Computer Protection

When antivirus simply isn't enough

Free trial

Contact us

Find a reseller

At the forefront of endpoint security

F-Secure Computer Protection is the best endpoint security solution for Windows and Mac computers, proven year after year by independent security experts, such as AV-Test.

It provides you with much more than antivirus. It offers you next-generation security, such as threat intelligence, machine learning, and proactive protection against all threats, like ransomware and 0-day attacks.

To learn more, select your operating system:

Windows Protection

Microsoft Windows is the world's most commonly attacked operating system. The ever-increasing rate of attacks proves how vital it is to protect your Windows computers against threats such as ransomware. For example, one study shows that in 2016 the number of ransomware email attacks increased by 6000%.

Windows security is at its most powerful with a multi-layered approach that includes advanced technologies—like automated patch management, machine learning, real-time threat intelligence, and heuristic analysis. These tools are just some of the features that come as standard in Computer Protection for Windows.

Modern protection is much more than anti-virus

F-Secure Computer Protection for Windows provides powerful and efficient security for your Windows computers, going far beyond traditional antivirus protection.

Heuristic & behavioral analysis

Identifies and blocks sophisticated malware without relying on a signature database.

DeepGuard 6

New DeepGuard increases the use of artificial intelligence and machine learning.

Real-time threat intelligence

F-Secure's Security Cloud identifies, analyzes, and prevents new and emerging threats.

Integrated patch management

By keeping all your software up to date, you can prevent up to 80% of attacks.

Multi-engine anti-malware

Detects a broader range of malicious features, patterns, and trends.

Extensive web protection

Blocks access to malicious and phishing sites, limiting exposure to harmful content.

Password protection

Optional password manager greatly improves overall security level

Dataguard PREMIUM

Provides additional protection against ransomware, and prevents the destruction and tampering of data.

Improved Firewall with expert rules

As well as a hardened firewall configuration for greater robustness, the new F-Secure Firewall uses the default Windows rule engine to execute firewall rules. This greatly increases compatibility with other applications and appliances. The F-Secure expert ruleset, which contains advanced rules that counter risks such as propagating ransomware and lateral movement, is added on top of the standard Windows ruleset.

DeepGuard 6

The new version of DeepGuard combines some of our most advanced security technologies, including artificial intelligence and machine learning, to protect your endpoints against attacks. DeepGuard observes application behavior and proactively intercepts any potentially harmful action on the fly, before it causes damage. It's the final and most critical layer of defense against new threats—even those that target previously unknown vulnerabilities.

Rebootless Upgrades

One of the major problems in business environments is the impact that rebooting the system has on productivity. In some cases, this impact can be severe. With the architecture changes, upgrading the application itself will now rarely ask for a reboot, and in most cases it is totally transparent for end-users. Typically, downtime requirements call for slotted upgrade windows, but with rebootless upgrades, you can apply upgrades any time.

Device Control

Device Control can be used to disallow the use of hardware devices such as USB sticks, CD-ROM drives, web cameras, etc. in endpoints. You can set rules to allow a specific device while all other devices of the same class are blocked.

Computer Protection Premium

F-Secure Computer Protection for Windows has received a new Premium variant, which includes advanced security features. The first of these features is F-Secure DataGuard.

F-Secure DataGuard PREMIUM

F-Secure DataGuard prevents malicious and unknown applications from destroying or tampering with data. It enables the recovery of data, for example in the event of a successful ransomware attack. It also includes advanced monitoring and additional detection logic to provide a complementary layer of protection against ransomware. F-Secure DataGuard is available in Computer Protection Premium.

Automated patch management

Computer Protection for Windows comes with Software Updater, an automated patch management feature. It can prevent up to 80% of attacks simply by installing software security updates as soon as they become available. There's no need to install separate agents, management servers, or consoles. Patch management is the first, critical security component —and one of the best layers of protection when malicious content reaches your endpoints.

DeepGuard 6: The future of security

Computer Protection for Windows has received a significant security improvement with the upgrade to DeepGuard 6. It features more extensive use of artificial intelligence and machine learning, tempered with the latest insights from our analysts, cyber security specialists, and penetration testers.

In layman's terms, this means that we're taking a new, superior approach to protection. We block attacks by identifying and preventing the techniques, methods, and behaviors used in the attacks rather than relying on signatures to catch them.

Premium

F-Secure DataGuard

F-Secure DataGuard subjects selected high-risk and value-critical folders to advanced monitoring and additional detection logic. It makes them significantly more fortified against ransomware, and prevents malicious and unknown applications from destroying or tampering with the data that they contain. The high-risk and value-critical folders include, for example, the Downloads folder (web downloads), document folders, temp files (email attachments), and data repositories.

The feature's complementary detection logic significantly increases detection accuracy and aggressiveness against ransomware and their encryption processes. The Data Access module ensures that the data in these folders is not destroyed, tampered with, or encrypted by malicious or unknown applications, such as ransomware. Among other benefits, the Data Access module enables the recovery of data in the event of a successful ransomware attack, as it cannot encrypt the data located in those folders.

F-Secure DataGuard is available in Computer Protection Premium.

Details

Automated patch management

Software Updater is an automated patch management feature that's fully integrated with F-Secure Workstation Security clients. There's no need to install separate agents, management servers or consoles.

Software Updater is a critical security component. It's the first layer of protection when malicious content reaches end-points and can prevent up to 80% of attacks simply by installing software security updates as soon as they become available.

Software Updater works by scanning for missing updates, creating a vulnerability report based on missing patches, and then downloading and deploying them automatically or manually if needed. Security patches include Microsoft updates and 2500+ 3rd party applications such as Flash, Java, OpenOffice and others that commonly serve as attack vectors due to their popularity and larger number of vulnerabilities.

Heuristic & behavior analysis

DeepGuard combines some of our most advanced security technologies. It's the final and most critical layer of defense against new threats—even those that target previously unknown vulnerabilities.

DeepGuard observes application behavior and proactively intercepts any potentially harmful action on-the-fly before it causes damage. By switching the focus from signature characteristics to malicious behavior patterns, DeepGuard can identify and block malware even before a sample has been acquired and examined.

When an unknown or suspicious program is first launched, DeepGuard temporarily delays its execution in order to perform a file reputation and prevalence rate check, runs it in a sandbox environment, then finally executes it for behavioral analysis and exploit interception.

For more information about Deep Guard functions and benefits, consult our technical whitepaper.

Real-time threat intelligence

The F-Secure Security Cloud is our own cloud-based threat analysis system. It utilizes Big Data and Machine Learning, among other input, to continuously add to our knowledge base of digital threats. The Security Cloud is constantly in touch with client systems, identifying new threats as they emerge and providing protection within minutes.

A cloud-based threat analysis service affords many benefits over traditional approaches. We gather threat intelligence from hundreds of thousands of a large number of client nodes, building a real-time picture of the global threat situation. Within minutes, we use that knowledge to protect our customers.

For example, if DeepGuard's heuristic and behavior analysis identifies a zero-day attack, the information is shared with all protected devices via the F-Secure Security Cloud—rendering the advanced attack harmless mere minutes after initial detection.

For more on the functions and benefits of F-Secure Security Cloud, consult our technical whitepaper.

Superior malware protection

Our computer security component utilizes our multi-engine security platform to detect and prevent malware. It offers superior protection to traditional signature-based technologies:

  • Detects a broader range of malicious features, patterns and trends, enabling more reliable and accurate detections, even for previously unseen malware variants
  • By using real-time look-ups from the F-Secure Security Cloud, it can react faster to new and emerging threats in addition to ensuring a small footprint
  • Emulation enables detection of malware that utilize obfuscation techniques, and offers another layer of security before a file is run

Prevent access to malicious sites

Browsing Protection is a key security layer that proactively prevents end-users from visiting malicious sites. This is particularly effective, as early intervention greatly reduces overall exposure to malicious content, and thus attacks.

For example, Browsing Protection will prevent end-users from being tricked into accessing seemingly legitimate phishing sites, accessing malicious sites through an email link, or getting infected through malicious 3rd party advertisements on otherwise legitimate sites.

The feature works by fetching the latest reputation check of the websites and their files from F-Secure's Security Cloud, based on various data points such as IP addresses, URL keywords and site behavior.

Browsing Protection is fully browser agnostic, as it works at the network level. This ensures that it still provides protection even if the end-user is not using company sanctioned browsers.

Block malicious web content

Web Traffic Protection prevents the exploitation of active content such as Java and Flash, which are used in the vast majority of online attacks. These components are automatically blocked on unknown and suspicious sites based on their reputation data. Administrators can make exceptions to this by adding sites to a trusted sites list, for example company intranet sites for which F-Secure does not have any reputation data.

Web Traffic Protection scans HTTP web traffic in real-time with multiple complementary anti-malware scanning engines and reputation checks. This ensures that malware and exploits are found and blocked at the traffic stage, before data is written to the hard disk. This provides additional protection against more advanced malware—for example the memory-only variety.

Improve productivity and reduce risks

Web Content Control allows restriction of unproductive and inappropriate Internet usage. It can restrict employee Web browsing, denying access to non-work related destinations such as social media and adult sites to maximize time or and avoid malicious sites.

Web Content Control reduces productivity losses, bandwidth consumption and legal risks caused by unauthorized employee access to inappropriate or distracting Web content. It also greatly reduces chances of employee exposure to malicious content.

IT administrators can make local exceptions that override enforced categories. As an example, if social networking sites are restricted, you could add Linkedin.com to the trusted sites list as an exception.

Elevated security for vital websites

Connection Control is a security layer that greatly increases protection for business-critical web activity like the use of intranets or sensitive cloud services like CRMs.

As soon as an employee accesses a website that requires additional security, Connection Control automatically elevates the security level for that session. During this period, Connection Control closes network connections to all unknown sites from the endpoint. Users can continue to use sites that are verified safe by F-Secure so as not to reduce employee productivity.

By blocking untrusted connections, banking trojans and other malware cannot send criminals confidential business information such as user credentials and cloud-based information. Security returns to normal when the specified browser process finishes or the user ends the session.

Access for approved hardware only

Device Control prevents threats from entering your system via hardware devices such as USB sticks, CD-ROM drives, and web cameras. This also prevents data leakage, by allowing read-only access, for example.

When a prohibited device is plugged in, Device Control turns it off to prevent user access. You can block access to devices by setting predefined rules, and set rules to allow specific devices while all other devices of the same class are blocked. You can for example:

  • Disallow running programs from USB/CD/other drives: disable auto run, accidental execution or loading modules from removable drives.
  • Block device classes completely.
  • Define read-only access to USB/CD/other drives.
  • Block device classes with exception of specified devices.

Better Security and Compatibility

The new F-Secure firewall uses the default Windows rule engine to execute firewall rules. This greatly increases compatibility with other applications and appliances. The F-Secure expert ruleset, which contains advanced rules that counter risks such as propagating ransomware and lateral movement, is added on top of the standard Windows ruleset.

The administrator can extend the F-Secure rulesets with rules to tackle company and context-specific threats. Additionally, auto-selection rules allow administrators to define profiles adapted to the security needs of various networks.

Automated patch management

Software Updater is an automated patch management feature that's fully integrated with F-Secure Workstation Security clients. There's no need to install separate agents, management servers or consoles.

Software Updater is a critical security component. It's the first layer of protection when malicious content reaches end-points and can prevent up to 80% of attacks simply by installing software security updates as soon as they become available.

Software Updater works by scanning for missing updates, creating a vulnerability report based on missing patches, and then downloading and deploying them automatically or manually if needed. Security patches include Microsoft updates and 2500+ 3rd party applications such as Flash, Java, OpenOffice and others that commonly serve as attack vectors due to their popularity and larger number of vulnerabilities.

Mac Protection

The diversity of today's endpoints means that you need to secure more than just Windows PCs. The fact that 2016 saw a 744% increase in malware targeting Macs clearly suggests that attackers are shifting their efforts towards the poorer defenses of Macs, demonstrating the need to secure them within your organization.

Whether your users work with PCs or Macs, you require modern security built on multiple complementary layers, going well beyond traditional, signature-based anti-malware. These security tools include capabilities like artificial intelligence, machine learning, and real-time threat intelligence – all built into Computer Protection for Mac.

Modern protection is much more than anti-virus

F-Secure Computer Protection for Mac brings you the latest in multi-layered security, going far beyond traditional antivirus protection.

F-Secure XFENCE

Monitors and protects Macs against all threats, like ransomware, back doors, and exploits.

Real-time threat intelligence

F-Secure's Security Cloud identifies, analyzes and prevents new and emerging threats.

Multi-engine anti-malware

Detects a broader range of malicious features, patterns, and trends.

Extensive web protection

Blocks access to malicious and phishing sites, limiting exposure to harmful content.

Password protection

Optional password manager greatly improves your overall security level.

xFence Technology

F-Secure Computer Protection features our new XFENCE technology—a unique security capability for Macs. XFENCE protects Macs against malware, ransomware, back doors, misbehaving applications, and other threats by preventing applications from accessing your files and system resources without permission.

XFENCE: Industry-leading Mac security

Computer Protection for Mac has received a significant security boost through our new XFENCE technology. It intercepts files accessed by applications and processes, and checks them against the threat intelligence provided by our Security Cloud. This allows XFENCE to prevent errant processes, ransomware, and other malware from meddling with documents, executables, and system data. It can even detect microphone and webcam snooping.

Details

Industry-leading Mac security

F-Secure Computer Protection includes XFENCE, a unique security capability for Macs. It protects Macs against malware, trojans, back doors, misbehaving applications, and other threats by preventing applications from accessing your files and system resources without explicit permission.

The tool leverages advanced rule-based analysis to monitor apps that attempt to access confidential files and system resources, enhanced by the threat intelligence provided by Security Cloud to minimize false positives and user interaction through allow/disallow prompts.

Real-time threat intelligence

The F-Secure Security Cloud is our own cloud-based threat analysis system. It utilizes Big Data and Machine Learning, among other input, to continuously add to our knowledge base of digital threats. The Security Cloud is constantly in touch with client systems, identifying new threats as they emerge and providing protection within minutes.

A cloud-based threat analysis service affords many benefits over traditional approaches. We gather threat intelligence from hundreds of thousands of a large number of client nodes, building a real-time picture of the global threat situation. Within minutes, we use that knowledge to protect our customers.

For example, if DeepGuard's heuristic and behavior analysis identifies a zero-day attack, the information is shared with all protected devices via the F-Secure Security Cloud—rendering the advanced attack harmless mere minutes after initial detection.

For more on the functions and benefits of F-Secure Security Cloud, consult our technical whitepaper.

Superior malware protection

Our computer security component utilizes our multi-engine security platform to detect and prevent malware. It offers superior protection to traditional signature-based technologies:

  • Detects a broader range of malicious features, patterns and trends, enabling more reliable and accurate detections, even for previously unseen malware variants
  • By using real-time look-ups from the F-Secure Security Cloud, it can react faster to new and emerging threats in addition to ensuring a small footprint

Prevent access to malicious sites

Browsing Protection is a key security layer that proactively prevents end-users from visiting malicious sites. This is particularly effective, as early intervention greatly reduces overall exposure to malicious content, and thus attacks.

For example, Browsing Protection will prevent end-users from being tricked into accessing seemingly legitimate phishing sites, accessing malicious sites through an email link, or getting infected through malicious 3rd party advertisements on otherwise legitimate sites.

The feature works by fetching the latest reputation check of the websites and their files from F-Secure's Security Cloud, based on various data points such as IP addresses, URL keywords and site behavior.

Industry-leading Mac security

F-Secure Computer Protection includes XFENCE, a unique security capability for Macs. It protects Macs against malware, trojans, back doors, misbehaving applications, and other threats by preventing applications from accessing your files and system resources without explicit permission.

The tool leverages advanced rule-based analysis to monitor apps that attempt to access confidential files and system resources, enhanced by the threat intelligence provided by Security Cloud to minimize false positives and user interaction through allow/disallow prompts.