WEARE
F-SECURE
.
OVER25YEARS
OFDIGITAL
SECURITY
EXPERIENCE
WEARE#1INSECURITY
155.1 Revenues MEUR
Operating Profit MEUR
Personnel
27.1
R&D Investments of Revenues27%
939
Pioneering
technology
year after year
BLACKLIGHT
DEEPGUARD
ORSP
LISTED ON NASDAQ OMX
Consistently ranked among the best by AV-Test, AV comparatives and numerous 3rd parties
Operators
Service partners and IT resellers
Direct
Consumers and
Small & Medium-
sized Businesses
WEWORKWITH200+
OPERATORSAND6,000+
SERVICEPARTNERS
Serving tens of millions of people in 40+ countries.
INFORMATION
SECURITYIS
COMPLEX.
OURPRODUCTS
ARENOT.
WHATMAKES
F-SECURE
UNIQUE?
TRUSTED VENDOR FROM A TRUSTED COUNTRY
SUPERB USABILITY
LEADER IN CLOUD-BASED SECURITY
BIG ENOUGH TO BE CREDIBLE – SMALL ENOUGH TO BE NIMBLE
7
Content SDK OPI & OAuth
FSIO
platform
Object storage & synchronization Service provisioning
Service Enabler
platform
F-Secure Content Cloud Platform
Native mobile & desktop Sync & Backup clients HTML5 App
Authentication
OneID
platform
CRM IdP
OneID provides Single
Sign On support and IdP
F-Secure Content Cloud provides unique secure storage that can
be accessed anywhere, anytime from multiple devices. Your
subscribers can sync, share, and stream their content from one
convenient cloud location, while F-Secure's proven expertise in
security guarantees their irreplaceable content will be safe
Updates
GUTS
platform
© F-Secure Confidential8
Workflow Management & Secure Sandbox Workers
Thumbnail | Transcode | Locate | DRM | Index | Pdf | External Workers ( face, transcribing)
Object Storage
Load balancer| Multi AZ | Compatibility Layer | Multisite
Frontend API
DDS
Metadata | Contacts | Messages
Rest API PostgreSQL Cluster
Directly attached storage
APIs
Data API Admin API
B3 S3 SWIFT NetApp
Cloud Aggregator
Authentication | Synchronization
Cloud Connector
Events API
Notification
Service
FSIO Platform SOA Architecture
Virtualized and Storage Agnostic
Malware Scan
SecuringDataonTransit,
ProcessingandStorage
Encryption of
Data on Transit
Encryption in storage,
Storage access control,
content origin obfuscation,
and encryption of data in storage
Layered Security Model and
Content processing in secure sandbox
Store
Sync, Share,
Search, Scan,
Transcode &
Stream …
View &
Create
Transit
ServiceLayeredSecurityModel
inF-SecureContentCloud
© F-Secure ConfidentialJanuary 23, 2015
Authenticate
Authorize & Access Control
Privacy
Service , Network
& Interface
SegregationInput Validation
Sanitized
Input
Access &
Segregation
(SEDA)
Staged Event-Driven Architecture
Sandbox
Audit TrailMonitoring
Content
Security
Scanning
Object origin
obfuscation
Controlled
Execution
Content
Exploit
Protection
User Access Data Store
Account Provisioning Data Store
Metadata Distributed Data Store
Object/File Store Data
Isolation
JOINTHE
MOVEMENT

We are F-Secure

  • 1.
  • 2.
  • 3.
    WEARE#1INSECURITY 155.1 Revenues MEUR OperatingProfit MEUR Personnel 27.1 R&D Investments of Revenues27% 939 Pioneering technology year after year BLACKLIGHT DEEPGUARD ORSP LISTED ON NASDAQ OMX Consistently ranked among the best by AV-Test, AV comparatives and numerous 3rd parties
  • 4.
    Operators Service partners andIT resellers Direct Consumers and Small & Medium- sized Businesses WEWORKWITH200+ OPERATORSAND6,000+ SERVICEPARTNERS Serving tens of millions of people in 40+ countries.
  • 5.
  • 6.
    WHATMAKES F-SECURE UNIQUE? TRUSTED VENDOR FROMA TRUSTED COUNTRY SUPERB USABILITY LEADER IN CLOUD-BASED SECURITY BIG ENOUGH TO BE CREDIBLE – SMALL ENOUGH TO BE NIMBLE
  • 7.
    7 Content SDK OPI& OAuth FSIO platform Object storage & synchronization Service provisioning Service Enabler platform F-Secure Content Cloud Platform Native mobile & desktop Sync & Backup clients HTML5 App Authentication OneID platform CRM IdP OneID provides Single Sign On support and IdP F-Secure Content Cloud provides unique secure storage that can be accessed anywhere, anytime from multiple devices. Your subscribers can sync, share, and stream their content from one convenient cloud location, while F-Secure's proven expertise in security guarantees their irreplaceable content will be safe Updates GUTS platform
  • 8.
    © F-Secure Confidential8 WorkflowManagement & Secure Sandbox Workers Thumbnail | Transcode | Locate | DRM | Index | Pdf | External Workers ( face, transcribing) Object Storage Load balancer| Multi AZ | Compatibility Layer | Multisite Frontend API DDS Metadata | Contacts | Messages Rest API PostgreSQL Cluster Directly attached storage APIs Data API Admin API B3 S3 SWIFT NetApp Cloud Aggregator Authentication | Synchronization Cloud Connector Events API Notification Service FSIO Platform SOA Architecture Virtualized and Storage Agnostic Malware Scan
  • 9.
    SecuringDataonTransit, ProcessingandStorage Encryption of Data onTransit Encryption in storage, Storage access control, content origin obfuscation, and encryption of data in storage Layered Security Model and Content processing in secure sandbox Store Sync, Share, Search, Scan, Transcode & Stream … View & Create Transit
  • 10.
    ServiceLayeredSecurityModel inF-SecureContentCloud © F-Secure ConfidentialJanuary23, 2015 Authenticate Authorize & Access Control Privacy Service , Network & Interface SegregationInput Validation Sanitized Input Access & Segregation (SEDA) Staged Event-Driven Architecture Sandbox Audit TrailMonitoring Content Security Scanning Object origin obfuscation Controlled Execution Content Exploit Protection User Access Data Store Account Provisioning Data Store Metadata Distributed Data Store Object/File Store Data Isolation
  • 11.

Editor's Notes

  • #3 We have been doing this for over 25 years. In short: we know what we’re doing. We have the capability to protect the current business and build new businesses within our domain. The story in a nutshell The first computer virus was discovered in 1986. It did not take long for people to realize that computers connected together would not only enable great things, but also make you more vulnerable. Two years later in 1988, F-Secure was founded in Finland. In the global environment we work in, we take pride in our roots that embraces privacy, integrity and equality – and a small bit of finnish crazyness, "sisu" to have the guts to challenge everything and anything necessary. All these qualities have led us where we are as a company. Today the whole world is even more connected. You use your devices at home, at work and on the road. For us it means that we have an even bigger job to do. It’s about fighting for digital freedom. Your freedom. It is freedom that pushes us to create better products and services, so that you can live your digital life without worries. We create and share more and more content every day, and because of that security has become very personal. For us, freedom is about making sure that you are the one who is in control. F-Secure is a company that protects your content and your privacy everywhere. On a more fundamental level, it’s really about making sure that technology acts as a liberator today, and tomorrow. Together with you, we fight for your digital freedom. And today we are needed more than ever. Join the freedom movement.
  • #4 We are #1, as constantly verified by independent partners. We are big enough to be credible, but small enough to be nimble. Technology firsts   BlackLight: F-Secure rootkit detection technology released in 2005. First rootkit detector integrated to a security suite. Based on comparing two views of the system and finding anomalies there. Blacklight helps to discover and remove malware that is hiding so deep in the PC that even the Operating System cannot see that.   DeepGuard: F-Secure's behavior blocker technology first introduced in 2006. DG analyzes starting apps and monitors what they do. Suspicious applications are blocked from starting and suspicious activities are stopped. Blocks applications that have suspicious activities but are not yet detected by signature-based scanning. Latest generation introduces generic exploit protection. In 2013 exploits are the most common vector for infection and zero-day exploits are not uncommon. Hence, it is really important to have generic blocking for browser and document exploits.   Object Reputation Service Platform (ORSP): Cloud-based technology for querying the reputation of object such as files, URLs, certificates, etc.
  • #5 We serve consumers and SMBs through 3 equally important channels.
  • #6 We hide all the complexity from the users and provide one-click, simplified security.
  • #12 Thank you!