Skip to main content
  •  Office: +371 66 100 800
  • Technical support: +371 66 100 802
  •  info@ossnet.lv
  •  Pr - Pk: 08:30 - 18:30

 

logo

Forecasting, preventing, detecting and responding to vulnerabilities requires a combination of state-of-the-art knowledge and constantly evolving technology.

Nobody knows cyber security like FSecure. For three decades, FSecure has driven innovations in cyber security, defending tens of thousands of companies and millions of people.

With unsurpassed experience in endpoint protection as well as detection and response, FSecure shields enterprises and consumers against everything from advanced cyber attacks and data breaches to widespread ransomware infections

 

Approach

F-Secure non-prescriptive approach and client-valued team are the result of:

  • A hiring policy that gets top talent whilst celebrating diversity of background and skill-set
  • F-Secure Akademy: in-house learning system, helping consultants develop a broad and modern set of capabilities
  • Partnering with clients to solve new and complex security challenges
  • Consultants dedicating time to research, driving service innovation that’s visible in the work we do
  • Providing evidence-based recommendations based on this technical investigation

Service

F-Secure service approach challenges traditional industry methods and don’t come with a prescribed way of working. Service excellence is about working your way: as an extension of your team or a separate division, on-site or remotely, for extended periods or sprints. It’s the dedicated job of Delivery team to curate ways of working that fit your organization, and ensure you get the right level of access to F-Secure consultants.

We strive to be the easiest cyber security company to work with, delivering exceptional results without disruption. We help keep our clients’ businesses and customers safe day to day, and work with them to mitigate damage should the worst happen.

Experience

Consulting expertise across hardware and firmware, as well as software, is hard to find. And it's one of the things that makes us so special. It means F-Secure can analyze client entire ecosystems, uncovering pathways and revealing the consequences of an attack – from financial depletion to loss of life.

F-Secure serve enterprise clients in the UK, Nordics, US, Singapore, Japan, and South Africa, across countless verticals, including: aviation, maritime, and automotive transport, critical infrastructure, financial services, manufacturing, and telecoms.

F- Secure Endpoint Protection

F-Secure Business Suite

On-site deployed protection with full configurability, from servers to endpoints.

F-Secure for business

F-Secure Business Suite is an on-site business security solution that offers the best continuous protection for your organization by combining the best of accumulated expertise, advanced technologies, and modern, cutting-edge features with full on-site control. It is a full protection bundle designed to cover the demanding business security needs from gateway to endpoint.

  • Layered protection to protect your assets from gateway to endpoint
  • Best protection levels covering both known vulnerabilities and new, emerging threats
  • Advanced management features to allow you full control of your organization's IT security
  • Less work through automation of daily tasks
  • Less hassle with a scalable all-in-one package with flexible and transparent licensing for organizations of all sizes
For Business

F-Secure Business Suite

Download Product Brochure

Download Product Flyer

Download Solution Overview

F-Secure Protection Service for Business

Cloud-hosted, comprehensive but flexible endpoint security for all devices with a cloud-based management portal and endpoint protection clients for computers, mobiles, servers, and passwords.

 

Management portal:

  • One portal for deployment, management and monitoring
  • Automatic patch management
  • No server hardware required
  • Full integration readiness for third-party management tools

Parvaldiba

    Computer Protection:

    • Award-winning security for Mac & Windows
    • AV-TEST Best Protection, 2011-2014, 2016 and 2018
    • Integrated patch management for Windows computers
    • Advanced Behavior & Heuristic Analysis
    • Artificial intelligence and machine learning in DeepGuard 6

    Aizsardziba

      Mobile Protection

      • Next generation mobile security for iOS and Android devices
      • WiFi security (VPN)
      • Proactive App and web protection
      • Third-party MDM support available

      MOB

        Server Protection

        • Multi-platform server security
        • Advanced Behavior & Heuristic Analysis
        • Fully integrated Patch Management
        • Additional SharePoint & Exchange components
        Serv


         

        F-Secure Advanced Threat Protection

        F-Secure Rapid Detection & Response

        Monitor your IT environment status and security, detect targeted attacks swiftly, and respond with contextual visibility and automation.

        rapid

        How does it work?

        • Lightweight sensors monitor your endpoint users' behavior and stream the events to F-Secure cloud in real-time.
        • F-Secure's real-time behavioral analytics and Broad Context Detection™ distinguish malicious behavior patterns and identify real attacks.
        • Visualized broad context and descriptive attack information make confirming a detection easy. F-Secure Partner or your own IT team manages the alerts, and there's an option to elevate tough investigations to F-Secure.
        • Following a confirmed detection, F-Secure solution provides advice and recommendations to guide you through the necessary steps to contain and remediate the threat.


        F-Secure Rapid Detection & Response

        DownloadSolution Overview

        DownloadBroad Context Detection

        Video Watch the video

        F-Secure Rapid Detection & Response Service

        Managed service that monitors your security status 24/7, alerting you of detected attacks within minutes with clear guidance on how to respond.

        • How does a targeted cyber attack usually happen?

        Attackers will first gain access to your IT infrastructure. This typically happens either by exploiting a known vulnerability in one of your servers, or by using a combination of spear-phishing emails and web exploits targeting one of your customer-facing teams.

        After gaining an initial foothold in your IT infrastructure, the attackers will try to access or seize control of the data they're after.

        Typically, they accomplish this by using existing IT administrator tools included in Windows, Mac and Linux operating systems, such as PowerShell, Windows Remote Management and Service Commands.

        • How does F-Secure detect attacks?

         

        The F-Secure Rapid Detection & Response Service includes lightweight intrusion detection sensors for endpoints, networks and decoy servers that are deployed across your IT infrastructure. The sensors monitor activities initiated by the attackers, and stream all information to F-Secure cloud in real-time.

        F-secure cloud-based service hunts for anomalies in the data by using a combination of advanced technologies, such as real-time behavioral analytics, big data analytics and reputational analytics. Anomalies are hunted from two perspectives: known and unknown malicious behavior.

        The use of different types of analytics ensures that attackers are not able to remain undetected, even when using evasion tactics designed to fool specific detection methods.

        • How does F-Secure respond?

        Anomalies are flagged to F-Secure threat hunters in the F-Secure Rapid Detection & Response Center, who work 24x7x365 to verify them and filter out false positives.

        shema

        Once F-Secure threat hunters have confirmed that an anomaly is an actual threat, they will alert you in less than 30 minutes. F-Secure threat hunters will guide you through the necessary steps to contain and remediate the threat. F-Secure also provide detailed information about the attack, which can be used as evidence in criminal cases.

        F-Secure on-site incident response service is also available to assist you in difficult cases, or in cases where your own experts are unavailable.

         

        F-Secure Rapid Detection & Response Service

        Video Watch the video

        Vulnerability Management

        F-Secure Countercept

        Advanced managed threat hunting service to detect and respond 24/7 to skilled human adversaries conducting live, hands-on keyboard attacks.

        At the core of the Continuous Response methodology are the three Cs – Collaboration, Context, and Control.

        • Collaboration

        The minute an attack is detected, multiple teams mobilise in both your organization and F-Secure’s.

        Collaboration supports seamless teamwork, communication and processes to enable fast decision making, communication and co-operation between experts and decisions-makers, both internal and external.

        • Context

        When an attack hits you need access to the most pertinent data and telemetry from across your estate.

        People with The Threat Hunting skillset – supported by F-Secure proprietary technology stack – is paramount, as it fuels F-Secure ability to rapidly collect as much critical information about the incident as possible.

        • Control

        Investigation, containment and remediation actions are guided by Control

        Control leverages the data assembled during the Context phase while harnessing the tools of F-Secure platform to capture forensic data, actively sweep multiple endpoints for the existence of particular indicators of compromise, and find key artifacts in the compromised machine’s file system, to ultimately contain the incident.

        counter c

         

        F-Secure Countercept

        F-Secure Radar

        Turnkey vulnerability scanning and management platform. It allows you to identify and manage both internal and external threats, report risks, and be compliant with current and future regulations (such as PCI and GDPR compliance). It gives you visibility into shadow IT - to map your full attack surface and respond to critical vulnerabilities associated with cyber threats.

        • COMPREHENSIVE VISIBILITY

        Effective security mapping through precise discovery and mapping of all assets, systems, and applications on the network and beyond.

        • STREAMLINED PRODUCTIVITY AND SECURITY MANAGEMENT

        No more inefficiency and missed security risks. Quickly address problems across multiple domains with an efficient service workflow, including vulnerability monitoring, automated scheduled scans, and ticketing for prioritized remediation and verification.

        • REPORTING ON RISK

        Produce reports with credible information about your organization's security posture over time. Show and justify how IT security enables business continuity.

        • REDUCED COSTS

        Vulnerability management is an opportunity to significantly lower the cost of security. It's less costly to deal with security before serious problems arise than it is to deal with it during a crisis or incident recovery. Additionally, leveraging Radar's cloud resources allows organizations to lower their expenses.

        radar

        Vulnerability management is a critical component of IT risk assessment. F-Secure vulnerability scanning and management solutions help companies to have visibility into their IT assets and security posture, and be compliant with regulations (such as PCI and GDPR).

        FROM THE CLOUD

        Run vulnerability scans as a true SaaS while still being able to scan your internal systems, by using the scan nodes within the F-Secure Radar solution

        ONSITE

        Run vulnerability scans as an on-site solution behind your corporate firewall to ensure data is stored according to your security policies

        F-Secure Radar

        Download Service brochure

        Download Product brochure

        Download Product datasheet

        link Support

        link User guide

        link Downloads and hotfixes

         

        end
        ACCREDITATIONS & CERTIFICATES

         

        sertifik


        F-Secure Consulting (F-Secure Cyber Security (Pty) Ltd) is a level 4 contributor to B-BBEE with a procurement recognition level of 100%. Learn more and download our B-BBEE certificate. Click here to read the press release.ACCREDITATIONS & CERTIFICATES

        Free Trial

        Apply for a FREE trial!

        Apply

        Costs

        We make individual quotes for each company, taking into account the needs of the company, the complexity of the project.

        Contact us and get a price!

         

        Apply for consultation!

        We will contact you to arrange your consultation time

        3 + 12 =
        Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.
        Slide
        edzl_logo.png
        finieris.png
        greenmotors.png
        hj.jpg
        karcher.png
        kronus.png
        myfitness.png
        mogo.png
        sanitex.png
        rere.png
        tt.jpg
        skrivanek.png
        vc.jpg
        vaivari.png
        venden.png
        1a.png
        2.jpg
        az.jpg
        balta.png
        cleanr.png
        dpd.png
        edzl_logo.png
        finieris
        greenmotors
        hj
        karcher
        kronus
        myfitness
        mogo
        sanitex
        rere
        compensa
        skrivanek
        estravel
        vaivari
        venden
        1a
        2
        az
        balta
        cleanr
        dpd