F-Secure Corporation Case Short Summary

Only available on StudyMode
  • Download(s) : 346
  • Published : October 4, 2011
Open Document
Text Preview
Case #2 Summary (F-Secure Corporation)
Overview of the Case
Case #2 describes the development of a business model based on "software as a service" (SaaS) for security solution distributed through Internet Service Providers (ISPs). F-Secure disruptively entered a mature business with dominant players by executing an innovative new service model. The case describes the challenges involved in developing and executing the new service model, and offers us the opportunities to discuss the evolving challenges the company faces looking forward.

"F-Secure aspires to protect the irreplaceable content of its customers, and to be the most profitable value-added services partner for operators." said by Kimmo Alkio, President and CEO of F-Secure Corporation. F-Secure Corporation is the leading provider of centrally managed security solutions for the mobile enterprise. The company's award-winning products include antivirus, file encryption and network security solutions for major platforms from desktops to servers and from laptops to handhelds. To simply F-Secure’s mission was to protect consumer and businesses against computer viruses and other computer security threats.

Founded in 1988, the company was listed on the Helsinki Stock Exchange 1999 and was headquartered in the same city. In 2000, F-Secure had decided to establish an Internet Service Provider (ISP) channel for selling security solutions. This allowed the company to offer security solutions through ISPs, who bundled F-Secure solutions with Internet access or offered them as value-added services. By 2008, the company had established offices in Europe, North America, India, Japan, and the Asia-Pacific region. In 2011, with more than 200 operators around the world F-Secure is the global leader of operator provisioned software services.

Evolving Challenges
After F-Secure was listed on the Helsinki Stock Exchange in 1999, the analysis the company’s managers conducted of the security...
tracking img