SlideShare une entreprise Scribd logo
1  sur  64
Télécharger pour lire hors ligne
WEARE
F-SECURE
.
OVER25YEARS
OFDIGITAL
SECURITY
EXPERIENCE
WEARE#1INSECURITY
153.8 Revenues MEUR
Operating Profit MEUR
Personnel
18.8
R&D Investments of Revenues25%
939
Pioneering
technology
year after year
BLACKLIGHT
DEEPGUARD
ORSP
LISTED ON NASDAQ OMX
Consistently ranked among the best by AV-Test, AV comparatives and numerous 3rd parties
WEWORKWITH200+
OPERATORS AND
6,000+ SERVICE
PARTNERS
Serving tens of millions of people in 40+ countries.
WHATMAKES
F-SECURE
UNIQUE?
TRUSTED VENDOR FROM A TRUSTED COUNTRY
SUPERB USABILITY
LEADER IN CLOUD-BASED SECURITY
BIG ENOUGH TO BE CREDIBLE – SMALL ENOUGH TO BE NIMBLE
AV-Test “Best Protection” award for
F-Secure for the 4th year in a row
ONSITE SECURITY
MANAGEMENT WITH
SUPERIOR CONTROL
F-Secure Policy Manager
BUSINESS BENEFITS
© F-Secure Confidential8
Advanced management features even for
complex environments
Reduced administration due to automation of
daily operations
Optimize performance for virtual environments
by offloading scanning
EXTRA BENEFITS
WITHPREMIUM
© F-Secure Confidential9
Better productivity and security with web content
control
Safe connections to trusted sites for superior security
and ease of work
Support for automated patch management to
secure your business against known threats
Support for virtual environments licensed in the
same package with Scanning and Reputation Server
EASYMANAGEMENT
© F-Secure Confidential10
Deploy Manage Take action
POLICYMANAGER
© F-Secure Confidential11
 Manage Business Suite products:
 Client Security
 E-mail and Server Security
 Server Security
 Manage other F-Secure security
products
 Security for Virtual and Cloud
Environments
 All with one, easy and automated
solution
Desktop Laptop
Server Software
update
WHAT’S NEW?
© F-Secure Confidential12
WEBCONTENTCONTROL
CONNECTIONCONTROL
ADVANCEDPROTECTION
SCANNINGANDREPUTATIONSERVER
© F-Secure Confidential13
WEBCONTENT
CONTROL
© F-Secure Confidential14
Prevent malicious content from entering your network
 Reduce productivity losses, bandwidth consumption, and
legal risks caused by unauthorized employee access to
inappropriate or distracting web content
 Improve security by providing an extra layer of protection
IMPROVED
PRODUCTIVITY THROUGH
CONTROLLED ACCESS
© F-Secure Confidential15 Source: http://www.salary.com/2014-wasting-time-at-work/
2013 of all respondents said they waste at
least some time at work on a daily basis.
69%
The number of people in this year’s
survey who reported wasting time at
work every day is up to a whopping 89%
89%
OF PEOPLE SURVEYED WASTE AT LEAST
HALF THE AVERAGE WORDDAY ON
NON WORK-RELATED TASKS.
4%
A 20% INCREASE
COMPARED TO
LAST YEAR
WHERE’S THEWASTE?
© F-Secure Confidential16 Source: http://www.salary.com/2014-wasting-time-at-work/
GOOGLE FACEBOOK LINKEDIN24% 15% 14%
31% waste roughly 30 minutes daily
31% waste roughly 1 hour daily
16% waste roughly 2 hours daily
6% waste roughly 3 hours daily
2% waste roughly 4 hours daily
2% waste 5 or more hours
89%
IMPROVE SECURITY
© F-Secure Confidential17
 Guarantee better security as employees cannot access
the harmful sites in the first place
 90% of normal attacks come through the web
 You can block harmful sites.
CONNECTION
CONTROL
© F-Secure Confidential18
Improve security through controlled and safe
access to business critical assets
 Allows connections during the session to sites
which are verified safe by F-Secure
 Protects the weakest link in business critical
sessions – the web browser
SUPERIOR SECURITY
© F-Secure Confidential19
 Activates automatically in the
browser when entering a web site
 Prevents unknown banking
trojans from sending sensitive
information to online criminals
 Closes network connections to
unknown sites and prevents new
ones during session
X
20
CONNECTIONCONTROL–STOP
THEATTACKSBEFORETHEYENTER
The weakest links:
The online bank users and their browsers
Banks have secured the connection from browser
to the bank and the online banking servers
Phishing Trojans
© F-Secure Confidential
 Why a secure connection matters?
 Financial loss when online banking
credentials and money from the bank
account is stolen.
 Business secrets stolen if cloud-
based CRM credentials are stolen
© F-Secure Confidential21
CONNECTION CONTROL
ADVANCED
PROTECTION
© F-Secure Confidential22
 Web Traffic Scanning Advanced Protection allows the
admin to block certain content from unknown and
suspicious sites.
 E.g. Flash, Silverlight, Executables, Java & ActiveX
components.
STOPMOSTOFTHE
WEBATTACKS
© F-Secure Confidential23
JAVA
28%
FLASH
33%
WINDOWS
10%
SILVERLIGHT
5%
Source: hxxp:// contagiodata.blogspot.fi/2014/12/exploit-kits-2014.html
Block 100% of Java applets and Windows malware
that come from unknown sources you do not trust.
Technologies
targeted by
exploit kits
in 2014-2015
© F-Secure Confidential24
 Web Traffic Scanning Advanced Protection provides an
additional layer of protection
 This feature will not be enabled by default
 PM admin will also have the possibility to whitelist
certain trusted sites
 E.g. company intranet sites
ADMINHASCONTROL
IMPROVED
ADMINTOOLS
© F-Secure Confidential25
ALERT HANDLING SCHEDULED REPORTING
ALERT HANDLING
© F-Secure Confidential26
• Syslog improvements
• Common Event Format messaging support for Security
Information and Event Management (SIEM) integration in alert
forwarding
• Email alert improvements
• Introducing Policy Manager Server based alerting via email.
SCHEDULED REPORTING
© F-Secure Confidential27
• Scheduled reporting via email to multiple
recipients linked to certain policy domains.
Reporting is based per policy domain.
• Reporting can be scheduled on daily,
weekly or monthly basis.
OTHER NEWFEATURES
© F-Secure Confidential28
 Policy Manager based backup
 Scheduled backup of PM Database on a weekly and daily basis.
 Software Updater improvements
 Exclusions by one-time click in the software updates tab
 Comment field for exclusions
 Updated graphical user interface
 Update on look and feel in the user interface.
 Minor improvements on default real-time scanning and email scanning settings.
 Active Directory improvements
 Auto discovery of unmanaged hosts.
POLICY MANAGER
FEATURES
© F-Secure Confidential29
F-Secure Policy Manager is our central management
solution. It is a highly scalable and automated tool
that lets you manage all your security applications in
one place, define and distribute security policies, and
monitor your company's overall security.
SOFTWARE AND
APPLICATIONS
Software Updater fully integrated
to the solution, no infrastructure needed
Patches automatically OS and third-
party non-Microsoft applications
Automatically downloads and installs the
patches, with manual setting if needed
Better manageability for USB devices
Prevents malware infections via USB
Administrator can be notified if device
has been blocked
DEVICE
CONTROL
Blocks certain hardware devices to
protect network and endpoints
POLICY
MANAGEMENT
Manage security settings centrally
Create and customize individual security
profiles based on your needs
Assign profiles individually to any
computer or in groups
Support for multiple concurrent admin
sessions
Gives IT admin possibility to restrict
access to web content based on
pre-defined categories
28 different categories available
An extra layer of protection against
malware, phishing and other online
scam sites
WEB CONTENT
CONTROL
Protects users against harmful activity
when accessing online banking and other
business critical sites
Supports all the major browsers
Closes network connections to unknown
sites while enabled
CONNECTION
CONTROL
Web Traffic Scanning Advanced Protection
allows the administrator to block selected
content from unknown or suspicious sites
The admin can whitelist selected sites
Protects the user from typically vulnerable
content from websites
ADVANCED
PROTECTION
VISIBILITY TO
ENVIRONMENT Provides exceptional overview on the
security status of your environment
Creates vulnerability analysis for the
IT environment with remediation steps
Creates detailed reports on the
security events and levels
MANAGEMENT
HIERARCHY Capability of importing Microsoft Active
Directory tree structure
Different views for each level, with the
ability to give defined access
Easy to control user accounts and which
services they have access to
SERVER
MANAGEMENT Centrally manage your server security
Detailed overview of server
security information and status
Manage your third party software
vulnerabilities
CONTROLLED
SECURITY THE
EASY WAY
© F-Secure Confidential40
Test it for free!
© F-Secure Confidential41
PRIVACY
ISAHOT
TOPIC
42
WEALLHAVE
AFUNDAMENTALNEED
TOKEEPSOMETHINGS
TOOURSELVES
© F-Secure Confidential
THE
RECENT
EDWARDSNOWDEN
REVELATIONSHAVERAISED
CONSUMERS’INTEREST
INPRIVACYSIGNIFICANTLY.
image source: http://grumpyelder.com
© F-Secure Confidential44
PRIVACYISANEWMARKET
ANDDIFFERENTFROM
TRADITIONALSECURITY
SECURITY IS ABOUT BEING FREE OF A THREAT OR DANGER.
Traditionally Internet Security solutions have focused on securing PCs and smartphones
from viruses and other Internet threats. Additional benefits, such as parental control, have
been developed to complement the offering.
PRIVACY IS ABOUT BEING FREE FROM BEING OBSERVED OR DISTURBED BY OTHERS.
With digital lifestyle consumers are revealing their thoughts and interests online while
opening up an opportunity for others to profile, track and snoop their personal interests.
Online privacy solutions focus on giving the consumers the control of their online privacy.
NEWSOLUTIONSARENEEDED!
ARECONCERNED
ABOUTPRIVACY
WHENUSING
PUBLIC WI-FI.
© F-Secure Confidential45
52%of respondents globally
AVOIDUSING
PUBLIC WI-FI
BECAUSE THEY
WORRY ABOUT
VIRUSESOR
MALWARE.
© F-Secure Confidential46
59%of respondents surveyed in
six countries
ARECONCERNED
THEIRONLINE
BEHAVIOR IS
TRACKEDAND
DATASOLDTO
3RDPARTIES.
© F-Secure Confidential47
57%of respondents surveyed in
Europe
WOULD
LIKETOUSE
GEOGRAPHICALLY
RESTRICTED
ONLINE SERVICES
FROMANYWHERE.
© F-Secure Confidential48
54%of respondents surveyed in
six countries
WEARE
SOLVING
REAL
CUSTOMER
PROBLEMS!
49
© F-Secure Confidential50
STRIPTEASEADSRUINED
ABIRTHDAYPARTY
“My 10 year old daughter's birthday party was completely
ruined when our family iPad started showing suddenly
striptease ads. I felt awful and humiliated. Parents were
calling our house all evening and I had to explain over and
over what had happened. I’m worried my daughter’s friends
will not play with her anymore. Later on I learned that
advertisers had been tracking my husband who was
organizing a bachelor’s party – that’s why the ads were being
shown to my daughter and her friends.”
Catherine, 45
“OUR FAMILY IPAD
STARTED SHOWING
SUDDENLY
STRIPTEASE ADS.”
© F-Secure Confidential51
“…OURFAMILY
IPADSTARTED
SUDDENLY
SHOWING
STRIPTEASE ADS!”
UNTRACKABLE
Freedome keeps you anonymous and
doesn’t let others tap into your data.
© F-Secure Confidential52
BANKINGINFORMATION
STOLENATMYFAVORITE
COFFEELOCATION
“I like spending my Saturday afternoons at my local coffee
shop. What’s more relaxing than a cup of Cappuccino and
browsing the Internet with my tablet. Occasionally I also take
care of household items such as paying my bills online. Little
did I know that even a kid can hack into a public Wi-Fi. Except
that in my case it wasn’t a kid but a hacker who stole my bank
account information. Long story short, it took weeks of
fighting with my bank and at end I still lost money. One thing
is for sure, I will never use a public Wi-Fi anymore.”
Mark, 24
“ONE THING IS FOR
SURE: I WILL NEVER
USE A PUBLIC WI-FI
ANYMORE.”
© F-Secure Confidential53
“ONETHING ISFOR
SURE:IWILLNEVER
USEAPUBLIC
WI-FIANYMORE”
Connect safely from any public Wi-Fi.
Freedome encrypts your data so that
no one else can read it
WI-FI SECURITY
© F-Secure Confidential54
SHOPPINGTAKEN
TOANEWLEVEL
“Let’s face it, I do appreciate being able to browse the web
safely but what I really enjoy is bargain hunting. By changing
the virtual location of my tablet I have been able to save
hundreds of Euros. How? Well, the same shopping websites
have different prices for different countries and with a push of
a button, I can change the location of my tablet and hunt for
the best deals in different countries…This is pretty cool!”
Anna, 36
“…HUNTFOR
THEBESTDEALS
INDIFFERENT
COUNTRIES…
THISISPRETTY
COOL!”
© F-Secure Confidential55
“…HUNTFORTHE
BESTDEALS INDIFFERENT
COUNTRIES…THIS
ISPRETTYCOOL!”
Change your virtual location to other country for
better online prices.
SAVE MONEY IN
ONLINE SHOPPING
© F-Secure Confidential56
FOOTBALL,
ANYWHERE?
YES,PLEASE!
“Don’t tell my wife but I can’t live without football. I mean I
can’t live without her either but football is still football.
While I love our vacations I hate missing out the important
games. When I try to stream content from my home country I
always get a message that the stream is not available in
foreign countries. What a bummer. Then I discovered this
new app that allows me to change my virtual location. The
whole world is now open! I can watch my favorite content
when I’m abroad and I can watch foreign content when I’m at
home. What’s better than knowing what will happen in TV
shows before my friends do.”
Jason, 52
“ICANWATCHMY
FAVORITECONTENT
WHENI’MABROAD
ANDFOREIGN
CONTENTWHEN
I’MATHOME.”
© F-Secure Confidential57
“ICANWATCHMY
FAVORITECONTENTWHEN
I’MABROADAND
FOREIGNCONTENT
WHENI’M
ATHOME.”
TELEPORTTOANY
LOCATION
With Freedome you can change your
virtual location to the other side of the world and
use your favorite services when you are traveling.
© F-Secure Confidential58
INACOMPLEX
WORLD,SIMPLICITY
MATTERS.
ONEBUTTON
FORALL.
0
500,000
1,000,000
1,500,000
2,000,000
2,500,000
January
February
M
arch
April
M
ay
June
July
AugustSeptem
ber
OctoberNovem
berDecem
ber
January
February
M
arch
April
Android Apple PC Mac
© F-Secure Confidential59
EXTREMELYFASTGROWTH
ANDHIGHRATINGS
F-SECURE FREEDOME DOWNLOADS
FREEDOME
PRIVATE.UNTRACKED.
ANONYMOUS.
Terminology
 Online Profiling is primarily used by ad networks as a basis for targeted
marketing. It's a method of combining cookies, web site traffic analysis, and
personal information to create a profile of a customer's browsing and buying
habits. An online profile includes how much time customers spend in certain
areas of a Web site and which ads they click on.
 Geoblocking is the system used to limit the access to the internet, based on
geographic location. There are several databases which map IP addresses to
countries. These databases then form the basis of block-lists, more commonly
known as geoblocks. Website administrators who manage video-streaming sites
such as Netflix use geoblocks to limit their audiences to a certain geographic
location.
Terminology
 VPN (Virtual Private Network) is used to protect online activity and
identity. By using an anonymous VPN service, Internet traffic and data
remain encrypted, which prevents tracking Internet activity. A VPN service
is especially useful when accessing public Wi-Fi hotspots because the
public wireless services might not be secure. In addition to public Wi-Fi
security, a private VPN service also provides consumers with uncensored
Internet access and can help prevent data theft and unblock websites.
© F-Secure Confidential62
Terminology
 Phishing website is a fake web site set up by fraudsters that mimic e.g.
sign-in pages of trusted companies to trick the person into disclosing their
user name and password, and thus providing fraudsters an access to an
online account. Once given the access, personal information can be used
to commit identity theft, charge credit cards, empty bank accounts, read
email, and lock the person out of the online account by changing the
password.
© F-Secure Confidential63
Terminology
 Online tracking. Most of the websites visited are tracking the visitors
online activity. Online tracking is used as a market research or as a way to
target the advertising that they deliver. Different websites can share
tracking information. One issue with online tracking involves privacy, as
not all users care to have their web browsing activity tracked in this
manner.
© F-Secure Confidential64

Contenu connexe

Tendances

Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
tswong
 

Tendances (20)

Best corporate end-point protection 2013
Best corporate end-point protection 2013Best corporate end-point protection 2013
Best corporate end-point protection 2013
 
Psb mobile security
Psb mobile securityPsb mobile security
Psb mobile security
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystem
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection Plus
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
 
Fortinet
FortinetFortinet
Fortinet
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPS
 
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
 
Managing risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business contextManaging risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business context
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands
 

Similaire à Presentatie F-Secure 26062015

Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
Jyothi Satyanathan
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internet
indradipg
 

Similaire à Presentatie F-Secure 26062015 (20)

RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
 
Get more versatile and scalable protection with F5 BIG-IP
Get more versatile and scalable protection with F5 BIG-IPGet more versatile and scalable protection with F5 BIG-IP
Get more versatile and scalable protection with F5 BIG-IP
 
WEB SERVERS
WEB SERVERSWEB SERVERS
WEB SERVERS
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
DACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdfDACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdf
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust Principles
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Sundray hospitality wlan solution wifi - wireless - hotel - Info Tech Middl...
Sundray hospitality wlan solution   wifi - wireless - hotel - Info Tech Middl...Sundray hospitality wlan solution   wifi - wireless - hotel - Info Tech Middl...
Sundray hospitality wlan solution wifi - wireless - hotel - Info Tech Middl...
 
Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
V mware view 5 customer presentation
V mware view 5 customer presentationV mware view 5 customer presentation
V mware view 5 customer presentation
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internet
 
Symantec Migration infographic
Symantec Migration infographic Symantec Migration infographic
Symantec Migration infographic
 
CyberArk Cleveland Defend Multi-Factor
CyberArk Cleveland Defend Multi-FactorCyberArk Cleveland Defend Multi-Factor
CyberArk Cleveland Defend Multi-Factor
 

Plus de SLBdiensten

Plus de SLBdiensten (20)

INFORMATIEBEVEILIGING EN PRIVACY IN HET ONDERWIJS
INFORMATIEBEVEILIGING EN PRIVACY IN HET ONDERWIJSINFORMATIEBEVEILIGING EN PRIVACY IN HET ONDERWIJS
INFORMATIEBEVEILIGING EN PRIVACY IN HET ONDERWIJS
 
21E EEUWSE VAARDIGHEDEN MET ADOBE
21E EEUWSE VAARDIGHEDEN MET ADOBE21E EEUWSE VAARDIGHEDEN MET ADOBE
21E EEUWSE VAARDIGHEDEN MET ADOBE
 
VERGROOT DE ICT-VAARDIGHEDEN VAN UW LEERLINGEN MET MICROSOFT OFFICE SPECIALIS...
VERGROOT DE ICT-VAARDIGHEDEN VAN UW LEERLINGEN MET MICROSOFT OFFICE SPECIALIS...VERGROOT DE ICT-VAARDIGHEDEN VAN UW LEERLINGEN MET MICROSOFT OFFICE SPECIALIS...
VERGROOT DE ICT-VAARDIGHEDEN VAN UW LEERLINGEN MET MICROSOFT OFFICE SPECIALIS...
 
Presentatie eduard beck
Presentatie eduard beckPresentatie eduard beck
Presentatie eduard beck
 
Office 365 in de Klas
Office 365 in de KlasOffice 365 in de Klas
Office 365 in de Klas
 
Digital transformation & Education
Digital transformation & EducationDigital transformation & Education
Digital transformation & Education
 
Presentatie Breinwave Microsoft cloudportfolio
Presentatie Breinwave Microsoft cloudportfolioPresentatie Breinwave Microsoft cloudportfolio
Presentatie Breinwave Microsoft cloudportfolio
 
SketchUp Pro Educatief, 4 oktober 2016
SketchUp Pro Educatief, 4 oktober 2016SketchUp Pro Educatief, 4 oktober 2016
SketchUp Pro Educatief, 4 oktober 2016
 
Referentiecase Office 365 op het Pius X College
Referentiecase Office 365 op het Pius X College Referentiecase Office 365 op het Pius X College
Referentiecase Office 365 op het Pius X College
 
Presentatie BeveiligMij over ICT beveiliging
Presentatie BeveiligMij over ICT beveiligingPresentatie BeveiligMij over ICT beveiliging
Presentatie BeveiligMij over ICT beveiliging
 
Presentatie over meldplicht datalekken en ecryptie door Sophos
Presentatie over meldplicht datalekken en ecryptie door SophosPresentatie over meldplicht datalekken en ecryptie door Sophos
Presentatie over meldplicht datalekken en ecryptie door Sophos
 
Presentatie Kennisnet over informatiebeveiliging in mbo en vo
Presentatie Kennisnet over informatiebeveiliging in mbo en vo Presentatie Kennisnet over informatiebeveiliging in mbo en vo
Presentatie Kennisnet over informatiebeveiliging in mbo en vo
 
Survey
SurveySurvey
Survey
 
Presentatie Jabra door Glenn Tjebbes op 10 maartr 2016
Presentatie Jabra door Glenn Tjebbes op 10 maartr 2016Presentatie Jabra door Glenn Tjebbes op 10 maartr 2016
Presentatie Jabra door Glenn Tjebbes op 10 maartr 2016
 
Presentatie MBO Utrecht over Skype implementatie vs Jabra
Presentatie MBO Utrecht over Skype implementatie vs Jabra Presentatie MBO Utrecht over Skype implementatie vs Jabra
Presentatie MBO Utrecht over Skype implementatie vs Jabra
 
Presentatie adobe informatiesessie ipon
Presentatie adobe informatiesessie iponPresentatie adobe informatiesessie ipon
Presentatie adobe informatiesessie ipon
 
Van laptopkar tot laptopklas, lessen uit het Surface PROject
Van laptopkar tot laptopklas, lessen uit het Surface PROjectVan laptopkar tot laptopklas, lessen uit het Surface PROject
Van laptopkar tot laptopklas, lessen uit het Surface PROject
 
Privacy goed geregeld
Privacy goed geregeldPrivacy goed geregeld
Privacy goed geregeld
 
Onderwijs maken met Office 365
Onderwijs maken met Office 365Onderwijs maken met Office 365
Onderwijs maken met Office 365
 
Internet of Things, Coderen in de klas en 3D printing
Internet of Things, Coderen in de klas en 3D printingInternet of Things, Coderen in de klas en 3D printing
Internet of Things, Coderen in de klas en 3D printing
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Dernier (20)

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

Presentatie F-Secure 26062015

  • 3. WEARE#1INSECURITY 153.8 Revenues MEUR Operating Profit MEUR Personnel 18.8 R&D Investments of Revenues25% 939 Pioneering technology year after year BLACKLIGHT DEEPGUARD ORSP LISTED ON NASDAQ OMX Consistently ranked among the best by AV-Test, AV comparatives and numerous 3rd parties
  • 4. WEWORKWITH200+ OPERATORS AND 6,000+ SERVICE PARTNERS Serving tens of millions of people in 40+ countries.
  • 5. WHATMAKES F-SECURE UNIQUE? TRUSTED VENDOR FROM A TRUSTED COUNTRY SUPERB USABILITY LEADER IN CLOUD-BASED SECURITY BIG ENOUGH TO BE CREDIBLE – SMALL ENOUGH TO BE NIMBLE
  • 6. AV-Test “Best Protection” award for F-Secure for the 4th year in a row
  • 7. ONSITE SECURITY MANAGEMENT WITH SUPERIOR CONTROL F-Secure Policy Manager
  • 8. BUSINESS BENEFITS © F-Secure Confidential8 Advanced management features even for complex environments Reduced administration due to automation of daily operations Optimize performance for virtual environments by offloading scanning
  • 9. EXTRA BENEFITS WITHPREMIUM © F-Secure Confidential9 Better productivity and security with web content control Safe connections to trusted sites for superior security and ease of work Support for automated patch management to secure your business against known threats Support for virtual environments licensed in the same package with Scanning and Reputation Server
  • 11. POLICYMANAGER © F-Secure Confidential11  Manage Business Suite products:  Client Security  E-mail and Server Security  Server Security  Manage other F-Secure security products  Security for Virtual and Cloud Environments  All with one, easy and automated solution Desktop Laptop Server Software update
  • 12. WHAT’S NEW? © F-Secure Confidential12
  • 14. WEBCONTENT CONTROL © F-Secure Confidential14 Prevent malicious content from entering your network  Reduce productivity losses, bandwidth consumption, and legal risks caused by unauthorized employee access to inappropriate or distracting web content  Improve security by providing an extra layer of protection
  • 15. IMPROVED PRODUCTIVITY THROUGH CONTROLLED ACCESS © F-Secure Confidential15 Source: http://www.salary.com/2014-wasting-time-at-work/ 2013 of all respondents said they waste at least some time at work on a daily basis. 69% The number of people in this year’s survey who reported wasting time at work every day is up to a whopping 89% 89% OF PEOPLE SURVEYED WASTE AT LEAST HALF THE AVERAGE WORDDAY ON NON WORK-RELATED TASKS. 4% A 20% INCREASE COMPARED TO LAST YEAR
  • 16. WHERE’S THEWASTE? © F-Secure Confidential16 Source: http://www.salary.com/2014-wasting-time-at-work/ GOOGLE FACEBOOK LINKEDIN24% 15% 14% 31% waste roughly 30 minutes daily 31% waste roughly 1 hour daily 16% waste roughly 2 hours daily 6% waste roughly 3 hours daily 2% waste roughly 4 hours daily 2% waste 5 or more hours 89%
  • 17. IMPROVE SECURITY © F-Secure Confidential17  Guarantee better security as employees cannot access the harmful sites in the first place  90% of normal attacks come through the web  You can block harmful sites.
  • 18. CONNECTION CONTROL © F-Secure Confidential18 Improve security through controlled and safe access to business critical assets  Allows connections during the session to sites which are verified safe by F-Secure  Protects the weakest link in business critical sessions – the web browser
  • 19. SUPERIOR SECURITY © F-Secure Confidential19  Activates automatically in the browser when entering a web site  Prevents unknown banking trojans from sending sensitive information to online criminals  Closes network connections to unknown sites and prevents new ones during session X
  • 20. 20 CONNECTIONCONTROL–STOP THEATTACKSBEFORETHEYENTER The weakest links: The online bank users and their browsers Banks have secured the connection from browser to the bank and the online banking servers Phishing Trojans © F-Secure Confidential
  • 21.  Why a secure connection matters?  Financial loss when online banking credentials and money from the bank account is stolen.  Business secrets stolen if cloud- based CRM credentials are stolen © F-Secure Confidential21 CONNECTION CONTROL
  • 22. ADVANCED PROTECTION © F-Secure Confidential22  Web Traffic Scanning Advanced Protection allows the admin to block certain content from unknown and suspicious sites.  E.g. Flash, Silverlight, Executables, Java & ActiveX components.
  • 23. STOPMOSTOFTHE WEBATTACKS © F-Secure Confidential23 JAVA 28% FLASH 33% WINDOWS 10% SILVERLIGHT 5% Source: hxxp:// contagiodata.blogspot.fi/2014/12/exploit-kits-2014.html Block 100% of Java applets and Windows malware that come from unknown sources you do not trust. Technologies targeted by exploit kits in 2014-2015
  • 24. © F-Secure Confidential24  Web Traffic Scanning Advanced Protection provides an additional layer of protection  This feature will not be enabled by default  PM admin will also have the possibility to whitelist certain trusted sites  E.g. company intranet sites ADMINHASCONTROL
  • 26. ALERT HANDLING © F-Secure Confidential26 • Syslog improvements • Common Event Format messaging support for Security Information and Event Management (SIEM) integration in alert forwarding • Email alert improvements • Introducing Policy Manager Server based alerting via email.
  • 27. SCHEDULED REPORTING © F-Secure Confidential27 • Scheduled reporting via email to multiple recipients linked to certain policy domains. Reporting is based per policy domain. • Reporting can be scheduled on daily, weekly or monthly basis.
  • 28. OTHER NEWFEATURES © F-Secure Confidential28  Policy Manager based backup  Scheduled backup of PM Database on a weekly and daily basis.  Software Updater improvements  Exclusions by one-time click in the software updates tab  Comment field for exclusions  Updated graphical user interface  Update on look and feel in the user interface.  Minor improvements on default real-time scanning and email scanning settings.  Active Directory improvements  Auto discovery of unmanaged hosts.
  • 30. F-Secure Policy Manager is our central management solution. It is a highly scalable and automated tool that lets you manage all your security applications in one place, define and distribute security policies, and monitor your company's overall security.
  • 31. SOFTWARE AND APPLICATIONS Software Updater fully integrated to the solution, no infrastructure needed Patches automatically OS and third- party non-Microsoft applications Automatically downloads and installs the patches, with manual setting if needed
  • 32. Better manageability for USB devices Prevents malware infections via USB Administrator can be notified if device has been blocked DEVICE CONTROL Blocks certain hardware devices to protect network and endpoints
  • 33. POLICY MANAGEMENT Manage security settings centrally Create and customize individual security profiles based on your needs Assign profiles individually to any computer or in groups Support for multiple concurrent admin sessions
  • 34. Gives IT admin possibility to restrict access to web content based on pre-defined categories 28 different categories available An extra layer of protection against malware, phishing and other online scam sites WEB CONTENT CONTROL
  • 35. Protects users against harmful activity when accessing online banking and other business critical sites Supports all the major browsers Closes network connections to unknown sites while enabled CONNECTION CONTROL
  • 36. Web Traffic Scanning Advanced Protection allows the administrator to block selected content from unknown or suspicious sites The admin can whitelist selected sites Protects the user from typically vulnerable content from websites ADVANCED PROTECTION
  • 37. VISIBILITY TO ENVIRONMENT Provides exceptional overview on the security status of your environment Creates vulnerability analysis for the IT environment with remediation steps Creates detailed reports on the security events and levels
  • 38. MANAGEMENT HIERARCHY Capability of importing Microsoft Active Directory tree structure Different views for each level, with the ability to give defined access Easy to control user accounts and which services they have access to
  • 39. SERVER MANAGEMENT Centrally manage your server security Detailed overview of server security information and status Manage your third party software vulnerabilities
  • 40. CONTROLLED SECURITY THE EASY WAY © F-Secure Confidential40 Test it for free!
  • 44. © F-Secure Confidential44 PRIVACYISANEWMARKET ANDDIFFERENTFROM TRADITIONALSECURITY SECURITY IS ABOUT BEING FREE OF A THREAT OR DANGER. Traditionally Internet Security solutions have focused on securing PCs and smartphones from viruses and other Internet threats. Additional benefits, such as parental control, have been developed to complement the offering. PRIVACY IS ABOUT BEING FREE FROM BEING OBSERVED OR DISTURBED BY OTHERS. With digital lifestyle consumers are revealing their thoughts and interests online while opening up an opportunity for others to profile, track and snoop their personal interests. Online privacy solutions focus on giving the consumers the control of their online privacy. NEWSOLUTIONSARENEEDED!
  • 45. ARECONCERNED ABOUTPRIVACY WHENUSING PUBLIC WI-FI. © F-Secure Confidential45 52%of respondents globally
  • 46. AVOIDUSING PUBLIC WI-FI BECAUSE THEY WORRY ABOUT VIRUSESOR MALWARE. © F-Secure Confidential46 59%of respondents surveyed in six countries
  • 47. ARECONCERNED THEIRONLINE BEHAVIOR IS TRACKEDAND DATASOLDTO 3RDPARTIES. © F-Secure Confidential47 57%of respondents surveyed in Europe
  • 48. WOULD LIKETOUSE GEOGRAPHICALLY RESTRICTED ONLINE SERVICES FROMANYWHERE. © F-Secure Confidential48 54%of respondents surveyed in six countries
  • 50. © F-Secure Confidential50 STRIPTEASEADSRUINED ABIRTHDAYPARTY “My 10 year old daughter's birthday party was completely ruined when our family iPad started showing suddenly striptease ads. I felt awful and humiliated. Parents were calling our house all evening and I had to explain over and over what had happened. I’m worried my daughter’s friends will not play with her anymore. Later on I learned that advertisers had been tracking my husband who was organizing a bachelor’s party – that’s why the ads were being shown to my daughter and her friends.” Catherine, 45 “OUR FAMILY IPAD STARTED SHOWING SUDDENLY STRIPTEASE ADS.”
  • 51. © F-Secure Confidential51 “…OURFAMILY IPADSTARTED SUDDENLY SHOWING STRIPTEASE ADS!” UNTRACKABLE Freedome keeps you anonymous and doesn’t let others tap into your data.
  • 52. © F-Secure Confidential52 BANKINGINFORMATION STOLENATMYFAVORITE COFFEELOCATION “I like spending my Saturday afternoons at my local coffee shop. What’s more relaxing than a cup of Cappuccino and browsing the Internet with my tablet. Occasionally I also take care of household items such as paying my bills online. Little did I know that even a kid can hack into a public Wi-Fi. Except that in my case it wasn’t a kid but a hacker who stole my bank account information. Long story short, it took weeks of fighting with my bank and at end I still lost money. One thing is for sure, I will never use a public Wi-Fi anymore.” Mark, 24 “ONE THING IS FOR SURE: I WILL NEVER USE A PUBLIC WI-FI ANYMORE.”
  • 53. © F-Secure Confidential53 “ONETHING ISFOR SURE:IWILLNEVER USEAPUBLIC WI-FIANYMORE” Connect safely from any public Wi-Fi. Freedome encrypts your data so that no one else can read it WI-FI SECURITY
  • 54. © F-Secure Confidential54 SHOPPINGTAKEN TOANEWLEVEL “Let’s face it, I do appreciate being able to browse the web safely but what I really enjoy is bargain hunting. By changing the virtual location of my tablet I have been able to save hundreds of Euros. How? Well, the same shopping websites have different prices for different countries and with a push of a button, I can change the location of my tablet and hunt for the best deals in different countries…This is pretty cool!” Anna, 36 “…HUNTFOR THEBESTDEALS INDIFFERENT COUNTRIES… THISISPRETTY COOL!”
  • 55. © F-Secure Confidential55 “…HUNTFORTHE BESTDEALS INDIFFERENT COUNTRIES…THIS ISPRETTYCOOL!” Change your virtual location to other country for better online prices. SAVE MONEY IN ONLINE SHOPPING
  • 56. © F-Secure Confidential56 FOOTBALL, ANYWHERE? YES,PLEASE! “Don’t tell my wife but I can’t live without football. I mean I can’t live without her either but football is still football. While I love our vacations I hate missing out the important games. When I try to stream content from my home country I always get a message that the stream is not available in foreign countries. What a bummer. Then I discovered this new app that allows me to change my virtual location. The whole world is now open! I can watch my favorite content when I’m abroad and I can watch foreign content when I’m at home. What’s better than knowing what will happen in TV shows before my friends do.” Jason, 52 “ICANWATCHMY FAVORITECONTENT WHENI’MABROAD ANDFOREIGN CONTENTWHEN I’MATHOME.”
  • 57. © F-Secure Confidential57 “ICANWATCHMY FAVORITECONTENTWHEN I’MABROADAND FOREIGNCONTENT WHENI’M ATHOME.” TELEPORTTOANY LOCATION With Freedome you can change your virtual location to the other side of the world and use your favorite services when you are traveling.
  • 61. Terminology  Online Profiling is primarily used by ad networks as a basis for targeted marketing. It's a method of combining cookies, web site traffic analysis, and personal information to create a profile of a customer's browsing and buying habits. An online profile includes how much time customers spend in certain areas of a Web site and which ads they click on.  Geoblocking is the system used to limit the access to the internet, based on geographic location. There are several databases which map IP addresses to countries. These databases then form the basis of block-lists, more commonly known as geoblocks. Website administrators who manage video-streaming sites such as Netflix use geoblocks to limit their audiences to a certain geographic location.
  • 62. Terminology  VPN (Virtual Private Network) is used to protect online activity and identity. By using an anonymous VPN service, Internet traffic and data remain encrypted, which prevents tracking Internet activity. A VPN service is especially useful when accessing public Wi-Fi hotspots because the public wireless services might not be secure. In addition to public Wi-Fi security, a private VPN service also provides consumers with uncensored Internet access and can help prevent data theft and unblock websites. © F-Secure Confidential62
  • 63. Terminology  Phishing website is a fake web site set up by fraudsters that mimic e.g. sign-in pages of trusted companies to trick the person into disclosing their user name and password, and thus providing fraudsters an access to an online account. Once given the access, personal information can be used to commit identity theft, charge credit cards, empty bank accounts, read email, and lock the person out of the online account by changing the password. © F-Secure Confidential63
  • 64. Terminology  Online tracking. Most of the websites visited are tracking the visitors online activity. Online tracking is used as a market research or as a way to target the advertising that they deliver. Different websites can share tracking information. One issue with online tracking involves privacy, as not all users care to have their web browsing activity tracked in this manner. © F-Secure Confidential64