Upload
f-secure-corporation
View
254
Download
2
Tags:
Embed Size (px)
Citation preview
BUSINESS BENEFITS
© F-Secure Confidential2
Advanced management features even for complex environments
Reduced administration due to automation of daily operations
Optimize performance for virtual environments by offloading scanning
EXTRA BENEFITSWITH PREMIUM
© F-Secure Confidential3
Better productivity and security with web content control
Safe connections to trusted sites for superior security and ease of work
Support for automated patch management to secure your business against known threats
Support for virtual environments licensed in the same package with Scanning and Reputation Server
POLICY MANAGER
© F-Secure Confidential5
Manage Business Suite products:
Client Security
E-mail and Server Security
Server Security
Manage other F-Secure security products
Security for Virtual and Cloud Environments
All with one, easy and automated solution
Desktop Laptop
Server Softwareupdate
WEB CONTENT CONTROL
CONNECTION CONTROL
ADVANCED PROTECTION
SCANNING AND REPUTATION SERVER
© F-Secure Confidential7
WEB CONTENT CONTROL
© F-Secure Confidential8
Prevent malicious content from entering your network
Reduce productivity losses, bandwidth consumption, and legal risks caused by unauthorized employee access to inappropriate or distracting web content
Improve security by providing an extra layer of protection
IMPROVED PRODUCTIVITY THROUGH
CONTROLLED ACCESS
© F-Secure Confidential9 Source: http://www.salary.com/2014-wasting-time-at-work/
2013 of all respondents said they waste at least some time at work on a daily basis.
69%The number of people in this year’s
survey who reported wasting time at work every day is up to a whopping 89%
89%OF PEOPLE SURVEYED WASTE AT LEAST
HALF THE AVERAGE WORDDAY ON NON WORK-RELATED TASKS.
4%
A 20% INCREASE COMPARED TO
LAST YEAR
WHERE’S THE WASTE?
© F-Secure Confidential10 Source: http://www.salary.com/2014-wasting-time-at-work/
GOOGLE FACEBOOK LINKEDIN24% 15% 14%
31% waste roughly 30 minutes daily 31% waste roughly 1 hour daily 16% waste roughly 2 hours daily
6% waste roughly 3 hours daily2% waste roughly 4 hours daily 2% waste 5 or more hours
89%
IMPROVE SECURITY
© F-Secure Confidential11
Guarantee better security as employees cannot access the harmful sites in the first place
90% of normal attacks come through the web
You can block harmful sites.
CONNECTION CONTROL
© F-Secure Confidential12
Improve security through controlled and safe access to business critical assets
Allows connections during the session to sites which are verified safe by F-Secure
Protects the weakest link in business criticalsessions – the web browser
SUPERIOR SECURITY
© F-Secure Confidential13
Activates automatically in thebrowser when entering a web site
Prevents unknown bankingtrojans from sending sensitiveinformation to online criminals
Closes network connections to unknown sites and prevents newones during session
X
14
CONNECTION CONTROL – STOPTHE ATTACKS BEFORE THEY ENTER
The weakest links:The online bank users and their browsers
Banks have secured the connection from browser to the bank and the online banking servers
Phishing Trojans
© F-Secure Confidential
Why a secure connection matters?
Financial loss when online bankingcredentials and money from the bankaccount is stolen.
Business secrets stolen if cloud-based CRM credentials are stolen
© F-Secure Confidential15
CONNECTION CONTROL
ADVANCEDPROTECTION
© F-Secure Confidential16
Web Traffic Scanning Advanced Protection allows the admin to block certain content from unknown and suspicious sites. E.g. Flash, Silverlight, Executables, Java & ActiveX
components.
STOP MOST OF THEWEB ATTACKS
© F-Secure Confidential17
JAVA
28%
FLASH
33%
WINDOWS
10%
SILVERLIGHT
5%
Source: hxxp:// contagiodata.blogspot.fi/2014/12/exploit-kits-2014.html
Block 100% of Java applets and Windows malwarethat come from unknown sources you do not trust.
Technologiestargeted byexploit kitsin 2014-2015
F-Secure Policy Manager is our central management solution. It is a highly scalable and automated tool
that lets you manage all your security applications in one place, define and distribute security policies, and
monitor your company's overall security.
SOFTWARE AND APPLICATIONS
Software Updater fully integrated to the solution, no infrastructure needed
Patches automatically OS and third-party non-Microsoft applications
Automatically downloads and installs the patches, with manual setting if needed
Better manageability for USB devices
Prevents malware infections via USB
Administrator can be notified if devicehas been blocked
DEVICE CONTROL
Blocks certain hardware devices to protect network and endpoints
POLICY MANAGEMENT
Manage security settings centrally
Create and customize individual security profiles based on your needs
Assign profiles individually to any computer or in groups
Support for multiple concurrent admin sessions
Gives IT admin possibility to restrict access to web content based onpre-defined categories
28 different categories available
An extra layer of protection against malware, phishing and other online scam sites
WEB CONTENT CONTROL
Protects users against harmful activity when accessing online banking and other business critical sites
Supports all the major browsers
Closes network connections to unknown sites while enabled
CONNECTION CONTROL
Web Traffic Scanning Advanced Protection allows the administrator to block selected content from unknown or suspicious sites
The admin can whitelist selected sites
Protects the user from typically vulnerable content from websites
ADVANCEDPROTECTION
VISIBILITY TO ENVIRONMENT Provides exceptional overview on the
security status of your environment
Creates vulnerability analysis for theIT environment with remediation steps
Creates detailed reports on the security events and levels
MANAGEMENT HIERARCHY Capability of importing Microsoft Active
Directory tree structure
Different views for each level, with the ability to give defined access
Easy to control user accounts and which services they have access to
SERVER MANAGEMENT Centrally manage your server security
Detailed overview of server security information and status
Manage your third party software vulnerabilities
“It’s all about being on top of things 24/7 – effortlessly”
James, IT-administrator
© F-Secure Confidential29