Beveiligingsdag SLBdiensten: 26 juni 2015
Presentatie F Secure: Leer hoe u uw IT-omgeving proactief en optimaal kunt beveiligen. Door Bert de Houwer, Presales Engineer, F-Secure.
3. WEARE#1INSECURITY
153.8 Revenues MEUR
Operating Profit MEUR
Personnel
18.8
R&D Investments of Revenues25%
939
Pioneering
technology
year after year
BLACKLIGHT
DEEPGUARD
ORSP
LISTED ON NASDAQ OMX
Consistently ranked among the best by AV-Test, AV comparatives and numerous 3rd parties
30. F-Secure Policy Manager is our central management
solution. It is a highly scalable and automated tool
that lets you manage all your security applications in
one place, define and distribute security policies, and
monitor your company's overall security.
31. SOFTWARE AND
APPLICATIONS
Software Updater fully integrated
to the solution, no infrastructure needed
Patches automatically OS and third-
party non-Microsoft applications
Automatically downloads and installs the
patches, with manual setting if needed
32. Better manageability for USB devices
Prevents malware infections via USB
Administrator can be notified if device
has been blocked
DEVICE
CONTROL
Blocks certain hardware devices to
protect network and endpoints
33. POLICY
MANAGEMENT
Manage security settings centrally
Create and customize individual security
profiles based on your needs
Assign profiles individually to any
computer or in groups
Support for multiple concurrent admin
sessions
34. Gives IT admin possibility to restrict
access to web content based on
pre-defined categories
28 different categories available
An extra layer of protection against
malware, phishing and other online
scam sites
WEB CONTENT
CONTROL
35. Protects users against harmful activity
when accessing online banking and other
business critical sites
Supports all the major browsers
Closes network connections to unknown
sites while enabled
CONNECTION
CONTROL
36. Web Traffic Scanning Advanced Protection
allows the administrator to block selected
content from unknown or suspicious sites
The admin can whitelist selected sites
Protects the user from typically vulnerable
content from websites
ADVANCED
PROTECTION
37. VISIBILITY TO
ENVIRONMENT Provides exceptional overview on the
security status of your environment
Creates vulnerability analysis for the
IT environment with remediation steps
Creates detailed reports on the
security events and levels
38. MANAGEMENT
HIERARCHY Capability of importing Microsoft Active
Directory tree structure
Different views for each level, with the
ability to give defined access
Easy to control user accounts and which
services they have access to
39. SERVER
MANAGEMENT Centrally manage your server security
Detailed overview of server
security information and status
Manage your third party software
vulnerabilities
61. Terminology
Online Profiling is primarily used by ad networks as a basis for targeted
marketing. It's a method of combining cookies, web site traffic analysis, and
personal information to create a profile of a customer's browsing and buying
habits. An online profile includes how much time customers spend in certain
areas of a Web site and which ads they click on.
Geoblocking is the system used to limit the access to the internet, based on
geographic location. There are several databases which map IP addresses to
countries. These databases then form the basis of block-lists, more commonly
known as geoblocks. Website administrators who manage video-streaming sites
such as Netflix use geoblocks to limit their audiences to a certain geographic
location.