SlideShare a Scribd company logo
1 of 15
Download to read offline
F-Secure
 Our company presentation




Protecting the irreplaceable | f-secure.com
About F-Secure
    Founded in 1988 with over 940 employees.
    Listed on the NASDAQ OMX Helsinki Ltd.
    We have been protecting digital lives for over 20 years.
    Our Company serves millions of Consumers and Businesses too.
    We operate from 20 offices around the world and our HQ is in Helsinki, Finland.




2     25 September 2012
F-Secure’s focus is
       about supporting over
       200 operator partners
       that serve over 250
       million broadband &
       mobile customers
       around the world.


3   25 September 2012
F-Secure is about
    Protecting the irreplaceable




Security                Storage   Cloud

4   25 September 2012
We detect 100,000 malicious files every
day. We reach out to an addressable
market of over 250 million fixed and
mobile consumers. We spot hundreds of
targeted attacks against companies every
month.          We operate e-stores in
over 20
countries. We’ve won
many awards including AV-TEST
Best Protection award.
5   25 September 2012
Across three major markets

    Enterprise users     A direct to consumer   Over 200
    around the           business across 24     Operators
    world                countries globally




6    25 September 2012
Shipments of smartphones
and tablets exceeds PC’s and
Notebooks
 77% of the world’s population
 owns a mobile


 For every 5 mobile users in the
 world there are 2 fixed internet
 users


Protecting the irreplaceable | f-secure.com
We are witnessing an
explosion in User
Generated Content
• The amount of video
       uploaded to YouTube in
       60 days is more than all 3
       major US TV networks
       created in 60 years




Protecting the irreplaceable | f-secure.com
The future is
in the cloud


Users’ content and with it
their digital life
is increasingly
moving to the cloud




9   25 September 2012
The F-Secure liquid experience works across devices and
 solutions


10 25 September 2012
Across our entire portfolio
   Protection Service for Mobile
   Protection from mobile threats and loss of phone



   Content Anywhere
   Store, sync and share precious content on any
   device at anytime

   Computer, Internet and Home Security
   Protecting millions of customers from known and
   emerging security threats


   Online Backup service
   Securely store your customers irreplaceable
   content



11 25 September 2012
For our Business
customers

 ”The best purchase our IT –
 management ever made.”
 PetriJärvinen, IT-manager, Eura municipality in Finland

 ”Good performance and the exceptionally fast updating of virus
 patterns were important criteria for choosing F-Secure.”
 Axel Dunkel, Managing Director of Dunkel GmbH

 ”We don’t have to worry if each computer is secure or not
 anymore.”
 Yoshito Sato, Manager of Information System Division of Greenhouse

 ”Protection Service for Business saves Clinique de l'Yvette both
 time and money.”
 Marc Drion, the Head of IT and Telecommunications




Protecting the irreplaceable | f-secure.com
Our Consumer
customers
 Our Direct-to-Consumer
 business buy direct
 from F-Secure.com
 and key retailers.




Protecting the irreplaceable | f-secure.com
And our Operator partners



  Online BackUp        Storage &            Protection Service    Computer &
  service              Sharing              for Smartphones       Internet Security

                                            4 out of the top 5
  F-Secure has         F-Secure securely    largest Mobile        F-Secure protects
  experienced over     stores millions of   Operator groups are   more than 10 million
  800% growth in the   customers personal   offering              customers from
  last year alone      irreplaceable data   F-Secure’s Mobile     known and new
                                            Security solution     security threats




14 25 September 2012
F-Secure Company Presentation Protecting Digital Lives

More Related Content

What's hot

Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection securityIBM Security
 
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...Block Armour
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessIBM Security
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeBlock Armour
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformVertex Holdings
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Block Armour
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystemMark Oakton
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseAirTight Networks
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTForescout Technologies Inc
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadIBM Security
 
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsSAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsAndreas Mai
 
Implementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD EraImplementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD EraKappa Data
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingIvanti
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune SystemJustin Hayward
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupBitglass
 

What's hot (20)

Fortinet
FortinetFortinet
Fortinet
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection security
 
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platform
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystem
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
 
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsSAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
 
Implementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD EraImplementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD Era
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune System
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
 
Psb mobile security
Psb mobile securityPsb mobile security
Psb mobile security
 

Similar to F-Secure Company Presentation Protecting Digital Lives

F secure india-company_presentation
F secure india-company_presentationF secure india-company_presentation
F secure india-company_presentationPratima Potturu
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 convertedemmaelice
 
TrendMicro DeepSecurity CASE - Testimonal
TrendMicro DeepSecurity CASE - TestimonalTrendMicro DeepSecurity CASE - Testimonal
TrendMicro DeepSecurity CASE - TestimonalEduardo Alves
 
telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionsFakher Oueslati
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000finance40
 
Vodafone security priorities in Greece
Vodafone security priorities in GreeceVodafone security priorities in Greece
Vodafone security priorities in GreeceKevin Duffey
 
2016 Vizocom Company Profile
2016 Vizocom Company Profile2016 Vizocom Company Profile
2016 Vizocom Company ProfileJoseph Deepak
 
2016 Vizocom Company Profile
2016 Vizocom Company Profile2016 Vizocom Company Profile
2016 Vizocom Company ProfileAlok Kumar
 
2016 Vizocom Company Profile
2016 Vizocom Company Profile2016 Vizocom Company Profile
2016 Vizocom Company ProfileHerman Shabib
 
2015_Vizocom_Company_Profile
2015_Vizocom_Company_Profile2015_Vizocom_Company_Profile
2015_Vizocom_Company_ProfileJayme Jamal Pedro
 
2016 Vizocom Company Profile
2016 Vizocom Company Profile2016 Vizocom Company Profile
2016 Vizocom Company Profilefred Anyika
 
Consultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresasConsultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresasFernando Misato
 
F secure presentation
F secure presentationF secure presentation
F secure presentationkwader Saudi
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
IBM Security - Successful digital transformation
IBM Security - Successful digital transformationIBM Security - Successful digital transformation
IBM Security - Successful digital transformationSebastien JARDIN
 
Arenim - NOAH16 London
Arenim - NOAH16 LondonArenim - NOAH16 London
Arenim - NOAH16 LondonNOAH Advisors
 

Similar to F-Secure Company Presentation Protecting Digital Lives (20)

F secure india-company_presentation
F secure india-company_presentationF secure india-company_presentation
F secure india-company_presentation
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
 
TrendMicro DeepSecurity CASE - Testimonal
TrendMicro DeepSecurity CASE - TestimonalTrendMicro DeepSecurity CASE - Testimonal
TrendMicro DeepSecurity CASE - Testimonal
 
telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutions
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
 
Vodafone security priorities in Greece
Vodafone security priorities in GreeceVodafone security priorities in Greece
Vodafone security priorities in Greece
 
2016 Vizocom Company Profile
2016 Vizocom Company Profile2016 Vizocom Company Profile
2016 Vizocom Company Profile
 
2016 Vizocom Company Profile
2016 Vizocom Company Profile2016 Vizocom Company Profile
2016 Vizocom Company Profile
 
2016 Vizocom Company Profile
2016 Vizocom Company Profile2016 Vizocom Company Profile
2016 Vizocom Company Profile
 
2016 Vizocom Company Profile
2016 Vizocom Company Profile2016 Vizocom Company Profile
2016 Vizocom Company Profile
 
2015_Vizocom_Company_Profile
2015_Vizocom_Company_Profile2015_Vizocom_Company_Profile
2015_Vizocom_Company_Profile
 
2016 Vizocom Company Profile
2016 Vizocom Company Profile2016 Vizocom Company Profile
2016 Vizocom Company Profile
 
Consultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresasConsultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresas
 
F secure presentation
F secure presentationF secure presentation
F secure presentation
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
IBM Security - Successful digital transformation
IBM Security - Successful digital transformationIBM Security - Successful digital transformation
IBM Security - Successful digital transformation
 
Arenim - NOAH16 London
Arenim - NOAH16 LondonArenim - NOAH16 London
Arenim - NOAH16 London
 

F-Secure Company Presentation Protecting Digital Lives

  • 1. F-Secure Our company presentation Protecting the irreplaceable | f-secure.com
  • 2. About F-Secure Founded in 1988 with over 940 employees. Listed on the NASDAQ OMX Helsinki Ltd. We have been protecting digital lives for over 20 years. Our Company serves millions of Consumers and Businesses too. We operate from 20 offices around the world and our HQ is in Helsinki, Finland. 2 25 September 2012
  • 3. F-Secure’s focus is about supporting over 200 operator partners that serve over 250 million broadband & mobile customers around the world. 3 25 September 2012
  • 4. F-Secure is about Protecting the irreplaceable Security Storage Cloud 4 25 September 2012
  • 5. We detect 100,000 malicious files every day. We reach out to an addressable market of over 250 million fixed and mobile consumers. We spot hundreds of targeted attacks against companies every month. We operate e-stores in over 20 countries. We’ve won many awards including AV-TEST Best Protection award. 5 25 September 2012
  • 6. Across three major markets Enterprise users A direct to consumer Over 200 around the business across 24 Operators world countries globally 6 25 September 2012
  • 7. Shipments of smartphones and tablets exceeds PC’s and Notebooks 77% of the world’s population owns a mobile For every 5 mobile users in the world there are 2 fixed internet users Protecting the irreplaceable | f-secure.com
  • 8. We are witnessing an explosion in User Generated Content • The amount of video uploaded to YouTube in 60 days is more than all 3 major US TV networks created in 60 years Protecting the irreplaceable | f-secure.com
  • 9. The future is in the cloud Users’ content and with it their digital life is increasingly moving to the cloud 9 25 September 2012
  • 10. The F-Secure liquid experience works across devices and solutions 10 25 September 2012
  • 11. Across our entire portfolio Protection Service for Mobile Protection from mobile threats and loss of phone Content Anywhere Store, sync and share precious content on any device at anytime Computer, Internet and Home Security Protecting millions of customers from known and emerging security threats Online Backup service Securely store your customers irreplaceable content 11 25 September 2012
  • 12. For our Business customers ”The best purchase our IT – management ever made.” PetriJärvinen, IT-manager, Eura municipality in Finland ”Good performance and the exceptionally fast updating of virus patterns were important criteria for choosing F-Secure.” Axel Dunkel, Managing Director of Dunkel GmbH ”We don’t have to worry if each computer is secure or not anymore.” Yoshito Sato, Manager of Information System Division of Greenhouse ”Protection Service for Business saves Clinique de l'Yvette both time and money.” Marc Drion, the Head of IT and Telecommunications Protecting the irreplaceable | f-secure.com
  • 13. Our Consumer customers Our Direct-to-Consumer business buy direct from F-Secure.com and key retailers. Protecting the irreplaceable | f-secure.com
  • 14. And our Operator partners Online BackUp Storage & Protection Service Computer & service Sharing for Smartphones Internet Security 4 out of the top 5 F-Secure has F-Secure securely largest Mobile F-Secure protects experienced over stores millions of Operator groups are more than 10 million 800% growth in the customers personal offering customers from last year alone irreplaceable data F-Secure’s Mobile known and new Security solution security threats 14 25 September 2012