SlideShare ist ein Scribd-Unternehmen logo
1 von 24
SECURE YOUR
BUSINESS.
WHEREVER IT
TAKES YOU.
PROTECTION SERVICE
FOR BUSINESS
WEARE
F-SECURE
F-SECURE
INSHORT
Leading research & development
since 1988. Creator of inventions that
are today’s industry standards
From Finland, Europe, publicly listed
on NASDAQ OMX Helsinki Ltd. since
1999
Trusted by millions of customers
worldwide, served by 200+ operators
and 3500+ local reseller partners
Protecting businesses in 100+
countries out of 25 offices
EVOLVING
SECURITY
TIME TO STEP UP SECURITY
EVOLVING
SECURITY
THREATS
Cyberattacks continue
to escalate in frequency, severity
and sophistication, making it
harder to defend against them.
Businesses have more
complex environments, and don’t
have the resources or know-how to
combat highly skilled and
aggressive cyber criminals.
LIMITED
RESOURCES
ANDSKILL
19%
increase in the average total
cost of a security incident in
2014-15.
38%
increase in detected
information security incidents
in 2015
60%
of the cases, attackers are able
to compromise an organization
within minutes.
99,9%
of the exploited vulnerabilities were
compromised more than a year after
the CVE was published.
ITISHARD
TOSTAYON
TOPOF
EVERYTHING
MORE COMPLEXITY
LIMITED KNOW-HOW
LIMITED RESOURCES
LIMITED TIME
OTHER PRIORITIES
WEMERGE
MEN&
MACHINES
SECURITY
ANALYSTS
ENDPOINT
SENSORS
Security consultants feed real
world threat intelligence into the
F-Secure research team, harden
customer security and provide
incident response and forensics to
customers.
Our security cloud uses artificial
intelligence and automation to detect,
categorize and block attacks as they
emerge. The information is pushed back
to products to provide accurate detection.
F-Secure research team studies potential
attack patterns and help consultants to
resolve incidents and forensics cases.
Our perimeter defence and
endpoint security products block
and detect known and unknown
attacks. The prevention and
detection is based on local device
analysis as well as intelligence
provided by the security cloud.
SECURITY
CLOUD
450 000Malware samples analyzed
per day
SCOPEOF
SECURITY
6 BILLIONReputation queries
per day
35 000Android malware samples
analyzed per day
WINNING ONCE
COULD BE LUCK.
WINNING FOUR
YEARS IN A ROW
PROVES
CATEGORY
DOMINANCE
AV-Test: ‘Best Protection’ 2011-14
AV-Comparatives: ‘Top Rated’ 2010-14
2011 2012
2013 2014
OUR
OFFERING
F-SECURE OFFERING FOR BUSINESSES
PREDICT PREVENT
DETECTRESPOND
ENDPOINT SECURITY
PROTECTION SERVICE
FOR BUSINESS
 Multi-Endpoint Security
 Mobile Device Management
 Patch Management
 Unified Solution
 As a service
VULNERABILITY MANAGEMENT
 Vulnerability scanning
 Vulnerability management
ATTACK SURFACE ASSESSMENT
 Threat level assessment
 Attack surface mapping
CONSULTANCY SERVICES
 Consulting & coaching
 For all areas of the security strategy
ADVANCED THREAT PROTECTION
 Security monitoring & alerting
 Incident response
OUR OFFERING
PROTECTION
SERVICE
FOR BUSINESS
Secure your Business.
Wherever it takes you.
WINDOWS | MAC | ANDROID | IOS | SERVERS
Powerful,modern,anddesignedto
solvechallengingsecurityneeds
aseasilyaspossible,
ProtectionServiceForBusiness
isoneoftheworld’sleadingmulti-endpoint
securitysolutions.
The only unified multi-endpoint security
solution on the market with integrated
Patch Management and MDM.
BESTENDPOINT
SECURITYPACKAGE
ONTHEMARKET
Proven to provide superior and
more consistent protection* than
our competitors – thanks to our
pioneering technologies.
BESTPROTECTION
WITH PIONEERING
TECHNOLOGIES
Merging all endpoint security needs and
tools into one centrally managed solution
allows you to use your budget & working
hours more effectively.
DESIGNEDTO
SIMPLIFYSECURITY
MANAGEMENT
AV-Test: ‘Best Protection’ 2011-14
AV-Comparatives: ‘Top Rated’ 2010-14
Provides consitent and industry leading
detection* rates – 4 years in a row
Covers all endpoints: Windows, Mac, iOS,
Android, and variety of server OS
Everything can be managed centrally
from a single cloud-based portal
Includes integrated Patch Managment
and MDM capabilities
Uses pioneering technologies like
real-time threat intelligence
AV-Test: ‘Best Protection’ 2011-14
AV-Comparatives: ‘Top Rated’ 2010-14
Awarded security for the latest
Windows and Mac endpoints, with
Patch Management.
COMPUTERS
Security and control for iOS &
Android devices, with MDM, VPN
and Anti-Malware.
MOBILES
Powerful and modern security
for your Windows, Linux and
Citrix servers
SERVERS
Designed to accelerate security management
and to give better visibility and control over all
your end-points.
MANAGEMENT
PORTAL
MANAGEMENT
Managing all your security needs from
one portal saves you time and effort
Graphical dashboards enable monitoring
of the security levels and incidents
Designed for faster management and better
visibility & control over all your end-points.
No need to deploy or maintain server
hardware - it’s a hosted service
Less maintenance: automated 3rd party
patches, and client + security updates
COMPUTERS
Minimal performance impact, making
it perfect for even older hardware
Integrated Patch Management keeps
OS and 3rd party software up-to-date
Awarded security for latest Windows and Mac
endpoints, with Patch Management.
Provides you industry leading detection*
capabilities, 4 years in a row
Leverages heuristic analysis and real-time
threat intelligence among others
AV-Test: ‘Best Protection’ 2011-14
AV-Comparatives: ‘Top Rated’ 2010-14
MOBILES
Integrated MDM capabilities allow
fleet management & monitoring
‘Ultralight’ technology ensures
minimal battery & performance impact
Security and control for iOS & Android devices,
with MDM, VPN and Anti-malware
Includes mobile VPN capabilities in
addition to advanced anti-malware
Increases mobile browsing speed up
to 30%, reducing data usage
SERVERS
Minimal performance impact, allowing
servers to run at peak performance
Integrated Patch Management keeps
server & published applications up-to-date
Powerful and modern security for your
Windows, Linux and Citrix servers
Utilizes pioneering technologies like heuristic
analysis and real-time threat intelligence
Specialized components for dedicated
Exchange & SharePoint servers
SWITCH
ON
FREEDOM

Weitere ähnliche Inhalte

Was ist angesagt?

Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
David Fuchs
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
dvanwyk30
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
Cyd Isaak Francisco
 

Was ist angesagt? (20)

Virtual Security
Virtual SecurityVirtual Security
Virtual Security
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server Security
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection Plus
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 
F secure presentation
F secure presentationF secure presentation
F secure presentation
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
CyberArk Cleveland Defend End Point Infection and Lateral Movement
CyberArk Cleveland Defend End Point Infection and Lateral MovementCyberArk Cleveland Defend End Point Infection and Lateral Movement
CyberArk Cleveland Defend End Point Infection and Lateral Movement
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
 
Cyber Security Coverage heat map
Cyber Security Coverage heat map Cyber Security Coverage heat map
Cyber Security Coverage heat map
 

Andere mochten auch

Network proposal
Network proposalNetwork proposal
Network proposal
Waldo Botha
 
Network Design
Network DesignNetwork Design
Network Design
cornimar
 
Technical Proposal - IT Infrastructure
Technical Proposal - IT InfrastructureTechnical Proposal - IT Infrastructure
Technical Proposal - IT Infrastructure
wolfthrone
 

Andere mochten auch (16)

F-Secure Cloud Software icgse2013
F-Secure Cloud Software icgse2013F-Secure Cloud Software icgse2013
F-Secure Cloud Software icgse2013
 
Self-Service Business Intelligence with Power BI
Self-Service Business Intelligence with Power BISelf-Service Business Intelligence with Power BI
Self-Service Business Intelligence with Power BI
 
Secure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIPSecure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIP
 
Windows Server 2012 Active Directory Backup Restore
Windows Server 2012 Active Directory Backup RestoreWindows Server 2012 Active Directory Backup Restore
Windows Server 2012 Active Directory Backup Restore
 
A University Network Design Exercise
A University Network Design ExerciseA University Network Design Exercise
A University Network Design Exercise
 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal Presentation
 
Network proposal
Network proposalNetwork proposal
Network proposal
 
Network Design
Network DesignNetwork Design
Network Design
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal ppt
 
Introduction to PHP
Introduction to PHPIntroduction to PHP
Introduction to PHP
 
Technical Proposal - IT Infrastructure
Technical Proposal - IT InfrastructureTechnical Proposal - IT Infrastructure
Technical Proposal - IT Infrastructure
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great Infographics
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShare
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
 
You Suck At PowerPoint!
You Suck At PowerPoint!You Suck At PowerPoint!
You Suck At PowerPoint!
 

Ähnlich wie Protection Service for Business

Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
Alan Rudd
 
sb-checkpoint-matrix42
sb-checkpoint-matrix42sb-checkpoint-matrix42
sb-checkpoint-matrix42
Wayne Phillips
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
ChristopherSumner7
 

Ähnlich wie Protection Service for Business (20)

Consultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresasConsultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresas
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
 
Kaspersky - Apresentação Corporativa
Kaspersky - Apresentação CorporativaKaspersky - Apresentação Corporativa
Kaspersky - Apresentação Corporativa
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the Cloud
 
sb-checkpoint-matrix42
sb-checkpoint-matrix42sb-checkpoint-matrix42
sb-checkpoint-matrix42
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and Cisco
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
TechFai.com.pdf
TechFai.com.pdfTechFai.com.pdf
TechFai.com.pdf
 

Mehr von F-Secure Corporation

Mehr von F-Secure Corporation (16)

Post-mortem of a data breach
Post-mortem of a data breachPost-mortem of a data breach
Post-mortem of a data breach
 
How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important terms
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutions
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big business
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitet
 
Surfing Safe on the Road
Surfing Safe on the RoadSurfing Safe on the Road
Surfing Safe on the Road
 
F-Secure's Annual Report 2012
F-Secure's Annual Report 2012 F-Secure's Annual Report 2012
F-Secure's Annual Report 2012
 
F-Secure Labs Mobile Threat Report Q4 2012
F-Secure Labs Mobile Threat Report Q4 2012F-Secure Labs Mobile Threat Report Q4 2012
F-Secure Labs Mobile Threat Report Q4 2012
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Protection Service for Business

  • 1. SECURE YOUR BUSINESS. WHEREVER IT TAKES YOU. PROTECTION SERVICE FOR BUSINESS
  • 3. F-SECURE INSHORT Leading research & development since 1988. Creator of inventions that are today’s industry standards From Finland, Europe, publicly listed on NASDAQ OMX Helsinki Ltd. since 1999 Trusted by millions of customers worldwide, served by 200+ operators and 3500+ local reseller partners Protecting businesses in 100+ countries out of 25 offices
  • 5. EVOLVING SECURITY THREATS Cyberattacks continue to escalate in frequency, severity and sophistication, making it harder to defend against them. Businesses have more complex environments, and don’t have the resources or know-how to combat highly skilled and aggressive cyber criminals. LIMITED RESOURCES ANDSKILL
  • 6. 19% increase in the average total cost of a security incident in 2014-15. 38% increase in detected information security incidents in 2015 60% of the cases, attackers are able to compromise an organization within minutes. 99,9% of the exploited vulnerabilities were compromised more than a year after the CVE was published.
  • 9. SECURITY ANALYSTS ENDPOINT SENSORS Security consultants feed real world threat intelligence into the F-Secure research team, harden customer security and provide incident response and forensics to customers. Our security cloud uses artificial intelligence and automation to detect, categorize and block attacks as they emerge. The information is pushed back to products to provide accurate detection. F-Secure research team studies potential attack patterns and help consultants to resolve incidents and forensics cases. Our perimeter defence and endpoint security products block and detect known and unknown attacks. The prevention and detection is based on local device analysis as well as intelligence provided by the security cloud. SECURITY CLOUD
  • 10. 450 000Malware samples analyzed per day SCOPEOF SECURITY 6 BILLIONReputation queries per day 35 000Android malware samples analyzed per day
  • 11. WINNING ONCE COULD BE LUCK. WINNING FOUR YEARS IN A ROW PROVES CATEGORY DOMINANCE AV-Test: ‘Best Protection’ 2011-14 AV-Comparatives: ‘Top Rated’ 2010-14 2011 2012 2013 2014
  • 13. PREDICT PREVENT DETECTRESPOND ENDPOINT SECURITY PROTECTION SERVICE FOR BUSINESS  Multi-Endpoint Security  Mobile Device Management  Patch Management  Unified Solution  As a service VULNERABILITY MANAGEMENT  Vulnerability scanning  Vulnerability management ATTACK SURFACE ASSESSMENT  Threat level assessment  Attack surface mapping CONSULTANCY SERVICES  Consulting & coaching  For all areas of the security strategy ADVANCED THREAT PROTECTION  Security monitoring & alerting  Incident response OUR OFFERING
  • 14. PROTECTION SERVICE FOR BUSINESS Secure your Business. Wherever it takes you.
  • 15. WINDOWS | MAC | ANDROID | IOS | SERVERS
  • 17. The only unified multi-endpoint security solution on the market with integrated Patch Management and MDM. BESTENDPOINT SECURITYPACKAGE ONTHEMARKET Proven to provide superior and more consistent protection* than our competitors – thanks to our pioneering technologies. BESTPROTECTION WITH PIONEERING TECHNOLOGIES Merging all endpoint security needs and tools into one centrally managed solution allows you to use your budget & working hours more effectively. DESIGNEDTO SIMPLIFYSECURITY MANAGEMENT AV-Test: ‘Best Protection’ 2011-14 AV-Comparatives: ‘Top Rated’ 2010-14
  • 18. Provides consitent and industry leading detection* rates – 4 years in a row Covers all endpoints: Windows, Mac, iOS, Android, and variety of server OS Everything can be managed centrally from a single cloud-based portal Includes integrated Patch Managment and MDM capabilities Uses pioneering technologies like real-time threat intelligence AV-Test: ‘Best Protection’ 2011-14 AV-Comparatives: ‘Top Rated’ 2010-14
  • 19. Awarded security for the latest Windows and Mac endpoints, with Patch Management. COMPUTERS Security and control for iOS & Android devices, with MDM, VPN and Anti-Malware. MOBILES Powerful and modern security for your Windows, Linux and Citrix servers SERVERS Designed to accelerate security management and to give better visibility and control over all your end-points. MANAGEMENT PORTAL
  • 20. MANAGEMENT Managing all your security needs from one portal saves you time and effort Graphical dashboards enable monitoring of the security levels and incidents Designed for faster management and better visibility & control over all your end-points. No need to deploy or maintain server hardware - it’s a hosted service Less maintenance: automated 3rd party patches, and client + security updates
  • 21. COMPUTERS Minimal performance impact, making it perfect for even older hardware Integrated Patch Management keeps OS and 3rd party software up-to-date Awarded security for latest Windows and Mac endpoints, with Patch Management. Provides you industry leading detection* capabilities, 4 years in a row Leverages heuristic analysis and real-time threat intelligence among others AV-Test: ‘Best Protection’ 2011-14 AV-Comparatives: ‘Top Rated’ 2010-14
  • 22. MOBILES Integrated MDM capabilities allow fleet management & monitoring ‘Ultralight’ technology ensures minimal battery & performance impact Security and control for iOS & Android devices, with MDM, VPN and Anti-malware Includes mobile VPN capabilities in addition to advanced anti-malware Increases mobile browsing speed up to 30%, reducing data usage
  • 23. SERVERS Minimal performance impact, allowing servers to run at peak performance Integrated Patch Management keeps server & published applications up-to-date Powerful and modern security for your Windows, Linux and Citrix servers Utilizes pioneering technologies like heuristic analysis and real-time threat intelligence Specialized components for dedicated Exchange & SharePoint servers