

My configuration, prior to installing F-Secure on my Windows 10 machine, consisted of Microsoft’s own Windows Defender, backed by a full version of Malwarebytes.į-Secure automatically disabled Windows Defender but has left Malwarebytes running.įollowing on-screen prompts my default Firefox was set up with Browsing and the optional Search protection which adds in a toolbar. The installation process is pretty straight forward, with each step explained well, from selecting the type of device through running a small download which launches the main installation. I initially selected my main Windows 10 machine which shows as Current Device in the step by step menu after clicking on Add Device. Once you create an account, confirm your email address and when received, enter your License key you are presented with a very clean and uncluttered overview page.įrom here you can start to add the devices you wish to protect. There is the option here for a Free Trial, so you can try it first.

Selecting For Home, there are further options including a Free Online Scanner, but I am after the main product on the page F-Secure SAFE. Installation and Configurationīrowsing to you are met with the main page boldly giving you two options, For Home or For Business as they have separate products for use in a corporate environment. Available on any three devices, even if you don’t own them, meaning this is quite a good product for protecting several systems in a family. The SAFE product covers Virus Protection, Browsing and Banking Protection, Network Protection along with a Device Finder and Remote Controller.

The package I am reviewing is the 1 year 3 device license. Luckily there are plenty of companies out there offering packages to help take the strain of looking after our precious data.į-Secure SAFE is a multi-device security package available either directly from F-Secure’s website or various retailers. Internet security is something we all should take seriously, there are plenty of headlines reminding us of the various nefarious ways criminals try to gain access to our information and systems.
