Mobile Device Security: Embedded Chip Security, Biometric Sensors, NFC, and Mobile OS Security

2Q 2012 | Report | RR-MSEC-12 | 42 pages | 9 tables | 8 charts | 7 figures | Excel | PDF | Powerpoint

Download

Table of Contents

  • Top Line Forecast
  • 1. INTRODUCTION, RECOMMENDATIONS, AND METHODOLOGY
    • 1.1. Forecast Methodology
    • 1.2. Definition for Mobile Device Hardware
    • 1.3. Mobile Operating System Security
  • 2. GOVERNMENT/ORGANIZATION MOBILE SECURITY ISSUES
    • 2.1. National Technical Authority for Information Assurance - UK (CESG)
    • 2.2. National Security Agency (NSA)
    • 2.3. GlobalPlatform
  • 3. MARKET FORECASTS
    • 3.1. Mobile Device Hardware Security
      • 3.1.1. Embedded Chip Security
      • 3.1.2. Near Field Communication
      • 3.1.3. Biometrics
      • 3.1.4. Smartphone Subscribers by Mobile Operating Systems
      • 3.1.5. Enterprise Security Client Subscribers
  • 4. TECHNOLOGY ASSESSMENT
    • 4.1. Introduction
    • 4.2. Embedded Chip Security
      • 4.2.1. TrustZone
      • 4.2.2. Semiconductor Security Features
    • 4.3. Near Field Communication
    • 4.4. Biometrics
    • 4.5. Mobile Operating System Security
  • 5. COMPETITIVE ASSESSMENT
    • 5.1. Mobile Operating System Security Vendor Matrix
      • 5.1.1. Innovation
      • 5.1.2. Implementation
    • 5.2. Global Market Shares for Enterprise Security Subscribers
  • 6. COMPANY ASSESSMENTS
    • 6.1. Apple Inc
      • 6.1.1. Mobile Operating System Security
      • 6.1.2. Global Market Shares for Enterprise Security Subscribers
      • 6.1.3. Market Share: 31.8%
    • 6.2. Google
      • 6.2.1. Mobile Operating System Security Vendor Matrix
      • 6.2.2. Global Market Shares for Enterprise Security Subscribers
      • 6.2.3. Market Share: 26.3%
    • 6.3. Microsoft Corporation
      • 6.3.1. Mobile Operating System Security Vendor Matrix
      • 6.3.2. Global Market Shares for Enterprise Security Subscribers
      • 6.3.3. Market Share: 3.1%
    • 6.4. Nokia
      • 6.4.1. Mobile Operating System Security Vendor Matrix
      • 6.4.2. Global Market Shares for Enterprise Security Subscribers
      • 6.4.3. Market Share: 1.2%
    • 6.5. Research In Motion Ltd (RIM)
      • 6.5.1. Mobile Operating System Security Vendor Matrix
      • 6.5.2. Global Market Shares for Enterprise Security Subscribers
      • 6.5.3. Market Share: 37.2%
  • 7. ACRONYMS
    • 7.1. Sources and Methodology
    • 7.2. Notes

Charts

  1. Mobile Device Hardware Security Revenues
  2. Enterprise Security Subscribers in 2012
  3. Mobile Device Hardware Security Revenues
  4. Embedded Chip Security Revenues
  5. Biometrics Revenues in Mobile Devices
  6. Smartphone Subscribers by OS
  7. Enterprise Smartphone Security Client Subscribers by OS
  8. Enterprise Smartphone Security Subscribers by Region

Figures

  1. TrustZone Technology, Normal World and Secure World
  2. Mobile Operating System Security Vendor Matrix Rankings
  3. Apple Inc's Mobile Operating System Security Vendor Matrix Ranking
  4. Google's Mobile Operating System Security Vendor Matrix Ranking
  5. Microsoft Corporation's Mobile Operating System Security Vendor Matrix Ranking
  6. Nokia's Mobile Operating System Security Vendor Matrix Ranking
  7. RIM's Mobile Operating System Security Vendor Matrix Ranking


To continue reading:

Log In or Subscribe

Continue Reading

Log In or Subscribe