Skip to main content
  •  Office: +371 66 100 800
  • Technical support: +371 66 100 802
  •  info@ossnet.lv
  •  Pr - Pk: 08:30 - 18:30

F-secure atlaide

Protect your company information!

The pandemic is the right time to protect your servers and computers, reducing cyber security risks. As working from home has become a common practice, it is important to establish the necessary infrastructure and security guidelines to reduce the company's exposure to risks related to distributed infrastructure. F-secure, which is the highest rated antivirus in the independent AV TEST rating, in cooperation with OSS Networks offers a unique opportunity to receive a discount code for future antivirus software purchases.


Request the code now and apply it until 01.09.2021

Discount price:

  • up to 24 seats - 15.50 EUR (per seat per year)
  • from 25 to 99 seats- 11.50 EUR (per seat per year)
  • over 100 seats - 9.00 EUR (per seat per year)

Apply

 

logo

Forecasting, preventing, detecting and responding to vulnerabilities requires a combination of state-of-the-art knowledge and constantly evolving technology.

Nobody knows cyber security like FSecure. For three decades, FSecure has driven innovations in cyber security, defending tens of thousands of companies and millions of people.

With unsurpassed experience in endpoint protection as well as detection and response, FSecure shields enterprises and consumers against everything from advanced cyber attacks and data breaches to widespread ransomware infections

 

Approach

F-Secure non-prescriptive approach and client-valued team are the result of:

  • A hiring policy that gets top talent whilst celebrating diversity of background and skill-set
  • F-Secure Akademy: in-house learning system, helping consultants develop a broad and modern set of capabilities
  • Partnering with clients to solve new and complex security challenges
  • Consultants dedicating time to research, driving service innovation that’s visible in the work we do
  • Providing evidence-based recommendations based on this technical investigation

Service

F-Secure service approach challenges traditional industry methods and don’t come with a prescribed way of working. Service excellence is about working your way: as an extension of your team or a separate division, on-site or remotely, for extended periods or sprints. It’s the dedicated job of Delivery team to curate ways of working that fit your organization, and ensure you get the right level of access to F-Secure consultants.

We strive to be the easiest cyber security company to work with, delivering exceptional results without disruption. We help keep our clients’ businesses and customers safe day to day, and work with them to mitigate damage should the worst happen.

Experience

Consulting expertise across hardware and firmware, as well as software, is hard to find. And it's one of the things that makes us so special. It means F-Secure can analyze client entire ecosystems, uncovering pathways and revealing the consequences of an attack – from financial depletion to loss of life.

F-Secure serve enterprise clients in the UK, Nordics, US, Singapore, Japan, and South Africa, across countless verticals, including: aviation, maritime, and automotive transport, critical infrastructure, financial services, manufacturing, and telecoms.

F- Secure Endpoint Protection

F-Secure Business Suite

On-site deployed protection with full configurability, from servers to endpoints.

F-Secure for business

F-Secure Business Suite is an on-site business security solution that offers the best continuous protection for your organization by combining the best of accumulated expertise, advanced technologies, and modern, cutting-edge features with full on-site control. It is a full protection bundle designed to cover the demanding business security needs from gateway to endpoint.

  • Layered protection to protect your assets from gateway to endpoint
  • Best protection levels covering both known vulnerabilities and new, emerging threats
  • Advanced management features to allow you full control of your organization's IT security
  • Less work through automation of daily tasks
  • Less hassle with a scalable all-in-one package with flexible and transparent licensing for organizations of all sizes
For Business

F-Secure Business Suite

Download Product Brochure

Download Product Flyer

Download Solution Overview

F-Secure Protection Service for Business

Cloud-hosted, comprehensive but flexible endpoint security for all devices with a cloud-based management portal and endpoint protection clients for computers, mobiles, servers, and passwords.

 

Management portal:

  • One portal for deployment, management and monitoring
  • Automatic patch management
  • No server hardware required
  • Full integration readiness for third-party management tools

Parvaldiba

Computer Protection:

  • Award-winning security for Mac & Windows
  • AV-TEST Best Protection, 2011-2014, 2016 and 2018
  • Integrated patch management for Windows computers
  • Advanced Behavior & Heuristic Analysis
  • Artificial intelligence and machine learning in DeepGuard 6

Aizsardziba

Mobile Protection

  • Next generation mobile security for iOS and Android devices
  • WiFi security (VPN)
  • Proactive App and web protection
  • Third-party MDM support available

MOB

Server Protection

  • Multi-platform server security
  • Advanced Behavior & Heuristic Analysis
  • Fully integrated Patch Management
  • Additional SharePoint & Exchange components
Serv


 

F-Secure Advanced Threat Protection

F-Secure Rapid Detection & Response

Monitor your IT environment status and security, detect targeted attacks swiftly, and respond with contextual visibility and automation.

rapid

How does it work?

  • Lightweight sensors monitor your endpoint users' behavior and stream the events to F-Secure cloud in real-time.
  • F-Secure's real-time behavioral analytics and Broad Context Detection™ distinguish malicious behavior patterns and identify real attacks.
  • Visualized broad context and descriptive attack information make confirming a detection easy. F-Secure Partner or your own IT team manages the alerts, and there's an option to elevate tough investigations to F-Secure.
  • Following a confirmed detection, F-Secure solution provides advice and recommendations to guide you through the necessary steps to contain and remediate the threat.


F-Secure Rapid Detection & Response

DownloadSolution Overview

DownloadBroad Context Detection

Video Watch the video

F-Secure Rapid Detection & Response Service

Managed service that monitors your security status 24/7, alerting you of detected attacks within minutes with clear guidance on how to respond.

  • How does a targeted cyber attack usually happen?

Attackers will first gain access to your IT infrastructure. This typically happens either by exploiting a known vulnerability in one of your servers, or by using a combination of spear-phishing emails and web exploits targeting one of your customer-facing teams.

After gaining an initial foothold in your IT infrastructure, the attackers will try to access or seize control of the data they're after.

Typically, they accomplish this by using existing IT administrator tools included in Windows, Mac and Linux operating systems, such as PowerShell, Windows Remote Management and Service Commands.

  • How does F-Secure detect attacks?

 

The F-Secure Rapid Detection & Response Service includes lightweight intrusion detection sensors for endpoints, networks and decoy servers that are deployed across your IT infrastructure. The sensors monitor activities initiated by the attackers, and stream all information to F-Secure cloud in real-time.

F-secure cloud-based service hunts for anomalies in the data by using a combination of advanced technologies, such as real-time behavioral analytics, big data analytics and reputational analytics. Anomalies are hunted from two perspectives: known and unknown malicious behavior.

The use of different types of analytics ensures that attackers are not able to remain undetected, even when using evasion tactics designed to fool specific detection methods.

  • How does F-Secure respond?

Anomalies are flagged to F-Secure threat hunters in the F-Secure Rapid Detection & Response Center, who work 24x7x365 to verify them and filter out false positives.

shema

Once F-Secure threat hunters have confirmed that an anomaly is an actual threat, they will alert you in less than 30 minutes. F-Secure threat hunters will guide you through the necessary steps to contain and remediate the threat. F-Secure also provide detailed information about the attack, which can be used as evidence in criminal cases.

F-Secure on-site incident response service is also available to assist you in difficult cases, or in cases where your own experts are unavailable.

 

F-Secure Rapid Detection & Response Service

Video Watch the video

Vulnerability Management

F-Secure Countercept

Advanced managed threat hunting service to detect and respond 24/7 to skilled human adversaries conducting live, hands-on keyboard attacks.

At the core of the Continuous Response methodology are the three Cs – Collaboration, Context, and Control.

  • Collaboration

The minute an attack is detected, multiple teams mobilise in both your organization and F-Secure’s.

Collaboration supports seamless teamwork, communication and processes to enable fast decision making, communication and co-operation between experts and decisions-makers, both internal and external.

  • Context

When an attack hits you need access to the most pertinent data and telemetry from across your estate.

People with The Threat Hunting skillset – supported by F-Secure proprietary technology stack – is paramount, as it fuels F-Secure ability to rapidly collect as much critical information about the incident as possible.

  • Control

Investigation, containment and remediation actions are guided by Control

Control leverages the data assembled during the Context phase while harnessing the tools of F-Secure platform to capture forensic data, actively sweep multiple endpoints for the existence of particular indicators of compromise, and find key artifacts in the compromised machine’s file system, to ultimately contain the incident.

counter c

 

F-Secure Countercept

F-Secure Radar

Turnkey vulnerability scanning and management platform. It allows you to identify and manage both internal and external threats, report risks, and be compliant with current and future regulations (such as PCI and GDPR compliance). It gives you visibility into shadow IT - to map your full attack surface and respond to critical vulnerabilities associated with cyber threats.

  • COMPREHENSIVE VISIBILITY

Effective security mapping through precise discovery and mapping of all assets, systems, and applications on the network and beyond.

  • STREAMLINED PRODUCTIVITY AND SECURITY MANAGEMENT

No more inefficiency and missed security risks. Quickly address problems across multiple domains with an efficient service workflow, including vulnerability monitoring, automated scheduled scans, and ticketing for prioritized remediation and verification.

  • REPORTING ON RISK

Produce reports with credible information about your organization's security posture over time. Show and justify how IT security enables business continuity.

  • REDUCED COSTS

Vulnerability management is an opportunity to significantly lower the cost of security. It's less costly to deal with security before serious problems arise than it is to deal with it during a crisis or incident recovery. Additionally, leveraging Radar's cloud resources allows organizations to lower their expenses.

radar

Vulnerability management is a critical component of IT risk assessment. F-Secure vulnerability scanning and management solutions help companies to have visibility into their IT assets and security posture, and be compliant with regulations (such as PCI and GDPR).

FROM THE CLOUD

Run vulnerability scans as a true SaaS while still being able to scan your internal systems, by using the scan nodes within the F-Secure Radar solution

ONSITE

Run vulnerability scans as an on-site solution behind your corporate firewall to ensure data is stored according to your security policies

F-Secure Radar

Download Service brochure

Download Product brochure

Download Product datasheet

link Support

link User guide

link Downloads and hotfixes

 

end
ACCREDITATIONS & CERTIFICATES

 

sertifik


F-Secure Consulting (F-Secure Cyber Security (Pty) Ltd) is a level 4 contributor to B-BBEE with a procurement recognition level of 100%. Learn more and download our B-BBEE certificate. Click here to read the press release.ACCREDITATIONS & CERTIFICATES

Free Trial

Apply for a FREE trial!

Apply

Costs

We make individual quotes for each company, taking into account the needs of the company, the complexity of the project.

Contact us and get a price!

 

Sazinies ar mums!

8 + 0 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.
Slide
edzl_logo.png
finieris.png
greenmotors.png
hj.jpg
karcher.png
kronus.png
myfitness.png
mogo.png
sanitex.png
rere.png
tt.jpg
skrivanek.png
vc.jpg
vaivari.png
venden.png
1a.png
2.jpg
az.jpg
balta.png
cleanr.png
dpd.png
edzl_logo.png
finieris
greenmotors
hj
karcher
kronus
myfitness
mogo
sanitex
rere
compensa
skrivanek
estravel
vaivari
venden
1a
2
az
balta
cleanr
dpd