64
WE ARE F-SECURE

Presentatie F-Secure 26062015

Embed Size (px)

Citation preview

Page 1: Presentatie F-Secure 26062015

WE AREF-SECURE

Page 2: Presentatie F-Secure 26062015

.

OVER 25 YEARSOF DIGITAL SECURITY

EXPERIENCE

Page 3: Presentatie F-Secure 26062015

WE ARE #1 IN SECURITY

153.8 Revenues MEUR

Operating Profit MEUR

Personnel

18.8R&D Investments of Revenues25 %

939

Pioneeringtechnology

year after year

BLACKLIGHT

DEEPGUARD

ORSP

LISTED ON NASDAQ OMX

Consistently ranked among the best by AV-Test, AV comparatives and numerous 3rd parties

Page 4: Presentatie F-Secure 26062015

WE WORK WITH 200+ OPERATORS AND 6,000+ SERVICE

PARTNERS

Serving tens of millions of people in 40+ countries.

Page 5: Presentatie F-Secure 26062015

WHAT MAKESF-SECURE UNIQUE?

TRUSTED VENDOR FROM A TRUSTED COUNTRYSUPERB USABILITY

LEADER IN CLOUD-BASED SECURITYBIG ENOUGH TO BE CREDIBLE – SMALL ENOUGH TO BE NIMBLE

Page 6: Presentatie F-Secure 26062015

AV-Test “Best Protection” award forF-Secure for the 4th year in a row

Page 7: Presentatie F-Secure 26062015

ONSITE SECURITY MANAGEMENT WITH SUPERIOR CONTROL

F-Secure Policy Manager

Page 8: Presentatie F-Secure 26062015

BUSINESS BENEFITS

© F-Secure Confidential8

Advanced management features even for complex environments

Reduced administration due to automation of daily operations

Optimize performance for virtual environments by offloading scanning

Page 9: Presentatie F-Secure 26062015

EXTRA BENEFITSWITH PREMIUM

© F-Secure Confidential9

Better productivity and security with web content control

Safe connections to trusted sites for superior security and ease of work

Support for automated patch management to secure your business against known threats

Support for virtual environments licensed in the same package with Scanning and Reputation Server

Page 10: Presentatie F-Secure 26062015

EASY MANAGEMENT

© F-Secure Confidential10

Deploy Manage Take action

Page 11: Presentatie F-Secure 26062015

POLICY MANAGER

© F-Secure Confidential11

Manage Business Suite products:

Client Security

E-mail and Server Security

Server Security

Manage other F-Secure security products

Security for Virtual and Cloud Environments

All with one, easy and automated solution

Desktop Laptop

Server Softwareupdate

Page 12: Presentatie F-Secure 26062015

WHAT’S NEW?

© F-Secure Confidential12

Page 13: Presentatie F-Secure 26062015

WEB CONTENT CONTROL

CONNECTION CONTROL

ADVANCED PROTECTION

SCANNING AND REPUTATION SERVER

© F-Secure Confidential13

Page 14: Presentatie F-Secure 26062015

WEB CONTENT CONTROL

© F-Secure Confidential14

Prevent malicious content from entering your network

Reduce productivity losses, bandwidth consumption, and legal risks caused by unauthorized employee access to inappropriate or distracting web content

Improve security by providing an extra layer of protection

Page 15: Presentatie F-Secure 26062015

IMPROVED PRODUCTIVITY THROUGH

CONTROLLED ACCESS

© F-Secure Confidential15 Source: http://www.salary.com/2014-wasting-time-at-work/

2013 of all respondents said they waste at least some time at work on a daily basis.

69%The number of people in this year’s

survey who reported wasting time at work every day is up to a whopping 89%

89%OF PEOPLE SURVEYED WASTE AT LEAST

HALF THE AVERAGE WORDDAY ON NON WORK-RELATED TASKS.

4%

A 20% INCREASE COMPARED TO

LAST YEAR

Page 16: Presentatie F-Secure 26062015

WHERE’S THE WASTE?

© F-Secure Confidential16 Source: http://www.salary.com/2014-wasting-time-at-work/

GOOGLE FACEBOOK LINKEDIN24% 15% 14%

31% waste roughly 30 minutes daily 31% waste roughly 1 hour daily 16% waste roughly 2 hours daily

6% waste roughly 3 hours daily2% waste roughly 4 hours daily 2% waste 5 or more hours

89%

Page 17: Presentatie F-Secure 26062015

IMPROVE SECURITY

© F-Secure Confidential17

Guarantee better security as employees cannot access the harmful sites in the first place

90% of normal attacks come through the web

You can block harmful sites.

Page 18: Presentatie F-Secure 26062015

CONNECTION CONTROL

© F-Secure Confidential18

Improve security through controlled and safe access to business critical assets

Allows connections during the session to sites which are verified safe by F-Secure

Protects the weakest link in business criticalsessions – the web browser

Page 19: Presentatie F-Secure 26062015

SUPERIOR SECURITY

© F-Secure Confidential19

Activates automatically in thebrowser when entering a web site

Prevents unknown bankingtrojans from sending sensitiveinformation to online criminals

Closes network connections to unknown sites and prevents newones during session

X

Page 20: Presentatie F-Secure 26062015

20

CONNECTION CONTROL – STOPTHE ATTACKS BEFORE THEY ENTER

The weakest links:The online bank users and their browsers

Banks have secured the connection from browser to the bank and the online banking servers

Phishing Trojans

© F-Secure Confidential

Page 21: Presentatie F-Secure 26062015

Why a secure connection matters?

Financial loss when online bankingcredentials and money from the bankaccount is stolen.

Business secrets stolen if cloud-based CRM credentials are stolen

© F-Secure Confidential21

CONNECTION CONTROL

Page 22: Presentatie F-Secure 26062015

ADVANCEDPROTECTION

© F-Secure Confidential22

Web Traffic Scanning Advanced Protection allows the admin to block certain content from unknown and suspicious sites. E.g. Flash, Silverlight, Executables, Java & ActiveX

components.

Page 23: Presentatie F-Secure 26062015

STOP MOST OF THEWEB ATTACKS

© F-Secure Confidential23

JAVA

28%

FLASH

33%

WINDOWS

10%

SILVERLIGHT

5%

Source: hxxp:// contagiodata.blogspot.fi/2014/12/exploit-kits-2014.html

Block 100% of Java applets and Windows malwarethat come from unknown sources you do not trust.

Technologiestargeted byexploit kitsin 2014-2015

Page 24: Presentatie F-Secure 26062015

© F-Secure Confidential24

Web Traffic Scanning Advanced Protection provides an additional layer of protection

This feature will not be enabled by default

PM admin will also have the possibility to whitelist certain trusted sites E.g. company intranet sites

ADMIN HAS CONTROL

Page 25: Presentatie F-Secure 26062015

IMPROVEDADMIN TOOLS

© F-Secure Confidential25

ALERT HANDLING SCHEDULED REPORTING

Page 26: Presentatie F-Secure 26062015

ALERT HANDLING

© F-Secure Confidential26

• Syslog improvements• Common Event Format messaging support for Security

Information and Event Management (SIEM) integration in alert forwarding

• Email alert improvements• Introducing Policy Manager Server based alerting via email.

Page 27: Presentatie F-Secure 26062015

SCHEDULED REPORTING

© F-Secure Confidential27

• Scheduled reporting via email to multiple recipients linked to certain policy domains. Reporting is based per policy domain.

• Reporting can be scheduled on daily, weekly or monthly basis.

Page 28: Presentatie F-Secure 26062015

OTHER NEW FEATURES

© F-Secure Confidential28

Policy Manager based backup Scheduled backup of PM Database on a weekly and daily basis.

Software Updater improvements Exclusions by one-time click in the software updates tab

Comment field for exclusions

Updated graphical user interface Update on look and feel in the user interface.

Minor improvements on default real-time scanning and email scanning settings.

Active Directory improvements Auto discovery of unmanaged hosts.

Page 29: Presentatie F-Secure 26062015

POLICY MANAGER FEATURES

© F-Secure Confidential29

Page 30: Presentatie F-Secure 26062015

F-Secure Policy Manager is our central management solution. It is a highly scalable and automated tool

that lets you manage all your security applications in one place, define and distribute security policies, and

monitor your company's overall security.

Page 31: Presentatie F-Secure 26062015

SOFTWARE AND APPLICATIONS

Software Updater fully integrated to the solution, no infrastructure needed

Patches automatically OS and third-party non-Microsoft applications

Automatically downloads and installs the patches, with manual setting if needed

Page 32: Presentatie F-Secure 26062015

Better manageability for USB devices

Prevents malware infections via USB

Administrator can be notified if devicehas been blocked

DEVICE CONTROL

Blocks certain hardware devices to protect network and endpoints

Page 33: Presentatie F-Secure 26062015

POLICY MANAGEMENT

Manage security settings centrally

Create and customize individual security profiles based on your needs

Assign profiles individually to any computer or in groups

Support for multiple concurrent admin sessions

Page 34: Presentatie F-Secure 26062015

Gives IT admin possibility to restrict access to web content based onpre-defined categories

28 different categories available

An extra layer of protection against malware, phishing and other online scam sites

WEB CONTENT CONTROL

Page 35: Presentatie F-Secure 26062015

Protects users against harmful activity when accessing online banking and other business critical sites

Supports all the major browsers

Closes network connections to unknown sites while enabled

CONNECTION CONTROL

Page 36: Presentatie F-Secure 26062015

Web Traffic Scanning Advanced Protection allows the administrator to block selected content from unknown or suspicious sites

The admin can whitelist selected sites

Protects the user from typically vulnerable content from websites

ADVANCEDPROTECTION

Page 37: Presentatie F-Secure 26062015

VISIBILITY TO ENVIRONMENT Provides exceptional overview on the

security status of your environment

Creates vulnerability analysis for theIT environment with remediation steps

Creates detailed reports on the security events and levels

Page 38: Presentatie F-Secure 26062015

MANAGEMENT HIERARCHY Capability of importing Microsoft Active

Directory tree structure

Different views for each level, with the ability to give defined access

Easy to control user accounts and which services they have access to

Page 39: Presentatie F-Secure 26062015

SERVER MANAGEMENT Centrally manage your server security

Detailed overview of server security information and status

Manage your third party software vulnerabilities

Page 40: Presentatie F-Secure 26062015

CONTROLLED SECURITY THE

EASY WAY

© F-Secure Confidential40

Test it for free!

Page 41: Presentatie F-Secure 26062015

© F-Secure Confidential41

PRIVACY IS A HOT

TOPIC

Page 42: Presentatie F-Secure 26062015

42

WE ALL HAVE A FUNDAMENTAL NEED TO KEEP SOME THINGS

TO OURSELVES

Page 43: Presentatie F-Secure 26062015

© F-Secure Confidential

THE RECENT

EDWARD SNOWDEN REVELATIONS HAVE RAISED

CONSUMERS’ INTEREST IN PRIVACY SIGNIFICANTLY.

image source: http://grumpyelder.com

Page 44: Presentatie F-Secure 26062015

© F-Secure Confidential44

PRIVACY IS A NEW MARKET AND DIFFERENT FROM

TRADITIONAL SECURITY SECURITY IS ABOUT BEING FREE OF A THREAT OR DANGER. Traditionally Internet Security solutions have focused on securing PCs and smartphonesfrom viruses and other Internet threats. Additional benefits, such as parental control, have been developed to complement the offering.

PRIVACY IS ABOUT BEING FREE FROM BEING OBSERVED OR DISTURBED BY OTHERS.With digital lifestyle consumers are revealing their thoughts and interests online whileopening up an opportunity for others to profile, track and snoop their personal interests.Online privacy solutions focus on giving the consumers the control of their online privacy.

NEW SOLUTIONS ARE NEEDED!

Page 45: Presentatie F-Secure 26062015

ARE CONCERNED ABOUT PRIVACY

WHEN USING PUBLIC WI-FI.

© F-Secure Confidential45

52%of respondents globally

Page 46: Presentatie F-Secure 26062015

AVOID USING PUBLIC WI-FI

BECAUSE THEY WORRY ABOUT

VIRUSES OR MALWARE.

© F-Secure Confidential46

59%of respondents surveyed in

six countries

Page 47: Presentatie F-Secure 26062015

ARE CONCERNED THEIR ONLINE BEHAVIOR IS

TRACKED AND DATA SOLD TO 3RD PARTIES.

© F-Secure Confidential47

57%of respondents surveyed in

Europe

Page 48: Presentatie F-Secure 26062015

WOULD LIKE TO USE

GEOGRAPHICALLY RESTRICTED

ONLINE SERVICES FROM ANYWHERE.

© F-Secure Confidential48

54%of respondents surveyed in

six countries

Page 49: Presentatie F-Secure 26062015

WE ARE SOLVING

REAL CUSTOMER PROBLEMS!

49

Page 50: Presentatie F-Secure 26062015

© F-Secure Confidential50

STRIPTEASE ADS RUINED A BIRTHDAY PARTY

“My 10 year old daughter's birthday party was completelyruined when our family iPad started showing suddenlystriptease ads. I felt awful and humiliated. Parents werecalling our house all evening and I had to explain over andover what had happened. I’m worried my daughter’s friendswill not play with her anymore. Later on I learned thatadvertisers had been tracking my husband who wasorganizing a bachelor’s party – that’s why the ads were beingshown to my daughter and her friends.”

Catherine, 45

“OUR FAMILY IPAD STARTED SHOWING SUDDENLY STRIPTEASE ADS.”

Page 51: Presentatie F-Secure 26062015

© F-Secure Confidential51

“…OUR FAMILY IPAD STARTED

SUDDENLY SHOWING

STRIPTEASE ADS !”

UNTRACKABLEFreedome keeps you anonymous and doesn’t let others tap into your data.

Page 52: Presentatie F-Secure 26062015

© F-Secure Confidential52

BANKING INFORMATION STOLEN AT MY FAVORITE

COFFEE LOCATION

“I like spending my Saturday afternoons at my local coffeeshop. What’s more relaxing than a cup of Cappuccino andbrowsing the Internet with my tablet. Occasionally I also takecare of household items such as paying my bills online. Littledid I know that even a kid can hack into a public Wi-Fi. Exceptthat in my case it wasn’t a kid but a hacker who stole my bankaccount information. Long story short, it took weeks offighting with my bank and at end I still lost money. One thingis for sure, I will never use a public Wi-Fi anymore.”

Mark, 24

“ONE THING IS FOR SURE: I WILL NEVER USE A PUBLIC WI-FI ANYMORE.”

Page 53: Presentatie F-Secure 26062015

© F-Secure Confidential53

“ONE THING IS FOR SURE: I WILL NEVER

USE A PUBLIC WI-FI ANYMORE”

Connect safely from any public Wi-Fi. Freedome encrypts your data so that

no one else can read it

WI-FI SECURITY

Page 54: Presentatie F-Secure 26062015

© F-Secure Confidential54

SHOPPING TAKEN TO A NEW LEVEL

“Let’s face it, I do appreciate being able to browse the websafely but what I really enjoy is bargain hunting. By changingthe virtual location of my tablet I have been able to savehundreds of Euros. How? Well, the same shopping websiteshave different prices for different countries and with a push ofa button, I can change the location of my tablet and hunt forthe best deals in different countries…This is pretty cool!”

Anna, 36

“…HUNT FOR THE BEST DEALS IN DIFFERENT COUNTRIES…THIS IS PRETTY COOL!”

Page 55: Presentatie F-Secure 26062015

© F-Secure Confidential55

“…HUNT FOR THE BEST DEALS IN DIFFERENT

COUNTRIES…THIS IS PRETTY COOL!”

Change your virtual location to other country for better online prices.

SAVE MONEY IN ONLINE SHOPPING

Page 56: Presentatie F-Secure 26062015

© F-Secure Confidential56

FOOTBALL,ANYWHERE?YES, PLEASE!

“Don’t tell my wife but I can’t live without football. I mean Ican’t live without her either but football is still football.While I love our vacations I hate missing out the importantgames. When I try to stream content from my home country Ialways get a message that the stream is not available inforeign countries. What a bummer. Then I discovered thisnew app that allows me to change my virtual location. Thewhole world is now open! I can watch my favorite contentwhen I’m abroad and I can watch foreign content when I’m athome. What’s better than knowing what will happen in TVshows before my friends do.”

Jason, 52

“I CAN WATCH MY FAVORITE CONTENT WHEN I’M ABROAD AND FOREIGN CONTENT WHEN I’M AT HOME. ”

Page 57: Presentatie F-Secure 26062015

© F-Secure Confidential57

“I CAN WATCH MY FAVORITE CONTENT WHEN

I’M ABROAD AND FOREIGN CONTENT

WHEN I’M AT HOME. ”TELEPORT TO ANY

LOCATIONWith Freedome you can change your

virtual location to the other side of the world and use your favorite services when you are traveling.

Page 58: Presentatie F-Secure 26062015

© F-Secure Confidential58

IN A COMPLEX WORLD, SIMPLICITY

MATTERS. ONE BUTTON

FOR ALL.

Page 59: Presentatie F-Secure 26062015

0

500,000

1,000,000

1,500,000

2,000,000

2,500,000

January

February

March

April

May

June

July

August

September

October

November

December

January

February

March

April

Android Apple PC Mac

© F-Secure Confidential59

EXTREMELY FAST GROWTHAND HIGH RATINGS

F-SECURE FREEDOME DOWNLOADS

Page 60: Presentatie F-Secure 26062015

FREEDOMEPRIVATE. UNTRACKED.

ANONYMOUS.

Page 61: Presentatie F-Secure 26062015

Terminology Online Profiling is primarily used by ad networks as a basis for targeted

marketing. It's a method of combining cookies, web site traffic analysis, and personal information to create a profile of a customer's browsing and buying habits. An online profile includes how much time customers spend in certain areas of a Web site and which ads they click on.

Geoblocking is the system used to limit the access to the internet, based on geographic location. There are several databases which map IP addresses to countries. These databases then form the basis of block-lists, more commonly known as geoblocks. Website administrators who manage video-streaming sites such as Netflix use geoblocks to limit their audiences to a certain geographic location.

Page 62: Presentatie F-Secure 26062015

Terminology VPN (Virtual Private Network) is used to protect online activity and

identity. By using an anonymous VPN service, Internet traffic and data remain encrypted, which prevents tracking Internet activity. A VPN service is especially useful when accessing public Wi-Fi hotspots because the public wireless services might not be secure. In addition to public Wi-Fi security, a private VPN service also provides consumers with uncensored Internet access and can help prevent data theft and unblock websites.

© F-Secure Confidential62

Page 63: Presentatie F-Secure 26062015

Terminology Phishing website is a fake web site set up by fraudsters that mimic e.g.

sign-in pages of trusted companies to trick the person into disclosing their user name and password, and thus providing fraudsters an access to an online account. Once given the access, personal information can be used to commit identity theft, charge credit cards, empty bank accounts, read email, and lock the person out of the online account by changing the password.

© F-Secure Confidential63

Page 64: Presentatie F-Secure 26062015

Terminology Online tracking. Most of the websites visited are tracking the visitors

online activity. Online tracking is used as a market research or as a way to target the advertising that they deliver. Different websites can share tracking information. One issue with online tracking involves privacy, as not all users care to have their web browsing activity tracked in this manner.

© F-Secure Confidential64