123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Mobile Security Market Grows To $4.5b

Profile Picture
By Author: Skyhighnetworks
Total Articles: 54
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

As more consumers shift their attention and time to applications on mobile devices and tablets from traditional desktop and laptop computers, the market for Mobile Security solutions is expected to reach $4.5 Billion according to Claritus, a industry research firm based in London.

“Employees bringing mobile devices into the workplace has rapidly increased the number of security incidents, prompting renewed investment in security software to protect corporate data on mobile devices,” according to lead analyst Jacob Leikmeier. As a result, he says mobile security spending is projected to increase.

US workers now spend an average of 2 hours and 42 minutes per day using mobile, and 86 percent of the time spent on these devices is in apps, versus just 14% which is spent on web browsing. The increasing usage of smart phones is paralleled by more corporate data being used on mobile devices and their apps.

That’s making mobile a popular target for cybercriminals looking to steal valuable corporate data, which can include customer social security ...
... numbers or credit card numbers. The cost of security breaches is climbing, according to analysts, reaching $121 billion in 2012 in terms of damage of information systems, data lost, and legal costs stemming from lost data.

With valuable corporate information living on mobile devices and cloud services accessed via apps on those devices, companies are looking for new ways to secure their data. One approach, uses encryption applied to data when it is still on the corporate network to protect data even as it’s uploaded to different devices and applications. “Using enterprise owned encryption keys protects against a breach, since the data is inaccessible to any third party,” according to Leikmeier.

As the total market for mobile security including mobile device management (MDM) and other solutions is accounted for, expect new technologies to be introduced and innovative approaches to secure data, says Leikmeier.

Author :
Skyhigh Networks, the Cloud Security Services company, enables companies to embrace Cloud Security Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com/mobile-security/ or follow us on Twitter@skyhighnetworks.

Total Views: 482Word Count: 409See All articles From Author

Add Comment

Computers Articles

1. Bigbasket Grocery Data Extraction Api In India
Author: FoodDataScrape

2. Odoo Manufacturing In Australia: A Game Changer For Lean Production Management
Author: Alex Forsyth

3. Custom Vs Standard Odoo Implementation: Which Works Best For You?
Author: Alex Forsyth

4. Food Details Data Extraction Api From Swiggy India
Author: FoodDataScrape

5. Erp Software Development Cost Smackdown!
Author: web panel solutions

6. 8 Ways How To Use Chatgpt For Blogging?
Author: brainbell10

7. How Can Generative Al Used In Cybersecurity? A Complete Guide
Author: brainbell10

8. What Are Al Models And How Do They Work? Types, And Uses
Author: brainbell10

9. Extract Grocery Platform Pricing Data For All Locations India
Author: FoodDataScrape

10. Alumni Management Software In Higher Education: Enhancing Alumni Engagement And Institutional Growth
Author: Brenda Joyce

11. Web Scraping Api For Flipkart Grocery Product Data
Author: FoodDataScrape

12. Innovate Your Business Model With A White-label Gojek Clone App
Author: Swiza Joy

13. Mern Stack Kubernetes Deployment: A Practical 2025 Guide
Author: Mukesh Ram

14. How Rp80 Thermal Printers Boost Pos Efficiency
Author: prime pos

15. How To Design A Website That Keeps Visitors Hooked For Longer
Author: peter

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: