Skip to main content
  •  Office: +371 66 100 800
  • Technical support: +371 66 100 802
  •  Pr - Pk: 08:30 - 18:30


With Secure

Forecasting, preventing, detecting, and responding to vulnerabilities requires a combination of state-of-the-art knowledge and constantly evolving technology.

Nobody knows cyber security like With Secure. For three decades, With Secure has driven innovations in cyber security, defending tens of thousands of companies and millions of people.

With unsurpassed experience in endpoint protection as well as detection and response, With Secure shields enterprises and consumers against everything from advanced cyber-attacks and data breaches to widespread ransomware infections



With Secure non-prescriptive approach and a client-valued team are the result of:

  • A hiring policy that gets top talent whilst celebrating the diversity of background and skill-set
  • With Secure Akademy: in-house learning system, helping consultants develop a broad and modern set of capabilities
  • Partnering with clients to solve new and complex security challenges
  • Consultants dedicating time to research, driving service innovation that’s visible in the work we do
  • Providing evidence-based recommendations based on this technical investigation


With Secure service, the approach challenges traditional industry methods and doesn’t come with a prescribed way of working. Service excellence is about working your way: as an extension of your team or a separate division, on-site or remotely, for extended periods or sprints. It’s the dedicated job of the Delivery team to curate ways of working that fit your organization and ensure you get the right level of access to With Secure consultants.

We strive to be the easiest cyber security company to work with, delivering exceptional results without disruption. We help keep our clients’ businesses and customers safe day to day, and work with them to mitigate damage should the worst happen.


Consulting expertise across hardware and firmware, as well as software, is hard to find. And it's one of the things that makes us so special. It means With Secure can analyze client's entire ecosystems, uncovering pathways and revealing the consequences of an attack – from financial depletion to loss of life.

With Secure serves enterprise clients in the UK, Nordics, US, Singapore, Japan, and South Africa, across countless verticals, including: aviation, maritime, and automotive transport, critical infrastructure, financial services, manufacturing, and telecoms.

With Secure Endpoint Protection

With Secure Business Suite

On-site deployed protection with full configurability, from servers to endpoints.

F-Secure for business

With Secure Business Suite is an on-site business security solution that offers the best continuous protection for your organization by combining the best of accumulated expertise, advanced technologies, and modern, cutting-edge features with full on-site control. It is a full protection bundle designed to cover the demanding business security needs from gateway to endpoint.

  • Layered protection to protect your assets from gateway to endpoint
  • Best protection levels covering both known vulnerabilities and new, emerging threats
  • Advanced management features to allow you full control of your organization's IT security
  • Less work through automation of daily tasks
  • Less hassle with a scalable all-in-one package with flexible and transparent licensing for organizations of all sizes
For Business

With Secure Business Suite

Download Product Brochure

Download Product Flyer

Download Solution Overview

With Secure Elements Endpoint Protection

Cloud-hosted, comprehensive but flexible endpoint security for all devices with a cloud-based management portal and endpoint protection clients for computers, mobiles, servers, and passwords.


Management portal:

  • One portal for deployment, management and monitoring
  • Automatic patch management
  • No server hardware required
  • Full integration readiness for third-party management tools


Computer Protection:

  • Award-winning security for Mac & Windows
  • AV-TEST Best Protection, 2011-2014, 2016 and 2018
  • Integrated patch management for Windows computers
  • Advanced Behavior & Heuristic Analysis
  • Artificial intelligence and machine learning in DeepGuard 6


Mobile Protection

  • Next generation mobile security for iOS and Android devices
  • WiFi security (VPN)
  • Proactive App and web protection
  • Third-party MDM support available


Server Protection

  • Multi-platform server security
  • Advanced Behavior & Heuristic Analysis
  • Fully integrated Patch Management
  • Additional SharePoint & Exchange components


With Secure Advanced Threat Protection

F-Secure Elements Endpoint Detection and Response

Monitor your IT environment status and security, detect targeted attacks swiftly, and respond with contextual visibility and automation.


How does it work?

  • Lightweight sensors monitor your endpoint users' behavior and stream the events to With Secure cloud in real-time.
  • F-Secure's real-time behavioral analytics and Broad Context Detection™ distinguish malicious behavior patterns and identify real attacks.
  • Visualized broad context and descriptive attack information make confirming a detection easy. F-Secure Partner or your own IT team manages the alerts, and there's an option to elevate tough investigations to F-Secure.
  • Following a confirmed detection, With Secure solution, provides advice and recommendations to guide you through the necessary steps to contain and remediate the threat.

With Secure Elements Endpoint Detection and Response

DownloadSolution Overview

DownloadBroad Context Detection

Video Watch the video

With Secure Rapid Detection & Response Service

Managed service that monitors your security status 24/7, alerting you of detected attacks within minutes with clear guidance on how to respond.

  • How does a targeted cyber attack usually happen?

Attackers will first gain access to your IT infrastructure. This typically happens either by exploiting a known vulnerability in one of your servers or by using a combination of spear-phishing emails and web exploits targeting one of your customer-facing teams.

After gaining an initial foothold in your IT infrastructure, the attackers will try to access or seize control of the data they're after.

Typically, they accomplish this by using existing IT administrator tools included in Windows, Mac, and Linux operating systems, such as PowerShell, Windows Remote Management, and Service Commands.

  • How does With Secure detect attacks?


The With Secure Rapid Detection & Response Service includes lightweight intrusion detection sensors for endpoints, networks, and decoy servers that are deployed across your IT infrastructure. The sensors monitor activities initiated by the attackers and stream all information to With Secure cloud in real-time.

With Secure cloud-based service hunts for anomalies in the data by using a combination of advanced technologies, such as real-time behavioral analytics, big data analytics, and reputational analytics. Anomalies are hunted from two perspectives: known and unknown malicious behavior.

The use of different types of analytics ensures that attackers are not able to remain undetected, even when using evasion tactics designed to fool specific detection methods.

  • How does With Secure respond?

Anomalies are flagged to With Secure threat hunters in the With Secure Rapid Detection & Response Center, who work 24x7x365 to verify them and filter out false positives.


Once With Secure threat hunters have confirmed that an anomaly is an actual threat, they will alert you in less than 30 minutes. With Secure threat, hunters will guide you through the necessary steps to contain and remediate the threat. With Secure also provide detailed information about the attack, which can be used as evidence in criminal cases.

With Secure on-site incident response service is also available to assist you in difficult cases, or in cases where your own experts are unavailable.


With Secure Rapid Detection & Response Service

Video Watch the video

Vulnerability Management

With Secure Countercept

Advanced managed threat hunting service to detect and respond 24/7 to skilled human adversaries conducting live, hands-on keyboard attacks.

At the core of the Continuous Response, the methodology is the three Cs – Collaboration, Context, and Control.

  • Collaboration

The minute an attack is detected, multiple teams mobilize in both your organization and With Secure.

Collaboration supports seamless teamwork, communication, and processes to enable fast decision making, communication, and cooperation between experts and decision-makers, both internal and external.

  • Context

When an attack hits you need access to the most pertinent data and telemetry from across your estate.

People with The Threat Hunting skillset – supported by With Secure proprietary technology stack – are paramount, as it fuels F-Secure ability to rapidly collect as much critical information about the incident as possible.

  • Control

The investigation, containment, and remediation actions are guided by the Control

Control leverages the data assembled during the Context phase while harnessing the tools of With Secure platform to capture forensic data, actively sweep multiple endpoints for the existence of particular indicators of compromise, and find key artifacts in the compromised machine’s file system, to ultimately contain the incident.

counter c


With Secure Countercept

With Secure Elements Vulnerability Management

Turnkey vulnerability scanning and management platform. It allows you to identify and manage both internal and external threats, report risks, and be compliant with current and future regulations (such as PCI and GDPR compliance). It gives you visibility into shadow IT - to map your full attack surface and respond to critical vulnerabilities associated with cyber threats.


Effective security mapping through precise discovery and mapping of all assets, systems, and applications on the network and beyond.


No more inefficiency and missed security risks. Quickly address problems across multiple domains with an efficient service workflow, including vulnerability monitoring, automated scheduled scans, and ticketing for prioritized remediation and verification.


Produce reports with credible information about your organization's security posture over time. Show and justify how IT security enables business continuity.


Vulnerability management is an opportunity to significantly lower the cost of security. It's less costly to deal with security before serious problems arise than it is to deal with it during a crisis or incident recovery. Additionally, leveraging Radar's cloud resources allows organizations to lower their expenses.


Vulnerability management is a critical component of IT risk assessment. With Secure vulnerability scanning and management solutions help companies to have visibility into their IT assets and security posture, and be compliant with regulations (such as PCI and GDPR).


Run vulnerability scans as a true SaaS while still being able to scan your internal systems, by using the scan nodes within the With Secure Radar solution


Run vulnerability scans as an on-site solution behind your corporate firewall to ensure data is stored according to your security policies

With Secure Elements Vulnerability Management

Download Product brochure

link Support

link User guide

link Downloads and hotfixes





With Secure  Consulting (F-Secure Cyber Security (Pty) Ltd) is a level 4 contributor to B-BBEE with a procurement recognition level of 100%. Learn more and download our B-BBEE certificate. Click here to read the press release.ACCREDITATIONS & CERTIFICATES

Free Trial

Apply for a FREE trial!



We make individual quotes for each company, taking into account the needs of the company, the complexity of the project.

Contact us and get a price!


Sazinies ar mums!

1 + 1 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.