SlideShare a Scribd company logo
1 of 6
Download to read offline
DATA SHEET


Total Defense Endpoint Premium r12
Overview:

Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems
from intrusions, malicious programs, and malware, using a policy-driven single scan security engine in conjunction with an
endpoint-based SPI firewall. With smart features like automatic endpoint discovery, setup wizard, and intuitive management
console, Total Defense makes network protection easy to install, deploy, and manage.

Total Defense Endpoint Premium r12 provides access an extensive database of known good applications to create policies
that prevent applications exhibiting abnormal or suspicious behavior from executing. Total Defense offers administrators the
capability to create policies based on location, user, endpoints and many other factors, granting or denying access based on
defined policies. Host-based intrusion prevention system (HIPS) fully controls endpoint application activity, while unified network
control (UNC) offers network access protection by validating endpoints before they connect to network resources.

The endpoint client offers a stateful packet inspection (SPI) firewall that protects endpoints from intrusions, even when
disconnected from the network. The deployed endpoint clients are fully hardened and protected from being disabled by user
actions or malicious software.

Key Features

•	   Robust anti-malware engine: Total Defense’s award winning malware engine provides full-fledged protection against
     viruses, trojans, worms, rootkits, spywares and bots.

•	   Rootkit protection: Total Defense for Endpoint & Gateway r12 provides support for detecting malwares that are using
     stealth technologies to prevent their detection from security software. While it is easy for a good signature-driven product
     to find a known sample that has not yet been activated, it is becoming increasingly challenging to detect the sample once it
     is running and trying to hide itself and other malicious components. Our improved malware engine allows administrators to
     detect and remove rootkits.

•	   Centralized Web-based Management Console: Endpoint security monitoring, policy deployment, license
     management, event management, and reporting managed from a central web based console with an intuitive design.

•	   Firewall: The Total Defense Firewall acts as a barrier between the corporate endpoints and the external Internet
     preventing unauthorized access. It thwarts potential hackers and protects corporate networks from being exploited by
     malicious attacks. Total Defense provides built-in firewall rule sets, and also the capability to define user specific add-on
     rule sets.

•	   Intrusion Prevention and Detection: An added layer of security beyond the firewall, the Host based Intrusion
     Prevention System (HIPS) is network based, detects and automatically blocks attacks.

•	   Application Control: Total Defense has robust application control capabilities with one of the largest databases of
     applications grouped into categories. Total Defense has integrated the knowledge of application behavior into the firewall
     for enhanced protection. Total Defense research maintains and updates one of the most verbose databases on application
     information. Check against known application database. Set policy actions for missing application signatures, unknown
     generic and system applications.

•	   Vulnerability assessment: Set policies to enforce compliance and report disabled/locked accounts, invalid login
     attempts, users with expired passwords, passwords non-compliant with organizational policies (e.g. frequency of change,
     password length, etc.).




                                                        www.totaldefense.com
•	    Location awareness: Total Defense Endpoint protection supports location/zone awareness at each partition and user
      level. There is no restriction on the number of zones that can be created and policies can be applied to each zone. When an
      endpoint client connects from a certain zone, the appropriate policies will come into effect.

•	    Pre-defined policies: Total Defense’s pre-defined policies enable administrators an option for quick deployment and
      offer recommended policy settings. Policies control all endpoint settings, can be defined in a granular manner and applied
      down to the location level.

•	    Exclusion lists: Administrators have the flexibility to reduce performance overhead by setting up list of critical and data
      intensive applications that need to be excluded from scan.

•	    Comprehensive reporting: 250+ out of the box reports provide detailed and summary views for better tracking of
      protection and malware status on endpoints..

•	    Endpoint Discovery: Total Defense’s management server enables administrators to discover unmanaged endpoints easily
      by providing various options like network scan, active directory scan, IP range scan, and quick discovery (scan based on OS
      type). Endpoints “phone home” to the management server and simplify the deployment and configuration process.

•	    Role-based administration: Allows the segregation of management realms, so administrators can focus only on
      assigned dominions.

•	    Groupware protection: Total Defense Endpoint Premium provides protection for groupware like Microsoft Exchange,
      Lotus Notes, and Microsoft SharePoint. Total Defense scans and protects at the mail-store level, preventing viruses and
      threats from being delivered to the endpoint.

•	    Unified Network Control (NAP): Validates endpoints for security compliance before admission to the network. Total
      Defense Anti-Virus r12 allows identity based policy definition enabling administrators to define specific policies based on
      users’ functional roles and associated identities.

•	    Flexible architecture: Centralized policy, product and update synchronization is controlled through out the
      organization by using a Master Management server. Total Defense’s architecture allows for a proxy management server
      that businesses with multiple locations could use ensure to updates are available to local endpoints and optimize network
      utilization.

System Requirements:
 Server Requirements for small to medium sites (<1000 endpoints):
 COMPONENT                                                       PROCESSOR                                                                                   RAM                  HARD DRIVE
 Management Server Minimum                                       1.80 GHz Pentium 4*                                                                         1GB**                40GB
 Management Server Recommended                                   2.80 GHz Intel Core 2 Duo                                                                   2GB                  100GB
 Microsoft SQL Server                                            2.80 GHz Intel Core 2 Duo                                                                   2GB                  100GB
 *CPUs with lower specifications have not been tested, though might be capable if the CPU speed/model is close to the above.
 **A Management Server with 1 GB of RAM supports a maximum of 250 endpoints and one partition. It should be used only for basic tasks, such as viewing the Dashboard, and does not support the creation, management, or deployment
 of Proactive Protection policies. These restrictions disappear if you upgrade the Management Server to 2 GB or more.
 Server requirements for large sites (>1000 endpoints):
 Component                                                       Processor                                                              RAM                  Hard Drive           Recommended Optional Cards
 Master Management Server                                        3 GHz Dual Quad Core Intel Xeon                                        8GB                  500GB                Dual Network Interface Cards
 Event Server                                                    3 GHz Dual Quad Core Intel Xeon                                        8GB                  500GB                Dual Network Interface Cards
 Report Server                                                   3 GHz Dual Quad Core Intel Xeon                                        8GB                  500GB                Dual Network Interface Cards
 Management Server Proxy                                         3 GHz Intel Xeon                                                       4GB                  100GB




                                                                                        www.totaldefense.com
Event Proxy                          3 GHz Intel Xeon                          4GB           100GB
Microsoft SQL Server                 3 GHz Intel Xeon                          4GB           100GB
Client Requirements:
CLIENT HOST                          PROCESSOR                                               RAM              HARD DRIVE
Host Machine Minimum                 1.0 GHz Intel Pentium class                             512MB            600MB
Host Machine Recommended             1.0 GHz (or higher) Intel Pentium class                 1GB              600MB


Operating System Support
Server:
OPERATING SYSTEM                          ARCHITECTURE                               SERVICE PACK   EDITION
Windows 2003 Server                                                                  SP2            Standard, Enterprise
Windows 2003 Server R2                    32-bit                                     SP2            Standard, Enterprise
Windows 2003 Server R2                    64-bit                                     SP2            Standard
Windows 2008 Server                       32-bit, 64-bit                             SP2            Standard, Enterprise
Windows 2008 Server R2                    64-bit                                     None, SP1      Standard, Enterprise, Datacenter
Windows Small Business Server 2003        32-bit*                                    SP1, SP2       Standard, Premium
                                                                                     None, Sp1,
Windows Small Business Server 2003 R2     32-bit*                                                   Premium
                                                                                     SP2
Windows Small Business Server 2008        64-bit*                                    SP2            Standard, Premium
Windows Small Business Server 2011                                                   None           Standard
Windows 7                                 32-bit, 64-bit                             SP1            Professional, Enterprise, Ultimate
Client:
OPERATING SYSTEM                          ARCHITECTURE                               SERVICE PACK   EDITION
Windows XP                                32-bit                                     SP3            Professional
Windows XP                                64-bit                                     SP2            Professional
Windows 2000                                                                         SP4            Professional
Windows 2000 Server                                                                  SP4            Standard
Windows 2003 Server                       32-bit, 64-bit                             SP2            Standard, Enterprise
Windows 2003 Server R2                    32-bit, 64-bit                             SP2            Standard, Enterprise, Datacenter
Windows Vista                             32-bit, 64-bit                             SP1/SP2        Ultimate
Windows 2008 Server                       32-bit, 64-bit                             SP2            Standard, Enterprise, Datacenter
Windows 2008 Server R2                    64-bit                                     None, SP1      Standard, Enterprise, Datacenter
Windows Small Business Server 2003        32-bit                                     SP2            Premium
Windows Small Business Server 2003 R2     32-bit*                                    SP2            Premium
Windows Small Business Server 2003 R2                                                None, SP1      Premium
Windows Small Business Server 2008        64-bit*                                    SP2            Standard, Premium
Windows Small Business Server 2011                                                   None           Standard
Windows 7                                 32-bit, 64-bit                             None, SP1      Ultimate, Professional, Enterprise




                                                           www.totaldefense.com
SCREENSHOTS:




Client 1




Client 2




Client 3



               www.totaldefense.com
POLICY 1




POLICY 2




Application Protection Policy




                                www.totaldefense.com
GROUPWARE Policy




Free Evaluation

Total Defense’s services can be easily and freely evaluated before committing to any subscription period.

Contact us at: EnterpriseTrials@totaldefense.com

Full reporting services are provided to help you learn what is going on with your email and Web usage and understand
all that Total Defense has to offer. There is no obligation to subscribe and it is quick and easy to disconnect the service
if you don’t wish to continue.

About Total Defense

Total Defense is a global leader in malware detection and anti-crimeware solutions. Over 50,000 businesses across
a wide spectrum of industries have deployed the Company’s solutions, including some of the most sophisticated
buyers of security technology worldwide, and over four million consumers worldwide use Total Defense’s products.

The Company’s solutions include anti-malware, anti-virus, parental controls, intrusion prevention, mobile security,
online back-up and PC optimization. Total Defense is a former business of CA Technologies, one of the largest
software companies in the world, and has operations in New York, California, Europe and Asia.

Visit http://totaldefense.com/business.aspx for more details

Contact Total Defense

Contact details are available online at: www.TotalDefense.com




                                                     www.totaldefense.com

More Related Content

What's hot

Sonexis Conference Manager 9.3 Data Sheet
Sonexis Conference Manager 9.3 Data SheetSonexis Conference Manager 9.3 Data Sheet
Sonexis Conference Manager 9.3 Data SheetFrankSegarra
 
Zimbra Single Server Cluster Installation Guide
Zimbra Single Server Cluster Installation GuideZimbra Single Server Cluster Installation Guide
Zimbra Single Server Cluster Installation Guidegerd moser
 
Dcs 3411&3430 A1 Manual V1 01(Ww)
Dcs 3411&3430 A1 Manual V1 01(Ww)Dcs 3411&3430 A1 Manual V1 01(Ww)
Dcs 3411&3430 A1 Manual V1 01(Ww)guest792142
 
Advertising System Upgrade
Advertising System UpgradeAdvertising System Upgrade
Advertising System Upgradeandrew maybir
 
IBM Redbooks Product Guide: IBM BladeCenter HS23E
IBM Redbooks Product Guide: IBM BladeCenter HS23EIBM Redbooks Product Guide: IBM BladeCenter HS23E
IBM Redbooks Product Guide: IBM BladeCenter HS23EIBM India Smarter Computing
 
NetMagic Dedicated Hosting
NetMagic Dedicated HostingNetMagic Dedicated Hosting
NetMagic Dedicated Hostingwebhostingguy
 
Desktop board-dq45cb-executive-brief
Desktop board-dq45cb-executive-briefDesktop board-dq45cb-executive-brief
Desktop board-dq45cb-executive-briefIBRAHIM KHAN
 
Maemo Platform Security Fosdem
Maemo Platform Security FosdemMaemo Platform Security Fosdem
Maemo Platform Security FosdemElena Reshetova
 
Performance of three Intel-based SMB servers running Web, email, and database...
Performance of three Intel-based SMB servers running Web, email, and database...Performance of three Intel-based SMB servers running Web, email, and database...
Performance of three Intel-based SMB servers running Web, email, and database...Principled Technologies
 

What's hot (10)

Sonexis Conference Manager 9.3 Data Sheet
Sonexis Conference Manager 9.3 Data SheetSonexis Conference Manager 9.3 Data Sheet
Sonexis Conference Manager 9.3 Data Sheet
 
Zimbra Single Server Cluster Installation Guide
Zimbra Single Server Cluster Installation GuideZimbra Single Server Cluster Installation Guide
Zimbra Single Server Cluster Installation Guide
 
Dcs 3411&3430 A1 Manual V1 01(Ww)
Dcs 3411&3430 A1 Manual V1 01(Ww)Dcs 3411&3430 A1 Manual V1 01(Ww)
Dcs 3411&3430 A1 Manual V1 01(Ww)
 
Advertising System Upgrade
Advertising System UpgradeAdvertising System Upgrade
Advertising System Upgrade
 
IBM Redbooks Product Guide: IBM BladeCenter HS23E
IBM Redbooks Product Guide: IBM BladeCenter HS23EIBM Redbooks Product Guide: IBM BladeCenter HS23E
IBM Redbooks Product Guide: IBM BladeCenter HS23E
 
NetMagic Dedicated Hosting
NetMagic Dedicated HostingNetMagic Dedicated Hosting
NetMagic Dedicated Hosting
 
Nd8301nvr
Nd8301nvrNd8301nvr
Nd8301nvr
 
Desktop board-dq45cb-executive-brief
Desktop board-dq45cb-executive-briefDesktop board-dq45cb-executive-brief
Desktop board-dq45cb-executive-brief
 
Maemo Platform Security Fosdem
Maemo Platform Security FosdemMaemo Platform Security Fosdem
Maemo Platform Security Fosdem
 
Performance of three Intel-based SMB servers running Web, email, and database...
Performance of three Intel-based SMB servers running Web, email, and database...Performance of three Intel-based SMB servers running Web, email, and database...
Performance of three Intel-based SMB servers running Web, email, and database...
 

Similar to Total Defense Endpoint Premium r12 DataSheet

Yashi dealer meeting settembre 2016 tecnologie xeon intel italia
Yashi dealer meeting settembre 2016 tecnologie xeon intel italiaYashi dealer meeting settembre 2016 tecnologie xeon intel italia
Yashi dealer meeting settembre 2016 tecnologie xeon intel italiaYashi Italia
 
4 aa0 7762enw-datasheet_dl380g7
4 aa0 7762enw-datasheet_dl380g74 aa0 7762enw-datasheet_dl380g7
4 aa0 7762enw-datasheet_dl380g7neo-rider
 
IBM Redbooks Product Guide: IBM System x3630 M4
 IBM Redbooks Product Guide: IBM System x3630 M4 IBM Redbooks Product Guide: IBM System x3630 M4
IBM Redbooks Product Guide: IBM System x3630 M4IBM India Smarter Computing
 
Introduction to Small Business Server 2003 Part 1
Introduction to Small Business Server 2003 Part 1Introduction to Small Business Server 2003 Part 1
Introduction to Small Business Server 2003 Part 1Robert Crane
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewSteven Wilder
 
ObserveIT Remote Access Session Recorder - Product Datasheet
ObserveIT Remote Access Session Recorder - Product DatasheetObserveIT Remote Access Session Recorder - Product Datasheet
ObserveIT Remote Access Session Recorder - Product DatasheetObserveIT
 
NetMagic Dedicated Hosting
NetMagic Dedicated HostingNetMagic Dedicated Hosting
NetMagic Dedicated Hostingwebhostingguy
 
Intel xeon e5v3 y sdi
Intel xeon e5v3 y sdiIntel xeon e5v3 y sdi
Intel xeon e5v3 y sdiTelecomputer
 
M|18 Intel and MariaDB: Strategic Collaboration to Enhance MariaDB Functional...
M|18 Intel and MariaDB: Strategic Collaboration to Enhance MariaDB Functional...M|18 Intel and MariaDB: Strategic Collaboration to Enhance MariaDB Functional...
M|18 Intel and MariaDB: Strategic Collaboration to Enhance MariaDB Functional...MariaDB plc
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01Bố Su
 
Stn Event Presentation 1.12.10 Microsoft
Stn Event Presentation 1.12.10   MicrosoftStn Event Presentation 1.12.10   Microsoft
Stn Event Presentation 1.12.10 Microsoftmcini
 

Similar to Total Defense Endpoint Premium r12 DataSheet (20)

Yashi dealer meeting settembre 2016 tecnologie xeon intel italia
Yashi dealer meeting settembre 2016 tecnologie xeon intel italiaYashi dealer meeting settembre 2016 tecnologie xeon intel italia
Yashi dealer meeting settembre 2016 tecnologie xeon intel italia
 
Dell power edge r310_spec_sheet
Dell power edge r310_spec_sheetDell power edge r310_spec_sheet
Dell power edge r310_spec_sheet
 
4 aa0 7762enw-datasheet_dl380g7
4 aa0 7762enw-datasheet_dl380g74 aa0 7762enw-datasheet_dl380g7
4 aa0 7762enw-datasheet_dl380g7
 
IBM Redbooks Product Guide: IBM System x3630 M4
 IBM Redbooks Product Guide: IBM System x3630 M4 IBM Redbooks Product Guide: IBM System x3630 M4
IBM Redbooks Product Guide: IBM System x3630 M4
 
Introduction to Small Business Server 2003 Part 1
Introduction to Small Business Server 2003 Part 1Introduction to Small Business Server 2003 Part 1
Introduction to Small Business Server 2003 Part 1
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 Overview
 
ObserveIT Remote Access Session Recorder - Product Datasheet
ObserveIT Remote Access Session Recorder - Product DatasheetObserveIT Remote Access Session Recorder - Product Datasheet
ObserveIT Remote Access Session Recorder - Product Datasheet
 
Windows 7 For Itpro
Windows 7 For ItproWindows 7 For Itpro
Windows 7 For Itpro
 
NetMagic Dedicated Hosting
NetMagic Dedicated HostingNetMagic Dedicated Hosting
NetMagic Dedicated Hosting
 
Intel xeon e5v3 y sdi
Intel xeon e5v3 y sdiIntel xeon e5v3 y sdi
Intel xeon e5v3 y sdi
 
IBM System x3500 M4
IBM System x3500 M4IBM System x3500 M4
IBM System x3500 M4
 
Window server editions
Window server editionsWindow server editions
Window server editions
 
M|18 Intel and MariaDB: Strategic Collaboration to Enhance MariaDB Functional...
M|18 Intel and MariaDB: Strategic Collaboration to Enhance MariaDB Functional...M|18 Intel and MariaDB: Strategic Collaboration to Enhance MariaDB Functional...
M|18 Intel and MariaDB: Strategic Collaboration to Enhance MariaDB Functional...
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01
 
Stn Event Presentation 1.12.10 Microsoft
Stn Event Presentation 1.12.10   MicrosoftStn Event Presentation 1.12.10   Microsoft
Stn Event Presentation 1.12.10 Microsoft
 
IBM System x3300 M4
IBM System x3300 M4IBM System x3300 M4
IBM System x3300 M4
 
IBM Redbooks Product Guide: IBM System x3250 M4
IBM Redbooks Product Guide: IBM System x3250 M4IBM Redbooks Product Guide: IBM System x3250 M4
IBM Redbooks Product Guide: IBM System x3250 M4
 
IBM System x3550 M4
IBM System x3550 M4IBM System x3550 M4
IBM System x3550 M4
 
IBM Flex System x220 Compute Node
IBM Flex System x220 Compute NodeIBM Flex System x220 Compute Node
IBM Flex System x220 Compute Node
 
IBM Redbooks Product Guide: IBM System x3530 M4
IBM Redbooks Product Guide: IBM System x3530 M4IBM Redbooks Product Guide: IBM System x3530 M4
IBM Redbooks Product Guide: IBM System x3530 M4
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

Total Defense Endpoint Premium r12 DataSheet

  • 1. DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious programs, and malware, using a policy-driven single scan security engine in conjunction with an endpoint-based SPI firewall. With smart features like automatic endpoint discovery, setup wizard, and intuitive management console, Total Defense makes network protection easy to install, deploy, and manage. Total Defense Endpoint Premium r12 provides access an extensive database of known good applications to create policies that prevent applications exhibiting abnormal or suspicious behavior from executing. Total Defense offers administrators the capability to create policies based on location, user, endpoints and many other factors, granting or denying access based on defined policies. Host-based intrusion prevention system (HIPS) fully controls endpoint application activity, while unified network control (UNC) offers network access protection by validating endpoints before they connect to network resources. The endpoint client offers a stateful packet inspection (SPI) firewall that protects endpoints from intrusions, even when disconnected from the network. The deployed endpoint clients are fully hardened and protected from being disabled by user actions or malicious software. Key Features • Robust anti-malware engine: Total Defense’s award winning malware engine provides full-fledged protection against viruses, trojans, worms, rootkits, spywares and bots. • Rootkit protection: Total Defense for Endpoint & Gateway r12 provides support for detecting malwares that are using stealth technologies to prevent their detection from security software. While it is easy for a good signature-driven product to find a known sample that has not yet been activated, it is becoming increasingly challenging to detect the sample once it is running and trying to hide itself and other malicious components. Our improved malware engine allows administrators to detect and remove rootkits. • Centralized Web-based Management Console: Endpoint security monitoring, policy deployment, license management, event management, and reporting managed from a central web based console with an intuitive design. • Firewall: The Total Defense Firewall acts as a barrier between the corporate endpoints and the external Internet preventing unauthorized access. It thwarts potential hackers and protects corporate networks from being exploited by malicious attacks. Total Defense provides built-in firewall rule sets, and also the capability to define user specific add-on rule sets. • Intrusion Prevention and Detection: An added layer of security beyond the firewall, the Host based Intrusion Prevention System (HIPS) is network based, detects and automatically blocks attacks. • Application Control: Total Defense has robust application control capabilities with one of the largest databases of applications grouped into categories. Total Defense has integrated the knowledge of application behavior into the firewall for enhanced protection. Total Defense research maintains and updates one of the most verbose databases on application information. Check against known application database. Set policy actions for missing application signatures, unknown generic and system applications. • Vulnerability assessment: Set policies to enforce compliance and report disabled/locked accounts, invalid login attempts, users with expired passwords, passwords non-compliant with organizational policies (e.g. frequency of change, password length, etc.). www.totaldefense.com
  • 2. Location awareness: Total Defense Endpoint protection supports location/zone awareness at each partition and user level. There is no restriction on the number of zones that can be created and policies can be applied to each zone. When an endpoint client connects from a certain zone, the appropriate policies will come into effect. • Pre-defined policies: Total Defense’s pre-defined policies enable administrators an option for quick deployment and offer recommended policy settings. Policies control all endpoint settings, can be defined in a granular manner and applied down to the location level. • Exclusion lists: Administrators have the flexibility to reduce performance overhead by setting up list of critical and data intensive applications that need to be excluded from scan. • Comprehensive reporting: 250+ out of the box reports provide detailed and summary views for better tracking of protection and malware status on endpoints.. • Endpoint Discovery: Total Defense’s management server enables administrators to discover unmanaged endpoints easily by providing various options like network scan, active directory scan, IP range scan, and quick discovery (scan based on OS type). Endpoints “phone home” to the management server and simplify the deployment and configuration process. • Role-based administration: Allows the segregation of management realms, so administrators can focus only on assigned dominions. • Groupware protection: Total Defense Endpoint Premium provides protection for groupware like Microsoft Exchange, Lotus Notes, and Microsoft SharePoint. Total Defense scans and protects at the mail-store level, preventing viruses and threats from being delivered to the endpoint. • Unified Network Control (NAP): Validates endpoints for security compliance before admission to the network. Total Defense Anti-Virus r12 allows identity based policy definition enabling administrators to define specific policies based on users’ functional roles and associated identities. • Flexible architecture: Centralized policy, product and update synchronization is controlled through out the organization by using a Master Management server. Total Defense’s architecture allows for a proxy management server that businesses with multiple locations could use ensure to updates are available to local endpoints and optimize network utilization. System Requirements: Server Requirements for small to medium sites (<1000 endpoints): COMPONENT PROCESSOR RAM HARD DRIVE Management Server Minimum 1.80 GHz Pentium 4* 1GB** 40GB Management Server Recommended 2.80 GHz Intel Core 2 Duo 2GB 100GB Microsoft SQL Server 2.80 GHz Intel Core 2 Duo 2GB 100GB *CPUs with lower specifications have not been tested, though might be capable if the CPU speed/model is close to the above. **A Management Server with 1 GB of RAM supports a maximum of 250 endpoints and one partition. It should be used only for basic tasks, such as viewing the Dashboard, and does not support the creation, management, or deployment of Proactive Protection policies. These restrictions disappear if you upgrade the Management Server to 2 GB or more. Server requirements for large sites (>1000 endpoints): Component Processor RAM Hard Drive Recommended Optional Cards Master Management Server 3 GHz Dual Quad Core Intel Xeon 8GB 500GB Dual Network Interface Cards Event Server 3 GHz Dual Quad Core Intel Xeon 8GB 500GB Dual Network Interface Cards Report Server 3 GHz Dual Quad Core Intel Xeon 8GB 500GB Dual Network Interface Cards Management Server Proxy 3 GHz Intel Xeon 4GB 100GB www.totaldefense.com
  • 3. Event Proxy 3 GHz Intel Xeon 4GB 100GB Microsoft SQL Server 3 GHz Intel Xeon 4GB 100GB Client Requirements: CLIENT HOST PROCESSOR RAM HARD DRIVE Host Machine Minimum 1.0 GHz Intel Pentium class 512MB 600MB Host Machine Recommended 1.0 GHz (or higher) Intel Pentium class 1GB 600MB Operating System Support Server: OPERATING SYSTEM ARCHITECTURE SERVICE PACK EDITION Windows 2003 Server SP2 Standard, Enterprise Windows 2003 Server R2 32-bit SP2 Standard, Enterprise Windows 2003 Server R2 64-bit SP2 Standard Windows 2008 Server 32-bit, 64-bit SP2 Standard, Enterprise Windows 2008 Server R2 64-bit None, SP1 Standard, Enterprise, Datacenter Windows Small Business Server 2003 32-bit* SP1, SP2 Standard, Premium None, Sp1, Windows Small Business Server 2003 R2 32-bit* Premium SP2 Windows Small Business Server 2008 64-bit* SP2 Standard, Premium Windows Small Business Server 2011 None Standard Windows 7 32-bit, 64-bit SP1 Professional, Enterprise, Ultimate Client: OPERATING SYSTEM ARCHITECTURE SERVICE PACK EDITION Windows XP 32-bit SP3 Professional Windows XP 64-bit SP2 Professional Windows 2000 SP4 Professional Windows 2000 Server SP4 Standard Windows 2003 Server 32-bit, 64-bit SP2 Standard, Enterprise Windows 2003 Server R2 32-bit, 64-bit SP2 Standard, Enterprise, Datacenter Windows Vista 32-bit, 64-bit SP1/SP2 Ultimate Windows 2008 Server 32-bit, 64-bit SP2 Standard, Enterprise, Datacenter Windows 2008 Server R2 64-bit None, SP1 Standard, Enterprise, Datacenter Windows Small Business Server 2003 32-bit SP2 Premium Windows Small Business Server 2003 R2 32-bit* SP2 Premium Windows Small Business Server 2003 R2 None, SP1 Premium Windows Small Business Server 2008 64-bit* SP2 Standard, Premium Windows Small Business Server 2011 None Standard Windows 7 32-bit, 64-bit None, SP1 Ultimate, Professional, Enterprise www.totaldefense.com
  • 4. SCREENSHOTS: Client 1 Client 2 Client 3 www.totaldefense.com
  • 5. POLICY 1 POLICY 2 Application Protection Policy www.totaldefense.com
  • 6. GROUPWARE Policy Free Evaluation Total Defense’s services can be easily and freely evaluated before committing to any subscription period. Contact us at: EnterpriseTrials@totaldefense.com Full reporting services are provided to help you learn what is going on with your email and Web usage and understand all that Total Defense has to offer. There is no obligation to subscribe and it is quick and easy to disconnect the service if you don’t wish to continue. About Total Defense Total Defense is a global leader in malware detection and anti-crimeware solutions. Over 50,000 businesses across a wide spectrum of industries have deployed the Company’s solutions, including some of the most sophisticated buyers of security technology worldwide, and over four million consumers worldwide use Total Defense’s products. The Company’s solutions include anti-malware, anti-virus, parental controls, intrusion prevention, mobile security, online back-up and PC optimization. Total Defense is a former business of CA Technologies, one of the largest software companies in the world, and has operations in New York, California, Europe and Asia. Visit http://totaldefense.com/business.aspx for more details Contact Total Defense Contact details are available online at: www.TotalDefense.com www.totaldefense.com