Wed, Sep 20 2017, 1:01 pm

F-Secure India vows to protect entities post demonetization

By Digital Edge Bureau, 20.01.2017, 11:59

Samu Konttinen, President & CEO, F-Secure Corporation: Focus India

F-Secure, the Finnish software security company, which has got rapid movement and high visibility in the Indian market in recent times—ever since Amit Nath, the former Head of Trend Micro India, took over the helm of it in this part of the world—comes forward and vows to protect both consumers as well as firms and organizations against volleys of cyber attacks getting accentuated after the introduction of the demonetization drives the Modi government came out with on November 8th 2016. This resolve has hugely been reflected by none other than Samu Konttinen, President & CEO, F-Secure Corporation, who has currently been on a tour of India. The extreme focus put on cashless banking transactions, and the growing practice for making use of e-wallets, has invoked the attention of hackers and organized cyber crime syndicates looking for monetary, and even strategic gains. In fact, F-Secure has come out with a report which says that post demonetization, India is expected to be a key target in point-of-sales (POS) and banking malware, especially mobile wallets in 2017. The latest report titled—Threat Landscape India 2016 & Beyond—has amply highlighted that Android-based smartphones are facing the maximum number of cyber-attacks, post the demonetization drive.
Post demonetization, people have increased the use of mobile wallets including Telco backed e-wallets, independent e-wallets, and bank backed e-wallets. People are even keeping multiple wallet apps on their phones as different wallets are accepted by various sellers and stores. Such growing use of mobile web and mobile wallet based transactions has contributed to increasing incidences of new types of threats. The major threats that are facing Indian smartphone users are Airpush, Dowgin, FakeApp, SMSpay and SMSreg.
Moreover, F-Secure has broadened its overall security offerings—comprising of products, best practices and guided security services—for thwarting nefarious designs of hackers and cyber criminals who have been after consumers, and firms and organizations for stealing their identity credentials, and other vital information which lead to direct monetary loss, and erosion of reputation. “The constant rise in the number of cyber-attackers targeting Android users has not been a hidden fact. The situation is worrisome in India when we take into account the volume of increase in online transactions. With more than one billion mobile users and no major restriction on the Internet or the use of VPN, there is a significant need for adopting the best of the security products & solutions in India.”
For protecting consumers, the company has put forward a slew of products which include F-Secure SAFE, and F-Secure Freedom VPN software. While, F-Secure SAFE is essentially an internet security software suite having latest feature enhancements, the F-Secure Freedom VPN is a mobile VPN (virtual private network) software which keeps the identities of users and locations anonymous, and data well encrypted. In recent times, the field of mobile VPN has got maturity where mobile devices continue to have credible and constant VPN availability even when the connectivity swings from Wi-Fi to GSM and vice-a-versa. So for all practical purposes, mobile VPN is immune to any ‘VPN tunnel breaks’, ‘application sessions disconnect’ or ‘time out’.
On the enterprise security front, the company has expanded its repertoire of products and services. In an interesting development, the company has come out with threat detection and vulnerability management software called F-Secure RADAR. This software has added vigour to its ‘Rapid Detection’ service offerings meant for enterprises. Moreover, with F-Secure RADAR, the great Finnish software security firm would be competing against other companies including Rapid7, Tripwire, Core Security, Beyond Security, Qualys, and Critical Watch, which are active in the space of security intelligence and vulnerability management.


Add your comment


6 − = one

Other articlesgo to homepage

Brand McAfee makes come-back, brings threats report

Brand McAfee makes come-back, brings threats report(0)

Intel Security, which disowned the brand McAfee sometimes ago, has shown amazing altruism towards it. In a latest development, Intel Security has resurrected the brand McAfee. Now, Intel Security is known as McAfee. This rechristening of the brand is marked by a ‘near simultaneous’ release of the ‘McAfee Labs Threats Report’ for the Q4 2016.

F-Secure comes out with 5 tips to beat Ransomware attacks

F-Secure comes out with 5 tips to beat Ransomware attacks(0)

Imagine losing all the photos, videos, messages, and documents you’ve stored on your computer. How much money would you be willing to pay to get it all back? Ransomware is malware that infects your computer, locks it, and demands payment for unlocking it. And the number of new ransomware has been at least doubling each

74% CISOs in US don’t know how their firms got hacked

74% CISOs in US don’t know how their firms got hacked(0)

BD Software Distribution (BD Software), the Country Partner for Bitdefender in India, has announced intriguing results of Bitdefender Survey of 250 IT decision makers in the United States. The study on large US companies with more than 1,000 workstations reaffirms the rising pressure of rising cyber breaches on CIOs. The survey reveals that some 34

Ebullient Skybox vows to help firms meet NCIIPC guidelines

Ebullient Skybox vows to help firms meet NCIIPC guidelines(0)

In the field of security vulnerability and threat management, US-based Skybox has seen a meteoric rise in the Indian market which gets manifested in a whopping 154 percent revenue growth the company has accrued in this digitally transforming country. The company also comes forward to help firms and organizations in meeting the security guidelines put

Kaspersky’s solutions secure SCADA and PLC systems

Kaspersky’s solutions secure SCADA and PLC systems(0)

They say, anything which is programmable, is hackable. And this is not only true for the world of information technology (IT), even operational technology (OT), which runs, controls and supervises new-age industrial processes, faces  cyber-attacks with potential for disrupting normal functioning of plants and manufacturing units. In some cases cyber-attacks can physically sabotage the targeted

read more

Contacts and information

New Delhi (India)

Social networks

Most popular categories