1 / 18

TOTAL DEFENSE FOR BUSINESS Cloud SECURITY - ENDPOINT SECURITY

TOTAL DEFENSE FOR BUSINESS Cloud SECURITY - ENDPOINT SECURITY. Total Defense CLOUD MANAGED SECURITY PLATFORM. “THE WORLD’s first 100% cloud based, integrated web, email and endpoint security platform”. Total Defense ENDPOINT SECURITY. Overview:

lidia
Download Presentation

TOTAL DEFENSE FOR BUSINESS Cloud SECURITY - ENDPOINT SECURITY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TOTAL DEFENSE FOR BUSINESSCloudSECURITY - ENDPOINT SECURITY

  2. Total Defense CLOUD MANAGED SECURITY PLATFORM “THE WORLD’s first 100% cloud based, integrated web, email and endpoint security platform”

  3. Total Defense ENDPOINT SECURITY Overview: A cloud-based antimalware protection service. Total Defense keeps your endpoints secure against malware and provides granular application control. Protection available for Mac, Windows and Linux OS Key Features & Benefits: • Real Time Malware blocking • Schedule scanning • Behavioural and heuristic detection • Lightweight client • Granular application control • Multiplatform cover • Fully integrated policies and reporting

  4. Features & Benefits • The Total Defense Endpoint Security Service is a cloud-based Endpoint Security platform offering advanced anti-malware technology that protects your organization’s endpoint devices from malware, secures & controls applications being used by end users and protects against threats from removable media (e.g. USB drives). • The service is simple, easy and effective to use and provides comprehensive reporting with easy to understand graphical summaries and drilldown detail. • Comprehensive Anti-Virus and Malware Protection – Total Defense Endpoint Security incorporates both traditional anti-malware technology and sophisticated dynamic anomaly detection and behaviormodeling systems to protect your organization from viruses, botnets, spyware, trojans, browser exploits and the latest advanced threats • Application Controls – Total Defense enables you to easily control the use of specific applications on your endpoint devices, such as remote access programs, browsers, messaging applications, P2P sharing and the like. These applications, if unmonitored or unmanaged, can become a serious security and policy issue for your organization. A broad number of applications are supported, and you can easily define custom applications as well • Removable Media – Removable media drives are a common source of local device infection. Total Defense automatically scans removable media in real time to ensure that no infection can be passed to your users’ devices • Scanning Options – Scanning options and schedules can be simply set by policy in the Total Defense cloud console, making it very easy to manage endpoint security for your entire organization • Multiple Operating Systems Supported – The same powerful Total Defense endpoint functionality is available for Windows, Mac and Linux devices • Always Up-to-Date – Because Total Defense Endpoint Security operates from the cloud, your endpoints are instantaneously kept up-to-date with the latest client application version and signatures • Simple Deployment – The lightweight Total Defense client can be easily deployed using group policies or other software distribution methods • Distribution Center – Instead of each endpoint downloading its own updates, the Distribution center application can be used to download updates once and then distribute these to each local endpoint • Legacy Endpoint Uninstaller – Uninstall scripts are also provided for legacy Total Defense and 3rd party solutions to further simplify deployment

  5. OnBoarding & Off Boarding Processes OnBoarding All services are available via our online subscription portal, when customer services will support applicants. Engagement is online and via Form submission or telephone enquiry Off-Boarding No specific requirements exist – access to the service expires at the end of the subscription period

  6. Back-up/restore Our services are maintained by in country providers and subject to their high availability maintenance through multi-tenanted and mirrored DC facilities. In the UK we utilise British Telecom

  7. General Support details Technical Support • Help with technical questions, product issues and remote deployment. • Contact Technical Support By Phone • North America: 1-855-237-8613 begin_of_the_skype_highlighting 1-855-237-8613 FREE  end_of_the_skype_highlightingOutside North America?Click here for Phone Directory • Get Help Through Cloud Console • You can submit a support request directly fromyour Total Defense For Business cloud console Customer Service • Help with order inquiries, licensing and changes to contact information. • Contact Customer Service By Phone • North America: 1-888-504-9800 begin_of_the_skype_highlighting 1-888-504-9800 FREE  end_of_the_skype_highlighting | M-F 8am-5pm US PSTOutside North America? +1-650-412-4450 begin_of_the_skype_highlighting +1-650-412-4450 FREE  end_of_the_skype_highlighting | M-F 6am-3pm US PSTClick here for Phone Directory • Email:customerservice@totaldefense.com

  8. Service Constraints Planned All maintenance is undertaken so as to provide a seemless continuous customer experience that maintains availability of the service without disruption. Any planned maintenance is undertaken at times to minimise disruption to customer access to our services such that users do not experience any disruption or performance degradation to the service Unplanned Notifications are provided to users in the event of emergency/unplanned changes. Our high-availability service assures even unplanned changes are seemless to users.

  9. Service Levels Protecting customers’ means more than preventing dangerous threats from reaching their digital devices, their data and their lives. At Total Defense it means ensuring their software is installed and configured correctly for maximum security. It also means 24/7 support and services provided by caring and knowledgeable digital security experts who ensure Total Defense is always there, passionately protecting users from the relentless and growing threat of malware and cyber-crime.

  10. Training Online material is available for use including White papers • Demo Videos • Product OverviewTake a quick tour and learn about the benefits of our unified endpoint, web and email protection. • Remote User ProtectionLearn about how to keep your users protected when out of the office or on the road. • Multi-Platform SupportThis short video shows how easy it is to keep Windows, Mac and Linux evices fully protected. • Security Policy SetupSee how easy it is to create and deploy a security policy.

  11. Termination Terms Please refer to our EULA for full details

  12. Data Processing & Storage Locations Data Processing & Storage Locations Data is managed locally and within the boundaries of the Endpoint location. The endpoint within the UK is with British Telecom

  13. Technical requirements There are no specific technical requirements. The Service supports: • Mac, Windows and Linux OS

  14. Browsers All current browsers are supported e.g. IE 8, 9; Firefox, Chrome

  15. Details of Any trial Services Available Total Defenseis FREE for 15 days upon application. Access is via our portal at: http://cloud.totaldefense.com/b2b/support/index.html

  16. Total defense cloud security reporting • Dashboards for at-a-glance activity across web, email and endpoints • Web Security Reports: • Top Users by Requests • Top Sites by Requests • Top Categories by Requests • File Types by Requests • Bandwidth Consumption • Compliance Actions by User, Site, Category or File Type • Email Security Reports • Top Email Senders • Top Senders by Bandwidth • Top Email Recipients • Top Recipients by Bandwidth • Top Spam Targets • Top File Attachments • Endpoint Security Reports • Scanned, Cleaned and Quarantined Files • Protected, At Risk, Infected and Offline Endpoints • Top Threats by User , Application and File Type • High, medium and low Vulnerabilities • Forensic Logs

  17. TOTAL DEFENSE CLOUD SECURITY ADVANTAGES

  18. Total Defense CLOUD Security infrastructure • Total Defense for Business Cloud security • Highly available, CARRIER GRADE, scalable global network

More Related