DON T BE AN EASY TARGET

From this document you will learn the answers to the following questions:

What is one of the ways that a PC can be used for security?

What is the abbreviation for a computer?

Similar documents
CYBER SECURITY SERVICES PWNED

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

CYBERSECURITY - STRATEGIES. What any company or enterprise must have in mind regarding cybersecurity.

Microsoft Windows Intune: Cloud-based solution

How To Get A Cloud Service For A Small Business

2012 North American Enterprise Firewalls Market Penetration Leadership Award

The ForeScout Difference

THE EASY WAY TO SECURITY AND SIMPLICITY. Business Suite

A Channel Company White Paper. Online Security. Beyond Malware and Antivirus. Brought to You By:

Dupaco Cafe Secure your business Your time is valuable how F-Secure can help you make the most out of it

The Evolution of the Enterprise And Enterprise Security

End-user Security Analytics Strengthens Protection with ArcSight

SECURE AND MANAGE YOUR MOBILE FLEET Freedome for Business

Identity and Access Management (IAM)

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Symantec Client Management Suite 8.0

SNOW SOFTWARE. Fredrik Spolén Country Manager Sales Director. Norway Denmark Finland

Sophos Cloud and Partner Dashboard Jonathan Shaw

How To Protect Your Network From Attack From A Network Security Threat

The Benefits of an Integrated Approach to Security in the Cloud

How to Choose the Right Security Information and Event Management (SIEM) Solution

Marble & MobileIron Mobile App Risk Mitigation

SECURE SHARING AND COMMUNICATION. Protection for servers, and collaboration

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

Putting Web Threat Protection and Content Filtering in the Cloud

Ricoh Consulting. IT Service. Affordable, smart solutions from Ricoh Consulting. Contact

SOFTWARE UPDATER A unique tool to protect your business against known threats

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet

Sophos Acquires Cyberoam

ForeScout MDM Enterprise

Braindumps QA

Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

Putting Operators at the Centre of

Cisco Master Security Specialization Practice Areas Summary. February 2016

ONLINE AND MOBILE BANKING, YOUR RISKS COVERED

Cisco Secure BYOD Solution

BYOD Networks for Kommuner

McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs)

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

IBM Endpoint Manager Product Introduction and Overview

BEST PRACTICES RESEARCH

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

How to Manage Security Risks in the Mobile World

State of Security Monitoring of Public Cloud

Testing the Security of your Applications

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

IDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

Optimizing the Mobile Cloud Era Through Agility and Automation

Sage ERP I White Paper. ERP and the Cloud: What You Need to Know

How to Select the Right Remote Support Tool

Bitdefender GravityZone Sales Presentation

Winning with Check Point Secure Web Gateway. Sales Training. August [Restricted] ONLY for designated groups and individuals

Cisco Master Security Specialization Practice Areas Summary. June 2015

Guarantee Microsoft Office 365 end-user experience

RSA Identity and Access Management 2014

Advanced Security for Account Managers-ASAM

Samsung SDS. Enterprise Mobility Management

Bucharest, July 31, 2012 Bitdefender Cloud Security for Endpoints Customer Presentation

Palo Alto Networks. September 2014

Leveraging security from the cloud

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

Unified Security, ATP and more

Analysis of the Global Security Information and Event Management (SIEM) and Log Management (LM) Market All Information Becomes Actionable

Office Technologies Managed Services Professional Services. SERVING OVER 18,000 CUSTOMERS IN THE NYC & TRI-STATE AREA tomorrowsoffice.

IT Security. Muscat 15+ ABOUT US IN A GLANCE

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Cisco Advanced Malware Protection for Endpoints

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Cisco OnPlus: IT Infrastructure Advisory and Management Services Solution For Small Businesses

Requirements When Considering a Next- Generation Firewall

overview Enterprise Security Solutions

How To Get A Better Desktop Management System

How to survive in a world of Virtualization and Cloud Computing, where you even can t trust your own environment anymore. Raimund Genes, CTO

The Business of Cloud Communications

Intelligent, Scalable Web Security

Beyond Mobile Device Security: Why Comprehensive Endpoint Security and Management is a Must-Have for Small and Medium Enterprises

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

WildFire. Preparing for Modern Network Attacks

Protect Identities for people, workstations, mobiles, networks

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

A LOOK AT U.S. & EUROPEAN CLOUD ADOPTION TRENDS & FORMING LASTING PARTNERSHIPS. Pete Lamson Senior Vice President of Sales & Marketing Carbonite

Protection Against Advanced Persistent Threats

I D C A N A L Y S T C O N N E C T I O N

How To Print With P2C

Security MWC Nokia Solutions and Networks. All rights reserved.

VMware End User Computing Horizon Suite

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Cisco Security Appliances

Transcription:

CORPORATE SECURITY DON T BE AN EASY TARGET Pekka Usva Capital Market Day 16 Sept 2015 1

AGENDA Corporate Security in brief Market overview and key trends Offering and channels Competition Enabling growth Performance in 2015 Key initiatives Case examples Must-win battles in 2015-2017 <ADD TOPICAL POTO> 2

KEY MARKET DRIVERS MOBILITY CLOUDIFICATION ADVANCED THREATS (APT) MARKET DRIVERS For each PC there will be 1.6 mobile devices Mobile workforce with BYOD and BYOA Use cases are equal regardless of the end-point type, so is security The number of connected devices will explode with IoT Efficiencies and productivity gains from services to production Facilitates flexible business models (incl. SaaS) Scales with the business Usability and security concerns to be addressed Advanced persistent threats do not discriminate businesses based on size or verticals ATP attacks cause significant financial damage and are nearly impossible to prevent Endpoints are and will be still first line of cyber defense against APT attacks F-SECURE S APPROACH BEST ENDPOINT SECURITY ACROSS ALL DEVICES NOW AND IN THE FUTURE CLOUD-BASED SECURITY WHICH SCALES WITH SMES NEEDS ENTERPRISE GRADE CYBER SECURITY AFFORDABLE FOR SMES 3

MAIN MARKETS ENDPOINT CONSUMER PROTECTION CENTRALIZED SMALL AND MEDIUM-SIZED MANAGEMENT COMPANIES ENTERPRISE NETWORK SECURITY DESCRIPTION Large, global yet mature PC and server security market stays relevant in strategy period. Mobile security market emerging, both developing and mature countries. Centralized security with adjacent IT management capabilities increasingly relevant. ATP and cloud approach will accelerate need for modern email and web security. DRIVERS Despite declining PC shipments globally companies will keep on consuming PC technology, including Macs, as proven-to-work, convenient and cost efficient companies are traditional. Endpoint protection will merge with separate endpoint detect and response market. PC and post-pc endpoints combined create a true threat and problem for companies from security and fleet management perspective, starting from visibility and awareness. 4

OUR CYBER SECURITY OFFERING Security & Risk Assessment Security Advisory Compliance & Security Improvement Vulnerability Management Training & Security Culture PREDICT PREVENT End-Point Protection E-Mail & Web Traffic Scanning Central Security Management Forensics Incident Response RESPOND DETECT Advanced Threat Protection Security Monitoring & Alerting 5

OUR BEST IN CLASS END-POINT SECURITY SOLUTIONS We put you in control of your security with best in class end-point protection and security management solutions. Because simple malware protection is not enough. ENDPOINT PROTECTION Windows, Mac and Linux Security Android and ios Security Server Security Virtual Environment Security CENTRAL MANAGEMENT Security Management Patch Management Device Management NETWORK PROTECTION Secure Mobile VPN Email Filtering and Security Web Filtering 6

MANAGED SERVICE PROTECTION SERVICE FOR BUSINESS ON-PREMISE BUSINESS SUITE Advanced multi-device security with streamlined central management Device & Server Security Patch Management Mobile Security Easy installation, from the cloud Streamlined management for licenses & policies Protection Service for Email, hosted solution Best suited for up to 500 seats Scalable security for full control and advanced central management. Device & Server Security Patch Management Virtualization Security Local installation, on-site servers Advanced management for licenses and policies Messaging Security Gateway, appliance Best suited for +100 seats 15

OUR COMPETITIVE EDGE BUSINESS SUITE (On-premise) PROTECTION SERVICE FOR BUSINESS (SaaS) KEY DIFFERENTIATOR DeepGuard pro-active on-host protection against new and emerging threats Best endpoint protection 4 years in a row Security, privacy and vulnerability management in one solution Best endpoint protection 4 years in a row Next-gen BYOD support: from security to privacy Advanced ios security Partner TCO, more money with less effort. Robust cloud service COMPETITION Competition may vary locally but the usual suspects are the following: WHY DO WE WIN, SAID BY END- CUSTOMERS AND PARTNERS: 1. Ease of use 2. Added value compared to competitors: Better protection against viruses, more features, central admin, updates, portal 3. Quality & Reliability & Customer support 8

MAKING SECURITY INTUITIVE Three corners of innovation: Technology User experience Business models 9

HIGH CUSTOMER AND PARTNER LOYALTY END-USER NPS SCORE 37% FIVE OUT OF TEN END-USERS SPONTANEUSLY PROMOTE F-SECURE. PSB END-USER NPS 40% PARTNER NPS SCORE 52% EIGHT OUT OF TEN PARTNERS HAPPY OR EXTREMELY HAPPY AND LOYAL TO F-SECURE. PSB PARTNER NPS 73%

PERFORMANCE IN 2015 SaaS growth accelerating Market growth approximately 15-20% We are in line with market growth Main markets are in Europe France, Benelux and Japan experience fastest growth SAAS = MONTHLY SUBSCRIPTION REGARDLESS OF THE PRODUCT SOURCE: Gartner, MarketsandMarkets, IDC

KEY INITIATIVES EFFICIENCY IN SALES EXECUTION Focus in new partner & customer acquisition while renewals management outsourced Runrate business handled by channel Deal business via channel with F-Secure lead SMB boosts in DACH and France with positive customer lifetime value invest on top EXCELLENCE IN CHANNEL & GTM Hunt for new channel partners with +10% y-o-y Drive channel quality up by profiling and channel training Automated lead generation to speed up partner onboarding, first deal closing and driving partner activity up SOLUTION COMPETITIVENESS Investing heavily on solution user experience with channel focus Streamline partner s daily routines via service design Unifying two solution lines for optimal user and partner experience 12

MUST WINS SAAS GAME We need to provide price-sensitive SMEs with scalable, relevant and cost-efficient security solutions as a service CHANNEL GAME Cloudification & SaaS changes SMEs buying dynamics and thus their requirements towards channel. We need to excel in the new value-chain. CYBER SECURITY GAME Endpoints are and will be the first line of defense against new and emerging attacks which do not discriminate SMEs. We need to keep our customers safe. 13