Top Banner
1 IMPROVED SECURITY FOR THE MID-MARKET CORPORATE SECURITY Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security
19

Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

Jul 12, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

1

IMPROVED SECURITYFOR THE MID-MARKET

CORPORATE SECURITY

Jens Thonke, EVP, Cyber Security Services

Jyrki Rosenberg, EVP, Corporate Cyber Security

Page 2: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

SYNERGIES ACROSS SEGMENTS

2

Privacy Family Connected home

F-Secure Capital Markets Day 2017

Page 3: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

CYBER SECURITY IS A TOPIC FOR ALL ORGANIZATION LEVELS

F-Secure Capital Markets Day 20173

Improve security from top to bottom STRATEGIC

Risk management

TACTICAL Security management

EXECUTIONTechnology management

Page 4: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

F-Secure Capital Markets Day 20174

REDTEAMING

SECURITYASSESMENTS

INCIDENT MANAGEMENT& FORENSICS

HARDWARE SECURITY ASSESSMENT

TECHNICAL SECURITY SERVICES

AUDIT & ANALYSIS

DEVELOPMENTPROGRAMS

COACHING &EXERCISES

RISK & SECURITY MANAGEMENT

INTELLIGENCESERVICES

INTELLIGENCEPLATFORM

CYBERINTELLIGENCE

Page 5: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

REAL-LIFE EXAMPLE

5 F-Secure Capital Markets Day 2017

F-Secure’sred teaming

Customer acknowledges they

need better detection capabilities

Customer acquires Rapid Detection

Service

Page 6: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

LEARNINGS FROM REAL CUSTOMER CASES ALSO FEED INTO PRODUCT DEVELOPMENT

F-Secure Capital Markets Day 20176

Incident Response, Forensics

Vulnerability management as

a managed service

Hardwaresecurity

assessments

RDS development RADAR development SENSE development

Page 7: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

HOW DO CYBER SECURITY SERVICES BENEFIT F-SECURE?

F-Secure Capital Markets Day 20177

Productdevelopment

Productsales

Companybrand

Threatresearch

Cyber security services

Page 8: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

SYNERGIES ACROSS SEGMENTS

8

Privacy Family Connected home

F-Secure Capital Markets Day 2017

Page 9: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

WHY F-SECURE FOCUSES ON MID-MARKET COMPANIES?

F-Secure Capital Markets Day 20179

TOP-3 SECURITY PRIORITIES

MID-MARKET

1

2

3

Preventing data breaches and loss of customer or company data /IP

Ensuring protection against malware and ransomware

Detecting attacks that mighthave bypassed othersecurity measures

GOOD FIT FOR F-SECURE

73% are either considering or going to change vendors in next 12 months —to get a better solution, price is not the primary driver

74%say that the reseller relationship is a key or strategic partnership

1.5Ma shortfall of 1.5M IT security specialists predicted in 2020 (Frost & Sullivan)

Page 10: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

F-SECURE ENDPOINT PROTECTIONIS MUCH MORE THAN ANTI-VIRUS

10 F-Secure Capital Markets Day 2017

Page 11: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

DETECTION OF MALICIOUS ACTIVITYIS EVOLVING

F-Secure Capital Markets Day 201711

From single-shot, point detectionsand binary (ON/OFF) responses

To event flow and context based detections, and multi-faceted, automated,

risk based responses

Page 12: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

ALARM SYSTEMS PROVIDE AUTOMATED OR MANAGED RESPONSE

12

Endpoint detection & responseNew solution out in 2018

3

Managed serviceF-Secure Rapid Detection Service

Endpoint and network sensors

Cloud sensors

User behavior Honeypots

1

2

4

5

Analyticsplatform

Monitoringplatform

Report suspicious behavior

Threat intelligence

F-Secure Capital Markets Day 2017

Page 13: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

TWO DIFFERENT OPPORTUNITIES WITH DETECTION CAPABILITIES

Detection capabilities supplement the existingendpoint protection market

0

2000

4000

6000

2015 2016 2017 2018 2019 2020

Endpoint protection

Endpoint detection & response (EDR)

2.4%45.3%U

SD M

Managed services is an additional opportunity

F-Secure Capital Markets Day 201713

Endpoint detection & responseNew solution out in 2018

Managed serviceF-Secure Rapid Detection Service

Page 14: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

OUR HOLISTICCYBER SECURITY

OFFERING

F-Secure Capital Markets Day 201714

Page 15: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

REAL EXAMPLE OF CROSS-SELLING

15

Endpoint protection

solution

F-Secure Radar

Cyber security services

F-Secure Capital Markets Day 2017

Page 16: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

ADDRESSING MID-MARKET NEEDS THROUGHVALUE ADDING PARTNERS

F-Secure Capital Markets Day 201716

SMB RESELLER

DIS

TRIB

UTO

R

MSP

VAR

ECOM

PRO

DU

CTS

PART

NER

S

SYSTEM INTEGRATOR

SMBs MID-MARKET200–5000

ENTERPRISES+500025–200

END-POINT DETECTION & RESPONSE

END-POINT PROTECTION

VULNERABILITY MANAGEMENT

MANAGED DETECTION & RESPONSE

Page 17: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

BROADER OFFERING PROVIDES ADDITIONAL OPPORTUNITIES FOR PARTNERS

17

TE

CH

NO

LOG

YSE

RV

ICE

S

EndpointProtection

Planning & Implementation

Operation & Management

Malware response

Detection &Response

Planning & Implementation

Operation & Management

Incident management

Threat hunting

F-Secure Capital Markets Day 2017

Page 18: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

A UNIQUE MIX OF ASSETS

18

ENDPOINTPROTECTION

ENDPOINT DETECTIONAND RESPONSE

MANAGED DETECTIONAND RESPONSE

INCIDENT RESPONSE,RED TEAMING AND OTHER SERVICES

“Traditional”

ven

do

rs“N

ext-gen”

pla

yer

s

F-Secure Capital Markets Day 2017

VULNERABILITY MANAGEMENT

Page 19: Jens Thonke, EVP, Cyber Security Services Jyrki …...data /IP Ensuring protection against malware and ransomware Detecting attacks that might have bypassed other security measures

FOCUS AREAS INCORPORATE SECURITY

F-Secure Capital Markets Day19

• Accelerate growth in Managed Detection & Response(F-Secure Rapid Detection Service)

• Increase cross-sell and upsell by creating a more integrated offering for mid-market

• Strengthen channel to mid-market

• Successful Endpoint Detection & Response Market entry