total defense for endpoint & gateway r12 · like firewall, application control, network access...

7
www.totaldefense.com DATA SHEET TOTAL DEFENSE FOR ENDPOINT & GATEWAY r12 OVERVIEW: Total Defense Endpoint & Gateway r12 is an integrated security solution that offers comprehensive protection for networks, endpoints, and groupware systems, along with additional layers of spam filtering, including sender reputation, embedded URL filtering, malformed email detection and an evasion techniques dictionary that offer protection from unwanted and unsolicited emails. As security challenges continuously evolve around the globe, multiple layers of security are required enterprise-wide to protect against the growing number of business and security threats. In addition to a robust endpoint protection and features like firewall, application control, network access protection, automatic endpoint discovery, and wizard based policy set up, Total Defense Endpoint & Gateway r12 also provides a comprehensive content management solution that defends against business and network integrity threats including viruses, spam, confidentiality breaches, exposure to email legal liability, mobile code threats, and other offensive content usage. KEY FEATURES ROBUST ANTI-MALWARE ENGINE: Total Defense’s award winning malware engine provides full-fledged protection against viruses, trojans, worms, rootkits, spywares and bots. ROOTKIT PROTECTION: Total Defense for Endpoint & Gateway r12 provides support for detecting malwares that are using stealth technologies to prevent their detection from security software. While it is easy for a good signature-driven product to find a known sample that has not yet been activated, it is becoming increasingly challenging to detect the sample once it is running and trying to hide itself and other malicious components. Our improved malware engine allows administrators to detect and remove rootkits. FIREWALL: The Total Defense Firewall acts as a barrier between the corporate endpoints and the external Internet preventing unauthorized access. It thwarts potential hackers and protects corporate networks from being exploited by malicious attacks. Total Defense provides built-in firewall rule sets, and also the capability to define user specific add-on rule sets. INTRUSION PREVENTION AND DETECTION: An added layer of security beyond the firewall, the Host based Intrusion Prevention System (HIPS) is network based, detects and automatically blocks attacks. APPLICATION CONTROL: Total Defense has robust application control capabilities with one of the largest databases of applications grouped into categories. Total Defense has integrated the knowledge of application behavior into the firewall for enhanced protection. Total Defense research maintains and updates one of the most verbose databases on application information. Check against known application database. Set policy actions for missing application signatures, unknown generic and system applications. VULNERABILITY ASSESSMENT: Set policies to enforce compliance and report disabled/locked accounts, invalid login attempts, users with expired passwords, and passwords non-compliant with organizational policies (e.g. frequency of change, password length, etc.). UNIFIED NETWORK CONTROL (NAP): Validates endpoints for security compliance before admission to the network. Total Defense Endpoint Premium allows identity based policy definition enabling administrators to define specific policies based on users’ functional roles and associated identities.

Upload: others

Post on 13-Oct-2020

11 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ToTal Defense for enDpoinT & GaTeway r12 · like firewall, application control, network access protection, automatic endpoint discovery, and wizard based policy set up, Total Defense

www.totaldefense.com

DATA SHEET

ToTal Defense for enDpoinT & GaTeway r12

OvErviEw:

Total Defense Endpoint & Gateway r12 is an integrated security solution that offers comprehensive protection for networks, endpoints, and groupware systems, along with additional layers of spam filtering, including sender reputation, embedded UrL filtering, malformed email detection and an evasion techniques dictionary that offer protection from unwanted and unsolicited emails.

As security challenges continuously evolve around the globe, multiple layers of security are required enterprise-wide to protect against the growing number of business and security threats. in addition to a robust endpoint protection and features like firewall, application control, network access protection, automatic endpoint discovery, and wizard based policy set up, Total Defense Endpoint & Gateway r12 also provides a comprehensive content management solution that defends against business and network integrity threats including viruses, spam, confidentiality breaches, exposure to email legal liability, mobile code threats, and other offensive content usage.

Key Features • robust anti-malware engine: Total Defense’s award winning malware engine provides full-fledged protection against

viruses, trojans, worms, rootkits, spywares and bots.

• rootKit protection: Total Defense for Endpoint & Gateway r12 provides support for detecting malwares that are using stealth technologies to prevent their detection from security software. While it is easy for a good signature-driven product to find a known sample that has not yet been activated, it is becoming increasingly challenging to detect the sample once it is running and trying to hide itself and other malicious components. Our improved malware engine allows administrators to detect and remove rootkits.

• Firewall: The Total Defense Firewall acts as a barrier between the corporate endpoints and the external Internet preventing unauthorized access. It thwarts potential hackers and protects corporate networks from being exploited by malicious attacks. Total Defense provides built-in firewall rule sets, and also the capability to define user specific add-on rule sets.

• intrusion prevention and detection: An added layer of security beyond the firewall, the Host based Intrusion Prevention System (HIPS) is network based, detects and automatically blocks attacks.

• application control: Total Defense has robust application control capabilities with one of the largest databases of applications grouped into categories. Total Defense has integrated the knowledge of application behavior into the firewall for enhanced protection. Total Defense research maintains and updates one of the most verbose databases on application information. Check against known application database. Set policy actions for missing application signatures, unknown generic and system applications.

• vulnerability assessment: Set policies to enforce compliance and report disabled/locked accounts, invalid login attempts, users with expired passwords, and passwords non-compliant with organizational policies (e.g. frequency of change, password length, etc.).

• uniFied networK control (nap): Validates endpoints for security compliance before admission to the network. Total Defense Endpoint Premium allows identity based policy definition enabling administrators to define specific policies based on users’ functional roles and associated identities.

Page 2: ToTal Defense for enDpoinT & GaTeway r12 · like firewall, application control, network access protection, automatic endpoint discovery, and wizard based policy set up, Total Defense

• end-to-end content protection: Provides integrated, multilayered policy- driven email (SMTP) and web (HTTP, FTP) traffic scanning that addresses virtually every content threat at the gateway.

• enhanced layers oF spam-Filtering: Additional layers of spam filtering, including sender reputation, embedded URL filtering, malformed email detection and an evasion techniques dictionary that offer protection from unwanted and unsolicited emails and improves business productivity

• protection From phishing, p2p File sharing & spyware: An added layer of security to prevent employees from unknowingly accessing malicious sites that contain or distribute spyware. Also, provides the ability to control and block a common peer-to-peer file sharing protocol, reducing the risk of legal liability that can result from the sharing of copyrighted material.

• extensive automated actions and alerts: Automated, customizable actions, such as “block” and “quarantine,” can be defined for each policy so that there is an immediate response when an object matches the policy criteria.

• enables regulatory compliance: AEnables enterprises to comply with government laws and regulations, such as the Children’s Internet Protection Act (CIPA), Health Insurance Portability and Accountability Act (HIPAA), Gramm- Leach-Bliley Act (GLBA), UK Data Privacy Act, and California’s SB 1386, reducing the risk of costly penalties and lawsuits, and safeguarding company reputation.

• Full active directory support: Integrates with active directory so that filters can be created for active directory users and groups.

• enhanced protocol support: To improve the security of SMTP communication, Endpoint & Gateway has added Transport Layer Security (TLS) functionality. TLS functionality provides encryption and authentication protection, to confirm the identity of peer SMTP mail servers and to ensure that SMTP communication is protected against eavesdropping.

• ntlm v2 support: Endpoint & Gateway r12 now supports proxy pass-through for NTLM v2 authentication requests. NTLM v2 is the default authentication type for HTTP clients using Microsoft’s NTLM authentication hosted on Windows 2008 R2 or Windows 7.

system requirements:Server requirements for small to medium sites (<1000 endpoints):

COMPONENT PROCESSOR RAM HARD DRIVEManagement Server Minimum 1.80 GHz Pentium 4* 1GB** 40GBManagement Server recommended 2.80 GHz intel Core 2 Duo 2GB 100GBMicrosoft SQL Server 2.80 GHz intel Core 2 Duo 2GB 100GB*CPUs with lower specifications have not been tested, though might be capable if the CPU speed/model is close to the above.**A Management Server with 1 GB of RAM supports a maximum of 250 endpoints and one partition. It should be used only for basic tasks, such as viewing the Dashboard, and does not support the creation, management, or deployment of Proactive Protection policies. These restrictions disappear if you upgrade the Management Server to 2 GB or more.

Server requirements for large sites (>1000 endpoints):

Component Processor RAM Hard Drive Recommended Optional CardsMaster Management Server 3 GHz Dual Quad Core intel Xeon 8GB 500GB Dual Network interface CardsEvent Server 3 GHz Dual Quad Core intel Xeon 8GB 500GB Dual Network interface Cardsreport Server 3 GHz Dual Quad Core intel Xeon 8GB 500GB Dual Network interface CardsManagement Server Proxy 3 GHz intel Xeon 4GB 100GB Event Proxy 3 GHz intel Xeon 4GB 100GB Microsoft SQL Server 3 GHz intel Xeon 4GB 100GB

www.totaldefense.com

Page 3: ToTal Defense for enDpoinT & GaTeway r12 · like firewall, application control, network access protection, automatic endpoint discovery, and wizard based policy set up, Total Defense

www.totaldefense.com www.totaldefense.com

Client requirements:

CLIENT HOST PROCESSOR RAM HARD DRIVEHost Machine Minimum 1.0 GHz intel Pentium class 512MB 600MBHost Machine recommended 1.0 GHz (or higher) intel Pentium class 1GB 600MB

r12 endpoint operating system supportSErvEr:

OPERATING SYSTEM ARCHITECTURE SERVICE PACK EDITIONwindows 2003 Server SP2 Standard, Enterprisewindows 2003 Server r2 32-bit SP2 Standard, Enterprisewindows 2003 Server r2 64-bit SP2 Standardwindows 2008 Server 32-bit, 64-bit SP2 Standard, Enterprise

windows 2008 Server r2 64-bit None, SP1 Standard, Enterprise, Datacenter

windows Small Business Server 2003 32-bit* SP1, SP2 Standard, Premium

windows Small Business Server 2003 r2 32-bit* None, SP1, SP2 Premium

windows Small Business Server 2008 64-bit* SP2 Standard, Premiumwindows Small Business Server 2011 None Standardwindows 7 32-bit, 64-bit SP1 Professional, Enterprise, UltimateCLiENT:

OPERATING SYSTEM ARCHITECTURE SERVICE PACK EDITIONwindows XP 32-bit SP3 Professionalwindows XP 64-bit SP2 Professionalwindows 2000 SP4 Professionalwindows 2000 Server SP4 Standardwindows 2003 Server 32-bit, 64-bit SP2 Standard, Enterprisewindows 2003 Server r2 32-bit, 64-bit SP2 Standard, Enterprise, Datacenterwindows vista 32-bit, 64-bit SP1/SP2 Ultimatewindows 2008 Server 32-bit, 64-bit SP2 Standard, Enterprise, Datacenterwindows 2008 Server r2 64-bit None, SP1 Standard, Enterprise, Datacenterwindows Small Business Server 2003 32-bit SP2 Premiumwindows Small Business Server 2003 r2 32-bit* SP2 Premiumwindows Small Business Server 2003 r2 None, SP1 Premiumwindows Small Business Server 2008 64-bit* SP2 Standard, Premiumwindows Small Business Server 2011 None Standardwindows 7 32-bit, 64-bit None, SP1 Ultimate, Professional, Enterprise

Page 4: ToTal Defense for enDpoinT & GaTeway r12 · like firewall, application control, network access protection, automatic endpoint discovery, and wizard based policy set up, Total Defense

www.totaldefense.com

gateway security – operating system supportGATEwAy

OPERATING SYSTEM ARCHITECTURE SERVICE PACK EDITIONwindows 7 32-bit

windows vista 32-bit

windows 2008 32-bit

windows 2003 Server 32-bit SP1, SP2 Standard, EnterpriseXP Professional 32-bit SP1, SP2, SP3

windows 2000 32-bit SP4

www.totaldefense.com

screenshots:

CLIENT 1

CLIENT 2

Page 5: ToTal Defense for enDpoinT & GaTeway r12 · like firewall, application control, network access protection, automatic endpoint discovery, and wizard based policy set up, Total Defense

www.totaldefense.com www.totaldefense.com

CLIENT 3

POLICY 1

POLICY 2

Page 6: ToTal Defense for enDpoinT & GaTeway r12 · like firewall, application control, network access protection, automatic endpoint discovery, and wizard based policy set up, Total Defense

www.totaldefense.com

PROACTIVE PROTECTION POLICY

TDGS SMTP POLICY

TDGS URL POLICY

Page 7: ToTal Defense for enDpoinT & GaTeway r12 · like firewall, application control, network access protection, automatic endpoint discovery, and wizard based policy set up, Total Defense

www.totaldefense.com www.totaldefense.com

Free evaluation

Total Defense’s services can be easily and freely evaluated before committing to any subscription period.

contact us at: [email protected]

Full reporting services are provided to help you learn what is going on with your email and Web usage and understand all that Total Defense has to offer. There is no obligation to subscribe and it is quick and easy to disconnect the service if you don’t wish to continue.

about total deFense

Total Defense is a global leader in malware detection and anti-crimeware solutions. Over 50,000 businesses across a wide spectrum of industries have deployed the Company’s solutions, including some of the most sophisticated buyers of security technology worldwide, and over four million consumers worldwide use Total Defense’s products.

The Company’s solutions include anti-malware, anti-virus, parental controls, intrusion prevention, mobile security, online back-up and PC optimization. Total Defense is a former business of CA Technologies, one of the largest software companies in the world, and has operations in New York, California, Europe and Asia.

Visit http://totaldefense.com/business.aspx for more details

contact total deFense

Contact details are available online at: www.totaldeFense.com