CISO MAG - Free Issues Endpoint Security Powerlist | Page 58

UNDER THE SPOTLIGHT 58 Vo l u m e 3 Issue 10 Vo l u m e 3 Issue 10 UNDER THE SPOTLIGHT endpoints are in their hands. So, endpoints are the easiest and the most obvious entry point for cyber attackers to any company. So, I think neglecting endpoints is something that any CISO wouldn’t do. I would say you have it all at the endpoints. I’ll give you an example. Let’s assume that you are a company X and you are a main admin of that company or CEO or somebody of a high rank. It might mean that, because of your role, you have a lot of privileges in the company and its IT environment. So, if you hack into that individual endpoint that’s where you have all the keys. So, if somebody hacks me at F-Secure, using my credentials, they have a lot of access in F-Secure and they only have to hack into one endpoint because that’s where they have the keys that the CEO is using, and then if they get those keys they get to access the IT environment in the company as the CEO. telecom operators. We have about 200 telecom operators in the world which are exclusively providing F-Secure endpoint security tools for their customers, so that is in the background. We have very strong unique relationships with telecom operators. Nobody else has that. Most of the biggest operators in the world are our customers and they are using F-Secure products to protect their customers. And for many of those customers, they don’t even know that they are using our products, because we are letting operators to program the products—so you would be seeing Vodafone security, Deutsche Telekom security, Telephone security, etc. powered by F-Secure. Like it would just be a sticker like “Intel Inside” on your PC. And now, furthermore with this new initiative, we want to protect not only devices and endpoints but all connected devices in a home. 3. Tell us a bit about your new partnership with ETIS to provide security to telecom providers across Europe. 4. We see more homes becoming “smart homes” with the increased use of devices that are connected to the internet. Aren’t these devices also vulnerable endpoints? How do you secure those home devices? I think this is one of our key initiatives across cross F-Secure. Consumer security represents more than 40 percent of our business and we’ve built a very unique ecosystem in the world. We sell our consumer security products by partnering with CISO MAG | November 2019 People have gaming consoles, smart TV, Wi-Fi connected lamps, coffee makers, etc. We have IoT at home and all of these devices that are connected to the internet are CISO MAG | November 2019 59