SECURITY| Sept. 26, 2012, 10:04 a.m.
A new report from Juniper Research finds that only 5% of global smartphones and tablet devices have security software installed, despite a steadily increasing threat from malware, fraud and device theft.
The report forecasts that both corporate and personal users will begin to recognise the need to protect their data and the demand for mobile security products will increase over the next five years to a point where 1 in 5 mobile devices will be protected by third party security software.
In addition, the report found that, apart from headline grabbing malware attacks on phones, the risk of crimes such as identity theft will be a strong motivator for users to adopt mobile security software. Device loss or theft affects both consumer and corporate markets and hence demand for security solutions in both sectors will increase.
The new report, Mobile Security Strategies: Threats, Solutions & Market Forecasts 2012-2017 found that, as the security threat increases, and users become more aware of these issues, mobile operators and device vendors need to recognise the potential value that can be achieved by integrating key security features such as ‘Track the Device’ or 'Lock and Wipe’ into their product offerings for customers.
Report author Nitin Bhas notes: “Bundling mobile security apps along with other managed services will not only provide incremental revenue for the service providers, but will also help them guarantee better customer satisfaction and churn”.
The report expects the number of protected consumer devices to overtake protected enterprise devices by 2015, driven by BYOD trends. Employee owned smartphones and tablets used in the enterprise will reach almost 350 million by 2014, it says.
MORE SECURITY NEWS
Kaspersky Lab: Emerging Threats in the APT World - Predictions for 2015Kaspersky Lab experts have released a list of the top emerging threats in the APT world. Read More
“Visibility Void” represents potential threat to enterprisesCompanies must stay on top of a growing pool of cyber-threats says Andrew Potgieter, security solutions director at Westcon. Read More
The hackers’ bounty - how much do cybercriminals make from innocent users?Cybercriminals could be raking in profits 20 times greater than the cost of their attacks, according to figures compiled by Kaspersky Lab experts. Read More
Regin: a malicious platform capable of spying on GSM networksKaspersky Lab’s Global Research and Analysis Team has published its research on Regin – the first cyber-attack platform known to penetrate and monitor GSM networks in addition to other “standard” spying tasks. Read More
Security a top priority as Africa moves to LTESecuring the network is a top priority for telcos and carriers as LTE becomes increasingly mainstream across Africa, says Fortinet. Read More
Barclays ropes in ICT taskforce in anti-fraud warBarclays Bank of Botswana (BBB) has roped in experts in the field of Information Technology and cybercrime to give weight to its annual fraud awareness month. Read More
Kaspersky Lab: Most businesses use third-party services to manage virtualisationLess than one-third of businesses keep their virtualisation servers on-premises and managed entirely by their own internal IT staff, according to a Kaspersky Lab survey of 3,900 IT professionals worldwide. Read More
Cisco: Employee complacency increases riskResearch released by Cisco shows that critical company data is at risk in South Africa as a result of organisations focusing IT security policies and resources more on external threats and not enough on the threat from within. Read More
FEATURED STORYPWC: Optimism abounds but a bumpy journey ahead for some
PwC’s ‘Capital Projects & infrastructure in East Africa, Southern Africa and West Africa,’ report says infrastructure spend in the region is projected to reach $180bn per annum by 2025.
BEST READ NEWS
IN DEPTHAfrica lags on digital migration
Only three African countries have so far completed the digital migration process, and serious issues are hampering the migration in other nations.