SlideShare a Scribd company logo
1 of 22

Internet Security Course
Pouria Ghaternabi
F-Secure Corporation:
Software as a Service in the Security Solutions Market
Agenda
 About F-Secure
 Emergence of Security
Software Market
 F-Secure & Public listing
 Introduction of SaaS with
ISP channel
 Key Issues to Address
 Maintaining Current Success
 Future Challenges
 Developing Capabilities
 Conclusion
 Q&A
Click me to see my ugly face
About F-Secure
Evolution of F-Secure
 Started as a consulting and training service provider for desktop
publishing, project management ,database management etc.
 Data Security became the focus of F-secure when Mikko
Hypponen (Leading software security experts) joined the
company in 1991.Cultural revolution started.
 F-Secure created its First Anti-Virus scanner product same year.
 F-Secure also dabbled and divested in file encryption and Virtual
Private Network(VPN) solutions.
Emergence of
Security Software Market
 First widely publicized computer break-in occurred in August
1986 in Lawrence Berkeley Labs in California.
 Next Major event happened in November 1986 when a Cornell
university student injected an experimental self replicating and
propagating worm into a node on the internet.
 F-Secure partnered with Fridrik Skulason to develop a
commercial product and later released a windows version.
 Threats from viruses grew in the early 90s.Viruses began
spreading through out the internet.
Reasons of Public Listing
 Only 0.5% of market share in 1999.
 The industry market had two major players.
 F-Secure had low investment in branding.
 In other to compete;
 F-Secure needed to acquire funds, and
 Increase visibility
Critical Turning Point
 Having recognized that the major players had strong
reputations and where first movers in the industry which
attracted many cooperate customers. F-Secure realized;
 It had limited sales channels
 There was lack of security concerns of casual users
 It needed a new way to compete,
 Thus, the ISP initiative ascended.
The SaaS & ISP Strategy
 Security as Service is a SaaS initiative deployed by F-Secure
to deliver sets of security service functionalities to customers
based on their desired need.
 It allows for ISPs to use sets of a vendor security software to
manage customer security services.
 Facilitates end user service differentiation.
 Reliable security software updates in real-time.
Why ISP
 It was a competitive advantage for F-Secure.
 It was an unexploited market.
 Unattractive to major players.
 It offered a wide customer base access and sales channel.
 Addressed customer known-how issues.
 Valuable added services of ISPs to customer.
 Opportunity to utilize ISP’s existing billing system.
Success of this model
 In 2008, it had over 180 ISP partners scattered over 38
countries.
 In 2008, it realized 13.9 Billion (47%) of its total revenue
through its ISP partners.
 F-Secure became a global market leader.
 F-Secure clinched a huge amount of loyal customers from
the market.
 Offered its product at less expensive prices.
F-Secure: Key Issues to Address
Maintaining Current Success with ISP
Maintaining Current Success
 ISP country's specific products introduction (+1 differentiation)
 Subsidized prices as per country's economic condition
 Continue to be innovative with Research and Development of
new technologies and new solutions
 Innovations in mobile computing and even consumer products
Future Competition & Service
Delivery
 Mergers and acquisitions
 Cloud Service providers
New Battlefields &
Service Areas
 Cloud Computing
 Mobile computing
 Pervasive computing/ internet of things
 Literally, all of the devices can be hacked
 Intentional threats getting organized
Governments are getting into
the game…
Ralph Langner
if you have heard that the dropper of Stuxnet is complex
and high-tech, let me tell you this: the payload is rocket
science. It's way above everything that we have ever seen
before.
Rise of New Threats, and
Future of Security
Mikko Hypponen
F-Secure Chief Research Offices
Developing Capabilities:
ISP value added services
 Securing Data Center by ISPs for DDoS attack for enterprises
can provide unique opportunities for business growth.
 Volumetric DDoS attack
 Application layer based DDoS attack targeting specific services
 ISPs can provide both a network-based service component to
stop volumetric DDoS attacks and a CPE-based service
component to stop application-layer DDoS attacks—
representing a distinct competitive advantage.
Securing Data Centers: A Unique Opportunity for ISPs, White Paper, ARBOR Networks
Developing Capabilities
 Always be the first to detect and provide a remedy to the threat
 Increase visibility of the network for Mobile Networks *
 Critical relationship with Govt. Agencies to understand the future
regulatory requirements
 R&D for how virus will be developed and start to impact in social media.
 Diversity of distribution channels
 The security solution will be distributed through ISPs, mobile phone providers,
cloud service providers, OEMs, & direct sale.
*Top Security Concerns and Threats Facing Today’s Mobile Network Operators, Highlights from Arbor Networks’ 2012
Worldwide Infrastructure Security Report
Security Market Size & Forecast
 Overall, the security software market is about $20 billion
and growing.
 The consumer security software market will grow to around
$6 billion by 2016 ($4.3 billion in 2012).
 The mobile security software market is growing at almost
40% per year over the next four years (Gartner, Jan 2013).
F-Secure :ANNUAL REPORT 2013
Key Takeaways
 Main source of competition is from changing markets
 Security threats are getting new horizons
 Privacy is the renewed concern
 Cloud computing is the next frontier for security solution
delivery
 Strong collaboration with different security solution stake
holders
WELCOME TO THE PARTY
YOU ARE AUTHORIZED TO ASK YOUR QUESTIONS SECURELY…

More Related Content

What's hot

Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesKaspersky
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystemMark Oakton
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKirill Kertsenbaum
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMSkycure
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlAruj Thirawat
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Block Armour
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceGeorge Fares
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksSkycure
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security Cristian Garcia G.
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHKirill Kertsenbaum
 

What's hot (20)

Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystem
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMM
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
 

Viewers also liked

F-Secure Cloud Software icgse2013
F-Secure Cloud Software icgse2013F-Secure Cloud Software icgse2013
F-Secure Cloud Software icgse2013Janne Järvinen
 
Presentatie F-Secure 26062015
Presentatie F-Secure 26062015Presentatie F-Secure 26062015
Presentatie F-Secure 26062015SLBdiensten
 
SAMPLE: Case Study Presentation
SAMPLE: Case Study PresentationSAMPLE: Case Study Presentation
SAMPLE: Case Study PresentationBeth Gallob
 
Survey Research Methodology
Survey Research Methodology Survey Research Methodology
Survey Research Methodology irshad narejo
 

Viewers also liked (9)

TTTech Company Overview
TTTech Company OverviewTTTech Company Overview
TTTech Company Overview
 
F-Secure Cloud Software icgse2013
F-Secure Cloud Software icgse2013F-Secure Cloud Software icgse2013
F-Secure Cloud Software icgse2013
 
Presentatie F-Secure 26062015
Presentatie F-Secure 26062015Presentatie F-Secure 26062015
Presentatie F-Secure 26062015
 
Case Study
Case StudyCase Study
Case Study
 
SAMPLE: Case Study Presentation
SAMPLE: Case Study PresentationSAMPLE: Case Study Presentation
SAMPLE: Case Study Presentation
 
Case study format
Case study formatCase study format
Case study format
 
Survey Research Methodology
Survey Research Methodology Survey Research Methodology
Survey Research Methodology
 
Case Study Template
Case Study TemplateCase Study Template
Case Study Template
 
Case Study Method
Case Study MethodCase Study Method
Case Study Method
 

Similar to Security as as Service: Case Study of F-Secure

Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxArianeSpano
 
Enterprise Firewall Market - Outlook (2017-21) for Europe
Enterprise Firewall Market - Outlook (2017-21) for EuropeEnterprise Firewall Market - Outlook (2017-21) for Europe
Enterprise Firewall Market - Outlook (2017-21) for EuropeResearchFox
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Black Duck by Synopsys
 
Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisAggregage
 
Enterprise Firewall Market - Outlook (2017-21) for APAC
Enterprise Firewall Market - Outlook (2017-21) for APACEnterprise Firewall Market - Outlook (2017-21) for APAC
Enterprise Firewall Market - Outlook (2017-21) for APACResearchFox
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...NetMotion Wireless
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
Advantages of Data Security - Sociale Controle
Advantages of Data Security - Sociale ControleAdvantages of Data Security - Sociale Controle
Advantages of Data Security - Sociale ControleSociale Controle
 
The Cloud Is The Corporation Abeyta
The Cloud Is The Corporation AbeytaThe Cloud Is The Corporation Abeyta
The Cloud Is The Corporation Abeytabern co
 
Enterprise endpoint security_market
Enterprise endpoint security_marketEnterprise endpoint security_market
Enterprise endpoint security_marketpallavi_1234
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
451 -Webroot Impact Report
451 -Webroot Impact Report451 -Webroot Impact Report
451 -Webroot Impact ReportMelvyn White
 
Newsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel SalgueiroNewsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel SalgueiroFidel Angel Salgueiro
 
Enterprise Firewall Market - Outlook (2017-21) for North America
Enterprise Firewall Market - Outlook (2017-21) for North AmericaEnterprise Firewall Market - Outlook (2017-21) for North America
Enterprise Firewall Market - Outlook (2017-21) for North AmericaResearchFox
 

Similar to Security as as Service: Case Study of F-Secure (20)

IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
Enterprise Firewall Market - Outlook (2017-21) for Europe
Enterprise Firewall Market - Outlook (2017-21) for EuropeEnterprise Firewall Market - Outlook (2017-21) for Europe
Enterprise Firewall Market - Outlook (2017-21) for Europe
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
 
Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a Crisis
 
Enterprise Firewall Market - Outlook (2017-21) for APAC
Enterprise Firewall Market - Outlook (2017-21) for APACEnterprise Firewall Market - Outlook (2017-21) for APAC
Enterprise Firewall Market - Outlook (2017-21) for APAC
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Advantages of Data Security - Sociale Controle
Advantages of Data Security - Sociale ControleAdvantages of Data Security - Sociale Controle
Advantages of Data Security - Sociale Controle
 
The Cloud Is The Corporation Abeyta
The Cloud Is The Corporation AbeytaThe Cloud Is The Corporation Abeyta
The Cloud Is The Corporation Abeyta
 
Enterprise endpoint security_market
Enterprise endpoint security_marketEnterprise endpoint security_market
Enterprise endpoint security_market
 
HP cyber risk report 2015
HP cyber risk report 2015HP cyber risk report 2015
HP cyber risk report 2015
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
451 -Webroot Impact Report
451 -Webroot Impact Report451 -Webroot Impact Report
451 -Webroot Impact Report
 
Newsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel SalgueiroNewsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel Salgueiro
 
Presentation gdl
Presentation gdlPresentation gdl
Presentation gdl
 
Security Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – NetmagicSecurity Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – Netmagic
 
Enterprise Firewall Market - Outlook (2017-21) for North America
Enterprise Firewall Market - Outlook (2017-21) for North AmericaEnterprise Firewall Market - Outlook (2017-21) for North America
Enterprise Firewall Market - Outlook (2017-21) for North America
 

More from Pouria Ghatrenabi

05 Service Oriented Architecture Series - Preparing for SOA
05 Service Oriented Architecture Series - Preparing for SOA05 Service Oriented Architecture Series - Preparing for SOA
05 Service Oriented Architecture Series - Preparing for SOAPouria Ghatrenabi
 
04 Service Oriented Architecture Series - SOA Management
04 Service Oriented Architecture Series - SOA Management04 Service Oriented Architecture Series - SOA Management
04 Service Oriented Architecture Series - SOA ManagementPouria Ghatrenabi
 
03 Service Oriented Architecture Series - Basic SOA Architecture
03 Service Oriented Architecture Series - Basic SOA Architecture03 Service Oriented Architecture Series - Basic SOA Architecture
03 Service Oriented Architecture Series - Basic SOA ArchitecturePouria Ghatrenabi
 
02 Service Oriented Architecture Series - SOA Concepts
02 Service Oriented Architecture Series - SOA Concepts02 Service Oriented Architecture Series - SOA Concepts
02 Service Oriented Architecture Series - SOA ConceptsPouria Ghatrenabi
 
01 Service Oriented Architecture Series - SOA Value
01 Service Oriented Architecture Series - SOA Value01 Service Oriented Architecture Series - SOA Value
01 Service Oriented Architecture Series - SOA ValuePouria Ghatrenabi
 
Internet of Things, An Introduction
Internet of Things, An IntroductionInternet of Things, An Introduction
Internet of Things, An IntroductionPouria Ghatrenabi
 
eBay- a case study of organizational change underlying technical infrastructu...
eBay- a case study of organizational change underlying technical infrastructu...eBay- a case study of organizational change underlying technical infrastructu...
eBay- a case study of organizational change underlying technical infrastructu...Pouria Ghatrenabi
 
Application of Electronic Enablers for Supply Chain Management- Case Study ...
Application of Electronic Enablers for Supply Chain Management- Case Study ...Application of Electronic Enablers for Supply Chain Management- Case Study ...
Application of Electronic Enablers for Supply Chain Management- Case Study ...Pouria Ghatrenabi
 

More from Pouria Ghatrenabi (9)

05 Service Oriented Architecture Series - Preparing for SOA
05 Service Oriented Architecture Series - Preparing for SOA05 Service Oriented Architecture Series - Preparing for SOA
05 Service Oriented Architecture Series - Preparing for SOA
 
04 Service Oriented Architecture Series - SOA Management
04 Service Oriented Architecture Series - SOA Management04 Service Oriented Architecture Series - SOA Management
04 Service Oriented Architecture Series - SOA Management
 
03 Service Oriented Architecture Series - Basic SOA Architecture
03 Service Oriented Architecture Series - Basic SOA Architecture03 Service Oriented Architecture Series - Basic SOA Architecture
03 Service Oriented Architecture Series - Basic SOA Architecture
 
02 Service Oriented Architecture Series - SOA Concepts
02 Service Oriented Architecture Series - SOA Concepts02 Service Oriented Architecture Series - SOA Concepts
02 Service Oriented Architecture Series - SOA Concepts
 
01 Service Oriented Architecture Series - SOA Value
01 Service Oriented Architecture Series - SOA Value01 Service Oriented Architecture Series - SOA Value
01 Service Oriented Architecture Series - SOA Value
 
Internet of Things, An Introduction
Internet of Things, An IntroductionInternet of Things, An Introduction
Internet of Things, An Introduction
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 
eBay- a case study of organizational change underlying technical infrastructu...
eBay- a case study of organizational change underlying technical infrastructu...eBay- a case study of organizational change underlying technical infrastructu...
eBay- a case study of organizational change underlying technical infrastructu...
 
Application of Electronic Enablers for Supply Chain Management- Case Study ...
Application of Electronic Enablers for Supply Chain Management- Case Study ...Application of Electronic Enablers for Supply Chain Management- Case Study ...
Application of Electronic Enablers for Supply Chain Management- Case Study ...
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Security as as Service: Case Study of F-Secure

  • 1.  Internet Security Course Pouria Ghaternabi F-Secure Corporation: Software as a Service in the Security Solutions Market
  • 2. Agenda  About F-Secure  Emergence of Security Software Market  F-Secure & Public listing  Introduction of SaaS with ISP channel  Key Issues to Address  Maintaining Current Success  Future Challenges  Developing Capabilities  Conclusion  Q&A Click me to see my ugly face
  • 4. Evolution of F-Secure  Started as a consulting and training service provider for desktop publishing, project management ,database management etc.  Data Security became the focus of F-secure when Mikko Hypponen (Leading software security experts) joined the company in 1991.Cultural revolution started.  F-Secure created its First Anti-Virus scanner product same year.  F-Secure also dabbled and divested in file encryption and Virtual Private Network(VPN) solutions.
  • 5. Emergence of Security Software Market  First widely publicized computer break-in occurred in August 1986 in Lawrence Berkeley Labs in California.  Next Major event happened in November 1986 when a Cornell university student injected an experimental self replicating and propagating worm into a node on the internet.  F-Secure partnered with Fridrik Skulason to develop a commercial product and later released a windows version.  Threats from viruses grew in the early 90s.Viruses began spreading through out the internet.
  • 6. Reasons of Public Listing  Only 0.5% of market share in 1999.  The industry market had two major players.  F-Secure had low investment in branding.  In other to compete;  F-Secure needed to acquire funds, and  Increase visibility
  • 7. Critical Turning Point  Having recognized that the major players had strong reputations and where first movers in the industry which attracted many cooperate customers. F-Secure realized;  It had limited sales channels  There was lack of security concerns of casual users  It needed a new way to compete,  Thus, the ISP initiative ascended.
  • 8. The SaaS & ISP Strategy  Security as Service is a SaaS initiative deployed by F-Secure to deliver sets of security service functionalities to customers based on their desired need.  It allows for ISPs to use sets of a vendor security software to manage customer security services.  Facilitates end user service differentiation.  Reliable security software updates in real-time.
  • 9. Why ISP  It was a competitive advantage for F-Secure.  It was an unexploited market.  Unattractive to major players.  It offered a wide customer base access and sales channel.  Addressed customer known-how issues.  Valuable added services of ISPs to customer.  Opportunity to utilize ISP’s existing billing system.
  • 10. Success of this model  In 2008, it had over 180 ISP partners scattered over 38 countries.  In 2008, it realized 13.9 Billion (47%) of its total revenue through its ISP partners.  F-Secure became a global market leader.  F-Secure clinched a huge amount of loyal customers from the market.  Offered its product at less expensive prices.
  • 11. F-Secure: Key Issues to Address
  • 13. Maintaining Current Success  ISP country's specific products introduction (+1 differentiation)  Subsidized prices as per country's economic condition  Continue to be innovative with Research and Development of new technologies and new solutions  Innovations in mobile computing and even consumer products
  • 14. Future Competition & Service Delivery  Mergers and acquisitions  Cloud Service providers
  • 15. New Battlefields & Service Areas  Cloud Computing  Mobile computing  Pervasive computing/ internet of things  Literally, all of the devices can be hacked  Intentional threats getting organized
  • 16. Governments are getting into the game… Ralph Langner if you have heard that the dropper of Stuxnet is complex and high-tech, let me tell you this: the payload is rocket science. It's way above everything that we have ever seen before.
  • 17. Rise of New Threats, and Future of Security Mikko Hypponen F-Secure Chief Research Offices
  • 18. Developing Capabilities: ISP value added services  Securing Data Center by ISPs for DDoS attack for enterprises can provide unique opportunities for business growth.  Volumetric DDoS attack  Application layer based DDoS attack targeting specific services  ISPs can provide both a network-based service component to stop volumetric DDoS attacks and a CPE-based service component to stop application-layer DDoS attacks— representing a distinct competitive advantage. Securing Data Centers: A Unique Opportunity for ISPs, White Paper, ARBOR Networks
  • 19. Developing Capabilities  Always be the first to detect and provide a remedy to the threat  Increase visibility of the network for Mobile Networks *  Critical relationship with Govt. Agencies to understand the future regulatory requirements  R&D for how virus will be developed and start to impact in social media.  Diversity of distribution channels  The security solution will be distributed through ISPs, mobile phone providers, cloud service providers, OEMs, & direct sale. *Top Security Concerns and Threats Facing Today’s Mobile Network Operators, Highlights from Arbor Networks’ 2012 Worldwide Infrastructure Security Report
  • 20. Security Market Size & Forecast  Overall, the security software market is about $20 billion and growing.  The consumer security software market will grow to around $6 billion by 2016 ($4.3 billion in 2012).  The mobile security software market is growing at almost 40% per year over the next four years (Gartner, Jan 2013). F-Secure :ANNUAL REPORT 2013
  • 21. Key Takeaways  Main source of competition is from changing markets  Security threats are getting new horizons  Privacy is the renewed concern  Cloud computing is the next frontier for security solution delivery  Strong collaboration with different security solution stake holders
  • 22. WELCOME TO THE PARTY YOU ARE AUTHORIZED TO ASK YOUR QUESTIONS SECURELY…

Editor's Notes

  1. The Brand promise is to protect customers irreplaceable digital content and online interactions.
  2. F. Secure had to work hard to convince some companies that viruses were even exixtant.Early sales were uninspiring.
  3. KGB funded German slipped through the system system security holes and was browsing sensitive databases primarily military networks The worm replicated and infected machines at the university, military sites and medical research facilities the world over costing damages ranging $ 200-$53000 per site Viruses began spreading through documents attached to emails.
  4. In 2006, we hit an important milestone from the perspective of computer security. And why do I say that? Because that's when implanted devices inside of people started to have networking capabilities. One thing that brings us close to home is we look at Dick Cheney's device, he had a device that pumped blood from an aorta to another part of the heart, and as you can see at the bottom there, it was controlled by a computer controller, and if you ever thought that software liability was very important, get one of these inside of you. 2:52Now what a research team did was they got their hands on what's called an ICD. This is a defibrillator, and this is a device that goes into a person to control their heart rhythm, and these have saved many lives. Well, in order to not have to open up the person every time you want to reprogram their device or do some diagnostics on it, they made the thing be able to communicate wirelessly, and what this research team did is they reverse engineered the wireless protocol, and they built the device you see pictured here, with a little antenna, that could talk the protocol to the device, and thus control it. In order to make their experience real -- they were unable to find any volunteers, and so they went and they got some ground beef and some bacon and they wrapped it all up to about the size of a human being's area where the device would go, and they stuck the device inside it to perform their experiment somewhat realistically. They launched many, many successful attacks. One that I'll highlight here is changing the patient's name. I don't know why you would want to do that, but I sure wouldn't want that done to me. And they were able to change therapies,including disabling the device -- and this is with a real, commercial, off-the-shelf device -- simply by performing reverse engineering and sending wireless signals to it. 4:06 There was a piece on NPR that some of these ICDs could actually have their performance disrupted simply by holding a pair of headphones onto them. *** So the amount of money online crime generates is significant. And that means that the online criminals can actually afford to invest into their attacks. We know that online criminals are hiring programmers, hiring testing people, testing their code, having back-end systems with SQL databases. And they can afford to watch how we work -- like how security people work -- and try to work their way around any security precautions we can build. They also use the global nature of Internet to their advantage. I mean, the Internet is international. That's why we call it the Internet. 9:14 And if you just go and take a look at what's happening in the online world, here's a video built by Clarified Networks, which illustrates how one single malware family is able to move around the world. This operation, believed to be originally from Estonia, moves around from one country to another as soon as the website is tried to shut down. So you just can't shut these guys down. They will switch from one country to another,from one jurisdiction to another -- moving around the world, using the fact that we don't have the capabilityto globally police operations like this. So the Internet is as if someone would have given free plane tickets to all the online criminals of the world. Now, criminals who weren't capable of reaching us before can reach us. 13:14 So what happens when online criminals are caught? Well in most cases it never gets this far. The vast majority of the online crime cases, we don't even know which continent the attacks are coming from. And even if we are able to find online criminals, quite often there is no outcome. The local police don't act, or if they do, there's not enough evidence, or for some reason we can't take them down. I wish it would be easier; unfortunately it isn't. http://worldmap3.f-secure.com/
  5. 13:39 But things are also changing at a very rapid pace. You've all heard about things like Stuxnet. So if you look at what Stuxnet did is that it infected these. That's a Siemens S7-400 PLC, programmable logic [controller].And this is what runs our infrastructure. This is what runs everything around us. PLC's, these small boxes which have no display, no keyboard, which are programmed, are put in place, and they do their job. For example, the elevators in this building most likely are controlled by one of these. And when Stuxnet infects one of these, that's a massive revolution on the kinds of risks we have to worry about. Because everything around us is being run by these. I mean, we have critical infrastructure. You go to any factory, any power plant, any chemical plant, any food processing plant, you look around -- everything is being run by computers. 14:39 Everything is being run by computers. Everything is reliant on these computers working. We have become very reliant on Internet, on basic things like electricity, obviously, on computers working. And this really is something which creates completely new problems for us. We must have some way of continuing to workeven if computers fail.
  6. CPE generally refers to devices such as telephones, routers, switches, residential gateways (RG), set-top boxes, fixed mobile convergence products, home networking adaptors and internet access gateways that enable consumers to access Communications Service Providers' services and distribute them around their house via a LAN
  7. F-secure should invest in developing infrastructure and human resources to always become first when it comes to detect new threats and providing remedy thereby. It will place F-secure in a distinct competitive position. F-secure should develop capabilities for Mobile Operators and ISPs to increase visibility in their network as number of devices having high computing power will increase day by day. Mobile Operators and ISPs need to track down those intrusion coming from the devices in their network and prevent thereby. Developing strong tie with the law enforcement agencies world wide to understand the priority for internet security that may take shape in regulatory requirements for large market. It will also help F-secure to address localized ISPs needs in advance.