SlideShare une entreprise Scribd logo
1  sur  11
WEARE
F-SECURE
.
OVER25YEARS
OFDIGITAL
SECURITY
EXPERIENCE
WEARE#1INSECURITY
155.1 Revenues MEUR
Operating Profit MEUR
Personnel
27.1
R&D Investments of Revenues27%
939
Pioneering
technology
year after year
BLACKLIGHT
DEEPGUARD
ORSP
LISTED ON NASDAQ OMX
Consistently ranked among the best by AV-Test, AV comparatives and numerous 3rd parties
Operators
Service partners and IT resellers
Direct
Consumers and
Small & Medium-
sized Businesses
WEWORKWITH200+
OPERATORSAND6,000+
SERVICEPARTNERS
Serving tens of millions of people in 40+ countries.
INFORMATION
SECURITYIS
COMPLEX.
OURPRODUCTS
ARENOT.
WHATMAKES
F-SECURE
UNIQUE?
TRUSTED VENDOR FROM A TRUSTED COUNTRY
SUPERB USABILITY
LEADER IN CLOUD-BASED SECURITY
BIG ENOUGH TO BE CREDIBLE – SMALL ENOUGH TO BE NIMBLE
7
Content SDK OPI & OAuth
FSIO
platform
Object storage & synchronization Service provisioning
Service Enabler
platform
F-Secure Content Cloud Platform
Native mobile & desktop Sync & Backup clients HTML5 App
Authentication
OneID
platform
CRM IdP
OneID provides Single
Sign On support and IdP
F-Secure Content Cloud provides unique secure storage that can
be accessed anywhere, anytime from multiple devices. Your
subscribers can sync, share, and stream their content from one
convenient cloud location, while F-Secure's proven expertise in
security guarantees their irreplaceable content will be safe
Updates
GUTS
platform
© F-Secure Confidential8
Workflow Management & Secure Sandbox Workers
Thumbnail | Transcode | Locate | DRM | Index | Pdf | External Workers ( face, transcribing)
Object Storage
Load balancer| Multi AZ | Compatibility Layer | Multisite
Frontend API
DDS
Metadata | Contacts | Messages
Rest API PostgreSQL Cluster
Directly attached storage
APIs
Data API Admin API
B3 S3 SWIFT NetApp
Cloud Aggregator
Authentication | Synchronization
Cloud Connector
Events API
Notification
Service
FSIO Platform SOA Architecture
Virtualized and Storage Agnostic
Malware Scan
SecuringDataonTransit,
ProcessingandStorage
Encryption of
Data on Transit
Encryption in storage,
Storage access control,
content origin obfuscation,
and encryption of data in storage
Layered Security Model and
Content processing in secure sandbox
Store
Sync, Share,
Search, Scan,
Transcode &
Stream …
View &
Create
Transit
ServiceLayeredSecurityModel
inF-SecureContentCloud
© F-Secure ConfidentialJanuary 23, 2015
Authenticate
Authorize & Access Control
Privacy
Service , Network
& Interface
SegregationInput Validation
Sanitized
Input
Access &
Segregation
(SEDA)
Staged Event-Driven Architecture
Sandbox
Audit TrailMonitoring
Content
Security
Scanning
Object origin
obfuscation
Controlled
Execution
Content
Exploit
Protection
User Access Data Store
Account Provisioning Data Store
Metadata Distributed Data Store
Object/File Store Data
Isolation
JOINTHE
MOVEMENT

Contenu connexe

Tendances

Tendances (7)

Assessing the prospects for telecoms operators in the ICT services markets - ...
Assessing the prospects for telecoms operators in the ICT services markets - ...Assessing the prospects for telecoms operators in the ICT services markets - ...
Assessing the prospects for telecoms operators in the ICT services markets - ...
 
Getiss 16x9
Getiss 16x9Getiss 16x9
Getiss 16x9
 
Towards Secure Multi-network Video Services - Cable Congress 2015
Towards Secure Multi-network Video Services - Cable Congress 2015Towards Secure Multi-network Video Services - Cable Congress 2015
Towards Secure Multi-network Video Services - Cable Congress 2015
 
Shifting into the Drivers seat - TU Automotive Detroit - 2019
Shifting into the Drivers seat - TU Automotive Detroit - 2019Shifting into the Drivers seat - TU Automotive Detroit - 2019
Shifting into the Drivers seat - TU Automotive Detroit - 2019
 
Securing the modern data centre
Securing the modern data centreSecuring the modern data centre
Securing the modern data centre
 
EgyptNetwork Company profile v5
EgyptNetwork Company profile v5EgyptNetwork Company profile v5
EgyptNetwork Company profile v5
 
Innovation conference 26.05.2011
Innovation conference 26.05.2011Innovation conference 26.05.2011
Innovation conference 26.05.2011
 

Similaire à We are F-Secure

Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 
Value Plus April014
Value Plus April014 Value Plus April014
Value Plus April014
aditya0312
 
Ixia Customer Presentation
Ixia Customer PresentationIxia Customer Presentation
Ixia Customer Presentation
Gilles Lejeune
 
NTT Group Overview 2015
NTT Group Overview 2015NTT Group Overview 2015
NTT Group Overview 2015
Alain Delvaux
 
Newsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel SalgueiroNewsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel Salgueiro
Fidel Angel Salgueiro
 
LightEdge Solutions 2010 Vision
LightEdge Solutions 2010 VisionLightEdge Solutions 2010 Vision
LightEdge Solutions 2010 Vision
Kevin Schneider
 
Broadvox Company Intro 2011
Broadvox Company Intro 2011Broadvox Company Intro 2011
Broadvox Company Intro 2011
chadkrantz
 

Similaire à We are F-Secure (20)

Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
JBoss Enterprise Middleware: Beneficios y propuesta de valor - Consuelo Sánch...
JBoss Enterprise Middleware: Beneficios y propuesta de valor - Consuelo Sánch...JBoss Enterprise Middleware: Beneficios y propuesta de valor - Consuelo Sánch...
JBoss Enterprise Middleware: Beneficios y propuesta de valor - Consuelo Sánch...
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Investor Presentation
Investor PresentationInvestor Presentation
Investor Presentation
 
Savvis Overview
Savvis OverviewSavvis Overview
Savvis Overview
 
Value Plus April014
Value Plus April014 Value Plus April014
Value Plus April014
 
Purdicom Wireless Plus Roadshow Presentation
Purdicom Wireless Plus Roadshow PresentationPurdicom Wireless Plus Roadshow Presentation
Purdicom Wireless Plus Roadshow Presentation
 
Ixia Customer Presentation
Ixia Customer PresentationIxia Customer Presentation
Ixia Customer Presentation
 
Sasi it security market overview 3 15
Sasi it security market overview 3 15Sasi it security market overview 3 15
Sasi it security market overview 3 15
 
NTT Group Overview 2015
NTT Group Overview 2015NTT Group Overview 2015
NTT Group Overview 2015
 
Newsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel SalgueiroNewsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel Salgueiro
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
 
F secure presentation
F secure presentationF secure presentation
F secure presentation
 
Light edge cloud computing
Light edge cloud computingLight edge cloud computing
Light edge cloud computing
 
LightEdge Cloud Computing
LightEdge Cloud ComputingLightEdge Cloud Computing
LightEdge Cloud Computing
 
LightEdge Solutions 2010 Vision
LightEdge Solutions 2010 VisionLightEdge Solutions 2010 Vision
LightEdge Solutions 2010 Vision
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 
Broadvox Company Intro 2011
Broadvox Company Intro 2011Broadvox Company Intro 2011
Broadvox Company Intro 2011
 
PDT 94 - $15m - Series A - Cloudsmith.pdf
PDT 94 - $15m - Series A - Cloudsmith.pdfPDT 94 - $15m - Series A - Cloudsmith.pdf
PDT 94 - $15m - Series A - Cloudsmith.pdf
 

Plus de Digital Catapult

Plus de Digital Catapult (20)

LPWAN London Meetup: LPWAN Use Cases
LPWAN London Meetup: LPWAN Use CasesLPWAN London Meetup: LPWAN Use Cases
LPWAN London Meetup: LPWAN Use Cases
 
LPWAN London Meetup: Securing your IoT products
LPWAN London Meetup: Securing your IoT productsLPWAN London Meetup: Securing your IoT products
LPWAN London Meetup: Securing your IoT products
 
LPWAN London Meetup: Solving Urban Challenges
LPWAN London Meetup: Solving Urban ChallengesLPWAN London Meetup: Solving Urban Challenges
LPWAN London Meetup: Solving Urban Challenges
 
LPWAN London Meetup: All Things Talk
LPWAN London Meetup: All Things TalkLPWAN London Meetup: All Things Talk
LPWAN London Meetup: All Things Talk
 
Things Connected: Open Call
Things Connected: Open CallThings Connected: Open Call
Things Connected: Open Call
 
Community-led IoT projects
Community-led IoT projectsCommunity-led IoT projects
Community-led IoT projects
 
Exploring the potential for LPWAN for agri-tech
Exploring the potential for LPWAN for agri-techExploring the potential for LPWAN for agri-tech
Exploring the potential for LPWAN for agri-tech
 
EVRYTHNG - LPWAN Meetup #2
EVRYTHNG - LPWAN Meetup #2EVRYTHNG - LPWAN Meetup #2
EVRYTHNG - LPWAN Meetup #2
 
OpenTRV - LPWAN Meetup #2
OpenTRV - LPWAN Meetup #2OpenTRV - LPWAN Meetup #2
OpenTRV - LPWAN Meetup #2
 
Flood Network - LPWAN Meetup #2
Flood Network - LPWAN Meetup #2Flood Network - LPWAN Meetup #2
Flood Network - LPWAN Meetup #2
 
Arqiva - LPWAN Meetup #1
Arqiva - LPWAN Meetup #1Arqiva - LPWAN Meetup #1
Arqiva - LPWAN Meetup #1
 
Everynet - LPWAN Meetup #1
Everynet - LPWAN Meetup #1Everynet - LPWAN Meetup #1
Everynet - LPWAN Meetup #1
 
LPWAN Meetup #1
LPWAN Meetup #1LPWAN Meetup #1
LPWAN Meetup #1
 
F-Interop Open Call: Webinar
F-Interop Open Call: WebinarF-Interop Open Call: Webinar
F-Interop Open Call: Webinar
 
Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group
 
F-interop Meetup
F-interop MeetupF-interop Meetup
F-interop Meetup
 
Data City | Data Nation: Health & Wellness Challenge
Data City | Data Nation: Health & Wellness ChallengeData City | Data Nation: Health & Wellness Challenge
Data City | Data Nation: Health & Wellness Challenge
 
Data City | Data Nation Launch - DEX
Data City | Data Nation Launch - DEXData City | Data Nation Launch - DEX
Data City | Data Nation Launch - DEX
 
Data City | Data Nation Launch
Data City | Data Nation Launch Data City | Data Nation Launch
Data City | Data Nation Launch
 
Startup Session: Hiring & Firing
Startup Session: Hiring & FiringStartup Session: Hiring & Firing
Startup Session: Hiring & Firing
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

We are F-Secure

  • 3. WEARE#1INSECURITY 155.1 Revenues MEUR Operating Profit MEUR Personnel 27.1 R&D Investments of Revenues27% 939 Pioneering technology year after year BLACKLIGHT DEEPGUARD ORSP LISTED ON NASDAQ OMX Consistently ranked among the best by AV-Test, AV comparatives and numerous 3rd parties
  • 4. Operators Service partners and IT resellers Direct Consumers and Small & Medium- sized Businesses WEWORKWITH200+ OPERATORSAND6,000+ SERVICEPARTNERS Serving tens of millions of people in 40+ countries.
  • 6. WHATMAKES F-SECURE UNIQUE? TRUSTED VENDOR FROM A TRUSTED COUNTRY SUPERB USABILITY LEADER IN CLOUD-BASED SECURITY BIG ENOUGH TO BE CREDIBLE – SMALL ENOUGH TO BE NIMBLE
  • 7. 7 Content SDK OPI & OAuth FSIO platform Object storage & synchronization Service provisioning Service Enabler platform F-Secure Content Cloud Platform Native mobile & desktop Sync & Backup clients HTML5 App Authentication OneID platform CRM IdP OneID provides Single Sign On support and IdP F-Secure Content Cloud provides unique secure storage that can be accessed anywhere, anytime from multiple devices. Your subscribers can sync, share, and stream their content from one convenient cloud location, while F-Secure's proven expertise in security guarantees their irreplaceable content will be safe Updates GUTS platform
  • 8. © F-Secure Confidential8 Workflow Management & Secure Sandbox Workers Thumbnail | Transcode | Locate | DRM | Index | Pdf | External Workers ( face, transcribing) Object Storage Load balancer| Multi AZ | Compatibility Layer | Multisite Frontend API DDS Metadata | Contacts | Messages Rest API PostgreSQL Cluster Directly attached storage APIs Data API Admin API B3 S3 SWIFT NetApp Cloud Aggregator Authentication | Synchronization Cloud Connector Events API Notification Service FSIO Platform SOA Architecture Virtualized and Storage Agnostic Malware Scan
  • 9. SecuringDataonTransit, ProcessingandStorage Encryption of Data on Transit Encryption in storage, Storage access control, content origin obfuscation, and encryption of data in storage Layered Security Model and Content processing in secure sandbox Store Sync, Share, Search, Scan, Transcode & Stream … View & Create Transit
  • 10. ServiceLayeredSecurityModel inF-SecureContentCloud © F-Secure ConfidentialJanuary 23, 2015 Authenticate Authorize & Access Control Privacy Service , Network & Interface SegregationInput Validation Sanitized Input Access & Segregation (SEDA) Staged Event-Driven Architecture Sandbox Audit TrailMonitoring Content Security Scanning Object origin obfuscation Controlled Execution Content Exploit Protection User Access Data Store Account Provisioning Data Store Metadata Distributed Data Store Object/File Store Data Isolation

Notes de l'éditeur

  1. We have been doing this for over 25 years. In short: we know what we’re doing. We have the capability to protect the current business and build new businesses within our domain. The story in a nutshell The first computer virus was discovered in 1986. It did not take long for people to realize that computers connected together would not only enable great things, but also make you more vulnerable. Two years later in 1988, F-Secure was founded in Finland. In the global environment we work in, we take pride in our roots that embraces privacy, integrity and equality – and a small bit of finnish crazyness, "sisu" to have the guts to challenge everything and anything necessary. All these qualities have led us where we are as a company. Today the whole world is even more connected. You use your devices at home, at work and on the road. For us it means that we have an even bigger job to do. It’s about fighting for digital freedom. Your freedom. It is freedom that pushes us to create better products and services, so that you can live your digital life without worries. We create and share more and more content every day, and because of that security has become very personal. For us, freedom is about making sure that you are the one who is in control. F-Secure is a company that protects your content and your privacy everywhere. On a more fundamental level, it’s really about making sure that technology acts as a liberator today, and tomorrow. Together with you, we fight for your digital freedom. And today we are needed more than ever. Join the freedom movement.
  2. We are #1, as constantly verified by independent partners. We are big enough to be credible, but small enough to be nimble. Technology firsts   BlackLight: F-Secure rootkit detection technology released in 2005. First rootkit detector integrated to a security suite. Based on comparing two views of the system and finding anomalies there. Blacklight helps to discover and remove malware that is hiding so deep in the PC that even the Operating System cannot see that.   DeepGuard: F-Secure's behavior blocker technology first introduced in 2006. DG analyzes starting apps and monitors what they do. Suspicious applications are blocked from starting and suspicious activities are stopped. Blocks applications that have suspicious activities but are not yet detected by signature-based scanning. Latest generation introduces generic exploit protection. In 2013 exploits are the most common vector for infection and zero-day exploits are not uncommon. Hence, it is really important to have generic blocking for browser and document exploits.   Object Reputation Service Platform (ORSP): Cloud-based technology for querying the reputation of object such as files, URLs, certificates, etc.
  3. We serve consumers and SMBs through 3 equally important channels.
  4. We hide all the complexity from the users and provide one-click, simplified security.
  5. Thank you!