Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
0Activity
0 of .
Results for:
No results containing your search query
P. 1
Endpoint Protection Solutions – TotalDefense Endpoint r12

Endpoint Protection Solutions – TotalDefense Endpoint r12

Ratings: (0)|Views: 2|Likes:
Published by TotalDefense
Total Defense Endpoint r12 protects networks and endpoints from intrusions, malicious programs, and malware. Using a policy-driven single scan security engine in conjunction with endpoint-based SPI firewalls, Total Defense Endpoint r12 offers real-time protection that minimizes the impact on system performance.
Visit http://www.totaldefense.com/home-and-home-office for a free trial.
Total Defense Endpoint r12 protects networks and endpoints from intrusions, malicious programs, and malware. Using a policy-driven single scan security engine in conjunction with endpoint-based SPI firewalls, Total Defense Endpoint r12 offers real-time protection that minimizes the impact on system performance.
Visit http://www.totaldefense.com/home-and-home-office for a free trial.

More info:

Categories:Types, Brochures
Published by: TotalDefense on Feb 12, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/14/2014

pdf

text

original

 
.totaldefense.com
DATA SHEET
ToTal DefenseenDpoinT r12
OvErviEw:
Total Defense Endpont 12 potects netoks and endponts fom ntusons, malcous pogams, and malae. Usng apolcy-den sngle scan secuty engne n conjuncton th endpont-based SPi fealls, Total Defense Endpont 12 offeseal-tme potecton that mnmzes the mpact on system pefomance.The ntegated Host-Based intuson Peenton System (HiPS) fully contols endpont applcaton actty, hle UnfedNetok Contol (UNC) offes netok access potecton by aldatng uses and endponts befoe they can connect to netokesouces. A full-featued ant-malae package podes potecton fom uses, malae, spyae, and othe malcoussoftae applcatons. The endpont clent offes a stateful packet nspecton (SPi) feall that potects endponts fomntusons, een hen dsconnecton fom the netok. The endpont clents ae fully hadened and potected fom bengdsabled by use actons o malcous softae.
Key Features
 
•
robust anti-malware engine:
Total Defense’s award winning malware engine provides full-fledged protection againstviruses, trojans, worms, rootkits, spywares and bots.
•
rootKit protection:
Total Defense for Endpoint & Gateway r12 provides support for detecting malwares that are usingstealth technologies to prevent their detection from security software. While it is easy for a good signature-driven productto find a known sample that has not yet been activated, it is becoming increasingly challenging to detect the sample once itis running and trying to hide itself and other malicious components. Our improved malware engine allows administrators todetect and remove rootkits.
•
centralized web-based management console:
Endpoint security monitoring, policy deployment, licensemanagement, event management, and reporting managed from a central web based console with an intuitive design.
•
Firewall:
The Total Defense Firewall acts as a barrier between the corporate endpoints and the external Internetpreventing unauthorized access. It thwarts potential hackers and protects corporate networks from being exploited bymalicious attacks. Total Defense provides built-in firewall rule sets, and also the capability to define user specific add-onrule sets.
•
intrusion prevention and detection:
An added layer of security beyond the firewall, the Host based IntrusionPrevention System (HIPS) is network based, detects and automatically blocks attacks.
•
application control:
Total Defense has robust application control capabilities with one of the largest databases ofapplications grouped into categories. Total Defense has integrated the knowledge of application behavior into the firewallfor enhanced protection. Total Defense research maintains and updates one of the most verbose databases on applicationinformation. Check against known application database. Set policy actions for missing application signatures, unknowngeneric and system applications.
•
vulnerability assessment:
Set policies to enforce compliance and report disabled/locked accounts, invalid loginattempts, users with expired passwords, passwords non-compliant with organizational policies (e.g. frequency of change,password length, etc.).
•
pre-deFined policies:
Total Defense’s pre-defined policies enable administrators an option for quick deployment andoffer recommended policy settings. Policies control all endpoint settings, can be defined in a granular manner and applieddown to the location level.
 
•
exclusion lists:
Administrators have the flexibility to reduce performance overhead by setting up list of critical and dataintensive applications that need to be excluded from scan.
•
comprehensive reporting:
250+ out of the box reports provide detailed and summary views for better tracking ofprotection and malware status on endpoints..
•
endpoint discovery:
Total Defense’s management server enables administrators to discover unmanaged endpointseasily by providing various options like network scan, active directory scan, IP range scan, and quick discovery (scan basedon OS type). Endpoints “phone home” to the management server and simplify the deployment and configuration process.
•
role-based administration:
Allows the segregation of management realms, so administrators can focus only onassigned dominions.
•
uniFied networK control (nap):
Validates endpoints for security compliance before admission to the network. TotalDefense Anti-Virus r12 allows identity based policy definition enabling administrators to define specific policies based onusers’ functional roles and associated identities.
•
Flexible architecture:
Centralized policy, product and update synchronization is controlled through out theorganization by using a Master Management server. Total Defense’s architecture allows for a proxy management serverthat businesses with multiple locations could use ensure to updates are available to local endpoints and optimize networkutilization.
system requirements:
See requements fo small to medum stes (<1000 endponts):
COMPONENTPROCESSORRAMHARD DRIVE
Management SeeMnmum1.80 GHz Pentum 4*1GB**40GBManagement Seerecommended2.80 GHz intel Coe 2 Duo2GB100GBMcosoft SQL See2.80 GHz intel Coe 2 Duo2GB100GB
*CPUs with lower specifications have not been tested, though might be capable if the CPU speed/model is close to the above.**A Management Server with 1 GB of RAM supports a maximum of 250 endpoints and one partition. It should be used only for basic tasks, such as viewing the Dashboard, and does not support the creation, management, or deploymentof Proactive Protection policies. These restrictions disappear if you upgrade the Management Server to 2 GB or more.
See equements fo lage stes (>1000 endponts):
ComponentProcessorRAMHard DriveRecommended Optional Cards
MasteManagement See3 GHz Dual Quad Coe intel Xeon8GB500GBDual Netok inteface CadsEent See3 GHz Dual Quad Coe intel Xeon8GB500GBDual Netok inteface Cadsrepot See3 GHz Dual Quad Coe intel Xeon8GB500GBDual Netok inteface CadsManagement SeePoxy3 GHz intel Xeon4GB100GBEent Poxy3 GHz intel Xeon4GB100GBMcosoft SQL See3 GHz intel Xeon4GB100GBClent requements:
CLIENT HOSTPROCESSORRAMHARD DRIVE
Host Machne Mnmum1.0 GHz intel Pentum class512MB600MBHost Machne recommended1.0 GHz (ohghe) intel Pentum class1GB600MB
.totaldefense.com
 
.totaldefense.com
operating system support
SErvEr:
OPERATING SYSTEMARCHITECTURESERVICE PACKEDITION
wndos 2003 SeeSP2Standad, Entepsewndos 2003 Seer232-btSP2Standad, Entepsewndos 2003 Seer264-btSP2Standadwndos 2008 See32-bt, 64-btSP2Standad, Entepsewndos 2008 Seer264-btNone, SP1Standad, Entepse, Datacentewndos Small Busness See200332-bt*SP1, SP2Standad, Pemumwndos Small Busness See 2003 r232-bt*None, Sp1,SP2Pemumwndos Small Busness See200864-bt*SP2Standad, Pemumwndos Small Busness See2011 NoneStandadwndos 732-bt, 64-btSP1Pofessonal, Entepse, UltmateCLiENT:
OPERATING SYSTEMARCHITECTURESERVICE PACKEDITION
wndos XP32-btSP3Pofessonalwndos XP64-btSP2Pofessonalwndos 2000 SP4Pofessonalwndos 2000 SeeSP4Standadwndos 2003 See32-bt, 64-btSP2Standad, Entepsewndos 2003 Seer232-bt, 64-btSP2Standad, Entepse, Datacentewndos vsta32-bt, 64-btSP1/SP2Ultmatewndos 2008 See32-bt, 64-btSP2Standad, Entepse, Datacentewndos 2008 Seer264-btNone, SP1Standad, Entepse, Datacentewndos Small Busness See200332-btSP2Pemumwndos Small Busness See2003 r232-bt*SP2Pemumwndos Small Busness See 2003 r2 None, SP1Pemumwndos Small Busness See200864-bt*SP2Standad, Pemumwndos Small Busness See2011 NoneStandadwndos 732-bt, 64-btNone, SP1Ultmate, Pofessonal, Entepse

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->