Key Features. DATA SHEET

Similar documents
Symantec Endpoint Protection

Symantec Network Access Control Starter Edition

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Securing Today s Mobile Workforce

SaaS Flyer for Trend Micro

Symantec Network Access Control Starter Edition

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software.

Symantec Network Access Control Starter Edition

Symantec Multi-tier Protection

Symantec Multi-tier Protection

Seqrite Endpoint Security

Free Download BitDefender Client Security 1 Year 50 PCs softwares download ]

Reviewer s guide. PureMessage for Windows/Exchange Product tour

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

Sage MAS 90 Extended Enterprise Suite Version 1.4 Supported Platform Matrix Revised as of March 11, 2010

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Trend Micro Core Protection Module 10.6 SP1 System Requirements

CA Host-Based Intrusion Prevention System r8

HP E-PCM Plus Network Management Software Series Overview

QuickSpecs HP ProCurve Manager Plus 3.1

IBM Proventia Management SiteProtector Installation Guide

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

Client Server Security3

Cisco Network Admission Control (NAC) Solution

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.

Get BitDefender Client Security 2 Years 30 PCs software suite ]

Installer Guide For Windows Vista Sp2 32 Bit)

Cisco Identity Services Engine

NetDefend Firewall UTM Services

Quick Heal AntiVirus for Server. Optimized Antivirus Scanning. Low on Resources. Strong on Technology.

Seqrite Antivirus for Server

escan for Windows: escan System Requirements

Avira Endpoint Security. HowTo

Cracked BitDefender Client Security 2 Years 20 PCs lowest price software ]

Symantec Endpoint Protection Getting Started Guide

Sage ERP MAS 200 SQL Version 4.50 Supported Platform Matrix Revised as of July 24, 2014

Symantec Client Security. Integrated protection for network and remote clients.

Sage 100 Standard Version 2017 Supported Platform Matrix Created as of October 25, 2016

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

IBM Europe, Middle East, and Africa Services Announcement ZS , dated October 6, 2009

F-Secure Client Security. Administrator's Guide

WatchGuard XTMv Setup Guide

HP ProCurve Manager Plus 3.0

Trend Micro Control Manager 6.0 Service Pack 3 System Requirements

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Sage 100 Premium Version 2017 Supported Platform Matrix Created as of October 28, 2016

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates

Manually Vista Sp2 32 Bit Microsoft Windows Installer

Windows Server Upgrade tips and tricks. Winnie Leung Technology Specialist Microsoft Corporation

WatchGuard Total Security Complete network protection in a single, easy-to-deploy solution.

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

F-Secure PSB Getting Started Guide

Kaspersky Security Center 10

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Manual Internet Explorer 8 For Windows Xp Sp2 32 Bit

Airtel PC Secure Trouble Shooting Guide

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

# ROLE DESCRIPTION / BENEFIT ISSUES / RISKS

Comodo Endpoint Security Manager Professional Edition Software Version 3.3

McAfee Embedded Control

Professional Edition. Hardware Requirements

McAfee Public Cloud Server Security Suite

RightNow May 08 Workstation Specifications

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

: Administration of Symantec Endpoint Protection 14 Exam

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

Implementation Guide for Symantec Endpoint Protection Small Business Edition

Symantec Endpoint Protection Installation Guide

Thirtyseven4 Endpoint Security 7.0

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection

ForeScout Extended Module for Symantec Endpoint Protection

System Requirements 2008 R2

Cisco NAC Network Module for Integrated Services Routers

HP ProCurve Network Access Controller 800

Notices. Third Party Project Usage. Sample Code in Documentation

Kaspersky Administration Kit 8.0 REFERENCE GUIDE

Sophos Anti-Virus for VMware vshield: On-Premise Edition startup guide. Product version: 2.1

McAfee Network Security Platform 8.3

Novell ZENworks Network Access Control

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Compatibility and Performance with Arc Premium Version 5.1.2

AVG File Server. User Manual. Document revision ( )

N-Dimension n-platform 340S Unified Threat Management System

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Quick Heal Microsoft Exchange Protection

Teleworking and Security: IT All Begins with Endpoints. Jim Jessup Solutions Manager, Information Risk Management June 19, 2007

Future-ready security for small and mid-size enterprises

SentinelOne Technical Brief

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

VMware Infrastructure 3 Primer Update 2 and later for ESX Server 3.5, ESX Server 3i version 3.5, VirtualCenter 2.5

How To Manually Uninstall Symantec Antivirus Corporate Edition 10.x Client

F-Secure Policy Manager Administrator's Guide

McAfee Network Security Platform

RightNow February 09 Workstation Specifications

Transcription:

DATA SHEET Total Defense THREAT MANAGER r12 Overview: Total Defense Threat Manager r12 integrates anti-malware, groupware protection and network access control in one easy-touse solution, providing comprehensive Internet security to your network. The policy-driven security solution protects networks from unauthorized access, viruses, spyware, and other malware threats. Using one of the fastest malware scanning engines in the world, Total Defense Threat Manager r12 provides real-time protection while minimizing the impact on system performance. It intelligently validates network traffic and checks major groupware platforms for embedded threats in messages, attachments, and archived files. Total Defense Threat Manager r12 offers built-in scalability and integration features, so you can scale or integrate with other security solutions using the suite s Open Vulnerability and Assessment Language (OVAL), which defines international standards for communication between security tools and services. Total Defense Threat Manager r12 offers enhanced endpoint protection with a hardened client application, which is unyielding to end-user interruption and disablement. Key Features Robust anti-malware engine: Total Defense s award winning malware engine provides full-fledged protection against viruses, trojans, worms, rootkits, spywares and bots. Rootkit protection: Total Defense for Endpoint & Gateway r12 provides support for detecting malwares that are using stealth technologies to prevent their detection from security software. While it is easy for a good signature-driven product to find a known sample that has not yet been activated, it is becoming increasingly challenging to detect the sample once it is running and trying to hide itself and other malicious components. Our improved malware engine allows administrators to detect and remove rootkits. Centralized Web-based Management Console: Endpoint security monitoring, policy deployment, license management, event management, and reporting managed from a central web based console with an intuitive design. Vulnerability assessment: Set policies to enforce compliance and report disabled/locked accounts, invalid login attempts, users with expired passwords, passwords non-compliant with organizational policies (e.g. frequency of change, password length, etc.). Pre-defined policies: Total Defense s pre-defined policies enable administrators an option for quick deployment and offer recommended policy settings. Policies control all endpoint settings, can be defined in a granular manner and applied down to the location level. Exclusion lists: Administrators have the flexibility to reduce performance overhead by setting up list of critical and data intensive applications that need to be excluded from scan. Comprehensive reporting: 250+ out of the box reports provide detailed and summary views for better tracking of protection and malware status on endpoints.. Endpoint Discovery: Total Defense s management server enables administrators to discover unmanaged endpoints easily by providing various options like network scan, active directory scan, IP range scan, and quick discovery (scan based on OS type). Endpoints phone home to the management server and simplify the deployment and configuration process. Role-based administration: Allows the segregation of management realms, so administrators can focus only on assigned dominions.

Groupware protection: Total Defense Endpoint Premium provides protection for groupware like Microsoft Exchange, Lotus Notes, and Microsoft SharePoint. Total Defense scans and protects at the mail-store level, preventing viruses and threats from being delivered to the endpoint. Unified Network Control (NAP): Validates endpoints for security compliance before admission to the network. Total Defense Anti-Virus r12 allows identity based policy definition enabling administrators to define specific policies based on users functional roles and associated identities. Flexible architecture: Centralized policy, product and update synchronization is controlled through out the organization by using a Master Management server. Total Defense s architecture allows for a proxy management server that businesses with multiple locations could use ensure to updates are available to local endpoints and optimize network utilization. System Requirements: Server Requirements for small to medium sites (<1000 endpoints): COMPONENT PROCESSOR RAM HARD DRIVE Management Server Minimum 1.80 GHz Pentium 4* 1GB** 40GB Management Server Recommended 2.80 GHz Intel Core 2 Duo 2GB 100GB Microsoft SQL Server 2.80 GHz Intel Core 2 Duo 2GB 100GB *CPUs with lower specifications have not been tested, though might be capable if the CPU speed/model is close to the above. **A Management Server with 1 GB of RAM supports a maximum of 250 endpoints and one partition. It should be used only for basic tasks, such as viewing the Dashboard, and does not support the creation, management, or deployment of Proactive Protection policies. These restrictions disappear if you upgrade the Management Server to 2 GB or more. Server requirements for large sites (>1000 endpoints): Component Processor RAM Hard Drive Recommended Optional Cards Master Management Server 3 GHz Dual Quad Core Intel Xeon 8GB 500GB Dual Network Interface Cards Event Server 3 GHz Dual Quad Core Intel Xeon 8GB 500GB Dual Network Interface Cards Report Server 3 GHz Dual Quad Core Intel Xeon 8GB 500GB Dual Network Interface Cards Management Server Proxy 3 GHz Intel Xeon 4GB 100GB Event Proxy 3 GHz Intel Xeon 4GB 100GB Microsoft SQL Server 3 GHz Intel Xeon 4GB 100GB Client Requirements: CLIENT HOST PROCESSOR RAM HARD DRIVE Host Machine Minimum 1.0 GHz Intel Pentium class 512MB 600MB Host Machine Recommended 1.0 GHz (or higher) Intel Pentium class 1GB 600MB Operating System Support Server: OPERATING SYSTEM ARCHITECTURE SERVICE PACK EDITION Windows 2003 Server SP2 Standard, Enterprise Windows 2003 Server R2 32-bit SP2 Standard, Enterprise Windows 2003 Server R2 64-bit SP2 Standard Windows 2008 Server 32-bit, 64-bit SP2 Standard, Enterprise Windows 2008 Server R2 64-bit None, SP1 Standard, Enterprise, Datacenter Windows Small Business Server 2003 32-bit* SP1, SP2 Standard, Premium Windows Small Business Server 2003 R2 32-bit* None, Sp1, SP2 Premium

Windows Small Business Server 2008 64-bit* SP2 Standard, Premium Windows Small Business Server 2011 None Standard Windows 7 32-bit, 64-bit SP1 Professional, Enterprise, Ultimate Client: OPERATING SYSTEM ARCHITECTURE SERVICE PACK EDITION Windows XP 32-bit SP3 Professional Windows XP 64-bit SP2 Professional Windows 2000 SP4 Professional Windows 2000 Server SP4 Standard Windows 2003 Server 32-bit, 64-bit SP2 Standard, Enterprise Windows 2003 Server R2 32-bit, 64-bit SP2 Standard, Enterprise, Datacenter Windows Vista 32-bit, 64-bit SP1/SP2 Ultimate Windows 2008 Server 32-bit, 64-bit SP2 Standard, Enterprise, Datacenter Windows 2008 Server R2 64-bit None, SP1 Standard, Enterprise, Datacenter Windows Small Business Server 2003 32-bit SP2 Premium Windows Small Business Server 2003 R2 32-bit* SP2 Premium Windows Small Business Server 2003 R2 None, SP1 Premium Windows Small Business Server 2008 64-bit* SP2 Standard, Premium Windows Small Business Server 2011 None Standard Windows 7 32-bit, 64-bit None, SP1 Ultimate, Professional, Enterprise

SCREENSHOTS: Client 1 Client 2 Client 3

POLICY 1 POLICY 2 GRoupware policy 1

GROUPWARE Policy 2 Free Evaluation Total Defense s services can be easily and freely evaluated before committing to any subscription period. Contact us at: EnterpriseTrials@totaldefense.com Full reporting services are provided to help you learn what is going on with your email and Web usage and understand all that Total Defense has to offer. There is no obligation to subscribe and it is quick and easy to disconnect the service if you don t wish to continue. About Total Defense Total Defense is a global leader in malware detection and anti-crimeware solutions. Over 50,000 businesses across a wide spectrum of industries have deployed the Company s solutions, including some of the most sophisticated buyers of security technology worldwide, and over four million consumers worldwide use Total Defense s products. The Company s solutions include anti-malware, anti-virus, parental controls, intrusion prevention, mobile security, online back-up and PC optimization. Total Defense is a former business of CA Technologies, one of the largest software companies in the world, and has operations in New York, California, Europe and Asia. Visit http://totaldefense.com/business.aspx for more details Contact Total Defense Contact details are available online at: www.totaldefense.com