Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:00 AM
Dark Reading
Dark Reading
Products and Releases

F-Secure Launches New SAFE Line

F-Secure survey shows consumers are better about protecting their PCs than their mobile devices; F-Secure SAFE offers Internet security for every computer or device - in one package

SAN JOSE, Calif. – September 16, 2014 – F-Secure is greeting the mobile, multi-device future with award-winning Best Protection for every household device, all in one simple product. With its revamped, refreshed 2015 consumer product lineup being launched today, F-Secure is including multi-device Internet security. New, improved F-Secure SAFE offers F-Secure’s award-winning* security for all one’s devices – Windows and Mac computers and Android, iOS and Windows Phone 8 smartphones and tablets. Among other products featured in the launch are F-Secure’s flagship PC product, Internet Security 2015, with snappy enhancements, and F-Secure Anti-Virus. 

It’s a multi-device world, and malware has gone multi-device as well. But a new F-Secure survey** shows that in spite of constant headlines about online attacks, most consumers are not properly securing their online lives by protecting every device they own. While more than six out of 10 PC owners have security installed to their computer or laptop, only a quarter of Android smartphone owners have security installed on their device. That number drops to 16 percent for Android tablets, 6 percent for iPhones and iPads, and just 3 percent for Windows Phones and Mac computers.

“It’s understandable why people aren’t protecting all their computers and devices,” said Samu Konttinen, executive vice president, Consumer Security at F-Secure. “Given the number of devices in the average household, it may seem too cumbersome. But every device needs protection – whether from malware, loss or theft, or whether children need to be protected from inappropriate content. That’s why we’re offering one simple security package that offers the flexibility to protect all your devices, from PC to Mac to mobile.”

Protect your life on every device

F-Secure SAFE is cloud-based Internet security providing real-time protection on every device. It safeguards against viruses, spyware, hacker attacks, and identity theft, while also blocking harmful websites and online attacks. The product ensures worry-free surfing, banking and shopping. Consumers can easily manage protection on their devices with a simple-to-use personal portal, My Safe, which conveniently allows them to switch protection from one device to another if, for example, they buy a new device.

The new SAFE has been improved for an even smoother, more cohesive experience. It now features full anti-theft management capabilities through the My Safe portal. Android and iOS users can now remotely lock, wipe, locate, unlock, reset, and sound the alarm on a lost or stolen phone without having to visit a separate portal. SAFE also has an updated new look and feel with a harmonized experience across devices whether using PC, Mac or mobile. SAFE for PC is now lighter and faster with smoother installation, and can even be installed to an infected PC.

F-Secure SAFE allows individuals or households to choose a subscription based on the number of devices they own. One year of protection for one device is $49.99, three devices is $69.99 and five devices is $89.99. SAFE can also be purchased for up to ten devices. F-Secure SAFE is available for purchase or a 30-day free trial at www.f-secure.com/safe. It’s also available in Google Play and through channel partners globally.

Best PC security, now even better

For those who just need to protect a PC at home, F-Secure’s Internet Security 2015 is top-notch comprehensive PC security. The product consistently receives excellent detection results in independent tests, and its technology has won the Best Protection Award from AV-TEST for the past three years in a row. Like SAFE for PC, Internet Security 2015 is now lighter and faster, with one-click installation, and can be installed to an infected PC. The product runs a cleanup on the infected machine before installing itself.


F-Secure’s 2015 security product lineup for consumers includes:

  • F-Secure SAFE – Internet security for all devices (PC, Mac, Android, iOS, WP8)
  • F-Secure Internet Security 2015 – Full comprehensive PC security
  • F-Secure Anti-Virus – Protection against viruses, spyware and other malware for PC and Mac
  • F-Secure Online Scanner – Scans and cleans your PC for free
  • F-Secure Search – Ensures your search results are safe to click on
  • F-Secure App Permissions – Displays the permissions for all the apps on your Android device
  • F-Secure Freedome – VPN plus online security and privacy, all in one button
  • F-Secure Key – Secure password manager with just one master password


Try or buy our products at www.f-secure.com/store.


*F-Secure’s internet security technology has been awarded the Best Protection Award from AV-TEST for the past three years in a row. (F-Secure Internet Security, F-Secure Client Security)

**The F-Secure Consumer Values Study 2014 consisted of online interviews of 4,800 age, gender and income-representative respondents from six countries, 800 respondents per country: US, UK, France, Germany, Brazil and the Philippines. The study was designed together with Informed Intuitions. Data was collected by Toluna Analytics in July 2014.


Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Breaches Are Inevitable, So Embrace the Chaos
Ariel Zeitlin, Chief Technology Officer & Co-Founder, Guardicore,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-15
qtnx 0.9 stores non-custom SSH keys in a world-readable configuration file. If a user has a world-readable or world-executable home directory, another local system user could obtain the private key used to connect to remote NX sessions.
PUBLISHED: 2019-11-15
Symantec Endpoint Protection (SEP), prior to 14.2 RU2 & 12.1 RU6 MP10 and Symantec Endpoint Protection Small Business Edition (SEP SBE) prior to 12.1 RU6 MP10d (12.1.7510.7002), may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt t...
PUBLISHED: 2019-11-15
Symantec Endpoint Protection, prior to 14.2 RU2, may be susceptible to an unsigned code execution vulnerability, which may allow an individual to execute code without a resident proper digital signature.
PUBLISHED: 2019-11-15
Symantec Endpoint Protection Manager (SEPM) and Symantec Mail Security for MS Exchange (SMSMSE), prior to versions 14.2 RU2 and 7.5.x respectively, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software applicat...
PUBLISHED: 2019-11-15
Symantec Endpoint Protection, prior to 14.2 RU2, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.