Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY

Similar documents
STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

Samu Konttinen, CEO, F-Secure WE ARE F-SECURE. 1 F-Secure

STRATEGY PEACE OF MIND AS A SERVICE Samu Konttinen, CEO

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED

BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response

Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16%

F-SECURE FOR 30 YEARS FRONTRUNNER IN CYBER SECURITY. Samu Konttinen, CEO, F-Secure

ACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018

Symantec Ransomware Protection

CYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION

HOLISTIC CYBER SECURITY FOR BUSINESSES

Managed Endpoint Defense

Cylance Axiom Alliances Program

From Managed Security Services to the next evolution of CyberSoc Services

Interim Report Q2/2016 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR

PRODUCT OVERVIEW. On-demand threat investigation, root cause analysis and remediation advice without the need for extra internal resources

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Sophos Central for partners and customers: overview and new features. Jonathan Shaw Senior Product Manager, Sophos Central

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

MANAGED DETECTION AND RESPONSE

CYBER RESILIENCE & INCIDENT RESPONSE

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

esendpoint Next-gen endpoint threat detection and response

Cyber Threat XChange: A New Approach to Managing Security

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

Are we breached? Deloitte's Cyber Threat Hunting

Technical Brochure F-SECURE THREAT SHIELD

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Managed Security Services - Endpoint Managed Security on Cloud

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

WELCOME TO F-SECURE S ANNUAL GENERAL MEETING

Kristian Järnefelt, EVP, Consumer Cyber Security CONSUMER SECURITY

Symantec and its partner community are securing the cloud generation, together

Cyber Security Technologies

Changing the Game: An HPR Approach to Cyber CRM007

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

to Enhance Your Cyber Security Needs

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

A STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY. Samu Konttinen, CEO Interim Results Q1 2017

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

Sophos. Allan Widell Channel Account Executive. 24. August 2017

INCIDENT RESPONDER'S FIELD GUIDE INCIDENT RESPONDER'S INCIDENT RESPONSE PLAN FIELD GUIDE LESSONS FROM A FORTUNE 100 INCIDENT RESPONSE LEADER

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

McAfee Endpoint Threat Defense and Response Family

Put an end to cyberthreats

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

THE ACCENTURE CYBER DEFENSE SOLUTION

Deception: Deceiving the Attackers Step by Step

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

WHITEPAPER ATTIVO NETWORKS DECEPTION TECHNOLOGY FOR MERGERS AND ACQUISITIONS

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Building Resilience in a Digital Enterprise

SANS Top 20 CIS. Critical Security Control Solution Brief Version 6. SANS Top 20 CIS. EventTracker 8815 Centre Park Drive, Columbia MD 21045

SandBlast Agent FAQ Check Point Software Technologies Ltd. All rights reserved P. 1. [Internal Use] for Check Point employees

Information Security and Cyber Security

2017 Annual Meeting of Members and Board of Directors Meeting

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

Threat Centric Vulnerability Management

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

Assessing Your Incident Response Capabilities Do You Have What it Takes?

Building a Resilient Security Posture for Effective Breach Prevention

Building and Instrumenting the Next- Generation Security Operations Center. Sponsored by

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

AT&T Endpoint Security

AppDefense Cb Defense Configuration Guide. AppDefense Appendix Cb Defense Integration Configuration Guide

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

The New Era of Cognitive Security

Cyber Threat Landscape April 2013

Defining cybersecurity.

ENDPOINT SECURITY AND THE CLOUD: HOW TO APPLY PREDICTIVE ANALYTICS AND BIG DATA

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

accelerate your ambition Chris Jenkins

May the (IBM) X-Force Be With You

Advanced Threat Protection Buyer s Guide GUIDANCE TO ADVANCE YOUR ORGANIZATION S SECURITY POSTURE

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

BOLSTERING DETECTION ABILITIES KENT KNUDSEN JUNE 23, 2016

Does someone else own your company s reputation? EY Global Information Security Survey 2018

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

Designing and Building a Cybersecurity Program

CA Security Management

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Securing Your Digital Transformation

OPSWAT, Inc. Corporate update

Carbon Black PCI Compliance Mapping Checklist

Deep instinct For MSSPs

ISE North America Leadership Summit and Awards

Cybersecurity Auditing in an Unsecure World

CERT Overview. Jeffrey J. Carpenter 2008 Carnegie Mellon University

A Data-Centric Approach to Endpoint Security

deep (i) the most advanced solution for managed security services

Security Operations & Analytics Services

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Transcription:

Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY IMPROVED SECURITY FOR THE MID-MARKET 1

SYNERGIES ACROSS SEGMENTS Privacy Family Connected home 2

CYBER SECURITY IS A TOPIC FOR ALL ORGANIZATION LEVELS Improve security from top to bottom STRATEGIC Risk management TACTICAL Security management EXECUTION Technology management 3

TECHNICAL SECURITY SERVICES RED TEAMING SECURITY ASSESMENTS INCIDENT MANAGEMENT & FORENSICS HARDWARE SECURITY ASSESSMENT RISK & SECURITY MANAGEMENT AUDIT & ANALYSIS DEVELOPMENT PROGRAMS COACHING & EXERCISES CYBER INTELLIGENCE INTELLIGENCE SERVICES INTELLIGENCE PLATFORM 4

REAL-LIFE EXAMPLE F-Secure s red teaming Customer acknowledges they need better detection capabilities Customer acquires Rapid Detection Service 5

LEARNINGS FROM REAL CUSTOMER CASES ALSO FEED INTO PRODUCT DEVELOPMENT Incident Response, Forensics Vulnerability management as a managed service Hardware security assessments RDS development RADAR development SENSE development 6

HOW DO CYBER SECURITY SERVICES BENEFIT F-SECURE? Product development Product sales Threat research Cyber security services Company brand 7

SYNERGIES ACROSS SEGMENTS Privacy Family Connected home 8

WHY F-SECURE FOCUSES ON MID-MARKET COMPANIES? TOP-3 SECURITY PRIORITIES GOOD FIT FOR F-SECURE 1 Preventing data breaches and loss of customer or company data /IP 73% are either considering or going to change vendors in next 12 months to get a better solution, price is not the primary driver 2 3 Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures MID-MARKET 74% say that the reseller relationship is a key or strategic partnership 1.5M a shortfall of 1.5M IT security specialists predicted in 2020 (Frost & Sullivan) 9

F-SECURE ENDPOINT PROTECTION IS MUCH MORE THAN ANTI-VIRUS 10

DETECTION OF MALICIOUS ACTIVITY IS EVOLVING From single-shot, point detections and binary (ON/OFF) responses To event flow and context based detections, and multi-faceted, automated, risk based responses 11

ALARM SYSTEMS PROVIDE AUTOMATED OR MANAGED RESPONSE Threat intelligence 1 4 Endpoint detection & response New solution out in 2018 Endpoint and network sensors Cloud sensors 2 Analytics platform 3 Monitoring platform 5 User behavior Honeypots Report suspicious behavior Managed service F-Secure Rapid Detection Service 12

USD M TWO DIFFERENT OPPORTUNITIES WITH DETECTION CAPABILITIES Endpoint detection & response New solution out in 2018 6000 4000 2000 0 2015 2016 2017 2018 2019 2020 Endpoint detection & response (EDR) Endpoint protection Detection capabilities supplement the existing endpoint protection market 45.3% 2.4% Managed service F-Secure Rapid Detection Service Managed services is an additional opportunity 13

OUR HOLISTIC CYBER SECURITY OFFERING 14

REAL EXAMPLE OF CROSS-SELLING Endpoint protection solution F-Secure Radar Cyber security services 15

PARTNERS DISTRIBUTOR PRODUCTS ADDRESSING MID-MARKET NEEDS THROUGH VALUE ADDING PARTNERS SMBs 25 200 MID-MARKET 200 5000 ENTERPRISES +5000 ECOM END-POINT PROTECTION END-POINT DETECTION & RESPONSE VULNERABILITY MANAGEMENT MANAGED DETECTION & RESPONSE SMB RESELLER VAR MSP SYSTEM INTEGRATOR 16

BROADER OFFERING PROVIDES ADDITIONAL OPPORTUNITIES FOR PARTNERS Incident management TECHNOLOGY SERVICES Malware response Operation & Management Planning & Implementation Endpoint Protection Threat hunting Operation & Management Planning & Implementation Detection & Response 17

Traditional vendors Next-gen players A UNIQUE MIX OF ASSETS ENDPOINT PROTECTION ENDPOINT DETECTION AND RESPONSE MANAGED DETECTION AND RESPONSE INCIDENT RESPONSE,RED TEAMING AND OTHER SERVICES VULNERABILITY MANAGEMENT 18

FOCUS AREAS IN CORPORATE SECURITY Accelerate growth in Managed Detection & Response (F-Secure Rapid Detection Service) Successful Endpoint Detection & Response Market entry Strengthen channel to mid-market Increase cross-sell and upsell by creating a more integrated offering for mid-market 19 F-Secure Capital Markets Day