ToTal DefenseenDpoinT r12
Total Defense Endpont 12 potects netoks and endponts fom ntusons, malcous pogams, and malae. Usng apolcy-den sngle scan secuty engne n conjuncton th endpont-based SPi fealls, Total Defense Endpont 12 offeseal-tme potecton that mnmzes the mpact on system pefomance.The ntegated Host-Based intuson Peenton System (HiPS) fully contols endpont applcaton actty, hle UnfedNetok Contol (UNC) offes netok access potecton by aldatng uses and endponts befoe they can connect to netokesouces. A full-featued ant-malae package podes potecton fom uses, malae, spyae, and othe malcoussoftae applcatons. The endpont clent offes a stateful packet nspecton (SPi) feall that potects endponts fomntusons, een hen dsconnecton fom the netok. The endpont clents ae fully hadened and potected fom bengdsabled by use actons o malcous softae.
robust anti-malware engine:
Total Defense’s award winning malware engine provides full-fledged protection againstviruses, trojans, worms, rootkits, spywares and bots.
Total Defense for Endpoint & Gateway r12 provides support for detecting malwares that are usingstealth technologies to prevent their detection from security software. While it is easy for a good signature-driven productto find a known sample that has not yet been activated, it is becoming increasingly challenging to detect the sample once itis running and trying to hide itself and other malicious components. Our improved malware engine allows administrators todetect and remove rootkits.
centralized web-based management console:
Endpoint security monitoring, policy deployment, licensemanagement, event management, and reporting managed from a central web based console with an intuitive design.
The Total Defense Firewall acts as a barrier between the corporate endpoints and the external Internetpreventing unauthorized access. It thwarts potential hackers and protects corporate networks from being exploited bymalicious attacks. Total Defense provides built-in firewall rule sets, and also the capability to define user specific add-onrule sets.
intrusion prevention and detection:
An added layer of security beyond the firewall, the Host based IntrusionPrevention System (HIPS) is network based, detects and automatically blocks attacks.
Total Defense has robust application control capabilities with one of the largest databases ofapplications grouped into categories. Total Defense has integrated the knowledge of application behavior into the firewallfor enhanced protection. Total Defense research maintains and updates one of the most verbose databases on applicationinformation. Check against known application database. Set policy actions for missing application signatures, unknowngeneric and system applications.
Set policies to enforce compliance and report disabled/locked accounts, invalid loginattempts, users with expired passwords, passwords non-compliant with organizational policies (e.g. frequency of change,password length, etc.).
Total Defense’s pre-defined policies enable administrators an option for quick deployment andoffer recommended policy settings. Policies control all endpoint settings, can be defined in a granular manner and applieddown to the location level.