Post on 29-Jun-2020
transcript
YOUR BUSINESS DESERVES THE
BEST PROTECTION
Award winning cyber security solutions and services for todays businesses.
Developed by an European innovator in information security.
2
Leading research & development since 1988. With many inventions that are commonplace in today’s
IT security industry.
From Finland, Europe, publicly listed on NASDAQ OMX Helsinki
Ltd. since 1999
WE ARE F-SECURE
OF SECURITY EXPERIENCE FROM FINLAND, EUROPE
28 YEARS
3
FINLAND
BELGIUM
DENMARK
SPAI
N
ITALY
NORWAY
POLAND
RUSSIA
UNITED KINGDOM
AUSTRALIA
CHINA
HONG
KONG INDIA
JAPAN
MALAYSIA
SINGAPORE
UNITED STATES
COLOMBIA
MEXICO
BRAZIL
CHILE
FRANCE
PROTECTING BUSINESSES IN 100+ COUNTRIES OUT OF 25
OFFICES
NETHERLANDS GERMANY
SWEDE
N
MALAYSIA OFFICE
- R&D, software development
- Malware detection (AMU)
- Technical Support
- Finance services
- Sales and Marketing services
© F-Secure Confidential 4
MSC status in May 2006
© F-Secure Confidential
worldmap3.f-secure.com
© F-Secure Confidential
450 000 Malware samples analyzed per day
SCOPE OF SECURITY
6 BILLION Reputation queries
per day
35 000 Android malware
samples analyzed per day
DON’T BE AN EASY TARGET
8
CYBER ATTACKS RELY
ON BUGS IN OUTDATED SOFTWARE
4/5
9
1989 AIDS
2016 PETYA
© F-Secure Confidential 10
Ransom: Win32/Adslock.A
Ransom: Win32/Cribit.A Ransom: Win32/Crilock.A
© F-Secure Confidential 11
12
Trusted by millions of customers worldwide, served through 200+
operators and 3500+ local reseller partners.
Consistently the best protection –
proven by independent 3rd party tests
YOUR BEST
CHOICE
© F-Secure Confidential 13
The best security is about CONSISTENCY
Statistics from AV Test
ONLY RESULTS MATTER
6 out of 6 on AV Test No other vendor can show this
track record
CONSISTENCY GOES BEYOND ONE MONTH OR
YEAR…
14
F-Secure is the only vendor to have consistently, over the past 3 years, received 6
out of 6 for overall protection from the independent AV-Test organization
© F-Secure Confidential 15
THE REAL-WORLD TESTS
17
BEST PROTECTION AWARDS
OUR APPROACH TO CYBER SECURITY
WE SEE THINGS OTHERS DON’T
18
CYBER SECURITY IS A PROCESS
19
Understand your risk, know your attack
surface, uncover weak spots
React to breaches, mitigate the damage,
analyze and learn
Minimize attack surface,
prevent incidents
Recognize incidents and threats, isolate and
contain them
ENDPOINT PROTECTION IS THE CORE ELEMENT OF
CYBER SECURITY
© F-Secure Confidential 20
“NEXT-GEN” SINCE 10 YEARS
21
2006 – DeepGuard 1.0
From what it looks like to what it
does. The first version of
DeepGuard is introduced as a
response to the accelerating rate
of new malware.
2008 – DeepGuard 2.0
DeepGuard starts utilising the
F-Secure Cloud for file
reputation data.
2010 – DeepGuard
3.0
Expanded use of metadata.
DeepGuard now uses
prevalence data.
2011 – DeepGuard
4.0
Expanded focus on
prevalence. Even faster and
more accurate response to
quickly evolving threat
scenarios.
2013 – DeepGuard
5.0
DeepGuard now prevents
exploits in commonly
targeted applications.
Coming –DeepGuard
6.0
On-the-fly behavioural
analysis is performed more
accurately and with lower
system impact.
MODERN ENDPOINT PROTECTION
IS MUCH MORE
22
Advanced multi-endpoint security solution with streamlined central management
Scalable security for full control and advanced central management.
Local installation, on-site servers
Advanced management and
reporting
BUSINESS SUITE PROTECTION SERVICE FOR BUSINESS
Cloud-based, no servers needed
Streamlined management and
reporting
WHAT IS YOUR PREFERENCE? Cloud service or On-premise solution
ALSO STANDALONE EMAIL PROTECTION SOLUTIONS
AVAILABLE
24
On site, self managed,
appliance or VMware
Cloud service, hosted by F-
Secure
PROTECTION SERVICE FOR EMAIL
MESSAGING SECURITY GATEWAY
VIRUS PROTECTION SPAM DETECTION ENCRYPTION
© F-Secure Confidential 27
BUSINESS SUITE
PREMIUM
Choose an all-in-
one package, or
get separate
licenses
© F-Secure Confidential 28
ADDED VALUE WITH BUSINESS SUITE
PREMIUM
SOFTWARE
UPDATER
WEB CONTENT
CONTROL
CONNECTION
CONTROL
VIRTUAL
SECURITY
© F-Secure Confidential 29
BUSINESS SUITE
STANDARD
Choose a basic
package,
or get separate
licenses
© F-Secure Confidential 30
KEY SECURITY FEATURES
© F-Secure Confidential 31
CONTROL INTERNET USE – ENHANCE SECURITY
Web Content Control
Control and manage what users are allowed to do in
the company network. Restrict inappropriate internet
use and help increase security and productivity.
ADD AN EXTRA LAYER OF PROTECTION
© F-Secure Confidential 32
Connection Control
Helps you protect users against harmful
activity when accessing online banking and
other business critical sites.
OPTIMIZE PERFORMANCE FOR VIRTUAL
ENVIRONMENTS
© F-Secure Confidential 33
Virtual Security
Allows you to offload scanning to improve
performance and at the same time keep your
environment totally secure
AVOID GAPS IN YOUR PROTECTION
© F-Secure Confidential 34
Software Updater
Keep Windows and 3rd party applications
automatically up to date and patched against
vulnerabilities and avoid up to over 80% of all
cyber attacks.
Most current attacks exploit known vulnerabilities for which a patch or mitigating control is available. Source: Gartner, Threat and Vulnerability Management Primer for 2016, January 2016, Oliver Rochford, Lawrence Orans
STOP ATTACKS BEFORE THEY ENTER
© F-Secure Confidential 35
Advanced Protection
Block certain content from unknown and
suspicious sites and provide an additional layer
of protection in your environment..
REPEL BOTNETS AND RANSOMWARE EFFECTIVELY
© F-Secure Confidential 36
Botnet Blocker
Bring down botnet activities in your
network by blocking Domain Name
System queries to domains with
malicious reputation..
© F-Secure Confidential 37
POLICY MANAGER
EMAIL AND SERVER
SECURITY
LINUX SECURITY
CLIENT SECURITY
VIRTUAL SECURITY
CLIENT SECURITY FOR MAC
SERVER SECURITY
FOR WINDOWS
INTERNET GATEKEEPER
BUSINESS SUITE MODULES
ADVANCED PROXY
CENTRAL MANAGEMENT
© F-Secure Confidential 38
• EASIER & SMARTER way to manage IT security in one place
• AUTOMATED updates to keep all levels of IT infrastructure safe
• Define and distribute security policies, and monitor your company's overall security
• Improved control and profitability with Web Content Control and Connection Control for Client Security Premium
© F-Secure Confidential 39
THIS IS POLICY MANAGER
SECURITY MONITORING
PATCH MANAGEME
NT
CENTRAL DEPLOYMEN
T
REPORTING
APPLICATION CONTROL
AD SYNCHRONIZATI
ON
POLICY HIERARCHY
AUTOMATIC UPDATES
MYSQL SUPPORT
SECURITY MANAGEME
NT
ADVANCED PROXY
SYSLOG SUPPORT
DESKTOP AND LAPTOP SECURITY FOR WINDOWS
© F-Secure Confidential 40
• AWARDED multilayer security for desktops and laptops
• Minimal performance impact makes it perfect for even older hardware
• Contains DeepGuard for protection against 0-day vulnerabilities
• Numerous advanced features in Premium version, such as Software Updater, Web Content Control, Connection Control
© F-Secure Confidential 41
DEEPGUARD ADVANCED FIREWALL
ADVANCED PROTECTION
MULTI-ENGINE ANTI-MALWARE
CONNECTION CONTROL
DEVICE CONTROL
SECURITY CLOUD
BROWSING PROTECTION
CLIENT SECURITY FOR WINDOWS
BOTNET BLOCKER
PATCH MANAGEMENT
WEB CONTENT CONTROL
SECURITY FOR SERVERS
© F-Secure Confidential 42
• Security for Windows, Linux, Citrix and Terminal servers
• Software Updater* for automatic patch management
• Scheduled and on-demand scanning, anti-spam and browsing protection.
* Premium version only
SECURE COMMUNICATION
AND COLLABORATION
© F-Secure Confidential 43
• Protects Email communication against harmful emails and spam
• Microsoft SharePoint* component with advanced anti-malware
• Microsoft Exchange component with highly accurate spam filtering and anti-malware
E-MAIL AND SERVER SECURITY
© F-Secure Confidential 44
Real-time protection for file servers, Microsoft Terminal Servers and Citrix,
Microsoft Exchange and SharePoint Servers and EMC Storage Servers
(CAVA).
Scheduled and on-demand scanning
Software Updater
Anti-spam
Browsing protection
Central management with Policy Manager
Available in several languages
Minimizes impact for virtualized environments
OPTIMIZED VIRTUAL SECURITY
© F-Secure Confidential 45
• AWARDED multilayer technology for virtual desktops and servers
• Optimized performance for virtual environments
• Now available in a single license with Business Suite Premium
• Supports multiple virtual platforms: Vmware, Citrix, Hyper-V and KVM
© F-Secure Confidential 46
Virtual Appliance Virtual Machine
Policy manager Scanning and Reputation
Server OS OS
policies, statistics, alerts, updates
scan requests, files, results
Cache
Virtual Desktop Virtual Desktop Virtual Server Virtual Server
Programs
Client Security
Premium
OS OS OS OS
Programs Programs Programs
Client Security Server Security Email and Server
Security
HYPERVISOR
orsp
updates
WEB FILTERING WITH INTERNET GATEKEEPER
© F-Secure Confidential 47
• Gateway level protection against malware in mail, browsing and file transfers
• Scans incoming and outgoing SMTP and POP3, HTTP and FTP traffic for all types of malware
• Stop harmful content from spreading via the Internet
• Includes Web Content Control for improved security and efficiency
• Supports also EMC Isilon storage servers
© F-Secure Confidential 48
EMAIL AND WEB MALWARE
SCANNING
EMAIL SPAM SCANNING
SECURITY CLOUD
INTERNET GATEKEEPER
EMC ISILON
SUPPORT
WEB CONTENT CONTROL
LINUX SECURITY
© F-Secure Confidential 49
• Protects Linux machines and network storages effectively against malware, spyware, riskware, and attacks from the network
• Can be easily deployed and managed in mixed environments
• Provides real-time, on-the-fly anti-virus scanning prevents distributing harmful content across machines
• Host Intrusion Detection and Prevention Keeps hackers and crackers from opening backdoors, installing rootkits, changing critical files, or saving unwanted files on corporate server and desktops
© F-Secure Confidential 50
LINUX SECURITY
REAL-TIME PROTECTION
ADVANCED ANTI-MALWARE
INTEGRITY CHECKING
CENTRAL MANAGEMENT
FIREWALL
CLIENT SECURITY FOR MAC
© F-Secure Confidential 51
• Provides core elements of business security for Macs
• Provides integration with F-Secure Security Cloud
• Offers anti-malware, banking protection and browsing protection
• Controls Mac firewall
© F-Secure Confidential 52
BANKING PROTECTION
ADVANCED ANTI-MALWARE
SECURITY CLOUD
BROWSING PROTECTION
CLIENT SECURITY FOR MAC
FIREWALL
€
F-SECURE PROXY
© F-Secure Confidential 53
• Significantly reduce network traffic
• Increase scalability by distributing the load from Policy Manager to Proxy servers
• Control and distribute signature updates and third party software updates provided by Software Updater
• Support one or more Proxy instances as configured in the policy
ADVANCED PROXY
© F-Secure Confidential 54
WINDOWS | MAC | ANDROID | IOS | SERVERS
PROTECTION SERVICE FOR BUSINESS
Awarded security for the latest Windows and Mac endpoints, with
Patch Management.
COMPUTERS Security and control for iOS &
Android devices, with MDM, VPN and Anti-Malware.
MOBILES Powerful and modern security for your Windows, Linux and
Citrix servers
SERVERS
Designed to accelerate security management and to give better visibility and control over all your end-points.
MANAGEMENT PORTAL
Managing all your security needs from one portal saves you time and effort
Graphical dashboards enable monitoring of the security levels and incidents
Designed for faster management and better visibility & control over all your end-points.
No need to deploy or maintain server hardware - it’s a hosted service
Less maintenance: automated 3rd party patches, and client + security updates
MANAGEMENT
SUBSCRIPTION MANAGEMENT
SECURITY MONITORING
PATCH MANAGEMENT
CENTRAL DEPLOYMENT
GRAPHICAL REPORTING
MOBILE DEVICE
MANAGEMENT
SECURITY MANAGEMENT
MANAGEMENT HIERARCHY
AUTOMATIC UPDATES
MANAGEMENT PORTAL
Minimal performance impact, making it perfect for even older hardware
Integrated Patch Management keeps OS and 3rd party software up-to-date
Awarded security for latest Windows and Mac endpoints, with Patch Management.
Provides you industry leading detection* capabilities, 4 years in a row
Leverages heuristic analysis and real-time threat intelligence among others
AV-Test: ‘Best Protection’ 2011-14 AV-Comparatives: ‘Top Rated’ 2010-14
COMPUTERS
PATCH MANAGEMENT
SECURITY CLOUD
DEEPGUARD
BROWSING PROTECTIO
N
MULTI-ENGINE
ANTI-MALWARE
CONTENT TYPE
FILTERING
WINDOWS
COMPUTERS
CONNECTION CONTROL
WEB CONTENT CONTROL
ADVANCED FIREWALL
€
ADVANCED ANTI-
MALWARE
BROWSING PROTECTIO
N
SECURITY CLOUD
FIREWALL
BANKING PROTECTIO
N
MAC OSX
COMPUTERS
Integrated MDM capabilities allow fleet management & monitoring
‘Ultralight’ technology ensures minimal battery & performance impact
Security and control for iOS & Android devices, with MDM, VPN and Anti-malware
Includes mobile VPN capabilities in addition to advanced anti-malware
Increases mobile browsing speed up to 30%, reducing data usage
MOBILES
CONNECTION
PROTECTION
MOBILE ANTI-THEFT
FLEET AND DEVICE INFO
APPLICATION PROTECTIO
N
SECURITY MONITORING
TRACKING PROTECTIO
N
BROWSING PROTECTIO
N
PASSCODE ENFORCEMEN
T
VIRTUAL LOCATION
MOBILES
Minimal performance impact, allowing servers to run at peak performance
Integrated Patch Management keeps server & published applications up-to-date
Powerful and modern security for your Windows, Linux and Citrix servers
Utilizes pioneering technologies like heuristic analysis and real-time threat intelligence
Specialized components for dedicated Exchange & SharePoint servers
SERVERS
EXCHANGE PROTECTIO
N
SHAREPOINT PROTECTIO
N
WEB TRAFFIC SCANNING
SERVERS
PATCH MANAGEMENT
SECURITY CLOUD
DEEPGUARD
BROWSING PROTECTIO
N
MULTI-ENGINE
ANTI-MALWARE
CITRIX SUPPORT
F-SECURE MESSAGING SECURITY GATEWAY
© F-Secure Confidential 66
THE WEAKEST LINKS OF EMAIL
Human errors
• Confidential information falls into the wrong hands
Infections through malicious links
Controlling email volume
© F-Secure Confidential 67
1
2
3
THE SOLUTIONS
Automatic detection of confidential
information in email and encryption of email messages
Filtering malicious links in real time and malware protection
Self-learning spam filter that detects the
various types of email messages
© F-Secure Confidential 68
1 2 3
BENEFITS
© F-Secure Confidential 69
MSG offers complete defense against email threats with 99%+ anti-spam accuracy and 99%+ anti-virus protection.
Reduces the load on mail servers and the company network, minimizing the need for hardware investments.
Email encryption prevents accidental leaks of confidential data.
MSG offers total control and flexibility for email security.
Email Firewall
Module
WHAT IS MESSAGING SECURITY GATEWAY?
© F-Secure Confidential 70
All-in-one solution for anti-spam, anti-malware and encryption needs.
Helps detect and stop attacks even before they enter your network.
Easy-to-use tool – just install it and forget all about it.
Offers automatic control of confidential information.
Easy to implement and rebrand for your company needs.
Comes with enterprise- class availability and scalability
Simple to administer with no loss of control.
Judgement
Judgement
Judgement
F-Secure Virus
Protection Module
Span Detection
Module
Digital Assets
Regulatory
Compliance Module
URL Defense
Quarantine Reject Deliver Discard Retry Re-route
Reject – No more processing
Proofpoint Protection Server Message processing hub
Deliver now – No more processing
COMPLETE PROTECTION WITH A
SINGLE SOLUTION
© F-Secure Confidential 71
Email encryption Policy-based encryption Trusted partners TLS encryption Data Loss Prevention
Malware protection Signature-based Zero-hour threat
detection Parallel message
analysis Dynamic updates
Spam detection Categorization URL protection Self learning Global reputation check
FEATURES INCLUDED IN THE SOLUTION
Host Firewall Quarantine Management Alert Monitoring
Policy Route Management Branding Templates User / Group Management
Email Firewall End User Management Data Loss Prevention
© F-Secure Confidential 72
SMTP Rate Control LDAP Integration Digital Asset
Recipient Verification Smart Send Regulatory Compliance
Sender Policy Framework End User Digests Smart Identifiers
Bounce Management End User Portal Dictionaries
Domain Keys Identified Mail Reporting Business Partners
Global Features
EMAIL ENCRYPTION
© F-Secure Confidential 73
Sender Recipient
SMTP Server (e.g. Exchange)
F-Secure Messaging Security
Gateway
AES-256/DSA Hosted Key Service
ELIMINATE HUMAN ERRORS
© F-Secure Confidential 74
Digital Assets Module (MLX) analyzes and classifies your confidential
documents and then monitors for that information (or parts of that information)
in message stream.
Easy training Secure document
repository
Multiple categories
for documents
Detect all types of private data
inside email and attachments
AUTOMATIC REPORTING
© F-Secure Confidential 75
With the automatic reporting tool, you get an overview of the attempted and blocked attacks and can verify what emails are being filtered.
You can also get an overview of the overall status of email traffic in the company.
You can select what type of information you need to get.
More than 60 ready-made reporting templates and scheduled reports
Multiple ways to publish reports
Customized reporting for each customer
Branded reports according to your company’s visual guidelines
DEPLOYMENT AND INSTALLATION
© F-Secure Confidential 76
Designed as a gateway product to protect the email environment inside your network.
Supports hardware, virtual or hybrid deployment.
Easy and quick to implement in your current network environment.
Internet
Internal network
F-Secure Messaging
Security Gateway
Email server Local hosts
CHOOSE THE SUITABLE SECURITY PACKAGE
© F-Secure Confidential 77
1
2 Mailboxes
Inbound protection
Protection bundle
To get started –
choose your own
way to get
security – in the
cloud or on
premises
Choose the model
• Self managed (Messaging Security Gateway)
• Hardware
• Virtual appliance
• Hosted by F-Secure (Protection Service for E-mail)
Choose your own package
• Inbound protection
• Protection bundle • Inbound protection + email
encryption + DLP
INSTALL AND FORGET
© F-Secure Confidential 78
Automatic reporting
Automatic synchronization with Active Directory
Automatic end-user quarantine management
Automatic updates (patches, malware/spam definitions)
Automatic, self-learning email filtering
BEST PROTECTIO
N TECHNOLOGY IN THE
WORLD
© F-Secure Confidential 79
Advanced machine learning technology for unrivalled anti-
spam effectiveness
Ultimate protection against latest emails
threats. Real-time reputation check for the Spam and URL’s
Email Firewall blocks senders with bad
reputation
Award winning Antivirus engine with multilayer protection
Zero-Hour Threat Detection
Unbeatable E-mail Encryption and Data
Loss Prevention
Leader in Gartner’s
Magic Quadrant
© F-Secure Confidential 80
LEADERS FOR THE SEVENTH YEAR
© F-Secure Confidential 81
BUSINESS SUITE
PREMIUM
Choose an all-in-
one package, or
get separate
licenses
WINDOWS | MAC | ANDROID | IOS | SERVERS
PROTECTION SERVICE FOR BUSINESS
MESSAGING SECURITY GATEWAY
© F-Secure Confidential 83
Email encryption Policy-based encryption Trusted partners TLS encryption Data Loss Prevention
Malware protection Signature-based Zero-hour threat
detection Parallel message
analysis Dynamic updates
Spam detection Categorization URL protection Self learning Global reputation check
f-secure.com