CORPORATE SECURITY DON T BE AN EASY TARGET Pekka Usva Capital Market Day 16 Sept 2015 1
AGENDA Corporate Security in brief Market overview and key trends Offering and channels Competition Enabling growth Performance in 2015 Key initiatives Case examples Must-win battles in 2015-2017 <ADD TOPICAL POTO> 2
KEY MARKET DRIVERS MOBILITY CLOUDIFICATION ADVANCED THREATS (APT) MARKET DRIVERS For each PC there will be 1.6 mobile devices Mobile workforce with BYOD and BYOA Use cases are equal regardless of the end-point type, so is security The number of connected devices will explode with IoT Efficiencies and productivity gains from services to production Facilitates flexible business models (incl. SaaS) Scales with the business Usability and security concerns to be addressed Advanced persistent threats do not discriminate businesses based on size or verticals ATP attacks cause significant financial damage and are nearly impossible to prevent Endpoints are and will be still first line of cyber defense against APT attacks F-SECURE S APPROACH BEST ENDPOINT SECURITY ACROSS ALL DEVICES NOW AND IN THE FUTURE CLOUD-BASED SECURITY WHICH SCALES WITH SMES NEEDS ENTERPRISE GRADE CYBER SECURITY AFFORDABLE FOR SMES 3
MAIN MARKETS ENDPOINT CONSUMER PROTECTION CENTRALIZED SMALL AND MEDIUM-SIZED MANAGEMENT COMPANIES ENTERPRISE NETWORK SECURITY DESCRIPTION Large, global yet mature PC and server security market stays relevant in strategy period. Mobile security market emerging, both developing and mature countries. Centralized security with adjacent IT management capabilities increasingly relevant. ATP and cloud approach will accelerate need for modern email and web security. DRIVERS Despite declining PC shipments globally companies will keep on consuming PC technology, including Macs, as proven-to-work, convenient and cost efficient companies are traditional. Endpoint protection will merge with separate endpoint detect and response market. PC and post-pc endpoints combined create a true threat and problem for companies from security and fleet management perspective, starting from visibility and awareness. 4
OUR CYBER SECURITY OFFERING Security & Risk Assessment Security Advisory Compliance & Security Improvement Vulnerability Management Training & Security Culture PREDICT PREVENT End-Point Protection E-Mail & Web Traffic Scanning Central Security Management Forensics Incident Response RESPOND DETECT Advanced Threat Protection Security Monitoring & Alerting 5
OUR BEST IN CLASS END-POINT SECURITY SOLUTIONS We put you in control of your security with best in class end-point protection and security management solutions. Because simple malware protection is not enough. ENDPOINT PROTECTION Windows, Mac and Linux Security Android and ios Security Server Security Virtual Environment Security CENTRAL MANAGEMENT Security Management Patch Management Device Management NETWORK PROTECTION Secure Mobile VPN Email Filtering and Security Web Filtering 6
MANAGED SERVICE PROTECTION SERVICE FOR BUSINESS ON-PREMISE BUSINESS SUITE Advanced multi-device security with streamlined central management Device & Server Security Patch Management Mobile Security Easy installation, from the cloud Streamlined management for licenses & policies Protection Service for Email, hosted solution Best suited for up to 500 seats Scalable security for full control and advanced central management. Device & Server Security Patch Management Virtualization Security Local installation, on-site servers Advanced management for licenses and policies Messaging Security Gateway, appliance Best suited for +100 seats 15
OUR COMPETITIVE EDGE BUSINESS SUITE (On-premise) PROTECTION SERVICE FOR BUSINESS (SaaS) KEY DIFFERENTIATOR DeepGuard pro-active on-host protection against new and emerging threats Best endpoint protection 4 years in a row Security, privacy and vulnerability management in one solution Best endpoint protection 4 years in a row Next-gen BYOD support: from security to privacy Advanced ios security Partner TCO, more money with less effort. Robust cloud service COMPETITION Competition may vary locally but the usual suspects are the following: WHY DO WE WIN, SAID BY END- CUSTOMERS AND PARTNERS: 1. Ease of use 2. Added value compared to competitors: Better protection against viruses, more features, central admin, updates, portal 3. Quality & Reliability & Customer support 8
MAKING SECURITY INTUITIVE Three corners of innovation: Technology User experience Business models 9
HIGH CUSTOMER AND PARTNER LOYALTY END-USER NPS SCORE 37% FIVE OUT OF TEN END-USERS SPONTANEUSLY PROMOTE F-SECURE. PSB END-USER NPS 40% PARTNER NPS SCORE 52% EIGHT OUT OF TEN PARTNERS HAPPY OR EXTREMELY HAPPY AND LOYAL TO F-SECURE. PSB PARTNER NPS 73%
PERFORMANCE IN 2015 SaaS growth accelerating Market growth approximately 15-20% We are in line with market growth Main markets are in Europe France, Benelux and Japan experience fastest growth SAAS = MONTHLY SUBSCRIPTION REGARDLESS OF THE PRODUCT SOURCE: Gartner, MarketsandMarkets, IDC
KEY INITIATIVES EFFICIENCY IN SALES EXECUTION Focus in new partner & customer acquisition while renewals management outsourced Runrate business handled by channel Deal business via channel with F-Secure lead SMB boosts in DACH and France with positive customer lifetime value invest on top EXCELLENCE IN CHANNEL & GTM Hunt for new channel partners with +10% y-o-y Drive channel quality up by profiling and channel training Automated lead generation to speed up partner onboarding, first deal closing and driving partner activity up SOLUTION COMPETITIVENESS Investing heavily on solution user experience with channel focus Streamline partner s daily routines via service design Unifying two solution lines for optimal user and partner experience 12
MUST WINS SAAS GAME We need to provide price-sensitive SMEs with scalable, relevant and cost-efficient security solutions as a service CHANNEL GAME Cloudification & SaaS changes SMEs buying dynamics and thus their requirements towards channel. We need to excel in the new value-chain. CYBER SECURITY GAME Endpoints are and will be the first line of defense against new and emerging attacks which do not discriminate SMEs. We need to keep our customers safe. 13