Cet ouvrage fait partie de la bibliothèque YouScribe
Obtenez un accès à la bibliothèque pour le lire en ligne
En savoir plus

Frost & Sullivan: Hackers See Your Smartphone as a Vulnerable Entry Point

8 pages
Frost & Sullivan: Hackers See YourFrost & Sullivan: Hackers See Your Smartphone as a Vulnerable Entry Point PR Newswire MOUNTAIN VIEW, California, Dec. 17, 2013 -- Mass adoption of smartphones intensifies need for mobile endpoint protection solutions globally The mobile security challenge is dynamic and multi-faceted. The proliferation of mobile devices is providing cyber criminals with additional launch points for targeted attacks, spurring demand for mobile endpoint protection solutions globally. Hackers are able to gain access or control of mobile devices via malicious software (malware), while mobile applications (apps) on the device can perform unwanted, high-risk actions. This jeopardizes the safety of sensitive data stored on the device, as it can be lost or stolen. With the ubiquity of mobile devices and trends such as bring your own device (BYOD), industry and government regulations requiring businesses to control network access for all device types and applications adds to market growth. New analysis from Frost & Sullivan's Analysis of the Global Mobile Endpoint Protection Market finds the market earned revenue of $433.5 million in 2012, and estimates this to reach $1.0 billion in 2017. The research notes endpoint security specialists McAfee and Symantec lead the market. However, several competitors, including entrepreneurial start- ups, are making progress in this critically strategic market.
Voir plus Voir moins
Frost & Sullivan: Hackers See Your Smartphone as a Vulnerable Entry Point

PR Newswire

-- Mass adoption of smartphones intensifies need for mobile endpoint protection solutions globally

The mobile security challenge is dynamic and multi-faceted.  The proliferation of mobile devices is providing cyber criminals with additional launch points for targeted attacks, spurring demand for mobile endpoint protection solutions globally.  Hackers are able to gain access or control of mobile devices via malicious software (malware), while mobile applications (apps) on the device can perform unwanted, high-risk actions.  This jeopardizes the safety of sensitive data stored on the device, as it can be lost or stolen.  With the ubiquity of mobile devices and trends such as bring your own device (BYOD), industry and government regulations requiring businesses to control network access for all device types and applications adds to market growth.