Section Menu

Wireless Security Companies and Solutions 2014


February 2014




Single-user License: $ 1,995 USD
Company-wide License: $ 4,995 USD
Team License (Up to 5 Users): $ 2,995 USD


Mobile Security, Mobile Privacy, Wireless Security, Enterprise Mobile Security, Enterprise Application Security


Collectively speaking, wireless security represents technologies and solutions designed to prevent unauthorized access or information damage for computers connected to wireless networks. Increasingly, wireless security is targeted to the emerging needs of the handheld wireless ecosystem, which includes wireless tablets, smartphones, and other devices. These devices typically rely upon an operating system that is optimized and/or integrated with mobile communications, content, applications and commerce.

Within the enterprise mobility market, chief security concerns are driven by policy decision and end-user behavior associated with the Bring Your Own Device (BYOD) trend and the need for corporations to execute a mobile device management plan. Complications intensify as enterprise deals with third-party applications running on the same devices as corporate devices.

This report evaluates wireless security technologies, company offerings and solutions. The report analyzes wireless security for different business models, analyzes key players and solutions within the wireless security industry. The report also presents a future outlook for wireless security based on important technologies and solution trending and anticipated developments.

See Table of Contents for complete list of areas covered.

Target Audience

  • Mobile network operators
  • Mobile application developers
  • Wireless device manufacturers
  • Enterprise mobility management
  • Wireless security application developers
  • Wireless security management companies

Report Benefits

  • SWOT analysis of security companies/solutions
  • Analysis of wireless security trends and industry outlook
  • Assessment of companies and solutions for wireless security
  • Evaluation of wireless security technologies, protocols, challenges and types
  • Evaluation of wireless security requirements for different levels of business models

Companies in Report

AirPatrol, AirTight Networks, Apple, AT&T, Blue Coat, Cisco, Enterasys Networks, Ericsson, Google, Hewlett Packard, IBM, Juniper Networks, Microsoft, Nokia, RIM, Symantec, Verizon Business

Table of Contents

  • Overview
  • Key Benefits
  • Target Audience
  • Table of Contents
  • Overview of Wireless Technology
  • Wireless Network Advantages
  • Popularity
  • Mobility
  • Ease of Deployment
  • Wireless Network Threats
  • Wireless Technologies
  • Wireless LANs
  • Ad Hoc Networks
  • Wireless Devices
  • Mobile Phones
  • PDAs
  • Palm
  • PocketPC
  • Other Mobile Devices
  • Wireless LAN
  • Security Features of 802.11 Wireless LANs
  • Security Requirements and Threats
  • Passive Attack
  • Eavesdropping
  • Traffic Analysis
  • Active Attack
  • Masquerading
  • Replay
  • Message modification
  • Denial-of-Service
  • Loss of Confidentiality
  • Loss of Integrity
  • Loss of Network Availability
  • Wireless Personal Area Networks
  • Bluetooth Security Features
  • Security Requirements and Threats
  • Loss of Confidentiality
  • Loss of Integrity
  • Loss of Availability
  • Mobile Devices
  • Mobile Device Requirements and Threats
  • Loss and Theft
  • Disposal
  • Malware
  • Spam
  • Private Ownership
  • Telecom Mobile Communications
  • 1st Generation (1G)
  • 2nd Generation (2G)
  • SIM
  • Speech Coding
  • Authentications and Security in GSM Networks
  • WAP (Wireless Applicant Protocol)
  • 3rd Generation (3G)
  • Applications in 3G System
  • 4th Generation (4G)
  • Applications and Services of 4G System
  • Tele Presence
  • Information Access
  • Inter-Machine Communication
  • Intelligent Shopping
  • Location-Based Services
  • Globalisation of Products
  • Communicating Appliances
  • Telecom Mobile Security
  • GSM Security
  • UMTS Security
  • WAP Security
  • Mobile Cloud
  • Mobile Cloud Characteristics
  • On-Demand Self Service
  • Broad Network Access
  • Resource Pooling
  • Mobile Cloud Enabling Technologies
  • 4G
  • HTML5 and CSS3
  • Hypervisor
  • Cloudlets
  • Web 4.0
  • Mobile Cloud Service Models
  • Software as a Service (SaaS)
  • Platform as a Service (PaaS)
  • Infrastructure as a Service (IaaS)
  • Monitoring-as-a-Service (MaaS)
  • Mobile Cloud Platforms
  • Smart Phones
  • Tablets
  • Mobile Cloud Deployment
  • Private Cloud
  • Community Cloud
  • Public Cloud
  • Hybrid Cloud
  • Mobile Cloud Challenges
  • Resource Poverty
  • Data Storage Capacity and Processing Power
  • Division of Application Services
  • Absence of Standards
  • Access Schemes
  • Security
  • Wireless Security Companies and Solutions
  • Enterasys Networks
  • Enterasys Networks Security Solutions
  • Dynamic Intrusion Response Solution
  • Secure Open Convergence Solution
  • Acceptable Use Policy Solution
  • SWOT Analysis
  • AirTight Networks
  • AirTight Networks Security Solutions
  • Intelligent Edge Wi-Fi
  • Top-Ranked Security
  • AirTight Networks' SpectraGuard
  • SWOT Analysis
  • Verizon Business
  • Verizon Wireless Security Solutions for Retail
  • SWOT Analysis
  • AirPatrol
  • AirPatrol Security Solution
  • SWOT Analysis
  • Blue Coat
  • Blue Coat Security Solution
  • SWOT Analysis
  • Cisco
  • Cisco Wireless Security Solution
  • SWOT Analysis
  • Symantec
  • Symantec Wireless Security Solution
  • SWOT Analysis
  • Juniper Networks
  • Juniper Networks Wireless Security Solution
  • SWOT Analysis
  • Wireless Security Future Trends
  • WPA2
  • Location and Situational Awareness
  • More Protection for Cloud
  • Proactive Application Monitoring
  • Enhanced Data Centre Physical Security
  • Enhanced Data Transfer Protection
  • Disaster Recovery and the Cloud