SlideShare a Scribd company logo
1 of 30
STOP LOOKING FOR
VULNERABILITIES.
START FIXING THEM.
F-Secure Radar
THERISK
ISHUGE
Sources:
1) AV Test
2) National Vulnerability Database
3) PwC, The Global State of Information Security® Survey 2015
Instances of
malware have
almost doubled
every year
since 2006 (1
On average,
19 new
vulnerabilities
emerge daily (2
In 2014, cyber
attacks reached
117,339
per day 3)
YOURCOMPANYIS
ATARGET
3
Sources:
1) Gartner
2) HP 2015 Cyber Risk Report
3) SANS Institute
4) National Vulnerability Database
75% of
attacks occur
at the
application
layer (1
86% of web
applications
have serious
security
issues (2
52% of the
issues are
long-known
Patch
deployment
is not
immediate (3
Third party
applications
amount to
80% of
vulnerabilities
(4
WHERE’S
THERISK?
4
 Out-dated software
 Misconfigured systems
 Insecure web applications
 Continuous vulnerability scanning
 Strict vulnerability management
processes
 Cover all your assets: Servers, desktops,
printers, routers, etc.
HOWTO
TACKLEIT?
MEET
F-SECURERADAR
5
A VULNERABILITY MANAGEMENT SOLUTION THAT GIVES YOU
THE TOOLS AND CONTROL TO MANAGE THE RISK
COMPLETE
CONTROLOVER
VULNERABILITY
MANAGEMENT
6
From automated scan scheduling to verification scans
Unlimited scans with one single license
Flexible API for integration with your ticketing systems
THISIS
F-SECURE
RADAR
7
DISCOVERY
map network
assets
SCAN
systems &
applications
MANAGE
priorities and
assign system
owners
REPORT
customizable
for technicians
and executives
VERIFY
rescan and
spot changes
8
GET SMARTER ANALYSIS
 Intuitive, browser based
graphical interface
 Instant information
 Sophisticated tools for
deeper analysis
STREAMLINE WORKFLOWS
 Schedule automated
vulnerability scans
 Monitor vulnerabilities
efficiently
GET THE BIG PICTURE
 Map all your system assets
 Get a total overview of the
current security level
GET IN CONTROL
 Assign, follow and manage
security issues with your
system administrators,
software developers, testers,
auditors and security team
BETTER EVERY TIME
 Continuously developed and
improved
 Automatically updated
 High quality vulnerability
checks and scanning engines
GET REPORTS THE WAY YOU
WANT THEM
 Customizable reports with
reliable benchmarking
 In the format you need
© F-Secure Confidential9
KEYBENEFITS
TOYOU
• Map your true attack surface before someone else does
• Measure yourself against PCI compliance
• Improve your security measures with easy management
• Get customized reports that fit your company’s needs
• Scale and adapt F-Secure Radar to your needs
• Use seamless API integration with 3rd party solutions
RADAR
FEATURES
10
DETECT AND MANAGE THOUSANDS OF ASSETS AND
VULNERABILITIES IN ONE SOLUTION
Discovery
Scan
System Scan
Web Scan
F-Secure
Radar
Security
Center
3 IN 1SCANNING
SOLUTION
12
F-SECURERADAR
SECURITYCENTER
F-Secure
Radar
Security
Center
F-Secure
Radar
Security
Center
• Centralized reporting with uniform look and feel
• Vulnerability management and
ticketing system
• API interface
• Add vulnerabilities manually
• Portal in English
13
F-SECURERADAR
DISCOVERYSCAN
F-Secure
Radar
Security
Center
• A fast and reliable port scanner
• Based on an asynchronous port scanning
techniques
• Fast host discovery mode (to be used on internal
networks)
• Supports service and operating system
detection
• Scan speed can be easily adjusted to suit your
network capacity
A scanning process that maps your whole
network and all its assets
F-Secure
Radar
Security
Center
14
F-SECURERADAR
SYSTEMSCAN
F-Secure
Radar
Security
Center
• A platform scanner - able to identify known
vulnerabilities systems and software
• Capable of scanning any network device that talks IP
• Support authenticated scanning on Windows and Linux
• Low number of false positive and false negative
• Constantly kept up-to-date based on
- Public vulnerability databases such as National
Vulnerability Database and others
- Vulnerabilities discovered by our security
consultants
• Certified as a PCI ASV scanning tool
Identifies vulnerabilities associated with
configuration errors, improper patch
management, implementation oversights
etc.
F-Secure
Radar
Security
Center
15
F-SECURERADAR
WEBSCAN
F-Secure
Radar
Security
Center
• A web application scanner - able to identify
vulnerabilities in custom applications
• Supports simple form-based authentication
• Supports assisted crawling (aka. recordings)
• Scalable to cover expanding needs
• Certified PCI ASV scanning tool
Tests for numerous web application
vulnerabilities
F-Secure
Radar
Security
Center
PICKYOUR
PREFERREDWAYOF
IMPLEMENTATION
16
17
Runasanon-sitesolution
whereeverythingisbehindyour
corporatefirewall
F-SECURERADAR
CLOUD
F-SECURERADAR
PRIVATE
Runscansfromthecloudasatrue
SaaSwithscannodeswithinthe
service
F-SECURERADAR
CLOUD
F-SECURE RADAR
SCAN NODE
18
PUBLICLY AVAILABLE
NETWORK
FIREWALL
WEB INTERFACE
LOCAL NETWORK
F-SECURE RADAR
SECURITY CENTER
• No limitations!
• Accessible from anywhere
• Always up-to-date
• Unlimited scan nodes included
• Tie our managed cyber security services
together with your F-Secure Radar solution
F-SECURE RADAR
SCAN NODE
19
FIREWALL
LOCAl NETWORK
• Store your data in-house
• Deploy F-Secure Radar in isolated
environments
• Installed by F-Secure experts
• Scan nodes support two-way communication
- Initiated by scan node
- Initiated by F-Secure Radar Security Center
LOCAL ONSITE
SOLUTIONS
WEB INTERFACE
F-SECURERADAR
PRIVATE
F-SECURE RADAR
SCAN NODE
20
F-SECURERADAR
ASASERVICE
LETEXPERTSRUNF-SECURERADARFORYOU
TOGETTHEBESTOUTOFTHESOLUTION
© F-Secure Confidential21
Missing the big overview
• What kind of action plan /
recommendations should be
delivered to the management?
• What do we need the most right
now?
COMMONCUSTOMER
CHALLENGES
Lacking internal knowledge
• Not enough knowledge about
the vulnerabilities?
• Troubles configuring the scans in
an optimal way?
• Overwhelmed by all the findings?
Lacking the time or resources
• No time to review results?
• No time to delegate
vulnerabilities to be corrected?
• No time to follow up, re-scan
and verify corrections?
22
• F-Secure Radar license required
• You define the scope and frequency
• Experts will regularly (monthly)
- Configure scans
- Review scan results
- Follow up on existing tickets
- Assign new tickets to system owners
- Deliver executive summary reports
- Attend quarterly status meeting
HOWITWORKS?
F-SECURERADAR
ASPARTOF
CYBERSECURITY
23
© F-Secure Confidential24
Security & Risk Assessment
Security Advisory
Compliance&SecurityImprovement
Vulnerability Management
Training & Security Culture
End-Point Protection
E-Mail & Web Traffic Scanning
Central Security Management
Forensics
Incident Response
Security Monitoring & Alerting
PREDICT PREVENT
DETECTRESPOND
ANELEMENTOF
HOLISTICCYBERSECURITY
F-SECURE RADARASAN
INTEGRATED PARTOFYOUR
BUSINESS SECURITY
© F-Secure Confidential25
Security Improvement
Program
Security
Management
Incident Response
Services
Secure Software
Development
PCI
Compliance
Vulnerability
Assessment
PCI ASV
Scans
MANAGE
ENHANCE
ASSESS
End-Point and Network Protection - the basis of every security strategy
F-SECURE
RADAR
• Select and analyze subsets of scans
• Create, save and edit custom reports
• Flexible and editable report formats to suit your needs
 Word and Excel reports
 Traditional CSV or XML reports
 Or access data using the F-Secure Radar API
• Add notes to vulnerabilities
• Change vulnerability state (Confirmed, Accepted risk,
False positive..)
• Add your own vulnerabilities
HIGHLY
CUSTOMISABLE
REPORTINGCENTRE
© F-Secure Confidential26
ANINTEGRALPARTOF
YOUR
PCICOMPLIANCE
PROGRAM
 An approved PCI ASV scanning solution
 Validate your compliance
 Complement your Qualified Security Assessor (QSA)
 Vulnerability scans performed according to the PCI
requirements
 Available for regular testing and for identifying newly
discovered vulnerabilities
 Reporting tools to deliver the associated scanning
reports
© F-Secure Confidential27
DETAILS
28
© F-Secure Confidential29
Pricing
• Based on the number of
hosts/IPs scanned for
vulnerabilities
• License starts at min. 100 IPs
• Choose monthly or yearly billing
• Volume discounts
F-SECURERADAR
SIMPLEPRICINGMODEL
Benefits
• No feature limitations
• Access to all scanning engines
• Access to Karhu API
• No hidden costs
Benefits
• Unlimited number of scan nodes
• Unlimited number of scans
against your licensed systems
• Unlimited number of user
accounts
• No scanning restrictions
30
F-SECURE
IN A ROW – BEST ENDPOINT
PROTECTION
www.f-secure.com/business
4YEARS
A recognized European vendor in
penetration testing, vulnerability
assessment, security consulting and training.
Developed by experts, based on years of
experience in the field.
Flexible development together with
customers.
A leading European cyber security specialist.
A LEADING EUROPEAN
CYBER SECURITY SPECIALIST

More Related Content

What's hot

Best corporate end-point protection 2013
Best corporate end-point protection 2013Best corporate end-point protection 2013
Best corporate end-point protection 2013F-Secure Corporation
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2Nguyen Binh
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure Corporation
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionGiovanni Giovannelli
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksImperva
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windowsF-Secure Corporation
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?F-Secure Corporation
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT securitySophos Benelux
 
Security as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecureSecurity as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecurePouria Ghatrenabi
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecuritySophos Benelux
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Sophos Benelux
 
Detection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEyeDetection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEyeSplunk
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Sophos Benelux
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008tswong
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Taking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XTaking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XSophos Benelux
 

What's hot (20)

Best corporate end-point protection 2013
Best corporate end-point protection 2013Best corporate end-point protection 2013
Best corporate end-point protection 2013
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
Psb mobile security
Psb mobile securityPsb mobile security
Psb mobile security
 
Virtual Security
Virtual SecurityVirtual Security
Virtual Security
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server Security
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted Attacks
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
FireEye Engineering
FireEye Engineering FireEye Engineering
FireEye Engineering
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Security as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecureSecurity as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-Secure
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized Security
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands
 
Detection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEyeDetection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEye
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Taking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XTaking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept X
 

Viewers also liked

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNeha Gupta
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret WeaponNTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret WeaponNorth Texas Chapter of the ISSA
 
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNorth Texas Chapter of the ISSA
 
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3North Texas Chapter of the ISSA
 
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...North Texas Chapter of the ISSA
 
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdANTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdANorth Texas Chapter of the ISSA
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNorth Texas Chapter of the ISSA
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 

Viewers also liked (17)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
We are F-Secure
We are F-SecureWe are F-Secure
We are F-Secure
 
NTXISSACSC4 - How Not to Build a Trojan Horse
NTXISSACSC4 - How Not to Build a Trojan HorseNTXISSACSC4 - How Not to Build a Trojan Horse
NTXISSACSC4 - How Not to Build a Trojan Horse
 
NTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - The Art of Evading Anti-VirusNTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - The Art of Evading Anti-Virus
 
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret WeaponNTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
 
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
 
NTXISSACSC4 - World of Discovery
NTXISSACSC4 - World of DiscoveryNTXISSACSC4 - World of Discovery
NTXISSACSC4 - World of Discovery
 
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
 
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
 
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdANTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
 
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
 
NTXISSACSC4 - Cyber Insurance – Did You Know?
NTXISSACSC4 - Cyber Insurance – Did You Know?NTXISSACSC4 - Cyber Insurance – Did You Know?
NTXISSACSC4 - Cyber Insurance – Did You Know?
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 

Similar to Stop Looking for Vulnerabilities. Start Fixing Them with F-Secure Radar

AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...Amazon Web Services
 
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...Kyle Lai
 
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Kyle Lai
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of VulnerabilitySkybox Security
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíMarketingArrowECS_CZ
 
Swascan Cyber Security Testing Platform
Swascan Cyber Security Testing PlatformSwascan Cyber Security Testing Platform
Swascan Cyber Security Testing PlatformPierguido Iezzi
 
Brochure SWASCAN-ENG On Premise
Brochure SWASCAN-ENG On PremiseBrochure SWASCAN-ENG On Premise
Brochure SWASCAN-ENG On PremiseSWASCAN
 
Swascan brochure-eng
Swascan brochure-engSwascan brochure-eng
Swascan brochure-engSWASCAN
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSalil Kumar Subramony
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assessBirodh Rijal
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersIBM Security
 

Similar to Stop Looking for Vulnerabilities. Start Fixing Them with F-Secure Radar (20)

AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
 
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
 
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 
Swascan Cyber Security Testing Platform
Swascan Cyber Security Testing PlatformSwascan Cyber Security Testing Platform
Swascan Cyber Security Testing Platform
 
Brochure SWASCAN-ENG On Premise
Brochure SWASCAN-ENG On PremiseBrochure SWASCAN-ENG On Premise
Brochure SWASCAN-ENG On Premise
 
Swascan brochure-EN
Swascan brochure-ENSwascan brochure-EN
Swascan brochure-EN
 
Swascan brochure-eng
Swascan brochure-engSwascan brochure-eng
Swascan brochure-eng
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
Owasp masvs spain 17
Owasp masvs spain 17Owasp masvs spain 17
Owasp masvs spain 17
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Discover an IT Infrastructure Services & Management
Discover an IT Infrastructure Services & ManagementDiscover an IT Infrastructure Services & Management
Discover an IT Infrastructure Services & Management
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assess
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 

More from F-Secure Corporation

How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?F-Secure Corporation
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!F-Secure Corporation
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceF-Secure Corporation
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsF-Secure Corporation
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace F-Secure Corporation
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceF-Secure Corporation
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3F-Secure Corporation
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2F-Secure Corporation
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeF-Secure Corporation
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsF-Secure Corporation
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big businessF-Secure Corporation
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業F-Secure Corporation
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?F-Secure Corporation
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetF-Secure Corporation
 
F-Secure Labs Mobile Threat Report Q4 2012
F-Secure Labs Mobile Threat Report Q4 2012F-Secure Labs Mobile Threat Report Q4 2012
F-Secure Labs Mobile Threat Report Q4 2012F-Secure Corporation
 

More from F-Secure Corporation (18)

Post-mortem of a data breach
Post-mortem of a data breachPost-mortem of a data breach
Post-mortem of a data breach
 
How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important terms
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutions
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big business
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitet
 
Surfing Safe on the Road
Surfing Safe on the RoadSurfing Safe on the Road
Surfing Safe on the Road
 
F-Secure's Annual Report 2012
F-Secure's Annual Report 2012 F-Secure's Annual Report 2012
F-Secure's Annual Report 2012
 
F-Secure Labs Mobile Threat Report Q4 2012
F-Secure Labs Mobile Threat Report Q4 2012F-Secure Labs Mobile Threat Report Q4 2012
F-Secure Labs Mobile Threat Report Q4 2012
 

Recently uploaded

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Recently uploaded (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Stop Looking for Vulnerabilities. Start Fixing Them with F-Secure Radar

  • 1. STOP LOOKING FOR VULNERABILITIES. START FIXING THEM. F-Secure Radar
  • 2. THERISK ISHUGE Sources: 1) AV Test 2) National Vulnerability Database 3) PwC, The Global State of Information Security® Survey 2015 Instances of malware have almost doubled every year since 2006 (1 On average, 19 new vulnerabilities emerge daily (2 In 2014, cyber attacks reached 117,339 per day 3)
  • 3. YOURCOMPANYIS ATARGET 3 Sources: 1) Gartner 2) HP 2015 Cyber Risk Report 3) SANS Institute 4) National Vulnerability Database 75% of attacks occur at the application layer (1 86% of web applications have serious security issues (2 52% of the issues are long-known Patch deployment is not immediate (3 Third party applications amount to 80% of vulnerabilities (4
  • 4. WHERE’S THERISK? 4  Out-dated software  Misconfigured systems  Insecure web applications  Continuous vulnerability scanning  Strict vulnerability management processes  Cover all your assets: Servers, desktops, printers, routers, etc. HOWTO TACKLEIT?
  • 5. MEET F-SECURERADAR 5 A VULNERABILITY MANAGEMENT SOLUTION THAT GIVES YOU THE TOOLS AND CONTROL TO MANAGE THE RISK
  • 6. COMPLETE CONTROLOVER VULNERABILITY MANAGEMENT 6 From automated scan scheduling to verification scans Unlimited scans with one single license Flexible API for integration with your ticketing systems
  • 7. THISIS F-SECURE RADAR 7 DISCOVERY map network assets SCAN systems & applications MANAGE priorities and assign system owners REPORT customizable for technicians and executives VERIFY rescan and spot changes
  • 8. 8 GET SMARTER ANALYSIS  Intuitive, browser based graphical interface  Instant information  Sophisticated tools for deeper analysis STREAMLINE WORKFLOWS  Schedule automated vulnerability scans  Monitor vulnerabilities efficiently GET THE BIG PICTURE  Map all your system assets  Get a total overview of the current security level GET IN CONTROL  Assign, follow and manage security issues with your system administrators, software developers, testers, auditors and security team BETTER EVERY TIME  Continuously developed and improved  Automatically updated  High quality vulnerability checks and scanning engines GET REPORTS THE WAY YOU WANT THEM  Customizable reports with reliable benchmarking  In the format you need
  • 9. © F-Secure Confidential9 KEYBENEFITS TOYOU • Map your true attack surface before someone else does • Measure yourself against PCI compliance • Improve your security measures with easy management • Get customized reports that fit your company’s needs • Scale and adapt F-Secure Radar to your needs • Use seamless API integration with 3rd party solutions
  • 10. RADAR FEATURES 10 DETECT AND MANAGE THOUSANDS OF ASSETS AND VULNERABILITIES IN ONE SOLUTION
  • 12. 12 F-SECURERADAR SECURITYCENTER F-Secure Radar Security Center F-Secure Radar Security Center • Centralized reporting with uniform look and feel • Vulnerability management and ticketing system • API interface • Add vulnerabilities manually • Portal in English
  • 13. 13 F-SECURERADAR DISCOVERYSCAN F-Secure Radar Security Center • A fast and reliable port scanner • Based on an asynchronous port scanning techniques • Fast host discovery mode (to be used on internal networks) • Supports service and operating system detection • Scan speed can be easily adjusted to suit your network capacity A scanning process that maps your whole network and all its assets F-Secure Radar Security Center
  • 14. 14 F-SECURERADAR SYSTEMSCAN F-Secure Radar Security Center • A platform scanner - able to identify known vulnerabilities systems and software • Capable of scanning any network device that talks IP • Support authenticated scanning on Windows and Linux • Low number of false positive and false negative • Constantly kept up-to-date based on - Public vulnerability databases such as National Vulnerability Database and others - Vulnerabilities discovered by our security consultants • Certified as a PCI ASV scanning tool Identifies vulnerabilities associated with configuration errors, improper patch management, implementation oversights etc. F-Secure Radar Security Center
  • 15. 15 F-SECURERADAR WEBSCAN F-Secure Radar Security Center • A web application scanner - able to identify vulnerabilities in custom applications • Supports simple form-based authentication • Supports assisted crawling (aka. recordings) • Scalable to cover expanding needs • Certified PCI ASV scanning tool Tests for numerous web application vulnerabilities F-Secure Radar Security Center
  • 18. F-SECURERADAR CLOUD F-SECURE RADAR SCAN NODE 18 PUBLICLY AVAILABLE NETWORK FIREWALL WEB INTERFACE LOCAL NETWORK F-SECURE RADAR SECURITY CENTER • No limitations! • Accessible from anywhere • Always up-to-date • Unlimited scan nodes included • Tie our managed cyber security services together with your F-Secure Radar solution F-SECURE RADAR SCAN NODE
  • 19. 19 FIREWALL LOCAl NETWORK • Store your data in-house • Deploy F-Secure Radar in isolated environments • Installed by F-Secure experts • Scan nodes support two-way communication - Initiated by scan node - Initiated by F-Secure Radar Security Center LOCAL ONSITE SOLUTIONS WEB INTERFACE F-SECURERADAR PRIVATE F-SECURE RADAR SCAN NODE
  • 21. © F-Secure Confidential21 Missing the big overview • What kind of action plan / recommendations should be delivered to the management? • What do we need the most right now? COMMONCUSTOMER CHALLENGES Lacking internal knowledge • Not enough knowledge about the vulnerabilities? • Troubles configuring the scans in an optimal way? • Overwhelmed by all the findings? Lacking the time or resources • No time to review results? • No time to delegate vulnerabilities to be corrected? • No time to follow up, re-scan and verify corrections?
  • 22. 22 • F-Secure Radar license required • You define the scope and frequency • Experts will regularly (monthly) - Configure scans - Review scan results - Follow up on existing tickets - Assign new tickets to system owners - Deliver executive summary reports - Attend quarterly status meeting HOWITWORKS?
  • 24. © F-Secure Confidential24 Security & Risk Assessment Security Advisory Compliance&SecurityImprovement Vulnerability Management Training & Security Culture End-Point Protection E-Mail & Web Traffic Scanning Central Security Management Forensics Incident Response Security Monitoring & Alerting PREDICT PREVENT DETECTRESPOND ANELEMENTOF HOLISTICCYBERSECURITY
  • 25. F-SECURE RADARASAN INTEGRATED PARTOFYOUR BUSINESS SECURITY © F-Secure Confidential25 Security Improvement Program Security Management Incident Response Services Secure Software Development PCI Compliance Vulnerability Assessment PCI ASV Scans MANAGE ENHANCE ASSESS End-Point and Network Protection - the basis of every security strategy F-SECURE RADAR
  • 26. • Select and analyze subsets of scans • Create, save and edit custom reports • Flexible and editable report formats to suit your needs  Word and Excel reports  Traditional CSV or XML reports  Or access data using the F-Secure Radar API • Add notes to vulnerabilities • Change vulnerability state (Confirmed, Accepted risk, False positive..) • Add your own vulnerabilities HIGHLY CUSTOMISABLE REPORTINGCENTRE © F-Secure Confidential26
  • 27. ANINTEGRALPARTOF YOUR PCICOMPLIANCE PROGRAM  An approved PCI ASV scanning solution  Validate your compliance  Complement your Qualified Security Assessor (QSA)  Vulnerability scans performed according to the PCI requirements  Available for regular testing and for identifying newly discovered vulnerabilities  Reporting tools to deliver the associated scanning reports © F-Secure Confidential27
  • 29. © F-Secure Confidential29 Pricing • Based on the number of hosts/IPs scanned for vulnerabilities • License starts at min. 100 IPs • Choose monthly or yearly billing • Volume discounts F-SECURERADAR SIMPLEPRICINGMODEL Benefits • No feature limitations • Access to all scanning engines • Access to Karhu API • No hidden costs Benefits • Unlimited number of scan nodes • Unlimited number of scans against your licensed systems • Unlimited number of user accounts • No scanning restrictions
  • 30. 30 F-SECURE IN A ROW – BEST ENDPOINT PROTECTION www.f-secure.com/business 4YEARS A recognized European vendor in penetration testing, vulnerability assessment, security consulting and training. Developed by experts, based on years of experience in the field. Flexible development together with customers. A leading European cyber security specialist. A LEADING EUROPEAN CYBER SECURITY SPECIALIST

Editor's Notes

  1. 2) 26 percent of internal security teams took two to seven days to deploy patches to critical apps in use, while another 22 percent took eight to 30 days, and 14 percent needed 31 days to three months to deploy patches satisfactorily
  2. WHERE’S THE RISK? All listed items are not only the most common locations of vulnerabilities and weaknesses, but also items that F-Secure Radar System- and Web Scan is able to detect. HOW TO TACKLE IT? A one-time scan doesn't give the customers a lot. They have to run regular scans to stay on-top of things. Secondly, once you have detected a lot of vulnerabilities, it doesn't matter a lot, if you're not able to fix them – that's where our vulnerability management features in F-Secure Radar, perhaps combined with a managed service will help.
  3. Scheduling Our target customers always want to run scheduled scans. The scheduling feature is simply, but yet, it tells the difference between an Enterprise customer vs. a small customer (which is outside our focus area). Vulnerability management Imagine being a security manager. He run perhaps regular vulnerability scans, and receives a PDF report with findings on a regular basis. The findings is in a PDF file, that impossible to add notes, distribute across multiple people etc. F-Secure Radar allow customers to store all vulnerability details in one place (F-Secure Radar). Manage the status of them (Confirmed, Pending, Accepted Risk, etc.). Add notes to the vulnerabilities. Consultants doing manual security assessments can even add their own vulnerabilities into F-Secure Radar. Licensing Compared to our competitors we're very strong. Our license model is very simple: We provide unlimited amount of scans We have everything included in one license model, no additional items, features, scan nodes etc. it needed Many competitors have different pricing depending on internet facing and internal hosts – we don't F-Secure Radar API The primary purpose / use case for our is integrating F-Secure Radar with their existing, ticketing system or otherwise import/sync data with their internal systems. The API can of course also be used for more advanced tasks, such as automating various tasks. For example, add/remove hosts for scanning.
  4. The usual workflow in F-Secure Radar Discovery Scan: Detect all systems within your network range(s) Scan all identified systems using System- and/or Web Scan View and manage results by Changing vulnerability status (confirmed, accepted risk, pending, false positive, etc.) Add notes to vulnerabilities Create tickets with a set of vulnerabilities, and assign someone to fix it Generate reports based on custom settings, in the formats that suits you the best Re-scan systems, either as a part of a scheduled scan routine, or because you want to verify that a fix as been implemented correctly
  5. Map the attack surface, this refers to both Discovery Scan in terms of identifying all systems within a network range, but also as a result of getting full visibility into what is exposed on each individual system that has been scanned Use F-Secure Radar to ensure you are complain with PCI (no medium/high-risk vulnerabilities) – or if you don't have to comply with PCI, it might still be interesting to measure yourself against the PCI DSS standard Improve your security measures with easy management, refers to the vulnerability management capabilities F-Secure Radar has, including the built-in ticketing system Generate reports that suite your needs Scale and adapt, refers to the fact that F-Secure Radar can easily be scaled by adding more scan nodes. The scan nodes are also flexible, because they support two-way communication (not many competitors support that). Finally, the web interface (F-Secure Radar Security Center) is also designed to be able to handle thousands of systems API integration with internal ticketing systems, SIEM solutions or similar
  6. A key selling point. F-Secure Radar wraps three scanning tools into one unified interface, and provide similar look and feel for all reports you generate across all tools. You can even combine reports across different tools. Customers might use multiple tools to handle platform and web application scanning, which generate different reports. With F-Secure Radar you get everything in one solution.
  7. Brief overview of the F-Secure Radar Security Centre Centralized reporting, multiple report formats (XML, Word, HTML, CSV…) Great overview of all assets and ability to react fast on shellshock/heartbleed vulns. Ticketing and VM (manage and priorities thousands of vulnerabilities) API interface (integrate with other systems) Add manual vulnerabilities (found from other assessment and important burp results)
  8. Brief overview of the F-Secure Radar Security Centre Centralized reporting, multiple report formats (XML, Word, HTML, CSV…) Great overview of all assets and ability to react fast on shellshock/heartbleed vulns. Ticketing and VM (manage and priorities thousands of vulnerabilities) API interface (integrate with other systems) Add manual vulnerabilities (found from other assessment and important burp results)
  9. Brief overview of the F-Secure Radar Security Centre Centralized reporting, multiple report formats (XML, Word, HTML, CSV…) Great overview of all assets and ability to react fast on shellshock/heartbleed vulns. Ticketing and VM (manage and priorities thousands of vulnerabilities) API interface (integrate with other systems) Add manual vulnerabilities (found from other assessment and important burp results)
  10. Brief overview of the F-Secure Radar Security Centre Centralized reporting, multiple report formats (XML, Word, HTML, CSV…) Great overview of all assets and ability to react fast on shellshock/heartbleed vulns. Ticketing and VM (manage and priorities thousands of vulnerabilities) API interface (integrate with other systems) Add manual vulnerabilities (found from other assessment and important burp results)
  11. F-Secure Radar can be deployed in the cloud or hosted by the customer. F-Secure Radar Cloud - is the preferred solution because: F-Secure can easily access the system Automatically deploy new updates to the user interface (vulnerability checks are always up-to-date) To provide customer support Combine it with managed services F-Secure Radar can be accessed from anywhere, for example by the customer's partners No backup, hosting or maintenance required - F-Secure takes care of it all Even if you run in the cloud, you can still scan your internal systems, using internal scan nodes F-Secure Radar Private Is for those who is forced to store all data in-house Is limited in terms of remote support Require manual updates for the F-Secure Radar user interface License cost is higher
  12. F-Secure Radar can be deployed in the cloud or hosted by the customer. F-Secure Radar Cloud - is the preferred solution because: F-Secure can easily access the system Automatically deploy new updates to the user interface (vulnerability checks are always up-to-date) To provide customer support Combine it with managed services F-Secure Radar can be accessed from anywhere, for example by the customer's partners No backup, hosting or maintenance required - F-Secure takes care of it all Even if you run in the cloud, you can still scan your internal systems, using internal scan nodes F-Secure Radar Private Is for those who is forced to store all data in-house Is limited in terms of remote support Require manual updates for the F-Secure Radar user interface License cost is higher
  13. Based on our history of selling F-Secure Radar as a pure license, we often saw systems were misconfigured, left unused. The alternative that everything was setup and running, but the vulnerabilities were never fixes. This is where F-Secure Radar as a managed service comes into play. In short, its all about letting the customer focus on what they do best, and manage their systems as they do. We should not try to make them vulnerability scanning experts – instead we help them to drive the vulnerability management process, priorities what should be fixed first, follow up on reported issues (tickets). This process will mean we will be an internal security advisor, we will have regular visibility in the organization, by delivering monthly reports to system owners and other stakeholders. We get in direct contact with many different departments and eventually we will create awareness around security.
  14. The slide already describes the different tasks that is involved in a typical managed service. It is however very important to stress that the managed service should always be adapted to the customer's needs. For example, it might be they want to have a different graph in the monthly reports, then we will add that. We might have to deliver tickets to a single person or take care of all the communication directly with their hosting provider, who is responsible for the platform layer etc.
  15. These are the different areas within a organization that F-Secure Radar is able to complement. MANAGE: Managers are able to follow their overall security level, generate reports, follow trends and use F-Secure Radar to keep an eye on how the internal security develops. ENHANCE: Use F-Secure Radar to enhance the business. Ensure products doesn't go live without passing a security scan, get certified etc. ASSESS: Use F-Secure Radar to measure yourself up against security standards such as PCI, let developers run scans and catch vulnerabilities and bugs at an early stage, before they reach production. Finally, if an incident should occur, F-Secure Radar can be an extremely helpful tool to quickly map the possible entry points of an attack.
  16. F-Secure Radar is developed from the ground up by us. Many years back, we did rely on third-party scanning engines, but decided to change because we couldn't control the development. We wanted to implement changes fast, make vulnerability checks immediately once we vulnerabilities were announced to the public – and we can do this now. Furthermore, we can also spare with our internal penetration testers. When a consultant have found a vulnerability in a product our customer is using, he has the ability to request new plugins (vulnerability checks) for the software he just assessed. Eventually, making F-Secure Radar a vulnerability scanning tool that is highly optimized to software often seen in enterprise environments.
  17. Based on our history of selling F-Secure Radar as a pure license, we often saw systems were misconfigured, left unused. The alternative that everything was setup and running, but the vulnerabilities were never fixes. This is where F-Secure Radar as a managed service comes into play. In short, its all about letting the customer focus on what they do best, and manage their systems as they do. We should not try to make them vulnerability scanning experts – instead we help them to drive the vulnerability management process, priorities what should be fixed first, follow up on reported issues (tickets). This process will mean we will be an internal security advisor, we will have regular visibility in the organization, by delivering monthly reports to system owners and other stakeholders. We get in direct contact with many different departments and eventually we will create awareness around security.