What you need to know about the launch of WithSecure™

Inside WithSecure


Reading time: 3 min
Jason Sattler




You may have heard by now that F-Secure for Business is now WithSecure™. And you may be wondering how this affects you.

The quick answer is that it will not affect you very much at all. All F-Secure’s award-winning solutions and services will continue to offer the same protection they always have—however, the solutions and services for organizations will now be provided by WithSecure™. For those who rely on F-Secure—as tens of millions of individuals along with hundreds of service providers have over the course of more than three decades—you can count on the same protection as always.

Still, you may have questions. And we want to make sure you get the answers straight from us.

So here we go.

What happens to my F-Secure TOTAL/SAFE/FREEDOME VPN/ID PROTECTION subscription?

Absolutely nothing. You don’t need to do anything to remain protected by F-Secure.

You can still count on all your F-Secure protection. Please contact our Support team at any time if you have any specific questions related to your protection.

Why did F-Secure change it’s name to WithSecure?

F-Secure will still be F-Secure and F-Secure will still make life easier for the tens of millions of people we protect and our 170 service provider partners. F-Secure for Business is now WithSecure — the strategic partner for businesses that want measurable cyber security outcomes.

Why is this happening?

The threat landscape for organizations has evolved at lightning speed, as digital technology plays an increasingly crucial role in the operation of… just about everything. To help our customers and partners succeed while staying ahead of the latest threats, F-Secure spent the last few years transforming our operations into two businesses—Consumer Security and Corporate Security.

To further strengthen these efforts, we have decided to continue as two separate companies.

This will help both WithSecure™ and F-Secure to serve the specific needs of our customers and partners even better. It will also focus our respective efforts, so we can offer as many organizations and individuals as we can the highest level of security possible. We will do this by accelerating the ways we work and increasing our competitiveness everywhere.

Can I use both F-Secure and WithSecure™?

We hope you do.

WithSecure™ will offer the highest level of cyber security for workplaces and F-Secure will do the same for homes. You should expect this certainty when it comes to cyber security on any device and hopefully you and the organizations you work with will find that with F-Secure and WithSecure™.

Who gets Mikko Hypponen?

Mikko continues his decades-long career with both companies. His official job is Chief Research Officer of WithSecure, but in addition to that, he works as an advisor to F-Secure with the title of Principal Research Advisor.

Where can we follow you?

You can follow F-Secure on TwitterLinkedinFacebook and Instagram for all your individual cyber security needs, insights and information.

You can follow WithSecure™ on TwitterLinkedin and Instagram.

Related posts

April 16, 2024

5 phases of a cyber attack: The attacker’s view

Cyber security is not something you do once and then you’re done. It is a continuous process that should be part of everything you do. However, no one has the resources to do everything perfectly. Thus, your goal should be constant improvement.

Read more
April 16, 2024

Of Cameras & Compromise: How IoT Could Dull Your Competitive Edge

The Internet of Things is here. And with it are exciting possibilities, cost savings and efficiencies. But there’s a dark side to this bright new world, and it can be summed up in what we call Hypponen’s Law: If it’s smart, it’s vulnerable.

Read more
April 16, 2024

How to decompile any Python binary

At WithSecure we often encounter binary payloads that are generated from compiled Python. These are usually generated with tools such as py2exe or PyInstaller to create a Windows executable.

Read more
April 16, 2024

The Chilling Reality of Cold Boot Attacks

What do you do when you finish working with your laptop? Do you turn it off? Put it to sleep? Just close the lid and walk away?

Read more