Mobile phone security has a long way to go, and the key to the growth of the enterprise market?
点击次数: 95 Date: 2018-01-08 Hits: 95
Recently, a piece of news that "Ministry of Industry and Information Technology announced 466 problem apps in recent years" aroused the attention of netizens. The report pointed out that a virus called "DowginCW" exists as a plug-in in many popular games and secretly controlled at least dozens of domestic Million mobile devices. With the fermentation of this news, the topic of "old-fashioned talk" about mobile phone security has once again attracted people's attention.
With the rapid development of the mobile Internet and the popularity of smart phones in recent years, many mobile payment tools have also been born, such as WeChat, Alipay and other commonly used payment software, which has become the preferred payment method for people traveling. At the same time, the birth of these mobile payment tools has made it increasingly important to protect the security of mobile phones.
The 2016-2017 quarterly test report on the mobile phone security market released by iMedia Consulting shows that the mobile phone security issues that users are concerned about in 2016 are divided into many categories, of which 73.3% are users who are concerned about the security of mobile payment property, and users who are concerned about the leakage of personal privacy. 64.8%, in addition to common mobile phone security issues such as harassing phones, public wifi security, and spam messages. At the same time, the report also shows that users' overall awareness of mobile phone security is not high, and mobile phone security issues are still prominent.
In fact, since the outbreak of mobile phone security, the situation is still severe, especially the trend of mobile phones gradually replacing the PC in recent years, making it a high incidence area of various virus Trojans. The news about the outbreak of new mobile phone viruses in the news report is wave after wave, and the security issue of mobile phones is still "spring breeze and live again", and coldness will emerge to threaten the safety of users' mobile phones. Regarding the control of mobile phone security issues, although many security guards have taken more and more protective measures, the methods of virus makers have also become more sophisticated, and various security risks that "cannot be prevented" have always existed in mobile phones.
In addition, the report also showed that as of the fourth quarter of 2016, the number of domestic mobile phone security users was 539 million. Until the third quarter of 2017, this number reached 559 million, a growth rate of 1.27%. This shows that the scale of domestic mobile phone security users has entered a period of slowing growth in the past two years, and the user size growth dividend is fading.
Therefore, in the mobile phone security market where the problem of mobile phone security is still serious and the growth rate of users has slowed down, the overall development in the later period will mainly focus on tapping the value of existing users. In the process of tapping the value of existing users, the mobile phone security market is gradually divided into two camps, one is the professional third-party mobile phone security guard camp, and the other is the secure mobile phone that has emerged in the past two years. The two sides have jointly formed the mobile phone security market. Security lines, but they have some shortcomings.
Third-party mobile phone security guards: deterioration of security nature, incomplete protection
Third-party mobile phone security software on the market, in addition to possessing specialized functions for virus killing and monitoring in mobile phone security protection, is also a must-have for many mobile phone users to install mobile phone applications due to other rich and derived functions. As we all know, the functions of these mobile phone security software are mainly divided into virus killing, traffic monitoring, blocking harassing calls, blocking advertisements and spam messages, and clearing mobile phone memory. At the early stage of the development of smart phones with generally low mobile phone memory and traffic, Mobile phone security guards are popular with smartphone users.
However, with the maturity of mobile phone software and hardware technology, the protection performance of mobile phones is getting better and better, so the virus monitoring function of mobile phone security guards seems to be less valued. In addition, in the period of slowing user growth, there are still some problems in the development of mobile phone security software.
First, it requires too much open permissions, and the security nature is somewhat deteriorated. As a software specifically for protecting the security of mobile phones, the functions are also constantly being optimized and improved, but in the process of more and more rich and perfect functions, these softwares for protecting mobile phone security have undergone subtle changes in the nature of security. Variety. These changes are manifested in the need to allow users to open a lot of mobile phone permissions before helping users to achieve a certain function, which may actually cause the insecurity of the mobile phone.
For example, Tencent Mobile Manager needs to enable the auto-start permission to protect the security of the mobile phone in real time, and add functions such as opening contacts and SMS permissions to effectively monitor certain security options of the mobile phone. Another example is that 360 security guards also require users to open the auto-start permission. Otherwise, many basic functions will be unavailable. In addition, permissions such as SMS and call records must be opened, or the use of functions such as traffic monitoring and fraud interception will be affected. From this point of view, these mobile phone security guards themselves are to protect the security of mobile phones, but in the end, due to too many permissions, the nature of security seems to have deteriorated.
Secondly, the safety protection function is not thorough enough and may only play a safety auxiliary role. As the name implies, the role of mobile phone security software is to protect the security of the mobile phone, and then expand to other derivative functions, but the security protection function of some mobile phone security software does not seem to be so "professional", you need to cooperate with your own An anti-virus software can fully play the role of anti-virus.
For example, the Kingsoft mobile phone guardian of Kingsoft, although it has conventional options such as harassment interception and software scanning in the mobile phone protection function, it needs to cooperate with its own Kingsoft mobile phone drug fighter in order to maximize the antivirus effect. From this point of view, Kingsoft Mobile Guard seems to have only played an auxiliary role in security monitoring. The real security guard is actually Kingsoft Mobile Drug Bully. In this way, mobile phone users need to install two pieces of software with similar functions in order to achieve the purpose of complete antivirus. This will not only waste the user's memory, but also cause the user to resist and switch to other security software.
In addition, some mobile phone security software still has phenomena such as fast power consumption and "stealing" traffic, and some of them can cause mobile phone freezes due to excessive memory.
Taken together, third-party mobile security software has attracted much attention in the mobile security market due to its professionalism. However, due to technical limitations, there are still many functions that need to be optimized and improved.
A secure mobile phone aimed at business security: entering the market is not yet just needed, internal skills still need to be cultivated
In order to meet the needs of some users for highly secure mobile phones, many mobile phone manufacturers have released security mobile phones with higher security performance than ordinary smart phones. Such mobile phones are more professional in security protection performance.
For example, the ZTE V870, a secure mobile phone targeted at the government market, and the Gionee M7, targeted at the business market, as well as the wide-density mobile phones and Veb mobile phones, which are also targeted at business people but not well-known.
Since last year, secure mobile phones have been regarded as a hot spot in the mobile security market. With the company's own advantages, some secure mobile phone brands have gradually become well known. But limited to objective factors such as the timeliness of initial entry into the market, the concept of secure mobile phones has not been fully popular in the market, and its popularity is generally not high.
In addition, for some ordinary mobile phone users, the current security mobile phone is not a rigid demand in the mobile phone category, so it is not exaggerated to be widely known. After all, for the vast majority of users, the high security of the mobile phone cannot be the reason for buying a mobile phone. If you think the mobile phone is not secure enough, you can at least rely on third-party mobile phone security software. As these security mobile phone brands are involved in, security mobile phones are currently only available to people in the government and business markets.
Therefore, as a whole, because of the "young" experience of entering the market, and the relatively narrow audience range, it will take some time for them to fully penetrate the market.
Mobile security has a long way to go, entering the enterprise market or becoming a new incremental approach
On the whole, when the mobile phone is gradually becoming a sticky tool in people's lives, the mobile phone terminal has also become an area vulnerable to various virus attacks. The position of the mobile security market is still improving, and the industry still has a lot of room for development.
As mentioned earlier, the domestic mobile phone security market has entered a period of slowing growth, so the overall development in the future may move towards the value mining of existing users. However, it is obvious to all that the security housekeeper protection performance that comes with smart phones is getting better and better, and the functions are similar to those of third-party security software. At the same time, when wifi is spread in all corners of life, mobile phone memory is getting higher and higher, traffic monitoring is not so important to people, and the function of clearing memory is no longer taken care of. Therefore, for companies that provide third-party security software, mining users The value seems not so simple.
However, as corporate office shifts to mobile, business people's attention to mobile phone security is also rising. For some business people, corporate data and various secrets play a pivotal role, and they are also a high-risk area for virus attacks. If the mobile phone security market can seize this trend, improve the security protection performance of corporate offices, and promote the development of the mobile office security market, while bringing the gospel to the mobile office crowd, it will also go further to achieve the goal of tapping the value of existing users.
At the same time, with the development of artificial intelligence technology, the application of artificial intelligence technology to mobile phone security protection has also become a new development direction of the mobile phone security market. With the support of artificial intelligence technology, complete coverage of mobile phone users' life scenarios can be completed, which can provide more intelligent security protection operations for mobile phone users.
Taken together, various mobile phone viruses have died in batches in a round of suppression, but at the same time, new viruses have swept up, and mobile phone security issues have been lingering in people's lives. In the future mobile phone security market, if the mobile phone itself has a very high security system, there is no need for users to worry about security issues, then there is no third-party mobile phone security guard. However, it is not easy to completely remove viruses that threaten the security of mobile phones, so the battle for mobile phone security is still a long-term battle.