SlideShare a Scribd company logo
WEARE
F-SECURE
.
OVER25YEARS
OFDIGITAL
SECURITY
EXPERIENCE
WEARE#1INSECURITY
155.1 Revenues MEUR
Operating Profit MEUR
Personnel
27.1
R&D Investments of Revenues27%
939
Pioneering
technology
year after year
BLACKLIGHT
DEEPGUARD
ORSP
LISTED ON NASDAQ OMX
Consistently ranked among the best by AV-Test, AV comparatives and numerous 3rd parties
Operators
Service partners and IT resellers
Direct
Consumers and
Small & Medium-
sized Businesses
WEWORKWITH200+
OPERATORSAND6,000+
SERVICEPARTNERS
Serving tens of millions of people in 40+ countries.
INFORMATION
SECURITYIS
COMPLEX.
OURPRODUCTS
ARENOT.
WHATMAKES
F-SECURE
UNIQUE?
TRUSTED VENDOR FROM A TRUSTED COUNTRY
SUPERB USABILITY
LEADER IN CLOUD-BASED SECURITY
BIG ENOUGH TO BE CREDIBLE – SMALL ENOUGH TO BE NIMBLE
7
Content SDK OPI & OAuth
FSIO
platform
Object storage & synchronization Service provisioning
Service Enabler
platform
F-Secure Content Cloud Platform
Native mobile & desktop Sync & Backup clients HTML5 App
Authentication
OneID
platform
CRM IdP
OneID provides Single
Sign On support and IdP
F-Secure Content Cloud provides unique secure storage that can
be accessed anywhere, anytime from multiple devices. Your
subscribers can sync, share, and stream their content from one
convenient cloud location, while F-Secure's proven expertise in
security guarantees their irreplaceable content will be safe
Updates
GUTS
platform
© F-Secure Confidential8
Workflow Management & Secure Sandbox Workers
Thumbnail | Transcode | Locate | DRM | Index | Pdf | External Workers ( face, transcribing)
Object Storage
Load balancer| Multi AZ | Compatibility Layer | Multisite
Frontend API
DDS
Metadata | Contacts | Messages
Rest API PostgreSQL Cluster
Directly attached storage
APIs
Data API Admin API
B3 S3 SWIFT NetApp
Cloud Aggregator
Authentication | Synchronization
Cloud Connector
Events API
Notification
Service
FSIO Platform SOA Architecture
Virtualized and Storage Agnostic
Malware Scan
SecuringDataonTransit,
ProcessingandStorage
Encryption of
Data on Transit
Encryption in storage,
Storage access control,
content origin obfuscation,
and encryption of data in storage
Layered Security Model and
Content processing in secure sandbox
Store
Sync, Share,
Search, Scan,
Transcode &
Stream …
View &
Create
Transit
ServiceLayeredSecurityModel
inF-SecureContentCloud
© F-Secure ConfidentialJanuary 23, 2015
Authenticate
Authorize & Access Control
Privacy
Service , Network
& Interface
SegregationInput Validation
Sanitized
Input
Access &
Segregation
(SEDA)
Staged Event-Driven Architecture
Sandbox
Audit TrailMonitoring
Content
Security
Scanning
Object origin
obfuscation
Controlled
Execution
Content
Exploit
Protection
User Access Data Store
Account Provisioning Data Store
Metadata Distributed Data Store
Object/File Store Data
Isolation
JOINTHE
MOVEMENT

More Related Content

What's hot

Assessing the prospects for telecoms operators in the ICT services markets - ...
Assessing the prospects for telecoms operators in the ICT services markets - ...Assessing the prospects for telecoms operators in the ICT services markets - ...
Assessing the prospects for telecoms operators in the ICT services markets - ...
Ovum
 
Getiss 16x9
Getiss 16x9Getiss 16x9
Getiss 16x9
Vitaly Pochtar
 
Towards Secure Multi-network Video Services - Cable Congress 2015
Towards Secure Multi-network Video Services - Cable Congress 2015Towards Secure Multi-network Video Services - Cable Congress 2015
Towards Secure Multi-network Video Services - Cable Congress 2015
Verimatrix
 
Shifting into the Drivers seat - TU Automotive Detroit - 2019
Shifting into the Drivers seat - TU Automotive Detroit - 2019Shifting into the Drivers seat - TU Automotive Detroit - 2019
Shifting into the Drivers seat - TU Automotive Detroit - 2019
HARMAN Connected Services
 
Securing the modern data centre
Securing the modern data centreSecuring the modern data centre
Securing the modern data centre
Infront
 
EgyptNetwork Company profile v5
EgyptNetwork Company profile v5EgyptNetwork Company profile v5
EgyptNetwork Company profile v5
Ahmed Ibrahim
 
Innovation conference 26.05.2011
Innovation conference 26.05.2011Innovation conference 26.05.2011
Innovation conference 26.05.2011
FP Logue Solicitors
 

What's hot (7)

Assessing the prospects for telecoms operators in the ICT services markets - ...
Assessing the prospects for telecoms operators in the ICT services markets - ...Assessing the prospects for telecoms operators in the ICT services markets - ...
Assessing the prospects for telecoms operators in the ICT services markets - ...
 
Getiss 16x9
Getiss 16x9Getiss 16x9
Getiss 16x9
 
Towards Secure Multi-network Video Services - Cable Congress 2015
Towards Secure Multi-network Video Services - Cable Congress 2015Towards Secure Multi-network Video Services - Cable Congress 2015
Towards Secure Multi-network Video Services - Cable Congress 2015
 
Shifting into the Drivers seat - TU Automotive Detroit - 2019
Shifting into the Drivers seat - TU Automotive Detroit - 2019Shifting into the Drivers seat - TU Automotive Detroit - 2019
Shifting into the Drivers seat - TU Automotive Detroit - 2019
 
Securing the modern data centre
Securing the modern data centreSecuring the modern data centre
Securing the modern data centre
 
EgyptNetwork Company profile v5
EgyptNetwork Company profile v5EgyptNetwork Company profile v5
EgyptNetwork Company profile v5
 
Innovation conference 26.05.2011
Innovation conference 26.05.2011Innovation conference 26.05.2011
Innovation conference 26.05.2011
 

Similar to We are F-Secure

Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 
JBoss Enterprise Middleware: Beneficios y propuesta de valor - Consuelo Sánch...
JBoss Enterprise Middleware: Beneficios y propuesta de valor - Consuelo Sánch...JBoss Enterprise Middleware: Beneficios y propuesta de valor - Consuelo Sánch...
JBoss Enterprise Middleware: Beneficios y propuesta de valor - Consuelo Sánch...
Nextel S.A.
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
SWITCHPOINT NV/SA
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Internap
 
Investor Presentation
Investor PresentationInvestor Presentation
Investor Presentation
Hint Creative Group
 
Savvis Overview
Savvis OverviewSavvis Overview
Savvis Overview
Darren Gryniuk
 
Value Plus April014
Value Plus April014 Value Plus April014
Value Plus April014
aditya0312
 
Purdicom Wireless Plus Roadshow Presentation
Purdicom Wireless Plus Roadshow PresentationPurdicom Wireless Plus Roadshow Presentation
Purdicom Wireless Plus Roadshow Presentation
Purdicom
 
Ixia Customer Presentation
Ixia Customer PresentationIxia Customer Presentation
Ixia Customer Presentation
Gilles Lejeune
 
Sasi it security market overview 3 15
Sasi it security market overview 3 15Sasi it security market overview 3 15
Sasi it security market overview 3 15
Dan Blank
 
NTT Group Overview 2015
NTT Group Overview 2015NTT Group Overview 2015
NTT Group Overview 2015
Alain Delvaux
 
Newsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel SalgueiroNewsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel Salgueiro
Fidel Angel Salgueiro
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
Scalar Decisions
 
F secure presentation
F secure presentationF secure presentation
F secure presentation
kwader Saudi
 
Light edge cloud computing
Light edge cloud computingLight edge cloud computing
Light edge cloud computing
Scott Riedel
 
LightEdge Solutions 2010 Vision
LightEdge Solutions 2010 VisionLightEdge Solutions 2010 Vision
LightEdge Solutions 2010 Vision
Kevin Schneider
 
LightEdge Cloud Computing
LightEdge Cloud ComputingLightEdge Cloud Computing
LightEdge Cloud Computing
Scott Riedel
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
Jean Ryu
 
Broadvox Company Intro 2011
Broadvox Company Intro 2011Broadvox Company Intro 2011
Broadvox Company Intro 2011
chadkrantz
 
PDT 94 - $15m - Series A - Cloudsmith.pdf
PDT 94 - $15m - Series A - Cloudsmith.pdfPDT 94 - $15m - Series A - Cloudsmith.pdf
PDT 94 - $15m - Series A - Cloudsmith.pdf
HajeJanKamps
 

Similar to We are F-Secure (20)

Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
JBoss Enterprise Middleware: Beneficios y propuesta de valor - Consuelo Sánch...
JBoss Enterprise Middleware: Beneficios y propuesta de valor - Consuelo Sánch...JBoss Enterprise Middleware: Beneficios y propuesta de valor - Consuelo Sánch...
JBoss Enterprise Middleware: Beneficios y propuesta de valor - Consuelo Sánch...
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Investor Presentation
Investor PresentationInvestor Presentation
Investor Presentation
 
Savvis Overview
Savvis OverviewSavvis Overview
Savvis Overview
 
Value Plus April014
Value Plus April014 Value Plus April014
Value Plus April014
 
Purdicom Wireless Plus Roadshow Presentation
Purdicom Wireless Plus Roadshow PresentationPurdicom Wireless Plus Roadshow Presentation
Purdicom Wireless Plus Roadshow Presentation
 
Ixia Customer Presentation
Ixia Customer PresentationIxia Customer Presentation
Ixia Customer Presentation
 
Sasi it security market overview 3 15
Sasi it security market overview 3 15Sasi it security market overview 3 15
Sasi it security market overview 3 15
 
NTT Group Overview 2015
NTT Group Overview 2015NTT Group Overview 2015
NTT Group Overview 2015
 
Newsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel SalgueiroNewsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel Salgueiro
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
 
F secure presentation
F secure presentationF secure presentation
F secure presentation
 
Light edge cloud computing
Light edge cloud computingLight edge cloud computing
Light edge cloud computing
 
LightEdge Solutions 2010 Vision
LightEdge Solutions 2010 VisionLightEdge Solutions 2010 Vision
LightEdge Solutions 2010 Vision
 
LightEdge Cloud Computing
LightEdge Cloud ComputingLightEdge Cloud Computing
LightEdge Cloud Computing
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 
Broadvox Company Intro 2011
Broadvox Company Intro 2011Broadvox Company Intro 2011
Broadvox Company Intro 2011
 
PDT 94 - $15m - Series A - Cloudsmith.pdf
PDT 94 - $15m - Series A - Cloudsmith.pdfPDT 94 - $15m - Series A - Cloudsmith.pdf
PDT 94 - $15m - Series A - Cloudsmith.pdf
 

More from Digital Catapult

LPWAN London Meetup: LPWAN Use Cases
LPWAN London Meetup: LPWAN Use CasesLPWAN London Meetup: LPWAN Use Cases
LPWAN London Meetup: LPWAN Use Cases
Digital Catapult
 
LPWAN London Meetup: Securing your IoT products
LPWAN London Meetup: Securing your IoT productsLPWAN London Meetup: Securing your IoT products
LPWAN London Meetup: Securing your IoT products
Digital Catapult
 
LPWAN London Meetup: Solving Urban Challenges
LPWAN London Meetup: Solving Urban ChallengesLPWAN London Meetup: Solving Urban Challenges
LPWAN London Meetup: Solving Urban Challenges
Digital Catapult
 
LPWAN London Meetup: All Things Talk
LPWAN London Meetup: All Things TalkLPWAN London Meetup: All Things Talk
LPWAN London Meetup: All Things Talk
Digital Catapult
 
Things Connected: Open Call
Things Connected: Open CallThings Connected: Open Call
Things Connected: Open Call
Digital Catapult
 
Community-led IoT projects
Community-led IoT projectsCommunity-led IoT projects
Community-led IoT projects
Digital Catapult
 
Exploring the potential for LPWAN for agri-tech
Exploring the potential for LPWAN for agri-techExploring the potential for LPWAN for agri-tech
Exploring the potential for LPWAN for agri-tech
Digital Catapult
 
EVRYTHNG - LPWAN Meetup #2
EVRYTHNG - LPWAN Meetup #2EVRYTHNG - LPWAN Meetup #2
EVRYTHNG - LPWAN Meetup #2
Digital Catapult
 
OpenTRV - LPWAN Meetup #2
OpenTRV - LPWAN Meetup #2OpenTRV - LPWAN Meetup #2
OpenTRV - LPWAN Meetup #2
Digital Catapult
 
Flood Network - LPWAN Meetup #2
Flood Network - LPWAN Meetup #2Flood Network - LPWAN Meetup #2
Flood Network - LPWAN Meetup #2
Digital Catapult
 
Arqiva - LPWAN Meetup #1
Arqiva - LPWAN Meetup #1Arqiva - LPWAN Meetup #1
Arqiva - LPWAN Meetup #1
Digital Catapult
 
Everynet - LPWAN Meetup #1
Everynet - LPWAN Meetup #1Everynet - LPWAN Meetup #1
Everynet - LPWAN Meetup #1
Digital Catapult
 
LPWAN Meetup #1
LPWAN Meetup #1LPWAN Meetup #1
LPWAN Meetup #1
Digital Catapult
 
F-Interop Open Call: Webinar
F-Interop Open Call: WebinarF-Interop Open Call: Webinar
F-Interop Open Call: Webinar
Digital Catapult
 
Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group
Digital Catapult
 
F-interop Meetup
F-interop MeetupF-interop Meetup
F-interop Meetup
Digital Catapult
 
Data City | Data Nation: Health & Wellness Challenge
Data City | Data Nation: Health & Wellness ChallengeData City | Data Nation: Health & Wellness Challenge
Data City | Data Nation: Health & Wellness Challenge
Digital Catapult
 
Data City | Data Nation Launch - DEX
Data City | Data Nation Launch - DEXData City | Data Nation Launch - DEX
Data City | Data Nation Launch - DEX
Digital Catapult
 
Data City | Data Nation Launch
Data City | Data Nation Launch Data City | Data Nation Launch
Data City | Data Nation Launch
Digital Catapult
 
Startup Session: Hiring & Firing
Startup Session: Hiring & FiringStartup Session: Hiring & Firing
Startup Session: Hiring & Firing
Digital Catapult
 

More from Digital Catapult (20)

LPWAN London Meetup: LPWAN Use Cases
LPWAN London Meetup: LPWAN Use CasesLPWAN London Meetup: LPWAN Use Cases
LPWAN London Meetup: LPWAN Use Cases
 
LPWAN London Meetup: Securing your IoT products
LPWAN London Meetup: Securing your IoT productsLPWAN London Meetup: Securing your IoT products
LPWAN London Meetup: Securing your IoT products
 
LPWAN London Meetup: Solving Urban Challenges
LPWAN London Meetup: Solving Urban ChallengesLPWAN London Meetup: Solving Urban Challenges
LPWAN London Meetup: Solving Urban Challenges
 
LPWAN London Meetup: All Things Talk
LPWAN London Meetup: All Things TalkLPWAN London Meetup: All Things Talk
LPWAN London Meetup: All Things Talk
 
Things Connected: Open Call
Things Connected: Open CallThings Connected: Open Call
Things Connected: Open Call
 
Community-led IoT projects
Community-led IoT projectsCommunity-led IoT projects
Community-led IoT projects
 
Exploring the potential for LPWAN for agri-tech
Exploring the potential for LPWAN for agri-techExploring the potential for LPWAN for agri-tech
Exploring the potential for LPWAN for agri-tech
 
EVRYTHNG - LPWAN Meetup #2
EVRYTHNG - LPWAN Meetup #2EVRYTHNG - LPWAN Meetup #2
EVRYTHNG - LPWAN Meetup #2
 
OpenTRV - LPWAN Meetup #2
OpenTRV - LPWAN Meetup #2OpenTRV - LPWAN Meetup #2
OpenTRV - LPWAN Meetup #2
 
Flood Network - LPWAN Meetup #2
Flood Network - LPWAN Meetup #2Flood Network - LPWAN Meetup #2
Flood Network - LPWAN Meetup #2
 
Arqiva - LPWAN Meetup #1
Arqiva - LPWAN Meetup #1Arqiva - LPWAN Meetup #1
Arqiva - LPWAN Meetup #1
 
Everynet - LPWAN Meetup #1
Everynet - LPWAN Meetup #1Everynet - LPWAN Meetup #1
Everynet - LPWAN Meetup #1
 
LPWAN Meetup #1
LPWAN Meetup #1LPWAN Meetup #1
LPWAN Meetup #1
 
F-Interop Open Call: Webinar
F-Interop Open Call: WebinarF-Interop Open Call: Webinar
F-Interop Open Call: Webinar
 
Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group
 
F-interop Meetup
F-interop MeetupF-interop Meetup
F-interop Meetup
 
Data City | Data Nation: Health & Wellness Challenge
Data City | Data Nation: Health & Wellness ChallengeData City | Data Nation: Health & Wellness Challenge
Data City | Data Nation: Health & Wellness Challenge
 
Data City | Data Nation Launch - DEX
Data City | Data Nation Launch - DEXData City | Data Nation Launch - DEX
Data City | Data Nation Launch - DEX
 
Data City | Data Nation Launch
Data City | Data Nation Launch Data City | Data Nation Launch
Data City | Data Nation Launch
 
Startup Session: Hiring & Firing
Startup Session: Hiring & FiringStartup Session: Hiring & Firing
Startup Session: Hiring & Firing
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 

We are F-Secure

  • 3. WEARE#1INSECURITY 155.1 Revenues MEUR Operating Profit MEUR Personnel 27.1 R&D Investments of Revenues27% 939 Pioneering technology year after year BLACKLIGHT DEEPGUARD ORSP LISTED ON NASDAQ OMX Consistently ranked among the best by AV-Test, AV comparatives and numerous 3rd parties
  • 4. Operators Service partners and IT resellers Direct Consumers and Small & Medium- sized Businesses WEWORKWITH200+ OPERATORSAND6,000+ SERVICEPARTNERS Serving tens of millions of people in 40+ countries.
  • 6. WHATMAKES F-SECURE UNIQUE? TRUSTED VENDOR FROM A TRUSTED COUNTRY SUPERB USABILITY LEADER IN CLOUD-BASED SECURITY BIG ENOUGH TO BE CREDIBLE – SMALL ENOUGH TO BE NIMBLE
  • 7. 7 Content SDK OPI & OAuth FSIO platform Object storage & synchronization Service provisioning Service Enabler platform F-Secure Content Cloud Platform Native mobile & desktop Sync & Backup clients HTML5 App Authentication OneID platform CRM IdP OneID provides Single Sign On support and IdP F-Secure Content Cloud provides unique secure storage that can be accessed anywhere, anytime from multiple devices. Your subscribers can sync, share, and stream their content from one convenient cloud location, while F-Secure's proven expertise in security guarantees their irreplaceable content will be safe Updates GUTS platform
  • 8. © F-Secure Confidential8 Workflow Management & Secure Sandbox Workers Thumbnail | Transcode | Locate | DRM | Index | Pdf | External Workers ( face, transcribing) Object Storage Load balancer| Multi AZ | Compatibility Layer | Multisite Frontend API DDS Metadata | Contacts | Messages Rest API PostgreSQL Cluster Directly attached storage APIs Data API Admin API B3 S3 SWIFT NetApp Cloud Aggregator Authentication | Synchronization Cloud Connector Events API Notification Service FSIO Platform SOA Architecture Virtualized and Storage Agnostic Malware Scan
  • 9. SecuringDataonTransit, ProcessingandStorage Encryption of Data on Transit Encryption in storage, Storage access control, content origin obfuscation, and encryption of data in storage Layered Security Model and Content processing in secure sandbox Store Sync, Share, Search, Scan, Transcode & Stream … View & Create Transit
  • 10. ServiceLayeredSecurityModel inF-SecureContentCloud © F-Secure ConfidentialJanuary 23, 2015 Authenticate Authorize & Access Control Privacy Service , Network & Interface SegregationInput Validation Sanitized Input Access & Segregation (SEDA) Staged Event-Driven Architecture Sandbox Audit TrailMonitoring Content Security Scanning Object origin obfuscation Controlled Execution Content Exploit Protection User Access Data Store Account Provisioning Data Store Metadata Distributed Data Store Object/File Store Data Isolation

Editor's Notes

  1. We have been doing this for over 25 years. In short: we know what we’re doing. We have the capability to protect the current business and build new businesses within our domain. The story in a nutshell The first computer virus was discovered in 1986. It did not take long for people to realize that computers connected together would not only enable great things, but also make you more vulnerable. Two years later in 1988, F-Secure was founded in Finland. In the global environment we work in, we take pride in our roots that embraces privacy, integrity and equality – and a small bit of finnish crazyness, "sisu" to have the guts to challenge everything and anything necessary. All these qualities have led us where we are as a company. Today the whole world is even more connected. You use your devices at home, at work and on the road. For us it means that we have an even bigger job to do. It’s about fighting for digital freedom. Your freedom. It is freedom that pushes us to create better products and services, so that you can live your digital life without worries. We create and share more and more content every day, and because of that security has become very personal. For us, freedom is about making sure that you are the one who is in control. F-Secure is a company that protects your content and your privacy everywhere. On a more fundamental level, it’s really about making sure that technology acts as a liberator today, and tomorrow. Together with you, we fight for your digital freedom. And today we are needed more than ever. Join the freedom movement.
  2. We are #1, as constantly verified by independent partners. We are big enough to be credible, but small enough to be nimble. Technology firsts   BlackLight: F-Secure rootkit detection technology released in 2005. First rootkit detector integrated to a security suite. Based on comparing two views of the system and finding anomalies there. Blacklight helps to discover and remove malware that is hiding so deep in the PC that even the Operating System cannot see that.   DeepGuard: F-Secure's behavior blocker technology first introduced in 2006. DG analyzes starting apps and monitors what they do. Suspicious applications are blocked from starting and suspicious activities are stopped. Blocks applications that have suspicious activities but are not yet detected by signature-based scanning. Latest generation introduces generic exploit protection. In 2013 exploits are the most common vector for infection and zero-day exploits are not uncommon. Hence, it is really important to have generic blocking for browser and document exploits.   Object Reputation Service Platform (ORSP): Cloud-based technology for querying the reputation of object such as files, URLs, certificates, etc.
  3. We serve consumers and SMBs through 3 equally important channels.
  4. We hide all the complexity from the users and provide one-click, simplified security.
  5. Thank you!