SECURITYBy BiztechAfrica - Sept. 26, 2012, 10:04 a.m.
A new report from Juniper Research finds that only 5% of global smartphones and tablet devices have security software installed, despite a steadily increasing threat from malware, fraud and device theft.
The report forecasts that both corporate and personal users will begin to recognise the need to protect their data and the demand for mobile security products will increase over the next five years to a point where 1 in 5 mobile devices will be protected by third party security software.
In addition, the report found that, apart from headline grabbing malware attacks on phones, the risk of crimes such as identity theft will be a strong motivator for users to adopt mobile security software. Device loss or theft affects both consumer and corporate markets and hence demand for security solutions in both sectors will increase.
The new report, Mobile Security Strategies: Threats, Solutions & Market Forecasts 2012-2017 found that, as the security threat increases, and users become more aware of these issues, mobile operators and device vendors need to recognise the potential value that can be achieved by integrating key security features such as ‘Track the Device’ or 'Lock and Wipe’ into their product offerings for customers.
Report author Nitin Bhas notes: “Bundling mobile security apps along with other managed services will not only provide incremental revenue for the service providers, but will also help them guarantee better customer satisfaction and churn”.
The report expects the number of protected consumer devices to overtake protected enterprise devices by 2015, driven by BYOD trends. Employee owned smartphones and tablets used in the enterprise will reach almost 350 million by 2014, it says.
MORE SECURITY NEWS
2014 Banking and ICT summits pegged for Uganda, Zambia and EthiopiaCyber Security Africa has announced that its 2014 Banking and ICT summits will be hosted in Uganda, Zambia and Ethiopia. Read More
Security in 2014: Money and MayhemIT security stands at the frontier of a fight for wealth and information, says Andrew Kirkland, Regional Director Africa, Trustwave. Read More
McAfee delivers on Intel vision of free mobile securityMcAfee has announced details of free protection for consumers on any Android and iOS mobile device. Read More
Botswana financial institutions exposed to cyber crimeBotswana’s financial institutions face a growing risk of cyber fraud, says BIC MD Dziki Nganunu. Read More
New Android threat risesThe AndroRAT is an example of how cyber criminals can manipulate apps for their own gain, says Intact Security. Read More
Arbor Networks partners with Networks Unlimited in SSAArbor Networks has announced a new partnership with Networks Unlimited to help organisations better mitigate and defend against the growing DDoS threat to their customers’ businesses. Read More
Trend Micro’s 2013 threat roundup highlights private data profitabilityAccording to Trend Micro Incorporated’s 2013 annual threat roundup report, “security breaches, cyber criminals, and organised attacks made it nearly impossible to keep personal and financial data private. Read More
Hardcore goons use mobiles to scare, extort KenyansHardcore criminals in prison are reported to be using mobile phones to extort money and scare Kenyan civilians. Read More
Phone scammers back in businessMicrosoft has warned of scam artists who defraud PC users by pretending to work for Microsoft. Read More
ADT, McAfee study finds parallels between physical, digital securityMcAfee has released the results of a survey that takes a look at the important parallels between personal and online security. Read More
FEATURED STORYMACRA demystifies spectrum management
Malawi's regulator explains the issues around spectrum allocation. Gregory Gondwe reports.
BEST READ NEWS
IN DEPTHYouthConnekt launches Mobile Apps for Human Development Challenge in Rwanda
Rwanda’s Ministry of Youth and ICT and the UNDP, in close collaboration with Motorola Solutions, will power a Mobile App Challenge that will be implemented by YouthConnekt.