Total Defense Endpoint Premium r12



Similar documents
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Symantec Endpoint Protection

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

CA Host-Based Intrusion Prevention System r8.1

Symantec Endpoint Protection

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition

Kaspersky Endpoint Security 10 for Windows. Deployment guide

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

How To Protect Your Computer From A Malicious Virus

Symantec AntiVirus Enterprise Edition

Kaseya IT Automation Framework

Symantec Endpoint Protection Datasheet

Getting Started with Symantec Endpoint Protection

Ad-Aware Management Server Installed together with Ad-Aware Business Client Ad-Aware Update Server Before You Start the Deployment...

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Symantec Endpoint Protection Small Business Edition Getting Started Guide

11.0. Symantec Endpoint Protection 11.0 Reviewer s Guide

The Challenge of a Comprehensive Network Protection. Introduction

Pearl Echo Installation Checklist

Superior protection from Internet threats and control over unsafe web usage

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support

Release Notes for Websense Security v7.2

Did you know your security solution can help with PCI compliance too?

GFI White Paper PCI-DSS compliance and GFI Software products

Zone Labs Integrity Smarter Enterprise Security

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

isheriff CLOUD SECURITY

Spyware Doctor Enterprise Technical Data Sheet

Dragon Medical Enterprise Network Edition Technical Note: Requirements for DMENE Networks with virtual servers

Patch Management SoftwareTechnical Specs

Avira Endpoint and Security. HowTo

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

IBM Endpoint Manager for Core Protection

HP Intelligent Management Center Standard Software Platform

Advantages of Managed Security Services

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Symantec Endpoint Protection Getting Started Guide

Trend Micro OfficeScan 10.6 SP3 System Requirements

Avira Small Business Security Suite Avira Endpoint Security. Quick Guide

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Next Gen Firewall and UTM Buyers Guide

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows

F-Secure Client Security. Administrator's Guide

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

HP Intelligent Management Center Standard Software Platform

Trend Micro OfficeScan 11.0 System Requirements

QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10

Charter Business Desktop Security Administrator's Guide

Table of Contents. Introduction...9. Installation Program Tour The Program Components...10 Main Program Features...11

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

FortiClient dialup-client configurations

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

How To Install Avira Small Business Security Suite (Small Business) On A Microsoft Microsoft Server (Small Bserver) For A Small Business (Small) Computer (Small Server)

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA

Client Server Messaging Security3

IBM Endpoint Manager Product Introduction and Overview

Sage 100 Standard ERP Version 2013 Supported Platform Matrix Created as of November 21, 2013

Host-based Intrusion Prevention System (HIPS)

Compulink Advantage Online TM

K7 Business Lite User Manual

Avira Small Business Security Suite. HowTo

Release notes. Symantec Event Manager for Firewall. What s new. System requirements

Forefront Endpoint Protection. Jack Cobben

AVeS Cloud Security powered by SYMANTEC TM

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)

Seven for 7: Best practices for implementing Windows 7

Securing Virtual Applications and Servers

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

AND SERVER SECURITY

Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010.

AND SERVER SECURITY

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Best Practice Configurations for OfficeScan (OSCE) 10.6

What Do You Mean My Cloud Data Isn t Secure?

Trend Micro OfficeScan 10.6 SP2 System Requirements

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Transcription:

DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious programs, and malware, using a policy-driven single scan security engine in conjunction with an endpoint-based SPI firewall. With smart features like automatic endpoint discovery, setup wizard, and intuitive management console, Total Defense makes network protection easy to install, deploy, and manage. Total Defense Endpoint Premium r12 provides access an extensive database of known good applications to create policies that prevent applications exhibiting abnormal or suspicious behavior from executing. Total Defense offers administrators the capability to create policies based on location, user, endpoints and many other factors, granting or denying access based on defined policies. Host-based intrusion prevention system (HIPS) fully controls endpoint application activity, while unified network control (UNC) offers network access protection by validating endpoints before they connect to network resources. The endpoint client offers a stateful packet inspection (SPI) firewall that protects endpoints from intrusions, even when disconnected from the network. The deployed endpoint clients are fully hardened and protected from being disabled by user actions or malicious software. Key Features Robust anti-malware engine: Total Defense s award winning malware engine provides full-fledged protection against viruses, trojans, worms, rootkits, spywares and bots. Rootkit protection: Total Defense for Endpoint & Gateway r12 provides support for detecting malwares that are using stealth technologies to prevent their detection from security software. While it is easy for a good signature-driven product to find a known sample that has not yet been activated, it is becoming increasingly challenging to detect the sample once it is running and trying to hide itself and other malicious components. Our improved malware engine allows administrators to detect and remove rootkits. Centralized Web-based Management Console: Endpoint security monitoring, policy deployment, license management, event management, and reporting managed from a central web based console with an intuitive design. Firewall: The Total Defense Firewall acts as a barrier between the corporate endpoints and the external Internet preventing unauthorized access. It thwarts potential hackers and protects corporate networks from being exploited by malicious attacks. Total Defense provides built-in firewall rule sets, and also the capability to define user specific add-on rule sets. Intrusion Prevention and Detection: An added layer of security beyond the firewall, the Host based Intrusion Prevention System (HIPS) is network based, detects and automatically blocks attacks. Application Control: Total Defense has robust application control capabilities with one of the largest databases of applications grouped into categories. Total Defense has integrated the knowledge of application behavior into the firewall for enhanced protection. Total Defense research maintains and updates one of the most verbose databases on application information. Check against known application database. Set policy actions for missing application signatures, unknown generic and system applications. Vulnerability assessment: Set policies to enforce compliance and report disabled/locked accounts, invalid login attempts, users with expired passwords, passwords non-compliant with organizational policies (e.g. frequency of change, password length, etc.).

Location awareness: Total Defense Endpoint protection supports location/zone awareness at each partition and user level. There is no restriction on the number of zones that can be created and policies can be applied to each zone. When an endpoint client connects from a certain zone, the appropriate policies will come into effect. Pre-defined policies: Total Defense s pre-defined policies enable administrators an option for quick deployment and offer recommended policy settings. Policies control all endpoint settings, can be defined in a granular manner and applied down to the location level. Exclusion lists: Administrators have the flexibility to reduce performance overhead by setting up list of critical and data intensive applications that need to be excluded from scan. Comprehensive reporting: 250+ out of the box reports provide detailed and summary views for better tracking of protection and malware status on endpoints.. Endpoint Discovery: Total Defense s management server enables administrators to discover unmanaged endpoints easily by providing various options like network scan, active directory scan, IP range scan, and quick discovery (scan based on OS type). Endpoints phone home to the management server and simplify the deployment and configuration process. Role-based administration: Allows the segregation of management realms, so administrators can focus only on assigned dominions. Groupware protection: Total Defense Endpoint Premium provides protection for groupware like Microsoft Exchange, Lotus Notes, and Microsoft SharePoint. Total Defense scans and protects at the mail-store level, preventing viruses and threats from being delivered to the endpoint. Unified Network Control (NAP): Validates endpoints for security compliance before admission to the network. Total Defense Anti-Virus r12 allows identity based policy definition enabling administrators to define specific policies based on users functional roles and associated identities. Flexible architecture: Centralized policy, product and update synchronization is controlled through out the organization by using a Master Management server. Total Defense s architecture allows for a proxy management server that businesses with multiple locations could use ensure to updates are available to local endpoints and optimize network utilization. System Requirements: Server Requirements for small to medium sites (<1000 endpoints): COMPONENT PROCESSOR RAM HARD DRIVE Management Server Minimum 1.80 GHz Pentium 4* 1GB** 40GB Management Server Recommended 2.80 GHz Intel Core 2 Duo 2GB 100GB Microsoft SQL Server 2.80 GHz Intel Core 2 Duo 2GB 100GB *CPUs with lower specifications have not been tested, though might be capable if the CPU speed/model is close to the above. **A Management Server with 1 GB of RAM supports a maximum of 250 endpoints and one partition. It should be used only for basic tasks, such as viewing the Dashboard, and does not support the creation, management, or deployment of Proactive Protection policies. These restrictions disappear if you upgrade the Management Server to 2 GB or more. Server requirements for large sites (>1000 endpoints): Component Processor RAM Hard Drive Recommended Optional Cards Master Management Server 3 GHz Dual Quad Core Intel Xeon 8GB 500GB Dual Network Interface Cards Event Server 3 GHz Dual Quad Core Intel Xeon 8GB 500GB Dual Network Interface Cards Report Server 3 GHz Dual Quad Core Intel Xeon 8GB 500GB Dual Network Interface Cards Management Server Proxy 3 GHz Intel Xeon 4GB 100GB

Event Proxy 3 GHz Intel Xeon 4GB 100GB Microsoft SQL Server 3 GHz Intel Xeon 4GB 100GB Client Requirements: CLIENT HOST PROCESSOR RAM HARD DRIVE Host Machine Minimum 1.0 GHz Intel Pentium class 512MB 600MB Host Machine Recommended 1.0 GHz (or higher) Intel Pentium class 1GB 600MB Operating System Support Server: OPERATING SYSTEM ARCHITECTURE SERVICE PACK EDITION Windows 2003 Server SP2 Standard, Enterprise Windows 2003 Server R2 32-bit SP2 Standard, Enterprise Windows 2003 Server R2 64-bit SP2 Standard Windows 2008 Server 32-bit, 64-bit SP2 Standard, Enterprise Windows 2008 Server R2 64-bit None, SP1 Standard, Enterprise, Datacenter Windows Small Business Server 2003 32-bit* SP1, SP2 Standard, Premium Windows Small Business Server 2003 R2 32-bit* None, Sp1, SP2 Premium Windows Small Business Server 2008 64-bit* SP2 Standard, Premium Windows Small Business Server 2011 None Standard Windows 7 32-bit, 64-bit SP1 Professional, Enterprise, Ultimate Client: OPERATING SYSTEM ARCHITECTURE SERVICE PACK EDITION Windows XP 32-bit SP3 Professional Windows XP 64-bit SP2 Professional Windows 2000 SP4 Professional Windows 2000 Server SP4 Standard Windows 2003 Server 32-bit, 64-bit SP2 Standard, Enterprise Windows 2003 Server R2 32-bit, 64-bit SP2 Standard, Enterprise, Datacenter Windows Vista 32-bit, 64-bit SP1/SP2 Ultimate Windows 2008 Server 32-bit, 64-bit SP2 Standard, Enterprise, Datacenter Windows 2008 Server R2 64-bit None, SP1 Standard, Enterprise, Datacenter Windows Small Business Server 2003 32-bit SP2 Premium Windows Small Business Server 2003 R2 32-bit* SP2 Premium Windows Small Business Server 2003 R2 None, SP1 Premium Windows Small Business Server 2008 64-bit* SP2 Standard, Premium Windows Small Business Server 2011 None Standard Windows 7 32-bit, 64-bit None, SP1 Ultimate, Professional, Enterprise

SCREENSHOTS: Client 1 Client 2 Client 3

POLICY 1 POLICY 2 Application Protection Policy

GROUPWARE Policy Free Evaluation Total Defense s services can be easily and freely evaluated before committing to any subscription period. Contact us at: EnterpriseTrials@totaldefense.com Full reporting services are provided to help you learn what is going on with your email and Web usage and understand all that Total Defense has to offer. There is no obligation to subscribe and it is quick and easy to disconnect the service if you don t wish to continue. About Total Defense Total Defense is a global leader in malware detection and anti-crimeware solutions. Over 50,000 businesses across a wide spectrum of industries have deployed the Company s solutions, including some of the most sophisticated buyers of security technology worldwide, and over four million consumers worldwide use Total Defense s products. The Company s solutions include anti-malware, anti-virus, parental controls, intrusion prevention, mobile security, online back-up and PC optimization. Total Defense is a former business of CA Technologies, one of the largest software companies in the world, and has operations in New York, California, Europe and Asia. Visit http://totaldefense.com/business.aspx for more details Contact Total Defense Contact details are available online at: www.totaldefense.com