SlideShare a Scribd company logo
Proud Partner of F-Secure
KWADER TECNOLOGY
SECURE YOUR
BUSINESS.
WHEREVER IT
TAKES YOU.
PROTECTION SERVICE
FOR BUSINESS
WEARE
F-SECURE
F-SECURE
INSHORT
Leading research & development
since 1988. Creator of inventions that
are today’s industry standards
From Finland, Europe, publicly listed
on NASDAQ OMX Helsinki Ltd. since
1999
Trusted by millions of customers
worldwide, served by 200+ operators
and 3500+ local reseller partners
Protecting businesses in 100+
countries out of 25 offices
EVOLVING
SECURITY
TIME TO STEP UP SECURITY
EVOLVING
SECURITY
THREATS
Cyberattacks continue
to escalate in frequency, severity
and sophistication, making it
harder to defend against them.
Businesses have more
complex environments, and don’t
have the resources or know-how to
combat highly skilled and
aggressive cyber criminals.
LIMITED
RESOURCES
ANDSKILL
19%
increase in the average total
cost of a security incident in
2014-15.
38%
increase in detected
information security incidents
in 2015
60%
of the cases, attackers are able
to compromise an organization
within minutes.
99,9%
of the exploited vulnerabilities were
compromised more than a year after
the CVE was published.
ITISHARD
TOSTAYON
TOPOF
EVERYTHING
MORE COMPLEXITY
LIMITED KNOW-HOW
LIMITED RESOURCES
LIMITED TIME
OTHER PRIORITIES
WEMERGE
MEN&
MACHINES
SECURITY
ANALYSTS
ENDPOINT
SENSORS
Security consultants feed real
world threat intelligence into the
F-Secure research team, harden
customer security and provide
incident response and forensics to
customers.
Our security cloud uses artificial
intelligence and automation to detect,
categorize and block attacks as they
emerge. The information is pushed back
to products to provide accurate detection.
F-Secure research team studies potential
attack patterns and help consultants to
resolve incidents and forensics cases.
Our perimeter defence and
endpoint security products block
and detect known and unknown
attacks. The prevention and
detection is based on local device
analysis as well as intelligence
provided by the security cloud.
SECURITY
CLOUD
450 000Malware samples analyzed
per day
SCOPE OF
SECURITY
6 BILLIONReputation queries
per day
35 000Android malware samples
analyzed per day
WINNING ONCE
COULD BE LUCK.
WINNING FOUR
YEARS IN A ROW
PROVES
CATEGORY
DOMINANCE
AV-Test: ‘Best Protection’ 2011-14
AV-Comparatives: ‘Top Rated’ 2010-14
2011 2012
2013 2014
OUR
OFFERING
F-SECURE OFFERING FOR BUSINESSES
PREDICT PREVENT
DETECTRESPOND
ENDPOINT SECURITY
PROTECTION SERVICE
FOR BUSINESS
 Multi-Endpoint Security
 Mobile Device Management
 Patch Management
 Unified Solution
 As a service
VULNERABILITY MANAGEMENT
 Vulnerability scanning
 Vulnerability management
ATTACK SURFACE ASSESSMENT
 Threat level assessment
 Attack surface mapping
CONSULTANCY SERVICES
 Consulting & coaching
 For all areas of the security strategy
ADVANCED THREAT PROTECTION
 Security monitoring & alerting
 Incident response
OUR OFFERING
PROTECTION
SERVICE
FOR BUSINESS
Secure your Business.
Wherever it takes you.
WINDOWS | MAC | ANDROID | IOS | SERVERS
Powerful,modern,anddesignedto
solvechallengingsecurityneeds
aseasilyaspossible,
ProtectionServiceForBusiness
isoneoftheworld’sleadingmulti-endpoint
securitysolutions.
The only unified multi-endpoint security
solution on the market with integrated
Patch Management and MDM.
BESTENDPOINT
SECURITYPACKAGE
ONTHEMARKET
Proven to provide superior and
more consistent protection* than
our competitors – thanks to our
pioneering technologies.
BESTPROTECTION
WITH PIONEERING
TECHNOLOGIES
Merging all endpoint security needs and
tools into one centrally managed solution
allows you to use your budget & working
hours more effectively.
DESIGNEDTO
SIMPLIFYSECURITY
MANAGEMENT
AV-Test: ‘Best Protection’ 2011-14
AV-Comparatives: ‘Top Rated’ 2010-14
Provides consitent and industry leading
detection* rates – 4 years in a row
Covers all endpoints: Windows, Mac, iOS,
Android, and variety of server OS
Everything can be managed centrally
from a single cloud-based portal
Includes integrated Patch Managment
and MDM capabilities
Uses pioneering technologies like
real-time threat intelligence
AV-Test: ‘Best Protection’ 2011-14
AV-Comparatives: ‘Top Rated’ 2010-14
Awarded security for the latest
Windows and Mac endpoints, with
Patch Management.
COMPUTERS
Security and control for iOS &
Android devices, with MDM, VPN
and Anti-Malware.
MOBILES
Powerful and modern security
for your Windows, Linux and
Citrix servers
SERVERS
Designed to accelerate security management
and to give better visibility and control over all
your end-points.
MANAGEMENT
PORTAL
MANAGEMENT
Managing all your security needs from
one portal saves you time and effort
Graphical dashboards enable monitoring
of the security levels and incidents
Designed for faster management and better
visibility & control over all your end-points.
No need to deploy or maintain server
hardware - it’s a hosted service
Less maintenance: automated 3rd party
patches, and client + security updates
COMPUTERS
Minimal performance impact, making
it perfect for even older hardware
Integrated Patch Management keeps
OS and 3rd party software up-to-date
Awarded security for latest Windows and Mac
endpoints, with Patch Management.
Provides you industry leading detection*
capabilities, 4 years in a row
Leverages heuristic analysis and real-time
threat intelligence among others
AV-Test: ‘Best Protection’ 2011-14
AV-Comparatives: ‘Top Rated’ 2010-14
MOBILES
Integrated MDM capabilities allow
fleet management & monitoring
‘Ultralight’ technology ensures
minimal battery & performance impact
Security and control for iOS & Android devices,
with MDM, VPN and Anti-malware
Includes mobile VPN capabilities in
addition to advanced anti-malware
Increases mobile browsing speed up
to 30%, reducing data usage
SERVERS
Minimal performance impact, allowing
servers to run at peak performance
Integrated Patch Management keeps
server & published applications up-to-date
Powerful and modern security for your
Windows, Linux and Citrix servers
Utilizes pioneering technologies like heuristic
analysis and real-time threat intelligence
Specialized components for dedicated
Exchange & SharePoint servers
SWITCH
ON
FREEDOM

More Related Content

What's hot

Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
dvanwyk30
 
Presentatie F-Secure 26062015
Presentatie F-Secure 26062015Presentatie F-Secure 26062015
Presentatie F-Secure 26062015
SLBdiensten
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
Ariel Martin Beliera
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
Giuseppe Paterno'
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
GARL
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior control
F-Secure Corporation
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
MarketingArrowECS_CZ
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
TI Safe
 
Virtual Security
Virtual SecurityVirtual Security
Virtual Security
F-Secure Corporation
 
Internet gatekeeper
Internet gatekeeperInternet gatekeeper
Internet gatekeeper
F-Secure Corporation
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
David Fuchs
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
wendyking63
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
Kaspersky
 
Business Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityBusiness Suite - Gain control of your IT security
Business Suite - Gain control of your IT security
F-Secure Corporation
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
ChaitanyaS
 
Zimperium - Technology Briefing
Zimperium - Technology BriefingZimperium - Technology Briefing
Zimperium - Technology Briefing
Jake Leonard
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
Cristian Garcia G.
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big business
F-Secure Corporation
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
Giovanni Maree
 
Managed Next Generation Firewall Service
Managed Next Generation Firewall ServiceManaged Next Generation Firewall Service
Managed Next Generation Firewall Service
SecureData Europe
 

What's hot (20)

Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Presentatie F-Secure 26062015
Presentatie F-Secure 26062015Presentatie F-Secure 26062015
Presentatie F-Secure 26062015
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior control
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Virtual Security
Virtual SecurityVirtual Security
Virtual Security
 
Internet gatekeeper
Internet gatekeeperInternet gatekeeper
Internet gatekeeper
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
Business Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityBusiness Suite - Gain control of your IT security
Business Suite - Gain control of your IT security
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
 
Zimperium - Technology Briefing
Zimperium - Technology BriefingZimperium - Technology Briefing
Zimperium - Technology Briefing
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big business
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
 
Managed Next Generation Firewall Service
Managed Next Generation Firewall ServiceManaged Next Generation Firewall Service
Managed Next Generation Firewall Service
 

Similar to F secure presentation

withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
MdZabedHossain2
 
Consultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresasConsultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresas
Fernando Misato
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
emmaelice
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
Akamai Technologies
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
Smart Defend UK
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
Alan Rudd
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the Cloud
OpenDNS
 
sb-checkpoint-matrix42
sb-checkpoint-matrix42sb-checkpoint-matrix42
sb-checkpoint-matrix42
Wayne Phillips
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky
 
Kaspersky - Apresentação Corporativa
Kaspersky - Apresentação CorporativaKaspersky - Apresentação Corporativa
Kaspersky - Apresentação Corporativa
Bravo Tecnologia
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
Camilo Fandiño Gómez
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
ChristopherSumner7
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
Cisco Canada
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
Ronny Stavem
 
Windstream Managed Network Security Ebook
Windstream Managed Network Security EbookWindstream Managed Network Security Ebook
Windstream Managed Network Security Ebook
Ideba
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
xband
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
Luca Simonelli
 
Veracode ciso riyadh
Veracode ciso riyadhVeracode ciso riyadh
Veracode ciso riyadh
Salil Kumar Subramony
 
Veracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green MethodVeracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green Method
Salil Kumar Subramony
 

Similar to F secure presentation (20)

withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Consultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresasConsultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresas
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the Cloud
 
sb-checkpoint-matrix42
sb-checkpoint-matrix42sb-checkpoint-matrix42
sb-checkpoint-matrix42
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Kaspersky - Apresentação Corporativa
Kaspersky - Apresentação CorporativaKaspersky - Apresentação Corporativa
Kaspersky - Apresentação Corporativa
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
 
Windstream Managed Network Security Ebook
Windstream Managed Network Security EbookWindstream Managed Network Security Ebook
Windstream Managed Network Security Ebook
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
Veracode ciso riyadh
Veracode ciso riyadhVeracode ciso riyadh
Veracode ciso riyadh
 
Veracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green MethodVeracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green Method
 

Recently uploaded

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 

Recently uploaded (20)

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 

F secure presentation

  • 1. Proud Partner of F-Secure KWADER TECNOLOGY
  • 2. SECURE YOUR BUSINESS. WHEREVER IT TAKES YOU. PROTECTION SERVICE FOR BUSINESS
  • 4. F-SECURE INSHORT Leading research & development since 1988. Creator of inventions that are today’s industry standards From Finland, Europe, publicly listed on NASDAQ OMX Helsinki Ltd. since 1999 Trusted by millions of customers worldwide, served by 200+ operators and 3500+ local reseller partners Protecting businesses in 100+ countries out of 25 offices
  • 6. EVOLVING SECURITY THREATS Cyberattacks continue to escalate in frequency, severity and sophistication, making it harder to defend against them. Businesses have more complex environments, and don’t have the resources or know-how to combat highly skilled and aggressive cyber criminals. LIMITED RESOURCES ANDSKILL
  • 7. 19% increase in the average total cost of a security incident in 2014-15. 38% increase in detected information security incidents in 2015 60% of the cases, attackers are able to compromise an organization within minutes. 99,9% of the exploited vulnerabilities were compromised more than a year after the CVE was published.
  • 10. SECURITY ANALYSTS ENDPOINT SENSORS Security consultants feed real world threat intelligence into the F-Secure research team, harden customer security and provide incident response and forensics to customers. Our security cloud uses artificial intelligence and automation to detect, categorize and block attacks as they emerge. The information is pushed back to products to provide accurate detection. F-Secure research team studies potential attack patterns and help consultants to resolve incidents and forensics cases. Our perimeter defence and endpoint security products block and detect known and unknown attacks. The prevention and detection is based on local device analysis as well as intelligence provided by the security cloud. SECURITY CLOUD
  • 11. 450 000Malware samples analyzed per day SCOPE OF SECURITY 6 BILLIONReputation queries per day 35 000Android malware samples analyzed per day
  • 12. WINNING ONCE COULD BE LUCK. WINNING FOUR YEARS IN A ROW PROVES CATEGORY DOMINANCE AV-Test: ‘Best Protection’ 2011-14 AV-Comparatives: ‘Top Rated’ 2010-14 2011 2012 2013 2014
  • 14. PREDICT PREVENT DETECTRESPOND ENDPOINT SECURITY PROTECTION SERVICE FOR BUSINESS  Multi-Endpoint Security  Mobile Device Management  Patch Management  Unified Solution  As a service VULNERABILITY MANAGEMENT  Vulnerability scanning  Vulnerability management ATTACK SURFACE ASSESSMENT  Threat level assessment  Attack surface mapping CONSULTANCY SERVICES  Consulting & coaching  For all areas of the security strategy ADVANCED THREAT PROTECTION  Security monitoring & alerting  Incident response OUR OFFERING
  • 15. PROTECTION SERVICE FOR BUSINESS Secure your Business. Wherever it takes you.
  • 16. WINDOWS | MAC | ANDROID | IOS | SERVERS
  • 18. The only unified multi-endpoint security solution on the market with integrated Patch Management and MDM. BESTENDPOINT SECURITYPACKAGE ONTHEMARKET Proven to provide superior and more consistent protection* than our competitors – thanks to our pioneering technologies. BESTPROTECTION WITH PIONEERING TECHNOLOGIES Merging all endpoint security needs and tools into one centrally managed solution allows you to use your budget & working hours more effectively. DESIGNEDTO SIMPLIFYSECURITY MANAGEMENT AV-Test: ‘Best Protection’ 2011-14 AV-Comparatives: ‘Top Rated’ 2010-14
  • 19. Provides consitent and industry leading detection* rates – 4 years in a row Covers all endpoints: Windows, Mac, iOS, Android, and variety of server OS Everything can be managed centrally from a single cloud-based portal Includes integrated Patch Managment and MDM capabilities Uses pioneering technologies like real-time threat intelligence AV-Test: ‘Best Protection’ 2011-14 AV-Comparatives: ‘Top Rated’ 2010-14
  • 20. Awarded security for the latest Windows and Mac endpoints, with Patch Management. COMPUTERS Security and control for iOS & Android devices, with MDM, VPN and Anti-Malware. MOBILES Powerful and modern security for your Windows, Linux and Citrix servers SERVERS Designed to accelerate security management and to give better visibility and control over all your end-points. MANAGEMENT PORTAL
  • 21. MANAGEMENT Managing all your security needs from one portal saves you time and effort Graphical dashboards enable monitoring of the security levels and incidents Designed for faster management and better visibility & control over all your end-points. No need to deploy or maintain server hardware - it’s a hosted service Less maintenance: automated 3rd party patches, and client + security updates
  • 22. COMPUTERS Minimal performance impact, making it perfect for even older hardware Integrated Patch Management keeps OS and 3rd party software up-to-date Awarded security for latest Windows and Mac endpoints, with Patch Management. Provides you industry leading detection* capabilities, 4 years in a row Leverages heuristic analysis and real-time threat intelligence among others AV-Test: ‘Best Protection’ 2011-14 AV-Comparatives: ‘Top Rated’ 2010-14
  • 23. MOBILES Integrated MDM capabilities allow fleet management & monitoring ‘Ultralight’ technology ensures minimal battery & performance impact Security and control for iOS & Android devices, with MDM, VPN and Anti-malware Includes mobile VPN capabilities in addition to advanced anti-malware Increases mobile browsing speed up to 30%, reducing data usage
  • 24. SERVERS Minimal performance impact, allowing servers to run at peak performance Integrated Patch Management keeps server & published applications up-to-date Powerful and modern security for your Windows, Linux and Citrix servers Utilizes pioneering technologies like heuristic analysis and real-time threat intelligence Specialized components for dedicated Exchange & SharePoint servers

Editor's Notes

  1. Let‘s first look at Who F-Secure is. Where do we come from? What is our footprint? Where are we heading? What is our approach to cyber security / information security?
  2. Let‘s first look at Who F-Secure is. Where do we come from? What is our footprint? Where are we heading? What is our approach to cyber security / information security?
  3. The Common Vulnerabilities and Exposures (CVE) system provides a reference- method for publicly known information-security vulnerabilities and exposures. 60% of the cases, attackers are able to compromise an organization within minutes. (Verizon 2015 Data Breach Investigations) 99,9% of the exploited vulnerabilities were compromised more than a year after the CVE was published. (Verizon 2015 Data Breach Investigations) 70-90% of malware samples are unique to an organization, though not necessarily customized. (Verizon 2015 Data Breach Investigations) 38% increase in detected information security incidents in 2015 (PwC: Global State of Information Security 2016 Survey)
  4. Many organizations don’t know what to do, or don’t have the resources to combat highly skilled and aggressive cyber criminal. Plus, proper cybersecurity is hard: https://cyber.law.harvard.edu/cybersecurity/Why_Information_Security_is_Hard
  5. Our Cyber Security Experts are the feet on the ground, fighting cyber threats on the first line of defense. At our customers. Just after disaster has struck. They feed the real world threat intelligence into our security cloud. At the same time, our millions of device and network sensors, detect and block known and unknown attacks. While using the intelligence from the cloud to do that, each detection of a new threat automatically also enriches the intelligence of our security cloud (no personal data is upstreamed, all privacy principles are considered) adding protection for all other customers around the world
  6. Our Cyber Security Experts are the feet on the ground, fighting cyber threats on the first line of defense. At our customers. Just after disaster has struck. They feed the real world threat intelligence into our security cloud. At the same time, our millions of device and network sensors, detect and block known and unknown attacks. While using the intelligence from the cloud to do that, each detection of a new threat automatically also enriches the intelligence of our security cloud (no personal data is upstreamed, all privacy principles are considered) adding protection for all other customers around the world
  7. F-Secure products are underpinned by the leading-edge technologies and services created in our Labs, which are in turn the creations of special teams dedicated to anti-malware analysis and digital security research. Based in two locations around the world, these teams investigate the latest threats and trends, in close cooperation with industry partners and recognized international and national information security authorities, in order to develop the systems and technical knowledge needed to protect millions of users against threats to their digital security and freedom. 6 BILLION REPUTATION QUERIES We protect our users through our Security Cloud. Every day, our customers send six billion reputation queries to our backends. Each query, typically about a file or a URL, gets an instant answer about its reputation. Our Security Cloud helps keep all of our customers safe, in real-time. 450 000 MALWARE SALMPLES In the past years, the growth of malicious unique samples has grown significantly. Handling almost half a million samples on an average day requires a huge amount of automation. Today, we rely on the intelligence of computers to find the malware among the haystack of other samples. Out of this number, roughly 30% of it are determined malware or PUA daily. 35K ANDROID MALWARE When it comes to threats to mobile devices, Android users are the biggest target. We receive and analyze thousands of Android applications every day. Apart from Android malware, we also look for applications that invade the users privacy by sending information like location data or device identification data unnecessarily.
  8. F-Secure submits its security products for comparative review by independent, internationally renowned product testing organizations. These tests are important to us, not just as an objective appraisal of the product's quality and effectiveness, but also as a benchmark for its performance and competitiveness. The results of these tests guide us in continuously improving our product features, detection methodologies and services. AV-TEST's Best Protection award is presented to the best antivirus product of the year in terms of protection against malware infections caused by current threats such as zero-day attacks, malicious websites and e-mails. The Germany-based AV-TEST Institute is internationally known and respected as a leading provider of independent information security product testing and analysis. In antivirus product testing, submitted products are run against a constantly evolving set of test samples and scenarios. "F-Secure provides an unobtrusive security solution that's easy to use with excellent protection.“ Andreas Marx CEO AV-TEST AV-TEST's Best Protection Award 2014 is only the most recent award or certification won by F-Secure products. A more comprehensive list of awards won over the years is listed in our Awards page.
  9. Protection Service for Business is a service that solves challenging security and management needs, without significant maintenance or management. It’s designed to secure a large variety of endpoints, both at the office and on the go.   It’s a solution that provides outstanding security for all devices, including Windows and Mac computers, iOS and Android smartphones and a large variety of server platforms.   Protection Service for Business is powerful, easy to manage, and offers much more than traditional anti-malware. It includes real-time threat intelligence via the F-Secure Security Cloud and pioneering technologies such as Behavior and Heuristic Analysis. Not only does it counter threats as they emerge, but it also includes value-added functions like Patch Management and Mobile Device Management. It’s an end-to-end solution that helps you meet all the security requirements of the modern business environment.   
  10. BEST PROTECTION WITH PIONEERING TECHNOLOGIES We are the best at what we do, proven to provide superior and consistent protection by independent security experts. In order to keep your business secure day-after-day in the increasingly complex and sophisticated security landscape, we provide you more than just anti-malware. We deliver you pioneering technologies like Machine Learning, Heuristic analysis, and Real-Time Threat Intelligence through our Security Cloud, ensuring that you’re at the forefront of security. BEST ENDPOINT SECURITY PACKAGE ON THE MARKET We provide you the only unified endpoint security solution on the market that delivers centrally managed computer, mobile and server security, with integrated patch- and mobile device management. With all the needed tools and endpoints covered with one solution, you don’t need to procure, set up or maintain multiple products to get what you need. This way, you can do more with your security budget, as tools such as Patch Management and MDM are included in the package, saving you money. DESIGNED TO MAKE SECURITY MANAGEMENT AS SIMPLE AS POSSIBLE We simplify and speed up the security management of challenging multi-device environments. By consolidating endpoint management and all the needed tools into one task-oriented portal, we save you time better spend on something else. As a hosted service, you don’t need to buy or maintain servers, and can commit less IT resources to maintain security. We’ll automatically handle your 3rd party security patches, our client updates, and ensure that your security is working at peak performance at all times by using real-time threat intelligence.
  11. Protection Service for Business is the only unified endpoint security solution on the market that delivers centrally managed computer, mobile and server security along with integrated patch and mobile device management. With one hosted solution covering all of your endpoints, there’s no need to maintain multiple security products or extra hardware You get world-leading security through pioneering technologies, like real-time threat intelligence provided via the F-Secure Security Cloud Includes tools like Patch Management and MDM that enable you to do more with your security budget Thanks to remote deployment, automatic removal of old anti-virus software and no hardware set up, AV-Comparatives found our endpoint installation “no more complicated than installing iTunes”  Save management and maintenance time with a unified management console, automatic patch management and product and database updates.
  12. The Protection Service for Business was designed from the ground up to simplify and accelerate security management – and to provide visibility and control over all your end-points. By consolidating end-point management and all required tools into one task-oriented portal, you save time—time that’s better spent on something else With automated patch management, product and database updates, you can save even more time Intuitive graphical reports and dashboards allow you to identify security issues for fast remediation—like software vulnerabilities and infections Gain visibility and control over all your endpoints, no matter where they are No need to deploy or maintain server hardware—it’s a hosted service
  13. Protection Service for Business provides powerful, modern security for your computer endpoints. With tools like Patch Management and real-time threat intelligence provided through the F-Secure Security Cloud, your security rises to a whole new level.   Winning AV-Test’s Best Protection award four years in a row proves that you’re getting the best protection available You get world-leading security through pioneering technologies, like real-time threat intelligence provided via the F-Secure Security Cloud Integrated Patch Management keeps all your 3rd party software up-to-date, preventing up to 80% of known malware  Thanks to remote deployment, automatic removal of old anti-virus software, and no hardware set up, AV-Comparatives found our endpoint installation “no more complicated than installing iTunes”
  14. Protection Service for Business gives you an easy way to secure and control your mobile devices, wherever they are. You get everything you need in one package: anti-malware, anti-theft, VPN and mobile device management.   Gain vital mobile device control and visibility through mobile device management Prevent data breaches by encrypting all mobile traffic with a personal VPN service, and wipe devices in case of theft or loss Maintain great device and battery performance with our modern ultra-light technology Increase mobile browsing speed up to 30% by using traffic compression and preventing online tracking and advertisement
  15. Protection Service for Business provides powerful, modern security for your server environment. With real-time threat intelligence via the F-Secure Security Cloud, and tools like Patch Management, your security levels will exceed modern standards.   Ensure the utmost protection with pioneering security technologies such as Heuristic Analysis and real-time threat intelligence Assess missing security updates to identify and patch exploitable vulnerabilities in published applications and servers’ own software Secure all your Windows and Citrix terminal users with our complete security stack—without impacting performance or usability Take advantage of additional security components tailored for specialized servers, such as SharePoint and Exchange F-Secure server solutions are Citrix Ready-certified, ensuring that they work flawlessly in your Citrix environments.