Security for Computers

Resource-light, Protection-heavy
In today's security landscape, it is vital to ensure protection that goes well beyond traditional anti-malware. With Protection Service for Business it's simple to deliver powerful, resource-light security for Windows and Mac computers, together with crucial patch management.

Free trial

Contact us

Find a reseller

Protection Service for Business

Time to step up security

In the past 5 years, the threat landscape has evolved to the point that standard computer security measures are just not enough. Traditional anti-malware doesn't cut it anymore.

To ensure that security levels meet the challenges of the modern security landscape, you need superior, proven protection that leverages real-time threat intelligence, pioneering technologies such as Heuristic Analysis, and tools like Patch Management.

Powerful, Modern, Efficient

Protection Service for Business provides powerful, modern security for your computer endpoints. With tools like Patch Management and real-time threat intelligence provided through the F-Secure Security Cloud, your security rises to a whole new level.

  • Winning AV-Test's Best Protection award four years in a row proves that you're getting the best protection available
  • Integrated Patch Management keeps all your 3rd party software up-to-date, preventing up to 80% of known malware
  • You get world-leading security through pioneering technologies, like real-time threat intelligence provided via the F-Secure Security Cloud
  • Thanks to remote deployment, automatic removal of old anti-virus software, and no hardware set up, AV-Comparatives found our endpoint installation "no more complicated than installing iTunes"

See what's new

New Windows Client

The new Windows client fully supports the latest Windows 10 OS, including Device Guard. It also provides new features like Web Content Control and Advanced Web Traffic Protection, delivering superior security and control over endpoints.

New Mac Client

The new Mac client fully supports the latest El Capitan OS and provides new features such as integration with the F-Secure Security Cloud, as well as significant performance improvements.

'Comprehensive' would be an understatement

Protection Service for Business offers you everything you need for powerful, comprehensive computer security in one package. That includes patch management, state-of-the-art protection technologies, and more.

Details

Automated patch management

Software Updater is an automated patch management feature that's fully integrated with F-Secure Workstation Security clients. There's no need to install separate agents, management servers or consoles.

Software Updater is a critical security component. It's the first layer of protection when malicious content reaches end-points and can prevent up to 80% of attacks simply by installing software security updates as soon as they become available.

Software Updater works by scanning for missing updates, creating a vulnerability report based on missing patches, and then downloading and deploying them automatically or manually if needed. Security patches include Microsoft updates and 2500+ 3rd party applications such as Flash, Java, OpenOffice and others that commonly serve as attack vectors due to their popularity and larger number of vulnerabilities.

Heuristic & behavior analysis

DeepGuard combines some of our most advanced security technologies. It's the final and most critical layer of defense against new threats—even those that target previously unknown vulnerabilities.

DeepGuard observes application behavior and proactively intercepts any potentially harmful action on-the-fly before it causes damage. By switching the focus from signature characteristics to malicious behavior patterns, DeepGuard can identify and block malware even before a sample has been acquired and examined.

When an unknown or suspicious program is first launched, DeepGuard temporarily delays its execution in order to perform a file reputation and prevalence rate check, runs it in a sandbox environment, then finally executes it for behavioral analysis and exploit interception.

For more information about Deep Guard functions and benefits, consult our technical whitepaper.

Real-time threat intelligence

The F-Secure Security Cloud is our own cloud-based threat analysis system. It utilizes Big Data and Machine Learning, among others, to continuously add to our knowledge base of digital threats. The Security Cloud is constantly in touch with client systems, identifying new threats as they emerge and providing protection within minutes.

A cloud-based threat analysis service affords many benefits over traditional approaches. We gather threat intelligence from hundreds of thousands of a large number of client nodes, building a real-time picture of the global threat situation. Within minutes, we use that knowledge to protect our customers.

For example, if DeepGuard's heuristic and behavior analysis identifies a zero-day attack, the information is shared with all protected devices via the F-Secure Security Cloud—rendering the advanced attack harmless mere minutes after initial detection.

For more F-Secure Security Cloud functions and benefits, consult our technical whitepaper.

Superior malware protection

Our computer security component utilizes our multi-engine security platform to detect and prevent malware. It offers superior protection to traditional signature-based technologies:

  • Detects a broader range of malicious features, patterns and trends, enabling more reliable and accurate detections, even for previously unseen malware variants
  • By using real-time look-ups from the F-Secure Security Cloud, it can react faster to new and emerging threats in addition to ensuring a small footprint
  • Emulation enables detection of malware that utilize obfuscation techniques, and offers another layer of security before a file is run

Prevent access to malicious sites

Browsing Protection is a key security layer that proactively prevents end-users from visiting malicious sites. This is particularly effective, as early intervention greatly reduces overall exposure to malicious content, and thus attacks.

For example, Browsing Protection will prevent end-users from being tricked into accessing seemingly legitimate phishing sites, accessing malicious sites through an email link, or getting infected through malicious 3rd party advertisements on otherwise legitimate sites.

The feature works by fetching the latest reputation check of the websites and their files from F-Secure's Security Cloud, based on various data points such as IP addresses, URL keywords and site behavior.

Browsing Protection is fully browser agnostic, as it works at the network level. This ensures that it still provides protection even if the end-user is not using company sanctioned browsers.

Block malicious web content

Web Traffic Protection prevents the exploitation of active content such as Java and Flash, which are utilized in the vast majority of online attacks. These components are automatically blocked on unknown and suspicious sites based on their reputation data. Administrators can make exceptions to this by adding sites to a trusted sites list, for example company intranet sites for which F-Secure does not have any reputation data.

Web Traffic Protection scans HTTP web traffic in real-time with multiple complementary anti-malware scanning engines and reputation checks. This ensures that malware and exploits are found and blocked at the traffic stage, before data is written to the hard disk. This provides additional protection against more advanced malware—for example the memory-only variety.

Improve productivity and reduce risks

Web Content Control allows restriction of unproductive and inappropriate Internet usage. It can restrict employee Web browsing, denying access to non-work related destinations such as social media and adult sites to maximize time or and avoid malicious sites.

Web Content Control reduces productivity losses, bandwidth consumption and legal risks caused by unauthorized employee access to inappropriate or distracting Web content. It also greatly reduces chances of employee exposure to malicious content.

IT administrators can make local exceptions that override enforced categories. As an example, if social networking sites are restricted, you could add Linkedin.com to the trusted sites list as an exception.

Elevated security for vital websites

Connection Control is a security layer that greatly increases protection for business-critical web activity like the use of intranets or sensitive cloud services like CRMs.

As soon as an employee accesses a website that requires additional security, Connection Control automatically elevates the security level for that session. During this period, Connection Control closes network connections to all unknown sites from the endpoint. Users can continue to use sites that are verified safe by F-Secure so as not to reduce employee productivity.

By blocking untrusted connections, banking trojans and other malware cannot send criminals confidential business information such as user credentials and cloud-based information. Security returns to normal when the specified browser process finishes or the user ends the session.

Automated patch management

Software Updater is an automated patch management feature that's fully integrated with F-Secure Workstation Security clients. There's no need to install separate agents, management servers or consoles.

Software Updater is a critical security component. It's the first layer of protection when malicious content reaches end-points and can prevent up to 80% of attacks simply by installing software security updates as soon as they become available.

Software Updater works by scanning for missing updates, creating a vulnerability report based on missing patches, and then downloading and deploying them automatically or manually if needed. Security patches include Microsoft updates and 2500+ 3rd party applications such as Flash, Java, OpenOffice and others that commonly serve as attack vectors due to their popularity and larger number of vulnerabilities.