search reports
Categories
Categories

The Mobile Device Security Bible: 2014 - 2020

Report Code : snst0139
Published Date : 01 November, 2013 | No of Pages: 284

  • Report Description
  • Table of Contents
  • Companies Mentioned
  • Related Reports
Part of the “The Mobile Device & Network Security Bible”, this report presents in-depth assessment of the global mobile device security market. The report focuses on the following two submarkets:
Mobile Device Client Security Software:
Anti-Malware/Anti-Virus Client Software
Back Up & Restore Software
Privacy Protection Software
Mobile VPN Client Software
Remote Locking Software
Remote Tracking Software
Encrypted Communications (Voice/Data) Software
Encrypted Storage Software
Mobile Device Security Hardware:
Semiconductors/Embedded Chip Security
NFC
Biometrics
In addition to covering key market drivers, challenges, future roadmap, value chain analysis, deployment case studies and vendor service/product strategies for several individual submarkets, the report also presents comprehensive forecasts for the mobile device and network security market from 2013 till 2020. Historical revenue figures for 2010 – 2012 are also presented. The forecasts and historical revenue figures are individually segmented for four submarkets, 17 product/service categories, six geographical regions and 34 countries.
The report comes with an associated Excel datasheet covering quantitative data from all figures presented within the report.Topics Covered:
The report covers the following topics:
• An in-depth analysis for two individual submarkets and their associated product/service categories:
Mobile Device Client Security Software
Mobile Device Security Hardware
• Value chain analysis for each submarket
• Key market drivers and challenges for each submarket
• Key trends for each submarket
• Case studies on product/service deployment for each submarket
• Profiles and strategies of key players in the market
• Historical revenue figures and forecasts till 2020


Historical Revenue & Forecast Segmentation:
Market forecasts and historical revenue figures are provided for each of the following submarkets and their product/service categories:
• Mobile Device Client Security Software
- Anti-Malware/Anti-Virus Client Software
- Back Up & Restore Software
- Privacy Protection Software
- Mobile VPN Client Software
- Remote Locking Software
- Remote Tracking Software
- Encrypted Communications (Voice/Data) Software
- Encrypted Storage Software
• Mobile Device Security Hardware
- Semiconductors/Embedded Chip Security
- NFC
- Biometrics

The following regional and country markets are also covered:

• Regional Markets
- Asia Pacific
- Eastern Europe
- Latin & Central America
- Middle East & Africa
- North America
- Western Europe

• Country Markets
- Argentina, Australia, Brazil, Canada, China, Czech Republic, Denmark, Finland, France, Germany, India, Indonesia, Israel, Italy, Japan, Malaysia, Mexico, Norway, Pakistan, Philippines, Poland, Qatar, Russia, Saudi Arabia, Singapore, South Africa, South Korea, Spain, Sweden, Taiwan, Thailand, UAE, UK, USA


Key Findings:
The report has the following key findings:

• Driven by the thriving ecosystem, SNS Research estimates that mobile device and network security investments will account for nearly $9 Billion in 2013 alone. The market is further expected to grow at a CAGR of nearly 21% over the next 7 years
• Enterprises and mobile network operators have made significant investments in integrated security appliances and content security gateways (including those specific to SMS/MMS security)
• The installation of Anti-Malware/Anti-Virus client software is fast becoming a de-facto requirement for most smartphones and tablets
• More than half of all enterprises allow the use of employed owned mobile devices on their networks. Enterprises thus continue to aggressively adopt SSL VPNs in their mobile security strategies to ensure connection security in addition to activity monitoring and control
• Mobile Device Management (MDM) services providers are eyeing on opportunities for cloud based mobile security services that extend existing security policies to enterprise mobile devices to help secure data, reduce risk and protect the enterprise, which has created a new submarket for mobile Security as a Service (SEaaS)


Key Questions Answered:
The report provides answers to the following key questions:

• How big is the mobile device security market, and what particular submarkets does it constitute?
• Who are the key players in each submarket?
• How is the value chain structured for each submarket and how will it evolve overtime?
• Which regions and countries will witness the highest percentage of growth in mobile security spending?
• Will recent privacy scandals have a negative impact on mobile security spending in the coming years?
• What known malware families are most dangerous for modern smartphones?
Table of Contents
List of Figures
1 Chapter 1: Introduction
1.1 Executive Summary
1.2 Topics Covered
1.3 Historical Revenue & Forecast Segmentation
1.4 Key Questions Answered
1.5 Key Findings
1.6 Methodology
1.7 Target Audience
1.8 Companies & Organizations Mentioned
2 Chapter 2: An Overview of the Mobile Device & Network Security Market
2.1 The Importance of Mobile Devices & Networks
2.1.1 Mobile Devices Outnumber PCs & Notebooks
2.1.2 Supporting a Plethora of Applications & Hardware Peripherals
2.1.3 Vulnerability to Attacks: Opening the Market for Mobile Security
2.2 What Constitutes the Mobile Device & Network Security Market?
2.3 Mobile Network Infrastructure Security Software & Appliances
2.3.1 Overview
2.3.2 What Constitutes this Submarket?
2.3.3 Value Chain
2.3.4 Vendor Landscape: Key Characteristics
2.4 Mobile Device Client Security Software
2.4.1 Overview
2.4.2 What Constitutes this Submarket?
2.4.3 Value Chain
2.4.4 Vendor Landscape: Key Characteristics
2.5 Mobile Device Security Hardware
2.5.1 Overview
2.5.2 What Constitutes this Submarket?
2.5.3 Value Chain
2.5.4 Vendor Landscape: Key Characteristics
2.6 Mobile Security & MDM Services
2.6.1 Overview
2.6.2 What Constitutes this Submarket?
2.6.3 Value Chain
2.6.4 Vendor Landscape: Key Characteristics
3 Chapter 3: Mobile Network Infrastructure Security Software & Appliances
3.1 Integrated Security Appliances
3.1.1 Introduction
3.1.2 How Integrated Security Appliance Help in Securing Mobile Networks?
3.1.3 Integrated Security Appliance Use Cases
3.1.3.1 Firewall
3.1.3.2 Intrusion Prevention System (IPS)
3.1.3.3 Email Protection System
3.1.3.4 Identity Protection System
3.1.3.5 Content Filtering
3.1.3.6 Anti-Virus and Anti-Spyware Protection
3.1.3.7 Anti-Spam Filtering
3.1.3.8 Virtual Private Networks (VPN)
3.1.4 Key Market Drivers
3.1.4.1 Mobility
3.1.4.2 Small Businesses
3.1.4.3 Ubiquity
3.1.4.4 Compliance
3.1.4.5 Processing Power
3.1.5 Key Market Challenges
3.1.5.1 Design Trade-offs
3.1.5.2 Single Point of Failure
3.1.6 Key Players in the Market
3.1.7 Recent Innovations and Developments
3.1.7.1 Case Study: Sophos
3.1.7.2 Case Study: Fortinet
3.2 Content Security Gateways
3.2.1 Introduction
3.2.2 How Content Security Gateways Protect Mobile Networks?
3.2.3 Delivery Modes
3.2.4 Features
3.2.5 Key Market Drivers
3.2.5.1 Internet Growth
3.2.5.2 Granularity of Features
3.2.6 Key Market Challenges
3.2.6.1 Risk-reward Ratio
3.2.7 Key Players in the Market
3.2.8 Recent Innovations and Developments
3.2.8.1 Case Study: SaaS based Vendors
4 Chapter 4: Mobile Device Client Security Software
4.1 Anti-Malware/Anti-Virus Client Software
4.1.1 Introduction
4.1.2 Detection Mechanism: How it Works?
4.1.3 Delivery Mode
4.1.4 Performance Barometers
4.1.5 Key Market Drivers
4.1.5.1 Mobile Device Shipment Volumes
4.1.5.2 Device Metamorphosis
4.1.5.3 Application Marketplaces
4.1.6 Key Market Challenges
4.1.6.1 Limited Resource Availability
4.1.6.2 Scepticism
4.1.7 Key Players in the Market
4.1.8 Recent Innovations and Developments
4.1.8.1 Case Study: Antivirus Test Results
4.1.8.2 Vulnerability Against Malware
4.2 Back Up & Restore Software
4.2.1 Introduction
4.2.2 Trend Micro Case Study: How Mobile Back Up & Restore Software Works?
4.2.3 Delivery Mode
4.2.4 Key Market Drivers
4.2.4.1 Short Replacement Cycles
4.2.4.2 Maturity of Third Party Hosting Services
4.2.5 Key Market Challenges
4.2.5.1 Software Usability Issues
4.2.5.2 Data Security & Confidentiality in the Cloud
4.2.6 Key Players in the Market
4.2.7 Recent Innovations and Developments
4.2.7.1 Case Study: Axiom and NQ Mobile
4.2.7.2 Case Study: Cellebrite
4.3 Privacy Protection Software
4.3.1 Introduction
4.3.2 How Does Mobile Privacy Protection Software Work?
4.3.3 Key Market Drivers
4.3.3.1 Proliferation of Mobile User Information
4.3.3.2 Monitoring & Regulating Access to Personal Data
4.3.4 Key Market Challenges
4.3.4.1 Ambiguity of Functionality & Software Bundling
4.3.4.2 Lack of Commercial Instigation
4.3.5 Recent Innovations and Developments
4.3.5.1 CalOPPA
4.4 Mobile VPN Client Software
4.4.1 Introduction
4.4.2 How Mobile VPN Works?
4.4.3 Key Market Drivers
4.4.3.1 Privacy over Public Mobile Networks
4.4.3.2 Bypassing Restrictions
4.4.4 Key Market Challenges
4.4.4.1 Duality of Android
4.4.4.2 Interoperability
4.4.5 Key Players in the Market
4.4.6 Recent Innovations and Developments
4.4.6.1 Case Study: Inside Secure
4.5 Remote Locking Software
4.5.1 Introduction
4.5.2 How Remote Locking Software Works?
4.5.3 Key Market Drivers
4.5.4 Key Market Challenges
4.5.5 Key Players in the Market
4.5.6 Recent Innovations and Developments
4.6 Remote Tracking Software
4.6.1 Introduction
4.6.2 How Remote Tracking Software Works?
4.6.3 Key Market Drivers
4.6.3.1 Device Recovery
4.6.3.2 Proactive Location Based Warning
4.6.4 Key Market Challenges
4.6.4.1 Privacy Concerns
4.6.4.2 Location Technology Challenges
4.6.5 Key Players in the Market
4.6.6 Recent Innovations and Developments
4.6.6.1 Case Study: SK Telecom
4.7 Encrypted Communications (Voice/Data) Software
4.7.1 Introduction
4.7.2 How Encrypted Communications Software Works?
4.7.2.1 AT&T’s Approach
4.7.2.2 Cellcrypt’s Approach
4.7.2.3 RIM’s Approach
4.7.3 Key Market Drivers
4.7.3.1 Confidentiality
4.7.3.2 Wider Stakeholder Participation
4.7.4 Key Market Challenges
4.7.4.1 Overheads
4.7.4.2 Managing the Balance
4.7.5 Key Players in the Market
4.7.6 Recent Innovations and Developments
4.7.6.1 Case Study: Silent Circle
4.8 Encrypted Storage Software
4.8.1 Introduction
4.8.2 How Encrypted Storage Software Works?
4.8.3 Key Market Drivers
4.8.3.1 Preserving Integrity of Personal Data
4.8.3.2 Remote Functionality
4.8.4 Key Market Challenges
4.8.4.1 Performance Issues
4.8.5 Key Players in the Market
4.8.6 Recent Innovations and Developments
5 Chapter 5: Mobile Device Security Hardware
5.1 Semiconductors/Embedded Chip Security
5.1.1 Introduction
5.1.2 How Embedded Chip Security Works?
5.1.3 Scenarios to be Catered For
5.1.3.1 Secure Paths Within the Device
5.1.3.2 Enforcing DRM Rules
5.1.3.3 Enforcing Software and Hardware Integrity
5.1.3.4 Management of Meta-data
5.1.3.5 Management of Updates
5.1.3.6 Management of Mobile Payments
5.1.3.7 Preventing Unauthorized Access to the Device
5.1.4 Role Played by TCG
5.1.4.1 TPM Mobile
5.1.5 Key Market Drivers
5.1.5.1 Best Fitment
5.1.5.2 Advances in Cryptography
5.1.6 Key Market Challenges
5.1.6.1 Stakeholder Ennui
5.1.7 Key Players in the Market
5.1.8 Recent Innovations and Developments
5.1.8.1 Barriers to TPM Mobile
5.1.8.2 Can Embedded Chip Security Deter the Growth of Security Software Applications?
5.2 NFC
5.2.1 Introduction
5.2.2 How NFC Works?
5.2.2.1 Features and Use Cases
5.2.2.2 Is NFC Immune to Eavesdropping?
5.2.2.3 Security Measures
5.2.3 Key Market Drivers
5.2.3.1 Universality & Versatility
5.2.3.2 Support from Mobile Network Operators
5.2.4 Key Market Challenges
5.2.4.1 Stakeholder Reluctance to Hardware Modification
5.2.4.2 Lack of Focus on Robust Encryption Techniques
5.2.5 Key Players in the Market
5.2.5.1 Early Developers
5.2.5.2 Mobile Network Operators
5.2.5.3 Semiconductor Chipset Makers
5.2.5.4 Mobile OEMs
5.2.6 Recent Innovations and Developments
5.2.6.1 Google Wallet: Transforming Mobile Devices Into Virtual Wallets
5.2.6.2 ISIS
5.3 Biometrics
5.3.1 Introduction
5.3.1.1 Representing Identity Data
5.3.1.2 Fingerprint Capture
5.3.1.3 Facial Feature Recognition
5.3.1.4 Usage of Voice Recognition
5.3.2 How Biometrics Work?
5.3.2.1 Enrollment
5.3.2.2 Sample Extraction
5.3.2.3 Biometric Validation
5.3.3 Key Market Drivers
5.3.3.1 Mobility & Emerging Applications of Biometrics
5.3.3.2 Mobile Network Operator Interest
5.3.4 Key Market Challenges
5.3.4.1 Hardware Value Addition
5.3.4.2 Stakeholder Scepticism
5.3.5 Key Players in the Market
5.3.6 Recent Innovations and Developments
5.3.6.1 Voice Recognition Software: Lessons for Mobile Biometrics
5.3.6.2 EyeVerify: Identifying Live Eye Vein Patterns
6 Chapter 6: Mobile Security and MDM Services
6.1 On-Premises Mobile Security MDM Services
6.1.1 Introduction
6.1.2 How MDM Services Work?
6.1.3 Essential Attributes of MDM Services
6.1.3.1 Accessibility
6.1.3.2 Should Not be Perceived as an Overhead
6.1.3.3 Granularity
6.1.3.4 Ease of Maintenance and Management
6.1.4 Key Market Drivers
6.1.4.1 Dissolution of Distinction between Personal and Official Devices
6.1.4.2 The Growing Penetration of the iPhone and Android Devices
6.1.4.3 BYOD
6.1.4.4 Need for Policy Framework
6.1.5 Key Market Challenges
6.1.5.1 Administration Overhead
6.1.5.2 Distinguishing between Personal and Corporate Usage
6.1.6 Key Players in the Market
6.1.7 Recent Innovations and Developments
6.2 Cloud Based Mobile SECaaS MDM Services
6.2.1 Introduction
6.2.2 How Cloud Based Mobile SaaS MDM Services Work?
6.2.3 Desirable Attributes
6.2.3.1 Integration with Directory Services
6.2.3.2 Email Access Control
6.2.3.3 Network Up-time and Availability
6.2.3.4 Operational and Security Practices
6.2.3.5 Measures to Reduce Manual Intervention
6.2.4 Key Market Drivers
6.2.4.1 Freedom from Upfront Investment
6.2.4.2 Tackling Obsolescence
6.2.4.3 Operational Synergy
6.2.5 Key Market Challenges
6.2.5.1 Implications of Hosting
6.2.6 Key Players in the Market
6.2.7 Case Study of Integrated MDM: AirWatch
6.2.7.1 OS Support
6.2.7.2 MDM Features
6.2.7.3 Hosting Models
6.2.7.4 Licensing Mechanism
6.3 Mobile Identity Management Services
6.3.1 Introduction
6.3.2 History
6.3.3 Modus operandii, innovations and key players explained through diverse approaches
6.3.3.1 Active Directory from Microsoft
6.3.3.2 SSO from Oracle
6.3.3.3 Establishing the SIM Card as an Authentication Device
6.3.3.4 Adding Mobility to Digital Ids: Valimo/Gemalto Case Study
6.3.4 Key Market Drivers
6.3.4.1 Mobility for Business Users
6.3.4.2 Ease of Use
6.3.4.3 Financial Inclusion
6.3.4.4 Incentive for Mobile Network Operators
6.3.5 Key Market Challenges
6.3.5.1 Device Vulnerability
7 Chapter 7: Key Company Profiles
7.1 3M Cogent
7.2 Actiance
7.3 Adtran
7.4 AirWatch
7.5 Amtel
7.6 AT&T
7.7 AVG
7.8 Barracuda
7.9 BullGuard
7.1 Cellabrite
7.11 Cisco Systems
7.12 Dell
7.13 Ericsson
7.14 ESET
7.15 F-Secure
7.16 IBM
7.17 Inside Secure
7.18 Kaspersky Lab
7.19 KoolSpan
7.2 LookOut
7.21 McAfee
7.22 Microsoft
7.23 MobileIron
7.24 Mocana
7.25 Motorola Solutions
7.26 Netmotion
7.27 Nokia
7.28 NQ Mobile
7.29 NXP
7.3 Oracle
7.31 Panda Security
7.32 RIM
7.33 Sophos
7.34 Soti
7.35 SRA International
7.36 Symantec
7.37 Trend Micro
7.38 Untangle
7.39 Webroot
7.4 ZyXEL
7.41 Others
8 Chapter 8: Market Analysis & Forecasts
8.1 Global Outlook of the Mobile Device & Network Security Market
8.2 Submarket Segmentation
8.3 Mobile Network Infrastructure Security Software & Appliances Submarket
8.3.1 Integrated Security Appliances for Mobile Networks
8.3.2 Content Security Gateways for Mobile Networks
8.3.3 SMS/MMS Security Gateways for Mobile Networks
8.4 Mobile Device Client Security Software Submarket
8.4.1 Anti-Malware/Anti-Virus Client Software
8.4.2 Back Up & Restore Software
8.4.3 Privacy Protection Software
8.4.4 Mobile VPN Client Software
8.4.5 Remote Locking
8.4.6 Remote Tracking Software
8.4.7 Encrypted Communication (Voice/Data) Software
8.4.8 Encrypted Storage Software
8.4.9 Enterprise vs. Consumer Segmentation
8.5 Mobile Device Security Hardware Submarket
8.5.1 Semiconductors/Embedded Chip Security
8.5.2 NFC
8.5.3 Biometrics
8.6 Mobile Security & MDM Services
8.6.1 On-premises Mobile Security MDM Services
8.6.2 Cloud Based Mobile SECaaS Services
8.6.3 Mobile Identity Management Services
8.7 Regional Outlook
8.8 Asia Pacific
8.8.1 Submarket Segmentation
8.8.2 Mobile Network Infrastructure Security Software & Appliances
8.8.3 Mobile Device Client Security Software
8.8.4 Mobile Device Security Hardware
8.8.5 Mobile Security & MDM Services
8.8.6 Country Level Segmentation
8.8.7 Australia
8.8.8 China
8.8.9 India
8.8.10 Japan
8.8.11 South Korea
8.8.12 Pakistan
8.8.13 Thailand
8.8.14 Indonesia
8.8.15 Malaysia
8.8.16 Taiwan
8.8.17 Philippines
8.8.18 Rest of Asia Pacific
8.9 Eastern Europe
8.9.1 Submarket Segmentation
8.9.2 Mobile Network Infrastructure Security Software & Appliances
8.9.3 Mobile Device Client Security Software
8.9.4 Mobile Device Security Hardware
8.9.5 Mobile Security & MDM Services
8.9.6 Country Level Segmentation
8.9.7 Czech Republic
8.9.8 Poland
8.9.9 Russia
8.9.10 Rest of Eastern Europe
8.1 Latin & Central America
8.10.1 Submarket Segmentation
8.10.2 Mobile Network Infrastructure Security Software & Appliances
8.10.3 Mobile Device Client Security Software
8.10.4 Mobile Device Security Hardware
8.10.5 Mobile Security & MDM Services
8.10.6 Country Level Segmentation
8.10.7 Argentina
8.10.8 Brazil
8.10.9 Mexico
8.10.10 Rest of Latin & Central America
8.11 Middle East & Africa
8.11.1 Submarket Segmentation
8.11.2 Mobile Network Infrastructure Security Software & Appliances
8.11.3 Mobile Device Client Security Software
8.11.4 Mobile Device Security Hardware
8.11.5 Mobile Security & MDM Services
8.11.6 Country Level Segmentation
8.11.7 South Africa
8.11.8 UAE
8.11.9 Qatar
8.11.10 Saudi Arabia
8.11.11 Israel
8.11.12 Rest of the Middle East & Africa
8.12 North America
8.12.1 Submarket Segmentation
8.12.2 Mobile Network Infrastructure Security Software & Appliances
8.12.3 Mobile Device Client Security Software
8.12.4 Mobile Device Security Hardware
8.12.5 Mobile Security & MDM Services
8.12.6 Country Level Segmentation
8.12.7 USA
8.12.8 Canada
8.13 Western Europe
8.13.1 Submarket Segmentation
8.13.2 Mobile Network Infrastructure Security Software & Appliances
8.13.3 Mobile Device Client Security Software
8.13.4 Mobile Device Security Hardware
8.13.5 Mobile Security & MDM Services
8.13.6 Country Level Segmentation
8.13.7 Denmark
8.13.8 Finland
8.13.9 France
8.13.10 Germany
8.13.11 Italy
8.13.12 Spain
8.13.13 Sweden
8.13.14 Norway
8.13.15 UK
8.13.16 Rest of Western Europe
Market Intel Report The Mobile Device & Network Security Bible: 2013 - 2020
By: SNS Telecom | Published Date : 02 September, 2013 | No of Pages : 284
3M Cogent aap3 inc AccelOps Accuvant Actiance AdaptiveMobile Adtran AEP Afore AhnLab AirWatch Akamai Alcatel-Lucent Alert Logic Amazon American Portwell Technology Amtel Anam Andrisoft Antiy Anywr AppBlade Apple AppRiver Arbor Networks Array Networks Arxceo Asus AT&T AuthenTec Avanquest Avast AVG Technologies N.V Avira AV-TEST Axiom Telecom Barracuda Networks Barrier Group Bayometric Beijing Venustech Belgacom Birdstep Technology BitDefender Bloove Blue Coat BlueCat Networks Bluefire Boxtone Broadcomm BroadWeb Corporation Brocade BullGuard CA Technologies Calyptix Security Corporation Capita CDW Corporation Celestix Networks Cellcrypt Cellebrite Cellulike CelluSys Centrify CheckPoint Software Technologies China Mobile China Unicom CipherCloud Cisco Systems Citrix Clavister Cloud Security Alliance CloudLock Cloudmark Columbitech Comcast Commtouch CommuniTake Comodo Core Security Technologies Corero CORISECIO Credant Cross Match Technologies CrucialTec Cryptzone Cybera Cyberoam Damballa DataViz Dell Dell SecureWorks Dell Sonicwall Deutsche Telekom DeviceLock DHILL DIALOGS Digital Defense D-Link Corporation Dr. Web Echoworx EdgeWave eEye Digital Security Elisa EMC Enterasys Entrust Ericsson ESET eSoft European Network and Information Security Agency (ENISA) Excitor EyeVerify F5 Networks Facebook FancyFon FFIEC Fiberlink FireHost Fixmo ForeScout Fortinet Foundation F-Secure Fujitsu Fulcrum Biometerics Futura Mobility gateProtect Gemalto Genband GenieNRM Get Safe Online Gigamon Global DataGuard Global Technology Associates GlobalPlatform GMSK Good Technology Google GTA Hewlett Packard (HP) Hitachi HTC Huawei HyTrust IBM iboss Imation Imperva Infineon InnoPath Software Inside Secure Intel Intrusion, Inc. Iris ID ISACA ISS Juniper Networks Kaspersky Lab Kerio Technologies Kindsight KoolSpan Kore Telematics Korea Telecom (KT) KPN Layer 7 Level Platforms LG Lionic Lookout Mahndra Comviva ManageEngine Mandiant Marigold Marble Security (Formerly IronKey) McAfee Mformation Microsoft Microworld Mobical Mobile Active Defense Mobile Application Development Partners Mobile Idea Studio MobileHome MobileIron MobileSpaces Mocana Motorola Motorola Solutions mSpy Narus National Institute of Standards and Technology (NIST) NCP engineering GmbH Netasq Netgear Netmotion Nevis Networks NexusSafe NFC Forum Nokia Nokia Solutions and Networks (NSN) Nominum North Carolina State University Northwestern University Norton NQ Mobile NTT DoCoMo NXP OATH Odyssey Software Okta Optenet Optio Labs Oracle Orange (France Telecom) Palm Palo Alto Networks Panasonic Panda Security Pantech PerspecSys PGP Universal Philips Phone On Map PineApp Ping Identity Pointsec Prolexic ProofPoint PROTEI Qualcomm Qualys QuickHeal Radware RBI Renesas Rerware RIM RioRey RSA SafeNet Safran Samsung Electronics SanDisk SAP SecPoint Secunia Securitas SecurStar SharePoint Silent Circle SilverSky SK Telecom SkyHigh Telecom SmithMicro Software SmoothWall Ltd Software Security Solutions Sony Sophos Soti Sourcefire Spansion SpyChest SRA International Stealth Genie StillSecure STMicroelectronics Stonesoft Sun Microsystems SuperValu Sybase Symantec Symplified Symsoft Tarmac Tekelec (Oracle) Telecommunications Industry Association (TIA) Telefonica Telenor TeliaSonera Telit Telstra Tenable Thales Thales e-Security The Trusted Computing Group (TCG) TigerText T-Mobile Total Defense Trend Micro TRITON Trust Digital Trusteer TrustGo Trustlook Trustwave TurkCell UMU Untangle Valimo VeliQ Veracode Verisign Verizon Verizon Wireless Vodafone Voltage Security Vormetric WatchGuard Technologies Wavelink Webroot Websense Zenprise (now Citrix) Zscaler ZTE ZyXEL Communications
Please select License
Single User Price:$ 1500
Site License Price:$ 2500
Enterprise Price:$ 2500