封面
市場調查報告書
商品編碼
1985461

行動威脅防禦市場:按組件、作業系統、威脅類型、設備類型、部署模式、組織規模和最終用戶分類-2026-2032年全球市場預測

Mobile Threat Defense Market by Component, Operating System, Threat Type, Device Type, Deployment Mode, Organization Size, End User - Global Forecast 2026-2032

出版日期: | 出版商: 360iResearch | 英文 184 Pages | 商品交期: 最快1-2個工作天內

價格

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

預計到 2025 年,行動威脅防禦市場價值將達到 35.5 億美元,到 2026 年將成長至 40.7 億美元,到 2032 年將達到 93.9 億美元,複合年成長率為 14.87%。

主要市場統計數據
基準年 2025 35.5億美元
預計年份:2026年 40.7億美元
預測年份 2032 93.9億美元
複合年成長率 (%) 14.87%

終端多樣化、混合工作模式以及不斷提高的隱私期望,正迫使人們在「行動優先」時代重新思考企業安全,這就需要製定綜合的、可操作的防禦策略。

行動裝置已從單純的通訊工具發展成為支撐企業生產力的主要終端,在儲存和傳輸敏感的企業智慧財產權、個人資料和存取憑證方面發揮著至關重要的作用。這種轉變凸顯了行動威脅防禦作為更廣泛的網路安全架構核心要素的戰略重要性,要求安全領導者重新思考邊界防禦的假設,並考慮不同設備、作業系統和企業用例的多樣性。隨著員工採用混合辦公和遠距辦公模式,企業必須在使用者便利性和強大的控制力之間取得平衡,在不影響使用者體驗的前提下維持業務連續性,同時兼顧隱私、合規性和易用性。

為了應對不斷演變的攻擊方法和注重隱私的防禦技術,我們正在重新思考行動威脅偵測、回應和營運整合。

近年來,由於行動詐騙的貨幣化程度不斷提高、複雜的網路釣魚技術層出不窮以及供應鏈漏洞的利用,攻擊者針對行動平台的攻擊手段也迅速演變。如今,攻擊者會利用應用程式生態系統、第三方SDK以及針對行動用戶體驗模式量身定做的社會社交工程宣傳活動,使得基於特徵碼的防禦措施已不足以應對挑戰。同時,防禦者也在加速採用行為模式的分析、針對行動遙測資料最佳化的機器學習模型以及執行階段應用程式自保護機制,以偵測那些能夠繞過傳統控制的異常行為。

了解 2025 年關稅變化如何促使籌資策略發生變化,並加速採用獨立於硬體、軟體主導的行動安全方法。

2025年,美國實施的累積關稅調整進一步加劇了行動硬體及相關組件全球供應鏈的複雜性,影響了設備採購決策以及安全解決方案供應商的經濟效益。特定硬體和組件進口關稅的提高迫使原始設備製造商 (OEM) 和通路合作夥伴重新評估其區域籌資策略,從而影響了企業設備組合中的設備可用性、更新週期和生命週期管理策略。這一趨勢對安全團隊有重大影響。設備保留期延長了舊版漏洞的暴露時間,而硬體更新預算的限制可能會延緩採用現代化的、安全功能增強型行動平台。

利用多維細分框架,將部署模式、元件配置、作業系統、組織規模、產業特定風險、威脅類型和設備類別連結起來。

市場細分分析揭示了部署模式、組件、平台多樣性、組織規模、特定產業風險概況、威脅類型和設備類別如何影響解決方案的選擇和營運優先順序。基於部署模式,市場分別針對雲端和本地部署進行分析,重點闡述了集中式分析(可實現快速更新)與本地控制(可限制整合開銷)之間的權衡。基於組件,市場細分為“平台”和“服務”,其中“服務”進一步細分為“託管服務”和“專業服務”。這表明,組織如何權衡承包營運支援與客製化整合和諮詢契約,以最大限度地縮短價值實現時間。

透過將技術選擇、部署模型和隱私管理與當地監管現實和威脅行為者的行為相結合,可以實現區域策略的差異化。

區域趨勢對威脅情勢、供應商格局和部署偏好有顯著影響,了解這些細微差別對於全球專案規劃至關重要。在美洲,安全團隊正面臨著一個成熟的威脅市場,該市場以複雜的網路釣魚技術和精心設計的行動惡意軟體為主導,這推動了雲端交付分析功能的快速普及以及與企業身份平台的深度整合。同時,在歐洲、中東和非洲 (EMEA) 地區,由於管理體制和資料在地化要求因地區而異,混合部署方案、對敏感遙測資料的選擇性本地處理以及隱私保護分析正日益受到關注。

確定供應商之間的差異,這些差異由檢測準確性、身分整合、隱私優先的遙測和增強的託管服務所驅動,以支援營運準備。

廠商間的競爭格局圍繞著三個相互融合的需求:有效偵測針對行動裝置的特定攻擊途徑、與企業安全架構無縫整合,以及簡化資源有限的保全行動團隊的運作。領先的廠商正在投資遙測增強技術,該技術整合了設備狀態、應用程式行為和身分上下文,以減少誤報並簡化事件分類流程。同時,與身分識別提供者、終端保護平台和網路安全廠商的策略夥伴關係也日益普遍,因此能夠跨安全孤島進行更豐富的關聯分析,並加速自動化回應行動。

優先考慮快速風險緩解、遙測整合、隱私優先檢測和營運管理支持,將行動安全轉化為可衡量的組織韌性。

產業領導者應採取切實可行的措施來增強應對行動威脅的能力,在即時風險緩解和永續能力建構之間取得平衡。首先,應整理現有設備資產、資料流和關鍵應用程式,以識別高價值目標和潛在風險點。這種清晰的梳理有助於進行重點投資,從而快速緩解風險。其次,應優先將行動遙測數據整合到集中式檢測和響應工作流程中,確保能夠獲取身份訊號和網路上下文資訊,以豐富警報並指導自動化遏制措施。

我們採用一手和二手調查方法,結合對從業人員的訪談、技術檢驗和功能比較評估,以獲得高度相關的營運見解。

本執行摘要的研究結合了第一手資料和第二手資料,以確保提供平衡且切實可行的見解。第一手資料是透過對安全架構師、IT維運經理、託管服務供應商和產品經理的結構化訪談收集的,從而直接了解營運挑戰、採購因素以及對解決方案效能的預期。二級資訊來源包括同行評審的技術文獻、供應商文件、行業監管指南和真實事件分析,從而對新興攻擊模式和防禦技術進行了多角度的檢驗。

將行動威脅防禦納入風險管理,並在即時回應與即時互通性和管治之間取得平衡,可增強企業的韌性。

行動威脅防禦不再是小眾功能,而是對於依賴行動終端運作關鍵業務流程的組織而言,至關重要的策略要素。攻擊者對行動平台的持續關注,以及日益成長的監管和採購壓力,迫使安全領導者部署技術穩健且運作永續的解決方案。現代方法將行動遙測資料與身分和網路訊號結合,利用注重隱私的分析技術,並優先考慮自動化,從而縮短在各種設備環境中檢測和修復安全事件所需的時間。

目錄

第1章:序言

第2章:調查方法

  • 調查設計
  • 研究框架
  • 市場規模預測
  • 數據三角測量
  • 調查結果
  • 調查的前提
  • 研究限制

第3章執行摘要

  • 首席主管觀點
  • 市場規模和成長趨勢
  • 2025年市佔率分析
  • FPNV定位矩陣,2025
  • 新的商機
  • 下一代經營模式
  • 產業藍圖

第4章 市場概覽

  • 產業生態系與價值鏈分析
  • 波特五力分析
  • PESTEL 分析
  • 市場展望
  • 市場進入策略

第5章 市場洞察

  • 消費者洞察與終端用戶觀點
  • 消費者體驗基準
  • 機會映射
  • 分銷通路分析
  • 價格趨勢分析
  • 監理合規和標準框架
  • ESG與永續性分析
  • 中斷和風險情景
  • 投資報酬率和成本效益分析

第6章:美國關稅的累積影響,2025年

第7章:人工智慧的累積影響,2025年

第8章:移動威脅防禦市場:依組件分類

  • 平台
  • 服務
    • 託管服務
    • 專業服務

第9章:行動威脅防禦市場:依作業系統分類

  • Android
  • iOS

第10章 依威脅類型分類的移動威脅防禦市場

  • 惡意軟體
  • 釣魚
  • 勒索軟體

第11章 行動威脅防禦市場:依設備類型分類

  • 智慧型手機
  • 藥片
  • 穿戴式裝置

第12章 行動威脅防禦市場:依部署模式分類

  • 現場

第13章 移動威脅防禦市場:依組織規模分類

  • 主要企業
  • 小型企業

第14章 行動威脅防禦市場:依最終用戶分類

  • 銀行業、金融服務業及保險業
  • 政府/國防
  • 衛生保健
  • 資訊科技和通訊
  • 零售與電子商務

第15章 移動威脅防禦市場:依地區分類

  • 北美洲和南美洲
    • 北美洲
    • 拉丁美洲
  • 歐洲、中東和非洲
    • 歐洲
    • 中東
    • 非洲
  • 亞太地區

第16章 移動威脅防禦市場:依組別分類

  • ASEAN
  • GCC
  • EU
  • BRICS
  • G7
  • NATO

第17章 移動威脅防禦市場:依國家分類

  • 美國
  • 加拿大
  • 墨西哥
  • 巴西
  • 英國
  • 德國
  • 法國
  • 俄羅斯
  • 義大利
  • 西班牙
  • 中國
  • 印度
  • 日本
  • 澳洲
  • 韓國

第18章:美國移動威脅防禦市場

第19章:中國移動威脅防禦市場

第20章 競爭格局

  • 市場集中度分析,2025年
    • 濃度比(CR)
    • 赫芬達爾-赫希曼指數 (HHI)
  • 近期趨勢及影響分析,2025 年
  • 2025年產品系列分析
  • 基準分析,2025 年
  • AO Kaspersky Lab
  • Barracuda Networks, Inc.
  • BlackBerry Ltd.
  • Broadcom, Inc.
  • Check Point Software Technologies Ltd.
  • Cisco Systems, Inc
  • Citrix Systems, Inc.
  • Esper.io, Inc.
  • Fortinet, Inc.
  • Guardsquare NV
  • Ivanti Software, Inc.
  • Lookout, Inc.
  • Open Text Corporation
  • SAP SE
  • Thoma Bravo, LLC
  • Upstream Security Ltd.
  • VMware, Inc.
  • Zimperium, Inc.
  • Zoho Corporation Pvt. Ltd.
Product Code: MRR-92249FEC2CC6

The Mobile Threat Defense Market was valued at USD 3.55 billion in 2025 and is projected to grow to USD 4.07 billion in 2026, with a CAGR of 14.87%, reaching USD 9.39 billion by 2032.

KEY MARKET STATISTICS
Base Year [2025] USD 3.55 billion
Estimated Year [2026] USD 4.07 billion
Forecast Year [2032] USD 9.39 billion
CAGR (%) 14.87%

Reframe enterprise security for a mobile-first era where endpoint diversity, hybrid work models, and privacy expectations demand integrated, pragmatic defense strategies

Mobile devices have evolved from peripheral communication tools into primary endpoints for enterprise productivity, storing and transmitting sensitive corporate intellectual property, personal data, and access credentials. This shift has elevated the strategic importance of mobile threat defense as a core component of broader cybersecurity architectures, requiring security leaders to rethink perimeter assumptions and account for heterogeneity in devices, operating systems, and enterprise use cases. As workforces adopt hybrid and remote models, organizations must reconcile user convenience with robust controls, balancing privacy, compliance, and usability to maintain continuity without degrading user experience.

Consequently, the competitive landscape for mobile threat defense has expanded beyond traditional mobile device management solutions into adjacent domains such as endpoint detection and response, secure access service edge, and identity-first security controls. This convergence demands integrated telemetry, unified policy enforcement, and automated response capabilities that operate across device types and network contexts. Moreover, procurement and deployment decisions are increasingly influenced by regulatory obligations and industry-specific risk profiles, prompting security teams to prioritize solutions that deliver demonstrable detection efficacy and streamlined operational workflows. In short, mobile threat defense sits at the intersection of enterprise mobility, cloud services, and zero-trust paradigms, requiring nuanced strategies that address both technical threats and organizational change management.

Address evolving offensive techniques and privacy-aware defensive innovations that are reshaping mobile threat detection, response, and operational integration

The last several years have witnessed rapid shifts in how attackers target mobile platforms, driven by increased monetization of mobile fraud, the proliferation of sophisticated phishing vectors, and the weaponization of supply-chain mechanisms. Attackers now exploit application ecosystems, third-party SDKs, and social engineering campaigns tailored to mobile UX patterns, which necessitates more than signature-based defenses. In parallel, defenders have accelerated adoption of behavior-based analytics, machine learning models tuned for mobile telemetry, and runtime application self-protection to detect anomalous behaviors that escape traditional controls.

Regulatory dynamics and privacy-preserving architectures have also reshaped solution design priorities. Vendors are balancing the need for deep telemetry to detect evasive threats with requirements to minimize collection of personal data, thereby driving innovation in privacy-enhancing analytics and on-device processing. Additionally, security operations centers are adapting by integrating mobile telemetry into centralized incident response playbooks, enriching context with identity and network signals to reduce mean time to detect and respond. These transformative shifts emphasize the need for interoperable controls, vendor-agnostic standards for telemetry exchange, and stronger collaboration between security, IT, and application development teams to harden mobile attack surfaces.

Understand how 2025 tariff shifts are prompting procurement strategy changes and accelerating adoption of hardware-agnostic, software-led mobile security approaches

In 2025, cumulative tariff adjustments implemented by the United States introduced additional complexity into the global supply chain for mobile hardware and related components, influencing both device procurement decisions and vendor economics for security solutions. Increased import duties on certain hardware and components have prompted original equipment manufacturers and channel partners to reassess regional sourcing strategies, which in turn affects device availability, replacement cycles, and lifecycle management policies within enterprise fleets. For security teams, this dynamic has material consequences: extended device retention increases the window of exposure to legacy vulnerabilities, while constrained hardware refresh budgets can delay adoption of modern mobile platforms with enhanced security features.

Furthermore, tariff-driven cost pressures have incentivized some vendors to adjust service delivery models and pricing structures, placing greater emphasis on software-centric and cloud-delivered capabilities that minimize dependency on specific hardware configurations. As a result, organizations are prioritizing flexible deployment modes and subscription-based consumption to decouple security investments from capital-intensive device replacement programs. These market forces also accelerate interest in solutions that provide robust protection across a heterogeneous device estate, preserving security posture even when hardware diversity and extended device lifecycles persist. In essence, tariff policy has amplified the operational importance of software-led defenses and lifecycle-aware security planning.

Leverage a multi-dimensional segmentation framework linking deployment mode, component mix, operating systems, organization scale, vertical risks, threat types, and device classes

Insight into market segmentation reveals how deployment choices, component composition, platform diversity, organizational scale, industry risk profiles, threat typologies, and device categories shape solution selection and operational priorities. Based on Deployment Mode, market is studied across Cloud and On Premise, which underscores the trade-offs between centralized analytics with rapid updates and localized control with constrained integration overhead. Based on Component, market is studied across Platform and Services, with Services further studied across Managed Services and Professional Services, illustrating how organizations weigh turnkey operational support against bespoke integration and consulting engagements to maximize time-to-value.

Based on Operating System, market is studied across Android and iOS, reflecting fundamental differences in ecosystem openness, update cadences, and threat vectors that influence detection strategies and application control policies. Based on Organization Size, market is studied across Large Enterprise and Small And Medium Enterprise, highlighting distinct procurement dynamics, security staffing models, and appetite for managed versus self-operated solutions. Based on Industry Vertical, market is studied across Banking Financial Services And Insurance, Government And Defense, Healthcare, It And Telecom, and Retail And E-Commerce, each vertical presenting unique regulatory, compliance, and data-sensitivity constraints that drive feature prioritization and integration requirements. Based on Threat Type, market is studied across Malware, Phishing, and Ransomware, which directs investment toward behavioral analytics, sandboxing, and targeted user-awareness interventions. Based on Device Type, market is studied across Smartphones, Tablets, and Wearables, emphasizing the need for lightweight, interoperable agents and cross-device policy coherence to secure an increasingly diverse endpoint footprint.

Taken together, these segmentation dimensions illuminate why no single solution fits all use cases. They also explain the rise of modular platforms that allow organizations to tailor feature sets according to operational maturity, vertical regulatory needs, and device composition. By mapping desired outcomes to segmentation attributes, security leaders can better prioritize integrations, evaluate managed-service overlays, and select operating-system specific controls that align with both risk appetite and user experience expectations.

Differentiate regional strategies by aligning technology selection, deployment model, and privacy controls with local regulatory realities and threat actor behavior

Regional dynamics exert a strong influence on threat landscapes, vendor ecosystems, and deployment preferences, and understanding these nuances is critical for global program planning. In the Americas, security teams contend with a mature threat market that emphasizes advanced phishing techniques and sophisticated mobile malware, driving rapid adoption of cloud-delivered analytics and strong integration with enterprise identity platforms. Conversely, Europe, Middle East & Africa presents a patchwork of regulatory regimes and data localization requirements that encourage hybrid deployment options, selective on-premise processing for sensitive telemetry, and heightened attention to privacy-preserving analytics.

In Asia-Pacific, diverse market maturity and a broad range of device manufacturers create both opportunity and complexity for security initiatives; the region often leads in rapid adoption of innovative mobile features and alternative payment and authentication technologies, necessitating flexible controls that accommodate fast-evolving mobile ecosystems. Across regions, differences in channel models, service provider capabilities, and enterprise outsourcing preferences shape how solutions are packaged and supported, thereby influencing procurement strategies and operational readiness. Appreciating these regional distinctions helps security leaders tailor vendor selection, contract terms, and implementation roadmaps to local regulatory constraints and operational realities.

Identify vendor differentiation driven by detection precision, identity integration, privacy-first telemetry, and expanded managed services to support operational readiness

Competitive dynamics among vendors center on three converging imperatives: detection efficacy across mobile-specific attack vectors, seamless integration with enterprise security stacks, and operational simplicity for constrained security operations teams. Leading vendors are investing in telemetry enrichment that integrates device posture, application behavior, and identity context to reduce false positives and streamline incident triage. At the same time, strategic partnerships with identity providers, endpoint protection platforms, and network security vendors are increasingly common, enabling richer correlation across security silos and accelerating automated response actions.

Product roadmaps show a clear emphasis on on-device protection and privacy-first analytics, enabling realtime prevention without excessive data exfiltration. Service portfolios are expanding to include managed detection and response for mobile-specific incidents, as well as professional services focused on policy design, compliance mapping, and secure application testing. Meanwhile, channels and service providers are differentiating through vertical expertise, offering prebuilt integrations and compliance templates tailored to regulated industries. For procurement teams, vendor selection should prioritize demonstrable operational outcomes, transparent data handling practices, and extensibility to integrate with existing SIEM and SOAR investments.

Prioritize rapid exposure reduction, telemetry integration, privacy-first detection, and managed operational support to transform mobile security into measurable organizational resilience

Industry leaders should adopt a pragmatic sequence of actions to strengthen mobile threat resilience that balances immediate risk reduction with sustainable capability building. Begin by mapping current device inventories, data flows, and critical applications to identify high-value targets and potential exposure points; this clarity enables focused investments that yield rapid risk reduction. Next, prioritize integration of mobile telemetry into central detection and response workflows, ensuring that identity signals and network context are available to enrich alerts and guide automated containment actions.

Concurrently, invest in privacy-aware detection techniques and enforce least-privilege application access to reduce the likelihood of data leakage while preserving user trust. Where internal expertise is limited, engage managed services to accelerate incident response readiness and offload operational burdens. For procurement and governance, favor vendors that provide extensible APIs, consistent cross-platform coverage, and clear evidence of efficacy through independent testing or customer case studies. Finally, embed ongoing user education and phishing simulations into security awareness programs while aligning device lifecycle policies to reduce exposure from legacy platforms. These steps, taken in concert, help leaders convert strategic intent into measurable security improvements across the mobile estate.

Rely on a blended primary and secondary methodology with practitioner interviews, technical validation, and comparative feature assessments to ensure operationally relevant findings

The research underpinning this executive summary combines primary and secondary investigative approaches to ensure balanced, actionable insights. Primary data was gathered through structured interviews with security architects, IT operations leaders, managed service providers, and product managers to capture firsthand operational challenges, procurement drivers, and solution performance expectations. Secondary sources included peer-reviewed technical literature, vendor technical documentation, industry regulatory guidance, and real-world incident analyses to triangulate emerging attack patterns and defensive techniques.

Analytical methods incorporated qualitative synthesis and pattern analysis to identify common themes across deployments, as well as comparative assessments of feature sets, deployment models, and integration pathways. Wherever applicable, findings were validated through cross-references with practitioner interviews and technical demonstrations to ensure accuracy and operational relevance. The methodology emphasizes transparency in assumptions, reproducibility of key analytical steps, and a focus on practical outcomes to support decision-makers in crafting programmatic responses to mobile threats.

Reinforce enterprise resilience by embedding mobile threat defense into risk management, balancing immediate controls with long-term interoperability and governance

Mobile threat defense is no longer a niche capability; it is a strategic necessity for organizations that rely on mobile endpoints to execute business-critical workflows. Persistent adversary interest in mobile platforms, combined with evolving regulatory and procurement pressures, compels security leaders to adopt solutions that are both technically robust and operationally sustainable. The modern approach integrates mobile telemetry with identity and network signals, leverages privacy-aware analytics, and emphasizes automation to reduce time to detect and remediate incidents across diverse device estates.

Looking ahead, successful programs will balance immediate risk reduction measures with investments in long-term resilience: harmonized device lifecycle policies, flexible deployment models to accommodate regional constraints, and vendor relationships that prioritize interoperability and transparent data governance. By treating mobile threat defense as an integral part of enterprise risk management rather than a standalone commodity, organizations can maintain productivity while reducing their exposure to mobile-specific threats and ensuring regulatory alignment.

Table of Contents

1. Preface

  • 1.1. Objectives of the Study
  • 1.2. Market Definition
  • 1.3. Market Segmentation & Coverage
  • 1.4. Years Considered for the Study
  • 1.5. Currency Considered for the Study
  • 1.6. Language Considered for the Study
  • 1.7. Key Stakeholders

2. Research Methodology

  • 2.1. Introduction
  • 2.2. Research Design
    • 2.2.1. Primary Research
    • 2.2.2. Secondary Research
  • 2.3. Research Framework
    • 2.3.1. Qualitative Analysis
    • 2.3.2. Quantitative Analysis
  • 2.4. Market Size Estimation
    • 2.4.1. Top-Down Approach
    • 2.4.2. Bottom-Up Approach
  • 2.5. Data Triangulation
  • 2.6. Research Outcomes
  • 2.7. Research Assumptions
  • 2.8. Research Limitations

3. Executive Summary

  • 3.1. Introduction
  • 3.2. CXO Perspective
  • 3.3. Market Size & Growth Trends
  • 3.4. Market Share Analysis, 2025
  • 3.5. FPNV Positioning Matrix, 2025
  • 3.6. New Revenue Opportunities
  • 3.7. Next-Generation Business Models
  • 3.8. Industry Roadmap

4. Market Overview

  • 4.1. Introduction
  • 4.2. Industry Ecosystem & Value Chain Analysis
    • 4.2.1. Supply-Side Analysis
    • 4.2.2. Demand-Side Analysis
    • 4.2.3. Stakeholder Analysis
  • 4.3. Porter's Five Forces Analysis
  • 4.4. PESTLE Analysis
  • 4.5. Market Outlook
    • 4.5.1. Near-Term Market Outlook (0-2 Years)
    • 4.5.2. Medium-Term Market Outlook (3-5 Years)
    • 4.5.3. Long-Term Market Outlook (5-10 Years)
  • 4.6. Go-to-Market Strategy

5. Market Insights

  • 5.1. Consumer Insights & End-User Perspective
  • 5.2. Consumer Experience Benchmarking
  • 5.3. Opportunity Mapping
  • 5.4. Distribution Channel Analysis
  • 5.5. Pricing Trend Analysis
  • 5.6. Regulatory Compliance & Standards Framework
  • 5.7. ESG & Sustainability Analysis
  • 5.8. Disruption & Risk Scenarios
  • 5.9. Return on Investment & Cost-Benefit Analysis

6. Cumulative Impact of United States Tariffs 2025

7. Cumulative Impact of Artificial Intelligence 2025

8. Mobile Threat Defense Market, by Component

  • 8.1. Platform
  • 8.2. Services
    • 8.2.1. Managed Services
    • 8.2.2. Professional Services

9. Mobile Threat Defense Market, by Operating System

  • 9.1. Android
  • 9.2. iOS

10. Mobile Threat Defense Market, by Threat Type

  • 10.1. Malware
  • 10.2. Phishing
  • 10.3. Ransomware

11. Mobile Threat Defense Market, by Device Type

  • 11.1. Smartphones
  • 11.2. Tablets
  • 11.3. Wearables

12. Mobile Threat Defense Market, by Deployment Mode

  • 12.1. Cloud
  • 12.2. On Premise

13. Mobile Threat Defense Market, by Organization Size

  • 13.1. Large Enterprise
  • 13.2. Small And Medium Enterprise

14. Mobile Threat Defense Market, by End User

  • 14.1. Banking Financial Services And Insurance
  • 14.2. Government And Defense
  • 14.3. Healthcare
  • 14.4. It And Telecom
  • 14.5. Retail And E-Commerce

15. Mobile Threat Defense Market, by Region

  • 15.1. Americas
    • 15.1.1. North America
    • 15.1.2. Latin America
  • 15.2. Europe, Middle East & Africa
    • 15.2.1. Europe
    • 15.2.2. Middle East
    • 15.2.3. Africa
  • 15.3. Asia-Pacific

16. Mobile Threat Defense Market, by Group

  • 16.1. ASEAN
  • 16.2. GCC
  • 16.3. European Union
  • 16.4. BRICS
  • 16.5. G7
  • 16.6. NATO

17. Mobile Threat Defense Market, by Country

  • 17.1. United States
  • 17.2. Canada
  • 17.3. Mexico
  • 17.4. Brazil
  • 17.5. United Kingdom
  • 17.6. Germany
  • 17.7. France
  • 17.8. Russia
  • 17.9. Italy
  • 17.10. Spain
  • 17.11. China
  • 17.12. India
  • 17.13. Japan
  • 17.14. Australia
  • 17.15. South Korea

18. United States Mobile Threat Defense Market

19. China Mobile Threat Defense Market

20. Competitive Landscape

  • 20.1. Market Concentration Analysis, 2025
    • 20.1.1. Concentration Ratio (CR)
    • 20.1.2. Herfindahl Hirschman Index (HHI)
  • 20.2. Recent Developments & Impact Analysis, 2025
  • 20.3. Product Portfolio Analysis, 2025
  • 20.4. Benchmarking Analysis, 2025
  • 20.5. AO Kaspersky Lab
  • 20.6. Barracuda Networks, Inc.
  • 20.7. BlackBerry Ltd.
  • 20.8. Broadcom, Inc.
  • 20.9. Check Point Software Technologies Ltd.
  • 20.10. Cisco Systems, Inc
  • 20.11. Citrix Systems, Inc.
  • 20.12. Esper.io, Inc.
  • 20.13. Fortinet, Inc.
  • 20.14. Guardsquare NV
  • 20.15. Ivanti Software, Inc.
  • 20.16. Lookout, Inc.
  • 20.17. Open Text Corporation
  • 20.18. SAP SE
  • 20.19. Thoma Bravo, LLC
  • 20.20. Upstream Security Ltd.
  • 20.21. VMware, Inc.
  • 20.22. Zimperium, Inc.
  • 20.23. Zoho Corporation Pvt. Ltd.

LIST OF FIGURES

  • FIGURE 1. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, 2018-2032 (USD MILLION)
  • FIGURE 2. GLOBAL MOBILE THREAT DEFENSE MARKET SHARE, BY KEY PLAYER, 2025
  • FIGURE 3. GLOBAL MOBILE THREAT DEFENSE MARKET, FPNV POSITIONING MATRIX, 2025
  • FIGURE 4. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2025 VS 2026 VS 2032 (USD MILLION)
  • FIGURE 5. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2025 VS 2026 VS 2032 (USD MILLION)
  • FIGURE 6. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2025 VS 2026 VS 2032 (USD MILLION)
  • FIGURE 7. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2025 VS 2026 VS 2032 (USD MILLION)
  • FIGURE 8. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2025 VS 2026 VS 2032 (USD MILLION)
  • FIGURE 9. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2025 VS 2026 VS 2032 (USD MILLION)
  • FIGURE 10. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2025 VS 2026 VS 2032 (USD MILLION)
  • FIGURE 11. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY REGION, 2025 VS 2026 VS 2032 (USD MILLION)
  • FIGURE 12. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY GROUP, 2025 VS 2026 VS 2032 (USD MILLION)
  • FIGURE 13. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY COUNTRY, 2025 VS 2026 VS 2032 (USD MILLION)
  • FIGURE 14. UNITED STATES MOBILE THREAT DEFENSE MARKET SIZE, 2018-2032 (USD MILLION)
  • FIGURE 15. CHINA MOBILE THREAT DEFENSE MARKET SIZE, 2018-2032 (USD MILLION)

LIST OF TABLES

  • TABLE 1. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, 2018-2032 (USD MILLION)
  • TABLE 2. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2018-2032 (USD MILLION)
  • TABLE 3. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY PLATFORM, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 4. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY PLATFORM, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 5. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY PLATFORM, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 6. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 7. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 8. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 9. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, 2018-2032 (USD MILLION)
  • TABLE 10. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY MANAGED SERVICES, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 11. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY MANAGED SERVICES, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 12. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY MANAGED SERVICES, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 13. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY PROFESSIONAL SERVICES, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 14. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY PROFESSIONAL SERVICES, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 15. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY PROFESSIONAL SERVICES, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 16. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2018-2032 (USD MILLION)
  • TABLE 17. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY ANDROID, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 18. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY ANDROID, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 19. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY ANDROID, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 20. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY IOS, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 21. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY IOS, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 22. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY IOS, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 23. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2018-2032 (USD MILLION)
  • TABLE 24. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY MALWARE, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 25. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY MALWARE, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 26. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY MALWARE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 27. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY PHISHING, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 28. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY PHISHING, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 29. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY PHISHING, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 30. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY RANSOMWARE, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 31. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY RANSOMWARE, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 32. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY RANSOMWARE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 33. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2018-2032 (USD MILLION)
  • TABLE 34. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY SMARTPHONES, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 35. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY SMARTPHONES, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 36. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY SMARTPHONES, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 37. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY TABLETS, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 38. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY TABLETS, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 39. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY TABLETS, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 40. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY WEARABLES, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 41. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY WEARABLES, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 42. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY WEARABLES, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 43. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 44. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY CLOUD, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 45. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY CLOUD, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 46. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY CLOUD, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 47. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY ON PREMISE, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 48. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY ON PREMISE, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 49. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY ON PREMISE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 50. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2018-2032 (USD MILLION)
  • TABLE 51. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY LARGE ENTERPRISE, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 52. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY LARGE ENTERPRISE, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 53. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY LARGE ENTERPRISE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 54. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY SMALL AND MEDIUM ENTERPRISE, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 55. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY SMALL AND MEDIUM ENTERPRISE, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 56. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY SMALL AND MEDIUM ENTERPRISE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 57. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2018-2032 (USD MILLION)
  • TABLE 58. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY BANKING FINANCIAL SERVICES AND INSURANCE, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 59. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY BANKING FINANCIAL SERVICES AND INSURANCE, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 60. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY BANKING FINANCIAL SERVICES AND INSURANCE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 61. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY GOVERNMENT AND DEFENSE, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 62. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY GOVERNMENT AND DEFENSE, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 63. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY GOVERNMENT AND DEFENSE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 64. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY HEALTHCARE, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 65. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY HEALTHCARE, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 66. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY HEALTHCARE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 67. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY IT AND TELECOM, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 68. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY IT AND TELECOM, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 69. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY IT AND TELECOM, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 70. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY RETAIL AND E-COMMERCE, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 71. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY RETAIL AND E-COMMERCE, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 72. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY RETAIL AND E-COMMERCE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 73. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 74. AMERICAS MOBILE THREAT DEFENSE MARKET SIZE, BY SUBREGION, 2018-2032 (USD MILLION)
  • TABLE 75. AMERICAS MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2018-2032 (USD MILLION)
  • TABLE 76. AMERICAS MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, 2018-2032 (USD MILLION)
  • TABLE 77. AMERICAS MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2018-2032 (USD MILLION)
  • TABLE 78. AMERICAS MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2018-2032 (USD MILLION)
  • TABLE 79. AMERICAS MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2018-2032 (USD MILLION)
  • TABLE 80. AMERICAS MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 81. AMERICAS MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2018-2032 (USD MILLION)
  • TABLE 82. AMERICAS MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2018-2032 (USD MILLION)
  • TABLE 83. NORTH AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 84. NORTH AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2018-2032 (USD MILLION)
  • TABLE 85. NORTH AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, 2018-2032 (USD MILLION)
  • TABLE 86. NORTH AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2018-2032 (USD MILLION)
  • TABLE 87. NORTH AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2018-2032 (USD MILLION)
  • TABLE 88. NORTH AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2018-2032 (USD MILLION)
  • TABLE 89. NORTH AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 90. NORTH AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2018-2032 (USD MILLION)
  • TABLE 91. NORTH AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2018-2032 (USD MILLION)
  • TABLE 92. LATIN AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 93. LATIN AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2018-2032 (USD MILLION)
  • TABLE 94. LATIN AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, 2018-2032 (USD MILLION)
  • TABLE 95. LATIN AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2018-2032 (USD MILLION)
  • TABLE 96. LATIN AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2018-2032 (USD MILLION)
  • TABLE 97. LATIN AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2018-2032 (USD MILLION)
  • TABLE 98. LATIN AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 99. LATIN AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2018-2032 (USD MILLION)
  • TABLE 100. LATIN AMERICA MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2018-2032 (USD MILLION)
  • TABLE 101. EUROPE, MIDDLE EAST & AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY SUBREGION, 2018-2032 (USD MILLION)
  • TABLE 102. EUROPE, MIDDLE EAST & AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2018-2032 (USD MILLION)
  • TABLE 103. EUROPE, MIDDLE EAST & AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, 2018-2032 (USD MILLION)
  • TABLE 104. EUROPE, MIDDLE EAST & AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2018-2032 (USD MILLION)
  • TABLE 105. EUROPE, MIDDLE EAST & AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2018-2032 (USD MILLION)
  • TABLE 106. EUROPE, MIDDLE EAST & AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2018-2032 (USD MILLION)
  • TABLE 107. EUROPE, MIDDLE EAST & AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 108. EUROPE, MIDDLE EAST & AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2018-2032 (USD MILLION)
  • TABLE 109. EUROPE, MIDDLE EAST & AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2018-2032 (USD MILLION)
  • TABLE 110. EUROPE MOBILE THREAT DEFENSE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 111. EUROPE MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2018-2032 (USD MILLION)
  • TABLE 112. EUROPE MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, 2018-2032 (USD MILLION)
  • TABLE 113. EUROPE MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2018-2032 (USD MILLION)
  • TABLE 114. EUROPE MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2018-2032 (USD MILLION)
  • TABLE 115. EUROPE MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2018-2032 (USD MILLION)
  • TABLE 116. EUROPE MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 117. EUROPE MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2018-2032 (USD MILLION)
  • TABLE 118. EUROPE MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2018-2032 (USD MILLION)
  • TABLE 119. MIDDLE EAST MOBILE THREAT DEFENSE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 120. MIDDLE EAST MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2018-2032 (USD MILLION)
  • TABLE 121. MIDDLE EAST MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, 2018-2032 (USD MILLION)
  • TABLE 122. MIDDLE EAST MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2018-2032 (USD MILLION)
  • TABLE 123. MIDDLE EAST MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2018-2032 (USD MILLION)
  • TABLE 124. MIDDLE EAST MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2018-2032 (USD MILLION)
  • TABLE 125. MIDDLE EAST MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 126. MIDDLE EAST MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2018-2032 (USD MILLION)
  • TABLE 127. MIDDLE EAST MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2018-2032 (USD MILLION)
  • TABLE 128. AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 129. AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2018-2032 (USD MILLION)
  • TABLE 130. AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, 2018-2032 (USD MILLION)
  • TABLE 131. AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2018-2032 (USD MILLION)
  • TABLE 132. AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2018-2032 (USD MILLION)
  • TABLE 133. AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2018-2032 (USD MILLION)
  • TABLE 134. AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 135. AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2018-2032 (USD MILLION)
  • TABLE 136. AFRICA MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2018-2032 (USD MILLION)
  • TABLE 137. ASIA-PACIFIC MOBILE THREAT DEFENSE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 138. ASIA-PACIFIC MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2018-2032 (USD MILLION)
  • TABLE 139. ASIA-PACIFIC MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, 2018-2032 (USD MILLION)
  • TABLE 140. ASIA-PACIFIC MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2018-2032 (USD MILLION)
  • TABLE 141. ASIA-PACIFIC MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2018-2032 (USD MILLION)
  • TABLE 142. ASIA-PACIFIC MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2018-2032 (USD MILLION)
  • TABLE 143. ASIA-PACIFIC MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 144. ASIA-PACIFIC MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2018-2032 (USD MILLION)
  • TABLE 145. ASIA-PACIFIC MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2018-2032 (USD MILLION)
  • TABLE 146. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 147. ASEAN MOBILE THREAT DEFENSE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 148. ASEAN MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2018-2032 (USD MILLION)
  • TABLE 149. ASEAN MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, 2018-2032 (USD MILLION)
  • TABLE 150. ASEAN MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2018-2032 (USD MILLION)
  • TABLE 151. ASEAN MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2018-2032 (USD MILLION)
  • TABLE 152. ASEAN MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2018-2032 (USD MILLION)
  • TABLE 153. ASEAN MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 154. ASEAN MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2018-2032 (USD MILLION)
  • TABLE 155. ASEAN MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2018-2032 (USD MILLION)
  • TABLE 156. GCC MOBILE THREAT DEFENSE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 157. GCC MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2018-2032 (USD MILLION)
  • TABLE 158. GCC MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, 2018-2032 (USD MILLION)
  • TABLE 159. GCC MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2018-2032 (USD MILLION)
  • TABLE 160. GCC MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2018-2032 (USD MILLION)
  • TABLE 161. GCC MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2018-2032 (USD MILLION)
  • TABLE 162. GCC MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 163. GCC MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2018-2032 (USD MILLION)
  • TABLE 164. GCC MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2018-2032 (USD MILLION)
  • TABLE 165. EUROPEAN UNION MOBILE THREAT DEFENSE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 166. EUROPEAN UNION MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2018-2032 (USD MILLION)
  • TABLE 167. EUROPEAN UNION MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, 2018-2032 (USD MILLION)
  • TABLE 168. EUROPEAN UNION MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2018-2032 (USD MILLION)
  • TABLE 169. EUROPEAN UNION MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2018-2032 (USD MILLION)
  • TABLE 170. EUROPEAN UNION MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2018-2032 (USD MILLION)
  • TABLE 171. EUROPEAN UNION MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 172. EUROPEAN UNION MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2018-2032 (USD MILLION)
  • TABLE 173. EUROPEAN UNION MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2018-2032 (USD MILLION)
  • TABLE 174. BRICS MOBILE THREAT DEFENSE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 175. BRICS MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2018-2032 (USD MILLION)
  • TABLE 176. BRICS MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, 2018-2032 (USD MILLION)
  • TABLE 177. BRICS MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2018-2032 (USD MILLION)
  • TABLE 178. BRICS MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2018-2032 (USD MILLION)
  • TABLE 179. BRICS MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2018-2032 (USD MILLION)
  • TABLE 180. BRICS MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 181. BRICS MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2018-2032 (USD MILLION)
  • TABLE 182. BRICS MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2018-2032 (USD MILLION)
  • TABLE 183. G7 MOBILE THREAT DEFENSE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 184. G7 MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2018-2032 (USD MILLION)
  • TABLE 185. G7 MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, 2018-2032 (USD MILLION)
  • TABLE 186. G7 MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2018-2032 (USD MILLION)
  • TABLE 187. G7 MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2018-2032 (USD MILLION)
  • TABLE 188. G7 MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2018-2032 (USD MILLION)
  • TABLE 189. G7 MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 190. G7 MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2018-2032 (USD MILLION)
  • TABLE 191. G7 MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2018-2032 (USD MILLION)
  • TABLE 192. NATO MOBILE THREAT DEFENSE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 193. NATO MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2018-2032 (USD MILLION)
  • TABLE 194. NATO MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, 2018-2032 (USD MILLION)
  • TABLE 195. NATO MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2018-2032 (USD MILLION)
  • TABLE 196. NATO MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2018-2032 (USD MILLION)
  • TABLE 197. NATO MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2018-2032 (USD MILLION)
  • TABLE 198. NATO MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 199. NATO MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2018-2032 (USD MILLION)
  • TABLE 200. NATO MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2018-2032 (USD MILLION)
  • TABLE 201. GLOBAL MOBILE THREAT DEFENSE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 202. UNITED STATES MOBILE THREAT DEFENSE MARKET SIZE, 2018-2032 (USD MILLION)
  • TABLE 203. UNITED STATES MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2018-2032 (USD MILLION)
  • TABLE 204. UNITED STATES MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, 2018-2032 (USD MILLION)
  • TABLE 205. UNITED STATES MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2018-2032 (USD MILLION)
  • TABLE 206. UNITED STATES MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2018-2032 (USD MILLION)
  • TABLE 207. UNITED STATES MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2018-2032 (USD MILLION)
  • TABLE 208. UNITED STATES MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 209. UNITED STATES MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2018-2032 (USD MILLION)
  • TABLE 210. UNITED STATES MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2018-2032 (USD MILLION)
  • TABLE 211. CHINA MOBILE THREAT DEFENSE MARKET SIZE, 2018-2032 (USD MILLION)
  • TABLE 212. CHINA MOBILE THREAT DEFENSE MARKET SIZE, BY COMPONENT, 2018-2032 (USD MILLION)
  • TABLE 213. CHINA MOBILE THREAT DEFENSE MARKET SIZE, BY SERVICES, 2018-2032 (USD MILLION)
  • TABLE 214. CHINA MOBILE THREAT DEFENSE MARKET SIZE, BY OPERATING SYSTEM, 2018-2032 (USD MILLION)
  • TABLE 215. CHINA MOBILE THREAT DEFENSE MARKET SIZE, BY THREAT TYPE, 2018-2032 (USD MILLION)
  • TABLE 216. CHINA MOBILE THREAT DEFENSE MARKET SIZE, BY DEVICE TYPE, 2018-2032 (USD MILLION)
  • TABLE 217. CHINA MOBILE THREAT DEFENSE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 218. CHINA MOBILE THREAT DEFENSE MARKET SIZE, BY ORGANIZATION SIZE, 2018-2032 (USD MILLION)
  • TABLE 219. CHINA MOBILE THREAT DEFENSE MARKET SIZE, BY END USER, 2018-2032 (USD MILLION)