Management Portal

One Portal. Complete Security
Protection Service for Business makes it easy to deploy, manage and monitor the security of your endpoints from a single, intuitive console. It gives you excellent visibility into all of your devices—whether at the office or on the go.

Free trial

Contact us

Find a reseller

Protection Service for Business

So little time, so much to do

Managing the security of modern, multi-device environments is challenging. The sheer variety of endpoints keeps increasing, as does the number of ways they are used outside of office networks. It doesn't help that you have limited time and competing priorities—in addition to maintaining security.

No more waiting

Protection Service for Business works in real time. It allows you to manage and monitor the security of your environment without disruptions or waiting caused by polling intervals. In essence, this means that you can:

  • You can configure, deploy and validate changes immediately
  • You can support your customers live as you speak, without having to ask them to wait
  • In case you need to solve security issues ‘right now', you can remediate and deploy a fix immediately

See what's new

Real-Time Operations

Protection Service for Business now works in real time. It allows you to manage and monitor the security of your environment without disruptions or needless waiting caused by polling intervals.

Advanced Profiles

We have added a large number of frequently requested configuration options. They provide much finer control over the security settings, as well as much-needed flexibility for more demanding environments.

Management API

Through our new Management API, we support complete integration of the management platform with any third-party management system. All operations that are available through the Management Portal are also available through the Management API.

Control and Efficiency

The Protection Service for Business was designed from the ground up to simplify and accelerate security management – and to provide visibility and control over all your endpoints.

  • By consolidating endpoint management and all required tools into one task-oriented portal, you save time—time that's better spent on something else
  • With automated patch management, product and database updates, you can save even more time
  • Intuitive graphical reports and dashboards allow you to identify security issues for fast remediation—like software vulnerabilities and infections
  • Gain visibility and control over all your endpoints, no matter where they are
  • No need to deploy or maintain server hardware—it's a hosted service
  • We support complete integration of the management platform with any third-party management system

The management portal enables you to carry out all deployment, configuration, management and monitoring tasks—across all your endpoints—from a single intuitive console.

Details

For partners

You can manage your customer accounts and subscriptions through the F-Secure Partner Portal, which is synchronized in real time with the Management Portal. You can access it directly or through the Management Portal.

There is no need to manually input subscription keys when you order, renew or resize subscriptions for new and existing customers. It's a true time-saver.

The Management Portal keeps you up to date regarding expiring subscriptions. Renewing is easy, as is changing the subscription size: you can initiate the renewal flow directly from the portal. Monthly subscriptions make this even easier, as renewals are not needed and the number of licenses can be changed according to monthly usage. The Management Portal also provides a report on license usage per product per month, enabling more accurate billing and sales management.

With a 3-tier management hierarchy, you can give user accounts varying amounts of visibility and control over security and subscription management—even read-only.

Simple and automatic

AV-Comparatives found our end-point installation "no more complicated than installing iTunes". We have made it even easier by enabling central deployment of all end-point security clients from one portal through an email flow. The subscription key is automatically included in the link or installer so that the end-user need only click the link for the installation process to start automatically.

For larger environments, you can create an MSI package that can be deployed either with your own remote installation tools or with ours.

Conflicting security solutions are automatically removed during the installation of Windows clients, ensuring a smoother and faster transition from one vendor to another.

Customize your set-up

You can create and customize individual security policies (profiles) and assign them either individually or in groups to computers, mobiles and servers, respectively.

Configuration options are comprehensive and easy to modify to suit your needs. For example, you can:

  • Configure a firewall
  • Adjust the settings of various components such as real-time scanning and heuristic analysis
  • Manage and configure the automated scanning and installation of missing 3rd party software patches

You can set a large variety of Web-related controls and rules, for example:

  • Define vital sites, like intranet, for added protection
  • Filter certain categories such as pornography
  • Block active Web content like java scripts from unknown sites
  • Manage and enforce mobile anti-theft policies such passcodes requirements

All settings and policies can be enforced down to the individual level if needed so that end-users cannot alter or change them.

Follow your security status in detail

The management portal gives you a complete overview of your entire environment's security status. This includes potential software vulnerabilities, rooted devices, missing security updates, and the status of security features like real-time scanning and Firewall.

You can track for example the number of blocked infections and pay closer attention to devices that are attacked the most. You can set automatic email alerts so that specific infection parameters get your attention first. If you need more information on any particular infection, you can obtain it directly from our security database.

Intuitive, visually attractive reports

The management portal delivers a wide range of graphical reports in an intuitive format, making data easier and faster to digest and understand—and more appealing for stakeholders to read. Device security details can also be exported as CSV files if required.

Control and enforce mobile security

The management portal gives you central control over your device fleet. You can use MDM to configure and enforce security policies, such as passcode use, and to centrally activate anti-theft functions in case of theft or loss, for example by wiping the device remotely.

Mobile Device Management enables you to control devices throughout their lifecycles, not just when they are lost or stolen. It also provides detailed information about the devices themselves above and beyond their security status.

This allows you to more efficiently monitor your fleet's security status and to identify issues for quick remediation. For example, you can identify:

  • devices with OS versions that have vulnerabilities, like Android 4.1.1 with Heartbeat
  • whether the device has been rooted
  • when the device has repeatedly attempted to visit questionable websites, or how much traffic has been encrypted

Automated patch management

Software Updater is a critical security component that's fully integrated into the management portal. There's no need to install separate agents, management servers or consoles. It's the first layer of protection when malicious content reaches end-points and can prevent up to 80% of attacks simply by keeping security software up to date.

Software Updater works by scanning for missing updates, creating a vulnerability report, and then downloading and deploying them automatically or manually. Security patches include Microsoft updates and over 2500 3rd party applications such as Flash, Java, OpenOffice and others that commonly serve as attack vectors.

The administrator can define exclusions to the automatic mode. You can set the dates and time for automatic installations to run, and include a grace period before forcing a reboot after installation. For applications that manifest no reboot needs, no reboot is performed. If multiple applications requiring reboot are updated at the same time, the reboot is required only once.

Improve productivity & reduce risks

Hosted security services have distinct advantages. There is no server hardware or software to install or maintain—your browser is all that you need. Protection Service for Business automatically updates 3rd party software when security patches are missing, so there is no need for manual updating. Also, end-point security clients automatically receive client security database updates, saving even more time on security maintenance.

By utilizing real-time threat intelligence via F-Secure Security cloud, you are automatically protected against any new and emerging threats

Full integration readiness

Management API is an integration interface that allows complete integration of the PSB management platform with a third-party management system. All operations that are available through the Management Portal are also available through the Management API. This does not include ordering, which is done through the Partner Portal.

The integration helps to leverage your organization's existing investments and benefits from centralized management systems, for example by streamlining the administrator's security-related work.

Furthermore, it allows you to create additional automation, customized workflows and reports, among other things, further reducing the workload and optimizing the management experience and benefits for your organization's specific needs.

For partners

You can manage your customer accounts and subscriptions through the F-Secure Partner Portal, which is synchronized in real time with the Management Portal. You can access it directly or through the Management Portal.

There is no need to manually input subscription keys when you order, renew or resize subscriptions for new and existing customers. It's a true time-saver.

The Management Portal keeps you up to date regarding expiring subscriptions. Renewing is easy, as is changing the subscription size: you can initiate the renewal flow directly from the portal. Monthly subscriptions make this even easier, as renewals are not needed and the number of licenses can be changed according to monthly usage. The Management Portal also provides a report on license usage per product per month, enabling more accurate billing and sales management.

With a 3-tier management hierarchy, you can give user accounts varying amounts of visibility and control over security and subscription management—even read-only.