You are on page 1of 43

CYBER­

SECURITY
FROM
FINLAND
FINLAND OFFERS WORLD-CLASS
EXPERTISE IN CYBERSECURITY
SOFTWARE, HARDWARE,
DIGITAL SERVICES AND
PARTNERSHIPS
2 3

TABLE OF
CONTENTS
CONTENTS
WHY FINLAND?............................................................ 4
SOLUTIONS FOR ALL INDUSTRIES............................. 6
FINNISH STRENGTHS ................................................ 8
COMPREHENSIVE
DIGITAL RESILIENCE............................................... 10
FINNISH CYBERSECURITY
RESEARCH LANDSCAPE.............................................12
FINNISH COMPANIES OFFERING
CYBERSECURITY SOLUTIONS .................................. 14
ACTIVE STAKEHOLDERS IN FINLAND’S
CYBERSECURITY ECOSYSTEM................................... 82
4 5

WHY FINLAND?
#1
FINLAND IS A SAFE, SECURE AND
TRANSPARENT SOCIETY. WE ARE ALSO
ONE OF THE GLOBAL LEADERS IN
CYBERSECURITY. IN AVAILABILITY OF
LATEST TECHNOLOGIES
WORKING TOGETHER WORLD ECONOMIC FORUM GLOBAL
NATIONAL CYBERSECURITY COMPETITIVE INDEX 2017–2018
STRATEGY SETS STRATEGIC BASE A flourishing company ecosystem,
combined with a stable and
SOUND REGULATORY FRAMEWORKS ICT-oriented society, supportive
legislation and strong support for

#1 #1
ACTIVE COLLABORATION data privacy, makes Finland the ideal
WITH PUBLIC AND PRIVATE country for cyber and information
STAKEHOLDERS security businesses. In all, the country
offers reliable and transparent ways of
TOP RESEARCH IN FOCUS DOMAINS working.

WORLD-CLASS ICT AND USING THE LATEST IN DIGITAL THE MOST STABLE
CYBERSECURITY COMPANIES TECHNOLOGY COMPETITIVENESS COUNTRY
Finland is one of the leading countries
IN THE EU IN THE WORLD FOR THE 14TH
in data privacy and threat prevention DIGITAL ECONOMY AND SOCIETY YEAR IN A ROW
solutions and identity management. INDEX 2019
LEADING BY EXAMPLE BY THE FUND FOR PEACE,
FRAGILE STATES INDEX 2019
We are known for many fundamental
Finland’s strong tech expertise, high cybersecurity technologies essential
education level and vibrant startup to cyber and information security.

#1 #3
scene contribute to an attitude of
innovation, putting us at the forefront
of digitalization, communication
technologies and smart & clean
technologies. The Finnish cyber­
security scene is outlined by the
National Cybersecurity Strategy. IN BEST BUSINESS IN MOST INNOVATIVE
ENVIRONMENTS COUNTRIES
IN THE WORLD IN THE WORLD
GLOBAL INNOVATION INDEX 2019 BLOOMBERG INNOVATION
INDEX 2019
6 7

SOLUTIONS FOR MARITIME MANUFACTURING

ALL INDUSTRIES
FINLAND OFFERS A STABLE BUSINESS
ENVIRONMENT WITH A SECURE AND TELE­COMMUNICATIONS

PREDICTABLE DIGITAL SOCIETY.


Customers of Finnish cybersecurity Cybersecurity also provides a
companies cover business verticals, central supporting role in public and
ranging from the energy sector and private healthcare and governmental
heavy manufacturing industry to bodies. Research and comprehensive
the telecom sector and municipal education foster methods and tech­
infrastructure. Solutions reach from nology to tackle security challenges in
software and hardware products to organizations.
digital services and partnerships. HEALTH DEFENSE AND
Source: Company survey on cybersecurity services, Business Finland and FISC, 4/2020 SECURITY

TRAFFIC AND CRITICAL


LOGISTICS ­INFRASTRUCTURE

BANKING AND SMART CITIES


FINANCE
8 9

FINNISH
STRENGTHS
FINNISH CYBERSECURITY INNOVATIONS
ARE ROOTED IN THE STRONG COMPANY
ECOSYSTEM AND ICT-ORIENTED SOCIETY

CRITICAL INFRASTRUCTURE IDENTITY MANAGEMENT PROTECTION OF THREAT DETECTION


PROTECTION HEALTH DATA AND PREVENTION
Strong authentication
Protection of critical supply Digital identity management Data integrity Virus and malware protection
networks
Data access management Patient privacy Advanced persistent
Security operations centers threats (APTs)
Role-based access control Secure data flows
Common security policy frameworks Nationwide monitoring
and early warning systems
Guaranteed supply availability

INTEGRITY OF CYBER SOLUTIONS DEFENSE AND SECURITY TELECOM AND


FINANCIAL DATA FOR INDUSTRY MOBILE SECURITY
Secure critical communication
Continuous monitoring Third-party access management Situational awareness Secure communications
infrastructure
Secure reporting IoT and sensor security Anomaly and intrusion detection
Secure 5G network
System integrity Manufacturing plant control Cryptology
Secure mobile devices
Regulatory compliance Maritime traffic and Anti-tamper services
security control 24/7 monitoring and
detection capabilities
10 11

COMPREHENSIVE FINNISH COMPANIES OFFER WORLD-


CLASS EXPERTISE IN DIFFERENT AREAS
DIGITAL RESILIENCE OF CYBERSECURITY

WHAT WE OFFER

IDENTIFY PROTECT DETECT RESPOND RECOVER


We help your organization We develop and implement We develop and implement We develop and implement We develop and implement
develop an understanding appropriate safeguards to appropriate measures to measures to help you respond appropriate activities to
of your IT infrastructure reduce the IT attack surface, identify the occurrence of appropriately to detected maintain plans, processes and
and cybersecurity position ensuring confidentiality, cyberattacks. cybersecurity incidents. resources for IT resilience.
to enable you to manage integrity, availability and We restore any capabilities or
cybersecurity risk to systems, auditability as well as the services that were impaired
people, assets, data and performance of critical IT by cybersecurity or other
capabilities. services. incidents.

OUR SOLUTIONS
Risk management, Identity management, Anomaly detection, Improvements, mitigation, Communications,
asset management, business awareness and training, ­continuous security analysis, communications, ­improvements, business
environment analysis data security, information ­monitoring, detection planning response continuity and recovery
protection processes, processes planning
maintenance, protective
technology

COMPANIES

Cyberwatch Bittium Redicom Arctic Insta F-Secure 2NS


Flashtec Crosshill SSH Security Leijona Fujitsu Cyberwatch
Granite GRC CSIT Tosibox Audico Security Netox Flashtec
Solita Digia Vorna ID BaseN Rugged Netum Granite GRC
VTT Cinia Tooling
Efecte Nixu KPMG
Xiphera Cyber Savox
Insta TietoEVRY NXme
Hedgehog XXLSEC
Jetico
Cybersec
KPMG
CySec Ice Wall
Mideye
Elisa
NXme
12 13

FINNISH TRUST AND REPUTATION SYSTEMS


SECURITY ANALYSIS

CYBERSECURITY QUANTUM-SAFE CRYPTOGRAPHY


BEYOND 5G COMMUNICATIONS SECURITY

RESEARCH SECURITY ISSUES FOR SOCIETY

LANDSCAPE
SOFTWARE SECURITY ASSURANCE
NETWORK ATTACKS AND DATA ANALYSIS
SECURITY OF THE INTERNET OF THINGS
CONTEXTUAL SECURITY
CYBER RANGES AND TRAINING
IDENTITY AND ACCESS MANAGEMENT SECURITY METRICS
SECURITY OF AUTONOMOUS SYSTEMS AND TRAFFIC BIOMETRIC RECOGNITION
SECURITY AND PRIVACY BY DESIGN MOBILE PLATFORM SECURITY
SOFTWARE SECURITY TESTING SECURITY MONITORING AND ENFORCEMENT
CYBER AND NETWORK SECURITY CYBERSECURITY MANAGEMENT
14 15

BUILDING AN INNOVATIVE
INFORMATION- CYBERSECURITY
SECURE FUTURE SERVICES

OUR SOLUTION COMPANY OUR SOLUTION COMPANY


2NS offers information security Second Nature Security Oy or 2NS is an Accenture Security helps organizations Accenture Security meets clients
services on a broad scale that covers independent cybersecurity company build cyber resilience from the inside wherever they are on their paths to
technical information security and with experience from over 2,000 out, from business to IT, so they can change – in every industry across
information security management, projects. focus on innovation and growth. the globe – and partner with them to
including testing, auditing, consulting create lasting value.
and training. With our diverse BENEFITS FOR CUSTOMERS
expertise, we are able to answer Mika Holmberg
Leveraging its regional Cyber
our customers’ unique needs and mika.holmberg@2ns.fi
Niko Marjomaa
Fusion Centers, a global network of
act as partners in managing their +358 40 843 9412 niko.marjomaa@accenture.com
cyber­security labs, deep industry
information security challenges. www.2ns.fi +358 50 354 6643
understanding and services that span
the security life cycle, Accenture www.accenture.com/security
BENEFITS FOR CUSTOMERS protects an organization’s valuable
The main elements of our operations assets from end to end.
are solid expertise, flexibility,
professionalism and an aim to build an COMPETITIVE ADVANTAGE
information-secure future. The heart
With services that include strategy
of our operation is built on a passion
and risk management, cyber defense,
for information security and customer
digital identity and application
satisfaction. We base our operations
security, we enable businesses around
on real partnerships with our clients
the world to defend themselves against
– making it easy for them to rely on us.
known sophisticated threats and the
unknown.
16 17

DETECTING STATE-OF-THE-ART
VULNERABLE CONTROL ROOM
SERVICES MANAGEMENT

OUR SOLUTION COMPETITIVE ADVANTAGE OUR SOLUTION COMPANY


Arctic Security helps customers detect Our products use over 150 observation Audico is the most influential Audico’s operations cover Finland and
incidents faster, catch otherwise sources to match data with the exact audio-visual (AV) integrator in Finland, Sweden. We are an important partner
unnoticed issues and monitor your victims. This creates precision-filtered, made up of specialists. Our technology for several high-tech equipment
supply chain with ease. This enables real-time and actionable data with expertise also produces voice recogni­ manufacturers, including visual
you to gain situational awareness of easy integration into ticketing and tion systems for international needs. systems, audio, keyboard, video and
active threats across industries and security systems. Our solution can be mouse (KVM), control and monitoring
geographies. delivered on premise, in the cloud or as BENEFITS FOR CUSTOMERS system manufacturers.
a managed service.
The main benefits for customers are
BENEFITS FOR CUSTOMERS our network-controlled control room
Our products enable national and
COMPANY solutions and display technology
Jukka Oksanen
commercial security providers to For over 10 years, Arctic security has expertise. We have information on all jukka.oksanen@audico.fi
automate victim notification for their worked with its customers to automate available solutions. +358 20 747 9392
customers. We also help enterprises victim notification. We help you find www.audico.fi/fi/valvomot
monitor their networks and supply and fix issues that have slipped by and COMPETITIVE ADVANTAGE
chain. Too often, victims are not aware reduce their risk.
We execute and direct several projects
of their compromised and vulnerable
simultaneously. We have grown to
machines or any malicious activity
become one of the largest specialists
originating from their networks. This Virpi Koivumaa
in the field.
information, known as cyber threat contact@arcticsecurity.com
intelligence, is beyond the capabilities www.arcticsecurity.com
of normal security solutions. With our
products you can receive and issue
timely notifications of incidents,
cutting damages and stopping malice.
18 19

SECURITY IN ALL FULL-STACK


ENVIRONMENTS SITUATIONAL
AWARENESS

OUR SOLUTION The system can be used in both mili­


tary and civil applications all over the
Aufwin Perimeter Scout is an world. Due to the highly sophisticated
AI-controlled autonomous perimeter AI, all perimeters secured with Aufwin
OUR SOLUTION COMPETITIVE ADVANTAGE
security and surveillance system ca­ Perimeter Scout are safe and sound, BaseN’s industrial-strength Software- BaseN Platform is the most scalable,
pable of sending alarms, responding, allowing all our clients to focus on as-a-Service (SaaS) is designed mission-critical, resilient and reliable
identifying and acting on identified other, more relevant matters. for multi-tenancy. It is capable architecture on the market. 
objects that have breached the secured of measurement, monitoring, storage,
perimeter. The system offers 24/7 COMPANY analysis and control functions, such COMPANY
surveillance of air, sea and ground. as distributed software upgrades,
Aufwin Defence Ltd is a family-owned BaseN, established in 2001, is a
network management for large
BENEFITS FOR CUSTOMERS company providing security and
complex end-to-end networks and
global IoT operator, enabling the
surveillance applications for a wide transformation from a product to
Our system is based on wireless sen­ range of industries all over the world. remote equipment control, including
service business within any industry.
sors, drones and artificial intelligence Quality, precision, reliability and power consumption control based on
The company’s customer base
that recognize unidentified objects effectiveness are fundamental to all time-of-use pricing. 
includes energy, manufacturing and
within the secured perimeter. The our products and services. other heavy industries evolving from
system either alerts a system unit, BENEFITS FOR CUSTOMERS product sales into digital services.
such as a drone, to further examine Aufwin Defence – security in all
BaseN’s service allows easy mass
the identified intruder or sends an environments.
customization for millions of end
alarm directly to security personnel. users. As a full-stack IoT operator, Corina Maiwald
Antti Auvinen BaseN controls the full value chain.
COMPETITIVE ADVANTAGE Customers can fully focus on creating
corina.maiwald@basen.net
+358 45 639 0034
Aufwin Perimeter Scout is highly antti.auvinen@aufwin.fi new revenues streams by developing www.basen.net
flexible and can be used in individual +358 44 354 0678 services on top of the BaseN Platform.
units – for example, using only the www.aufwindefence.fi
wireless seismic ground sensors. It
can identify animals, humans, vehicles
and any other moving or static objects,
living or man-made, within the secured
perimeter.
20 21

AUTOMATED IOT ULTRA-SECURE


CYBERSECURITY SMARTPHONES

binaré
OUR SOLUTION COMPETITIVE ADVANTAGE OUR SOLUTION COMPETITIVE ADVANTAGE
Binaré offers Software-as-a-Service Binaré is a deep-tech spinoff from the Bittium provides ultra-secure For the defense and security market,
(SaaS) automated solutions for IoT University of Jyväskylä, which boasts smartphones for professionals with Bittium provides the most modern
cybersecurity, research, development more than a decade of cybersecurity the highest security requirements. For products and solutions for tactical and
and technology innovation services, as research vision and experience. Binaré complete end-to-end mobile security, secure communications. The products
well as an extensive range of related is backed by UniFund investment we complement secure smartphones and solutions for tactical communica­
consulting, training and advisory and is supported by the Jyväskylän with our device management and tions bring broadband data and voice
services. Yritystehdas incubator. encryption software. to all troops across the battlefield.
To ensure secure communications,
BENEFITS FOR CUSTOMERS COMPANY To improve the efficiency of authorities
we offer proven mobile devices and
and other organizations, Bittium also
cybersecurity solutions certified up to
Binaré enables you to improve your Binaré offers both automated provides monitoring and reporting
the confidential level.
IIoT/IoT cybersecurity ROI and solutions and professional services to software to gather data on the factual
posture. We help you reduce costs meet your needs for IoT cyber­security service level experienced by the device
and maintain your reputation by and privacy. Our professional
COMPANY
fleet.
pro-actively using our solutions and advisory services leverage our unique Bittium specializes in the development
services. feature-rich SaaS platform and our BENEFITS FOR CUSTOMERS of reliable, secure communications
team’s top international expertise and connectivity solutions leveraging
You can cybersecure your Our services ensure encrypted mobile
to offer cybersecurity services, such its over 30-year legacy of expertise
entire IoT life-cycle, covering access to sensitive data and services
as penetration testing and detailed in advanced radio communication
design, development, testing, of organizations. We offer a single
cybersecurity assessments for IIot/ technologies. Net sales in 2019 were
certification, deployment, operation solution for both professional and
IoT/embedded devices, firmware and EUR 75.2 million and operating profit
and decommissioning. We can also personal mobile communication.
software. was EUR 6.3 million. Bittium is listed
help your company become compliant Our device’s long lifespan enables
on the Nasdaq Helsinki Exchange.
with regulatory and certification the integration and certification of
requirements. Andrei Costin governmental services.
This gives you an opportunity to We offer a secure platform for
Sammy Loitto
info@binare.io
engage with a professional team of +358 40 805 5150 partners with their own cybersecurity sammy.loitto@bittium.com
internationally renowned researchers www.binare.io applications and solutions. Our trusted +358 40 833 5277
and experts. design is manufactured in Finland. www.bittium.com
22 23

CYBERSECURITY FOR OVER-THE-AIR


YOUR EXACT NEEDS MANAGEMENT AND
SECURITY

OUR SOLUTION COMPETITIVE ADVANTAGE OUR SOLUTION COMPETITIVE ADVANTAGE


Brighthouse specializes in offering We work with our customers and build The Capricode SyncShield product Our international team is building
a large variety of cybersecurity innovative solutions by combining in­ secures online data transfer and the SyncShield product to take over
solutions. Since we are not tied to any dustry knowledge and heavy hands-on automates all over-the-air device the connected devices security
certain solution manufacturer, we can experience in complex R&D projects. management operations. Imagine if market. As a company, we offer our
create cybersecurity architecture and you could step into a shared car and core technology in three different
design specifically for your needs. We COMPANY still have your own preferences and segments: automotive, industrial IoT
also have experience in implementing paid services automatically adjusted and secure communications.
Brighthouse offers a one-stop-shop
and maintaining the solution, whether so that it would be just like your own.
for building digital solutions for The SyncShield product will offer
it is public key infrastructure (PKI), Our solution provides a powerful and
remote and autonomous applications, revolutionary technology to manage
cryptography, intrusion detection with elegant way to secure, update and
including situational awareness, connected cars. Our value proposition
machine learning or software signing monitor connected devices.
connectivity and cybersecurity is to be generating a return of
to protect system integrity.
solutions. Our services cover the investment more than 350% per
full R&D lifecycle, from innovation
BENEFITS FOR CUSTOMERS
BENEFITS FOR CUSTOMERS year – in savings alone – compared to
and prototyping to development and The Internet of Things (IoT) enables the traditional manual approach for
Our capabilities include threat maintenance – indoor, outdoor and devices to communicate and share updating device software.
analysis, vulnerability scanning of offshore. data with the surrounding world in
devices and systems, creation of a cyber-secure way. This change is
security policies, procedures and disrupting the value-creation process Tero Takalo
accreditation documents and usage of Markku Sahlström in the automotive and industrial
tero.takalo@capricode.com
hardware security modules. markku.sahlstrom@brighthouse.fi IoT industries, as manufacturers
+358 40 722 9007
+358 40 745 6599 compete in a new ecosystem game
www.capricode.com
www.brighthouse.fi and become service companies. In the
current massive market disruption,
European device manufacturers need
to digitalize their manual processes.
24 25

CYBERSECURITY 24/7 CYBERSECURITY


LABORATORY AT MONITORING
YOUR SERVICE

OUR SOLUTION service is made up of skilled


personnel, efficient and appropriate
Protecting digital infrastructure processes and procedures, and
OUR SOLUTION It runs around 100 research and requires 24/7 cybersecurity modern cybersecurity technology.
development projects each year. monitoring and detection capabilities.
Centria cybersecurity laboratory is a Our project managers have strong We also provide additional
The Cinia Security Operations Center
closed and secure research and test experience with local, national and cybersecurity services, such as firewall
(SOC) Service enables detection
environment. We have secure remote international funding sources. We have management and DDoS protection.
and prevention of cyber threats
access and the necessary software and a great network of partner universities and attacks in a customer’s ICT
devices to detect deficiencies. around the world. COMPANY
environment. Cinia SOC Service
Virtualization allows adjustable capabilities detect cybersecurity Cinia is a Finnish data communications
hardware, operating system and RESEARCH AND EDUCATION events and incidents, respond to and information technology
environment configurations. It can During its research history, Centria incidents, manage cyber threats conglomerate, providing a network,
be combined with real hardware for has studied cases of connected cars, and vulnerabilities, and manage software and cybersecurity services.
testing purposes if necessary.  critical infrastructure, artificial intel­ information security systems. We act as a telecommunications
Thorough lab testing ligence, industrial automation, IoT, operator and produce wide range of
smart homes and many more. We BENEFITS FOR CUSTOMERS ICT expert and connectivity services,
reveals possible issues and
whether they are software or hardware also provide training in cybersecurity We provide 24/7 monitoring and as well as development services for
related. The laboratory is also fully awareness, privacy-related issues and detection with a minimized response IT-intensive systems and software.
equipped for wireless network testing, information security management. time. This leads to faster business We operate our own
including all common wireless continuity and decreased image and telecommunications networks and
protocols. We also provide on-site reputation risks. networks owned by our customers.
vulnerability assessment.
Marjo Heikkilä
As a rule, our customers are socially
marjo.heikkila@centria.fi COMPETITIVE ADVANTAGE important service providers.
BENEFITS FOR CUSTOMERS +358 44 449 2507 Our high-skilled SOC experts help
www.centria.fi customers identify, prevent and
The Centria University of Applied
resolve cybersecurity events and
Anssi Kärkkäinen
Sciences is an international higher
education institution, which offers disruptions quickly and efficiently, anssi.karkkainen@cinia.fi
an innovative and multicultural thereby ensuring business continuity +358 50 544 1294
environment for students and staff. and system recovery. The Cinia cSOC www.cinia.fi
26 27

HIGH-SECURITY IDENTITY AND ACCESS


EMBEDDED SYSTEMS MANAGEMENT
AND TESTING
OUR SOLUTION COMPETITIVE ADVANTAGE
CSIT Finland develops world-class We have extensive experience in the
identity data and master data man­ identity and access management
agement software to deliver complete (IAM) area. Our solutions are
OUR SOLUTION COMPETITIVE ADVANTAGE identity and access management developed with our customers and in
Crosshill provides advanced security We have extensive experience in solutions. Undisputed and accurate various international research and
and attack testing services to evaluate advanced microelectronic systems digital identities are increasingly development projects. Our modular
the overall security level of embedded that lay the foundation for COMSEC critical to any organization. This allows identity and access management
systems and devices. State-of-the-art and cryptographic equipment, such people to have secure, proficient solutions can be utilized in several
passive and active testing methods are as FPGAs, SoCs, DSPs, TPMs and access to solutions and devices domains, such as the management
used, including side-channel analysis, cryptoprocessors. Our know-how anytime, anywhere and using any of physical access control systems,
cryptanalysis and electromagnetic especially covers encryption devices device. Beyond people’s identities, Internet of Things (IoT) devices and
spectrum analysis. and critical communication systems. IoT and AI identities also need access artificial intelligence (AI) software
rights management. components.
Our anti-tamper services focus on COMPANY
silicon, sensor and mechanical-level BENEFITS FOR CUSTOMERS COMPANY
protection mechanisms to protect Crosshill designs and manufactures
classified information and sensitive high-security embedded systems Our identity data and master data CSIT Finland Oy is a security and
IPs. for military, aerospace and telecom management software is top class. services-oriented Finnish software
customers to create secure and You can automatically connect company specializing in identity
BENEFITS FOR CUSTOMERS attack-resistant solutions. All any identity data source into it. and access management (IAM)
systems developed are protected Identity data quality is controlled, and solutions. We deliver complete
We help companies protect against and identity data is enriched using our platform-independent solutions and
against m­ odern attack and tampering
avoid security breaches, operational management console. life-cycle services to customers in the
methods to guarantee the security
damage and unpredictable financial healthcare, educational, public and
and operational capabilities in all Role-based provisioning is automatic
losses. Our passion is to keep our private segments.
circumstances. for any internal or external solution.
customers one step ahead with
hardware and software security. Our software is module based to be
able to integrate with any access Peik Åström
Jouni Hautamäki management solution.
jouni.hautamaki@crosshill.fi peik.astrom@csit.fi
Our constant development provides +358 50 589 2987
+358 50 564 6419 possibilities for new digital identity
www.crosshill.fi www.csit.fi
areas, like IoT and AI.
28 29

BUILDING SECURITY HOLISTIC CYBER


AWARENESS AND CULTURE INSURANCE
SERVICES

OUR SOLUTION across the organization. How


organizations use and protect data can
Our focus is on creating methods have a profound effect on individuals,
and tools to build security awareness society and the environment. Privacy,
and culture. Our toolkit spans from data ethics, risk management and
strategic threat modeling canvases cybersecurity experts are not OUR SOLUTION COMPANY
for boards and senior leadership, tools always available. We offer uniquely
for measuring security awareness and Cyber Hedgehog helps companies Cyber Hedgehog provides a holistic
cross-disciplinary, practical tools and mitigate cyber risks and quickly cyber insurance service from one
culture to individual digital cyberse­ frameworks that anyone or any team
curity coaching for every employee. recover from cyberattacks. Our digital window for small and
in an organization can use to assess cyber insurance covers expenses and medium-sized enterprises. Our fixed
Cybersecurity is not an island. Our risks.
tools integrate it with privacy, data damages for the business. monthly fee includes cyber insurance
with all needed risk mitigation tools.
ethics and business ambitions. COMPANY BENEFITS FOR CUSTOMERS
BENEFITS FOR CUSTOMERS Cult Security is a security agency Our mission is to help all small and
focused on security awareness and Kimmo Aaltonen
We build resilient organizations by medium-sized companies protect their
culture. We equate a modern business against cyber threats. kimmo@cyberhedgehog.com
coaching individuals and teams to use cybersecurity culture with an +358 44 981 2231
our tools and develop them further. innovation culture – a culture that
We make cybersecurity awareness
COMPETITIVE ADVANTAGE www.cyberhedgehog.com
fosters great decisions and ideas,
interesting and motivating. Our virtual because people are aware, empowered, Our digitalized services and cyber
security coach embeds cybersecurity enabled and encouraged by the risk analytics make best-of-breed
awareness into one neat continuously organization. Our tools have been cyber protection affordable for small
updating dashboard and makes tested in safety-critical and highly businesses.
organizational culture measurable. Our regulated sectors from startups to
tools allow your entire organization to enterprises.
make responsible decisions based on
data.
Maria Bique
COMPETITIVE ADVANTAGE info@cultsecurity.com
A sustainable digital business requires +358 40 557 6798
responsible daily decision-making  www.cultsecurity.com
30 31

FOCUSED SECURITY YOUR STRATEGIC


SOLUTIONS PARTNER IN
CYBERSECURITY

OUR SOLUTION COMPETITIVE ADVANTAGE


Cyberwatch Finland offers strategic Our mission is to secure the functions
cyber security solutions for state-level of critical infrastructure as well as pro­
operations, the private sector and tect your organisations most valuable
international organisations, based on assets. We help to develop a cyber
OUR SOLUTION COMPETITIVE ADVANTAGE a holistic view of the cyber world and security culture that strengthens your
hybrid threats. We also provide cyber organisation’s resilience to crises and
Cybersec Oy is a trusted partner in Cybersec and its partners provide
security strategies, risk analysis and reduces business risks. We provide a
delivering focused security solutions the most advanced cybersecurity
action plans. holistic view and understanding of the
and services requested by the cyber services and products in the market.
interdependence of people, practices
community. Our key expertise includes digital risk Our analysis give you strategic
and technology, and the development
management, cyber intelligence and situational awareness to support your
opportunities they offer.
BENEFITS FOR CUSTOMERS anomaly detection. management and decision-making.
Additionally, we offer modern COMPANY
Our technologies help customers
education with e- learning and
understand and keep up situational
Jyrki Jääskeläinen hybrid-learning methodologies. Cyberwatch Finland´s strategic-level
awareness and get early warnings
international expertise is based on
of threats targeted against the jyrki.jaaskelainen@cybersec.fi Our scope of delivery includes experience and an extensive network
organization. +358 40 742 7012 innovative and unique cyber security of experts. We have the ability to
www.cybersec.fi technologies. interpret and present complex cyber
world phenomena and developments
BENEFITS FOR CUSTOMERS in an easy-to-understand format. 
Our clients can establish a holistic cy­ Our mission is to be our clients most
ber security strategy, build situational trusted partner. Therefore, we are
awareness across the organisation, constantly looking for the best ways
and take the necessary measures to to create a credible strategic cyber
build cyber resilience. security roadmap to guide your cyber
security to the highest possible level.
Improved situational awareness is the
basis for better decision-making. Kirsi Toppari
We provide comprehensive roadmap kirsi@cyberwatchfinland.fi
for building a realistic cyber culture +358 40 725 6886
and cyber hygiene for your entire www.cyberwatchfinland.fi
organisation.
32 33

SECURING YOUR SECURE GLOBAL


NETWORK DATA COMMUNICATIONS

OUR SOLUTION COMPETITIVE ADVANTAGE OUR SOLUTION COMPANY


Now you can know in detail what has CySec Vault™ delivers authentic Deltagon provides secure email Deltagon develops information
happened in your network – when evidence and is a necessary addition messaging. Our email encryption security solutions for electronic
and how! CySec offers a patented to existing security systems. It is solution secures the confidential communications and electronic
solution to acquire network payload completely invisible to other networks data in your organization’s email services across a wide range of
and preserve all data safely for a very and does not disturb the normal communications. industries – from the financial
long time. Roll it out as you need network use in any way. sector to public administration –
it, from a single installation to a BENEFITS FOR THE CUSTOMER and everything in between.
full-scale multi-tenant, multi-company COMPANY For the user, securing emails is Deltagon Group Oy was established
investigation and provability system
Data integrity, access, audit trail, and simple and fast. In addition, it is in 1999. Deltagon is part of
(I&PS). With the Evidence Gateway,
chain of custody are preserved by the possible to prevent information leaks Erillisverkot Group. When you are in
the solution is fully compatible with
security of CySec’s patented solution. due to human error and comply with need of market-leading expertise in
the Network Evidence Reference and
Prepare to find out the whole truth with information security guidelines in communication confidentiality, we
Discovery Model.
our CySec Vault™. Whenever needed, email communications. can provide solutions to match your
analysts or AI may discover relevant company’s needs.
BENEFITS FOR CUSTOMERS authentic evidence and prove what COMPETITIVE ADVANTAGE
It is vital for information governance has happened with the original data.
A secure data sharing service makes
to manage the authentic network Finding the root cause is a prerequisite Jyri Vikström
it possible to share files and have
evidences and the CySec Vault™ for successful corrective actions.
discussions among a group. Sharing jyri.vikstrom@deltagon.com
system correctly. To accomplish
secure workspace information is easy +358 40 766 0050
this, we offer the Network Evidence
using our secure communication, www.deltagon.com
Reference & Discovery Model and Heikki Kamppuri
safe file sharing and other convenient
information governance training for heikki.kamppuri@cysec.fi collaboration tools. Creating
network evidence management. Find +358 40 763 7474 workspaces is easy. Both internal and
out the whole truth. www.cysec.fi external users may be involved.
34 35

EMAIL SECURITY INNOVATIONS FOR


AND GDPR SERVICES MODERN SECURITY

f enc e
your first line of defense

OUR SOLUTION COMPANY OUR SOLUTION COMPANY


D-Fence’s eSec email security service Founded in 2000, D-Fence is the Digia integrates different stakeholders Digia is a Finnish software and service
protects businesses from malicious leading email security provider in by developing and innovating company that helps its customers
content, spam and other intrusion Finland. Growing and medium-size solutions that support collaboration renew themselves in the networked
attacks. enterprises, as well as public admin­ within and between high-security world. Digia is a trusted partner in the
istration agencies, use our proactive systems. We have our own specialized high-security and emergency supply
BENEFITS FOR CUSTOMERS services. The company was founded in product and service portfolio for sectors.
2000. With the help of our centralized customers requiring the highest level
Our Easy GDPR service is a
security services, our customers’ of security.
governance platform for any company
email communications are protected Markus Asikainen
to prove their GDPR compliance
and ­accountability. All necessary
from spam, viruses, malware and BENEFITS FOR CUSTOMERS markus.asikainen@digia.com
other intrusions. Our services block +358 50 462 1259
documents are already prepared, so Digia’s offering covers all layers
them before they can arrive at our www.digia.com
it’s easy to put them into use. of ­digitalization, including digital
customers’ workstations.  
services, operational systems,
COMPETITIVE ADVANTAGE integration and API solutions, as well
as solutions for data management and
With 20 years of experience in Juha Oravala
analytics.
the cybersecurity sector, we offer
juha.oravala@d-fence.eu
preventive solutions against threats.
+358 40 848 1245 COMPETITIVE ADVANTAGE
www.d-fence.eu
We ensure smooth operations and
implementation according to our
customers’ needs through consulting
and service design. We ensure that
critical solutions function 24/7/365
– also in exceptional situations and
against cyberattacks.
36 37

SOLUTIONS FOR
IDENTITY AND ACCESS
MANAGEMENT

OUR SOLUTION COMPETITIVE ADVANTAGE


Efecte IAM is the perfect solution for All of Efecte’s solutions are deployable
automated and compliant identity and in different cloud models, including
access management (IAM), working private clouds or our standard cloud.
seamlessly with all enterprise services. For specific customer needs, it is also
Efecte IAM provides organizations possible to deploy the solution to
with prebuilt workflow automation, on-premise environments.
real-time governance capabilities
and user self-service for identity COMPANY
and access requests, dramatically
Efecte is a European alternative,
increasing the speed of IAM
­offering cloud-based service
administration processes.
management and identity
management software to help
BENEFITS FOR CUSTOMERS organizations digitize and automate
The powerful entity model and flexible their work.
platform allow Efecte IAM to be used
from simple entry-level IAM to the
most complex, multi-tenant and Milla Kuosmanen
multivendor environments. milla.kuosmanen@efecte.com
The solution baseline is an excellent +358 40 510 7841
starting point for designing approval www.efecte.com
chains and offerings, while ensuring
that the necessary restrictions are
met.
Efecte IAM enables automation of the
entitlement processes and provides
business-centric services to manage
the lifecycle of identities.
38 39

MODERN CYBER YOUR DIGITAL


SECURITY SOLUTIONS SERVICE PROVIDER

OUR SOLUTION security solutions that fit customer OUR SOLUTION can be commissioned in less than a
business needs. We also have the month, already providing significant
Elisa Cyber Security Center provides ability to p
­ rovide information Emtele’s cyber defense solution improvements for the data security of
24/7 cyber security monitoring, security capabilities and services to automates the operation of a cyber­ the system.
analysis and response service with our customers’ ICT infrastructure. security center and replaces data
additional consulting for all aspects of Our operational 24/7 cybersecurity security specialists with automated COMPANY
cyber and information security. center service detects, analyzes and processes that are supported by the
expertise of Emtele. The development When the company was established,
mitigates cyber incidents that poses
BENEFITS FOR CUSTOMERS a risk to the customers’ business of our solution is based on the customers wanted Emtele to join their
Defence Forces’ requirements. For strategy work. New business concepts
From detection to response – speed continuity.
example, a warship must be capable of were based on remote monitoring of
is the key. Elisa’s expertise and machinery and devices, focusing on
capabilities in networks, IT and COMPANY defending itself against cyberattacks
device service, maintenance prediction
independently without dedicated data
cloud environments allow us to offer During our nearly 140-year history, and business process automation.
security specialists on board.  
faster mitigation of security-related we have always been enthusiastic Emtele offers a business ecosystem
issues. We combine best-­in-­breed
technologies with skilled cyber experts
about utilizing new technologies and BENEFITS FOR CUSTOMERS capable of providing comprehensive
ways of working. Elisa is a recognized solutions. Customers can now specify
and processes that enable faster mit­ international provider of digital Quick and reliable responses to data a turnkey solution and sign a long-
igation through modern technologies, services and a brand of excellence. We security incidents. The extent and term service agreement with only one
automation and incident response with now serve over 2.8 million customers impact of an attack can be minimized provider, us. This agreement defines
skilled cyber security experts, tried in Finland, Estonia and internationally. immediately. the responsibilities for the operational
and true processes enabling faster and Our core values in all our business are reliability and solution usability, as
We provide cost effectiveness. Tradi­
more effective detection, analysis, customer orientation, responsibility, well as its scalability for future needs.
tional, expensive cybersecurity centers
mitigation and remediation – ensuring renewal, results orientation and New development needs can be agreed
are not needed. These can be replaced
your business resilience. collaboration. upon within the service agreement.
with rules-based automation and the
COMPETITIVE ADVANTAGE client’s personnel who are instructed
Ilari Karinen by the system when necessary. Kai Rauhamäki
Elisa is in a unique position to provide
end-to-end cybersecurity capabilities ilari.karinen@elisa.fi We ensure quick implementation kai.rauhamaki@emtele.com
for corporate customers. This +358 40 820 7048 that can be carried out in phases. +358 50 407 2598
includes designing and implementing www.elisa.fi Extensive proof of concept (PoC) www.emtele.com
40 41

CYBER SECURITY FOR YOUR SECURITY,


EMBEDDED SYSTEMS OUR PROFESSION

Flashtec

OUR SOLUTION countries. Therefore, We know the OUR SOLUTION COMPETITIVE ADVANTAGE
potential pitfalls in these systems,
Etteplan provides industrial equip­ also from the cybersecurity point of Strategy innovation frameworks Endless data collection without
ment and plant engineering, software view. Our cooperation with a broad consist couching, training, interactive defining its real business value, leaves
and embedded solutions, and technical network of the biggest chip vendors workshops, cyber security analysis and nothing except a just digital waste
documentation for the world’s leading means that we have the best possible within cross-company collaboration. yard behind. Our premium simulation
companies in the manufacturing tools for our customers. We offer a Gathering data and information from framework prevents the damage and
industry. Our services improve the wide variety of cybersecurity services people allows creation of new ideas grants the success.
competitiveness of our customers’ from threat modeling to standard and business concepts and protects
products, services and engineering gap analysis. We can incorporate your cyber security and digital value COMPANY
processes throughout the product cybersecurity as early as the software chains.
Flashtec is a strategic partner to coach
life cycle. The results of Etteplan’s development phase through and help you turn your innovative
innovative engineering can be seen DevSecOps. BENEFITS FOR CUSTOMERS creation into cyber-secure business
in numerous industrial solutions and
Flashtec helps organizations turn growth.
everyday products. COMPANY past mistakes into future strengths,
minimizing the impact and costs and
BENEFITS FOR CUSTOMERS Etteplan had a turnover of
gaining insight for the future. Our Juha Remes
approximately EUR 263 million in
Cybersecurity has become crucial 2019. Currently, we have more than strategy innovation workshops allow juha.remes@flashtec.fi
for embedded products. We have the 3,400 professionals in Finland, you to merge the cybersecurity risk +358 40 483 5550
know-how and understanding of the Sweden, the Netherlands, Germany, hunt into a new business opportunity www.flashtec.fi
underlying systems and possible Poland and China. Etteplan’s shares discovery quest. It is critical to
vulnerabilities. With Etteplan, your are listed on Nasdaq Helsinki Ltd under identify the most valuable bits of data
connected machines are secure, the ETTE ticker. to discover the true strategic business
and you get a complete audit and value and keep it out of the hands of
analysis from our team of industrial cyber criminals and spies.
cybersecurity professionals. Mikko Lindström
COMPETITIVE ADVANTAGE mikko.lindstrom@etteplan.com
+358 40 772 7881
Etteplan is the biggest embedded www.etteplan.com
design company in the Nordic
42 43

KEEPING PEOPLE AND PEACE OF MIND IN A


BUSINESSES SAFE DIGITIZED WORLD

OUR SOLUTION We help router manufacturers build


better connections. We never stop. It’s
Since 1988, F-Secure has been a not an easy job. But nobody works in Fujitsu intelligence-led security Fujitsu helps in selecting the
frontrunner in cybersecurity, with this industry for an easy paycheck. gives you the tools and technologies best-suited biometric technology
comprehensive, award-winning you need to robustly manage your for your particular budget, environ­
offerings for consumers and COMPANY cyber security. Identify threats ment, requirements and other criteria,
businesses. Our cloud-native detection early-on and make routine scanning for optimal results. As a leading
and response capabilities are among Nobody has better visibility into
of systems to detect vulnerabilities provider and supplier of biometric
the best in the industry. F-Secure real-life cyberattacks than F-Secure.
before they are exploited. Meanwhile, authentication technology, Fujitsu has
protects against a wide variety of the F-Secure closes the gap between
external intelligence provides an the expertise and insight to ensure
tactics, techniques and procedures detection and response by utilizing
overview of current and emerging risks your biometric authentication matches
used in targeted attacks, as well as the unmatched threat intelligence
as well as your overall cyber security your business requirements.
quickly arm defenders with actionable of hundreds of our industry’s best
posture.
intelligence to help them respond to technical consultants, millions of Fujitsu’s Security Operations Center
incidents. F-Secure Consulting pro­ devices running our award-winning As a comprehensive independent (SOC) teams are on the frontline. They
vides cybersecurity services tailored software and ceaseless innovations service delivering unrivalled expertise, are monitoring the latest threats,
to fit the needs of organizations in artificial intelligence. Top banks, proven methodology and extensive responding to new security standards,
working in highly targeted sectors. airlines and enterprises trust our industry experience, Fujitsu Cyber and coming up with the best ways
The insight and intelligence of these commitment. to beat the world’s most Security Consulting provides invalu­ to deal with the issues. Every year,
assignments are used to update potent threats. With our network of top able insight tailored to your particular they produce a review of the most
and improve F-Secure’s endpoint channel partners and over 200 service organizational needs - and with a focus significant recent security attacks.
protection, vulnerability management, providers, we’re on a mission to make on protecting your business. They also offer their predictions for
cloud protection and breach detection sure everyone has the enterprise-grade the 12 months ahead.
cybersecurity we all need. Fujitsu’s Managed Security Services
and response products. deliver comprehensive security, in
Founded in 1988, F-Secure is listed on one place. Thorough threat protection
COMPETITIVE ADVANTAGE Tapani Lehtinen
the Nasdaq, OMX Helsinki Ltd. identifies potential risks, mitigates
We test the defenses of banks to help any immediate impact and prevents tapani.lehtinen@fi.fujitsu.com
them repel thieves looking to steal subsequent attacks from happening. +358 29 302 5640
Jaakko Hyttinen Our full range of professional www.fujitsu.com/fi
money. We make sure you can check
from anywhere if your flight is on time jaakko.hyttinen@f-secure.com security services and managed
and that your plane lands safely. We +358 400 652 552 security services are based on best-
advise schools, hospitals and even www.f-secure.com of-breed own and partners’ security
cities on how to create safe networks. technologies and products.
44 45

MANAGING SECURITY
CYBER RISKS AND ENGAGEMENT
COMPLIANCE TRAINING

OUR SOLUTION and the energy sector. Our software OUR SOLUTION COMPETITIVE ADVANTAGE
tools already have more than 350,000
Granite is a software platform that users. Hoxhunt’s security engagement Hoxhunt works with Global 2000
manages risks and compliance in training turns employees into a strong organizations from a variety of
the areas of cybersecurity and data COMPANY security shield by empowering them industries, such as financial services,
protection. Customers can finally with the skills and knowledge to manufacturing, telecommunication,
replace cumbersome spreadsheets Granite is a software product identify and report cyber threats. retail and many more, helping
with automated workflows and company founded in 2005. Since then, customers educate their employees
reporting without the hassle of going our mission has been Our mission BENEFITS FOR CUSTOMERS better and thus reducing risk related
after a big enterprise software project. is to develop ready-made software from human error.
products that help customers protect Hoxhunt training provides gamified
We offer an easy approach to customer
simulation – best-in-class, real-time
onboarding and good capabilities their businesses and organizations.
reporting of threats with our unique
COMPANY
for customer-specific customization. Our products don’t compete with big
enterprise software providers but incident response module – to equip Hoxhunt is the leading provider of
We offer ready-made templates that
rather provide simpler solutions for security teams with the necessary security engagement platforms
are compliant, for example, with
those customers that value ease of intelligence to mitigate attacks and worldwide.
ISO27001, NIST and GDPR.
use, high adoption by their end users breaches faster.
BENEFITS FOR CUSTOMERS and good value for money.
Tatu Mäkijärvi
Numerous organizations count on tatu.makijarvi@hoxhunt.com
Granite. Our customers include both Teppo Kattilakoski +358 50 376 6291
private companies and public sector www.hoxhunt.com
organizations. Our strongest customer teppo.kattilakoski@granitegrc.com
sectors are government, the finance +358 40 412 4444
sector, manufacturing and process www.granitegrc.com
industry, high technology, health care
46 47

SECURITY BEYOND CRITICAL


TOMORROW CYBERSECURITY
SOLUTIONS

OUR SOLUTION impossible happen by combining our OUR SOLUTION COMPETITIVE ADVANTAGE
problem solvers with the needs of the
At Huld, we address today’s challenges future, linking the physical with the As a frontrunner in secure digital­ Insta has the ability to combine its
by using expertise from business digital and bridging the gap between ization, Insta helps its customers own and its partners’ products with
design and digitalization for product today and tomorrow. understand information security risks, expert services and service provision.
development services. Digital security identify weak spots, protect critical This allows the flexibility to choose
is one of our main business areas. It COMPANY resources and improve their ability to the solution and delivery model that
focuses especially on projects where detect and response to cybersecurity meets customer needs. In Finland,
information is critical. Huld is a European technology design issues. Our key areas of expertise we protect dozens of security-critical
house offering a unique combination include secure identity, network organizations with our cybersecurity
BENEFITS FOR CUSTOMERS of software and product development security, cybersecurity awareness and services and solutions. Our products
expertise internationally. With us, you consultation services. are in use in over 50 countries.
We have a comprehensive under­ build intelligent solutions that last for
standing of customers from different
industries, such as space, defense
tomorrow – and beyond. BENEFITS FOR CUSTOMERS COMPANY
and national security, healthcare Insta has more than 30 years Insta Group Oy is an expert in
and medical devices, machines and Tarmo Kellomäki of ­experience developing and industrial automation, industrial
vehicles, intelligent devices, testing implementing cybersecurity and digitalization, cybersecurity and
and measurement, elevators and tarmo.kellomaki@huld.io information security solutions. defense technology. With more than
lifting equipment, marine and railway. +358 44 562 5222 Customers benefit from our 1,000 employees, we are a reliable
www.huld.io comprehensive understanding of long-term partner that develops its
COMPETITIVE ADVANTAGE security requirements and needs, as offering in response to the changing
well as our wide-ranging expertise and needs of society and customers.
We bring more intelligence, security
experienced specialists. Our SECaaS
and safety to our customers’ business
(Security as a Service) models enable
– and to the entire world. We make the
our customers to focus on their core Marko Hautakangas
operations, while we take care of security@insta.fi
cybersecurity. +358 20 771 7111
www.insta.fi/en
48 49

SECURING CONTINUITY SPECIALIZING IN


OF YOUR BUSINESS CYBERSECURITY
EXPERTISE
OUR SOLUTION crisis management education and
training. The ability of suppliers and
Jatkuvuuskonsultointi Oy helps subcontractors to manage their own
companies and organizations improve disruptions has a critical impact on
the continuity management of their the company’s own crisis resilience.
business. Our experts have diverse We assess the level of continuity
know-how as well as extensive management of these subcontractors
experience in tasks in the field. and help them reach an adequate level.
A serious crisis can lead to the Our exercises simulate various kinds
long-term disruption of production of crises, including cybersecurity RESEARCH AND DEVELOPMENT OUR SOLUTION
or service, resulting in the loss of events. The exercise format varies Jyväskylä Security Technology – Our goal is to be an independent
revenue, customers or reputation. from tabletop training to interactive JYVSECTEC – is the leading and trustworthy partner helping
Careful planning and regular training simulations. independent cybersecurity research, organizations enhance their critical
enable a company to cope with development and training center capabilities, expertise and know-how
materialized risks and disruptions. COMPANY in Finland. We operate as a part against modern threats.
Jatkuvuuskonsultointi Oy is a privately of JAMK University of Applied
BENEFITS FOR CUSTOMERS Our service catalog consists of
owned company, which operates Science’s Institute of Information
cybersecurity exercises, personnel
Business continuity planning (BCP) from the Helsinki and Turku areas. Technology, which guarantees us a
training, software testing and
and the exercises organized by The consultants of the company have multidisciplinary network of experts
management consulting as well as
Jatkuvuuskonsultointi create an extensive experience in their field of at our disposal. Our areas of expertise
accreditation and certification. In the
improved ability to meet difficult expertise. Its customers represent include cybersecurity, incident
future, we expect to strengthen our
situations. The primary parts of various branches of society, including response, emerging technologies and
position by increasing our involvement
the crisis organization are the the technology industry, energy IT technologies.
in European-wide projects and global
management team, situational production, electricity distribution, cooperation.
awareness team and crisis water supply, health care, education, BENEFITS FOR CUSTOMERS
communication team. We have a municipalities and cities, state We work to provide real value for
proven method for teaching and organizations and more. our customers and to accelerate Jarno Lötjönen
testing each procedure. ­technological development and
jarno.lotjonen@jamk.fi
Petri Lonka preparedness against modern
+358 40 656 5240
COMPETITIVE ADVANTAGE threats. Our value is the result of our
petri.lonka@jatkuvuuskonsultointi.fi www.jyvsectec.fi
Our main service is continuity and information and cybersecurity-related
+358 45 155 5460
recovery planning, along with related services and R&D operations for the
www.jatkuvuuskonsultointi.fi
public and private sectors.
50 51

COMPLETE ENDPOINT CYBERSECURITY


DATA PROTECTION CONSULTING AND
AUDIT

OUR SOLUTION the competition and maintaining


OS-agnostic technology. Customers
Jetico provides complete endpoint appreciate our unique strength to OUR SOLUTION We help our customers answer these
data protection software – including questions and identify the security
wipe data clean beyond forensic KPMG helps decision-makers to make
wiping and encryption – for national solution that best meets their needs.
recovery and our superior whole disk bold decisions and feel confident that
security, compliance and personal encryption with industry-best firmware
privacy. support. Jetico proudly offers highly
their cyber strategy, defenses and COMPETITIVE ADVANTAGE
recovery capabilities will protect their
responsive agility, both technically business and support their growth Our global network of business-savvy
BENEFITS FOR CUSTOMERS and commercially. Since 2013, we have cybersecurity professionals
strategies.
Trusted for over 15 years by the U.S. formally stated that our BestCrypt understands that businesses cannot be
Department of Defense, Jetico’s encryption solution has never included BENEFITS FOR CUSTOMERS held back by cyber risk. We recognize
BCWipe can wipe selected files beyond any backdoors or related weaknesses. that cybersecurity is about risk
Business executives everywhere management – not risk elimination –
forensic recovery such as in response
to classified data spills, while BCWipe COMPANY are asking themselves the same enabling business continuity.
questions:
Total WipeOut is ADISA-certified to Jetico products are trusted by
erase entire hard drives for disposal government and military agencies, all • Can I balance information protection
or decommissioning. To protect stored and accessibility? Mika Laaksonen
of the top 10 U.S. defense contractors,
data, Jetico’s BestCrypt delivers many national laboratories, as well • What does a ‘good’ cybersecurity mika.laaksonen@kpmg.fi
compliant data encryption software as various other enterprises and a strategy look like in my sector? +358 207 603 337
for whole disks, virtual drives and wide global base of home and small www.kpmg.fi
• Can I prioritize cyber risks based on
­selected files or folders. Jetico business users in over 100 countries. my company’s strategy?
Enterprise Editions include central Founded in 1995, Jetico is privately
management for client software • How do I determine the right level of
held and headquartered in Espoo,
control. investment?
Finland.
• Where should I put my investments?
COMPETITIVE ADVANTAGE • How can I prevent or mitigate the
Compared to industry giants, Michael Waksman disruption of a cyber event?
Jetico provides focused expertise michael.waksman@jetico.com • How do I ensure that our business
dedicated to data protection, +358 9 251 730 30 returns to normal as quickly as
regularly ­innovating ahead of www.jetico.com possible?
52 53

COMPREHENSIVE COMPLETE
CYBERSECURITY SOLUTIONS FOR
SERVICES CYBERSECURITY
Leijona
Security
OUR SOLUTION services give the customer peace of
mind, while we take care of day-to-day
Leijona Security offers information threat detection and removal. OUR SOLUTION protection, deception technology, and
security assessments, consultation, operational technology (OT) & IoT
training and managed cybersecurity COMPETITIVE ADVANTAGE Locotech’s technology consulting security and visibility.
services. Information security assess­ services help organizations design,
ments are used as a tool to increase Leijona Security relies on the latest plan and implement cybersecurity COMPANY
organizational security. Consultation advances in the field of cybersecurity. technology.
both in the best practices we help our Locotech offers complete
is provided on a wide variety of topics,
such as improving cyber defenses, customers adopt and the technologies BENEFITS FOR CUSTOMERS cybersecurity solutions and services
we use. We are a 100% cloud-native for on-premise, cloud and hybrid
designing secure networks and threat We also provide services for tracking
company, enabling us to provide infrastructures – fully tailored to cus­
modeling. Training can be tailored and safeguarding vital data. Our
high-quality managed services and tomer needs. Our security operations
to the whole organization or special managed security as a service
reduced-cost availability. center’s cross-origin resource sharing
groups, such as developers or execu­ combines everything that goes into (CORS) services identify and respond
tives. Managed cybersecurity services
include vulnerability management,
COMPANY fighting cybercrime, from assessing to advanced threats targeting all levels
risk and implementing technologies to of endpoints. It is a comprehensive
SIEM and endpoint detection and Leijona Security is a Helsinki-based preventing, detecting and responding
cybersecurity company providing easy, service that delivers 24/7 monitoring
response. to threats.
robust cybersecurity services that help and notification, incident handling and
remediation.
BENEFITS FOR CUSTOMERS our customers do what they do best. COMPETITIVE ADVANTAGE
Our services enable customers to Joonatan Kauppi We also support and help organizations
focus on what they do best, while
Peter Laxström
deliver technology, licenses and
keeping their operations secure. joonatan@leijonasecurity.fi equipment according to their needs. peter.laxstrom@locotech.fi
Consultation and training help prevent +358 40 451 0557 We represent the market leaders in +358 50 525 2988
cybersecurity risks from being realized www.leijonasecurity.fi next generation firewalls, endpoint www.locotech.fi
and by doing so, save precious money
and time. Managed cybersecurity
54 55

MULTIFACTOR
AUTHENTICATION AND IAM

OUR SOLUTION COMPETITIVE ADVANTAGE


Mideye offers cost-efficient and Our customer base includes the
user-friendly authentication of remote traditional industry, finance and
users, primarily utilizing the mobile insurance sector, telecom operators,
phone as a second layer of security. IT service providers, retail chains, the
Our service also enables you to control energy sector, construction companies
your third-party access, even to the and also the public sector.
degree of accepting and monitoring
Lately, we have been helping
logged-in 3rd parties.
traditional industry solve the problem
BENEFITS FOR CUSTOMERS of allowing third-party vendors to
remotely maintain critical infrastruc­
The Mideye authentication service ture, without compromising security
can be applied to any remote access but still keeping the workflow very
service that requires secure user flexible, enabling new ways of working.
identification. It is an easy way to
efficiently protect against hackers COMPANY
stealing your user accounts. Some
Since its inception in 1999, Mideye
companies even say multi-factor
has pioneered the area of strong user
authentication can block up to 99.9%
authentication based on the mobile
of all account compromise attacks.
phone. The product, service and patent
The solution is scalable to your needs, portfolio is focused on user login with
with installation and integration the phone as an additional layer of
support included. security.
This is an easy way to control your The company has roots in Ericsson
third-party access and delegate that Radio Systems in Sweden and SSH
control to persons dealing with the Communications Security in Finland.
third parties.
Jan Sandbacka
jan.sandbacka@mideye.fi
+358 40 752 0659
www.mideye.com
56 57

SOLUTIONS FOR YOUR TRUSTED


VARIOUS CYBER PARTNER IN IT
NEEDS

C R E AT I N G T R U S T

OUR SOLUTION the industry requirements while


helping them also to benefit from
Netox is your trusted partner in cross-industry best practices. At Netox
IT. Well-functioning IT provides we base our services on proficient
OUR SOLUTION COMPETITIVE ADVANTAGE the backbone for successful and individuals, certified processes
Mint Security combines new and We are an agile and dedicated reliable business operations. It scales and proven technologies – without
renews old models of working, company that thrives on challenges. We together with your business. When forgetting creativity.
creating both controlled as well as collaborate – you can expect a single built properly, it can even enable new
comprehensible information security point of service with us. We understand business opportunities. Reliable and Our solutions include cybersecurity
through risk management. the importance of communication and scalable IT solutions require a trusted services, specialist services, devices
project management in deliveries. partner. Netox can support and work and licenses, cloud services, end-user
Our core services cover auditing and along with your IT management, or you services and network services.
IT risk management, process and COMPANY can outsource the whole responsibility
administrative security, software to us. COMPANY
development security, as well as cyber, We like to share our expertise.
Please have a look at our blogs: Founded in 2004, Netox provides
SecOps and architecture. BENEFITS FOR CUSTOMERS award-winning, all-inclusive IT
www.mintsecurity.fi/blog/
BENEFITS FOR CUSTOMERS Adding our agile and lean ways of solutions by combining top
working to international quality expertise from international research,
Mint Security represents products that Thomas Malmberg standards, we are able to provide leading technology solutions and
include solutions for various cyber exceptional customer experience to the i­ndustry’s best practices with a
needs. Our offering is unique in the info@mintsecurity.fi strong focus on cybersecurity. We are
small and large enterprises in different
market. Our products include Veracode +358 50 380 5224 ISO 20000-1, ISO 27001, ISO 9001
industries.
and Spamhaus. www.mintsecurity.fi certified partner in IT.
COMPETITIVE ADVANTAGE
Our customers represent variety of Markku Korkiakoski
different companies from healthcare markku.korkiakoski@netox.fi
to hi-tech. We support them with +358 40 660 5369
high quality IT solutions fulfilling www.netox.fi/en
58 59

PROFESSIONAL KEEPING THE


CYBERSECURITY DIGITAL SOCIETY
CONSULTATION RUNNING

OUR SOLUTION COMPETITIVE ADVANTAGE OUR SOLUTION COMPANY


Netum provides IT solutions and Choosing Netum as your cybersecurity Nixu offers a full portfolio of Nixu is a cybersecurity services
services by integrating traditional and data protection partner gives cybersecurity services, including company on a mission to keep the
IT systems into the newest digital you peace of mind. Our experts secure cloud transformation, digital digital society running. Our passion
applications. Our cybersecurity analyze, report on and develop your identity management, cyber defense, is to help organizations embrace
professionals are experts in organization’s cyber threat protection secure IoT, industrial cybersecurity, digitalization securely. Partnering
penetration testing, web application and prevention strategies, and you can cybersecurity awareness, compliance with our clients we provide practical
security, cybersecurity governance, focus on your business. and certification and cybersecurity solutions for ensuring business
technical assessments and risk outsourcing. continuity, an easy access to digital
analysis. We also have specialists for COMPANY services and data protection. We
mission-critical cyber and information
Netum Ltd is a growing and reliable IT
BENEFITS FOR CUSTOMERS aim to provide the best workplace to
security solutions containing public our team of over 400 cybersecurity
service provider. Our services include We are your trusted cybersecurity
key infrastructure (PKI), identity and professionals with a hands-on
software design and implementation, partner and provide you with all the
key management and network security. attitude. With Nordic roots we serve
system management and monitoring, cybersecurity-related services that you
enterprise clients worldwide.
IT security solutions and IT need so that you can concentrate on
BENEFITS FOR CUSTOMERS management consulting. We work in your core business. We are an impartial
With Netum, third-party expert insight close collaboration with our clients to cybersecurity expert. We always choose
Valtteri Peltomäki
and knowledge is at your disposal. create functional solutions together. the best solution for our customer’s
You can rest assured of both the needs and are not tied to any specific valtteri.peltomaki@nixu.com
administrative and technical level of technology. +358 40 704 0808
cybersecurity. Our Katakri mapping Jussi Vasama
tool lets you know whether your jussi.vasama@netum.fi
COMPETITIVE ADVANTAGE
current level of security meets all Veera Relander
+358 50 381 0227 We are the number one cybersecurity
requirements. www.netum.fi veera.relander@nixu.com
specialist in Northern Europe. We have
With the help of our experts, you are the best experts in the industry, and +358 50 523 3061
one step ahead of attackers. cybersecurity is our passion. www.nixu.com
60 61

HOLISTIC APPROACH EXTENDING YOUR


TO CYBERSECURITY MOBILE LIFE

OUR SOLUTION COMPANY OUR SOLUTION COMPETITIVE ADVANTAGE


NXme is a reliable and trustworthy NXme is one of the most experienced Piceasoft offers solutions for fast We support the whole mobile device
partner for designing, implementing, vendor-independent cybersecurity consumer data transfer, secure lifecycle, from new device purchasing
securing and operating your consultants in the Middle East, with erasing of personal data and an easy to recycling. Piceasoft products
critical information systems and expertise and knowledge accumulated way to analyze and fix mobile device provide omnichannel user experience
infrastructure. from working with a variety of clients, issues and resell them. Our service and support up to 19,000 device
from telecommunications service includes an easy-to-use mobile device models. The service includes advanced
BENEFITS FOR CUSTOMERS providers to financial institutions and data transfer for retailers to boost data- and AI-powered solutions.
government entities. Our services customer experience and certified data
We serve our clients with a team of
over 80 specialists in Finland, Saudi
cover all aspects of security, including erasure to ensure peace of mind. COMPANY
infrastructure and application vul­
Arabia, United Arab Emirates, Thailand Piceasoft is a leading software
and Vietnam.
nerability assessments, penetration BENEFITS FOR CUSTOMERS provider for mobile device lifecycle
testing and security monitoring.
Picea® Switch allows smooth and fast solutions. Our customers are mobile
COMPETITIVE ADVANTAGE transfer of all personal content across operators, electronic retail chains,
all major mobile device platforms. It repair and recycling companies and
Our core cybersecurity capabilities are: Timo Hirvonen
provides the same user experience for trade-in vendors. We offer an innova­
• Human and technology-oriented timo.hirvonen@nxme.net every device regardless of the OS. tive and easy-to-use software platform
approach +358 40 507 1316 to sell, recycle and repair used phones.
www.nxme.net ADISA certified Picea® Eraser ensures
• Assessment and penetration testing With our solutions, customers can
that no personal user data remains
create new services, increase revenue,
• Networks and applications security on the mobile devices and that the
save costs and protect consumer data.
• Security architecture and identity devices can be reused.
management
Pia Kantola
• Security operations and incidents
management pia.kantola@piceasoft.com
+358 40 754 0145
www.piceasoft.com
62 63

ENHANCING SECURING YOUR


ORGANIZATIONAL ASSETS
CAPABILITIES

OUR SOLUTION training completed, accomplishments OUR SOLUTION COMPETITIVE ADVANTAGE


finalized, GAP analysis, aging and
Safetypass.EU is a know-how other factors. Remod offers a broad spectrum of We tailor our solutions to fit your
and competence management cybersecurity services aimed at situation, with the end goal of always
platform. We help create unique COMPETITIVE ADVANTAGE securing your on-premise and in offering the best solution and value
ways of transforming organizational the cloud assets. We work to secure for your needs. We also offer backup
requirements into needs for personnel The Safetypass.EU platform combines your current assets and environment services and consulting in a wide range
know-how. With Safetypass.EU, an an individual’s actions into the through an exhaustive survey and of topics.
individual gets access to trainers and learning account that he or she can analysis from which we derive the pain
powerful toolsets for organizations then manage and share as desired. points and strategy to secure your COMPANY
while managing his or her own courses, An individual owns his or her own environment, employees and assets.
personal data and has control over it. At Remod we are focused at
competences and skills in special
finding, creating or inventing the best
learning accounts. With consents, employers can request BENEFITS FOR CUSTOMERS solutions to help you move forward,
access to the data for their own usage.
We offer added security through whether it’s with technology, ways of
BENEFITS FOR CUSTOMERS
COMPANY managed services, a low maintenance working or business management.
Safetypass.EU offers transparency into cybersecurity control room, network
your personnel’s skills and supervisor We are an independent consulting security and management or even
agency focused on process, business Teppo Suominen
views. It provides requirement-based full IT management partnership. We
monitoring for various job titles, and software development. Many of provide customized, transparent full teppo.suominen@remod.fi
locations or projects. our projects are related to identity lifecycle IT management and security +358 40 572 1570
management and corporate security services. www.remod.fi
With this platform, it is possible to solutions. For 14 years, we have
create horizontal teams and map been implementing domestic and
their competence requirements international software projects from
based on business needs to produce design to production for our global
GAP analyses of associated persons. customers.
It shows the competences, rules
and regulations for persons flow Juha Männistö
into and out of organizations. The
platform integrates with eLearnings juha.mannisto@redicom.fi
and blended learnings. It provides 358 40 844 2301
comprehensive reporting, including www.redicom.fi
64 65

SECURE AND SOLUTIONS FOR


ROBUST DIGITAL DEMANDING
COMMUNICATION ENVIRONMENTS

OUR SOLUTION COMPETITIVE ADVANTAGE OUR SOLUTION COMPETITIVE ADVANTAGE


Rugged Tooling creates powerful We specialize in managing massive Savox Communications is a critical Our global team caters to the needs of
solutions for real-time network amounts of IP traffic in real time. communications company. We provide professionals in the chosen business
monitoring, efficient traffic offloading We create world-class solutions for IP smart technology solutions that create segments of safety and security,
and precise network cybersecurity traffic monitoring, network testing, situational awareness and enhance tactical and industrial markets.
and quality testing. Our testing and cyber ranges. We have customers communication and collaboration
solutions allow our customers to build in 11 countries around the globe. in all situations. Our solutions save COMPANY
robust and secure networks while Our customers range from telecom lives, protect people and property and
Savox’s expertise is based on 36
our monitoring solutions give them companies and authorities to various enhance the efficiency and quality of
years of improving and saving
real-time visibility into the security industries and R&D organizations. work of professional teams around the
lives by providing safety, rescue
events. world.
and communication solutions for
COMPANY professionals working in demanding
BENEFITS FOR CUSTOMERS Rugged Tooling was founded in 2010
BENEFITS FOR CUSTOMERS environments.
Our appliance-based sensors make in Oulu, Finland. Our founders are Harsh arctic conditions form our
precise real-time data events a group of software and hardware backbone. We have delivered solutions
accessible for next-generation security engineers with a working history in for the most demanding environments Janne Pöllänen
operations centers (SOCs). They ensure the telecom and testing industry. Our for decades. Our long experience, janne.pollanen@savox.com
data integrity with blockchain integra­ main office is located in Oulu, Finland, combined with a strong determination +358 50 911 7730
tion. Using our traffic pre-processing and we have a sales office in Helsinki. to leading the way, have resulted in www.savox.com
solutions, our customers can build The company has grown steadily and solutions with superior user experience
security systems with a lower total now employs a team of enthusiastic for professional teams – whatever the
cost of ownership than ever before. professionals. We aim to improve conditions.
We build our solutions in Finland the overall security, robustness and
completely with our own code on NPU quality of IP-based services.
platforms. This means our tools open
no third-party backdoors to your Jukka Ruotsalainen
system. sales@ruggedtooling.com
+358 40 186 2626
www.ruggedtooling.com
66 67

FINLAND IS A
TECHNOLOGY
SUPERPOWER. THANKS
TO ITS PIONEERING
BUSINESS AND
INNOVATION CULTURE,
FINLAND HOSTS
SOME OF THE WORLD’S
MOST INTERESTING
COMPANIES IN CYBER
AND INFORMATION
SECURITY.
68 69

SECURE MANAGING YOUR


ENCRYPTED EMAIL CYBERSECURITY

OUR SOLUTION COMPETITIVE ADVANTAGE


Securedmail is a SaaS service enabling The service has been up and running
OUR SOLUTION An open ecosystem reduces vendor
lock and improves capability to react
the sending and receiving encrypted since 2004. Securedmail has been The SensorFleet solution is an open to emerging threats. Instruments
emails without any additional software granted patents in several European sensor platform hosting detection, developed by third parties, be they
or hardware installations. The encryp­ countries and in the US. protection and scanning tools, commercial, inhouse or open source,
tion of Securedmail is based on the regardless of whether they are can all be integrated.
Securedmail is used by different
same SSL encryption used by banks commercial, open source or developed
companies, cities, governmental Monitoring diverse networks on
to secure the data communications of in-house. The solution reduces
organizations and associations. The a single platform, such as IT,
their internet services. complexity in managing cybersecurity
size of our clients varies from small operational networks or cloud services,
capabilities, while a readily available
Securedmail has received Finnish companies to internationally listed simplifies security operations and
deployment platform improves
patents FI116815 and FI125832B companies. helps in tracking threats across the
response times for emerging threats.
and European patent EP3286891. organization.
Its technical data security has been COMPANY BENEFITS FOR CUSTOMERS
granted the best possible grades from Distributed monitoring is resilient and
The owner of Securedmail service safeguards the forensic capability.
an independent auditor. Need to run an intrusion detection sys­
is Finnish data security company Each sensor is capable of operating in
tem (IDS) at scale? Need occasional
Encrypted Email Finland Ltd.
BENEFITS FOR CUSTOMERS traffic recording in different network isolation from the rest of the sensor
segments? Bring clarity to fragmented network. It also maintains its own copy
Securedmail is an email encryption of collected alert and forensic data.
Markku Vettenniemi cybersecurity tools and orchestrate
service that enables communicating
capabilities with SensorFleet
securely with anyone. markku.vettenniemi@ Instruments.
Using Securedmail is easy. Just add suomenturvaposti.fi Simo Mäkipaja
the Securedmail.eu domain ending to +358 500 553 663 COMPETITIVE ADVANTAGE contact@sensorfleet.com
the recipient’s address. For example – www.securedmail.eu +358 40 583 3999
The SensorFleet solution enables
john.doe@company.com.securedmail. www.sensorfleet.com
you to deploy multiple cybersecurity
eu.
capabilities as instruments on a
The service can also be integrated unified platform, reducing complexity
with the client’s own IT infrastructure and fragmentation of your security
to automate the email encryption of tools palette.
confidential messages.
70 71

PREVENTING COMBINING TECH, DATA


THREATENING LEAKS AND HUMAN INSIGHT

OUR SOLUTION MEDICAL DEVICE SECURITY


• Regulatory compliance
We create impact that lasts by
combining tech, data and human • Data protection
OUR SOLUTION COMPETITIVE ADVANTAGE insight. Solita is a community of • Secure Development Lifecycle
Our product continuously seeks new • Network segmentation is a core highly and widely skilled experts • ISO 13485 -certified software
network and data leak paths and alerts network protection strategy. geared for impact and customer value. development
when they are found. These leaks can We do what matters to build the future
• Critical infrastructure, ICS/OT,
with our clients by delivering high-
be a result of human error or malice, finance and healthcare regulation
quality solutions to real problems.
COMPANY
and they may violate security policies, and security policies require it. But
regulation or contractual obligations. do you know it works? Our unique service portfolio
Testing proves the compliance and BENEFIT seamlessly combines expertise from
• We enable continuous validation for strategic consulting to service design,
identified issues can be mitigated Our portfolio includes the following
your network isolation. software development, analytics and
before they get exploited. Our cybersecurity services:
innovative and comprehensive tests data science, cloud and integration
COMPANY CYBERSECURITY SERVICES services. Founded in 1996, Solita is
help you to stay ahead of the threat.
We started SensorFu in order to go • Threat assessment a fast-growing community of almost
BENEFIT back to basics with IT security. We feel • Human-centric security design
1,000 professionals in Finland,
that security requirements pile up and Sweden, Denmark, Estonia, Belgium
• Automates otherwise costly manual • Secure Software Development and Germany.
security solutions are too complex.
security audits and checks Lifecycle methodology and practices
Our products make sure that our
• Easy to purchase and and customers’ security policies are and • Security assessments for software
deploy even in the most demanding stay sealed. and services Jussi Kujansuu
environments • Penetration testing jussi.kujansuu@solita.fi
• Integrates with and adds value Mikko Kenttälä +358 44 750 4490
to the existing firewall, data loss SOLITA WHITEHAT
mikko.kenttala@sensorfu.com www.solita.fi/en
prevention, endpoint protection and • A SaaS cyber security service to
SIEM security investments
+358 40 801 9800 gather your public data, analyze
www.sensorfu.com findings, and guide to actions
• Scans open-source intelligence
from dozens of sources and creates
real-time visibility to your visible
assets
• Automatically analyzes findings
and changes
72 73

NEXT-GENERATION DIGITAL ADVANTAGE


ACCESS FOR BUSINESSES
MANAGEMENT AND SOCIETIES

OUR SOLUTION being able to simultaneously manage, OUR SOLUTION COMPANY


deploy, and rotate authentication
SSH.com’s PrivX is lean, quick-to-­ keys in large-scale, secure shell TietoEVRY is your Nordic c­ ybersecurity TietoEVRY creates a digital advantage
implement and easy-to-use access environments. partner. We provide services that for businesses and society. We are a
management software for privileged promote visibility, simplicity and leading digital services and software
access to on-premise and cloud UKM is the perfect complement to protection to help securely unleash company with a local presence and
environments. PrivX helps clients privileged access management (PAM) your digital potential. global capabilities. Our Nordic values
flexibly enable and control access to deployment, especially in regulated and heritage steer our success.
servers, network devices and other industries and mission-critical BENEFITS FOR CUSTOMERS
applications. It brings new capabilities Headquartered in Finland, we employ
critical infrastructure according to
to controlling automated M2M TietoEVRY provides a full stack of around 24,000 experts globally.
user roles and privileges.
connections, which current key cybersecurity services and helps The company serves thousands of
our customers focus on their core enterprise and public sector customers
BENEFITS FOR CUSTOMERS vaulting-based solutions do not
business. You can take back control of
adequately address. Plus, it can stop in more than 90 countries. TietoEVRY’s
Compared with in-house and power users from bypassing the your cybersecurity with services based annual turnover is approximately EUR
traditional tools, PrivX offers unique PAM system with SSH keys. on your business needs. 3 billion. Its shares are listed on the
modern features and functionality NASDAQ in Helsinki and Stockholm as
that not only strengthen IT security COMPETITIVE ADVANTAGE well as on the Oslo Børs.
but also and increase the speed of Jussi Mononen We provide managed security services
business and lower privileged access
jussi.mononen@ssh.com (MSS) and a security operations
implementation and operating costs. Maria Nordgren
+358 45 615 4855 center (SOC) on top of advisory and
consultancy. Our service focuses on maria.nordgren@tieto.com
COMPETITIVE ADVANTAGE www.ssh.com
threat intelligence 24/7, locally and +358 40 500 9760
Companies worldwide are using PrivX globally, looking for anomalies and www.tietoevry.com
for cases varying from securing their signs of a breach. MSS provides border
DevOps to third-party access security and endpoint protection through
to access automation. Our Universal different products, such as firewall as
SSH Key Manager® (UKM) is unique in a service and endpoint security.
74 75

SECURE A NEW PERSPECTIVE


POINT-TO-POINT ON SOFTWARE
VPN CONNECTIONS DEVELOPMENT

OUR SOLUTION COMPETITIVE ADVANTAGE


TOSIBOX offers secure and
®
TOSIBOX® is infinitely scalable, which
easy-to-use connectivity between sites guarantees a cost-efficient solution OUR SOLUTION COMPANY
and users that is internet connection, that expands according to your needs
Valaa Technologies’ unique software Valaa Technologies is a deep
operator and device agnostic. and those of your business. Simply
architecture tackles complex problems tech startup founded in 2018.
drag and drop to add new devices or
We believe that success in the with radical simplicity. Open source We partner with corporations to
users into the network with TOSIBOX.
era of the Internet of Things is ValOS reimagines the Web with uncover their ­industry-specific digital
To complete the same task with
simply a ­matter of connections, and change as its fundamental unit of transformation inhibitors. Together we
old-fashioned IT networks takes days
connectivity is the core of IoT. Today information. leverage ValOS ecosystem to co-create
or weeks.
the need for reliable connectivity is new business around these existential
greater than ever. By 2020, more than Performing at the highest security BENEFIT FOR CUSTOMERS problems.
half of major new business processes ­levels in the industry, TOSIBOX
State handling is the number one
and systems will incorporate some is globally audited, patented and
source of complexity in large-scale
elements of IoT. performs at the highest security levels Ville Ilkkala
software systems. Complexity in turn
in the industry. The technology is ville@valaa.com
is the worst enemy of security. By
BENEFITS FOR CUSTOMERS based on two-factor authentication,
rethinking the foundations, ValOS +358 50 308 8877
automatic security updates and the www.valaa.com
With TOSIBOX®, you can build your removes complexity instead of hiding
latest encryption technology. It is a
own global operational network within it. It’s an ideal platform for the next
direct virtual private network (VPN)
minutes. You own your network and generation decentralized industrial
tunnel between physical devices.
your data. With our unique two-way and enterprise systems.
Only trusted devices can access the
connectivity, we provide the benefits
network. COMPETITIVE ADVANTAGE
of both data acquisition and remote
maintenance with one solution. This
The Web has unmet potential as the
allows you to save resources and
Markku Pitkänen universal integrator across different
access new businesses.
systems. We focus on enhancing the
markku.pitkanen@tosibox.com
core building blocks of the Web itself
+358 40 838 1587
to turn that potential into reality.
www.tosibox.com
76 77

CORPORATE CYBERSECURITY R&D


CUSTOMER DIGITAL SERVICES
ACCESS

OUR SOLUTION We help you generate new


business ­opportunities by removing
VTT provides a wide range of R&D cybersecurity obstacles. This ensures
services to help you raise your level of your business continuity through
cybersecurity: cybersecurity risk management.
OUR SOLUTION COMPETITIVE ADVANTAGE • Industrial cybersecurity –
Vorna ID provides easy to deploy Vorna ID is a standard authentication protection of critical infrastructure, COMPETITIVE ADVANTAGE
digital identity and access manage­ solution that does not require including electric and telecom grids We offer holistic competences around
ment services, which are needed when customization and is quick to deploy. and industrial controls systems security enablers for next-generation
developing new online service for The functions provided by the service • Advanced cryptography – data connectivity. Our novel IPR
corporate customers and distributors. are typically solved individually and security, information protection, cooperation models support our
manually by the service provider. blockchains and post-quantum clients’ businesses.
BENEFITS FOR CUSTOMERS Currently, identification solutions cryptography
available on the market focus on Our unique test environments and
The development of electronic services • Secure networks – 5G test network broad cross-industry domain expertise
strong local customer identification. for evaluation and piloting customer
creates the need for the reliable and save you time and money.
Vorna ID provides business customers security solutions
cost-effective management of
with strong identification globally.
corporate customer access and • Security metrics – cyber­security COMPANY
authentication. assurance, metrics and AI
COMPANY VTT uses its R&D expertise to provide
The global enterprise identifier (LEI) solutions for public safety and
Vorna ID provides globally unique professional services for its domestic
­telecommunications
enables the introduction of a new and international customers and
and verified corporate customer • Trusted platforms – testing and
solution, Vorna ID, which provides partners serving both the private
identification. The service consists of analysis of device security in War
a standard interface for logging in and public sectors. We do applied
three products for the online service Room (an isolated Cyber Range) and
to electronic web services. Once the research with advanced research
provider, activated separately or advanced trusted platforms R&D
user has been authenticated, the facilities with interdisciplinary
together. These are Verified Partner,
web service learns the user’s global scientific, t­ echnological and business
corporate identity and the permissions
Rights Management and Partner Login. BENEFITS FOR CUSTOMERS competences.
associated with that application. When We provide novel services and R&D
using Know your Customer (KYC), the Ronny Eriksson based on smart contracts that enable Tuomas Korpela
service verifies the organization on ronny.eriksson@vornaid.com trust in business-to-business or even tuomas.korpela@vtt.fi
behalf of the service provider. +358 50 517 7908 people-to-people transactions without +358 40 729 6238
www.vornaid.com ever knowing the counterpart. www.vttresearch.com
78 79

MANAGING GDPR PEACE OF MIND IN A


REQUIREMENTS DANGEROUS WORLD

OUR SOLUTION COMPETITIVE ADVANTAGE OUR SOLUTION COMPANY


XCure has created the Privacy Our skilled staff develops solutions to Xiphera’s security solutions implement Xiphera combines expertise in
Management Tool to help organizations best meet customer requirements. the underlying cryptographic cryptography, digital electronics,
on the journey toward compliance. The We developed the Privacy Management algorithms directly in digital hardware. and the knowledge of target
General Data Protection Regulation Tool based on customer requests and applications. Our main focus markets
(GDPR) is an EU law requiring still work closely with our customers BENEFITS FOR CUSTOMERS are communications, defense, and
organizations to radically change to listen to all their needs. industrial automation.
Hardware-based security and
the way they collect, store and use Our platform is customizable and
cryptography offer: Our portfolio consists of optimized
personal data. Organizations need to ready for distribution channels.
intellectual property (IP) cores
prove their compliance. • Higher protection level
COMPANY supporting the latest security and
• Better performance and higher cryptographic standards. Our target
BENEFITS FOR CUSTOMERS XCure Solutions was founded in 2006 throughput technologies are field-­programmable
The Privacy Management Tool is a and is privately owned. The company • Lower power consumption and gate arrays (FPGAs) and
scalable SaaS service suitable for all is located in Helsinki, Finland. Our longer lifetime than software-based application-specific integrated circuits
organizations from SMB to private team has long expertise in data security designs (ASICs). We are also available for
enterprise and also the public sector. security and data protection. consulting and architecting security
Our product is a cost-effective COMPETITIVE ADVANTAGE designs.
and simple-to-use platform for
Our customers gain independence
harmonizing practices and involving Kai Kempas
from software library vulnerabilities,
all parties. Compared to other kai.kempas@xcure.fi Matti Tommiska
operating system security breaches,
available solutions, our product saves +358 400 362 997 and processor bugs and weaknesses. matti.tommiska@xiphera.com
customers time and money by being www.xcure.fi +358 20 730 5252
closer in accordance with regulations. Most importantly in mission-critical
www.xiphera.com
systems, a hardware-based security
and cryptography implementation
achieves a higher NCSA accreditation
level than a software-based
implementation.
80 81

CYBERSECURITY
AND INFORMATION
TECHNOLOGIES

OUR SOLUTION and OS level vendor backdoors,


weak encryption, meta data privacy
XXLSEC delivers state of the art secure and more. XXLSEC solutions meet
communication system and solutions the modern and future Zero Trust
like Privecall TX, Privebook laptops Architecture security requirements.
and Data Rain tactical system. An
open-source technology platform COMPANY
and protocol is suitable for many
integrators and manufacturers who XXLSEC is a cybersecurity
seek new technologies to improve their company operating in the areas of
security. next-generation IP security and
cryptography combined with secure
BENEFITS FOR CUSTOMERS hardware and software development.
XXLSEC developed Multiparty
XXLSEC technology can deliver Computing (MPC) based security
enhanced security which reduces protocol delivers several benefits in
critical cyber threats and creates all IP connected environments like
better resiliency and cost efficiency IoT, critical communications together
compared to current legacy securi­ with network and end point security.
ty-based systems. We are focused on enhancing legacy IP
security solutions with technologies
COMPETITIVE ADVANTAGE that meet the requirements of modern
XXLSEC communication and security hyper-connected systems.
technology enables a security level
that commercial-off-the-shelf (COTS)
devices do not reach. As an example, Arimo Koivisto
Privecall TX secure communication arimo.koivisto@xxlsec.com
device is protected against typical +358 400 835 744
COTS threats like phishing, spyware, www.xxlsec.com
malware, rogue applications, hardware
82 83

ACTIVE STRONG
PARTNERSHIPS

STAKEHOLDERS CREATE DIGITAL


TRUST THROUGH

IN FINLAND’S
TECHNOLOGY-BASED
ECOSYSTEMS BUILT
AROUND SHARING
CYBERSECURITY AND COOPERATION.

ECOSYSTEM

NATIONAL CYBER SECURITY


CENTRE (NCSC-FI)
03.07.2020

CONTACT
INFORMATION
Business Finland
Kirsi Kokko, Head of Digital Trust
Finland program
kirsi.kokko@businessfinland.fi
+358 50 550 2023
www.businessfinland.fi/en/
digitaltrust

Mika Susi, Executive Director


mika.susi@fisc.fi
+358 50 349 5008
www.fisc.fi/about-fisc/

Notice: The information contained in this


publication is collected from various sources and
provided for your information only.
Business Finland does not assume any liability for
the accuracy and completeness of the information.

BUSINESSFINLAND.COM
FOLLOW US ON SOCIAL MEDIA

Porkkalankatu 1 | FI-00180 Helsinki, Finland | Tel. +358 29 469 51

You might also like