SlideShare ist ein Scribd-Unternehmen logo
1 von 24
SECURE YOUR
BUSINESS.
WHEREVER IT
TAKES YOU.
PROTECTION SERVICE
FOR BUSINESS
WEARE
F-SECURE
F-SECURE
INSHORT
Leading research & development
since 1988. Creator of inventions that
are today’s industry standards
From Finland, Europe, publicly listed
on NASDAQ OMX Helsinki Ltd. since
1999
Trusted by millions of customers
worldwide, served by 200+ operators
and 3500+ local reseller partners
Protecting businesses in 100+
countries out of 25 offices
EVOLVING
SECURITY
TIME TO STEP UP SECURITY
EVOLVING
SECURITY
THREATS
Cyberattacks continue
to escalate in frequency, severity
and sophistication, making it
harder to defend against them.
Businesses have more
complex environments, and don’t
have the resources or know-how to
combat highly skilled and
aggressive cyber criminals.
LIMITED
RESOURCES
ANDSKILL
19%
increase in the average total
cost of a security incident in
2014-15.
38%
increase in detected
information security incidents
in 2015
60%
of the cases, attackers are able
to compromise an organization
within minutes.
99,9%
of the exploited vulnerabilities were
compromised more than a year after
the CVE was published.
ITISHARD
TOSTAYON
TOPOF
EVERYTHING
MORE COMPLEXITY
LIMITED KNOW-HOW
LIMITED RESOURCES
LIMITED TIME
OTHER PRIORITIES
WEMERGE
MEN&
MACHINES
SECURITY
ANALYSTS
ENDPOINT
SENSORS
Security consultants feed real
world threat intelligence into the
F-Secure research team, harden
customer security and provide
incident response and forensics to
customers.
Our security cloud uses artificial
intelligence and automation to detect,
categorize and block attacks as they
emerge. The information is pushed back
to products to provide accurate detection.
F-Secure research team studies potential
attack patterns and help consultants to
resolve incidents and forensics cases.
Our perimeter defence and
endpoint security products block
and detect known and unknown
attacks. The prevention and
detection is based on local device
analysis as well as intelligence
provided by the security cloud.
SECURITY
CLOUD
450 000Malware samples analyzed
per day
SCOPEOF
SECURITY
6 BILLIONReputation queries
per day
35 000Android malware samples
analyzed per day
WINNING ONCE
COULD BE LUCK.
WINNING FOUR
YEARS IN A ROW
PROVES
CATEGORY
DOMINANCE
AV-Test: ‘Best Protection’ 2011-14
AV-Comparatives: ‘Top Rated’ 2010-14
2011 2012
2013 2014
OUR
OFFERING
F-SECURE OFFERING FOR BUSINESSES
PREDICT PREVENT
DETECTRESPOND
ENDPOINT SECURITY
PROTECTION SERVICE
FOR BUSINESS
 Multi-Endpoint Security
 Mobile Device Management
 Patch Management
 Unified Solution
 As a service
VULNERABILITY MANAGEMENT
 Vulnerability scanning
 Vulnerability management
ATTACK SURFACE ASSESSMENT
 Threat level assessment
 Attack surface mapping
CONSULTANCY SERVICES
 Consulting & coaching
 For all areas of the security strategy
ADVANCED THREAT PROTECTION
 Security monitoring & alerting
 Incident response
OUR OFFERING
PROTECTION
SERVICE
FOR BUSINESS
Secure your Business.
Wherever it takes you.
WINDOWS | MAC | ANDROID | IOS | SERVERS
Powerful,modern,anddesignedto
solvechallengingsecurityneeds
aseasilyaspossible,
ProtectionServiceForBusiness
isoneoftheworld’sleadingmulti-endpoint
securitysolutions.
The only unified multi-endpoint security
solution on the market with integrated
Patch Management and MDM.
BESTENDPOINT
SECURITYPACKAGE
ONTHEMARKET
Proven to provide superior and
more consistent protection* than
our competitors – thanks to our
pioneering technologies.
BESTPROTECTION
WITH PIONEERING
TECHNOLOGIES
Merging all endpoint security needs and
tools into one centrally managed solution
allows you to use your budget & working
hours more effectively.
DESIGNEDTO
SIMPLIFYSECURITY
MANAGEMENT
AV-Test: ‘Best Protection’ 2011-14
AV-Comparatives: ‘Top Rated’ 2010-14
Provides consitent and industry leading
detection* rates – 4 years in a row
Covers all endpoints: Windows, Mac, iOS,
Android, and variety of server OS
Everything can be managed centrally
from a single cloud-based portal
Includes integrated Patch Managment
and MDM capabilities
Uses pioneering technologies like
real-time threat intelligence
AV-Test: ‘Best Protection’ 2011-14
AV-Comparatives: ‘Top Rated’ 2010-14
Awarded security for the latest
Windows and Mac endpoints, with
Patch Management.
COMPUTERS
Security and control for iOS &
Android devices, with MDM, VPN
and Anti-Malware.
MOBILES
Powerful and modern security
for your Windows, Linux and
Citrix servers
SERVERS
Designed to accelerate security management
and to give better visibility and control over all
your end-points.
MANAGEMENT
PORTAL
MANAGEMENT
Managing all your security needs from
one portal saves you time and effort
Graphical dashboards enable monitoring
of the security levels and incidents
Designed for faster management and better
visibility & control over all your end-points.
No need to deploy or maintain server
hardware - it’s a hosted service
Less maintenance: automated 3rd party
patches, and client + security updates
COMPUTERS
Minimal performance impact, making
it perfect for even older hardware
Integrated Patch Management keeps
OS and 3rd party software up-to-date
Awarded security for latest Windows and Mac
endpoints, with Patch Management.
Provides you industry leading detection*
capabilities, 4 years in a row
Leverages heuristic analysis and real-time
threat intelligence among others
AV-Test: ‘Best Protection’ 2011-14
AV-Comparatives: ‘Top Rated’ 2010-14
MOBILES
Integrated MDM capabilities allow
fleet management & monitoring
‘Ultralight’ technology ensures
minimal battery & performance impact
Security and control for iOS & Android devices,
with MDM, VPN and Anti-malware
Includes mobile VPN capabilities in
addition to advanced anti-malware
Increases mobile browsing speed up
to 30%, reducing data usage
SERVERS
Minimal performance impact, allowing
servers to run at peak performance
Integrated Patch Management keeps
server & published applications up-to-date
Powerful and modern security for your
Windows, Linux and Citrix servers
Utilizes pioneering technologies like heuristic
analysis and real-time threat intelligence
Specialized components for dedicated
Exchange & SharePoint servers
SWITCH
ON
FREEDOM

Weitere ähnliche Inhalte

Was ist angesagt?

F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure Corporation
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF-Secure Corporation
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windowsF-Secure Corporation
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?F-Secure Corporation
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2Nguyen Binh
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíMarketingArrowECS_CZ
 
F secure presentation
F secure presentationF secure presentation
F secure presentationkwader Saudi
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012dvanwyk30
 
CyberArk Cleveland Defend End Point Infection and Lateral Movement
CyberArk Cleveland Defend End Point Infection and Lateral MovementCyberArk Cleveland Defend End Point Infection and Lateral Movement
CyberArk Cleveland Defend End Point Infection and Lateral MovementChad Bowerman
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 Cyd Isaak Francisco
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3F-Secure Corporation
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeF-Secure Corporation
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAJorge Sebastiao
 

Was ist angesagt? (20)

Virtual Security
Virtual SecurityVirtual Security
Virtual Security
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server Security
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection Plus
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 
F secure presentation
F secure presentationF secure presentation
F secure presentation
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
CyberArk Cleveland Defend End Point Infection and Lateral Movement
CyberArk Cleveland Defend End Point Infection and Lateral MovementCyberArk Cleveland Defend End Point Infection and Lateral Movement
CyberArk Cleveland Defend End Point Infection and Lateral Movement
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
 
Cyber Security Coverage heat map
Cyber Security Coverage heat map Cyber Security Coverage heat map
Cyber Security Coverage heat map
 

Andere mochten auch

F-Secure Cloud Software icgse2013
F-Secure Cloud Software icgse2013F-Secure Cloud Software icgse2013
F-Secure Cloud Software icgse2013Janne Järvinen
 
Self-Service Business Intelligence with Power BI
Self-Service Business Intelligence with Power BISelf-Service Business Intelligence with Power BI
Self-Service Business Intelligence with Power BITheresa Lubelski
 
Secure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIPSecure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIPArpan Patel
 
Windows Server 2012 Active Directory Backup Restore
Windows Server 2012 Active Directory Backup RestoreWindows Server 2012 Active Directory Backup Restore
Windows Server 2012 Active Directory Backup RestoreSerhad MAKBULOĞLU, MBA
 
A University Network Design Exercise
A University Network Design ExerciseA University Network Design Exercise
A University Network Design Exercisejoelavery
 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal PresentationJan Aldrich Dorado
 
Network proposal
Network proposalNetwork proposal
Network proposalWaldo Botha
 
Network Design
Network DesignNetwork Design
Network Designcornimar
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal pptFrankNitty II
 
Introduction to PHP
Introduction to PHPIntroduction to PHP
Introduction to PHPBradley Holt
 
Technical Proposal - IT Infrastructure
Technical Proposal - IT InfrastructureTechnical Proposal - IT Infrastructure
Technical Proposal - IT Infrastructurewolfthrone
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017Drift
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great InfographicsSlideShare
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShareKapost
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareEmpowered Presentations
 

Andere mochten auch (16)

F-Secure Cloud Software icgse2013
F-Secure Cloud Software icgse2013F-Secure Cloud Software icgse2013
F-Secure Cloud Software icgse2013
 
Self-Service Business Intelligence with Power BI
Self-Service Business Intelligence with Power BISelf-Service Business Intelligence with Power BI
Self-Service Business Intelligence with Power BI
 
Secure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIPSecure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIP
 
Windows Server 2012 Active Directory Backup Restore
Windows Server 2012 Active Directory Backup RestoreWindows Server 2012 Active Directory Backup Restore
Windows Server 2012 Active Directory Backup Restore
 
A University Network Design Exercise
A University Network Design ExerciseA University Network Design Exercise
A University Network Design Exercise
 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal Presentation
 
Network proposal
Network proposalNetwork proposal
Network proposal
 
Network Design
Network DesignNetwork Design
Network Design
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal ppt
 
Introduction to PHP
Introduction to PHPIntroduction to PHP
Introduction to PHP
 
Technical Proposal - IT Infrastructure
Technical Proposal - IT InfrastructureTechnical Proposal - IT Infrastructure
Technical Proposal - IT Infrastructure
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great Infographics
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShare
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
 
You Suck At PowerPoint!
You Suck At PowerPoint!You Suck At PowerPoint!
You Suck At PowerPoint!
 

Ähnlich wie Protection Service for Business

Consultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresasConsultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresasFernando Misato
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfMdZabedHossain2
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutionsAlan Rudd
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 convertedemmaelice
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
Kaspersky - Apresentação Corporativa
Kaspersky - Apresentação CorporativaKaspersky - Apresentação Corporativa
Kaspersky - Apresentação CorporativaBravo Tecnologia
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Technologies
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0wendyking63
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story BookSmart Defend UK
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell securityRonny Stavem
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudOpenDNS
 
sb-checkpoint-matrix42
sb-checkpoint-matrix42sb-checkpoint-matrix42
sb-checkpoint-matrix42Wayne Phillips
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoePlus
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver NarrTI Safe
 
TechFai.com.pdf
TechFai.com.pdfTechFai.com.pdf
TechFai.com.pdfTechFai
 

Ähnlich wie Protection Service for Business (20)

Consultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresasConsultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresas
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Kaspersky - Apresentação Corporativa
Kaspersky - Apresentação CorporativaKaspersky - Apresentação Corporativa
Kaspersky - Apresentação Corporativa
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the Cloud
 
sb-checkpoint-matrix42
sb-checkpoint-matrix42sb-checkpoint-matrix42
sb-checkpoint-matrix42
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and Cisco
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
TechFai.com.pdf
TechFai.com.pdfTechFai.com.pdf
TechFai.com.pdf
 

Mehr von F-Secure Corporation

How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?F-Secure Corporation
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!F-Secure Corporation
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceF-Secure Corporation
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsF-Secure Corporation
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace F-Secure Corporation
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceF-Secure Corporation
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2F-Secure Corporation
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsF-Secure Corporation
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big businessF-Secure Corporation
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業F-Secure Corporation
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?F-Secure Corporation
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetF-Secure Corporation
 
F-Secure Labs Mobile Threat Report Q4 2012
F-Secure Labs Mobile Threat Report Q4 2012F-Secure Labs Mobile Threat Report Q4 2012
F-Secure Labs Mobile Threat Report Q4 2012F-Secure Corporation
 

Mehr von F-Secure Corporation (16)

Post-mortem of a data breach
Post-mortem of a data breachPost-mortem of a data breach
Post-mortem of a data breach
 
How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important terms
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutions
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big business
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitet
 
Surfing Safe on the Road
Surfing Safe on the RoadSurfing Safe on the Road
Surfing Safe on the Road
 
F-Secure's Annual Report 2012
F-Secure's Annual Report 2012 F-Secure's Annual Report 2012
F-Secure's Annual Report 2012
 
F-Secure Labs Mobile Threat Report Q4 2012
F-Secure Labs Mobile Threat Report Q4 2012F-Secure Labs Mobile Threat Report Q4 2012
F-Secure Labs Mobile Threat Report Q4 2012
 

Kürzlich hochgeladen

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Protection Service for Business

  • 1. SECURE YOUR BUSINESS. WHEREVER IT TAKES YOU. PROTECTION SERVICE FOR BUSINESS
  • 3. F-SECURE INSHORT Leading research & development since 1988. Creator of inventions that are today’s industry standards From Finland, Europe, publicly listed on NASDAQ OMX Helsinki Ltd. since 1999 Trusted by millions of customers worldwide, served by 200+ operators and 3500+ local reseller partners Protecting businesses in 100+ countries out of 25 offices
  • 5. EVOLVING SECURITY THREATS Cyberattacks continue to escalate in frequency, severity and sophistication, making it harder to defend against them. Businesses have more complex environments, and don’t have the resources or know-how to combat highly skilled and aggressive cyber criminals. LIMITED RESOURCES ANDSKILL
  • 6. 19% increase in the average total cost of a security incident in 2014-15. 38% increase in detected information security incidents in 2015 60% of the cases, attackers are able to compromise an organization within minutes. 99,9% of the exploited vulnerabilities were compromised more than a year after the CVE was published.
  • 9. SECURITY ANALYSTS ENDPOINT SENSORS Security consultants feed real world threat intelligence into the F-Secure research team, harden customer security and provide incident response and forensics to customers. Our security cloud uses artificial intelligence and automation to detect, categorize and block attacks as they emerge. The information is pushed back to products to provide accurate detection. F-Secure research team studies potential attack patterns and help consultants to resolve incidents and forensics cases. Our perimeter defence and endpoint security products block and detect known and unknown attacks. The prevention and detection is based on local device analysis as well as intelligence provided by the security cloud. SECURITY CLOUD
  • 10. 450 000Malware samples analyzed per day SCOPEOF SECURITY 6 BILLIONReputation queries per day 35 000Android malware samples analyzed per day
  • 11. WINNING ONCE COULD BE LUCK. WINNING FOUR YEARS IN A ROW PROVES CATEGORY DOMINANCE AV-Test: ‘Best Protection’ 2011-14 AV-Comparatives: ‘Top Rated’ 2010-14 2011 2012 2013 2014
  • 13. PREDICT PREVENT DETECTRESPOND ENDPOINT SECURITY PROTECTION SERVICE FOR BUSINESS  Multi-Endpoint Security  Mobile Device Management  Patch Management  Unified Solution  As a service VULNERABILITY MANAGEMENT  Vulnerability scanning  Vulnerability management ATTACK SURFACE ASSESSMENT  Threat level assessment  Attack surface mapping CONSULTANCY SERVICES  Consulting & coaching  For all areas of the security strategy ADVANCED THREAT PROTECTION  Security monitoring & alerting  Incident response OUR OFFERING
  • 14. PROTECTION SERVICE FOR BUSINESS Secure your Business. Wherever it takes you.
  • 15. WINDOWS | MAC | ANDROID | IOS | SERVERS
  • 17. The only unified multi-endpoint security solution on the market with integrated Patch Management and MDM. BESTENDPOINT SECURITYPACKAGE ONTHEMARKET Proven to provide superior and more consistent protection* than our competitors – thanks to our pioneering technologies. BESTPROTECTION WITH PIONEERING TECHNOLOGIES Merging all endpoint security needs and tools into one centrally managed solution allows you to use your budget & working hours more effectively. DESIGNEDTO SIMPLIFYSECURITY MANAGEMENT AV-Test: ‘Best Protection’ 2011-14 AV-Comparatives: ‘Top Rated’ 2010-14
  • 18. Provides consitent and industry leading detection* rates – 4 years in a row Covers all endpoints: Windows, Mac, iOS, Android, and variety of server OS Everything can be managed centrally from a single cloud-based portal Includes integrated Patch Managment and MDM capabilities Uses pioneering technologies like real-time threat intelligence AV-Test: ‘Best Protection’ 2011-14 AV-Comparatives: ‘Top Rated’ 2010-14
  • 19. Awarded security for the latest Windows and Mac endpoints, with Patch Management. COMPUTERS Security and control for iOS & Android devices, with MDM, VPN and Anti-Malware. MOBILES Powerful and modern security for your Windows, Linux and Citrix servers SERVERS Designed to accelerate security management and to give better visibility and control over all your end-points. MANAGEMENT PORTAL
  • 20. MANAGEMENT Managing all your security needs from one portal saves you time and effort Graphical dashboards enable monitoring of the security levels and incidents Designed for faster management and better visibility & control over all your end-points. No need to deploy or maintain server hardware - it’s a hosted service Less maintenance: automated 3rd party patches, and client + security updates
  • 21. COMPUTERS Minimal performance impact, making it perfect for even older hardware Integrated Patch Management keeps OS and 3rd party software up-to-date Awarded security for latest Windows and Mac endpoints, with Patch Management. Provides you industry leading detection* capabilities, 4 years in a row Leverages heuristic analysis and real-time threat intelligence among others AV-Test: ‘Best Protection’ 2011-14 AV-Comparatives: ‘Top Rated’ 2010-14
  • 22. MOBILES Integrated MDM capabilities allow fleet management & monitoring ‘Ultralight’ technology ensures minimal battery & performance impact Security and control for iOS & Android devices, with MDM, VPN and Anti-malware Includes mobile VPN capabilities in addition to advanced anti-malware Increases mobile browsing speed up to 30%, reducing data usage
  • 23. SERVERS Minimal performance impact, allowing servers to run at peak performance Integrated Patch Management keeps server & published applications up-to-date Powerful and modern security for your Windows, Linux and Citrix servers Utilizes pioneering technologies like heuristic analysis and real-time threat intelligence Specialized components for dedicated Exchange & SharePoint servers