jens thonke, evp, cyber security services jyrki …...data /ip ensuring protection against malware...

19
1 IMPROVED SECURITY FOR THE MID-MARKET CORPORATE SECURITY Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security

Upload: others

Post on 12-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

1

IMPROVED SECURITYFOR THE MID-MARKET

CORPORATE SECURITY

Jens Thonke, EVP, Cyber Security Services

Jyrki Rosenberg, EVP, Corporate Cyber Security

Page 2: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

SYNERGIES ACROSS SEGMENTS

2

Privacy Family Connected home

F-Secure Capital Markets Day 2017

Page 3: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

CYBER SECURITY IS A TOPIC FOR ALL ORGANIZATION LEVELS

F-Secure Capital Markets Day 20173

Improve security from top to bottom STRATEGIC

Risk management

TACTICAL Security management

EXECUTIONTechnology management

Page 4: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

F-Secure Capital Markets Day 20174

REDTEAMING

SECURITYASSESMENTS

INCIDENT MANAGEMENT& FORENSICS

HARDWARE SECURITY ASSESSMENT

TECHNICAL SECURITY SERVICES

AUDIT & ANALYSIS

DEVELOPMENTPROGRAMS

COACHING &EXERCISES

RISK & SECURITY MANAGEMENT

INTELLIGENCESERVICES

INTELLIGENCEPLATFORM

CYBERINTELLIGENCE

Page 5: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

REAL-LIFE EXAMPLE

5 F-Secure Capital Markets Day 2017

F-Secure’sred teaming

Customer acknowledges they

need better detection capabilities

Customer acquires Rapid Detection

Service

Page 6: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

LEARNINGS FROM REAL CUSTOMER CASES ALSO FEED INTO PRODUCT DEVELOPMENT

F-Secure Capital Markets Day 20176

Incident Response, Forensics

Vulnerability management as

a managed service

Hardwaresecurity

assessments

RDS development RADAR development SENSE development

Page 7: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

HOW DO CYBER SECURITY SERVICES BENEFIT F-SECURE?

F-Secure Capital Markets Day 20177

Productdevelopment

Productsales

Companybrand

Threatresearch

Cyber security services

Page 8: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

SYNERGIES ACROSS SEGMENTS

8

Privacy Family Connected home

F-Secure Capital Markets Day 2017

Page 9: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

WHY F-SECURE FOCUSES ON MID-MARKET COMPANIES?

F-Secure Capital Markets Day 20179

TOP-3 SECURITY PRIORITIES

MID-MARKET

1

2

3

Preventing data breaches and loss of customer or company data /IP

Ensuring protection against malware and ransomware

Detecting attacks that mighthave bypassed othersecurity measures

GOOD FIT FOR F-SECURE

73% are either considering or going to change vendors in next 12 months —to get a better solution, price is not the primary driver

74%say that the reseller relationship is a key or strategic partnership

1.5Ma shortfall of 1.5M IT security specialists predicted in 2020 (Frost & Sullivan)

Page 10: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

F-SECURE ENDPOINT PROTECTIONIS MUCH MORE THAN ANTI-VIRUS

10 F-Secure Capital Markets Day 2017

Page 11: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

DETECTION OF MALICIOUS ACTIVITYIS EVOLVING

F-Secure Capital Markets Day 201711

From single-shot, point detectionsand binary (ON/OFF) responses

To event flow and context based detections, and multi-faceted, automated,

risk based responses

Page 12: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

ALARM SYSTEMS PROVIDE AUTOMATED OR MANAGED RESPONSE

12

Endpoint detection & responseNew solution out in 2018

3

Managed serviceF-Secure Rapid Detection Service

Endpoint and network sensors

Cloud sensors

User behavior Honeypots

1

2

4

5

Analyticsplatform

Monitoringplatform

Report suspicious behavior

Threat intelligence

F-Secure Capital Markets Day 2017

Page 13: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

TWO DIFFERENT OPPORTUNITIES WITH DETECTION CAPABILITIES

Detection capabilities supplement the existingendpoint protection market

0

2000

4000

6000

2015 2016 2017 2018 2019 2020

Endpoint protection

Endpoint detection & response (EDR)

2.4%45.3%U

SD M

Managed services is an additional opportunity

F-Secure Capital Markets Day 201713

Endpoint detection & responseNew solution out in 2018

Managed serviceF-Secure Rapid Detection Service

Page 14: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

OUR HOLISTICCYBER SECURITY

OFFERING

F-Secure Capital Markets Day 201714

Page 15: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

REAL EXAMPLE OF CROSS-SELLING

15

Endpoint protection

solution

F-Secure Radar

Cyber security services

F-Secure Capital Markets Day 2017

Page 16: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

ADDRESSING MID-MARKET NEEDS THROUGHVALUE ADDING PARTNERS

F-Secure Capital Markets Day 201716

SMB RESELLER

DIS

TRIB

UTO

R

MSP

VAR

ECOM

PRO

DU

CTS

PART

NER

S

SYSTEM INTEGRATOR

SMBs MID-MARKET200–5000

ENTERPRISES+500025–200

END-POINT DETECTION & RESPONSE

END-POINT PROTECTION

VULNERABILITY MANAGEMENT

MANAGED DETECTION & RESPONSE

Page 17: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

BROADER OFFERING PROVIDES ADDITIONAL OPPORTUNITIES FOR PARTNERS

17

TE

CH

NO

LOG

YSE

RV

ICE

S

EndpointProtection

Planning & Implementation

Operation & Management

Malware response

Detection &Response

Planning & Implementation

Operation & Management

Incident management

Threat hunting

F-Secure Capital Markets Day 2017

Page 18: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

A UNIQUE MIX OF ASSETS

18

ENDPOINTPROTECTION

ENDPOINT DETECTIONAND RESPONSE

MANAGED DETECTIONAND RESPONSE

INCIDENT RESPONSE,RED TEAMING AND OTHER SERVICES

“Traditional”

ven

do

rs“N

ext-gen”

pla

yer

s

F-Secure Capital Markets Day 2017

VULNERABILITY MANAGEMENT

Page 19: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

FOCUS AREAS INCORPORATE SECURITY

F-Secure Capital Markets Day19

• Accelerate growth in Managed Detection & Response(F-Secure Rapid Detection Service)

• Increase cross-sell and upsell by creating a more integrated offering for mid-market

• Strengthen channel to mid-market

• Successful Endpoint Detection & Response Market entry