Connect with us

Hi, what are you looking for?

Phones

Hackers see your smartphone as a vulnerable entry point

The proliferation of mobile devices is providing cyber criminals with additional launch points for targeted attacks, spurring demand for mobile endpoint protection solutions globally.

The proliferation of mobile devices is providing cyber criminals with additional launch points for targeted attacks, spurring demand for mobile endpoint protection solutions globally.

The proliferation of mobile devices is providing cyber criminals with additional launch points for targeted attacks, spurring demand for mobile endpoint protection solutions globally.  Hackers are able to gain access or control of mobile devices via malicious software (malware), while mobile applications (apps) on the device can perform unwanted, high-risk actions.  This jeopardizes the safety of sensitive data stored on the device, as it can be lost or stolen.  With the ubiquity of mobile devices and trends such as bring your own device (BYOD), industry and government regulations requiring businesses to control network access for all device types and applications adds to market growth.

New analysis from Frost & Sullivan’s Analysis of the Global Mobile Endpoint Protection Market finds the market earned revenue of $433.5 million in 2012, and estimates this to reach $1.0 billion in 2017.  The research notes endpoint security specialists McAfee and Symantec lead the market. However, several competitors, including entrepreneurial start-ups, are making progress in this critically strategic market.

With hackers becoming more effective in targeting and exploiting emerging technologies such as smartphones, cloud computing, and virtualization, enterprises are investing in mobile endpoint security software to protect and manage mobile devices.  The mobile security challenge requires a layered, defense-in-depth strategy that protects data at rest and in motion, provides protection for the actual device, and includes network-based controls for mobile traffic (including application traffic).

“Smartphones may fail to meet organizational security and compliance policy requirements as they are extremely susceptible to mobile malware breaches and unwanted or high risk mobile applications,” said Frost & Sullivan Network Security Senior Industry Analyst Chris Rodriguez. “The need to counter these new attack vectors presents a tremendous opportunity for developers of endpoint security software.”

Advertisement. Scroll to continue reading.

However, the mobile endpoint solutions market faces competition from other mobile security products. For instance, mobile device management (MDM) capabilities are considered an essential first step in addressing mobile security needs and a suitable replacement for mobile endpoint security solutions. Unfortunately, MDM does not address mobile malware and unwanted, high-risk mobile applications.  Businesses worldwide severely underestimate the risk presented by truly smart smartphones and tablets, and therefore delay uptake of comprehensive solutions.

“Mobile endpoint protection vendors should seek to acquire MDM companies to enable a robust enterprise endpoint security and device management portfolio,” suggested Rodriguez. “Leveraging new technologies such as cloud-based malware analysis, application wrapping, and containerization to deliver innovative solutions will further widen the global customer base.”

While end users from the business segment are opting for established security vendors such as McAfee and Symantec that offer essential enterprise central management and reporting capabilities, emerging start-ups are gaining traction in the strategically important consumer market with inventive, free or low-priced solutions.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Smart and its value brand TNT do not send text messages with clickable links. If you receive one—even if it looks like it’s from...

White Papers

n the Philippines, industry players are taking a more proactive approach to building a security framework for digital resilience.

HEADLINES

This marks the company’s first participation in the region’s premier tech event, where it will showcase its groundbreaking cybersecurity solutions to industry leaders, innovators,...

HEADLINES

A report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting...

White Papers

The Department of Information and Communications Technology (DICT) reports that government agencies, academic institutions, and telecommunications companies remain prime targets for cyber criminals, with...

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

Advertisement