we are f-secure€¦ · the world f-secure was established in1988 and listed on the helsinki stock...
Post on 05-Jul-2020
1 Views
Preview:
TRANSCRIPT
WE ARE F-SECURE
1
2
REVENUE SPLIT BY REGION
WE SEE THINGS OTHERS DON’T
Nordics
Rest of Europe
North America
Rest of the World ▪ F-Secure was established in1988 and listed on the Helsinki
Stock Exchange in 1999▪ Products:
➢ Security software and a wide range of cyber security services for businesses
➢ Consumer security and privacy solutions ▪ Products are sold in more than 100 countries by over 200
operators and thousands of resellers.
FACTS:
EURm
EURm
37%
41%
10%
13%
F-SECURE IS FINANCIALLY SOLID
4
VISION AND INVESTMENTS
4
VISION▪ Europe’s Leading Cyber Security Company▪ Continuing investments to high growth areas in enterprise/business security▪ Profitable growth in consumer business
.INVESTING IN PRODUCTS, CONSULTING AND SALES&MARKETING▪ Continuous investments in new products for businesses▪ Hiring new security professionals in R&D, security research, security consulting
and sales&marketing▪ Expanding our channel distribution in Europe and Japan▪ Continue selective M&A (recent acquisitions: Inverse Path, Little Flocker (F-
Secure XFence) and Digital Assurance)
THREAT LANDSCAPE
5
© F-Secure Confidential6
B2B SECURITY MARKET CONTINUES TO GROW
SIGNIFICANT CHANGES SHAPE THE INDUSTRY
B2B security market
Consumers are worried.
1
2
CHANGES IN SECURITY SPENDING
3
USE OF CLOUD SERVICES CONTINUES AT FASTER RATE
4
Regulation and sanctionsDigitalization
Budgets
shifting
Threat intel, endpoint detection & remediation, data loss prevention
Cloud90% of users opt for free security products
SaaS, PaaS, IaaSFrom on-premise to cloud
ERP, CRM, email, file servers and storage, collaboration, workloads
+10% Security services +<10%
Need for security services
Continuous attacks.Also on IoT and smart homes.
Business suffers
€€
* Ponemon Institute: 2016 Cost of Data Breach Study: Global Analysis
$4 MILLIONthe average total cost of a data breach increased
from $3.79 to $4 million
€20 MILLION, OR 4% OF GLOBAL REVENUE
maximum fine for infringements, in the new EU General Data Protection Regulation (GDPR) law.
SECURITY MARKET GROWTH
Most of F-Secure’sabsolute growth in 2016
Opportunity with expanded offering
Estimated growth pace in selected corporate
security market (%)
© F-Secure Confidential9
PREDICT PREVENT
DETECTRESPOND
ENDPOINT PROTECTION▪ Endpoint and server security▪ Security for virtualized
environments▪ Mobile security▪ Centralized management (cloud
and on premise)▪ Continuous service or as yearly
license
VULNERABILITYMANAGEMENT▪ Vulnerability scanning ▪ Vulnerability management▪ Automated patching
PREDICT▪ Security assessments▪ Threat analysis and attack surface
enumeration
CONSULTING SERVICES▪ Technical assessments▪ GRC assessments▪ Security investigations, forensics,
reverse engineering
ATTACK DETECTION AND REMEDIATION• Detection of attacks through
endpoint and server sensors• Decoy sensors to detect movements• As a service from the cloud
CYBER SECURITY IS A PROCESS
10
MERGING MAN & MACHINE
50+ Million endpoints on-the-field collecting current threat information
1 000 000 samples / day
5 000 000 000 queries / day
Our elite team of security consultants and ethical hackers constantly feed new lessons, insights and attacker tactics from their frontline experiences
© F-Secure Confidential13
ARTIFICIAL INTELLIGENCE CENTER OF EXCELLENCE (AICE)
Holistic utilization of • machine learning• big data• artificial intelligence
Labeled data are key assets of F-Secure Labs• More quality examples
lead to better machine learning results
F-SECURE LEADING PROTECTION
LEVEL
© F-Secure Confidential14
MACHINE LEARNING
Heuristic Techniques
• Use of rules to discover malicious intent• Analysts determine rules based on malware analysis• Dynamic malware analysis –> emulation, sandbox –> expense
Challenges
• Exponential increase in digital objects• Human analysts cannot create the rules in time • Rules too complex and difficult to maintain• Need to trap anomalous behavior, not just malicious
Machine Learning
• “... a computer program is said to learn from experience E with respect to some task T and some performance measure P if its performance on T as measured by P improves with E ...” (Tom Mitchell, 1997)
• Bayesian-style machine learning: probabilistic programming languages, large labelled data sets
INDEPENDENT TESTINGMATTERS
5 times winner of Best Protection award
6 out of 6 on AV Test for Overall Protection since the beginning of 2014
ServicesPrediction, prevention, detection and
response services
ProductsManaged security products
CYBER SECURITY SERVICES▪ We provice both top-of-class cyber
security services and managed security products
▪ F-Secure has several hundred enterpriseswith critical IT systems as customers
▪ We ensure our clients
✓ understand their risks
✓ minimize their attack surface
✓ prevent incidents
✓ detect breaches and react to them while minimizing damages
STRATEGY 2017-20
DIRECTION OF TRAVEL
© F-Secure Confidential
19
Business-Centric Customer-Centric
Antivirus Cyber Solutions
Devices Infrastructure
100% Commitment to Customer Security
WHAT STAYS THE SAME
© F-Secure Confidential20
Quality of Protection
Product Efficiency
Customer Support / ‘Expertise to Point of Need’
DIGITAL ASSURANCE▪ UK Cyber Services expert company based in
London
▪ Acquired by F-Secure in May 2017
▪ IT Health Checks, Penetration Testing, Risk Assessment, Instant Response
▪ Financial, petrochemical, retail, communication, and defense industries
▪ CHECK IT Health Checks for UK HMG departments▪ Find weaknesses, vulnerabilities, configuration
faults
▪ CESG (NCSC) Listed Advisor Scheme▪ Secure Design, RMADS, Risk Assessment, Data
Privacy Assessment
© F-Secure Confidential21
F-SECUREBUSINESS SOLUTIONS
Steve NurtonUK Technical Lead
© F-Secure Confidential
WHAT BUSINESS HAVE TO PROTECTSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
Endpoints
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
MAP YOURATTACK SURFACE
© F-Secure Confidential25
© F-Secure Confidential26
END POINTS
MAP YOUR ATTACK SURFACE CONSIDERATIONS
FIREWALLS
SWITCHES
ROUTERS
WEB SERVERS
DNS SERVERS
DOMAIN CONTROLLERS
Discovery ALL IP Assets
Configuration errors
Improper patched Software
Implementationoversights
External website
breachesSQL Injection
Report and identifies
vulnerabilitiesReport on ALL
Assets
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
End Points
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
BREACH DETECTION
© F-Secure Confidential28
© F-Secure Confidential29
BREACHES
BREACH DETECTION CONSIDERATIONS
ATTACK’S
DATA LOSS
BRAND DAMAGE
Detect When You Are Being
Breached
Where Is Last Seen Attackers
Presence
How Did The Attacker Get
Access
What Is The Attackers
Overall Foot Print
Where Is The Attackers Mistake
ATTACKERS ALWAYS MAKE
A MISTAKE
Breach Remediation Is
KEY
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
End Points
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
ENDPOINT
© F-Secure Confidential31
© F-Secure Confidential32
Desktops
Laptops
Physical Servers
Virtual Estates
ENDPOINT PROTECTION CONSIDERATIONSMicrosoft
software patching3rd party software
patching
Automatic delivery of AV
definitions
URL website content filtering
Email protection
HTTPS website protection
Endpoint firewall configuration
URL whitelisting and blacklisting
URL reputational look up
Website downloadable
content
Virtual performance
savings
© F-Secure Confidential33
Desktops
Laptops
Physical Servers
Virtual Servers
ENDPOINT POTENTIAL THREATS
RansomCryptoattacks
Malware
SpywareEmail Spoofing /
Phishing
Rouge Data
Auto Detection is KEY
Trojans
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
Endpoints
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
NETWORK STORAGE
© F-Secure Confidential35
© F-Secure Confidential36
NAS
SAN
NETWORK STORAGE CONSIDERATIONS
Central Repository of Data
Protect corporate shareable content
Real-time protection for the
data
Quick delivery of data, not slowed
down by scanning
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
End Points
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
NETWORK APPLICATIONS
© F-Secure Confidential38
© F-Secure Confidential39
SharePoint
Exchange
NETWORK APPLICATION CONSIDERATIONS
One Drive
Virus protection for email servers
Spam protectionVirus protection
for mailboxes
Real-time protection for
shareable content
First line of and known
vulnerabilities
Protect corporate shareable
content
Scanning uploaded and downloaded
content
defense against zero-day threats
Versioning for applications
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
End Points
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
GATEWAY
© F-Secure Confidential41
© F-Secure Confidential42
SMTP
HTTP
GATEWAY CONSIDERATIONS
FTP
POP
FILE TRANSFER SCANNING
SPAM FILTERING
WEB CONTENT CONTROL
WEB TRAFFIC SCANNING
EMAIL TRAFFIC SCANNING
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
End Points
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
SMARTPHONE & TABLET
© F-Secure Confidential44
© F-Secure Confidential45
MANAGEMENT
DATA
SMARTPHONE & TABLET CONSIDERATIONS
CONTROL
APPS
Protect devices in the field
Protect against WIFI hot spots
Application Protection
Tracking Attempts
URL repetitional lookup
Anti theft protection
Mobile fleet management
VPN Tunneling
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
End Points
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
CLOUDAPPLICATIONS &
SERVICES
© F-Secure Confidential47
© F-Secure Confidential48
MANAGEMENT
DATA
CLOUD APPLICATIONS CONSIDERATIONS
CONTENT
File content monitoring
URL content monitoring
URL content filtering
Email content monitoring
Auto detect malicious content
Auto remediation of
malicious content
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
End Points
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
HOSTED EMAIL
© F-Secure Confidential50
© F-Secure Confidential51
O365
HOSTED EMAIL CONSIDERATIONS
GOOGLEMAIL
Virus protection
Anti Spoofing
Email content monitoring
Malware protectionSpam protection
Data loss prevention
Email encryption capabilities
© F-Secure Confidential
TYPICAL NETWORK MAPSmartphone / Tablet
Virtual NetworksCloud Applications
Hosted Email
Cloud Services
Network Application Gateway
Network Storage
Workstation ServerVirtual Servers
Exchange
EMC Storage
SharePoint HTTP/ FTP/ SMTP Traffic
End Points
Laptops
NETWORK PERIMETER
NETWORK PERIMETER
NE
TW
OR
K P
ER
IME
TE
R
NE
TW
OR
K P
ER
IME
TE
R
© F-Secure Confidential53
THANK YOU
f-secure.com
top related