Malware alert

SECURITY

|
Image: By BiztechAfrica
Malware alert

A new report from Juniper Research finds that only 5% of global smartphones and tablet devices have security software installed, despite a steadily increasing threat from malware, fraud and device theft.

The report forecasts that both corporate and personal users will begin to recognise the need to protect their data and the demand for mobile security products will increase over the next five years to a point where 1 in 5 mobile devices will be protected by third party security software.

In addition, the report found that, apart from headline grabbing malware attacks on phones, the risk of crimes such as identity theft will be a strong motivator for users to adopt mobile security software. Device loss or theft affects both consumer and corporate markets and hence demand for security solutions in both sectors will increase.

The new report, Mobile Security Strategies: Threats, Solutions & Market Forecasts 2012-2017 found that, as the security threat increases, and users become more aware of these issues, mobile operators and device vendors need to recognise the potential value that can be achieved by integrating key security features such as ‘Track the Device’ or 'Lock and Wipe’ into their product offerings for customers.

Report author Nitin Bhas notes: “Bundling mobile security apps along with other managed services will not only provide incremental revenue for the service providers, but will also help them guarantee better customer satisfaction and churn”.

The report expects the number of protected consumer devices to overtake protected enterprise devices by 2015, driven by BYOD trends. Employee owned smartphones and tablets used in the enterprise will reach almost 350 million by 2014, it says.



Share the News

Get Daily Newsletter

Search News

comments powered by Disqus

MORE SECURITY NEWS

Top targets for cyber attacks in East Africa

Governments are East Africa’s top target sector for cyber attacks, followed by telecoms and financial  services, says a report by Control Risks. Read More

Connecting the dots: respond-to-alerts based security posture will not protect

According to an Arbor paper, “Connecting the Dots in Enterprise Security”, advanced threats target a specific company, are designed to bypass traditional controls, and comprise a planned and orchestrated set of attack activities. Read More

DNS attacks on the increase, concern for SA firms

South African organisations will likely see an increase in the volume and severity of network attacks over the coming years, says Arbor Networks. Read More

RSA: 75 percent of organisations at significant risk of cyber incidents

RSA, The Security Division of EMC, has released data demonstrating that organisations that invest in detection and response technologies, rather than perimeter-based solutions, are better poised to defend against cyber incidents.  Read More

DDoS attacks don’t have to mean ‘game over’

The problem of inadequate protection from DDoS attacks is a growing concern for South African organisations, says Arbor Networks. Read More

DNS attacks on the increase, concern for SA firms

Arbor Networks Annual Worldwide Infrastructure Security Report provides a rare insight into the nature of today’s network security threats, and the ways in which enterprise network operators and service providers are facing up to these challenges.  Read More

Arbor Networks Spectrum v2.1 pioneers new network approach for security teams

Arbor Networks Inc., the security division of NETSCOUT, has introduced version 2.1 of Arbor Networks Spectrum, its advanced security analytics and threat-hunting platform, to the African region.  Read More

Things to ask your MSSP to increase your network’s security

Arbor Networks has drawn up five questions to ask an MSSP to better ensure security throughout your organization. Read More

Unpacking penetration testing for SMEs

MWR Infosecurity outlines penetration testing best practice for SMEs. Read More

Separating the attack that matters from the noise

It has almost become the norm for a business to be compromised by a security attack. The emphasis today is thus more on how a business responds to the attack, that is how have they prepared for the breach and how do they communicate it?  Read More

PRESS OFFICES

Sage EnterpriseSAP AfricaTrust PayVMWareSamsung ElectronicsMitsumi DistributionPhoenix DistributionMTN BusinessSchneider ElectricMultichoiceMicrosoft 4AfrikaNetworks UnlimitedArbor NetworksEricssonTigo Ghana

FEATURED STORY

Government should encourage youths in ICT earlyGovernment should encourage youths in ICT early

Youths should be given more encouragement to develop their ICT skills, an 11-year-old app developer told Kokumo Goodie.

IN DEPTH

IBM Opens First Cloud Data Centre in South AfricaIBM Opens First Cloud Data Centre in South Africa

IBM is opening a new IBM Cloud Data Centre in Johannesburg, South Africa. The new cloud center is the result of a close collaboration with Gijima and Vodacom and is designed to support cloud adoption and customer demand across the continent.