Web Security : Secure Socket Layer Secure Electronic Transaction.
WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock...
Transcript of WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock...
![Page 1: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/1.jpg)
WE ARE F-SECURE
1
![Page 2: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/2.jpg)
2
REVENUE SPLIT BY REGION
WE SEE THINGS OTHERS DON’T
Nordics
Rest of Europe
North America
Rest of the World ▪ F-Secure was established in1988 and listed on the Helsinki
Stock Exchange in 1999▪ Products:
➢ Security software and a wide range of cyber security services for businesses
➢ Consumer security and privacy solutions ▪ Products are sold in more than 100 countries by over 200
operators and thousands of resellers.
FACTS:
EURm
EURm
37%
41%
10%
13%
![Page 3: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/3.jpg)
F-SECURE IS FINANCIALLY SOLID
![Page 4: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/4.jpg)
4
VISION AND INVESTMENTS
4
VISION▪ Europe’s Leading Cyber Security Company▪ Continuing investments to high growth areas in enterprise/business security▪ Profitable growth in consumer business
.INVESTING IN PRODUCTS, CONSULTING AND SALES&MARKETING▪ Continuous investments in new products for businesses▪ Hiring new security professionals in R&D, security research, security consulting
and sales&marketing▪ Expanding our channel distribution in Europe and Japan▪ Continue selective M&A (recent acquisitions: Inverse Path, Little Flocker (F-
Secure XFence) and Digital Assurance)
![Page 5: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/5.jpg)
THREAT LANDSCAPE
5
![Page 6: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/6.jpg)
© F-Secure Confidential6
B2B SECURITY MARKET CONTINUES TO GROW
SIGNIFICANT CHANGES SHAPE THE INDUSTRY
B2B security market
Consumers are worried.
1
2
CHANGES IN SECURITY SPENDING
3
USE OF CLOUD SERVICES CONTINUES AT FASTER RATE
4
Regulation and sanctionsDigitalization
Budgets
shifting
Threat intel, endpoint detection & remediation, data loss prevention
Cloud90% of users opt for free security products
SaaS, PaaS, IaaSFrom on-premise to cloud
ERP, CRM, email, file servers and storage, collaboration, workloads
+10% Security services +<10%
Need for security services
Continuous attacks.Also on IoT and smart homes.
Business suffers
€€
![Page 7: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/7.jpg)
* Ponemon Institute: 2016 Cost of Data Breach Study: Global Analysis
$4 MILLIONthe average total cost of a data breach increased
from $3.79 to $4 million
€20 MILLION, OR 4% OF GLOBAL REVENUE
maximum fine for infringements, in the new EU General Data Protection Regulation (GDPR) law.
![Page 8: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/8.jpg)
SECURITY MARKET GROWTH
Most of F-Secure’sabsolute growth in 2016
Opportunity with expanded offering
Estimated growth pace in selected corporate
security market (%)
![Page 9: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/9.jpg)
© F-Secure Confidential9
![Page 10: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/10.jpg)
PREDICT PREVENT
DETECTRESPOND
ENDPOINT PROTECTION▪ Endpoint and server security▪ Security for virtualized
environments▪ Mobile security▪ Centralized management (cloud
and on premise)▪ Continuous service or as yearly
license
VULNERABILITYMANAGEMENT▪ Vulnerability scanning ▪ Vulnerability management▪ Automated patching
PREDICT▪ Security assessments▪ Threat analysis and attack surface
enumeration
CONSULTING SERVICES▪ Technical assessments▪ GRC assessments▪ Security investigations, forensics,
reverse engineering
ATTACK DETECTION AND REMEDIATION• Detection of attacks through
endpoint and server sensors• Decoy sensors to detect movements• As a service from the cloud
CYBER SECURITY IS A PROCESS
10
![Page 11: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/11.jpg)
![Page 12: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/12.jpg)
MERGING MAN & MACHINE
50+ Million endpoints on-the-field collecting current threat information
1 000 000 samples / day
5 000 000 000 queries / day
Our elite team of security consultants and ethical hackers constantly feed new lessons, insights and attacker tactics from their frontline experiences
![Page 13: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/13.jpg)
© F-Secure Confidential13
ARTIFICIAL INTELLIGENCE CENTER OF EXCELLENCE (AICE)
Holistic utilization of • machine learning• big data• artificial intelligence
Labeled data are key assets of F-Secure Labs• More quality examples
lead to better machine learning results
F-SECURE LEADING PROTECTION
LEVEL
![Page 14: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/14.jpg)
© F-Secure Confidential14
MACHINE LEARNING
Heuristic Techniques
• Use of rules to discover malicious intent• Analysts determine rules based on malware analysis• Dynamic malware analysis –> emulation, sandbox –> expense
Challenges
• Exponential increase in digital objects• Human analysts cannot create the rules in time • Rules too complex and difficult to maintain• Need to trap anomalous behavior, not just malicious
Machine Learning
• “... a computer program is said to learn from experience E with respect to some task T and some performance measure P if its performance on T as measured by P improves with E ...” (Tom Mitchell, 1997)
• Bayesian-style machine learning: probabilistic programming languages, large labelled data sets
![Page 15: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/15.jpg)
INDEPENDENT TESTINGMATTERS
5 times winner of Best Protection award
6 out of 6 on AV Test for Overall Protection since the beginning of 2014
![Page 16: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/16.jpg)
ServicesPrediction, prevention, detection and
response services
ProductsManaged security products
CYBER SECURITY SERVICES▪ We provice both top-of-class cyber
security services and managed security products
▪ F-Secure has several hundred enterpriseswith critical IT systems as customers
▪ We ensure our clients
✓ understand their risks
✓ minimize their attack surface
✓ prevent incidents
✓ detect breaches and react to them while minimizing damages
![Page 17: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/17.jpg)
STRATEGY 2017-20
![Page 18: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/18.jpg)
DIRECTION OF TRAVEL
© F-Secure Confidential
19
Business-Centric Customer-Centric
Antivirus Cyber Solutions
Devices Infrastructure
100% Commitment to Customer Security
![Page 19: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/19.jpg)
WHAT STAYS THE SAME
© F-Secure Confidential20
Quality of Protection
Product Efficiency
Customer Support / ‘Expertise to Point of Need’
![Page 20: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/20.jpg)
DIGITAL ASSURANCE▪ UK Cyber Services expert company based in
London
▪ Acquired by F-Secure in May 2017
▪ IT Health Checks, Penetration Testing, Risk Assessment, Instant Response
▪ Financial, petrochemical, retail, communication, and defense industries
▪ CHECK IT Health Checks for UK HMG departments▪ Find weaknesses, vulnerabilities, configuration
faults
▪ CESG (NCSC) Listed Advisor Scheme▪ Secure Design, RMADS, Risk Assessment, Data
Privacy Assessment
© F-Secure Confidential21
![Page 21: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/21.jpg)
F-SECUREBUSINESS SOLUTIONS
Steve NurtonUK Technical Lead
![Page 22: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/22.jpg)
© F-Secure Confidential
WHAT BUSINESS HAVE TO PROTECTSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
Endpoints
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
![Page 23: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/23.jpg)
MAP YOURATTACK SURFACE
© F-Secure Confidential25
![Page 24: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/24.jpg)
© F-Secure Confidential26
END POINTS
MAP YOUR ATTACK SURFACE CONSIDERATIONS
FIREWALLS
SWITCHES
ROUTERS
WEB SERVERS
DNS SERVERS
DOMAIN CONTROLLERS
Discovery ALL IP Assets
Configuration errors
Improper patched Software
Implementationoversights
External website
breachesSQL Injection
Report and identifies
vulnerabilitiesReport on ALL
Assets
![Page 25: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/25.jpg)
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
End Points
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
![Page 26: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/26.jpg)
BREACH DETECTION
© F-Secure Confidential28
![Page 27: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/27.jpg)
© F-Secure Confidential29
BREACHES
BREACH DETECTION CONSIDERATIONS
ATTACK’S
DATA LOSS
BRAND DAMAGE
Detect When You Are Being
Breached
Where Is Last Seen Attackers
Presence
How Did The Attacker Get
Access
What Is The Attackers
Overall Foot Print
Where Is The Attackers Mistake
ATTACKERS ALWAYS MAKE
A MISTAKE
Breach Remediation Is
KEY
![Page 28: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/28.jpg)
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
End Points
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
![Page 29: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/29.jpg)
ENDPOINT
© F-Secure Confidential31
![Page 30: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/30.jpg)
© F-Secure Confidential32
Desktops
Laptops
Physical Servers
Virtual Estates
ENDPOINT PROTECTION CONSIDERATIONSMicrosoft
software patching3rd party software
patching
Automatic delivery of AV
definitions
URL website content filtering
Email protection
HTTPS website protection
Endpoint firewall configuration
URL whitelisting and blacklisting
URL reputational look up
Website downloadable
content
Virtual performance
savings
![Page 31: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/31.jpg)
© F-Secure Confidential33
Desktops
Laptops
Physical Servers
Virtual Servers
ENDPOINT POTENTIAL THREATS
RansomCryptoattacks
Malware
SpywareEmail Spoofing /
Phishing
Rouge Data
Auto Detection is KEY
Trojans
![Page 32: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/32.jpg)
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
Endpoints
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
![Page 33: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/33.jpg)
NETWORK STORAGE
© F-Secure Confidential35
![Page 34: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/34.jpg)
© F-Secure Confidential36
NAS
SAN
NETWORK STORAGE CONSIDERATIONS
Central Repository of Data
Protect corporate shareable content
Real-time protection for the
data
Quick delivery of data, not slowed
down by scanning
![Page 35: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/35.jpg)
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
End Points
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
![Page 36: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/36.jpg)
NETWORK APPLICATIONS
© F-Secure Confidential38
![Page 37: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/37.jpg)
© F-Secure Confidential39
SharePoint
Exchange
NETWORK APPLICATION CONSIDERATIONS
One Drive
Virus protection for email servers
Spam protectionVirus protection
for mailboxes
Real-time protection for
shareable content
First line of and known
vulnerabilities
Protect corporate shareable
content
Scanning uploaded and downloaded
content
defense against zero-day threats
Versioning for applications
![Page 38: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/38.jpg)
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
End Points
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
![Page 39: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/39.jpg)
GATEWAY
© F-Secure Confidential41
![Page 40: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/40.jpg)
© F-Secure Confidential42
SMTP
HTTP
GATEWAY CONSIDERATIONS
FTP
POP
FILE TRANSFER SCANNING
SPAM FILTERING
WEB CONTENT CONTROL
WEB TRAFFIC SCANNING
EMAIL TRAFFIC SCANNING
![Page 41: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/41.jpg)
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
End Points
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
![Page 42: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/42.jpg)
SMARTPHONE & TABLET
© F-Secure Confidential44
![Page 43: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/43.jpg)
© F-Secure Confidential45
MANAGEMENT
DATA
SMARTPHONE & TABLET CONSIDERATIONS
CONTROL
APPS
Protect devices in the field
Protect against WIFI hot spots
Application Protection
Tracking Attempts
URL repetitional lookup
Anti theft protection
Mobile fleet management
VPN Tunneling
![Page 44: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/44.jpg)
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
End Points
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
![Page 45: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/45.jpg)
CLOUDAPPLICATIONS &
SERVICES
© F-Secure Confidential47
![Page 46: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/46.jpg)
© F-Secure Confidential48
MANAGEMENT
DATA
CLOUD APPLICATIONS CONSIDERATIONS
CONTENT
File content monitoring
URL content monitoring
URL content filtering
Email content monitoring
Auto detect malicious content
Auto remediation of
malicious content
![Page 47: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/47.jpg)
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
End Points
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
![Page 48: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/48.jpg)
HOSTED EMAIL
© F-Secure Confidential50
![Page 49: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/49.jpg)
© F-Secure Confidential51
O365
HOSTED EMAIL CONSIDERATIONS
GOOGLEMAIL
Virus protection
Anti Spoofing
Email content monitoring
Malware protectionSpam protection
Data loss prevention
Email encryption capabilities
![Page 50: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/50.jpg)
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
End Points
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
![Page 51: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/51.jpg)
© F-Secure Confidential53
THANK YOU
![Page 52: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security](https://reader033.fdocuments.net/reader033/viewer/2022042406/5f20c9ae4d54f419047a3fe8/html5/thumbnails/52.jpg)
f-secure.com