CYBER­ SECURITY FROM

FINLAND OFFERS WORLD-CLASS EXPERTISE IN CYBERSECURITY SOFTWARE, HARDWARE, DIGITAL SERVICES AND PARTNERSHIPS 2 3

TABLE OF CONTENTS

CONTENTS WHY FINLAND?...... 4 SOLUTIONS FOR ALL INDUSTRIES...... 6 FINNISH STRENGTHS ...... 8 COMPREHENSIVE DIGITAL RESILIENCE...... 10 FINNISH CYBERSECURITY RESEARCH LANDSCAPE...... 12 FINNISH COMPANIES OFFERING CYBERSECURITY SOLUTIONS ...... 14 ACTIVE STAKEHOLDERS IN FINLAND’S CYBERSECURITY ECOSYSTEM...... 82 4 5 WHY FINLAND?

FINLAND IS A SAFE, SECURE AND TRANSPARENT SOCIETY. WE ARE ALSO ONE OF THE GLOBAL LEADERS IN #1 CYBERSECURITY. IN AVAILABILITY OF LATEST TECHNOLOGIES WORKING TOGETHER NATIONAL CYBERSECURITY WORLD ECONOMIC FORUM GLOBAL COMPETITIVE INDEX 2017–2018 STRATEGY SETS STRATEGIC BASE A flourishing company ecosystem, combined with a stable and SOUND REGULATORY FRAMEWORKS ICT-oriented society, supportive legislation and strong support for ACTIVE COLLABORATION data privacy, makes Finland the ideal WITH PUBLIC AND PRIVATE country for cyber and information STAKEHOLDERS security businesses. In all, the country offers reliable and transparent ways of TOP RESEARCH IN FOCUS DOMAINS working. #1 #1 IN DIGITAL THE MOST STABLE WORLD-CLASS ICT AND USING THE LATEST CYBERSECURITY COMPANIES TECHNOLOGY COMPETITIVENESS COUNTRY TH Finland is one of the leading countries IN THE EU IN THE WORLD FOR THE 14 in data privacy and threat prevention DIGITAL ECONOMY AND SOCIETY YEAR IN A ROW INDEX 2019 LEADING BY EXAMPLE solutions and identity management. BY THE FUND FOR PEACE, We are known for many fundamental FRAGILE STATES INDEX 2019 Finland’s strong tech expertise, high cybersecurity technologies essential education level and vibrant startup to cyber and information security. scene contribute to an attitude of innovation, putting us at the forefront of digitalization, communication technologies and smart & clean technologies. The Finnish cyber­ security scene is outlined by the #1 #3 National Cybersecurity Strategy. IN BEST BUSINESS IN MOST INNOVATIVE ENVIRONMENTS COUNTRIES IN THE WORLD IN THE WORLD GLOBAL INNOVATION INDEX 2019 BLOOMBERG INNOVATION INDEX 2019 6 7

SOLUTIONS FOR MARITIME MANUFACTURING ALL INDUSTRIES

FINLAND OFFERS A STABLE BUSINESS ENVIRONMENT WITH A SECURE AND TELE­COMMUNICATIONS PREDICTABLE DIGITAL SOCIETY.

Customers of Finnish cybersecurity Cybersecurity also provides a companies cover business verticals, central supporting role in public and ranging from the energy sector and private healthcare and governmental heavy manufacturing industry to bodies. Research and comprehensive the telecom sector and municipal education foster methods and tech­ infrastructure. Solutions reach from nology to tackle security challenges in software and hardware products to organizations. digital services and partnerships. HEALTH DEFENSE AND Source: Company survey on cybersecurity services, Business Finland and FISC, 4/2020 SECURITY

TRAFFIC AND CRITICAL LOGISTICS ­INFRASTRUCTURE

BANKING AND SMART CITIES FINANCE 8 9 FINNISH STRENGTHS

FINNISH CYBERSECURITY INNOVATIONS ARE ROOTED IN THE STRONG COMPANY ECOSYSTEM AND ICT-ORIENTED SOCIETY

CRITICAL INFRASTRUCTURE IDENTITY MANAGEMENT PROTECTION OF THREAT DETECTION PROTECTION HEALTH DATA AND PREVENTION Strong authentication Protection of critical supply Digital identity management Data integrity Virus and malware protection networks Data access management Patient privacy Advanced persistent Security operations centers threats (APTs) Role-based access control Secure data flows Common security policy frameworks Nationwide monitoring and early warning systems Guaranteed supply availability

INTEGRITY OF CYBER SOLUTIONS DEFENSE AND SECURITY TELECOM AND FINANCIAL DATA FOR INDUSTRY MOBILE SECURITY Secure critical communication Continuous monitoring Third-party access management Situational awareness Secure communications infrastructure Secure reporting IoT and sensor security Anomaly and intrusion detection Secure 5G network System integrity Manufacturing plant control Cryptology Secure mobile devices Regulatory compliance Maritime traffic and Anti-tamper services security control 24/7 monitoring and detection capabilities 10 11

FINNISH COMPANIES OFFER WORLD- COMPREHENSIVE CLASS EXPERTISE IN DIFFERENT AREAS DIGITAL RESILIENCE OF CYBERSECURITY WHAT WE OFFER

IDENTIFY PROTECT DETECT RESPOND RECOVER We help your organization We develop and implement We develop and implement We develop and implement We develop and implement develop an understanding appropriate safeguards to appropriate measures to measures to help you respond appropriate activities to of your IT infrastructure reduce the IT attack surface, identify the occurrence of appropriately to detected maintain plans, processes and and cybersecurity position ensuring confidentiality, cyberattacks. cybersecurity incidents. resources for IT resilience. to enable you to manage integrity, availability and We restore any capabilities or cybersecurity risk to systems, auditability as well as the services that were impaired people, assets, data and performance of critical IT by cybersecurity or other capabilities. services. incidents.

OUR SOLUTIONS

Risk management, Identity management, Anomaly detection, Improvements, mitigation, Communications, asset management, business awareness and training, continuous­ security analysis, communications, improvements,­ business environment analysis data security, information ­monitoring, detection planning response continuity and recovery protection processes, processes planning maintenance, protective technology COMPANIES

Cyberwatch Bittium Redicom Arctic Insta F-Secure 2NS Flashtec Crosshill SSH Security Leijona Fujitsu Cyberwatch Granite GRC CSIT Tosibox Audico Security Netox Flashtec Solita Digia Vorna ID BaseN Rugged Netum Granite GRC VTT Tooling Efecte Cinia Nixu KPMG Xiphera Savox Insta Cyber TietoEVRY NXme Hedgehog XXLSEC Jetico Cybersec KPMG CySec Ice Wall Mideye Elisa NXme 12 13

TRUST AND REPUTATION SYSTEMS FINNISH SECURITY ANALYSIS QUANTUM-SAFE CRYPTOGRAPHY CYBERSECURITY BEYOND 5G COMMUNICATIONS SECURITY SECURITY ISSUES FOR SOCIETY RESEARCH SOFTWARE SECURITY ASSURANCE LANDSCAPE NETWORK ATTACKS AND DATA ANALYSIS SECURITY OF THE INTERNET OF THINGS CONTEXTUAL SECURITY CYBER RANGES AND TRAINING IDENTITY AND ACCESS MANAGEMENT SECURITY METRICS SECURITY OF AUTONOMOUS SYSTEMS AND TRAFFIC BIOMETRIC RECOGNITION SECURITY AND PRIVACY BY DESIGN MOBILE PLATFORM SECURITY SOFTWARE SECURITY TESTING SECURITY MONITORING AND ENFORCEMENT CYBER AND NETWORK SECURITY CYBERSECURITY MANAGEMENT 14 15

BUILDING AN INNOVATIVE INFORMATION- CYBERSECURITY SECURE FUTURE SERVICES

OUR SOLUTION COMPANY OUR SOLUTION COMPANY 2NS offers information security Second Nature Security Oy or 2NS is an Accenture Security helps organizations Accenture Security meets clients services on a broad scale that covers independent cybersecurity company build cyber resilience from the inside wherever they are on their paths to technical information security and with experience from over 2,000 out, from business to IT, so they can change – in every industry across information security management, projects. focus on innovation and growth. the globe – and partner with them to including testing, auditing, consulting create lasting value. and training. With our diverse BENEFITS FOR CUSTOMERS expertise, we are able to answer Mika Holmberg Leveraging its regional Cyber our customers’ unique needs and Niko Marjomaa [email protected] Fusion Centers, a global network of act as partners in managing their +358 40 843 9412 cyber­security labs, deep industry [email protected] information security challenges. www.2ns.fi understanding and services that span +358 50 354 6643 BENEFITS FOR CUSTOMERS the security life cycle, Accenture www.accenture.com/security protects an organization’s valuable The main elements of our operations assets from end to end. are solid expertise, flexibility, professionalism and an aim to build an COMPETITIVE ADVANTAGE information-secure future. The heart With services that include strategy of our operation is built on a passion and risk management, cyber defense, for information security and customer digital identity and application satisfaction. We base our operations security, we enable businesses around on real partnerships with our clients the world to defend themselves against – making it easy for them to rely on us. known sophisticated threats and the unknown. 16 17

DETECTING STATE-OF-THE-ART VULNERABLE CONTROL ROOM SERVICES MANAGEMENT

OUR SOLUTION COMPETITIVE ADVANTAGE OUR SOLUTION COMPANY Arctic Security helps customers detect Our products use over 150 observation Audico is the most influential Audico’s operations cover Finland and incidents faster, catch otherwise sources to match data with the exact audio-visual (AV) integrator in Finland, Sweden. We are an important partner unnoticed issues and monitor your victims. This creates precision-filtered, made up of specialists. Our technology for several high-tech equipment supply chain with ease. This enables real-time and actionable data with expertise also produces voice recogni­ manufacturers, including visual you to gain situational awareness of easy integration into ticketing and tion systems for international needs. systems, audio, keyboard, video and active threats across industries and security systems. Our solution can be mouse (KVM), control and monitoring geographies. delivered on premise, in the cloud or as BENEFITS FOR CUSTOMERS system manufacturers. a managed service. BENEFITS FOR CUSTOMERS The main benefits for customers are COMPANY our network-controlled control room Jukka Oksanen Our products enable national and solutions and display technology commercial security providers to For over 10 years, Arctic security has expertise. We have information on all [email protected] automate victim notification for their worked with its customers to automate available solutions. +358 20 747 9392 customers. We also help enterprises victim notification. We help you find www.audico.fi/fi/valvomot monitor their networks and supply and fix issues that have slipped by and COMPETITIVE ADVANTAGE chain. Too often, victims are not aware reduce their risk. We execute and direct several projects of their compromised and vulnerable simultaneously. We have grown to machines or any malicious activity become one of the largest specialists originating from their networks. This Virpi Koivumaa in the field. information, known as cyber threat [email protected] intelligence, is beyond the capabilities www.arcticsecurity.com of normal security solutions. With our products you can receive and issue timely notifications of incidents, cutting damages and stopping malice. 18 19

SECURITY IN ALL FULL-STACK ENVIRONMENTS SITUATIONAL AWARENESS

OUR SOLUTION The system can be used in both mili­ tary and civil applications all over the Aufwin Perimeter Scout is an world. Due to the highly sophisticated AI-controlled autonomous perimeter AI, all perimeters secured with Aufwin OUR SOLUTION COMPETITIVE ADVANTAGE security and surveillance system ca­ Perimeter Scout are safe and sound, BaseN’s industrial-strength Software- BaseN Platform is the most scalable, pable of sending alarms, responding, allowing all our clients to focus on as-a-Service (SaaS) is designed mission-critical, resilient and reliable identifying and acting on identified other, more relevant matters. for multi-tenancy. It is capable architecture on the market. objects that have breached the secured of measurement, monitoring, storage, perimeter. The system offers 24/7 COMPANY analysis and control functions, such COMPANY surveillance of air, sea and ground. as distributed software upgrades, Aufwin Defence Ltd is a family-owned BaseN, established in 2001, is a network management for large company providing security and global IoT operator, enabling the BENEFITS FOR CUSTOMERS complex end-to-end networks and surveillance applications for a wide transformation from a product to remote equipment control, including Our system is based on wireless sen­ range of industries all over the world. service business within any industry. power consumption control based on sors, drones and artificial intelligence Quality, precision, reliability and The company’s customer base time-of-use pricing. that recognize unidentified objects effectiveness are fundamental to all includes energy, manufacturing and within the secured perimeter. The our products and services. BENEFITS FOR CUSTOMERS other heavy industries evolving from system either alerts a system unit, product sales into digital services. Aufwin Defence – security in all such as a drone, to further examine BaseN’s service allows easy mass environments. the identified intruder or sends an customization for millions of end alarm directly to security personnel. users. As a full-stack IoT operator, Corina Maiwald COMPETITIVE ADVANTAGE Antti Auvinen BaseN controls the full value chain. [email protected] Customers can fully focus on creating +358 45 639 0034 [email protected] Aufwin Perimeter Scout is highly new revenues streams by developing www.basen.net flexible and can be used in individual +358 44 354 0678 services on top of the BaseN Platform. units – for example, using only the www.aufwindefence.fi wireless seismic ground sensors. It can identify animals, humans, vehicles and any other moving or static objects, living or man-made, within the secured perimeter. 20 21

AUTOMATED IOT ULTRA-SECURE CYBERSECURITY SMARTPHONES

binaré OUR SOLUTION COMPETITIVE ADVANTAGE OUR SOLUTION COMPETITIVE ADVANTAGE Binaré offers Software-as-a-Service Binaré is a deep-tech spinoff from the Bittium provides ultra-secure For the defense and security market, (SaaS) automated solutions for IoT University of Jyväskylä, which boasts smartphones for professionals with Bittium provides the most modern cybersecurity, research, development more than a decade of cybersecurity the highest security requirements. For products and solutions for tactical and and technology innovation services, as research vision and experience. Binaré complete end-to-end mobile security, secure communications. The products well as an extensive range of related is backed by UniFund investment we complement secure smartphones and solutions for tactical communica­ consulting, training and advisory and is supported by the Jyväskylän with our device management and tions bring broadband data and voice services. Yritystehdas incubator. encryption software. to all troops across the battlefield. To ensure secure communications, To improve the efficiency of authorities BENEFITS FOR CUSTOMERS COMPANY we offer proven mobile devices and and other organizations, Bittium also cybersecurity solutions certified up to Binaré enables you to improve your Binaré offers both automated provides monitoring and reporting the confidential level. IIoT/IoT cybersecurity ROI and solutions and professional services to software to gather data on the factual posture. We help you reduce costs meet your needs for IoT cyber­security service level experienced by the device COMPANY and maintain your reputation by and privacy. Our professional fleet. pro-actively using our solutions and advisory services leverage our unique Bittium specializes in the development services. feature-rich SaaS platform and our BENEFITS FOR CUSTOMERS of reliable, secure communications team’s top international expertise and connectivity solutions leveraging You can cybersecure your Our services ensure encrypted mobile to offer cybersecurity services, such its over 30-year legacy of expertise entire IoT life-cycle, covering access to sensitive data and services as penetration testing and detailed in advanced radio communication design, development, testing, of organizations. We offer a single cybersecurity assessments for IIot/ technologies. Net sales in 2019 were certification, deployment, operation solution for both professional and IoT/embedded devices, firmware and EUR 75.2 million and operating profit and decommissioning. We can also personal mobile communication. software. was EUR 6.3 million. Bittium is listed help your company become compliant Our device’s long lifespan enables on the Nasdaq Exchange. with regulatory and certification the integration and certification of requirements. Andrei Costin governmental services. Sammy Loitto This gives you an opportunity to [email protected] We offer a secure platform for engage with a professional team of +358 40 805 5150 partners with their own cybersecurity [email protected] internationally renowned researchers www.binare.io applications and solutions. Our trusted +358 40 833 5277 and experts. design is manufactured in Finland. www.bittium.com 22 23

CYBERSECURITY FOR OVER-THE-AIR YOUR EXACT NEEDS MANAGEMENT AND SECURITY

OUR SOLUTION COMPETITIVE ADVANTAGE OUR SOLUTION COMPETITIVE ADVANTAGE Brighthouse specializes in offering We work with our customers and build The Capricode SyncShield product Our international team is building a large variety of cybersecurity innovative solutions by combining in­ secures online data transfer and the SyncShield product to take over solutions. Since we are not tied to any dustry knowledge and heavy hands-on automates all over-the-air device the connected devices security certain solution manufacturer, we can experience in complex R&D projects. management operations. Imagine if market. As a company, we offer our create cybersecurity architecture and you could step into a shared car and core technology in three different design specifically for your needs. We COMPANY still have your own preferences and segments: automotive, industrial IoT also have experience in implementing paid services automatically adjusted and secure communications. Brighthouse offers a one-stop-shop and maintaining the solution, whether so that it would be just like your own. for building digital solutions for The SyncShield product will offer it is public key infrastructure (PKI), Our solution provides a powerful and remote and autonomous applications, revolutionary technology to manage cryptography, intrusion detection with elegant way to secure, update and including situational awareness, connected cars. Our value proposition machine learning or software signing monitor connected devices. connectivity and cybersecurity is to be generating a return of to protect system integrity. solutions. Our services cover the BENEFITS FOR CUSTOMERS investment more than 350% per BENEFITS FOR CUSTOMERS full R&D lifecycle, from innovation year – in savings alone – compared to and prototyping to development and The Internet of Things (IoT) enables the traditional manual approach for Our capabilities include threat maintenance – indoor, outdoor and devices to communicate and share updating device software. analysis, vulnerability scanning of offshore. data with the surrounding world in devices and systems, creation of a cyber-secure way. This change is security policies, procedures and disrupting the value-creation process Tero Takalo accreditation documents and usage of Markku Sahlström in the automotive and industrial [email protected] hardware security modules. IoT industries, as manufacturers [email protected] +358 40 722 9007 compete in a new ecosystem game +358 40 745 6599 www.capricode.com www.brighthouse.fi and become service companies. In the current massive market disruption, European device manufacturers need to digitalize their manual processes. 24 25

CYBERSECURITY 24/7 CYBERSECURITY LABORATORY AT MONITORING YOUR SERVICE

OUR SOLUTION service is made up of skilled personnel, efficient and appropriate Protecting digital infrastructure processes and procedures, and It runs around 100 research and OUR SOLUTION requires 24/7 cybersecurity modern cybersecurity technology. development projects each year. monitoring and detection capabilities. Centria cybersecurity laboratory is a Our project managers have strong The Cinia Security Operations Center We also provide additional closed and secure research and test experience with local, national and (SOC) Service enables detection cybersecurity services, such as firewall environment. We have secure remote international funding sources. We have and prevention of cyber threats management and DDoS protection. access and the necessary software and a great network of partner universities and attacks in a customer’s ICT devices to detect deficiencies. around the world. environment. Cinia SOC Service COMPANY Virtualization allows adjustable RESEARCH AND EDUCATION capabilities detect cybersecurity Cinia is a Finnish data communications hardware, operating system and events and incidents, respond to and information technology environment configurations. It can During its research history, Centria incidents, manage cyber threats conglomerate, providing a network, be combined with real hardware for has studied cases of connected cars, and vulnerabilities, and manage software and cybersecurity services. testing purposes if necessary. critical infrastructure, artificial intel­ information security systems. We act as a telecommunications ligence, industrial automation, IoT, operator and produce wide range of Thorough lab testing BENEFITS FOR CUSTOMERS reveals possible issues and smart homes and many more. We ICT expert and connectivity services, whether they are software or hardware also provide training in cybersecurity We provide 24/7 monitoring and as well as development services for related. The laboratory is also fully awareness, privacy-related issues and detection with a minimized response IT-intensive systems and software. information security management. equipped for wireless network testing, time. This leads to faster business We operate our own including all common wireless continuity and decreased image and telecommunications networks and protocols. We also provide on-site reputation risks. Marjo Heikkilä networks owned by our customers. vulnerability assessment. As a rule, our customers are socially [email protected] COMPETITIVE ADVANTAGE important service providers. BENEFITS FOR CUSTOMERS +358 44 449 2507 Our high-skilled SOC experts help www.centria.fi The Centria University of Applied customers identify, prevent and Anssi Kärkkäinen Sciences is an international higher resolve cybersecurity events and education institution, which offers disruptions quickly and efficiently, [email protected] an innovative and multicultural thereby ensuring business continuity +358 50 544 1294 environment for students and staff. and system recovery. The Cinia cSOC www.cinia.fi 26 27

HIGH-SECURITY IDENTITY AND ACCESS EMBEDDED SYSTEMS MANAGEMENT AND TESTING

OUR SOLUTION COMPETITIVE ADVANTAGE CSIT Finland develops world-class We have extensive experience in the identity data and master data man­ identity and access management agement software to deliver complete (IAM) area. Our solutions are OUR SOLUTION COMPETITIVE ADVANTAGE identity and access management developed with our customers and in Crosshill provides advanced security We have extensive experience in solutions. Undisputed and accurate various international research and and attack testing services to evaluate advanced microelectronic systems digital identities are increasingly development projects. Our modular the overall security level of embedded that lay the foundation for COMSEC critical to any organization. This allows identity and access management systems and devices. State-of-the-art and cryptographic equipment, such people to have secure, proficient solutions can be utilized in several passive and active testing methods are as FPGAs, SoCs, DSPs, TPMs and access to solutions and devices domains, such as the management used, including side-channel analysis, cryptoprocessors. Our know-how anytime, anywhere and using any of physical access control systems, cryptanalysis and electromagnetic especially covers encryption devices device. Beyond people’s identities, Internet of Things (IoT) devices and spectrum analysis. and critical communication systems. IoT and AI identities also need access artificial intelligence (AI) software rights management. components. Our anti-tamper services focus on COMPANY silicon, sensor and mechanical-level BENEFITS FOR CUSTOMERS COMPANY protection mechanisms to protect Crosshill designs and manufactures classified information and sensitive high-security embedded systems Our identity data and master data CSIT Finland Oy is a security and IPs. for military, aerospace and telecom management software is top class. services-oriented Finnish software customers to create secure and You can automatically connect company specializing in identity BENEFITS FOR CUSTOMERS attack-resistant solutions. All any identity data source into it. and access management (IAM) systems developed are protected Identity data quality is controlled, and solutions. We deliver complete We help companies protect against and against modern­ attack and tampering identity data is enriched using our platform-independent solutions and avoid security breaches, operational methods to guarantee the security management console. life-cycle services to customers in the damage and unpredictable financial and operational capabilities in all healthcare, educational, public and losses. Our passion is to keep our Role-based provisioning is automatic circumstances. private segments. customers one step ahead with for any internal or external solution. hardware and software security. Our software is module based to be able to integrate with any access Peik Åström Jouni Hautamäki management solution. [email protected] [email protected] Our constant development provides +358 50 564 6419 +358 50 589 2987 possibilities for new digital identity www.csit.fi www.crosshill.fi areas, like IoT and AI.

28 29

BUILDING SECURITY HOLISTIC CYBER AWARENESS AND CULTURE INSURANCE SERVICES

OUR SOLUTION across the organization. How organizations use and protect data can Our focus is on creating methods have a profound effect on individuals, and tools to build security awareness society and the environment. Privacy, and culture. Our toolkit spans from data ethics, risk management and strategic threat modeling canvases cybersecurity experts are not OUR SOLUTION COMPANY for boards and senior leadership, tools always available. We offer uniquely for measuring security awareness and Cyber Hedgehog helps companies Cyber Hedgehog provides a holistic cross-disciplinary, practical tools and mitigate cyber risks and quickly cyber insurance service from one culture to individual digital cyberse­ frameworks that anyone or any team curity coaching for every employee. recover from cyberattacks. Our digital window for small and in an organization can use to assess cyber insurance covers expenses and medium-sized enterprises. Our fixed Cybersecurity is not an island. Our risks. tools integrate it with privacy, data damages for the business. monthly fee includes cyber insurance with all needed risk mitigation tools. ethics and business ambitions. COMPANY BENEFITS FOR CUSTOMERS BENEFITS FOR CUSTOMERS Cult Security is a security agency Our mission is to help all small and focused on security awareness and Kimmo Aaltonen We build resilient organizations by medium-sized companies protect their culture. We equate a modern [email protected] coaching individuals and teams to use business against cyber threats. cybersecurity culture with an +358 44 981 2231 our tools and develop them further. innovation culture – a culture that COMPETITIVE ADVANTAGE www.cyberhedgehog.com We make cybersecurity awareness fosters great decisions and ideas, interesting and motivating. Our virtual because people are aware, empowered, Our digitalized services and cyber security coach embeds cybersecurity enabled and encouraged by the risk analytics make best-of-breed awareness into one neat continuously organization. Our tools have been cyber protection affordable for small updating dashboard and makes tested in safety-critical and highly businesses. organizational culture measurable. Our regulated sectors from startups to tools allow your entire organization to enterprises. make responsible decisions based on data. Maria Bique COMPETITIVE ADVANTAGE [email protected] A sustainable digital business requires +358 40 557 6798 responsible daily decision-making www.cultsecurity.com 30 31

FOCUSED SECURITY YOUR STRATEGIC PARTNER IN SOLUTIONS CYBERSECURITY

OUR SOLUTION COMPETITIVE ADVANTAGE Cyberwatch Finland offers strategic Our mission is to secure the functions cyber security solutions for state-level of critical infrastructure as well as pro­ operations, the private sector and tect your organisations most valuable international organisations, based on assets. We help to develop a cyber OUR SOLUTION COMPETITIVE ADVANTAGE a holistic view of the cyber world and security culture that strengthens your hybrid threats. We also provide cyber organisation’s resilience to crises and Cybersec Oy is a trusted partner in Cybersec and its partners provide security strategies, risk analysis and reduces business risks. We provide a delivering focused security solutions the most advanced cybersecurity action plans. holistic view and understanding of the and services requested by the cyber services and products in the market. interdependence of people, practices community. Our key expertise includes digital risk Our analysis give you strategic and technology, and the development management, cyber intelligence and situational awareness to support your opportunities they offer. BENEFITS FOR CUSTOMERS anomaly detection. management and decision-making. Additionally, we offer modern Our technologies help customers COMPANY education with e- learning and understand and keep up situational Jyrki Jääskeläinen hybrid-learning methodologies. Cyberwatch Finland´s strategic-level awareness and get early warnings international expertise is based on of threats targeted against the [email protected] Our scope of delivery includes experience and an extensive network organization. +358 40 742 7012 innovative and unique cyber security of experts. We have the ability to www.cybersec.fi technologies. interpret and present complex cyber world phenomena and developments BENEFITS FOR CUSTOMERS in an easy-to-understand format. Our clients can establish a holistic cy­ Our mission is to be our clients most ber security strategy, build situational trusted partner. Therefore, we are awareness across the organisation, constantly looking for the best ways and take the necessary measures to to create a credible strategic cyber build cyber resilience. security roadmap to guide your cyber security to the highest possible level. Improved situational awareness is the basis for better decision-making. Kirsi Toppari We provide comprehensive roadmap [email protected] for building a realistic cyber culture +358 40 725 6886 and cyber hygiene for your entire www.cyberwatchfinland.fi organisation. 32 33

SECURING YOUR SECURE GLOBAL NETWORK DATA COMMUNICATIONS

OUR SOLUTION COMPETITIVE ADVANTAGE OUR SOLUTION COMPANY Now you can know in detail what has CySec Vault™ delivers authentic Deltagon provides secure email Deltagon develops information happened in your network – when evidence and is a necessary addition messaging. Our email encryption security solutions for electronic and how! CySec offers a patented to existing security systems. It is solution secures the confidential communications and electronic solution to acquire network payload completely invisible to other networks data in your organization’s email services across a wide range of and preserve all data safely for a very and does not disturb the normal communications. industries – from the financial long time. Roll it out as you need network use in any way. sector to public administration – it, from a single installation to a BENEFITS FOR THE CUSTOMER and everything in between. full-scale multi-tenant, multi-company COMPANY For the user, securing emails is Deltagon Group Oy was established investigation and provability system Data integrity, access, audit trail, and simple and fast. In addition, it is in 1999. Deltagon is part of (I&PS). With the Evidence Gateway, chain of custody are preserved by the possible to prevent information leaks Erillisverkot Group. When you are in the solution is fully compatible with security of CySec’s patented solution. due to human error and comply with need of market-leading expertise in the Network Evidence Reference and Prepare to find out the whole truth with information security guidelines in communication confidentiality, we Discovery Model. our CySec Vault™. Whenever needed, email communications. can provide solutions to match your BENEFITS FOR CUSTOMERS analysts or AI may discover relevant company’s needs. authentic evidence and prove what COMPETITIVE ADVANTAGE It is vital for information governance has happened with the original data. A secure data sharing service makes to manage the authentic network Finding the root cause is a prerequisite Jyri Vikström it possible to share files and have evidences and the CySec Vault™ for successful corrective actions. discussions among a group. Sharing [email protected] system correctly. To accomplish secure workspace information is easy +358 40 766 0050 this, we offer the Network Evidence using our secure communication, www.deltagon.com Reference & Discovery Model and Heikki Kamppuri safe file sharing and other convenient information governance training for [email protected] collaboration tools. Creating network evidence management. Find +358 40 763 7474 workspaces is easy. Both internal and out the whole truth. www.cysec.fi external users may be involved. 34 35

EMAIL SECURITY INNOVATIONS FOR AND GDPR SERVICES MODERN SECURITY

fence your first line of defense

OUR SOLUTION COMPANY OUR SOLUTION COMPANY D-Fence’s eSec email security service Founded in 2000, D-Fence is the Digia integrates different stakeholders Digia is a Finnish software and service protects businesses from malicious leading email security provider in by developing and innovating company that helps its customers content, spam and other intrusion Finland. Growing and medium-size solutions that support collaboration renew themselves in the networked attacks. enterprises, as well as public admin­ within and between high-security world. Digia is a trusted partner in the istration agencies, use our proactive systems. We have our own specialized high-security and emergency supply BENEFITS FOR CUSTOMERS services. The company was founded in product and service portfolio for sectors. 2000. With the help of our centralized customers requiring the highest level Our Easy GDPR service is a security services, our customers’ of security. governance platform for any company email communications are protected Markus Asikainen to prove their GDPR compliance from spam, viruses, malware and BENEFITS FOR CUSTOMERS and ­accountability. All necessary [email protected] other intrusions. Our services block documents are already prepared, so Digia’s offering covers all layers +358 50 462 1259 them before they can arrive at our it’s easy to put them into use. of ­digitalization, including digital www.digia.com customers’ workstations. services, operational systems, COMPETITIVE ADVANTAGE integration and API solutions, as well as solutions for data management and With 20 years of experience in Juha Oravala analytics. the cybersecurity sector, we offer [email protected] preventive solutions against threats. +358 40 848 1245 COMPETITIVE ADVANTAGE www.d-fence.eu We ensure smooth operations and implementation according to our customers’ needs through consulting and service design. We ensure that critical solutions function 24/7/365 – also in exceptional situations and against cyberattacks. 36 37

SOLUTIONS FOR IDENTITY AND ACCESS MANAGEMENT

OUR SOLUTION COMPETITIVE ADVANTAGE Efecte IAM is the perfect solution for All of Efecte’s solutions are deployable automated and compliant identity and in different cloud models, including access management (IAM), working private clouds or our standard cloud. seamlessly with all enterprise services. For specific customer needs, it is also Efecte IAM provides organizations possible to deploy the solution to with prebuilt workflow automation, on-premise environments. real-time governance capabilities and user self-service for identity COMPANY and access requests, dramatically Efecte is a European alternative, increasing the speed of IAM ­offering cloud-based service administration processes. management and identity BENEFITS FOR CUSTOMERS management software to help organizations digitize and automate The powerful entity model and flexible their work. platform allow Efecte IAM to be used from simple entry-level IAM to the most complex, multi-tenant and Milla Kuosmanen multivendor environments. [email protected] The solution baseline is an excellent +358 40 510 7841 starting point for designing approval www.efecte.com chains and offerings, while ensuring that the necessary restrictions are met. Efecte IAM enables automation of the entitlement processes and provides business-centric services to manage the lifecycle of identities. 38 39

MODERN CYBER YOUR DIGITAL SECURITY SOLUTIONS SERVICE PROVIDER

OUR SOLUTION security solutions that fit customer OUR SOLUTION can be commissioned in less than a business needs. We also have the month, already providing significant Elisa Cyber Security Center provides ability to provide­ information Emtele’s cyber defense solution improvements for the data security of 24/7 cyber security monitoring, security capabilities and services to automates the operation of a cyber­ the system. analysis and response service with our customers’ ICT infrastructure. security center and replaces data additional consulting for all aspects of Our operational 24/7 cybersecurity security specialists with automated COMPANY cyber and information security. center service detects, analyzes and processes that are supported by the When the company was established, mitigates cyber incidents that poses expertise of Emtele. The development customers wanted Emtele to join their BENEFITS FOR CUSTOMERS a risk to the customers’ business of our solution is based on the Defence Forces’ requirements. For strategy work. New business concepts From detection to response – speed continuity. example, a warship must be capable of were based on remote monitoring of is the key. Elisa’s expertise and defending itself against cyberattacks machinery and devices, focusing on capabilities in networks, IT and COMPANY independently without dedicated data device service, maintenance prediction cloud environments allow us to offer During our nearly 140-year history, security specialists on board. and business process automation. faster mitigation of security-related we have always been enthusiastic Emtele offers a business ecosystem issues. We combine best-­in-­breed about utilizing new technologies and BENEFITS FOR CUSTOMERS capable of providing comprehensive technologies with skilled cyber experts ways of working. Elisa is a recognized solutions. Customers can now specify and processes that enable faster mit­ international provider of digital Quick and reliable responses to data a turnkey solution and sign a long- igation through modern technologies, services and a brand of excellence. We security incidents. The extent and term service agreement with only one automation and incident response with now serve over 2.8 million customers impact of an attack can be minimized provider, us. This agreement defines skilled cyber security experts, tried in Finland, Estonia and internationally. immediately. the responsibilities for the operational and true processes enabling faster and Our core values in all our business are We provide cost effectiveness. Tradi­ reliability and solution usability, as more effective detection, analysis, customer orientation, responsibility, tional, expensive cybersecurity centers well as its scalability for future needs. mitigation and remediation – ensuring renewal, results orientation and are not needed. These can be replaced New development needs can be agreed your business resilience. collaboration. with rules-based automation and the upon within the service agreement. COMPETITIVE ADVANTAGE client’s personnel who are instructed Ilari Karinen by the system when necessary. Kai Rauhamäki Elisa is in a unique position to provide end-to-end cybersecurity capabilities [email protected] We ensure quick implementation [email protected] for corporate customers. This +358 40 820 7048 that can be carried out in phases. +358 50 407 2598 includes designing and implementing www.elisa.fi Extensive proof of concept (PoC) www.emtele.com 40 41

CYBER SECURITY FOR YOUR SECURITY, EMBEDDED SYSTEMS OUR PROFESSION

Flashtec

OUR SOLUTION countries. Therefore, We know the OUR SOLUTION COMPETITIVE ADVANTAGE potential pitfalls in these systems, Etteplan provides industrial equip­ also from the cybersecurity point of Strategy innovation frameworks Endless data collection without ment and plant engineering, software view. Our cooperation with a broad consist couching, training, interactive defining its real business value, leaves and embedded solutions, and technical network of the biggest chip vendors workshops, cyber security analysis and nothing except a just digital waste documentation for the world’s leading means that we have the best possible within cross-company collaboration. yard behind. Our premium simulation companies in the manufacturing tools for our customers. We offer a Gathering data and information from framework prevents the damage and industry. Our services improve the wide variety of cybersecurity services people allows creation of new ideas grants the success. competitiveness of our customers’ from threat modeling to standard and business concepts and protects products, services and engineering gap analysis. We can incorporate your cyber security and digital value COMPANY processes throughout the product chains. cybersecurity as early as the software Flashtec is a strategic partner to coach life cycle. The results of Etteplan’s development phase through and help you turn your innovative innovative engineering can be seen BENEFITS FOR CUSTOMERS DevSecOps. creation into cyber-secure business in numerous industrial solutions and Flashtec helps organizations turn growth. everyday products. COMPANY past mistakes into future strengths, BENEFITS FOR CUSTOMERS Etteplan had a turnover of minimizing the impact and costs and approximately EUR 263 million in gaining insight for the future. Our Juha Remes Cybersecurity has become crucial 2019. Currently, we have more than strategy innovation workshops allow [email protected] for embedded products. We have the 3,400 professionals in Finland, you to merge the cybersecurity risk +358 40 483 5550 know-how and understanding of the Sweden, the Netherlands, Germany, hunt into a new business opportunity www.flashtec.fi underlying systems and possible Poland and China. Etteplan’s shares discovery quest. It is critical to vulnerabilities. With Etteplan, your are listed on Ltd under identify the most valuable bits of data connected machines are secure, the ETTE ticker. to discover the true strategic business and you get a complete audit and value and keep it out of the hands of analysis from our team of industrial cyber criminals and spies. cybersecurity professionals. Mikko Lindström COMPETITIVE ADVANTAGE [email protected] +358 40 772 7881 Etteplan is the biggest embedded www.etteplan.com design company in the Nordic 42 43

KEEPING PEOPLE AND PEACE OF MIND IN A BUSINESSES SAFE DIGITIZED WORLD

OUR SOLUTION We help router manufacturers build better connections. We never stop. It’s Since 1988, F-Secure has been a not an easy job. But nobody works in Fujitsu intelligence-led security Fujitsu helps in selecting the frontrunner in cybersecurity, with this industry for an easy paycheck. gives you the tools and technologies best-suited biometric technology comprehensive, award-winning you need to robustly manage your for your particular budget, environ­ offerings for consumers and COMPANY cyber security. Identify threats ment, requirements and other criteria, businesses. Our cloud-native detection early-on and make routine scanning for optimal results. As a leading Nobody has better visibility into and response capabilities are among of systems to detect vulnerabilities provider and supplier of biometric real-life cyberattacks than F-Secure. the best in the industry. F-Secure before they are exploited. Meanwhile, authentication technology, Fujitsu has F-Secure closes the gap between protects against a wide variety of the external intelligence provides an the expertise and insight to ensure detection and response by utilizing tactics, techniques and procedures overview of current and emerging risks your biometric authentication matches the unmatched threat intelligence used in targeted attacks, as well as as well as your overall cyber security your business requirements. of hundreds of our industry’s best quickly arm defenders with actionable posture. intelligence to help them respond to technical consultants, millions of Fujitsu’s Security Operations Center incidents. F-Secure Consulting pro­ devices running our award-winning As a comprehensive independent (SOC) teams are on the frontline. They vides cybersecurity services tailored software and ceaseless innovations service delivering unrivalled expertise, are monitoring the latest threats, to fit the needs of organizations in artificial intelligence. Top banks, proven methodology and extensive responding to new security standards, working in highly targeted sectors. airlines and enterprises trust our industry experience, Fujitsu Cyber and coming up with the best ways The insight and intelligence of these commitment. to beat the world’s most Security Consulting provides invalu­ to deal with the issues. Every year, assignments are used to update potent threats. With our network of top able insight tailored to your particular they produce a review of the most and improve F-Secure’s endpoint channel partners and over 200 service organizational needs - and with a focus significant recent security attacks. protection, vulnerability management, providers, we’re on a mission to make on protecting your business. They also offer their predictions for cloud protection and breach detection sure everyone has the enterprise-grade the 12 months ahead. cybersecurity we all need. Fujitsu’s Managed Security Services and response products. deliver comprehensive security, in Founded in 1988, F-Secure is listed on one place. Thorough threat protection Tapani Lehtinen COMPETITIVE ADVANTAGE the Nasdaq, OMX Helsinki Ltd. identifies potential risks, mitigates We test the defenses of banks to help any immediate impact and prevents [email protected] subsequent attacks from happening. +358 29 302 5640 them repel thieves looking to steal Jaakko Hyttinen money. We make sure you can check Our full range of professional www.fujitsu.com/fi from anywhere if your flight is on time [email protected] security services and managed and that your plane lands safely. We +358 400 652 552 security services are based on best- advise schools, hospitals and even www.f-secure.com of-breed own and partners’ security cities on how to create safe networks. technologies and products. 44 45

MANAGING SECURITY CYBER RISKS AND ENGAGEMENT COMPLIANCE TRAINING

OUR SOLUTION and the energy sector. Our software OUR SOLUTION COMPETITIVE ADVANTAGE tools already have more than 350,000 Granite is a software platform that users. Hoxhunt’s security engagement Hoxhunt works with Global 2000 manages risks and compliance in training turns employees into a strong organizations from a variety of the areas of cybersecurity and data COMPANY security shield by empowering them industries, such as financial services, protection. Customers can finally with the skills and knowledge to manufacturing, telecommunication, replace cumbersome spreadsheets Granite is a software product identify and report cyber threats. retail and many more, helping with automated workflows and company founded in 2005. Since then, customers educate their employees reporting without the hassle of going our mission has been Our mission BENEFITS FOR CUSTOMERS better and thus reducing risk related after a big enterprise software project. is to develop ready-made software from human error. Hoxhunt training provides gamified We offer an easy approach to customer products that help customers protect simulation – best-in-class, real-time onboarding and good capabilities their businesses and organizations. COMPANY reporting of threats with our unique for customer-specific customization. Our products don’t compete with big incident response module – to equip Hoxhunt is the leading provider of We offer ready-made templates that enterprise software providers but security teams with the necessary security engagement platforms are compliant, for example, with rather provide simpler solutions for intelligence to mitigate attacks and worldwide. ISO27001, NIST and GDPR. those customers that value ease of use, high adoption by their end users breaches faster. and good value for money. BENEFITS FOR CUSTOMERS Tatu Mäkijärvi Numerous organizations count on [email protected] Granite. Our customers include both Teppo Kattilakoski +358 50 376 6291 private companies and public sector www.hoxhunt.com organizations. Our strongest customer [email protected] sectors are government, the finance +358 40 412 4444 sector, manufacturing and process www.granitegrc.com industry, high technology, health care 46 47

SECURITY BEYOND CRITICAL TOMORROW CYBERSECURITY SOLUTIONS

OUR SOLUTION impossible happen by combining our OUR SOLUTION COMPETITIVE ADVANTAGE problem solvers with the needs of the At Huld, we address today’s challenges future, linking the physical with the As a frontrunner in secure digital­ Insta has the ability to combine its by using expertise from business digital and bridging the gap between ization, Insta helps its customers own and its partners’ products with design and digitalization for product today and tomorrow. understand information security risks, expert services and service provision. development services. Digital security identify weak spots, protect critical This allows the flexibility to choose is one of our main business areas. It COMPANY resources and improve their ability to the solution and delivery model that focuses especially on projects where detect and response to cybersecurity meets customer needs. In Finland, information is critical. Huld is a European technology design issues. Our key areas of expertise we protect dozens of security-critical house offering a unique combination include secure identity, network organizations with our cybersecurity BENEFITS FOR CUSTOMERS of software and product development security, cybersecurity awareness and services and solutions. Our products expertise internationally. With us, you consultation services. are in use in over 50 countries. We have a comprehensive under­ build intelligent solutions that last for standing of customers from different tomorrow – and beyond. BENEFITS FOR CUSTOMERS COMPANY industries, such as space, defense and national security, healthcare Insta has more than 30 years Insta Group Oy is an expert in and medical devices, machines and Tarmo Kellomäki of ­experience developing and industrial automation, industrial vehicles, intelligent devices, testing implementing cybersecurity and digitalization, cybersecurity and and measurement, elevators and [email protected] information security solutions. defense technology. With more than lifting equipment, marine and railway. +358 44 562 5222 Customers benefit from our 1,000 employees, we are a reliable www.huld.io comprehensive understanding of long-term partner that develops its COMPETITIVE ADVANTAGE security requirements and needs, as offering in response to the changing well as our wide-ranging expertise and needs of society and customers. We bring more intelligence, security experienced specialists. Our SECaaS and safety to our customers’ business (Security as a Service) models enable – and to the entire world. We make the our customers to focus on their core Marko Hautakangas operations, while we take care of [email protected] cybersecurity. +358 20 771 7111 www.insta.fi/en 48 49

SECURING CONTINUITY SPECIALIZING IN OF YOUR BUSINESS CYBERSECURITY EXPERTISE

OUR SOLUTION crisis management education and training. The ability of suppliers and Jatkuvuuskonsultointi Oy helps subcontractors to manage their own companies and organizations improve disruptions has a critical impact on the continuity management of their the company’s own crisis resilience. business. Our experts have diverse We assess the level of continuity know-how as well as extensive management of these subcontractors experience in tasks in the field. and help them reach an adequate level. A serious crisis can lead to the Our exercises simulate various kinds long-term disruption of production of crises, including cybersecurity RESEARCH AND DEVELOPMENT OUR SOLUTION or service, resulting in the loss of events. The exercise format varies Jyväskylä Security Technology – Our goal is to be an independent revenue, customers or reputation. from tabletop training to interactive JYVSECTEC – is the leading and trustworthy partner helping Careful planning and regular training simulations. independent cybersecurity research, organizations enhance their critical enable a company to cope with development and training center capabilities, expertise and know-how materialized risks and disruptions. COMPANY in Finland. We operate as a part against modern threats. of JAMK University of Applied Jatkuvuuskonsultointi Oy is a privately Our service catalog consists of BENEFITS FOR CUSTOMERS Science’s Institute of Information owned company, which operates cybersecurity exercises, personnel Technology, which guarantees us a Business continuity planning (BCP) from the Helsinki and areas. training, software testing and multidisciplinary network of experts and the exercises organized by The consultants of the company have management consulting as well as at our disposal. Our areas of expertise Jatkuvuuskonsultointi create an extensive experience in their field of accreditation and certification. In the include cybersecurity, incident improved ability to meet difficult expertise. Its customers represent future, we expect to strengthen our response, emerging technologies and situations. The primary parts of various branches of society, including position by increasing our involvement IT technologies. the crisis organization are the the technology industry, energy in European-wide projects and global management team, situational production, electricity distribution, cooperation. awareness team and crisis water supply, health care, education, BENEFITS FOR CUSTOMERS communication team. We have a municipalities and cities, state We work to provide real value for proven method for teaching and organizations and more. our customers and to accelerate Jarno Lötjönen testing each procedure. ­technological development and [email protected] preparedness against modern Petri Lonka +358 40 656 5240 COMPETITIVE ADVANTAGE threats. Our value is the result of our [email protected] www.jyvsectec.fi information and cybersecurity-related Our main service is continuity and +358 45 155 5460 services and R&D operations for the recovery planning, along with related www.jatkuvuuskonsultointi.fi public and private sectors. 50 51

COMPLETE ENDPOINT CYBERSECURITY DATA PROTECTION CONSULTING AND AUDIT

OUR SOLUTION the competition and maintaining OS-agnostic technology. Customers We help our customers answer these Jetico provides complete endpoint appreciate our unique strength to OUR SOLUTION data protection software – including questions and identify the security wipe data clean beyond forensic KPMG helps decision-makers to make wiping and encryption – for national solution that best meets their needs. recovery and our superior whole disk bold decisions and feel confident that security, compliance and personal encryption with industry-best firmware their cyber strategy, defenses and privacy. COMPETITIVE ADVANTAGE support. Jetico proudly offers highly recovery capabilities will protect their responsive agility, both technically Our global network of business-savvy BENEFITS FOR CUSTOMERS business and support their growth and commercially. Since 2013, we have strategies. cybersecurity professionals Trusted for over 15 years by the U.S. formally stated that our BestCrypt understands that businesses cannot be Department of Defense, Jetico’s encryption solution has never included BENEFITS FOR CUSTOMERS held back by cyber risk. We recognize BCWipe can wipe selected files beyond any backdoors or related weaknesses. that cybersecurity is about risk Business executives everywhere forensic recovery such as in response management – not risk elimination – are asking themselves the same to classified data spills, while BCWipe COMPANY enabling business continuity. questions: Total WipeOut is ADISA-certified to Jetico products are trusted by erase entire hard drives for disposal • Can I balance information protection government and military agencies, all Mika Laaksonen or decommissioning. To protect stored of the top 10 U.S. defense contractors, and accessibility? data, Jetico’s BestCrypt delivers many national laboratories, as well • What does a ‘good’ cybersecurity [email protected] compliant data encryption software as various other enterprises and a strategy look like in my sector? +358 207 603 337 for whole disks, virtual drives and wide global base of home and small • Can I prioritize cyber risks based on www.kpmg.fi ­selected files or folders. Jetico business users in over 100 countries. my company’s strategy? Enterprise Editions include central Founded in 1995, Jetico is privately • How do I determine the right level of management for client software held and headquartered in Espoo, investment? control. Finland. • Where should I put my investments? COMPETITIVE ADVANTAGE • How can I prevent or mitigate the Compared to industry giants, Michael Waksman disruption of a cyber event? Jetico provides focused expertise [email protected] • How do I ensure that our business dedicated to data protection, +358 9 251 730 30 returns to normal as quickly as regularly ­innovating ahead of www.jetico.com possible? 52 53

COMPREHENSIVE COMPLETE CYBERSECURITY SOLUTIONS FOR SERVICES CYBERSECURITY

Leijona Security

OUR SOLUTION services give the customer peace of mind, while we take care of day-to-day Leijona Security offers information threat detection and removal. OUR SOLUTION protection, deception technology, and security assessments, consultation, operational technology (OT) & IoT training and managed cybersecurity COMPETITIVE ADVANTAGE Locotech’s technology consulting security and visibility. services. Information security assess­ services help organizations design, ments are used as a tool to increase Leijona Security relies on the latest plan and implement cybersecurity COMPANY organizational security. Consultation advances in the field of cybersecurity. technology. Locotech offers complete is provided on a wide variety of topics, both in the best practices we help our cybersecurity solutions and services such as improving cyber defenses, customers adopt and the technologies BENEFITS FOR CUSTOMERS for on-premise, cloud and hybrid designing secure networks and threat we use. We are a 100% cloud-native We also provide services for tracking infrastructures – fully tailored to cus­ modeling. Training can be tailored company, enabling us to provide and safeguarding vital data. Our tomer needs. Our security operations to the whole organization or special high-quality managed services and managed security as a service center’s cross-origin resource sharing groups, such as developers or execu­ reduced-cost availability. combines everything that goes into (CORS) services identify and respond tives. Managed cybersecurity services fighting cybercrime, from assessing to advanced threats targeting all levels include vulnerability management, COMPANY risk and implementing technologies to of endpoints. It is a comprehensive SIEM and endpoint detection and Leijona Security is a Helsinki-based preventing, detecting and responding service that delivers 24/7 monitoring response. cybersecurity company providing easy, to threats. robust cybersecurity services that help and notification, incident handling and remediation. BENEFITS FOR CUSTOMERS our customers do what they do best. COMPETITIVE ADVANTAGE Our services enable customers to Joonatan Kauppi We also support and help organizations Peter Laxström focus on what they do best, while deliver technology, licenses and keeping their operations secure. [email protected] equipment according to their needs. [email protected] Consultation and training help prevent +358 40 451 0557 We represent the market leaders in +358 50 525 2988 cybersecurity risks from being realized www.leijonasecurity.fi next generation firewalls, endpoint www.locotech.fi and by doing so, save precious money and time. Managed cybersecurity 54 55

MULTIFACTOR AUTHENTICATION AND IAM

OUR SOLUTION COMPETITIVE ADVANTAGE Mideye offers cost-efficient and Our customer base includes the user-friendly authentication of remote traditional industry, finance and users, primarily utilizing the mobile insurance sector, telecom operators, phone as a second layer of security. IT service providers, retail chains, the Our service also enables you to control energy sector, construction companies your third-party access, even to the and also the public sector. degree of accepting and monitoring Lately, we have been helping logged-in 3rd parties. traditional industry solve the problem BENEFITS FOR CUSTOMERS of allowing third-party vendors to remotely maintain critical infrastruc­ The Mideye authentication service ture, without compromising security can be applied to any remote access but still keeping the workflow very service that requires secure user flexible, enabling new ways of working. identification. It is an easy way to efficiently protect against hackers COMPANY stealing your user accounts. Some Since its inception in 1999, Mideye companies even say multi-factor has pioneered the area of strong user authentication can block up to 99.9% authentication based on the mobile of all account compromise attacks. phone. The product, service and patent The solution is scalable to your needs, portfolio is focused on user login with with installation and integration the phone as an additional layer of support included. security. This is an easy way to control your The company has roots in Ericsson third-party access and delegate that Radio Systems in Sweden and SSH control to persons dealing with the Communications Security in Finland. third parties. Jan Sandbacka [email protected] +358 40 752 0659 www.mideye.com 56 57

SOLUTIONS FOR YOUR TRUSTED VARIOUS CYBER PARTNER IN IT NEEDS

CREATING TRUST

OUR SOLUTION the industry requirements while helping them also to benefit from Netox is your trusted partner in cross-industry best practices. At Netox OUR SOLUTION COMPETITIVE ADVANTAGE IT. Well-functioning IT provides we base our services on proficient the backbone for successful and individuals, certified processes Mint Security combines new and We are an agile and dedicated reliable business operations. It scales and proven technologies – without renews old models of working, company that thrives on challenges. We together with your business. When forgetting creativity. creating both controlled as well as collaborate – you can expect a single built properly, it can even enable new comprehensible information security point of service with us. We understand business opportunities. Reliable and Our solutions include cybersecurity through risk management. the importance of communication and scalable IT solutions require a trusted services, specialist services, devices project management in deliveries. partner. Netox can support and work and licenses, cloud services, end-user Our core services cover auditing and along with your IT management, or you services and network services. IT risk management, process and COMPANY can outsource the whole responsibility administrative security, software to us. COMPANY development security, as well as cyber, We like to share our expertise. Founded in 2004, Netox provides SecOps and architecture. Please have a look at our blogs: BENEFITS FOR CUSTOMERS www.mintsecurity.fi/blog/ award-winning, all-inclusive IT BENEFITS FOR CUSTOMERS Adding our agile and lean ways of solutions by combining top working to international quality expertise from international research, Mint Security represents products that Thomas Malmberg standards, we are able to provide leading technology solutions and include solutions for various cyber exceptional customer experience to the industry’s­ best practices with a [email protected] needs. Our offering is unique in the small and large enterprises in different strong focus on cybersecurity. We are +358 50 380 5224 market. Our products include Veracode industries. ISO 20000-1, ISO 27001, ISO 9001 and Spamhaus. www.mintsecurity.fi certified partner in IT. COMPETITIVE ADVANTAGE Our customers represent variety of Markku Korkiakoski different companies from healthcare [email protected] to hi-tech. We support them with +358 40 660 5369 high quality IT solutions fulfilling www.netox.fi/en 58 59

PROFESSIONAL KEEPING THE CYBERSECURITY DIGITAL SOCIETY CONSULTATION RUNNING

OUR SOLUTION COMPETITIVE ADVANTAGE OUR SOLUTION COMPANY Netum provides IT solutions and Choosing Netum as your cybersecurity Nixu offers a full portfolio of Nixu is a cybersecurity services services by integrating traditional and data protection partner gives cybersecurity services, including company on a mission to keep the IT systems into the newest digital you peace of mind. Our experts secure cloud transformation, digital digital society running. Our passion applications. Our cybersecurity analyze, report on and develop your identity management, cyber defense, is to help organizations embrace professionals are experts in organization’s cyber threat protection secure IoT, industrial cybersecurity, digitalization securely. Partnering penetration testing, web application and prevention strategies, and you can cybersecurity awareness, compliance with our clients we provide practical security, cybersecurity governance, focus on your business. and certification and cybersecurity solutions for ensuring business technical assessments and risk outsourcing. continuity, an easy access to digital analysis. We also have specialists for COMPANY services and data protection. We mission-critical cyber and information BENEFITS FOR CUSTOMERS aim to provide the best workplace to Netum Ltd is a growing and reliable IT security solutions containing public our team of over 400 cybersecurity service provider. Our services include We are your trusted cybersecurity key infrastructure (PKI), identity and professionals with a hands-on software design and implementation, partner and provide you with all the key management and network security. attitude. With Nordic roots we serve system management and monitoring, cybersecurity-related services that you enterprise clients worldwide. BENEFITS FOR CUSTOMERS IT security solutions and IT need so that you can concentrate on management consulting. We work in your core business. We are an impartial With Netum, third-party expert insight close collaboration with our clients to cybersecurity expert. We always choose Valtteri Peltomäki and knowledge is at your disposal. create functional solutions together. the best solution for our customer’s You can rest assured of both the needs and are not tied to any specific [email protected] administrative and technical level of technology. +358 40 704 0808 cybersecurity. Our Katakri mapping Jussi Vasama tool lets you know whether your [email protected] COMPETITIVE ADVANTAGE current level of security meets all Veera Relander +358 50 381 0227 We are the number one cybersecurity requirements. www.netum.fi specialist in Northern Europe. We have [email protected] With the help of our experts, you are the best experts in the industry, and +358 50 523 3061 one step ahead of attackers. cybersecurity is our passion. www.nixu.com 60 61

HOLISTIC APPROACH EXTENDING YOUR TO CYBERSECURITY MOBILE LIFE

OUR SOLUTION COMPANY OUR SOLUTION COMPETITIVE ADVANTAGE NXme is a reliable and trustworthy NXme is one of the most experienced Piceasoft offers solutions for fast We support the whole mobile device partner for designing, implementing, vendor-independent cybersecurity consumer data transfer, secure lifecycle, from new device purchasing securing and operating your consultants in the Middle East, with erasing of personal data and an easy to recycling. Piceasoft products critical information systems and expertise and knowledge accumulated way to analyze and fix mobile device provide omnichannel user experience infrastructure. from working with a variety of clients, issues and resell them. Our service and support up to 19,000 device from telecommunications service includes an easy-to-use mobile device models. The service includes advanced BENEFITS FOR CUSTOMERS providers to financial institutions and data transfer for retailers to boost data- and AI-powered solutions. government entities. Our services customer experience and certified data We serve our clients with a team of cover all aspects of security, including erasure to ensure peace of mind. COMPANY over 80 specialists in Finland, Saudi infrastructure and application vul­ Arabia, United Arab Emirates, Thailand Piceasoft is a leading software nerability assessments, penetration BENEFITS FOR CUSTOMERS and Vietnam. provider for mobile device lifecycle testing and security monitoring. Picea® Switch allows smooth and fast solutions. Our customers are mobile COMPETITIVE ADVANTAGE transfer of all personal content across operators, electronic retail chains, all major mobile device platforms. It repair and recycling companies and Our core cybersecurity capabilities are: Timo Hirvonen provides the same user experience for trade-in vendors. We offer an innova­ • Human and technology-oriented [email protected] every device regardless of the OS. tive and easy-to-use software platform approach +358 40 507 1316 to sell, recycle and repair used phones. ADISA certified Picea® Eraser ensures www.nxme.net With our solutions, customers can • Assessment and penetration testing that no personal user data remains create new services, increase revenue, • Networks and applications security on the mobile devices and that the save costs and protect consumer data. • Security architecture and identity devices can be reused. management Pia Kantola • Security operations and incidents management [email protected] +358 40 754 0145 www.piceasoft.com 62 63

ENHANCING SECURING YOUR ORGANIZATIONAL CAPABILITIES ASSETS

OUR SOLUTION training completed, accomplishments OUR SOLUTION COMPETITIVE ADVANTAGE finalized, GAP analysis, aging and Safetypass.EU is a know-how other factors. Remod offers a broad spectrum of We tailor our solutions to fit your and competence management cybersecurity services aimed at situation, with the end goal of always platform. We help create unique COMPETITIVE ADVANTAGE securing your on-premise and in offering the best solution and value ways of transforming organizational the cloud assets. We work to secure for your needs. We also offer backup requirements into needs for personnel The Safetypass.EU platform combines your current assets and environment services and consulting in a wide range know-how. With Safetypass.EU, an an individual’s actions into the through an exhaustive survey and of topics. individual gets access to trainers and learning account that he or she can analysis from which we derive the pain powerful toolsets for organizations then manage and share as desired. points and strategy to secure your COMPANY while managing his or her own courses, An individual owns his or her own environment, employees and assets. At Remod we are focused at competences and skills in special personal data and has control over it. finding, creating or inventing the best learning accounts. With consents, employers can request BENEFITS FOR CUSTOMERS access to the data for their own usage. solutions to help you move forward, BENEFITS FOR CUSTOMERS We offer added security through whether it’s with technology, ways of COMPANY managed services, a low maintenance working or business management. Safetypass.EU offers transparency into cybersecurity control room, network We are an independent consulting your personnel’s skills and supervisor security and management or even Teppo Suominen views. It provides requirement-based agency focused on process, business full IT management partnership. We monitoring for various job titles, and software development. Many of provide customized, transparent full [email protected] locations or projects. our projects are related to identity lifecycle IT management and security +358 40 572 1570 management and corporate security services. www.remod.fi With this platform, it is possible to solutions. For 14 years, we have create horizontal teams and map been implementing domestic and their competence requirements international software projects from based on business needs to produce design to production for our global GAP analyses of associated persons. customers. It shows the competences, rules and regulations for persons flow Juha Männistö into and out of organizations. The platform integrates with eLearnings [email protected] and blended learnings. It provides 358 40 844 2301 comprehensive reporting, including www.redicom.fi 64 65

SECURE AND SOLUTIONS FOR ROBUST DIGITAL DEMANDING COMMUNICATION ENVIRONMENTS

OUR SOLUTION COMPETITIVE ADVANTAGE OUR SOLUTION COMPETITIVE ADVANTAGE Rugged Tooling creates powerful We specialize in managing massive Savox Communications is a critical Our global team caters to the needs of solutions for real-time network amounts of IP traffic in real time. communications company. We provide professionals in the chosen business monitoring, efficient traffic offloading We create world-class solutions for IP smart technology solutions that create segments of safety and security, and precise network cybersecurity traffic monitoring, network testing, situational awareness and enhance tactical and industrial markets. and quality testing. Our testing and cyber ranges. We have customers communication and collaboration solutions allow our customers to build in 11 countries around the globe. in all situations. Our solutions save COMPANY robust and secure networks while Our customers range from telecom lives, protect people and property and Savox’s expertise is based on 36 our monitoring solutions give them companies and authorities to various enhance the efficiency and quality of years of improving and saving real-time visibility into the security industries and R&D organizations. work of professional teams around the lives by providing safety, rescue events. world. COMPANY and communication solutions for BENEFITS FOR CUSTOMERS BENEFITS FOR CUSTOMERS professionals working in demanding Rugged Tooling was founded in 2010 environments. Our appliance-based sensors make in , Finland. Our founders are Harsh arctic conditions form our precise real-time data events a group of software and hardware backbone. We have delivered solutions accessible for next-generation security engineers with a working history in for the most demanding environments Janne Pöllänen operations centers (SOCs). They ensure the telecom and testing industry. Our for decades. Our long experience, [email protected] data integrity with blockchain integra­ main office is located in Oulu, Finland, combined with a strong determination +358 50 911 7730 tion. Using our traffic pre-processing and we have a sales office in Helsinki. to leading the way, have resulted in www.savox.com solutions, our customers can build The company has grown steadily and solutions with superior user experience security systems with a lower total now employs a team of enthusiastic for professional teams – whatever the cost of ownership than ever before. professionals. We aim to improve conditions. We build our solutions in Finland the overall security, robustness and completely with our own code on NPU quality of IP-based services. platforms. This means our tools open no third-party backdoors to your Jukka Ruotsalainen system. [email protected] +358 40 186 2626 www.ruggedtooling.com 66 67

FINLAND IS A TECHNOLOGY SUPERPOWER. THANKS TO ITS PIONEERING BUSINESS AND INNOVATION CULTURE, FINLAND HOSTS SOME OF THE WORLD’S MOST INTERESTING COMPANIES IN CYBER AND INFORMATION SECURITY. 68 69

SECURE MANAGING YOUR ENCRYPTED EMAIL CYBERSECURITY

OUR SOLUTION COMPETITIVE ADVANTAGE OUR SOLUTION An open ecosystem reduces vendor Securedmail is a SaaS service enabling The service has been up and running lock and improves capability to react the sending and receiving encrypted since 2004. Securedmail has been The SensorFleet solution is an open to emerging threats. Instruments emails without any additional software granted patents in several European sensor platform hosting detection, developed by third parties, be they or hardware installations. The encryp­ countries and in the US. protection and scanning tools, commercial, inhouse or open source, tion of Securedmail is based on the regardless of whether they are Securedmail is used by different can all be integrated. same SSL encryption used by banks commercial, open source or developed companies, cities, governmental to secure the data communications of in-house. The solution reduces Monitoring diverse networks on organizations and associations. The their internet services. complexity in managing cybersecurity a single platform, such as IT, size of our clients varies from small capabilities, while a readily available operational networks or cloud services, Securedmail has received Finnish companies to internationally listed deployment platform improves simplifies security operations and patents FI116815 and FI125832B companies. response times for emerging threats. helps in tracking threats across the and European patent EP3286891. organization. Its technical data security has been COMPANY BENEFITS FOR CUSTOMERS granted the best possible grades from Distributed monitoring is resilient and The owner of Securedmail service an independent auditor. Need to run an intrusion detection sys­ safeguards the forensic capability. is Finnish data security company tem (IDS) at scale? Need occasional Each sensor is capable of operating in Encrypted Email Finland Ltd. BENEFITS FOR CUSTOMERS traffic recording in different network isolation from the rest of the sensor segments? Bring clarity to fragmented network. It also maintains its own copy Securedmail is an email encryption cybersecurity tools and orchestrate of collected alert and forensic data. service that enables communicating Markku Vettenniemi capabilities with SensorFleet securely with anyone. markku.vettenniemi@ Instruments. Using Securedmail is easy. Just add suomenturvaposti.fi Simo Mäkipaja the Securedmail.eu domain ending to +358 500 553 663 COMPETITIVE ADVANTAGE [email protected] the recipient’s address. For example – www.securedmail.eu The SensorFleet solution enables +358 40 583 3999 [email protected]. you to deploy multiple cybersecurity www.sensorfleet.com eu. capabilities as instruments on a The service can also be integrated unified platform, reducing complexity with the client’s own IT infrastructure and fragmentation of your security to automate the email encryption of tools palette. confidential messages. 70 71

PREVENTING COMBINING TECH, DATA THREATENING LEAKS AND HUMAN INSIGHT

OUR SOLUTION MEDICAL DEVICE SECURITY • Regulatory compliance We create impact that lasts by combining tech, data and human • Data protection OUR SOLUTION COMPETITIVE ADVANTAGE insight. Solita is a community of • Secure Development Lifecycle Our product continuously seeks new • Network segmentation is a core highly and widely skilled experts • ISO 13485 -certified software network and data leak paths and alerts network protection strategy. geared for impact and customer value. development We do what matters to build the future when they are found. These leaks can • Critical infrastructure, ICS/OT, with our clients by delivering high- be a result of human error or malice, finance and healthcare regulation COMPANY and they may violate security policies, and security policies require it. But quality solutions to real problems. regulation or contractual obligations. do you know it works? Our unique service portfolio Testing proves the compliance and BENEFIT seamlessly combines expertise from • We enable continuous validation for strategic consulting to service design, identified issues can be mitigated Our portfolio includes the following your network isolation. software development, analytics and before they get exploited. Our cybersecurity services: innovative and comprehensive tests COMPANY data science, cloud and integration help you to stay ahead of the threat. CYBERSECURITY SERVICES services. Founded in 1996, Solita is We started SensorFu in order to go • Threat assessment a fast-growing community of almost 1,000 professionals in Finland, BENEFIT back to basics with IT security. We feel • Human-centric security design that security requirements pile up and Sweden, Denmark, Estonia, Belgium • Automates otherwise costly manual security solutions are too complex. • Secure Software Development and Germany. security audits and checks Our products make sure that our Lifecycle methodology and practices • Easy to purchase and and customers’ security policies are and • Security assessments for software deploy even in the most demanding stay sealed. and services Jussi Kujansuu environments • Penetration testing [email protected] • Integrates with and adds value Mikko Kenttälä +358 44 750 4490 to the existing firewall, data loss SOLITA WHITEHAT [email protected] www.solita.fi/en prevention, endpoint protection and • A SaaS cyber security service to +358 40 801 9800 SIEM security investments gather your public data, analyze www.sensorfu.com findings, and guide to actions • Scans open-source intelligence from dozens of sources and creates real-time visibility to your visible assets • Automatically analyzes findings and changes 72 73

NEXT-GENERATION DIGITAL ADVANTAGE ACCESS FOR BUSINESSES MANAGEMENT AND SOCIETIES

OUR SOLUTION being able to simultaneously manage, OUR SOLUTION COMPANY deploy, and rotate authentication SSH.com’s PrivX is lean, quick-to-­ keys in large-scale, secure shell TietoEVRY is your Nordic cybersecurity­ TietoEVRY creates a digital advantage implement and easy-to-use access environments. partner. We provide services that for businesses and society. We are a management software for privileged promote visibility, simplicity and leading digital services and software access to on-premise and cloud UKM is the perfect complement to protection to help securely unleash company with a local presence and environments. PrivX helps clients privileged access management (PAM) your digital potential. global capabilities. Our Nordic values flexibly enable and control access to deployment, especially in regulated and heritage steer our success. servers, network devices and other industries and mission-critical BENEFITS FOR CUSTOMERS Headquartered in Finland, we employ critical infrastructure according to applications. It brings new capabilities TietoEVRY provides a full stack of around 24,000 experts globally. user roles and privileges. to controlling automated M2M connections, which current key cybersecurity services and helps The company serves thousands of BENEFITS FOR CUSTOMERS vaulting-based solutions do not our customers focus on their core enterprise and public sector customers adequately address. Plus, it can stop business. You can take back control of in more than 90 countries. TietoEVRY’s Compared with in-house and power users from bypassing the your cybersecurity with services based annual turnover is approximately EUR traditional tools, PrivX offers unique PAM system with SSH keys. on your business needs. 3 billion. Its shares are listed on the modern features and functionality NASDAQ in Helsinki and as that not only strengthen IT security COMPETITIVE ADVANTAGE well as on the Oslo Børs. but also and increase the speed of Jussi Mononen We provide managed security services business and lower privileged access (MSS) and a security operations implementation and operating costs. [email protected] Maria Nordgren +358 45 615 4855 center (SOC) on top of advisory and COMPETITIVE ADVANTAGE www.ssh.com consultancy. Our service focuses on [email protected] threat intelligence 24/7, locally and +358 40 500 9760 Companies worldwide are using PrivX globally, looking for anomalies and www.tietoevry.com for cases varying from securing their signs of a breach. MSS provides border DevOps to third-party access security and endpoint protection through to access automation. Our Universal different products, such as firewall as SSH Key Manager® (UKM) is unique in a service and endpoint security. 74 75

SECURE A NEW PERSPECTIVE POINT-TO-POINT ON SOFTWARE VPN CONNECTIONS DEVELOPMENT

OUR SOLUTION COMPETITIVE ADVANTAGE TOSIBOX® offers secure and TOSIBOX® is infinitely scalable, which easy-to-use connectivity between sites guarantees a cost-efficient solution OUR SOLUTION COMPANY and users that is internet connection, that expands according to your needs Valaa Technologies’ unique software Valaa Technologies is a deep operator and device agnostic. and those of your business. Simply architecture tackles complex problems tech startup founded in 2018. drag and drop to add new devices or We believe that success in the with radical simplicity. Open source We partner with corporations to users into the network with TOSIBOX. era of the Internet of Things is ValOS reimagines the Web with uncover their ­industry-specific digital To complete the same task with simply a ­matter of connections, and change as its fundamental unit of transformation inhibitors. Together we old-fashioned IT networks takes days connectivity is the core of IoT. Today information. leverage ValOS ecosystem to co-create or weeks. the need for reliable connectivity is new business around these existential greater than ever. By 2020, more than Performing at the highest security BENEFIT FOR CUSTOMERS problems. half of major new business processes ­levels in the industry, TOSIBOX State handling is the number one and systems will incorporate some is globally audited, patented and source of complexity in large-scale elements of IoT. performs at the highest security levels Ville Ilkkala software systems. Complexity in turn in the industry. The technology is is the worst enemy of security. By [email protected] BENEFITS FOR CUSTOMERS based on two-factor authentication, rethinking the foundations, ValOS +358 50 308 8877 automatic security updates and the With TOSIBOX®, you can build your removes complexity instead of hiding www.valaa.com latest encryption technology. It is a own global operational network within it. It’s an ideal platform for the next direct virtual private network (VPN) minutes. You own your network and generation decentralized industrial tunnel between physical devices. your data. With our unique two-way and enterprise systems. Only trusted devices can access the connectivity, we provide the benefits network. of both data acquisition and remote COMPETITIVE ADVANTAGE maintenance with one solution. This The Web has unmet potential as the allows you to save resources and Markku Pitkänen universal integrator across different access new businesses. systems. We focus on enhancing the [email protected] core building blocks of the Web itself +358 40 838 1587 to turn that potential into reality. www.tosibox.com 76 77

CORPORATE CYBERSECURITY R&D CUSTOMER DIGITAL SERVICES ACCESS

OUR SOLUTION We help you generate new business ­opportunities by removing VTT provides a wide range of R&D cybersecurity obstacles. This ensures services to help you raise your level of your business continuity through cybersecurity: cybersecurity risk management. OUR SOLUTION COMPETITIVE ADVANTAGE • Industrial cybersecurity – Vorna ID provides easy to deploy Vorna ID is a standard authentication protection of critical infrastructure, COMPETITIVE ADVANTAGE digital identity and access manage­ solution that does not require including electric and telecom grids We offer holistic competences around ment services, which are needed when customization and is quick to deploy. and industrial controls systems security enablers for next-generation developing new online service for The functions provided by the service • Advanced cryptography – data connectivity. Our novel IPR corporate customers and distributors. are typically solved individually and security, information protection, cooperation models support our manually by the service provider. blockchains and post-quantum clients’ businesses. BENEFITS FOR CUSTOMERS Currently, identification solutions cryptography available on the market focus on Our unique test environments and The development of electronic services • Secure networks – 5G test network strong local customer identification. broad cross-industry domain expertise creates the need for the reliable and for evaluation and piloting customer Vorna ID provides business customers save you time and money. cost-effective management of security solutions with strong identification globally. corporate customer access and • Security metrics – cyber­security COMPANY authentication. assurance, metrics and AI COMPANY VTT uses its R&D expertise to provide The global enterprise identifier (LEI) solutions for public safety and Vorna ID provides globally unique professional services for its domestic enables the introduction of a new telecommunications­ and verified corporate customer and international customers and solution, Vorna ID, which provides • Trusted platforms – testing and identification. The service consists of partners serving both the private a standard interface for logging in analysis of device security in War three products for the online service and public sectors. We do applied to electronic web services. Once the Room (an isolated Cyber Range) and provider, activated separately or research with advanced research user has been authenticated, the advanced trusted platforms R&D together. These are Verified Partner, facilities with interdisciplinary web service learns the user’s global Rights Management and Partner Login. scientific,technological ­ and business corporate identity and the permissions BENEFITS FOR CUSTOMERS competences. associated with that application. When We provide novel services and R&D using Know your Customer (KYC), the Ronny Eriksson based on smart contracts that enable Tuomas Korpela service verifies the organization on [email protected] trust in business-to-business or even [email protected] behalf of the service provider. +358 50 517 7908 people-to-people transactions without +358 40 729 6238 www.vornaid.com ever knowing the counterpart. www.vttresearch.com 78 79

MANAGING GDPR PEACE OF MIND IN A REQUIREMENTS DANGEROUS WORLD

OUR SOLUTION COMPETITIVE ADVANTAGE OUR SOLUTION COMPANY XCure has created the Privacy Our skilled staff develops solutions to Xiphera’s security solutions implement Xiphera combines expertise in Management Tool to help organizations best meet customer requirements. the underlying cryptographic cryptography, digital electronics, on the journey toward compliance. The We developed the Privacy Management algorithms directly in digital hardware. and the knowledge of target General Data Protection Regulation Tool based on customer requests and applications. Our main focus markets (GDPR) is an EU law requiring still work closely with our customers BENEFITS FOR CUSTOMERS are communications, defense, and organizations to radically change to listen to all their needs. industrial automation. Hardware-based security and the way they collect, store and use Our platform is customizable and cryptography offer: Our portfolio consists of optimized personal data. Organizations need to ready for distribution channels. intellectual property (IP) cores prove their compliance. • Higher protection level supporting the latest security and COMPANY • Better performance and higher BENEFITS FOR CUSTOMERS cryptographic standards. Our target XCure Solutions was founded in 2006 throughput technologies are field-­programmable The Privacy Management Tool is a and is privately owned. The company • Lower power consumption and gate arrays (FPGAs) and scalable SaaS service suitable for all is located in Helsinki, Finland. Our longer lifetime than software-based application-specific integrated circuits organizations from SMB to private team has long expertise in data security designs (ASICs). We are also available for enterprise and also the public sector. security and data protection. consulting and architecting security Our product is a cost-effective COMPETITIVE ADVANTAGE designs. and simple-to-use platform for Our customers gain independence harmonizing practices and involving Kai Kempas from software library vulnerabilities, all parties. Compared to other Matti Tommiska [email protected] operating system security breaches, available solutions, our product saves +358 400 362 997 and processor bugs and weaknesses. [email protected] customers time and money by being www.xcure.fi +358 20 730 5252 closer in accordance with regulations. Most importantly in mission-critical www.xiphera.com systems, a hardware-based security and cryptography implementation achieves a higher NCSA accreditation level than a software-based implementation. 80 81

CYBERSECURITY AND INFORMATION TECHNOLOGIES

OUR SOLUTION and OS level vendor backdoors, weak encryption, meta data privacy XXLSEC delivers state of the art secure and more. XXLSEC solutions meet communication system and solutions the modern and future Zero Trust like Privecall TX, Privebook laptops Architecture security requirements. and Data Rain tactical system. An open-source technology platform COMPANY and protocol is suitable for many integrators and manufacturers who XXLSEC is a cybersecurity seek new technologies to improve their company operating in the areas of security. next-generation IP security and cryptography combined with secure BENEFITS FOR CUSTOMERS hardware and software development. XXLSEC developed Multiparty XXLSEC technology can deliver Computing (MPC) based security enhanced security which reduces protocol delivers several benefits in critical cyber threats and creates all IP connected environments like better resiliency and cost efficiency IoT, critical communications together compared to current legacy securi­ with network and end point security. ty-based systems. We are focused on enhancing legacy IP security solutions with technologies COMPETITIVE ADVANTAGE that meet the requirements of modern XXLSEC communication and security hyper-connected systems. technology enables a security level that commercial-off-the-shelf (COTS) devices do not reach. As an example, Arimo Koivisto Privecall TX secure communication [email protected] device is protected against typical +358 400 835 744 COTS threats like phishing, spyware, www.xxlsec.com malware, rogue applications, hardware 82 83

STRONG ACTIVE PARTNERSHIPS CREATE DIGITAL TRUST THROUGH STAKEHOLDERS TECHNOLOGY-BASED ECOSYSTEMS BUILT IN FINLAND’S AROUND SHARING CYBERSECURITY AND COOPERATION. ECOSYSTEM

NATIONAL CYBER SECURITY CENTRE (NCSC-FI) 03.07.2020

CONTACT INFORMATION Business Finland Kirsi Kokko, Head of Digital Trust Finland program [email protected] +358 50 550 2023 www.businessfinland.fi/en/ digitaltrust

Mika Susi, Executive Director [email protected] +358 50 349 5008 www.fisc.fi/about-fisc/

Notice: The information contained in this publication is collected from various sources and provided for your information only. Business Finland does not assume any liability for the accuracy and completeness of the information. BUSINESSFINLAND.COM

FOLLOW US ON SOCIAL MEDIA

Porkkalankatu 1 | FI-00180 Helsinki, Finland | Tel. +358 29 469 51