Security made simple
F-Secure Protection Service for Business makes it easy to deploy, manage, and monitor the security of your endpoints and related services from a single, intuitive console. It gives you real-time visibility into all your devices and their security status. Extensive dashboards with priority and severity ratings optimize administration, incident response, and remediation.
- Fast, scalable deployment
"No more difficult than installing iTunes" – AV-Comparatives
- Security management
Create, customize, and assign policies individually or in groups.
- Security monitoring
Graphical dashboards provide security overview and prioritization.
- Mobile Device Management
Central control and visibility of mobile devices.
- Patch management
Visibility and prioritization of vulnerabilities.
Improved Windows Firewall
The new F-Secure firewall uses the default Windows rule engine to execute firewall rules. This greatly increases compatibility with other applications and appliances. The F-Secure expert ruleset, which contains advanced rules that counter risks such as propagating ransomware and lateral movement, is added on top of the standard Windows ruleset.
New password manager
The integrated password manager reduces the risk of data breaches that could lead to a heavy fine under the new General Data Protection Regulation. From the Management Portal, you can centrally provide employees with an easy-to-use password manager that makes proper password hygiene more convenient.
Rebootless Windows Client
One of the major problems in business environments is the impact that rebooting the system has on productivity. In some cases, this impact can be severe. With the architecture changes, upgrading the application itself will now rarely ask for a reboot, and in most cases it is totally transparent for end-users. This enables for example running upgrades outside slotted upgrade windows due to downtime requirements.
Improved profile management
The Management Portal has undergone usability improvements based on customer requests. These include more extensive scheduling options for scanning, profile grouping, improved product filtering, and global exclusions for larger environments.
Device Control can be used to disallow the use of hardware devices such as USB sticks, CD-ROM drives, web cameras, etc. in endpoints. You can set rules to allow a specific device while all other devices of the same class are blocked.
Streamline your endpoint security management
It's challenging enough to manage the security of modern, multi-device environments against external threats. The sheer variety of endpoints keeps increasing, as does the number of ways they are used beyond office networks. But perhaps the biggest issue in terms of maintaining your security is an internal challenge—prioritizing the allocation of limited time and resources.
Cloud-based, centralized security management
F-Secure Protection Service for Business provides central deployment, management, and monitoring of all your endpoints as well as necessary security tools, like patch management, helping to reduce maintenance and management overheads.
Straightforward and scalable deployment.
Extensive graphical dashboards with priority and severity ratings.
No servers needed
No need to invest in server hardware, software, or maintenance.
Simplifies and streamlines security management, reducing the time and resources required.
Cost-effective, open integration with any central management tool.
Central management for vital security tools, like patch management.
No more waiting
Manage and monitor security without disruptions or delays.
Robust cloud-based architecture ensures great scalability.
Seamless integration with SIEM, RMM and auditing tools
F-Secure Protection Service for Business integrates with any Security Information and Event Management (SIEM) solution or Remote Monitoring and Management (RMM) tool, as well as any other third-party auditing, management, or reporting tool via an industry-standard Rest API.
With a single console providing centralized visibility and manageability of all your separate solutions, you can optimize workflows and any investments in existing solutions. This also enables the seamless integration of the solution with more complex security environments.