SlideShare a Scribd company logo
FRONTLINE DEFENSE
FOR YOUR BUSINESS
Stop malware at the gateway
F-Secure Internet Gatekeeper
© F-Secure Confidential2
Malwarecanenteranorganization’snetworkinmany
differentways.
Theeasiestandmosteffectivewaytostopharmful
contentspreadingviatheInternetistostopitalready
atthegatewaylevelofthenetwork.
BLOCK ALL DATA
INTRUDERS
BEFORE THEY ENTER
YOUR NETWORK
© F-Secure Confidential3
F-SecureInternetGatekeeper
scansallincominge-mail,web,andfiletransfertraffic.
Italsogivescontroloverwhatcontentisallowedin
thecorporatenetwork.
© F-Secure Confidential4
HIGHLIGHTS
© F-Secure Confidential5
Ensures that malware cannot enter or leave the corporate network.RIGOROUS
EFFECTIVE
BUILT FOR USE
SAVES COSTS
Blocks malware that risks data, wastes network bandwidth and
increases legal liability concerns.
Flexible and easy to deploy.
Small and easy to use, but has all the essential features to keep your
business safe and increase productivity.
INTERNET GATEKEEPER
IN SHORT
© F-Secure Confidential6
The easiest and most effective way to stop harmful content from
spreading via Internet.
Provides the best Real-time protection service in a gateway product.
Can detect malware and other threats, even new ones, without them
reaching your endpoint devices.
Provides access control for web content
Easy administration with easy to use Web user interface.
INTERNET
GATEKEEPER
FEATURES
© F-Secure Confidential7
F-Secure Internet Gatekeeper provides high-
performance protection at the gateway level by
scanning incoming and outgoing SMTP and POP3,
HTTP and FTP traffic for all types of malware. It
provides reliable protection with automatic updates.
360 PROTECTION FOR
EMAILANDWEB TRAFFIC
© F-Secure Confidential9
Protection by
F-Secure Security Cloud
Designed for
Simplicity & Robustness
Added security with
Web Content Control
Email Traffic
Scanning
Web Traffic
Scanning
Web Content
Control
File Transfer
Scanning
Spam
Filtering
Gives IT admin possibility to restrict
access to web content based on
pre-defined categories
28 different categories available
An extra layer of protection against
malware, phishing and other online
scam sites
WEB CONTENT
CONTROL
Reduce productivity losses, bandwidth
consumption, and legal risks caused by
unauthorized employee access to
inappropriate or distracting web
content.
Protects against virus and other
malicious code hidden in email, web,
and file transfer traffic
Real-time protection against latest
malicious contents
EMAIL AND
WEB VIRUS
SCANNING
Avoid unwanted spam and phishing
messages and filter them on the
gateway level.
High accuracy spam detection
EMAIL SPAM
SCANNING
Provides security to the customer’s
network in real-time.
Protection against both new and
upcoming malware.
SECURITY
CLOUD
WHAT’S NEW IN
INTERNET
GATEKEEPER 5.30?
© F-Secure Confidential14
WebContentControl
SecurityCloudsupport
© F-Secure Confidential15
WEBCONTENT
CONTROL
© F-Secure Confidential16
Prevent malicious content from entering your network
 Reduce productivity losses, bandwidth consumption, and
legal risks caused by unauthorized employee access to
inappropriate or distracting web content
 Improve security by providing an extra layer of protection
IMPROVED
PRODUCTIVITY THROUGH
CONTROLLED ACCESS
© F-Secure Confidential17 Source: http://www.salary.com/2014-wasting-time-at-work/
2013 of all respondents said they waste at
least some time at work on a daily basis.
69%
The number of people in this year’s
survey who reported wasting time at
work every day is up to a whopping 89%
89%
OF PEOPLE SURVEYED WASTE AT LEAST
HALF THE AVERAGE WORDDAY ON
NON WORK-RELATED TASKS.
4%
A 20% INCREASE
COMPARED TO
LAST YEAR
WHERE’S THEWASTE?
© F-Secure Confidential18 Source: http://www.salary.com/2014-wasting-time-at-work/
GOOGLE FACEBOOK LINKEDIN24% 15% 14%
31% waste roughly 30 minutes daily
31% waste roughly 1 hour daily
16% waste roughly 2 hours daily
6% waste roughly 3 hours daily
2% waste roughly 4 hours daily
2% waste 5 or more hours
89%
IMPROVESECURITY
© F-Secure Confidential19
 Guarantee better security as employees cannot access
the harmful sites in the first place
 90% of normal attacks come through the web
 You can block harmful sites.
SECURITY CLOUD SUPPORT
© F-Secure Confidential20
Improved detection capability against emerging threats
 Provides faster and superior detection capability
 Enhances traditional malware scanning.
EASY
SECURITY
© F-Secure Confidential21
EASYMANAGEMENT
© F-Secure Confidential22
Deploy Configure Manage
EASYDEPLOYMENT
23
Internet
HTTP
SMTP
FTP
Internet Gatekeeper
Situated between the corporate network and
the Internet, Internet Gatekeeper ensures that
malware is not able to enter or leave the
corporate network.
Deployment options
• Installer or VA
All-inclusive compatibility
Provides interoperability with firewall and e-mail
systems.
E-mail Server
Workstation
MANAGEMENT
Easy configuration using simple web user
interface.
Robustness & simplicity ensures minimal
maintenance.
Intuitively designed easy-to-use
configuration options ensure minimal use of
administrative resources.
Designed for easy integration, ensuring
compatibility to complex environments.
HIGHPERFORMANCE AND
RELIABILITY
© F-Secure Confidential25
 A suitable solution for both small and large organizations.
 Intuitively designed easy-to-use configuration options, together
with powerful automation, ensures minimal use of administrative
resources.
ADDEDVALUE WITH
INTERNET GATEKEEPER
26
 Internet Gatekeeper is a gateway solution and does not require any
client installations.
 It protects all devices in the network regardless of operating system.
 It works independently from the various end-points it protects, reducing
deployment & administration costs.
 It adds additional layer of protection to the corporate network at the
gateway level.
© F-Secure Confidential27
EASY AND EFFICIENT
GATEWAY SECURITY
Test it for free!

More Related Content

PDF
Powerful email protection
PDF
Protection Service for Business
PDF
Client Security - Best security for business workstations
PDF
F-Secure E-mail and Server Security
PDF
Psb mobile security
PDF
F-Secure Policy Manager - onsite security management with superior control
PDF
Virtual Security
PDF
Business Suite - Gain control of your IT security
Powerful email protection
Protection Service for Business
Client Security - Best security for business workstations
F-Secure E-mail and Server Security
Psb mobile security
F-Secure Policy Manager - onsite security management with superior control
Virtual Security
Business Suite - Gain control of your IT security

What's hot (20)

PDF
Best corporate end-point protection 2013
PDF
Presentatie F-Secure 26062015
PPTX
F secure Radar vulnerability scanning and management
PDF
Best business protection for windows
PDF
The State of the Net in India
PDF
Cyber security webinar 6 - How to build systems that resist attacks?
PPTX
FireEye Engineering
PDF
CyberArk Cleveland Defend End Point Infection and Lateral Movement
PPTX
Consider Sophos - Security Made Simple
PDF
Fortinet security ecosystem
PPTX
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
PPTX
Securing with Sophos - Sophos Day Belux 2014
PDF
Defending Servers - Cyber security webinar part 3
PPTX
Sophos utm-roadshow-south africa-2012
PPTX
A Closer Look at Isolation: Hype or Next Gen Security?
PDF
Cyber security webinar part 1 - Threat Landscape
PDF
Defending Workstations - Cyber security webinar part 2
PDF
Cyber-Leave-Behind-Brochure-Done (1)
PDF
Protect Your Enterprise - Check Point SandBlast Mobile
Best corporate end-point protection 2013
Presentatie F-Secure 26062015
F secure Radar vulnerability scanning and management
Best business protection for windows
The State of the Net in India
Cyber security webinar 6 - How to build systems that resist attacks?
FireEye Engineering
CyberArk Cleveland Defend End Point Infection and Lateral Movement
Consider Sophos - Security Made Simple
Fortinet security ecosystem
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
Securing with Sophos - Sophos Day Belux 2014
Defending Servers - Cyber security webinar part 3
Sophos utm-roadshow-south africa-2012
A Closer Look at Isolation: Hype or Next Gen Security?
Cyber security webinar part 1 - Threat Landscape
Defending Workstations - Cyber security webinar part 2
Cyber-Leave-Behind-Brochure-Done (1)
Protect Your Enterprise - Check Point SandBlast Mobile
Ad

Viewers also liked (20)

PPTX
We are F-Secure
PPTX
Credit card payment process powerpoint presentation templates
PPTX
Secure Network Design with High-Availability & VoIP
PPT
Lecture 8 mail security
PPTX
Why is email security important?
PPTX
Email security - Netwroking
PPT
Email security
PPTX
7.credit card and debit card working and management
PPT
Pgp smime
PDF
How Credit Card Processing Works
PPTX
Email Security Presentation
PPTX
Windows Server 2012 Active Directory Backup Restore
PDF
Email Security Overview
PPTX
S/MIME & E-mail Security (Network Security)
PPTX
Debit And Credit Cards
PPTX
Debit and credit card
PPTX
debit cards
PPT
E-mail Security in Network Security NS5
PDF
A University Network Design Exercise
PPT
Profit and loss
We are F-Secure
Credit card payment process powerpoint presentation templates
Secure Network Design with High-Availability & VoIP
Lecture 8 mail security
Why is email security important?
Email security - Netwroking
Email security
7.credit card and debit card working and management
Pgp smime
How Credit Card Processing Works
Email Security Presentation
Windows Server 2012 Active Directory Backup Restore
Email Security Overview
S/MIME & E-mail Security (Network Security)
Debit And Credit Cards
Debit and credit card
debit cards
E-mail Security in Network Security NS5
A University Network Design Exercise
Profit and loss
Ad

Similar to Internet gatekeeper (20)

PPTX
Cyber Security School Workshop
PDF
Consultcorp - Antivirus Corporativo para empresas
PDF
CIO Digest_July 2013 Issue
PPTX
Network Security ppt
PPTX
PA SB DC Cyber Brief
PDF
Presentation cisco iron port email & web security
PPT
Understanding SaaS Concepts
PPTX
CyberKnight capabilties
PPTX
Securing your digital world cybersecurity for sb es
PPTX
Securing your digital world - Cybersecurity for SBEs
PPTX
Internet safety and you
PDF
Blueprint for Security Architecture & Strategy.pdf
PPT
Computer Network Security
PDF
The 10 Fastest Growing Cyber Security Companies of 2017
PPTX
Security in the enterprise - Why You Need It
PPTX
Standardizing and Strengthening Security to Lower Costs
PPTX
Email: still the favourite route of attack
PDF
Cyber Security in a Fully Mobile World
PDF
Ten Security Essentials for CIOs
PPTX
Wireless Networking
Cyber Security School Workshop
Consultcorp - Antivirus Corporativo para empresas
CIO Digest_July 2013 Issue
Network Security ppt
PA SB DC Cyber Brief
Presentation cisco iron port email & web security
Understanding SaaS Concepts
CyberKnight capabilties
Securing your digital world cybersecurity for sb es
Securing your digital world - Cybersecurity for SBEs
Internet safety and you
Blueprint for Security Architecture & Strategy.pdf
Computer Network Security
The 10 Fastest Growing Cyber Security Companies of 2017
Security in the enterprise - Why You Need It
Standardizing and Strengthening Security to Lower Costs
Email: still the favourite route of attack
Cyber Security in a Fully Mobile World
Ten Security Essentials for CIOs
Wireless Networking

More from F-Secure Corporation (15)

PDF
Post-mortem of a data breach
PDF
How do you predict the threat landscape?
PDF
Got hacked? It’s too late to run now!
PDF
The Real Costs of SIEM vs. Managed Security Service
PDF
Security A to Z: Glossary of the most important terms
PDF
Les attaques menées depuis la France dans le cyber espace
PDF
Les attaques menées depuis la France dans le cyber espace
PDF
Six things to take into account when choosing cloud solutions
PDF
Small and midsize business security is big business
PDF
大きなビジネスを生み出す中小中堅企業
PDF
Why should you care about government surveillance?
PDF
Arbeta var du vill- eBook om modern mobilitet
PDF
Surfing Safe on the Road
PDF
F-Secure's Annual Report 2012
PDF
F-Secure Labs Mobile Threat Report Q4 2012
Post-mortem of a data breach
How do you predict the threat landscape?
Got hacked? It’s too late to run now!
The Real Costs of SIEM vs. Managed Security Service
Security A to Z: Glossary of the most important terms
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
Six things to take into account when choosing cloud solutions
Small and midsize business security is big business
大きなビジネスを生み出す中小中堅企業
Why should you care about government surveillance?
Arbeta var du vill- eBook om modern mobilitet
Surfing Safe on the Road
F-Secure's Annual Report 2012
F-Secure Labs Mobile Threat Report Q4 2012

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
Teaching material agriculture food technology
PDF
cuic standard and advanced reporting.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Empathic Computing: Creating Shared Understanding
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Approach and Philosophy of On baking technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
MYSQL Presentation for SQL database connectivity
Mobile App Security Testing_ A Comprehensive Guide.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
Teaching material agriculture food technology
cuic standard and advanced reporting.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Empathic Computing: Creating Shared Understanding
20250228 LYD VKU AI Blended-Learning.pptx
Understanding_Digital_Forensics_Presentation.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Approach and Philosophy of On baking technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
The Rise and Fall of 3GPP – Time for a Sabbatical?
Diabetes mellitus diagnosis method based random forest with bat algorithm
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The AUB Centre for AI in Media Proposal.docx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
MYSQL Presentation for SQL database connectivity

Internet gatekeeper