Section Menu

Mobile Value-Added Services (VAS) in the Cloud: Security Challenges, Market Opportunities and Forecasts 2013-2018


June 2013




Single-user License: $ 1,995 USD
Company-wide License: $ 4,995 USD
Team License (Up to 5 Users): $ 2,995 USD


Mobile Applications, Mobile VAS, Mobile Value-added Services, VAS Cloud, Cloud Security, VAS Forecast, Cloud Security Forecast


Cloud computing has started to play a crucial role in mobile based value-added service (VAS) offering as end-users appetite for applications is ever-increasing and service providers are increasingly moving towards alternative service platforms and support infrastructure.

Mobile VAS in the Cloud includes communications, content, commerce and applications of various types. Leading companies are positioning themselves to take leverage cost improvements as well as enhanced functionality, services integration, and convergence across service types heretofore constrained by device type, network type, and/or service provider. However, ensuring a fast, flexible, and economically viable service delivery via the Cloud is a continuous challenge thanks to security issues, piracy concerns, and the threat of cybercriminals damaging consumer and enterprise data.

This research evaluates opportunities for mobile VAS in the Cloud, company specific solutions, alliances to combat challenges, market drivers and decision factors for consumer and enterprise customers. The report includes analysis of forecasts as well as recommendations for industry players.

See Table of Contents for complete list of areas covered.


  • Cloud services companies
  • Mobile network operators
  • Small to Medium Business (SMB)
  • Network infrastructure providers
  • VAS application development companies
  • Large multinational enterprise companies
  • Security and privacy protection companies

Companies in Report

Awareness Technologies, Business Innovation Councils, CA Technologies, CERT, CREDANT Technologies, Cisco, Dell, EMC, Google, GuardTime, HP, HyTrust, IBM, McAfee, Okta, Panda, Perkins, Rand Group, Red Hat,, Simplified, Soundcloud, Symantec, Trend Micro, VMware, Vyatta, Xen

Key Findings

  • Global cloud software security market is predicted to reach US$ 3 billion by 2018,
  • Latin America will remain the top growth market for cloud based VAS market over the next 5 years
  • Cloud segment IaaS (Infrastructure as a Service) will hold the highest market share of 44% by 2018
  • Government agencies and large enterprises will be the top users of cloud security software by 2018

Table of Contents

  • Executive Summary
  • Mobile VAS Applications in the Cloud
  • What is a VAS Application?
  • VAS Characteristics
  • Relationship of VAS to Other Services
  • Different Classes of VAS
  • Why are VAS Important?
  • The Value of Voice and other “Bearer” Services
  • Mobile VAS in the Cloud
  • Major Mobile Value-Added Service Types
  • Content
  • Introduction
  • Content Delivery
  • Charging Via Premium Content
  • Online Billing Service Providers
  • Commerce
  • Communication
  • Core Services 3.2
  • Value-Added Services
  • Applications
  • Cloud Computing in Mobile Value-Added Services
  • Structure of Cloud Computing in Mobile VAS
  • Cloud Computing in VAS Models
  • Category of Cloud Computing Service Models in VAS
  • Growth of VAS in the Cloud and Service Providers
  • Characteristic of Cloud Computing in VAS
  • Decision Factors for Cloud Computing in VAS
  • Combination of Database
  • Auto Scan of Device
  • Compliance Standard
  • Easy Accessibility of Report
  • Economical
  • Transparent
  • Comprehensive Package
  • Seven Elements of Cloud Computing in VAS
  • Utility Pricing
  • Elastic Resource Capacity
  • Virtualised Resources
  • Management Automation
  • Self-Service Provisioning
  • Third-Party Ownership
  • Managed Operations
  • VAS Ecosystem in Cloud Computing
  • Industry Perspective of VAS in Cloud
  • Overview of Mobile VAS in Cloud
  • Technical Challenges in Cloud-Based VAS
  • Decision Factors for Cloud by Enterprise Customers
  • Opportunities for VAS in the Cloud by Industry Vertical
  • Could Access Identify Management in Cloud VAS Chain
  • Security Threat Analysis of Clouyd-Based VAS
  • Insider Threats in the Cloud VAS
  • External Threats in Cloud VAS
  • Data Breaches
  • Data Loss
  • Account Hijacking
  • Insecure Application Programming Interfaces (APIS)
  • Denial of Service
  • Data Handling
  • Components of Information Security in Cloud VAS
  • End-User Concerns with Cloud VAS
  • Loss of Control
  • Lack of Trust in the Cloud
  • Common Drawbacks in Cloud VAS
  • Strategies to Overcome Security Concerns in Cloud VAS
  • Cloud VAS Market Projection
  • Cloud Computing Market Value and Usage
  • Regional Cloud VAS Market 2013-2018
  • Cloud VAS by Segment 2013-2018
  • Worldwide Cloud VAS Equipment Market Share
  • Cloud Security Piracy and Privacy
  • Global Cloud Security Software Market Value 2013-2018
  • Global Cloud Security Software Market by End-User Segmentation
  • Global Cloud Security Software Market by Vendor Segmentation
  • Customer’s Responsibilities in Cloud Based Security Management
  • Cloud VAS: Next Generation Trend
  • Next Generation Growth Driver Analysis and Market Impacts
  • Increasing Usage of Cloud Services in Non-Traditional Sectors
  • Growing Adoption of Cloud Services in Government Departments
  • Growing Usage of Cloud Services for Critical Data Storage
  • Rise in Cloud Service-Specific Attacks
  • Significant Industry Players/Experts Differences on Market Direction/Vision
  • Security for Business Innovation Council 2013 Predictions
  • Perkins Prediction
  • Gartner Prediction
  • Georgia Tech and Gartner Prediction on Mobile Browser vs Cloud Computing
  • Gooddata Prediction on Usage of Public Cloud among Enterprises
  • Symantec Prediction on Hacking vs Threat Level
  • Conclusions and Recommendations
  • Recommendations for Market Players
  • Develop Cloud-Based VAS Solutions in Business
  • Protect Business from Cybercriminal Threats
  • Integrate Security Protection Issue with Management Strategy

List of Figures

  • Figure 1: Cloud Computing Applications in Mobile Based VAS
  • Figure 2: Structure of Cloud Computing Layers and Interdependency in Mobile VAS
  • Figure 3: Model of Cloud Computing in VAS
  • Figure 4: Cloud Computing Service Model in VAS
  • Figure 5: Key Cloud Service Providers and Market Forecast
  • Figure 6: 7 Elements of Cloud Computing in VAS
  • Figure 7: VAS Ecosystem in Cloud Computing
  • Figure 8: Example of Mobile VAS in Cloud Computing
  • Figure 9: Technical Challenges in Cloud-Based VAS
  • Figure 10: Enterprises' Priority to use Cloud Services
  • Figure 11: Cloud-Based VAS Opportunities by Segment
  • Figure 12: Employee-Customer Relationship in Cloud Based VAS Service
  • Figure 13: Insider Threat in Cloud Based VAS
  • Figure 14: External Threats in Cloud Computing VAS
  • Figure 15: Information Security Components in Cloud-Based VAS
  • Figure 16: End-User Concerns with Cloud Computing VAS
  • Figure 17: Strategies to Overcome Security Concern in Cloud VAS
  • Figure 18: Regional Market Share of Cloud Computing VAS 2013-2018
  • Figure 19: Segment VAS Cloud Service 2013-2018
  • Figure 20: Market Share of Cloud VAS Equipment Providers 2013
  • Figure 21: Global Cloud Security Software Market Value 2013-2018
  • Figure 22: Global Cloud Security Software Market by End-User Segmentation in VAS 2013
  • Figure 23: Global Cloud Security Software Market by Vendor Segmentation 2013
  • Figure 24: Customers Responsibility in Managing Cloud Based VAS Security
  • Figure 25: Cloud Security in VAS: Flowchart of Market Growth Drivers