Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.

Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.

    SlideShare
  • Slideshare-64x64 Home
  • Explore
  • Search
    • You
  • Upload
  • Login
  • Signup
  • Home
  • Explore
×
×
×
×
×
×

F-Secure Corporation

F-Secure Corporation
  • Following Follow   Processing…
  • 54 SlideShares
  • 90 Followers
  • 0 Clipboards

Modal header

One fine body…

    • Helsinki, Finland
  • Industry Technology / Software / Internet
  • Website http://www.f-secure.com/
  • About F-Secure is a European cyber security company with decades of experience in defending enterprises and consumers against everything from opportunistic ransomware infections to advanced cyber attacks. Its comprehensive set of services and award-winning products use F-Secure's patented security innovations and sophisticated threat intelligence to protect tens of thousands of companies and millions of people. F-Secure's security experts have participated in more European cyber crime scene investigations than any other company in the market, and its products are sold all over the world by over 200 operators and thousands of resellers. Founded in 1988, F-Secure is listed on NASDAQ OMX Helsinki
TwitterFacebookLinkedIn
Tags (159)

android business it security cloud computer security cyber attacks cyber security data breaches data protection data security email and server security email protection endpoint protection endpoint security f-secure fsecure malware malware protection mobile computing mobile device mobile phone mobile security privacy security small business threat intelligence threats more…

access advanced security advanced threats android android malware annual report anti-malware anti-theft anti-virus for mobile antispam antivirus for citrix antivirus for microsoft exchange antivirus for servers antivirus for windows server apps best business security bring your own device bring your own device business business antivirus business it security business protection business services business suite central security managment chick citizenfour citrix xenapp clou cloud cloud computing cloud security cloud storage collaboration company protection computer security computer securityputer security confidential content content anywhere content cloud corporate security cyber attacks cyber security cyber security definitions cyber security operations cyber security terms cyber security threats cyber threats cyber warfare data breaches data loss prevention data protection data security device digitalization ebook edward snowden email email and server security email protection email scanning endpoint protection endpoint security espionage exploits f secure f-se f-secure facebook fleet management fold fsecure future företags säkerhet glossary government surveillance history images incident response india online threats infographic information security information technology internet security it reseller it security it security management james bond linux server security live security malware malware pro malware protection mdm messaging security microsoft small business server mobile mobile computing mobile device mobile hackers mobile phone mobile security mobile threats mobilitet network security networks nsa online security origami patch management pc pci compliance petabytes phone pictures policy management predict predict threat privacy protection service for business public and private cloud security safe vpn safe wifi security security automation security incidents security management security terms securityatoz server protection server security sharing small business small business protection smartphone smb smtp protection social spam spam protection storage surveillance säkerhet terms threat detection threat intelligence threats trojan trojans vdi videos virtual server virtualization security vpn vulnerability management vulnerability scanning windows antivirus windows security workstation security …less

Followers (90)
  • Gregory LAGOUCHE
  • Hany Ali
  • Venkat Yeddala
  • Paulo Roberto Mariano
  • LEONARDO ESPINOSA
  • Vuecrest
Following (1)
  • Mikko Hypponen

View all Presentations (37)

  • Post-mortem of a data breach Post-mortem of a data breach 3 years ago
  • How do you predict the threat landscape? How do you predict the threat... 3 years ago
  • Got hacked? It’s too late to run now! Got hacked? It’s too late to ... 3 years ago
  • The Real Costs of SIEM vs. Managed Security Service The Real Costs of SIEM vs. Ma... 3 years ago

View all Likes

  • TEDxRotterdam - Mikko Hypponen TEDxRotterdam - Mikko Hypponen by mikkohypponen 8 years ago
  • English
  • Español
  • Português
  • Français
  • Deutsch
  • About
  • Developers & API
  • Blog
  • Terms
  • Privacy
  • Copyright
  • Support
RSS Feeds