Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious programs, and malware, using a policy-driven single scan security engine in conjunction with an endpoint-based SPI (stateful packet inspection) firewall.
Visit www.totaldefense.com for a free trial.
How to Remove Document Management Hurdles with X-Docs?
Total Defense Endpoint Premium r12 DataSheet
1. DATA SHEET
Total Defense Endpoint Premium r12
Overview:
Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems
from intrusions, malicious programs, and malware, using a policy-driven single scan security engine in conjunction with an
endpoint-based SPI firewall. With smart features like automatic endpoint discovery, setup wizard, and intuitive management
console, Total Defense makes network protection easy to install, deploy, and manage.
Total Defense Endpoint Premium r12 provides access an extensive database of known good applications to create policies
that prevent applications exhibiting abnormal or suspicious behavior from executing. Total Defense offers administrators the
capability to create policies based on location, user, endpoints and many other factors, granting or denying access based on
defined policies. Host-based intrusion prevention system (HIPS) fully controls endpoint application activity, while unified network
control (UNC) offers network access protection by validating endpoints before they connect to network resources.
The endpoint client offers a stateful packet inspection (SPI) firewall that protects endpoints from intrusions, even when
disconnected from the network. The deployed endpoint clients are fully hardened and protected from being disabled by user
actions or malicious software.
Key Features
• Robust anti-malware engine: Total Defense’s award winning malware engine provides full-fledged protection against
viruses, trojans, worms, rootkits, spywares and bots.
• Rootkit protection: Total Defense for Endpoint & Gateway r12 provides support for detecting malwares that are using
stealth technologies to prevent their detection from security software. While it is easy for a good signature-driven product
to find a known sample that has not yet been activated, it is becoming increasingly challenging to detect the sample once it
is running and trying to hide itself and other malicious components. Our improved malware engine allows administrators to
detect and remove rootkits.
• Centralized Web-based Management Console: Endpoint security monitoring, policy deployment, license
management, event management, and reporting managed from a central web based console with an intuitive design.
• Firewall: The Total Defense Firewall acts as a barrier between the corporate endpoints and the external Internet
preventing unauthorized access. It thwarts potential hackers and protects corporate networks from being exploited by
malicious attacks. Total Defense provides built-in firewall rule sets, and also the capability to define user specific add-on
rule sets.
• Intrusion Prevention and Detection: An added layer of security beyond the firewall, the Host based Intrusion
Prevention System (HIPS) is network based, detects and automatically blocks attacks.
• Application Control: Total Defense has robust application control capabilities with one of the largest databases of
applications grouped into categories. Total Defense has integrated the knowledge of application behavior into the firewall
for enhanced protection. Total Defense research maintains and updates one of the most verbose databases on application
information. Check against known application database. Set policy actions for missing application signatures, unknown
generic and system applications.
• Vulnerability assessment: Set policies to enforce compliance and report disabled/locked accounts, invalid login
attempts, users with expired passwords, passwords non-compliant with organizational policies (e.g. frequency of change,
password length, etc.).
www.totaldefense.com
2. • Location awareness: Total Defense Endpoint protection supports location/zone awareness at each partition and user
level. There is no restriction on the number of zones that can be created and policies can be applied to each zone. When an
endpoint client connects from a certain zone, the appropriate policies will come into effect.
• Pre-defined policies: Total Defense’s pre-defined policies enable administrators an option for quick deployment and
offer recommended policy settings. Policies control all endpoint settings, can be defined in a granular manner and applied
down to the location level.
• Exclusion lists: Administrators have the flexibility to reduce performance overhead by setting up list of critical and data
intensive applications that need to be excluded from scan.
• Comprehensive reporting: 250+ out of the box reports provide detailed and summary views for better tracking of
protection and malware status on endpoints..
• Endpoint Discovery: Total Defense’s management server enables administrators to discover unmanaged endpoints easily
by providing various options like network scan, active directory scan, IP range scan, and quick discovery (scan based on OS
type). Endpoints “phone home” to the management server and simplify the deployment and configuration process.
• Role-based administration: Allows the segregation of management realms, so administrators can focus only on
assigned dominions.
• Groupware protection: Total Defense Endpoint Premium provides protection for groupware like Microsoft Exchange,
Lotus Notes, and Microsoft SharePoint. Total Defense scans and protects at the mail-store level, preventing viruses and
threats from being delivered to the endpoint.
• Unified Network Control (NAP): Validates endpoints for security compliance before admission to the network. Total
Defense Anti-Virus r12 allows identity based policy definition enabling administrators to define specific policies based on
users’ functional roles and associated identities.
• Flexible architecture: Centralized policy, product and update synchronization is controlled through out the
organization by using a Master Management server. Total Defense’s architecture allows for a proxy management server
that businesses with multiple locations could use ensure to updates are available to local endpoints and optimize network
utilization.
System Requirements:
Server Requirements for small to medium sites (<1000 endpoints):
COMPONENT PROCESSOR RAM HARD DRIVE
Management Server Minimum 1.80 GHz Pentium 4* 1GB** 40GB
Management Server Recommended 2.80 GHz Intel Core 2 Duo 2GB 100GB
Microsoft SQL Server 2.80 GHz Intel Core 2 Duo 2GB 100GB
*CPUs with lower specifications have not been tested, though might be capable if the CPU speed/model is close to the above.
**A Management Server with 1 GB of RAM supports a maximum of 250 endpoints and one partition. It should be used only for basic tasks, such as viewing the Dashboard, and does not support the creation, management, or deployment
of Proactive Protection policies. These restrictions disappear if you upgrade the Management Server to 2 GB or more.
Server requirements for large sites (>1000 endpoints):
Component Processor RAM Hard Drive Recommended Optional Cards
Master Management Server 3 GHz Dual Quad Core Intel Xeon 8GB 500GB Dual Network Interface Cards
Event Server 3 GHz Dual Quad Core Intel Xeon 8GB 500GB Dual Network Interface Cards
Report Server 3 GHz Dual Quad Core Intel Xeon 8GB 500GB Dual Network Interface Cards
Management Server Proxy 3 GHz Intel Xeon 4GB 100GB
www.totaldefense.com
3. Event Proxy 3 GHz Intel Xeon 4GB 100GB
Microsoft SQL Server 3 GHz Intel Xeon 4GB 100GB
Client Requirements:
CLIENT HOST PROCESSOR RAM HARD DRIVE
Host Machine Minimum 1.0 GHz Intel Pentium class 512MB 600MB
Host Machine Recommended 1.0 GHz (or higher) Intel Pentium class 1GB 600MB
Operating System Support
Server:
OPERATING SYSTEM ARCHITECTURE SERVICE PACK EDITION
Windows 2003 Server SP2 Standard, Enterprise
Windows 2003 Server R2 32-bit SP2 Standard, Enterprise
Windows 2003 Server R2 64-bit SP2 Standard
Windows 2008 Server 32-bit, 64-bit SP2 Standard, Enterprise
Windows 2008 Server R2 64-bit None, SP1 Standard, Enterprise, Datacenter
Windows Small Business Server 2003 32-bit* SP1, SP2 Standard, Premium
None, Sp1,
Windows Small Business Server 2003 R2 32-bit* Premium
SP2
Windows Small Business Server 2008 64-bit* SP2 Standard, Premium
Windows Small Business Server 2011 None Standard
Windows 7 32-bit, 64-bit SP1 Professional, Enterprise, Ultimate
Client:
OPERATING SYSTEM ARCHITECTURE SERVICE PACK EDITION
Windows XP 32-bit SP3 Professional
Windows XP 64-bit SP2 Professional
Windows 2000 SP4 Professional
Windows 2000 Server SP4 Standard
Windows 2003 Server 32-bit, 64-bit SP2 Standard, Enterprise
Windows 2003 Server R2 32-bit, 64-bit SP2 Standard, Enterprise, Datacenter
Windows Vista 32-bit, 64-bit SP1/SP2 Ultimate
Windows 2008 Server 32-bit, 64-bit SP2 Standard, Enterprise, Datacenter
Windows 2008 Server R2 64-bit None, SP1 Standard, Enterprise, Datacenter
Windows Small Business Server 2003 32-bit SP2 Premium
Windows Small Business Server 2003 R2 32-bit* SP2 Premium
Windows Small Business Server 2003 R2 None, SP1 Premium
Windows Small Business Server 2008 64-bit* SP2 Standard, Premium
Windows Small Business Server 2011 None Standard
Windows 7 32-bit, 64-bit None, SP1 Ultimate, Professional, Enterprise
www.totaldefense.com
6. GROUPWARE Policy
Free Evaluation
Total Defense’s services can be easily and freely evaluated before committing to any subscription period.
Contact us at: EnterpriseTrials@totaldefense.com
Full reporting services are provided to help you learn what is going on with your email and Web usage and understand
all that Total Defense has to offer. There is no obligation to subscribe and it is quick and easy to disconnect the service
if you don’t wish to continue.
About Total Defense
Total Defense is a global leader in malware detection and anti-crimeware solutions. Over 50,000 businesses across
a wide spectrum of industries have deployed the Company’s solutions, including some of the most sophisticated
buyers of security technology worldwide, and over four million consumers worldwide use Total Defense’s products.
The Company’s solutions include anti-malware, anti-virus, parental controls, intrusion prevention, mobile security,
online back-up and PC optimization. Total Defense is a former business of CA Technologies, one of the largest
software companies in the world, and has operations in New York, California, Europe and Asia.
Visit http://totaldefense.com/business.aspx for more details
Contact Total Defense
Contact details are available online at: www.TotalDefense.com
www.totaldefense.com