Preview

F-Secure Corporation Case Short Summary

Good Essays
Open Document
Open Document
688 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
F-Secure Corporation Case Short Summary
Case #2 Summary (F-Secure Corporation)
Overview of the Case
Case #2 describes the development of a business model based on "software as a service" (SaaS) for security solution distributed through Internet Service Providers (ISPs). F-Secure disruptively entered a mature business with dominant players by executing an innovative new service model. The case describes the challenges involved in developing and executing the new service model, and offers us the opportunities to discuss the evolving challenges the company faces looking forward.

Introduction
"F-Secure aspires to protect the irreplaceable content of its customers, and to be the most profitable value-added services partner for operators." said by Kimmo Alkio, President and CEO of F-Secure Corporation. F-Secure Corporation is the leading provider of centrally managed security solutions for the mobile enterprise. The company's award-winning products include antivirus, file encryption and network security solutions for major platforms from desktops to servers and from laptops to handhelds. To simply F-Secure’s mission was to protect consumer and businesses against computer viruses and other computer security threats.

History
Founded in 1988, the company was listed on the Helsinki Stock Exchange 1999 and was headquartered in the same city. In 2000, F-Secure had decided to establish an Internet Service Provider (ISP) channel for selling security solutions. This allowed the company to offer security solutions through ISPs, who bundled F-Secure solutions with Internet access or offered them as value-added services. By 2008, the company had established offices in Europe, North America, India, Japan, and the Asia-Pacific region. In 2011, with more than 200 operators around the world F-Secure is the global leader of operator provisioned software services.

Evolving Challenges
After F-Secure was listed on the Helsinki Stock Exchange in 1999, the analysis the company’s managers conducted of the security

You May Also Find These Documents Helpful

  • Good Essays

    Research shows that Mr. Jones is better off forming an S-corporation opposed to a partnership. 26 U.S. Code 1361 states that an S-corporation is a company that operates domestically within the United States as well as the state in which the Articles of Incorporation are filed. It is more beneficial to be a domestic corporation because home states offer opportunities to reinstate active status to corporations who lapse in registration and taxes. If Mr. Jones fails to pay his annual taxes on time, his S-corporation status can be reinstated after he squares away what he owes within a reasonable period of time. S-corporations are allowed to distribute one kind of stock, but they are limited to having 100 shareholders or less. Mr. Jones is eligible to start his used car dealership as an S-corporation because he is a resident…

    • 1139 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Cmgt410 Team Paper Riordan

    • 4511 Words
    • 19 Pages

    The purpose of this project will be to appropriate a new Human Resources Client-Server Database system. This new system’s capabilities of centralizing Riordan Manufacturing’s data will increase the overall security of the data within. This was expressed to the IT department because of the increasingly overwhelming amount of personal data currently transmitted across unsecure data-lines,…

    • 4511 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Although there is no real way to have complete security against all threats, Global Limited has provided their clients with a secure solution without being so intrusive that the end users cannot do their jobs.…

    • 515 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    their defensive controls at the perimeter in the belief that this makes it difficult for…

    • 5023 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    The following outline presents the fundamental solutions for the safety of data and information that belongs to Richman Investments. As part of the general security plan of the organization the IT department puts together a proposal to provide multi-layered security strategies that can be applied at every level of the IT structure. The plan will lay out the importance of improving and safeguarding the levels of each domain and the process of protecting the information of the organization.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Continuing of Richman Investments has expanded with more offices, locations and clients, which the needs of protection for assets are greater. I have decided to implement the following policy for removable media: Richman Investments staff may only use Richman Investments’ removable media in their work computers. Richman Investments removable media may not be connected to or used in computers that are not owned or leased by the Richman Investments without explicit permission of the Richman Investments IT manager. Sensitive information should be stored on removable media only when required in the performance of your assigned duties or when providing information required by other state or federal agencies. When sensitive information is stored on removable media, it must be encrypted in accordance with the Richman Investments’ Acceptable Encryption Policy. Security assurance and user-friendly sites are required if Richman Investments is to be successful at attracting customers to their Internet sites. It is therefore important to be able to understand the business requirements and be able to translate these into a public network presence with security in mind. The Digital revolution of the 21st Century has not been achieved without its consequences. Real time business requirements and economic drivers have forced rapid changes to the methods used to conduct business-to-business and business to client communication. The Internet has now become a convenient and economic deployment medium for global business. For Richman Investments Computer User’s Policy, although employees are given PCs so they can deliver the task that they are assigned, it must be understood that these PCs are property of Richman Investments and must not be abused for personal use. Computer resources are expensive and so offensive material must not be…

    • 1444 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    Due in Week One: Give an overview of the company and the security goals to be achieved.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Project Pt 1

    • 338 Words
    • 2 Pages

    Richman Investments has experienced an increase in security breaches that have resulted in the loss of company proprietary information and damage to systems due to many virus and Trojan Horse infections. The following outline contains some of the security mitigation proposals to be implemented shortly. This is just a basic plan for the moment and if security breaches continue, more stringent policies will be installed.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    However, there is growing interest in protocols and other mechanisms for use with novel telecommunications services. Next-generation value-added services are bound to introduce new vulnerabilities. The interaction between all these communications and security protocols, and the mechanisms used for distributed systems security, is fertile ground for both interesting research. Ways to enhance these protection tools to make sure our technology is safe from IT attacks are evolving all the time. The systems or measures used to protect a company system at present might not be of any use in the future as technology is always enhancing to higher levels. Telecommunication businesses tend to be comparatively adept at managing information security risks. And many are taking action to achieve an enhanced level of ongoing insight and intelligence into ecosystem vulnerabilities and dynamic threats. Companies like Celcom must be ready to invest in this expensive research so as to be able to aggressively compete in the intense telecommunication market and to be able to sustain itself in this industry. Today, information security is a discipline that demands advanced technologies and processes, a skill set based on counterintelligence techniques, and the unwavering support of top executives. As telecom operators become more similar to technology companies, they will face a raft of new challenges. Core practices like employee awareness and training, policies and tools to reduce insider risks, and protection of data, including intellectual property, will need to be updated. The confluence of mobility, cloud, and social networking have multiplied risks, yet few operators have addressed these threats or deployed technologies that monitor user and network activity to provide insight into ecosystem vulnerabilities and threats. These…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Project Part 1

    • 430 Words
    • 2 Pages

    As we enter a new age of computers and the use of the internet to conduct our business we open ourselves up to a new type of threat. Data and identity theft have become a real problem for many financial and government institutions. To combat this threat Richman Investments has implemented security measures at all seven domains in our IT structure. The seven domains include the User, Workstation, LAN, LAN to WAN, WAN, Remote Access, and System/Application layers.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Good Essays

    As we already know Fullsoft Inc, has recently experienced a malware attack that has resulted in proprietary information being leaked. Even though the company is now in the process of this breach being recovered, we will need to come up with a plan so we can prevent such incident of happening again.…

    • 1033 Words
    • 3 Pages
    Good Essays
  • Good Essays

    - Endpoint security market in constant growth : lots of customers agree to pay an expensive software if it’s very efficient, because the number of malicious programs is increasing and they want to have a total protection…

    • 872 Words
    • 3 Pages
    Good Essays