Upload
slbdiensten
View
63
Download
2
Tags:
Embed Size (px)
Citation preview
WE AREF-SECURE
.
OVER 25 YEARSOF DIGITAL SECURITY
EXPERIENCE
WE ARE #1 IN SECURITY
153.8 Revenues MEUR
Operating Profit MEUR
Personnel
18.8R&D Investments of Revenues25 %
939
Pioneeringtechnology
year after year
BLACKLIGHT
DEEPGUARD
ORSP
LISTED ON NASDAQ OMX
Consistently ranked among the best by AV-Test, AV comparatives and numerous 3rd parties
WE WORK WITH 200+ OPERATORS AND 6,000+ SERVICE
PARTNERS
Serving tens of millions of people in 40+ countries.
WHAT MAKESF-SECURE UNIQUE?
TRUSTED VENDOR FROM A TRUSTED COUNTRYSUPERB USABILITY
LEADER IN CLOUD-BASED SECURITYBIG ENOUGH TO BE CREDIBLE – SMALL ENOUGH TO BE NIMBLE
AV-Test “Best Protection” award forF-Secure for the 4th year in a row
ONSITE SECURITY MANAGEMENT WITH SUPERIOR CONTROL
F-Secure Policy Manager
BUSINESS BENEFITS
© F-Secure Confidential8
Advanced management features even for complex environments
Reduced administration due to automation of daily operations
Optimize performance for virtual environments by offloading scanning
EXTRA BENEFITSWITH PREMIUM
© F-Secure Confidential9
Better productivity and security with web content control
Safe connections to trusted sites for superior security and ease of work
Support for automated patch management to secure your business against known threats
Support for virtual environments licensed in the same package with Scanning and Reputation Server
EASY MANAGEMENT
© F-Secure Confidential10
Deploy Manage Take action
POLICY MANAGER
© F-Secure Confidential11
Manage Business Suite products:
Client Security
E-mail and Server Security
Server Security
Manage other F-Secure security products
Security for Virtual and Cloud Environments
All with one, easy and automated solution
Desktop Laptop
Server Softwareupdate
WHAT’S NEW?
© F-Secure Confidential12
WEB CONTENT CONTROL
CONNECTION CONTROL
ADVANCED PROTECTION
SCANNING AND REPUTATION SERVER
© F-Secure Confidential13
WEB CONTENT CONTROL
© F-Secure Confidential14
Prevent malicious content from entering your network
Reduce productivity losses, bandwidth consumption, and legal risks caused by unauthorized employee access to inappropriate or distracting web content
Improve security by providing an extra layer of protection
IMPROVED PRODUCTIVITY THROUGH
CONTROLLED ACCESS
© F-Secure Confidential15 Source: http://www.salary.com/2014-wasting-time-at-work/
2013 of all respondents said they waste at least some time at work on a daily basis.
69%The number of people in this year’s
survey who reported wasting time at work every day is up to a whopping 89%
89%OF PEOPLE SURVEYED WASTE AT LEAST
HALF THE AVERAGE WORDDAY ON NON WORK-RELATED TASKS.
4%
A 20% INCREASE COMPARED TO
LAST YEAR
WHERE’S THE WASTE?
© F-Secure Confidential16 Source: http://www.salary.com/2014-wasting-time-at-work/
GOOGLE FACEBOOK LINKEDIN24% 15% 14%
31% waste roughly 30 minutes daily 31% waste roughly 1 hour daily 16% waste roughly 2 hours daily
6% waste roughly 3 hours daily2% waste roughly 4 hours daily 2% waste 5 or more hours
89%
IMPROVE SECURITY
© F-Secure Confidential17
Guarantee better security as employees cannot access the harmful sites in the first place
90% of normal attacks come through the web
You can block harmful sites.
CONNECTION CONTROL
© F-Secure Confidential18
Improve security through controlled and safe access to business critical assets
Allows connections during the session to sites which are verified safe by F-Secure
Protects the weakest link in business criticalsessions – the web browser
SUPERIOR SECURITY
© F-Secure Confidential19
Activates automatically in thebrowser when entering a web site
Prevents unknown bankingtrojans from sending sensitiveinformation to online criminals
Closes network connections to unknown sites and prevents newones during session
X
20
CONNECTION CONTROL – STOPTHE ATTACKS BEFORE THEY ENTER
The weakest links:The online bank users and their browsers
Banks have secured the connection from browser to the bank and the online banking servers
Phishing Trojans
© F-Secure Confidential
Why a secure connection matters?
Financial loss when online bankingcredentials and money from the bankaccount is stolen.
Business secrets stolen if cloud-based CRM credentials are stolen
© F-Secure Confidential21
CONNECTION CONTROL
ADVANCEDPROTECTION
© F-Secure Confidential22
Web Traffic Scanning Advanced Protection allows the admin to block certain content from unknown and suspicious sites. E.g. Flash, Silverlight, Executables, Java & ActiveX
components.
STOP MOST OF THEWEB ATTACKS
© F-Secure Confidential23
JAVA
28%
FLASH
33%
WINDOWS
10%
SILVERLIGHT
5%
Source: hxxp:// contagiodata.blogspot.fi/2014/12/exploit-kits-2014.html
Block 100% of Java applets and Windows malwarethat come from unknown sources you do not trust.
Technologiestargeted byexploit kitsin 2014-2015
© F-Secure Confidential24
Web Traffic Scanning Advanced Protection provides an additional layer of protection
This feature will not be enabled by default
PM admin will also have the possibility to whitelist certain trusted sites E.g. company intranet sites
ADMIN HAS CONTROL
IMPROVEDADMIN TOOLS
© F-Secure Confidential25
ALERT HANDLING SCHEDULED REPORTING
ALERT HANDLING
© F-Secure Confidential26
• Syslog improvements• Common Event Format messaging support for Security
Information and Event Management (SIEM) integration in alert forwarding
• Email alert improvements• Introducing Policy Manager Server based alerting via email.
SCHEDULED REPORTING
© F-Secure Confidential27
• Scheduled reporting via email to multiple recipients linked to certain policy domains. Reporting is based per policy domain.
• Reporting can be scheduled on daily, weekly or monthly basis.
OTHER NEW FEATURES
© F-Secure Confidential28
Policy Manager based backup Scheduled backup of PM Database on a weekly and daily basis.
Software Updater improvements Exclusions by one-time click in the software updates tab
Comment field for exclusions
Updated graphical user interface Update on look and feel in the user interface.
Minor improvements on default real-time scanning and email scanning settings.
Active Directory improvements Auto discovery of unmanaged hosts.
POLICY MANAGER FEATURES
© F-Secure Confidential29
F-Secure Policy Manager is our central management solution. It is a highly scalable and automated tool
that lets you manage all your security applications in one place, define and distribute security policies, and
monitor your company's overall security.
SOFTWARE AND APPLICATIONS
Software Updater fully integrated to the solution, no infrastructure needed
Patches automatically OS and third-party non-Microsoft applications
Automatically downloads and installs the patches, with manual setting if needed
Better manageability for USB devices
Prevents malware infections via USB
Administrator can be notified if devicehas been blocked
DEVICE CONTROL
Blocks certain hardware devices to protect network and endpoints
POLICY MANAGEMENT
Manage security settings centrally
Create and customize individual security profiles based on your needs
Assign profiles individually to any computer or in groups
Support for multiple concurrent admin sessions
Gives IT admin possibility to restrict access to web content based onpre-defined categories
28 different categories available
An extra layer of protection against malware, phishing and other online scam sites
WEB CONTENT CONTROL
Protects users against harmful activity when accessing online banking and other business critical sites
Supports all the major browsers
Closes network connections to unknown sites while enabled
CONNECTION CONTROL
Web Traffic Scanning Advanced Protection allows the administrator to block selected content from unknown or suspicious sites
The admin can whitelist selected sites
Protects the user from typically vulnerable content from websites
ADVANCEDPROTECTION
VISIBILITY TO ENVIRONMENT Provides exceptional overview on the
security status of your environment
Creates vulnerability analysis for theIT environment with remediation steps
Creates detailed reports on the security events and levels
MANAGEMENT HIERARCHY Capability of importing Microsoft Active
Directory tree structure
Different views for each level, with the ability to give defined access
Easy to control user accounts and which services they have access to
SERVER MANAGEMENT Centrally manage your server security
Detailed overview of server security information and status
Manage your third party software vulnerabilities
CONTROLLED SECURITY THE
EASY WAY
© F-Secure Confidential40
Test it for free!
© F-Secure Confidential41
PRIVACY IS A HOT
TOPIC
42
WE ALL HAVE A FUNDAMENTAL NEED TO KEEP SOME THINGS
TO OURSELVES
© F-Secure Confidential
THE RECENT
EDWARD SNOWDEN REVELATIONS HAVE RAISED
CONSUMERS’ INTEREST IN PRIVACY SIGNIFICANTLY.
image source: http://grumpyelder.com
© F-Secure Confidential44
PRIVACY IS A NEW MARKET AND DIFFERENT FROM
TRADITIONAL SECURITY SECURITY IS ABOUT BEING FREE OF A THREAT OR DANGER. Traditionally Internet Security solutions have focused on securing PCs and smartphonesfrom viruses and other Internet threats. Additional benefits, such as parental control, have been developed to complement the offering.
PRIVACY IS ABOUT BEING FREE FROM BEING OBSERVED OR DISTURBED BY OTHERS.With digital lifestyle consumers are revealing their thoughts and interests online whileopening up an opportunity for others to profile, track and snoop their personal interests.Online privacy solutions focus on giving the consumers the control of their online privacy.
NEW SOLUTIONS ARE NEEDED!
ARE CONCERNED ABOUT PRIVACY
WHEN USING PUBLIC WI-FI.
© F-Secure Confidential45
52%of respondents globally
AVOID USING PUBLIC WI-FI
BECAUSE THEY WORRY ABOUT
VIRUSES OR MALWARE.
© F-Secure Confidential46
59%of respondents surveyed in
six countries
ARE CONCERNED THEIR ONLINE BEHAVIOR IS
TRACKED AND DATA SOLD TO 3RD PARTIES.
© F-Secure Confidential47
57%of respondents surveyed in
Europe
WOULD LIKE TO USE
GEOGRAPHICALLY RESTRICTED
ONLINE SERVICES FROM ANYWHERE.
© F-Secure Confidential48
54%of respondents surveyed in
six countries
WE ARE SOLVING
REAL CUSTOMER PROBLEMS!
49
© F-Secure Confidential50
STRIPTEASE ADS RUINED A BIRTHDAY PARTY
“My 10 year old daughter's birthday party was completelyruined when our family iPad started showing suddenlystriptease ads. I felt awful and humiliated. Parents werecalling our house all evening and I had to explain over andover what had happened. I’m worried my daughter’s friendswill not play with her anymore. Later on I learned thatadvertisers had been tracking my husband who wasorganizing a bachelor’s party – that’s why the ads were beingshown to my daughter and her friends.”
Catherine, 45
“OUR FAMILY IPAD STARTED SHOWING SUDDENLY STRIPTEASE ADS.”
© F-Secure Confidential51
“…OUR FAMILY IPAD STARTED
SUDDENLY SHOWING
STRIPTEASE ADS !”
UNTRACKABLEFreedome keeps you anonymous and doesn’t let others tap into your data.
© F-Secure Confidential52
BANKING INFORMATION STOLEN AT MY FAVORITE
COFFEE LOCATION
“I like spending my Saturday afternoons at my local coffeeshop. What’s more relaxing than a cup of Cappuccino andbrowsing the Internet with my tablet. Occasionally I also takecare of household items such as paying my bills online. Littledid I know that even a kid can hack into a public Wi-Fi. Exceptthat in my case it wasn’t a kid but a hacker who stole my bankaccount information. Long story short, it took weeks offighting with my bank and at end I still lost money. One thingis for sure, I will never use a public Wi-Fi anymore.”
Mark, 24
“ONE THING IS FOR SURE: I WILL NEVER USE A PUBLIC WI-FI ANYMORE.”
© F-Secure Confidential53
“ONE THING IS FOR SURE: I WILL NEVER
USE A PUBLIC WI-FI ANYMORE”
Connect safely from any public Wi-Fi. Freedome encrypts your data so that
no one else can read it
WI-FI SECURITY
© F-Secure Confidential54
SHOPPING TAKEN TO A NEW LEVEL
“Let’s face it, I do appreciate being able to browse the websafely but what I really enjoy is bargain hunting. By changingthe virtual location of my tablet I have been able to savehundreds of Euros. How? Well, the same shopping websiteshave different prices for different countries and with a push ofa button, I can change the location of my tablet and hunt forthe best deals in different countries…This is pretty cool!”
Anna, 36
“…HUNT FOR THE BEST DEALS IN DIFFERENT COUNTRIES…THIS IS PRETTY COOL!”
© F-Secure Confidential55
“…HUNT FOR THE BEST DEALS IN DIFFERENT
COUNTRIES…THIS IS PRETTY COOL!”
Change your virtual location to other country for better online prices.
SAVE MONEY IN ONLINE SHOPPING
© F-Secure Confidential56
FOOTBALL,ANYWHERE?YES, PLEASE!
“Don’t tell my wife but I can’t live without football. I mean Ican’t live without her either but football is still football.While I love our vacations I hate missing out the importantgames. When I try to stream content from my home country Ialways get a message that the stream is not available inforeign countries. What a bummer. Then I discovered thisnew app that allows me to change my virtual location. Thewhole world is now open! I can watch my favorite contentwhen I’m abroad and I can watch foreign content when I’m athome. What’s better than knowing what will happen in TVshows before my friends do.”
Jason, 52
“I CAN WATCH MY FAVORITE CONTENT WHEN I’M ABROAD AND FOREIGN CONTENT WHEN I’M AT HOME. ”
© F-Secure Confidential57
“I CAN WATCH MY FAVORITE CONTENT WHEN
I’M ABROAD AND FOREIGN CONTENT
WHEN I’M AT HOME. ”TELEPORT TO ANY
LOCATIONWith Freedome you can change your
virtual location to the other side of the world and use your favorite services when you are traveling.
© F-Secure Confidential58
IN A COMPLEX WORLD, SIMPLICITY
MATTERS. ONE BUTTON
FOR ALL.
0
500,000
1,000,000
1,500,000
2,000,000
2,500,000
January
February
March
April
May
June
July
August
September
October
November
December
January
February
March
April
Android Apple PC Mac
© F-Secure Confidential59
EXTREMELY FAST GROWTHAND HIGH RATINGS
F-SECURE FREEDOME DOWNLOADS
FREEDOMEPRIVATE. UNTRACKED.
ANONYMOUS.
Terminology Online Profiling is primarily used by ad networks as a basis for targeted
marketing. It's a method of combining cookies, web site traffic analysis, and personal information to create a profile of a customer's browsing and buying habits. An online profile includes how much time customers spend in certain areas of a Web site and which ads they click on.
Geoblocking is the system used to limit the access to the internet, based on geographic location. There are several databases which map IP addresses to countries. These databases then form the basis of block-lists, more commonly known as geoblocks. Website administrators who manage video-streaming sites such as Netflix use geoblocks to limit their audiences to a certain geographic location.
Terminology VPN (Virtual Private Network) is used to protect online activity and
identity. By using an anonymous VPN service, Internet traffic and data remain encrypted, which prevents tracking Internet activity. A VPN service is especially useful when accessing public Wi-Fi hotspots because the public wireless services might not be secure. In addition to public Wi-Fi security, a private VPN service also provides consumers with uncensored Internet access and can help prevent data theft and unblock websites.
© F-Secure Confidential62
Terminology Phishing website is a fake web site set up by fraudsters that mimic e.g.
sign-in pages of trusted companies to trick the person into disclosing their user name and password, and thus providing fraudsters an access to an online account. Once given the access, personal information can be used to commit identity theft, charge credit cards, empty bank accounts, read email, and lock the person out of the online account by changing the password.
© F-Secure Confidential63
Terminology Online tracking. Most of the websites visited are tracking the visitors
online activity. Online tracking is used as a market research or as a way to target the advertising that they deliver. Different websites can share tracking information. One issue with online tracking involves privacy, as not all users care to have their web browsing activity tracked in this manner.
© F-Secure Confidential64