SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
Award-winning Security
F-Secure Protection Service for Business
with Mobile Security
Protection Service for Business
You manage and secure your PCs,
laptops and servers.
Why not your phones and tablets?
Your information
is more valuable
than the device
The number of mobile threats is increasing
Mobile threats are profit motivated
Android threats
are increasing
Running total of families
or variants found on
Symbian and Android
F-Secure Mobile Security
Android 8.3
Anti-theft
Browsing protection Safe Contacts
Antivirus
Protection against viruses, spyware
and Trojans
Allows filtering of unwanted phone
calls and messages (SMS/MMS)
Proactively protection, preventing
access to fraudulent websites
Support for built-in browser - New
Remote lock, wipe, locate, alarm
Support for Wi-Fi only devices - New
Award-winning
protection and
usability
“We congratulate F-Secure on their
excellent performance in Android
mobile antivirus test”
- Andreas Marx, CEO of AV-TEST
Full control of
your mobile fleet
- no security risks
through unknown
devices and
solutions
One portal to
manage your IT
security
regardless of
device
Award-winning,
best protection
Supports “Bring
Your Own Device”
strategy
Subscription management and ordering through PSB Portal
Safe Contact
Allows filtering of unwanted
communication, both calls
and messages.
Browsing Protection
Intuitive proactive element
which prevents users from ever
coming into contact with hostile
content while browsing web.
Anti-Theft
Safeguards personal and
confidential data and helps
to locate missing phone
Android
ANTI-
THEFT
ANTI-
MALWARE
BROWSING
PROTECTION
SAFE
CONTACT
iOS Windows Symbian BlackBerry
F-Secure Mobile Security
Protecting the irreplaceable

Más contenido relacionado

La actualidad más candente

FCI-company profile
FCI-company profileFCI-company profile
FCI-company profile
Amit Sardar
 
Web App Sec Tisc
Web App Sec TiscWeb App Sec Tisc
Web App Sec Tisc
Aung Khant
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
Sam Norallah
 

La actualidad más candente (20)

Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
Business Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityBusiness Suite - Gain control of your IT security
Business Suite - Gain control of your IT security
 
Presentatie F-Secure 26062015
Presentatie F-Secure 26062015Presentatie F-Secure 26062015
Presentatie F-Secure 26062015
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
Zimperium - Technology Briefing
Zimperium - Technology BriefingZimperium - Technology Briefing
Zimperium - Technology Briefing
 
F secure presentation
F secure presentationF secure presentation
F secure presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
BalaBit 2015: Control Your IT Staff
BalaBit 2015: Control Your IT StaffBalaBit 2015: Control Your IT Staff
BalaBit 2015: Control Your IT Staff
 
Jorge gil martínez presentation about security i.t.
Jorge gil martínez   presentation about security i.t.Jorge gil martínez   presentation about security i.t.
Jorge gil martínez presentation about security i.t.
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
 
Protect your video meetings
Protect your video meetingsProtect your video meetings
Protect your video meetings
 
FCI-company profile
FCI-company profileFCI-company profile
FCI-company profile
 
Web App Sec Tisc
Web App Sec TiscWeb App Sec Tisc
Web App Sec Tisc
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 

Similar a Psb mobile security

cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
Akhil Kumar
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
Zarafa
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Kevin Lee
 

Similar a Psb mobile security (20)

ESET_MOBILE_SECURITY_business--edition
ESET_MOBILE_SECURITY_business--editionESET_MOBILE_SECURITY_business--edition
ESET_MOBILE_SECURITY_business--edition
 
Secure Your Mobile Enterprise
Secure Your Mobile EnterpriseSecure Your Mobile Enterprise
Secure Your Mobile Enterprise
 
Mobile Defense Product Overview
Mobile Defense Product OverviewMobile Defense Product Overview
Mobile Defense Product Overview
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
raonsecure_en_min
raonsecure_en_minraonsecure_en_min
raonsecure_en_min
 
Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015
 
Max secure mobile tab_security_ value prop - 1
Max secure mobile tab_security_ value prop - 1Max secure mobile tab_security_ value prop - 1
Max secure mobile tab_security_ value prop - 1
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
 
Hello Windows 10 Identiteitsbescherming
Hello Windows 10 IdentiteitsbeschermingHello Windows 10 Identiteitsbescherming
Hello Windows 10 Identiteitsbescherming
 
Mobile security apps (1)
Mobile security apps (1)Mobile security apps (1)
Mobile security apps (1)
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Endpoint security
Endpoint securityEndpoint security
Endpoint security
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint Protection
 

Más de F-Secure Corporation

Más de F-Secure Corporation (16)

Post-mortem of a data breach
Post-mortem of a data breachPost-mortem of a data breach
Post-mortem of a data breach
 
How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important terms
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutions
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big business
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitet
 
Surfing Safe on the Road
Surfing Safe on the RoadSurfing Safe on the Road
Surfing Safe on the Road
 
F-Secure's Annual Report 2012
F-Secure's Annual Report 2012 F-Secure's Annual Report 2012
F-Secure's Annual Report 2012
 
F-Secure Labs Mobile Threat Report Q4 2012
F-Secure Labs Mobile Threat Report Q4 2012F-Secure Labs Mobile Threat Report Q4 2012
F-Secure Labs Mobile Threat Report Q4 2012
 

Último

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Cara Menggugurkan Kandungan 087776558899
 

Último (6)

Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 
Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 
Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 

Psb mobile security

  • 1. Award-winning Security F-Secure Protection Service for Business with Mobile Security
  • 2. Protection Service for Business You manage and secure your PCs, laptops and servers. Why not your phones and tablets?
  • 3. Your information is more valuable than the device
  • 4. The number of mobile threats is increasing
  • 5. Mobile threats are profit motivated
  • 7. Running total of families or variants found on Symbian and Android
  • 8. F-Secure Mobile Security Android 8.3 Anti-theft Browsing protection Safe Contacts Antivirus Protection against viruses, spyware and Trojans Allows filtering of unwanted phone calls and messages (SMS/MMS) Proactively protection, preventing access to fraudulent websites Support for built-in browser - New Remote lock, wipe, locate, alarm Support for Wi-Fi only devices - New
  • 10. “We congratulate F-Secure on their excellent performance in Android mobile antivirus test” - Andreas Marx, CEO of AV-TEST
  • 11. Full control of your mobile fleet - no security risks through unknown devices and solutions One portal to manage your IT security regardless of device Award-winning, best protection Supports “Bring Your Own Device” strategy Subscription management and ordering through PSB Portal
  • 12. Safe Contact Allows filtering of unwanted communication, both calls and messages. Browsing Protection Intuitive proactive element which prevents users from ever coming into contact with hostile content while browsing web. Anti-Theft Safeguards personal and confidential data and helps to locate missing phone Android ANTI- THEFT ANTI- MALWARE BROWSING PROTECTION SAFE CONTACT iOS Windows Symbian BlackBerry F-Secure Mobile Security Protecting the irreplaceable