WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock...

52
WE ARE F-SECURE 1

Transcript of WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock...

Page 1: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

WE ARE F-SECURE

1

Page 2: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

2

REVENUE SPLIT BY REGION

WE SEE THINGS OTHERS DON’T

Nordics

Rest of Europe

North America

Rest of the World ▪ F-Secure was established in1988 and listed on the Helsinki

Stock Exchange in 1999▪ Products:

➢ Security software and a wide range of cyber security services for businesses

➢ Consumer security and privacy solutions ▪ Products are sold in more than 100 countries by over 200

operators and thousands of resellers.

FACTS:

EURm

EURm

37%

41%

10%

13%

Page 3: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

F-SECURE IS FINANCIALLY SOLID

Page 4: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

4

VISION AND INVESTMENTS

4

VISION▪ Europe’s Leading Cyber Security Company▪ Continuing investments to high growth areas in enterprise/business security▪ Profitable growth in consumer business

.INVESTING IN PRODUCTS, CONSULTING AND SALES&MARKETING▪ Continuous investments in new products for businesses▪ Hiring new security professionals in R&D, security research, security consulting

and sales&marketing▪ Expanding our channel distribution in Europe and Japan▪ Continue selective M&A (recent acquisitions: Inverse Path, Little Flocker (F-

Secure XFence) and Digital Assurance)

Page 5: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

THREAT LANDSCAPE

5

Page 6: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential6

B2B SECURITY MARKET CONTINUES TO GROW

SIGNIFICANT CHANGES SHAPE THE INDUSTRY

B2B security market

Consumers are worried.

1

2

CHANGES IN SECURITY SPENDING

3

USE OF CLOUD SERVICES CONTINUES AT FASTER RATE

4

Regulation and sanctionsDigitalization

Budgets

shifting

Threat intel, endpoint detection & remediation, data loss prevention

Cloud90% of users opt for free security products

SaaS, PaaS, IaaSFrom on-premise to cloud

ERP, CRM, email, file servers and storage, collaboration, workloads

+10% Security services +<10%

Need for security services

Continuous attacks.Also on IoT and smart homes.

Business suffers

€€

Page 7: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

* Ponemon Institute: 2016 Cost of Data Breach Study: Global Analysis

$4 MILLIONthe average total cost of a data breach increased

from $3.79 to $4 million

€20 MILLION, OR 4% OF GLOBAL REVENUE

maximum fine for infringements, in the new EU General Data Protection Regulation (GDPR) law.

Page 8: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

SECURITY MARKET GROWTH

Most of F-Secure’sabsolute growth in 2016

Opportunity with expanded offering

Estimated growth pace in selected corporate

security market (%)

Page 9: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential9

Page 10: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

PREDICT PREVENT

DETECTRESPOND

ENDPOINT PROTECTION▪ Endpoint and server security▪ Security for virtualized

environments▪ Mobile security▪ Centralized management (cloud

and on premise)▪ Continuous service or as yearly

license

VULNERABILITYMANAGEMENT▪ Vulnerability scanning ▪ Vulnerability management▪ Automated patching

PREDICT▪ Security assessments▪ Threat analysis and attack surface

enumeration

CONSULTING SERVICES▪ Technical assessments▪ GRC assessments▪ Security investigations, forensics,

reverse engineering

ATTACK DETECTION AND REMEDIATION• Detection of attacks through

endpoint and server sensors• Decoy sensors to detect movements• As a service from the cloud

CYBER SECURITY IS A PROCESS

10

Page 11: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security
Page 12: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

MERGING MAN & MACHINE

50+ Million endpoints on-the-field collecting current threat information

1 000 000 samples / day

5 000 000 000 queries / day

Our elite team of security consultants and ethical hackers constantly feed new lessons, insights and attacker tactics from their frontline experiences

Page 13: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential13

ARTIFICIAL INTELLIGENCE CENTER OF EXCELLENCE (AICE)

Holistic utilization of • machine learning• big data• artificial intelligence

Labeled data are key assets of F-Secure Labs• More quality examples

lead to better machine learning results

F-SECURE LEADING PROTECTION

LEVEL

Page 14: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential14

MACHINE LEARNING

Heuristic Techniques

• Use of rules to discover malicious intent• Analysts determine rules based on malware analysis• Dynamic malware analysis –> emulation, sandbox –> expense

Challenges

• Exponential increase in digital objects• Human analysts cannot create the rules in time • Rules too complex and difficult to maintain• Need to trap anomalous behavior, not just malicious

Machine Learning

• “... a computer program is said to learn from experience E with respect to some task T and some performance measure P if its performance on T as measured by P improves with E ...” (Tom Mitchell, 1997)

• Bayesian-style machine learning: probabilistic programming languages, large labelled data sets

Page 15: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

INDEPENDENT TESTINGMATTERS

5 times winner of Best Protection award

6 out of 6 on AV Test for Overall Protection since the beginning of 2014

Page 16: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

ServicesPrediction, prevention, detection and

response services

ProductsManaged security products

CYBER SECURITY SERVICES▪ We provice both top-of-class cyber

security services and managed security products

▪ F-Secure has several hundred enterpriseswith critical IT systems as customers

▪ We ensure our clients

✓ understand their risks

✓ minimize their attack surface

✓ prevent incidents

✓ detect breaches and react to them while minimizing damages

Page 17: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

STRATEGY 2017-20

Page 18: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

DIRECTION OF TRAVEL

© F-Secure Confidential

19

Business-Centric Customer-Centric

Antivirus Cyber Solutions

Devices Infrastructure

100% Commitment to Customer Security

Page 19: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

WHAT STAYS THE SAME

© F-Secure Confidential20

Quality of Protection

Product Efficiency

Customer Support / ‘Expertise to Point of Need’

Page 20: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

DIGITAL ASSURANCE▪ UK Cyber Services expert company based in

London

▪ Acquired by F-Secure in May 2017

▪ IT Health Checks, Penetration Testing, Risk Assessment, Instant Response

▪ Financial, petrochemical, retail, communication, and defense industries

▪ CHECK IT Health Checks for UK HMG departments▪ Find weaknesses, vulnerabilities, configuration

faults

▪ CESG (NCSC) Listed Advisor Scheme▪ Secure Design, RMADS, Risk Assessment, Data

Privacy Assessment

© F-Secure Confidential21

Page 21: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

F-SECUREBUSINESS SOLUTIONS

Steve NurtonUK Technical Lead

Page 22: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential

WHAT BUSINESS HAVE TO PROTECTSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

Endpoints

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

Page 23: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

MAP YOURATTACK SURFACE

© F-Secure Confidential25

Page 24: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential26

END POINTS

MAP YOUR ATTACK SURFACE CONSIDERATIONS

FIREWALLS

SWITCHES

ROUTERS

WEB SERVERS

DNS SERVERS

DOMAIN CONTROLLERS

Discovery ALL IP Assets

Configuration errors

Improper patched Software

Implementationoversights

External website

breachesSQL Injection

Report and identifies

vulnerabilitiesReport on ALL

Assets

Page 25: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

End Points

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

Page 26: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

BREACH DETECTION

© F-Secure Confidential28

Page 27: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential29

BREACHES

BREACH DETECTION CONSIDERATIONS

ATTACK’S

DATA LOSS

BRAND DAMAGE

Detect When You Are Being

Breached

Where Is Last Seen Attackers

Presence

How Did The Attacker Get

Access

What Is The Attackers

Overall Foot Print

Where Is The Attackers Mistake

ATTACKERS ALWAYS MAKE

A MISTAKE

Breach Remediation Is

KEY

Page 28: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

End Points

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

Page 29: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

ENDPOINT

© F-Secure Confidential31

Page 30: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential32

Desktops

Laptops

Physical Servers

Virtual Estates

ENDPOINT PROTECTION CONSIDERATIONSMicrosoft

software patching3rd party software

patching

Automatic delivery of AV

definitions

URL website content filtering

Email protection

HTTPS website protection

Endpoint firewall configuration

URL whitelisting and blacklisting

URL reputational look up

Website downloadable

content

Virtual performance

savings

Page 31: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential33

Desktops

Laptops

Physical Servers

Virtual Servers

ENDPOINT POTENTIAL THREATS

RansomCryptoattacks

Malware

SpywareEmail Spoofing /

Phishing

Rouge Data

Auto Detection is KEY

Trojans

Page 32: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

Endpoints

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

Page 33: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

NETWORK STORAGE

© F-Secure Confidential35

Page 34: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential36

NAS

SAN

NETWORK STORAGE CONSIDERATIONS

Central Repository of Data

Protect corporate shareable content

Real-time protection for the

data

Quick delivery of data, not slowed

down by scanning

Page 35: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

End Points

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

Page 36: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

NETWORK APPLICATIONS

© F-Secure Confidential38

Page 37: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential39

SharePoint

Exchange

NETWORK APPLICATION CONSIDERATIONS

One Drive

Virus protection for email servers

Spam protectionVirus protection

for mailboxes

Real-time protection for

shareable content

First line of and known

vulnerabilities

Protect corporate shareable

content

Scanning uploaded and downloaded

content

defense against zero-day threats

Versioning for applications

Page 38: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

End Points

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

Page 39: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

GATEWAY

© F-Secure Confidential41

Page 40: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential42

SMTP

HTTP

GATEWAY CONSIDERATIONS

FTP

POP

FILE TRANSFER SCANNING

SPAM FILTERING

WEB CONTENT CONTROL

WEB TRAFFIC SCANNING

EMAIL TRAFFIC SCANNING

Page 41: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

End Points

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

Page 42: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

SMARTPHONE & TABLET

© F-Secure Confidential44

Page 43: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential45

MANAGEMENT

DATA

SMARTPHONE & TABLET CONSIDERATIONS

CONTROL

APPS

Protect devices in the field

Protect against WIFI hot spots

Application Protection

Tracking Attempts

URL repetitional lookup

Anti theft protection

Mobile fleet management

VPN Tunneling

Page 44: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

End Points

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

Page 45: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

CLOUDAPPLICATIONS &

SERVICES

© F-Secure Confidential47

Page 46: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential48

MANAGEMENT

DATA

CLOUD APPLICATIONS CONSIDERATIONS

CONTENT

File content monitoring

URL content monitoring

URL content filtering

Email content monitoring

Auto detect malicious content

Auto remediation of

malicious content

Page 47: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

End Points

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

Page 48: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

HOSTED EMAIL

© F-Secure Confidential50

Page 49: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential51

O365

HOSTED EMAIL CONSIDERATIONS

GOOGLEMAIL

Virus protection

Anti Spoofing

Email content monitoring

Malware protectionSpam protection

Data loss prevention

Email encryption capabilities

Page 50: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

End Points

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

Page 51: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

© F-Secure Confidential53

THANK YOU

Page 52: WE ARE F-SECURE€¦ · the World F-Secure was established in1988 and listed on the Helsinki Stock Exchange in 1999 Products: Security software and a wide range of cyber security

f-secure.com