we are f-secure€¦ · the world f-secure was established in1988 and listed on the helsinki stock...

Post on 05-Jul-2020

1 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

WE ARE F-SECURE

1

2

REVENUE SPLIT BY REGION

WE SEE THINGS OTHERS DON’T

Nordics

Rest of Europe

North America

Rest of the World ▪ F-Secure was established in1988 and listed on the Helsinki

Stock Exchange in 1999▪ Products:

➢ Security software and a wide range of cyber security services for businesses

➢ Consumer security and privacy solutions ▪ Products are sold in more than 100 countries by over 200

operators and thousands of resellers.

FACTS:

EURm

EURm

37%

41%

10%

13%

F-SECURE IS FINANCIALLY SOLID

4

VISION AND INVESTMENTS

4

VISION▪ Europe’s Leading Cyber Security Company▪ Continuing investments to high growth areas in enterprise/business security▪ Profitable growth in consumer business

.INVESTING IN PRODUCTS, CONSULTING AND SALES&MARKETING▪ Continuous investments in new products for businesses▪ Hiring new security professionals in R&D, security research, security consulting

and sales&marketing▪ Expanding our channel distribution in Europe and Japan▪ Continue selective M&A (recent acquisitions: Inverse Path, Little Flocker (F-

Secure XFence) and Digital Assurance)

THREAT LANDSCAPE

5

© F-Secure Confidential6

B2B SECURITY MARKET CONTINUES TO GROW

SIGNIFICANT CHANGES SHAPE THE INDUSTRY

B2B security market

Consumers are worried.

1

2

CHANGES IN SECURITY SPENDING

3

USE OF CLOUD SERVICES CONTINUES AT FASTER RATE

4

Regulation and sanctionsDigitalization

Budgets

shifting

Threat intel, endpoint detection & remediation, data loss prevention

Cloud90% of users opt for free security products

SaaS, PaaS, IaaSFrom on-premise to cloud

ERP, CRM, email, file servers and storage, collaboration, workloads

+10% Security services +<10%

Need for security services

Continuous attacks.Also on IoT and smart homes.

Business suffers

€€

* Ponemon Institute: 2016 Cost of Data Breach Study: Global Analysis

$4 MILLIONthe average total cost of a data breach increased

from $3.79 to $4 million

€20 MILLION, OR 4% OF GLOBAL REVENUE

maximum fine for infringements, in the new EU General Data Protection Regulation (GDPR) law.

SECURITY MARKET GROWTH

Most of F-Secure’sabsolute growth in 2016

Opportunity with expanded offering

Estimated growth pace in selected corporate

security market (%)

© F-Secure Confidential9

PREDICT PREVENT

DETECTRESPOND

ENDPOINT PROTECTION▪ Endpoint and server security▪ Security for virtualized

environments▪ Mobile security▪ Centralized management (cloud

and on premise)▪ Continuous service or as yearly

license

VULNERABILITYMANAGEMENT▪ Vulnerability scanning ▪ Vulnerability management▪ Automated patching

PREDICT▪ Security assessments▪ Threat analysis and attack surface

enumeration

CONSULTING SERVICES▪ Technical assessments▪ GRC assessments▪ Security investigations, forensics,

reverse engineering

ATTACK DETECTION AND REMEDIATION• Detection of attacks through

endpoint and server sensors• Decoy sensors to detect movements• As a service from the cloud

CYBER SECURITY IS A PROCESS

10

MERGING MAN & MACHINE

50+ Million endpoints on-the-field collecting current threat information

1 000 000 samples / day

5 000 000 000 queries / day

Our elite team of security consultants and ethical hackers constantly feed new lessons, insights and attacker tactics from their frontline experiences

© F-Secure Confidential13

ARTIFICIAL INTELLIGENCE CENTER OF EXCELLENCE (AICE)

Holistic utilization of • machine learning• big data• artificial intelligence

Labeled data are key assets of F-Secure Labs• More quality examples

lead to better machine learning results

F-SECURE LEADING PROTECTION

LEVEL

© F-Secure Confidential14

MACHINE LEARNING

Heuristic Techniques

• Use of rules to discover malicious intent• Analysts determine rules based on malware analysis• Dynamic malware analysis –> emulation, sandbox –> expense

Challenges

• Exponential increase in digital objects• Human analysts cannot create the rules in time • Rules too complex and difficult to maintain• Need to trap anomalous behavior, not just malicious

Machine Learning

• “... a computer program is said to learn from experience E with respect to some task T and some performance measure P if its performance on T as measured by P improves with E ...” (Tom Mitchell, 1997)

• Bayesian-style machine learning: probabilistic programming languages, large labelled data sets

INDEPENDENT TESTINGMATTERS

5 times winner of Best Protection award

6 out of 6 on AV Test for Overall Protection since the beginning of 2014

ServicesPrediction, prevention, detection and

response services

ProductsManaged security products

CYBER SECURITY SERVICES▪ We provice both top-of-class cyber

security services and managed security products

▪ F-Secure has several hundred enterpriseswith critical IT systems as customers

▪ We ensure our clients

✓ understand their risks

✓ minimize their attack surface

✓ prevent incidents

✓ detect breaches and react to them while minimizing damages

STRATEGY 2017-20

DIRECTION OF TRAVEL

© F-Secure Confidential

19

Business-Centric Customer-Centric

Antivirus Cyber Solutions

Devices Infrastructure

100% Commitment to Customer Security

WHAT STAYS THE SAME

© F-Secure Confidential20

Quality of Protection

Product Efficiency

Customer Support / ‘Expertise to Point of Need’

DIGITAL ASSURANCE▪ UK Cyber Services expert company based in

London

▪ Acquired by F-Secure in May 2017

▪ IT Health Checks, Penetration Testing, Risk Assessment, Instant Response

▪ Financial, petrochemical, retail, communication, and defense industries

▪ CHECK IT Health Checks for UK HMG departments▪ Find weaknesses, vulnerabilities, configuration

faults

▪ CESG (NCSC) Listed Advisor Scheme▪ Secure Design, RMADS, Risk Assessment, Data

Privacy Assessment

© F-Secure Confidential21

F-SECUREBUSINESS SOLUTIONS

Steve NurtonUK Technical Lead

© F-Secure Confidential

WHAT BUSINESS HAVE TO PROTECTSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

Endpoints

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

MAP YOURATTACK SURFACE

© F-Secure Confidential25

© F-Secure Confidential26

END POINTS

MAP YOUR ATTACK SURFACE CONSIDERATIONS

FIREWALLS

SWITCHES

ROUTERS

WEB SERVERS

DNS SERVERS

DOMAIN CONTROLLERS

Discovery ALL IP Assets

Configuration errors

Improper patched Software

Implementationoversights

External website

breachesSQL Injection

Report and identifies

vulnerabilitiesReport on ALL

Assets

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

End Points

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

BREACH DETECTION

© F-Secure Confidential28

© F-Secure Confidential29

BREACHES

BREACH DETECTION CONSIDERATIONS

ATTACK’S

DATA LOSS

BRAND DAMAGE

Detect When You Are Being

Breached

Where Is Last Seen Attackers

Presence

How Did The Attacker Get

Access

What Is The Attackers

Overall Foot Print

Where Is The Attackers Mistake

ATTACKERS ALWAYS MAKE

A MISTAKE

Breach Remediation Is

KEY

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

End Points

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

ENDPOINT

© F-Secure Confidential31

© F-Secure Confidential32

Desktops

Laptops

Physical Servers

Virtual Estates

ENDPOINT PROTECTION CONSIDERATIONSMicrosoft

software patching3rd party software

patching

Automatic delivery of AV

definitions

URL website content filtering

Email protection

HTTPS website protection

Endpoint firewall configuration

URL whitelisting and blacklisting

URL reputational look up

Website downloadable

content

Virtual performance

savings

© F-Secure Confidential33

Desktops

Laptops

Physical Servers

Virtual Servers

ENDPOINT POTENTIAL THREATS

RansomCryptoattacks

Malware

SpywareEmail Spoofing /

Phishing

Rouge Data

Auto Detection is KEY

Trojans

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

Endpoints

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

NETWORK STORAGE

© F-Secure Confidential35

© F-Secure Confidential36

NAS

SAN

NETWORK STORAGE CONSIDERATIONS

Central Repository of Data

Protect corporate shareable content

Real-time protection for the

data

Quick delivery of data, not slowed

down by scanning

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

End Points

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

NETWORK APPLICATIONS

© F-Secure Confidential38

© F-Secure Confidential39

SharePoint

Exchange

NETWORK APPLICATION CONSIDERATIONS

One Drive

Virus protection for email servers

Spam protectionVirus protection

for mailboxes

Real-time protection for

shareable content

First line of and known

vulnerabilities

Protect corporate shareable

content

Scanning uploaded and downloaded

content

defense against zero-day threats

Versioning for applications

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

End Points

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

GATEWAY

© F-Secure Confidential41

© F-Secure Confidential42

SMTP

HTTP

GATEWAY CONSIDERATIONS

FTP

POP

FILE TRANSFER SCANNING

SPAM FILTERING

WEB CONTENT CONTROL

WEB TRAFFIC SCANNING

EMAIL TRAFFIC SCANNING

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

End Points

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

SMARTPHONE & TABLET

© F-Secure Confidential44

© F-Secure Confidential45

MANAGEMENT

DATA

SMARTPHONE & TABLET CONSIDERATIONS

CONTROL

APPS

Protect devices in the field

Protect against WIFI hot spots

Application Protection

Tracking Attempts

URL repetitional lookup

Anti theft protection

Mobile fleet management

VPN Tunneling

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

End Points

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

CLOUDAPPLICATIONS &

SERVICES

© F-Secure Confidential47

© F-Secure Confidential48

MANAGEMENT

DATA

CLOUD APPLICATIONS CONSIDERATIONS

CONTENT

File content monitoring

URL content monitoring

URL content filtering

Email content monitoring

Auto detect malicious content

Auto remediation of

malicious content

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

End Points

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

HOSTED EMAIL

© F-Secure Confidential50

© F-Secure Confidential51

O365

HOSTED EMAIL CONSIDERATIONS

GOOGLEMAIL

Virus protection

Anti Spoofing

Email content monitoring

Malware protectionSpam protection

Data loss prevention

Email encryption capabilities

© F-Secure Confidential

TYPICAL NETWORK MAPSmartphone / Tablet

Virtual NetworksCloud Applications

Hosted Email

Cloud Services

Network Application Gateway

Network Storage

Workstation ServerVirtual Servers

Exchange

EMC Storage

SharePoint HTTP/ FTP/ SMTP Traffic

End Points

Laptops

NETWORK PERIMETER

NETWORK PERIMETER

NE

TW

OR

K P

ER

IME

TE

R

NE

TW

OR

K P

ER

IME

TE

R

© F-Secure Confidential53

THANK YOU

f-secure.com

top related