UNDER THE
SPOTLIGHT
58
Vo l u m e 3
Issue 10
Vo l u m e 3
Issue 10
UNDER THE
SPOTLIGHT
endpoints are in their hands. So,
endpoints are the easiest and the
most obvious entry point for cyber
attackers to any company. So, I think
neglecting endpoints is something
that any CISO wouldn’t do.
I would say you have it all at the
endpoints. I’ll give you an example.
Let’s assume that you are a company
X and you are a main admin of that
company or CEO or somebody
of a high rank. It might mean that,
because of your role, you have a lot
of privileges in the company and
its IT environment. So, if you hack
into that individual endpoint that’s
where you have all the keys. So, if
somebody hacks me at F-Secure,
using my credentials, they have a
lot of access in F-Secure and they
only have to hack into one endpoint
because that’s where they have the
keys that the CEO is using, and then
if they get those keys they get to
access the IT environment in the
company as the CEO. telecom operators. We have about
200 telecom operators in the world
which are exclusively providing
F-Secure endpoint security tools
for their customers, so that is in the
background. We have very strong
unique relationships with telecom
operators. Nobody else has that.
Most of the biggest operators in
the world are our customers and
they are using F-Secure products
to protect their customers. And
for many of those customers, they
don’t even know that they are
using our products, because we
are letting operators to program
the products—so you would be
seeing Vodafone security, Deutsche
Telekom
security,
Telephone
security, etc. powered by F-Secure.
Like it would just be a sticker like
“Intel Inside” on your PC.
And now, furthermore with this new
initiative, we want to protect not
only devices and endpoints but all
connected devices in a home.
3. Tell us a bit about your
new partnership with
ETIS to provide security to
telecom providers across
Europe. 4. We see more homes
becoming “smart homes”
with the increased use of
devices that are connected
to the internet. Aren’t these
devices also vulnerable
endpoints? How do you
secure those home devices?
I think this is one of our key
initiatives across cross F-Secure.
Consumer security represents
more than 40 percent of our
business and we’ve built a very
unique ecosystem in the world.
We sell our consumer security
products by partnering with
CISO MAG | November 2019
People have gaming consoles,
smart TV, Wi-Fi connected lamps,
coffee makers, etc. We have IoT at
home and all of these devices that
are connected to the internet are
CISO MAG | November 2019
59