Advertisement
Advertisement

More Related Content

Advertisement
Advertisement

Protection Service for Business

  1. SECURE YOUR BUSINESS. WHEREVER IT TAKES YOU. PROTECTION SERVICE FOR BUSINESS
  2. WEARE F-SECURE
  3. F-SECURE INSHORT Leading research & development since 1988. Creator of inventions that are today’s industry standards From Finland, Europe, publicly listed on NASDAQ OMX Helsinki Ltd. since 1999 Trusted by millions of customers worldwide, served by 200+ operators and 3500+ local reseller partners Protecting businesses in 100+ countries out of 25 offices
  4. EVOLVING SECURITY TIME TO STEP UP SECURITY
  5. EVOLVING SECURITY THREATS Cyberattacks continue to escalate in frequency, severity and sophistication, making it harder to defend against them. Businesses have more complex environments, and don’t have the resources or know-how to combat highly skilled and aggressive cyber criminals. LIMITED RESOURCES ANDSKILL
  6. 19% increase in the average total cost of a security incident in 2014-15. 38% increase in detected information security incidents in 2015 60% of the cases, attackers are able to compromise an organization within minutes. 99,9% of the exploited vulnerabilities were compromised more than a year after the CVE was published.
  7. ITISHARD TOSTAYON TOPOF EVERYTHING MORE COMPLEXITY LIMITED KNOW-HOW LIMITED RESOURCES LIMITED TIME OTHER PRIORITIES
  8. WEMERGE MEN& MACHINES
  9. SECURITY ANALYSTS ENDPOINT SENSORS Security consultants feed real world threat intelligence into the F-Secure research team, harden customer security and provide incident response and forensics to customers. Our security cloud uses artificial intelligence and automation to detect, categorize and block attacks as they emerge. The information is pushed back to products to provide accurate detection. F-Secure research team studies potential attack patterns and help consultants to resolve incidents and forensics cases. Our perimeter defence and endpoint security products block and detect known and unknown attacks. The prevention and detection is based on local device analysis as well as intelligence provided by the security cloud. SECURITY CLOUD
  10. 450 000Malware samples analyzed per day SCOPEOF SECURITY 6 BILLIONReputation queries per day 35 000Android malware samples analyzed per day
  11. WINNING ONCE COULD BE LUCK. WINNING FOUR YEARS IN A ROW PROVES CATEGORY DOMINANCE AV-Test: ‘Best Protection’ 2011-14 AV-Comparatives: ‘Top Rated’ 2010-14 2011 2012 2013 2014
  12. OUR OFFERING F-SECURE OFFERING FOR BUSINESSES
  13. PREDICT PREVENT DETECTRESPOND ENDPOINT SECURITY PROTECTION SERVICE FOR BUSINESS  Multi-Endpoint Security  Mobile Device Management  Patch Management  Unified Solution  As a service VULNERABILITY MANAGEMENT  Vulnerability scanning  Vulnerability management ATTACK SURFACE ASSESSMENT  Threat level assessment  Attack surface mapping CONSULTANCY SERVICES  Consulting & coaching  For all areas of the security strategy ADVANCED THREAT PROTECTION  Security monitoring & alerting  Incident response OUR OFFERING
  14. PROTECTION SERVICE FOR BUSINESS Secure your Business. Wherever it takes you.
  15. WINDOWS | MAC | ANDROID | IOS | SERVERS
  16. Powerful,modern,anddesignedto solvechallengingsecurityneeds aseasilyaspossible, ProtectionServiceForBusiness isoneoftheworld’sleadingmulti-endpoint securitysolutions.
  17. The only unified multi-endpoint security solution on the market with integrated Patch Management and MDM. BESTENDPOINT SECURITYPACKAGE ONTHEMARKET Proven to provide superior and more consistent protection* than our competitors – thanks to our pioneering technologies. BESTPROTECTION WITH PIONEERING TECHNOLOGIES Merging all endpoint security needs and tools into one centrally managed solution allows you to use your budget & working hours more effectively. DESIGNEDTO SIMPLIFYSECURITY MANAGEMENT AV-Test: ‘Best Protection’ 2011-14 AV-Comparatives: ‘Top Rated’ 2010-14
  18. Provides consitent and industry leading detection* rates – 4 years in a row Covers all endpoints: Windows, Mac, iOS, Android, and variety of server OS Everything can be managed centrally from a single cloud-based portal Includes integrated Patch Managment and MDM capabilities Uses pioneering technologies like real-time threat intelligence AV-Test: ‘Best Protection’ 2011-14 AV-Comparatives: ‘Top Rated’ 2010-14
  19. Awarded security for the latest Windows and Mac endpoints, with Patch Management. COMPUTERS Security and control for iOS & Android devices, with MDM, VPN and Anti-Malware. MOBILES Powerful and modern security for your Windows, Linux and Citrix servers SERVERS Designed to accelerate security management and to give better visibility and control over all your end-points. MANAGEMENT PORTAL
  20. MANAGEMENT Managing all your security needs from one portal saves you time and effort Graphical dashboards enable monitoring of the security levels and incidents Designed for faster management and better visibility & control over all your end-points. No need to deploy or maintain server hardware - it’s a hosted service Less maintenance: automated 3rd party patches, and client + security updates
  21. COMPUTERS Minimal performance impact, making it perfect for even older hardware Integrated Patch Management keeps OS and 3rd party software up-to-date Awarded security for latest Windows and Mac endpoints, with Patch Management. Provides you industry leading detection* capabilities, 4 years in a row Leverages heuristic analysis and real-time threat intelligence among others AV-Test: ‘Best Protection’ 2011-14 AV-Comparatives: ‘Top Rated’ 2010-14
  22. MOBILES Integrated MDM capabilities allow fleet management & monitoring ‘Ultralight’ technology ensures minimal battery & performance impact Security and control for iOS & Android devices, with MDM, VPN and Anti-malware Includes mobile VPN capabilities in addition to advanced anti-malware Increases mobile browsing speed up to 30%, reducing data usage
  23. SERVERS Minimal performance impact, allowing servers to run at peak performance Integrated Patch Management keeps server & published applications up-to-date Powerful and modern security for your Windows, Linux and Citrix servers Utilizes pioneering technologies like heuristic analysis and real-time threat intelligence Specialized components for dedicated Exchange & SharePoint servers
  24. SWITCH ON FREEDOM
Advertisement