Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

F-Secure continues on growth track, offering an unrivaled service portfolio to operators

F-Secure reports revenues up by 16% in the first half of 2009 and the acquisition of its partner Steek, a rare feat in these financially trying times. With the acquisition, F-Secure’s Value Added Service portfolio to operators is now unrivaled.
  • 29 July, 2009 10:26

<p>F-Secure today announced its financial results for the first half of 2009. Total revenues were at a record 62.3 million euros, showing an increase of 16% from the first half of 2008. Earnings before interest and taxes were 14.1 million euros, which is up 32% from the same period the previous year, solid growth figures in the current economic climate.
In addition, the acquisition of Steek, a leading European software provider for online storage and data management solutions to fixed line and mobile operators in July allows F-Secure to provide operators with a full range of Value Added Services that they in turn can offer their customers.</p>
<p>This Software as a Service (SaaS) business model has been a strong growth driver for F-Secure since the year 2000. 
F-Secure has pioneered the model in the field of IT security with its network of over 200 operator partners, the largest of its kind in the industry, and is now extending its offering to the fields of data storage and sharing.</p>
<p>Kimmo Alkio, CEO of F-Secure said: “The Software as a Service business model delivers great value to our customers and partners. Even in this time of economic uncertainty, the SaaS model is gaining momentum. As proof of this, we saw our operator business in grow by almost a third, it was up 29% from the first half of 2008.”</p>
<p>Based on its experience in the SaaS business model, F-Secure anticipates that both the customer benefits (e.g. lower total cost of ownership) and attractive partner business benefits (e.g. lifetime revenue share) will accelerate the adoption of the model compared to traditional acquisition of software as a product. The consolidation of Steek’s online storage, backup and sharing technology strongly supports F-Secure’s pursuit of driving innovation and growth for Internet-related services.</p>
<p>“By bringing the Steek technology and operator partnerships into F-Secure, we are further strengthening our competitive position in the SaaS markets. The rapidly developing online storage market gives us great opportunity to accelerate our operator revenue growth. Our target is to be the leader in providing security and related value-added services to consumers through operators. With our latest acquisition, we are well on our way,” Kimmo Alkio stated.</p>
<p>For the full F- financial results for the first half of 2009, please go to:</p>
<p>About F-Secure Corporation</p>
<p>Innovation, reliability and speed of response – these are the qualities that have made F-Secure one of the world’s leading IT security providers since the company was founded in 1988. Today F-Secure’s award-winning and easy-to-use products are trusted in millions of homes and businesses around the world. We provide powerful real-time protection that works quietly and smoothly in the background, so computer and smartphone users can enjoy the benefits of connected life to the full. F-Secure’s solutions are available as a service subscription through more than 200 operator partners around the world, making F-Secure the global leader in this market. F-Secure has been listed on the NASDAQ OMX Helsinki Ltd since 1999. The company has consistently been one of the fastest growing publicly listed companies in the industry. The latest news on real-time virus threat scenarios is available at the F-Secure Data Security Lab weblog at</p>

Most Popular

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Media Release

More media release

Market Place