Welcome!

News Feed Item

Cost of Cybercrime to Business Continues to Soar; High Detection Rates Save Money

A Detection Improvement of Even 1 Percent Can Potentially Save a Business Thousands in Malware Cleanup Costs; F-Secure Security Solutions* Detect New Malware at a Rate of 100 Percent

SAN JOSE, CA -- (Marketwire) -- 02/07/13 -- As the cost of cybercrime continues to soar, affecting businesses around the world, F-Secure is introducing the latest version of its corporate endpoint security product, F-Secure Client Security, with elevated threat detection technology that has been independently tested by AV-TEST with top-notch scores against new malware **, including support for Windows 8.

With businesses spending sizable sums of money to clean up damage from malware, high malware detection rates take on greater importance. Cyber attacks cost large enterprises millions of dollars per year, and some businesses can spend thousands per month. Small firms are also increasingly popular targets for attacks, as they are not as likely to be adequately protected.

"Not only are businesses spending for malware cleanup, they also have the costs of lost productivity, data loss, investigation and post-incident management," said Pekka Usva, Vice President of Corporate Security at F-Secure. "Add those together, and malware that has gone undetected can have serious ramifications to a business. Even a one percent higher detection rate can save thousands."

Attacks can include theft of an organization's intellectual property, confiscation of online bank accounts, distribution of viruses, posting of confidential business information on the Internet, and disruption of a company's network with a denial of service attack.

Detection for new and existing malware, centrally managed

Responsible for Client Security's high detection rate is DeepGuard 4, the latest incarnation of F-Secure's detection engine, which uses heuristical, behavioral and reputation-based technologies to provide proactive protection against both existing malware and brand-new, previously unknown threats. In independent tests for preventing new "zero-day" malware attacks, DeepGuard 4 performs at 98 to 100 percent, while the industry average hovers around 90 percent.**

F-Secure Client Security's enhanced protection for corporate desktops and laptops supports recent versions of Windows, including Windows 8, without compromising performance. Its improved browsing protection works with all major browsers.

Central management is taken care of by the latest version of F-Secure Policy Manager, the comprehensive and easy-to-use security management tool that allows IT administrators to manage and add new workstations, servers or remote offices using one central console. Among Policy Manager's new features are support for Client Security updates and Windows 8.

F-Secure Client Security and F-Secure Policy Manager are available through thousands of reseller partners globally.

* Based on AV-TEST's results for F-Secure Internet Security 2013 from July-December 2012. F-Secure Client Security 10 is based on the same technology as F-Secure Internet Security 2013.

**AV-TEST bimonthly test results: F-Secure Client Security 9, the previous version, was tested at 98 to 100% effectiveness against new malware in AV-TEST's report from July-December 2012. DeepGuard 4, part of F-Secure Client Security 10, received 100% detection results in AV-TEST's real-world testing scenarios from July-December 2012.

More information: http://www.f-secure.com/en/web/business_us/products-services

F-Secure - Protecting the irreplaceable

While you concentrate on what is important to you, we make sure you are protected and safe online whether you are using a computer or a smartphone. We also backup and enable you to share your important files. Our services are available through over 200 operators around the world and trusted in millions of homes and businesses. Founded in 1988, F-Secure is listed on NASDAQ OMX Helsinki Ltd.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Press contact:

Melanie Lombardi
LEWIS PR for F-Secure
+ 1 (415) 432-2400
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
You are moving to the Cloud. The question is not if, it’s when. Now that your competitors are in the cloud and lapping you, your “when” better hurry up and get here. But saying and doing are two different things. In his session at @DevOpsSummit at 18th Cloud Expo, Robert Reeves, CTO of Datical, explained how DevOps can be your onramp to the cloud. By adopting simple, platform independent DevOps strategies, you can accelerate your move to the cloud. Spoiler Alert: He also makes sure you don’t...
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, shared the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Amazon has gradually rolled out parts of its IoT offerings, but these are just the tip of the iceberg. In addition to optimizing their backend AWS offerings, Amazon is laying the ground work to be a major force in IoT - especially in the connected home and office. In his session at @ThingsExpo, Chris Kocher, founder and managing director of Grey Heron, explained how Amazon is extending its reach to become a major force in IoT by building on its dominant cloud IoT platform, its Dash Button strat...
"We are a custom software development, engineering firm. We specialize in cloud applications from helping customers that have on-premise applications migrating to the cloud, to helping customers design brand new apps in the cloud. And we specialize in mobile apps," explained Peter Di Stefano, Vice President of Marketing at Impiger Technologies, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
The idea of comparing data in motion (at the sensor level) to data at rest (in a Big Data server warehouse) with predictive analytics in the cloud is very appealing to the industrial IoT sector. The problem Big Data vendors have, however, is access to that data in motion at the sensor location. In his session at @ThingsExpo, Scott Allen, CMO of FreeWave, discussed how as IoT is increasingly adopted by industrial markets, there is going to be an increased demand for sensor data from the outermos...
"Qosmos has launched L7Viewer, a network traffic analysis tool, so it analyzes all the traffic between the virtual machine and the data center and the virtual machine and the external world," stated Sebastien Synold, Product Line Manager at Qosmos, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.