Mobile Protection

Freedome for Business
Protecting your business on the move

Free trial

Contact us

Find a reseller

Take control of mobile devices and their data

Smartphones with access to company emails, services, or data are vulnerable to data breaches. Under the General Data Protection Regulation, from May 2018 this could lead to a fine of €20 million or 4% of turnover. With F-Secure Freedome for Business, you can secure and manage all iOS and Android smartphones and tablets.

  • Mobile Device Management
    Enforce proactive security policies and monitor fleet status.
  • Mobile VPN
    Encrypts traffic, preventing interception of emails and online communication.
  • Application Protection
    Protects mobile devices against ransomware and malicious content.
  • Browsing Protection
    Proactively prevents end-users from visiting malicious and phishing sites.
  • Great Battery Life
    Modern ultralight technology ensures great battery life and performance.
  • MDM Support
    Supports deployment via AirWatch, MobileIron, Intune, and MaaS360.

How much would a mobile data breach cost your business?

Under the General Data Protection Regulation, from May 2018 a data breach could lead to a fine of €20 million or 4% of turnover. Smartphones with access to company emails, services or data are vulnerable to data breaches—in 2016, smartphone malware attacks surged by almost 400%.

Your business traffic, like sensitive emails, can be monitored in real-time on public Wi-Fi networks. Applications leak all kinds of information and often request broad access rights to phone data and systems. And if a device is lost or stolen, how can you ensure it will not cause a data breach?

Get mobile security under control

Protection Service for Business makes it easy to protect your iOS and Android mobile devices against data breaches and leakage. You get everything you need for mobile security in one package: anti-malware, anti-theft, VPN, and mobile device management.

Faster browsing

Up to 30% faster mobile browsing.

Faster browsing

Traffic compression and prevention of online tracking increase mobile browsing speed by up to 30%.

Great battery life

Modern ultralight technology maintains great device and battery performance.

Great battery life

All resource-intensive operations have been moved to the cloud, ensuring great device and battery performance.

Real-time visibility

Monitoring of all your mobile devices, wherever they are.

Real-time visibility

Detailed graphical reports allow you to monitor the security and device status of your whole mobile fleet.

Prevent data loss

With remote wipe and personal VPN services.

Prevent data loss

Prevent data loss by remotely wiping lost or stolen devices. Prevent data leakage in unsafe Wi-Fi networks with personal VPN services.

Wi-Fi protection

Use public Wi-Fi networks with confidence—the mobile VPN automatically encrypts traffic sent to and from mobile devices.

Wi-Fi protection

Mobile VPN automatically encrypts traffic sent to and from mobile devices, preventing interception of emails, browser sessions, and online services on public Wi-Fi and mobile networks.

Prevent data leaks

Enforce passcodes to prevent device compromises and data leakage from lost or stolen devices.

Prevent data leaks

Configure and enforce security policies, such as passcode use, to prevent easy data leakage from lost or stolen devices, as well as easy compromise of devices.

Detect vulnerabilities

Detect vulnerable OS versions, such as Android 4.1.1 with Heartbeat.

Detect vulnerabilities

Monitor device security status and identify devices running vulnerable OS versions, such as Android 4.1.1 with Heartbeat.

MDM Support

Work more efficiently through third-party device control and visibility.

MDM Support

Supports deployment via third-party MDM solutions likes AirWatch, MobileIron, Intune, and MaaS360.

Third-Party MDM Support

The mobile client is designed to support industry-standard deployment through third-party MDM solutions, such as AirWatch, MobileIron, Intune, and MaaS360.

Using a dedicated security component provides a considerable increase in security against malware, data theft, and phishing, among other threats, on top of the basic security features provided by the existing MDM solution.

Although your security coverage is the same when deploying the mobile client through a third-party MDM, some of the device management functions are provided by that MDM, rather than through the mobile client.

3rd Party MDM
F-Secure MDM
3rd Party MDM
 
F-Secure MDM

Mobile VPN

 

Security Cloud

 

Browsing Protection

 

Application Protection

 

Anti-Tracking

 

Managed Anti-theft

Via your MDM

 

Passcode Enforcement

Via your MDM

 

Fleet Information

Via your MDM

 

Security Monitoring

 

Platform support (Android, iOS)

 

Browsing speed and power

Protection Service for Business is designed to have minimal impact on mobile performance and battery life. In fact, by using traffic compression and preventing online tracking, it increases browsing speed by up to 30%.

  • nytimes.com
    18,2ms
    10,5ms
  • yahoo.com
    14,8ms
    3,84ms
  • bbc.com
    14,5ms
    4,17ms
  • gmw.cn
    11,9ms
    3,63ms
  • rakuten.co.jp
    21,6ms
    6,76ms
  • youku.com
    24,1ms
    7,84ms
  • chron.com
    13,7ms
    6,39ms
  • sina.com.cn
    8,9ms
    3ms
  • cbsnews.com
    6,63ms
    5,42ms
  • cnbc.com
    16,7ms
    6,42ms
  • Chart: Loading time comparison, lower is better
  • Without Freedome
  • With Freedome

Details

Control and enforce mobile security

Mobile Device Management gives you granular control over your device fleet. Use it to configure and enforce security policies, such as passcode use, and to centrally activate anti-theft functions in case of theft or loss, for example by wiping the device remotely.

Mobile Device Management enables you to control devices throughout their lifecycles, not just when they are lost or stolen. It also provides detailed information about the devices themselves above and beyond their security status. This allows you to more efficiently monitor your fleet's security status and to identify issues for quick remediation. For example, you can identify:

  • devices with OS versions that have vulnerabilities, like Android 4.1.1 with Heartbeat
  • whether the device has been rooted
  • when the device has repeatedly attempted to visit questionable websites, or how much traffic has been encrypted

Encrypt all your mobile traffic

The mobile VPN automatically encrypts traffic between your mobile device and a selected F-Secure service node, allowing you you to safely utilize public Wifi and mobile networks.

It prevents the interception of emails, browser sessions and use of online services, in addition to providing an extra security layer for HTTPS connections. It also enables you to change your virtual location, hide your IP address and access local services when abroad.

Using the Personal Mobile VPN does not slow down your device. By using traffic compression and preventing online tracking and advertising, we can increase your mobile browsing speed by up to 30%.

For Android devices, we utilize OpenVPN with AES-256 encryption for the control channel and AES-128 for the data. For iOS devices we utilize IPSEC with AES-256.

Real-time threat intelligence

The F-Secure Security Cloud is our own cloud-based threat analysis system. It utilizes Big Data and Machine Learning, among others, to continuously add to our knowledge base of digital threats. The Security Cloud is constantly in touch with client systems, identifying new threats as they emerge and providing protection within minutes.

A cloud-based threat analysis service affords many benefits over traditional approaches. We gather threat intelligence from hundreds of thousands of a large number of client nodes, building a real-time picture of the global threat situation. Within minutes, we use that knowledge to protect our customers.

For example, if DeepGuard's heuristic and behavior analysis identifies a zero-day attack, the information is shared with all protected devices via the F-Secure Security Cloud—rendering the advanced attack harmless mere minutes after initial detection.

For more details on the functions and benefits of F-Secure Security Cloud, consult our technical whitepaper.

Ultralight anti-malware

When using our VPN connection, mobile devices are automatically protected against malware and malicious content. Our service node scans the traffic at the network level, utilizing the full extent of our security analytics. This allows us to provide better security than traditional mobile security solutions:

  • Security level is not hampered by limited mobile device resources
  • Resource-intensive processes don't impact device performance and battery life
  • Network-level scanning prevents contact with malicious content in the first place

For Android devices, security is further enhanced with local scanning—including real-time reputation checks from the F-Secure Security Cloud—even when the VPN is not connected. When an APK or file is downloaded, it is scanned and reputation-checked in the Security Cloud. Malicious files are prevented from running and unknown files or apps are uploaded for deeper scanning. Scan results benefit all users, for example by minimizing false positives and rendering new attacks harmless in a matter of minutes.

Prevent access to malicious sites

Browsing Protection is a key security layer that proactively prevents end-users from visiting malicious sites. This is particularly effective, as early intervention greatly reduces overall exposure to malicious content, and thus attacks.

For example, Browsing Protection will prevent end-users from being tricked into accessing seemingly legitimate phishing sites, accessing malicious sites through an email link, or getting infected through malicious third-party advertisements on otherwise legitimate sites.

The feature works by fetching the latest reputation check of the websites and their files from F-Secure's Security Cloud, based on various data points such as IP addresses, URL keywords and site behavior.

Browsing Protection is fully browser agnostic, as it works at the network level. This ensures that it still provides protection even if the end-user is not using company sanctioned browsers.

Boosts browsing speed

Anti-tracking prevents most online services from collecting information about the user: what is searched, which websites are visited, which banners are clicked, geographical location, and more. Anti-tracking blocks various tracking methods including cookie, script and pixel-tracking.

Information tracking is a technique commonly used to track and profile company personnel for employee poaching. Criminals can also utilize the data to orchestrate social engineering attacks, and even to target businesses by industry, size and location, as examples.

Online tracking and advertisement have become so pervasive and resource-intensive that by preventing them we can also increase mobile device browsing speed by up to 30%. It will also save you money by reducing your mobile data consumption.

Third-party MDM support

The mobile client is designed to support industry-standard deployment through third-party MDM solutions, such as AirWatch, MobileIron, Intune, and MaaS360.

By using a dedicated security component on top of the basic capabilities provided by the MDM solution, you can significantly increase your security against malware, data theft, and phishing attempts targeted at mobile devices.

On Android, the deployment can be done either via Google Play or as an uploaded APK. iOS deployment is done via the Apple App Store. Security monitoring can be done normally through the PSB Management Portal. Managing the client lifecycle, such as upgrades or removal, can be done via the MDM or by relying on automatic upgrades from the app stores.

Control and enforce mobile security

Mobile Device Management gives you granular control over your device fleet. Use it to configure and enforce security policies, such as passcode use, and to centrally activate anti-theft functions in case of theft or loss, for example by wiping the device remotely.

Mobile Device Management enables you to control devices throughout their lifecycles, not just when they are lost or stolen. It also provides detailed information about the devices themselves above and beyond their security status. This allows you to more efficiently monitor your fleet's security status and to identify issues for quick remediation. For example, you can identify:

  • devices with OS versions that have vulnerabilities, like Android 4.1.1 with Heartbeat
  • whether the device has been rooted
  • when the device has repeatedly attempted to visit questionable websites, or how much traffic has been encrypted