ONE PORTAL. COMPLETE SECURITY
Protection Service for Business makes it easy to deploy, manage and monitorthe security of your end-points from a single, intuitive console. It gives you excellent visibility into all of your devices—whether at the office or on the go.
SO LITTLE TIME, SO MUCH TO DO
Managing the security of modern, multi-device environments is challenging. The sheer variety of endpoints keeps increasing, as does the number of ways they are used outside of office networks. It doesn't help that you have limited time and competing priorities—in addition to maintaining security.
CONTROL AND EFFICIENCY
The Protection Service for Business was designed from the ground up to simplify and accelerate security management – and to provide visibility and control over all your end-points.
- By consolidating end-point management and all required tools into one task-oriented portal, you save time—time that's better spent on something else
- With automated patch management, product and database updates, you can save even more time
- Intuitive graphical reports and dashboards allow you to identify security issues for fast remediation—like software vulnerabilities and infections
- Gain visibility and control over all your endpoints, no matter where they are
- No need to deploy or maintain server hardware—it's a hosted service
Redesigned management Portal
We redesigned the central management portal for simplicity and usability. You'll find it more intuitive, cleaner, and easier to use. Better design makes security deployment, monitoring and management across all end-points much more efficient and straightforward. Read from our security blog.
SO HOW DOES IT WORK?
The management portal enables you to carry out all deployment, configuration, management and monitoring tasks—across all your end-points—from a single intuitive console.
You can manage your customer accounts and subscriptions through the F-Secure Partner Portal, which is synchronized in real time with the Management Portal. You can access it directly or through the Management Portal.
There is no need to manually input subscription keys when you order, renew or resize subscriptions for new and existing customers. It's a true time-saver.
The Management Portal keeps you up to date regarding expiring subscriptions. Renewing is easy, as is changing the subscription size: you can initiate the renewal flow directly from the portal. Monthly subscriptions make this even easier, as renewals are not needed and the number of licenses can be changed according to monthly usage. The Management Portal also provides a report on license usage per product per month, enabling more accurate billing and sales management.
With a 3-tier management hierarchy, you can give user accounts varying amounts of visibility and control over security and subscription management—even read-only.
AV-Comparatives found our end-point installation "no more complicated than installing iTunes". We have made it even easier by enabling central deployment of all end-point security clients from one portal through an email flow. The subscription key is automatically included in the link or installer so that the end-user need only click the link for the installation process to start automatically.
For larger environments, you can create an MSI package that can be deployed either with your own remote installation tools or with ours.
Conflicting security solutions are automatically removed during the installation of Windows clients, ensuring a smoother and faster transition from one vendor to another.
You can create and customize individual security policies (profiles) and assign them either individually or in groups to computers, mobiles and servers, respectively.
Configuration options are comprehensive and easy to modify to suit your needs. For example, you can:
- Configure a firewall
- Adjust the settings of various components such as real-time scanning and heuristic analysis
- Manage and configure the automated scanning and installation of missing 3rd party software patches
You can set a large variety of Web-related controls and rules, for example:
- Define vital sites, like intranet, for added protection
- Filter certain categories such as pornography
- Block active Web content like java scripts from unknown sites
- Manage and enforce mobile anti-theft policies such passcodes requirements
All settings and policies can be enforced down to the individual level if needed so that end-users cannot alter or change them.
The management portal gives you a complete overview of your entire environment's security status. This includes potential software vulnerabilities, rooted devices, missing security updates, and the status of security features like real-time scanning and Firewall.
You can track for example the number of blocked infections and pay closer attention to devices that are attacked the most. You can set automatic email alerts so that specific infection parameters get your attention first. If you need more information on any particular infection, you can obtain it directly from our security database.
The management portal delivers a wide range of graphical reports in an intuitive format, making data easier and faster to digest and understand—and more appealing for stakeholders to read. Device security details can also be exported as CSV files if required.
The management portal gives you central control over your device fleet. You can use MDM to configure and enforce security policies, such as passcode use, and to centrally activate anti-theft functions in case of theft or loss, for example by wiping the device remotely.
Mobile Device Management enables you to control devices throughout their lifecycles, not just when they are lost or stolen. It also provides detailed information about the devices themselves above and beyond their security status.
This allows you to more efficiently monitor your fleet's security status and to identify issues for quick remediation. For example, you can identify:
- devices with OS versions that have vulnerabilities, like Android 4.1.1 with Heartbeat
- whether the device has been rooted
- when the device has repeatedly attempted to visit questionable websites, or how much traffic has been encrypted
Software Updater is a critical security component that's fully integrated into the management portal. There's no need to install separate agents, management servers or consoles. It's the first layer of protection when malicious content reaches end-points and can prevent up to 80% of attacks simply by keeping security software up to date.
Software Updater works by scanning for missing updates, creating a vulnerability report, and then downloading and deploying them automatically or manually. Security patches include Microsoft updates and over 2500 3rd party applications such as Flash, Java, OpenOffice and others that commonly serve as attack vectors.
The administrator can define exclusions to the automatic mode. You can set the dates and time for automatic installations to run, and include a grace period before forcing a reboot after installation. For applications that manifest no reboot needs, no reboot is performed. If multiple applications requiring reboot are updated at the same time, the reboot is required only once.
Hosted security services have distinct advantages. There is no server hardware or software to install or maintain—your browser is all that you need. Protection Service for Business automatically updates 3rd party software when security patches are missing, so there is no need for manual updating. Also, end-point security clients automatically receive client security database updates, saving even more time on security maintenance.
By utilizing real-time threat intelligence via F-Secure Security cloud, you are automatically protected against any new and emerging threats