F-Secure Internet Security 2009 review
A credible contender, but not the lightest or the most effective.
Review Date: 13 Feb 2009
Reviewed By: Darien Graham-Smith
Price when reviewed: £34 (£39 inc VAT)
Value for Money
Ease of Use
F-Secure acquitted itself with honour this month, but didn't quite break into the top rank. Its 87% score in our malware test was creditable; its 37% in our web threats test less so. Its strongest suit was its firewall, which managed to conceal our PC from would-be attackers, so that our security scan couldn't even confirm the machine was switched on.
In many ways, F-Secure is pleasing to use too. Its main interface is compact and clean, although this is largely achieved by hiding controls - six main tabs contain more than 30 links, which open further configuration panels. These might be daunting for beginners, but they mainly follow Windows user interface guidelines, and will feel intuitive to more knowledgeable users.
We also liked the simplicity of its email integration. F-Secure didn't add any buttons or toolbars to our mail client, but simply brought up a summary window when infected mail was found, detailing the nature of the threat and the action taken.
Unfortunately, simple doesn't necessarily mean nimble: F-Secure Internet Security 2009 had one of the largest RAM footprints of any suite this month, and slow startup times. That's hard to excuse given its relatively sparse feature set - just the bare essentials plus parental controls.
If you have three PCs to protect, F-Secure is reasonable value (£50 exc VAT for a two-year licence), and unusually it comes with a bootable Linux-based recovery CD - a nice touch. It's not ideal for everyone, but technical users may appreciate its no-nonsense approach.
Author: Darien Graham-Smith
- Europol warns: public Wi-Fi isn't safe
- Hundreds of NHS sites vulnerable to hackers
- Second Bitcoin site closed after £345,000 hack
- Hackers take Meetup.com offline over $300 ransom
- Child-abuse image sellers demand Bitcoin-only payments
- London firm at centre of hack redirecting 300,000 routers
- Briton charged with hacking US Federal Reserve
- Apple quietly pulls support for OS X Snow Leopard
- RSA: NSA exploits position of trust with security firms
- Google buys UK startup to fight click fraud
- Move over Delia: IBM Watson is cooking tonight
- Eric Schmidt on the double-edged smartphone: friend and foe
- Getty joins the race to the bottom
- Hour of Code: five steps to learn how to code
- Sony Xperia Z2 Tablet review: first look
- Sony Xperia Z2 review: first look
- Samsung Galaxy Gear 2 review: first look
- Nokia XL review: first look
- Samsung Galaxy S5 review: first look
- Nokia X review: first look
- Measuring me: is your body the future of security?
- The top five consumer security threats for 2014
- Windows XP: Microsoft’s ticking time bomb
- The top five SMB security trends for 2014
- Securing the Internet of Things
- My PC is infected: what now?
- When coding becomes a crime
- Mobile web blocking: what it reveals about porn filtering plans
- The men trying to save us from the machines
- Windows 8 picture passwords: are they safe?
- The key to choosing a secure password
- Please stop reposting fake Facebook messages
- Is Facebook safe for business?
- Don't rely on Chrome's password vault
- Facebook Graph Search: don't panic
- Gmail drafts and Pastebin: could they evade the email snoops?
- Applying for a job at GCHQ? Here's your plain-text password
- Google two-step verification: a must for business email
- Yes, I write down my passwords
- How to deal with a ransomware attack