Company snapshot
9.4.3 Financial performance
9.4.4 Strategic moves and developments
9.4.5 SWOT analysis of Google Inc.
9.5 Intel Corporation
9.5.1 Company overview
9.5.2 Company snapshot
9.5.3 Financial performance
9.5.4 Strategic moves and developments
9.5.5 SWOT analysis of Intel Corporation
9.6 Symantec Corporation
9.6.1 Company overview
9.6.2 Company snapshot
9.6.3 Financial performance
9.6.4 Strategic moves and developments
9.6.5 SWOT analysis of Symantec Corporation
9.7 Kaspersky Lab
9.7.1 Company overview
9.7.2 Company snapshot
9.7.3 Financial performance
9.7.4 Strategic moves and developments
9.7.5 SWOT analysis of Kaspersky Lab
9.8 MobileIron
9.8.1 Company overview
9.8.2 Company snapshot
9.8.3 Financial performance
9.8.4 Strategic moves and developments
9.8.5 SWOT analysis of MobileIron
9.9 Apple Inc.
9.9.1 Company overview
9.9.2 Company snapshot
9.9.3 Financial performance
9.9.4 Strategic moves and developments
9.9.5 SWOT analysis of Apple
9.10 VMware Inc.
9.10.1 Company overview
9.10.2 Company snapshot
9.10.3 Financial performance
9.10.4 Strategic moves and developments
9.10.5 SWOT analysis of VMware