Presentatie F-Secure 26062015

Preview:

Citation preview

WE AREF-SECURE

.

OVER 25 YEARSOF DIGITAL SECURITY

EXPERIENCE

WE ARE #1 IN SECURITY

153.8 Revenues MEUR

Operating Profit MEUR

Personnel

18.8R&D Investments of Revenues25 %

939

Pioneeringtechnology

year after year

BLACKLIGHT

DEEPGUARD

ORSP

LISTED ON NASDAQ OMX

Consistently ranked among the best by AV-Test, AV comparatives and numerous 3rd parties

WE WORK WITH 200+ OPERATORS AND 6,000+ SERVICE

PARTNERS

Serving tens of millions of people in 40+ countries.

WHAT MAKESF-SECURE UNIQUE?

TRUSTED VENDOR FROM A TRUSTED COUNTRYSUPERB USABILITY

LEADER IN CLOUD-BASED SECURITYBIG ENOUGH TO BE CREDIBLE – SMALL ENOUGH TO BE NIMBLE

AV-Test “Best Protection” award forF-Secure for the 4th year in a row

ONSITE SECURITY MANAGEMENT WITH SUPERIOR CONTROL

F-Secure Policy Manager

BUSINESS BENEFITS

© F-Secure Confidential8

Advanced management features even for complex environments

Reduced administration due to automation of daily operations

Optimize performance for virtual environments by offloading scanning

EXTRA BENEFITSWITH PREMIUM

© F-Secure Confidential9

Better productivity and security with web content control

Safe connections to trusted sites for superior security and ease of work

Support for automated patch management to secure your business against known threats

Support for virtual environments licensed in the same package with Scanning and Reputation Server

EASY MANAGEMENT

© F-Secure Confidential10

Deploy Manage Take action

POLICY MANAGER

© F-Secure Confidential11

Manage Business Suite products:

Client Security

E-mail and Server Security

Server Security

Manage other F-Secure security products

Security for Virtual and Cloud Environments

All with one, easy and automated solution

Desktop Laptop

Server Softwareupdate

WHAT’S NEW?

© F-Secure Confidential12

WEB CONTENT CONTROL

CONNECTION CONTROL

ADVANCED PROTECTION

SCANNING AND REPUTATION SERVER

© F-Secure Confidential13

WEB CONTENT CONTROL

© F-Secure Confidential14

Prevent malicious content from entering your network

Reduce productivity losses, bandwidth consumption, and legal risks caused by unauthorized employee access to inappropriate or distracting web content

Improve security by providing an extra layer of protection

IMPROVED PRODUCTIVITY THROUGH

CONTROLLED ACCESS

© F-Secure Confidential15 Source: http://www.salary.com/2014-wasting-time-at-work/

2013 of all respondents said they waste at least some time at work on a daily basis.

69%The number of people in this year’s

survey who reported wasting time at work every day is up to a whopping 89%

89%OF PEOPLE SURVEYED WASTE AT LEAST

HALF THE AVERAGE WORDDAY ON NON WORK-RELATED TASKS.

4%

A 20% INCREASE COMPARED TO

LAST YEAR

WHERE’S THE WASTE?

© F-Secure Confidential16 Source: http://www.salary.com/2014-wasting-time-at-work/

GOOGLE FACEBOOK LINKEDIN24% 15% 14%

31% waste roughly 30 minutes daily 31% waste roughly 1 hour daily 16% waste roughly 2 hours daily

6% waste roughly 3 hours daily2% waste roughly 4 hours daily 2% waste 5 or more hours

89%

IMPROVE SECURITY

© F-Secure Confidential17

Guarantee better security as employees cannot access the harmful sites in the first place

90% of normal attacks come through the web

You can block harmful sites.

CONNECTION CONTROL

© F-Secure Confidential18

Improve security through controlled and safe access to business critical assets

Allows connections during the session to sites which are verified safe by F-Secure

Protects the weakest link in business criticalsessions – the web browser

SUPERIOR SECURITY

© F-Secure Confidential19

Activates automatically in thebrowser when entering a web site

Prevents unknown bankingtrojans from sending sensitiveinformation to online criminals

Closes network connections to unknown sites and prevents newones during session

X

20

CONNECTION CONTROL – STOPTHE ATTACKS BEFORE THEY ENTER

The weakest links:The online bank users and their browsers

Banks have secured the connection from browser to the bank and the online banking servers

Phishing Trojans

© F-Secure Confidential

Why a secure connection matters?

Financial loss when online bankingcredentials and money from the bankaccount is stolen.

Business secrets stolen if cloud-based CRM credentials are stolen

© F-Secure Confidential21

CONNECTION CONTROL

ADVANCEDPROTECTION

© F-Secure Confidential22

Web Traffic Scanning Advanced Protection allows the admin to block certain content from unknown and suspicious sites. E.g. Flash, Silverlight, Executables, Java & ActiveX

components.

STOP MOST OF THEWEB ATTACKS

© F-Secure Confidential23

JAVA

28%

FLASH

33%

WINDOWS

10%

SILVERLIGHT

5%

Source: hxxp:// contagiodata.blogspot.fi/2014/12/exploit-kits-2014.html

Block 100% of Java applets and Windows malwarethat come from unknown sources you do not trust.

Technologiestargeted byexploit kitsin 2014-2015

© F-Secure Confidential24

Web Traffic Scanning Advanced Protection provides an additional layer of protection

This feature will not be enabled by default

PM admin will also have the possibility to whitelist certain trusted sites E.g. company intranet sites

ADMIN HAS CONTROL

IMPROVEDADMIN TOOLS

© F-Secure Confidential25

ALERT HANDLING SCHEDULED REPORTING

ALERT HANDLING

© F-Secure Confidential26

• Syslog improvements• Common Event Format messaging support for Security

Information and Event Management (SIEM) integration in alert forwarding

• Email alert improvements• Introducing Policy Manager Server based alerting via email.

SCHEDULED REPORTING

© F-Secure Confidential27

• Scheduled reporting via email to multiple recipients linked to certain policy domains. Reporting is based per policy domain.

• Reporting can be scheduled on daily, weekly or monthly basis.

OTHER NEW FEATURES

© F-Secure Confidential28

Policy Manager based backup Scheduled backup of PM Database on a weekly and daily basis.

Software Updater improvements Exclusions by one-time click in the software updates tab

Comment field for exclusions

Updated graphical user interface Update on look and feel in the user interface.

Minor improvements on default real-time scanning and email scanning settings.

Active Directory improvements Auto discovery of unmanaged hosts.

POLICY MANAGER FEATURES

© F-Secure Confidential29

F-Secure Policy Manager is our central management solution. It is a highly scalable and automated tool

that lets you manage all your security applications in one place, define and distribute security policies, and

monitor your company's overall security.

SOFTWARE AND APPLICATIONS

Software Updater fully integrated to the solution, no infrastructure needed

Patches automatically OS and third-party non-Microsoft applications

Automatically downloads and installs the patches, with manual setting if needed

Better manageability for USB devices

Prevents malware infections via USB

Administrator can be notified if devicehas been blocked

DEVICE CONTROL

Blocks certain hardware devices to protect network and endpoints

POLICY MANAGEMENT

Manage security settings centrally

Create and customize individual security profiles based on your needs

Assign profiles individually to any computer or in groups

Support for multiple concurrent admin sessions

Gives IT admin possibility to restrict access to web content based onpre-defined categories

28 different categories available

An extra layer of protection against malware, phishing and other online scam sites

WEB CONTENT CONTROL

Protects users against harmful activity when accessing online banking and other business critical sites

Supports all the major browsers

Closes network connections to unknown sites while enabled

CONNECTION CONTROL

Web Traffic Scanning Advanced Protection allows the administrator to block selected content from unknown or suspicious sites

The admin can whitelist selected sites

Protects the user from typically vulnerable content from websites

ADVANCEDPROTECTION

VISIBILITY TO ENVIRONMENT Provides exceptional overview on the

security status of your environment

Creates vulnerability analysis for theIT environment with remediation steps

Creates detailed reports on the security events and levels

MANAGEMENT HIERARCHY Capability of importing Microsoft Active

Directory tree structure

Different views for each level, with the ability to give defined access

Easy to control user accounts and which services they have access to

SERVER MANAGEMENT Centrally manage your server security

Detailed overview of server security information and status

Manage your third party software vulnerabilities

CONTROLLED SECURITY THE

EASY WAY

© F-Secure Confidential40

Test it for free!

© F-Secure Confidential41

PRIVACY IS A HOT

TOPIC

42

WE ALL HAVE A FUNDAMENTAL NEED TO KEEP SOME THINGS

TO OURSELVES

© F-Secure Confidential

THE RECENT

EDWARD SNOWDEN REVELATIONS HAVE RAISED

CONSUMERS’ INTEREST IN PRIVACY SIGNIFICANTLY.

image source: http://grumpyelder.com

© F-Secure Confidential44

PRIVACY IS A NEW MARKET AND DIFFERENT FROM

TRADITIONAL SECURITY SECURITY IS ABOUT BEING FREE OF A THREAT OR DANGER. Traditionally Internet Security solutions have focused on securing PCs and smartphonesfrom viruses and other Internet threats. Additional benefits, such as parental control, have been developed to complement the offering.

PRIVACY IS ABOUT BEING FREE FROM BEING OBSERVED OR DISTURBED BY OTHERS.With digital lifestyle consumers are revealing their thoughts and interests online whileopening up an opportunity for others to profile, track and snoop their personal interests.Online privacy solutions focus on giving the consumers the control of their online privacy.

NEW SOLUTIONS ARE NEEDED!

ARE CONCERNED ABOUT PRIVACY

WHEN USING PUBLIC WI-FI.

© F-Secure Confidential45

52%of respondents globally

AVOID USING PUBLIC WI-FI

BECAUSE THEY WORRY ABOUT

VIRUSES OR MALWARE.

© F-Secure Confidential46

59%of respondents surveyed in

six countries

ARE CONCERNED THEIR ONLINE BEHAVIOR IS

TRACKED AND DATA SOLD TO 3RD PARTIES.

© F-Secure Confidential47

57%of respondents surveyed in

Europe

WOULD LIKE TO USE

GEOGRAPHICALLY RESTRICTED

ONLINE SERVICES FROM ANYWHERE.

© F-Secure Confidential48

54%of respondents surveyed in

six countries

WE ARE SOLVING

REAL CUSTOMER PROBLEMS!

49

© F-Secure Confidential50

STRIPTEASE ADS RUINED A BIRTHDAY PARTY

“My 10 year old daughter's birthday party was completelyruined when our family iPad started showing suddenlystriptease ads. I felt awful and humiliated. Parents werecalling our house all evening and I had to explain over andover what had happened. I’m worried my daughter’s friendswill not play with her anymore. Later on I learned thatadvertisers had been tracking my husband who wasorganizing a bachelor’s party – that’s why the ads were beingshown to my daughter and her friends.”

Catherine, 45

“OUR FAMILY IPAD STARTED SHOWING SUDDENLY STRIPTEASE ADS.”

© F-Secure Confidential51

“…OUR FAMILY IPAD STARTED

SUDDENLY SHOWING

STRIPTEASE ADS !”

UNTRACKABLEFreedome keeps you anonymous and doesn’t let others tap into your data.

© F-Secure Confidential52

BANKING INFORMATION STOLEN AT MY FAVORITE

COFFEE LOCATION

“I like spending my Saturday afternoons at my local coffeeshop. What’s more relaxing than a cup of Cappuccino andbrowsing the Internet with my tablet. Occasionally I also takecare of household items such as paying my bills online. Littledid I know that even a kid can hack into a public Wi-Fi. Exceptthat in my case it wasn’t a kid but a hacker who stole my bankaccount information. Long story short, it took weeks offighting with my bank and at end I still lost money. One thingis for sure, I will never use a public Wi-Fi anymore.”

Mark, 24

“ONE THING IS FOR SURE: I WILL NEVER USE A PUBLIC WI-FI ANYMORE.”

© F-Secure Confidential53

“ONE THING IS FOR SURE: I WILL NEVER

USE A PUBLIC WI-FI ANYMORE”

Connect safely from any public Wi-Fi. Freedome encrypts your data so that

no one else can read it

WI-FI SECURITY

© F-Secure Confidential54

SHOPPING TAKEN TO A NEW LEVEL

“Let’s face it, I do appreciate being able to browse the websafely but what I really enjoy is bargain hunting. By changingthe virtual location of my tablet I have been able to savehundreds of Euros. How? Well, the same shopping websiteshave different prices for different countries and with a push ofa button, I can change the location of my tablet and hunt forthe best deals in different countries…This is pretty cool!”

Anna, 36

“…HUNT FOR THE BEST DEALS IN DIFFERENT COUNTRIES…THIS IS PRETTY COOL!”

© F-Secure Confidential55

“…HUNT FOR THE BEST DEALS IN DIFFERENT

COUNTRIES…THIS IS PRETTY COOL!”

Change your virtual location to other country for better online prices.

SAVE MONEY IN ONLINE SHOPPING

© F-Secure Confidential56

FOOTBALL,ANYWHERE?YES, PLEASE!

“Don’t tell my wife but I can’t live without football. I mean Ican’t live without her either but football is still football.While I love our vacations I hate missing out the importantgames. When I try to stream content from my home country Ialways get a message that the stream is not available inforeign countries. What a bummer. Then I discovered thisnew app that allows me to change my virtual location. Thewhole world is now open! I can watch my favorite contentwhen I’m abroad and I can watch foreign content when I’m athome. What’s better than knowing what will happen in TVshows before my friends do.”

Jason, 52

“I CAN WATCH MY FAVORITE CONTENT WHEN I’M ABROAD AND FOREIGN CONTENT WHEN I’M AT HOME. ”

© F-Secure Confidential57

“I CAN WATCH MY FAVORITE CONTENT WHEN

I’M ABROAD AND FOREIGN CONTENT

WHEN I’M AT HOME. ”TELEPORT TO ANY

LOCATIONWith Freedome you can change your

virtual location to the other side of the world and use your favorite services when you are traveling.

© F-Secure Confidential58

IN A COMPLEX WORLD, SIMPLICITY

MATTERS. ONE BUTTON

FOR ALL.

0

500,000

1,000,000

1,500,000

2,000,000

2,500,000

January

February

March

April

May

June

July

August

September

October

November

December

January

February

March

April

Android Apple PC Mac

© F-Secure Confidential59

EXTREMELY FAST GROWTHAND HIGH RATINGS

F-SECURE FREEDOME DOWNLOADS

FREEDOMEPRIVATE. UNTRACKED.

ANONYMOUS.

Terminology Online Profiling is primarily used by ad networks as a basis for targeted

marketing. It's a method of combining cookies, web site traffic analysis, and personal information to create a profile of a customer's browsing and buying habits. An online profile includes how much time customers spend in certain areas of a Web site and which ads they click on.

Geoblocking is the system used to limit the access to the internet, based on geographic location. There are several databases which map IP addresses to countries. These databases then form the basis of block-lists, more commonly known as geoblocks. Website administrators who manage video-streaming sites such as Netflix use geoblocks to limit their audiences to a certain geographic location.

Terminology VPN (Virtual Private Network) is used to protect online activity and

identity. By using an anonymous VPN service, Internet traffic and data remain encrypted, which prevents tracking Internet activity. A VPN service is especially useful when accessing public Wi-Fi hotspots because the public wireless services might not be secure. In addition to public Wi-Fi security, a private VPN service also provides consumers with uncensored Internet access and can help prevent data theft and unblock websites.

© F-Secure Confidential62

Terminology Phishing website is a fake web site set up by fraudsters that mimic e.g.

sign-in pages of trusted companies to trick the person into disclosing their user name and password, and thus providing fraudsters an access to an online account. Once given the access, personal information can be used to commit identity theft, charge credit cards, empty bank accounts, read email, and lock the person out of the online account by changing the password.

© F-Secure Confidential63

Terminology Online tracking. Most of the websites visited are tracking the visitors

online activity. Online tracking is used as a market research or as a way to target the advertising that they deliver. Different websites can share tracking information. One issue with online tracking involves privacy, as not all users care to have their web browsing activity tracked in this manner.

© F-Secure Confidential64

Recommended