30
ONSITE SECURITY MANAGEMENT WITH SUPERIOR CONTROL F-Secure Policy Manager

F-Secure Policy Manager - onsite security management with superior control

Embed Size (px)

Citation preview

ONSITE SECURITY MANAGEMENT WITH SUPERIOR CONTROL

F-Secure Policy Manager

BUSINESS BENEFITS

© F-Secure Confidential2

Advanced management features even for complex environments

Reduced administration due to automation of daily operations

Optimize performance for virtual environments by offloading scanning

EXTRA BENEFITSWITH PREMIUM

© F-Secure Confidential3

Better productivity and security with web content control

Safe connections to trusted sites for superior security and ease of work

Support for automated patch management to secure your business against known threats

Support for virtual environments licensed in the same package with Scanning and Reputation Server

EASY MANAGEMENT

© F-Secure Confidential4

Deploy Manage Take action

POLICY MANAGER

© F-Secure Confidential5

Manage Business Suite products:

Client Security

E-mail and Server Security

Server Security

Manage other F-Secure security products

Security for Virtual and Cloud Environments

All with one, easy and automated solution

Desktop Laptop

Server Softwareupdate

WHAT’S NEW?

© F-Secure Confidential6

WEB CONTENT CONTROL

CONNECTION CONTROL

ADVANCED PROTECTION

SCANNING AND REPUTATION SERVER

© F-Secure Confidential7

WEB CONTENT CONTROL

© F-Secure Confidential8

Prevent malicious content from entering your network

Reduce productivity losses, bandwidth consumption, and legal risks caused by unauthorized employee access to inappropriate or distracting web content

Improve security by providing an extra layer of protection

IMPROVED PRODUCTIVITY THROUGH

CONTROLLED ACCESS

© F-Secure Confidential9 Source: http://www.salary.com/2014-wasting-time-at-work/

2013 of all respondents said they waste at least some time at work on a daily basis.

69%The number of people in this year’s

survey who reported wasting time at work every day is up to a whopping 89%

89%OF PEOPLE SURVEYED WASTE AT LEAST

HALF THE AVERAGE WORDDAY ON NON WORK-RELATED TASKS.

4%

A 20% INCREASE COMPARED TO

LAST YEAR

WHERE’S THE WASTE?

© F-Secure Confidential10 Source: http://www.salary.com/2014-wasting-time-at-work/

GOOGLE FACEBOOK LINKEDIN24% 15% 14%

31% waste roughly 30 minutes daily 31% waste roughly 1 hour daily 16% waste roughly 2 hours daily

6% waste roughly 3 hours daily2% waste roughly 4 hours daily 2% waste 5 or more hours

89%

IMPROVE SECURITY

© F-Secure Confidential11

Guarantee better security as employees cannot access the harmful sites in the first place

90% of normal attacks come through the web

You can block harmful sites.

CONNECTION CONTROL

© F-Secure Confidential12

Improve security through controlled and safe access to business critical assets

Allows connections during the session to sites which are verified safe by F-Secure

Protects the weakest link in business criticalsessions – the web browser

SUPERIOR SECURITY

© F-Secure Confidential13

Activates automatically in thebrowser when entering a web site

Prevents unknown bankingtrojans from sending sensitiveinformation to online criminals

Closes network connections to unknown sites and prevents newones during session

X

14

CONNECTION CONTROL – STOPTHE ATTACKS BEFORE THEY ENTER

The weakest links:The online bank users and their browsers

Banks have secured the connection from browser to the bank and the online banking servers

Phishing Trojans

© F-Secure Confidential

Why a secure connection matters?

Financial loss when online bankingcredentials and money from the bankaccount is stolen.

Business secrets stolen if cloud-based CRM credentials are stolen

© F-Secure Confidential15

CONNECTION CONTROL

ADVANCEDPROTECTION

© F-Secure Confidential16

Web Traffic Scanning Advanced Protection allows the admin to block certain content from unknown and suspicious sites. E.g. Flash, Silverlight, Executables, Java & ActiveX

components.

STOP MOST OF THEWEB ATTACKS

© F-Secure Confidential17

JAVA

28%

FLASH

33%

WINDOWS

10%

SILVERLIGHT

5%

Source: hxxp:// contagiodata.blogspot.fi/2014/12/exploit-kits-2014.html

Block 100% of Java applets and Windows malwarethat come from unknown sources you do not trust.

Technologiestargeted byexploit kitsin 2014-2015

POLICY MANAGER FEATURES

© F-Secure Confidential18

F-Secure Policy Manager is our central management solution. It is a highly scalable and automated tool

that lets you manage all your security applications in one place, define and distribute security policies, and

monitor your company's overall security.

SOFTWARE AND APPLICATIONS

Software Updater fully integrated to the solution, no infrastructure needed

Patches automatically OS and third-party non-Microsoft applications

Automatically downloads and installs the patches, with manual setting if needed

Better manageability for USB devices

Prevents malware infections via USB

Administrator can be notified if devicehas been blocked

DEVICE CONTROL

Blocks certain hardware devices to protect network and endpoints

POLICY MANAGEMENT

Manage security settings centrally

Create and customize individual security profiles based on your needs

Assign profiles individually to any computer or in groups

Support for multiple concurrent admin sessions

Gives IT admin possibility to restrict access to web content based onpre-defined categories

28 different categories available

An extra layer of protection against malware, phishing and other online scam sites

WEB CONTENT CONTROL

Protects users against harmful activity when accessing online banking and other business critical sites

Supports all the major browsers

Closes network connections to unknown sites while enabled

CONNECTION CONTROL

Web Traffic Scanning Advanced Protection allows the administrator to block selected content from unknown or suspicious sites

The admin can whitelist selected sites

Protects the user from typically vulnerable content from websites

ADVANCEDPROTECTION

VISIBILITY TO ENVIRONMENT Provides exceptional overview on the

security status of your environment

Creates vulnerability analysis for theIT environment with remediation steps

Creates detailed reports on the security events and levels

MANAGEMENT HIERARCHY Capability of importing Microsoft Active

Directory tree structure

Different views for each level, with the ability to give defined access

Easy to control user accounts and which services they have access to

SERVER MANAGEMENT Centrally manage your server security

Detailed overview of server security information and status

Manage your third party software vulnerabilities

“It’s all about being on top of things 24/7 – effortlessly”

James, IT-administrator

© F-Secure Confidential29

CONTROLLED SECURITY THE

EASY WAY

© F-Secure Confidential30

Test it for free!