190 likes | 378 Views
TOTAL DEFENSE FOR BUSINESS Cloud SECURITY - Web security. Total Defense CLOUD MANAGED SECURITY PLATFORM. “THE WORLD’s first 100% cloud based, integrated web, email and endpoint security platform”. Total Defense Web security. Overview:
E N D
Total Defense CLOUD MANAGED SECURITY PLATFORM “THE WORLD’s first 100% cloud based, integrated web, email and endpoint security platform”
Total Defense Web security Overview: A cloud-based Internet filtering and Web 2.0 security service. Total Defense provides your organization with a safe and secure Internet connection, free from threats and malware, while ensuring that Web browsing is appropriate and complies with your acceptable use policies. Key Features & Benefits: • URL Filtering • Anti-Virus & Malware Protection • Application Control • Bandwidth Control • Data Leakage Prevention • Inbound & Outbound Policy Compliance • Security & Compliance Reporting • Seamless policy enforcement of in-house and mobile/remote workers • Directory Integration
Features & Benefits • The Total Defense Web Security Service is a cloud-based, Internet filtering and Web 2.0 security service. It enables your organization to enjoy secure, safe Internet use, free from threats and malware, while ensuring that use is appropriate and compliant with your acceptable use policy.Theservice is simple, easy and effective to use and provides comprehensive reporting with easy to understand graphical summaries and drilldown detail. • The service provides both inbound and outbound real-time content analysis. It is simple, easy and effective to use and provides comprehensive reporting with easy to understand graphical summaries and drilldown detail. • URL Filtering – Total Defense provides a comprehensive database of millions of websites in more than 50 reporting categories. More importantly, Total Defense dynamically analyzes the content of websites that your users are accessing in real-time, looking for malicious code, anomalies and inappropriate material, and preventing access to sites which are a security or policy risk to your organization. This ensures that users are protected against threats and offensive material and your network is not compromised by malicious websites. • Anti-Virus and Malware Security – the service incorporates both traditional anti-virus technology and sophisticated dynamic anomaly detection and traffic modelling systems to protect your organization from viruses, botnets, spyware, browser exploits and other Web 2.0 threats. Downloaded files are scanned in real-time to provide protection against potentially unwanted applications. Our patented dynamic modelling engine examines web links, scripts and code structures looking for the tell-tale behavioural characteristics of malicious sites and vulnerability exploits – denying these threats from executing and preventing drive-by infections. • Application Control – the Total Defense service enables you to gain control over popular Web 2.0 applications such as Social Networking, Streaming Media and Web-based messaging. These applications, if unmonitored or unmanaged, can become a serious security and policy issue for your organization. Total Defense enables you to manage access to these applications or block them entirely
Features & Benefits (cont) • Bandwidth Control – Total Defense allows you to manage your Internet bandwidth consumption and control unnecessary or non-business use. This enables you to maximize your Internet connection and prioritize important websites, ensuring that high speed bandwidth is available for your critical business use and preventing excessive costs. Bandwidth Control can be policy-based so you can place restrictions on specific users or at particular times of day when you need to ensure you are getting the most from your bandwidth. • Data Leakage Prevention – with Total Defense, you can control the distribution of sensitive data or private information via the Web. The service enables you to control who can upload important files to the Web or post sensitive content on Web 2.0 sites, blogs, wikis or webmail. • Acceptable Use Policy Compliance – if your organization has an acceptable use policy, defining appropriate use of Web resources and outlining inappropriate conduct and prohibited content, then Total Defense can actively monitor and enforce those policies. Block pornography, bad language, violence and other inappropriate Web content which could potentially create legal liability risk and ensure a safe and productive workplace for your employees. • Security & Policy Compliance Reporting – the Total Defense Web Security Service provides you with ready access to useful and easy to understand reports on your Internet usage and threats. Graphical summary reports are provided as well as more in-depth reports to help you investigate and answer any questions that may arise. You can run reports by site, category, user, bandwidth and by threat type
OnBoarding & Off Boarding Processes OnBoarding All services are available via our online subscription portal, when customer services will support applicants. Engagement is online and via Form submission or telephone enquiry Off-Boarding No specific requirements exist – access to the service expires at the end of the subscription period
Back-up/restore Our services are maintained by in country providers and subject to their high availability maintenance through multi-tenanted and mirrored DC facilities. In the UK we utilise British Telecom
General Support details Technical Support • Help with technical questions, product issues and remote deployment. • Contact Technical Support By Phone • North America: 1-855-237-8613 begin_of_the_skype_highlighting 1-855-237-8613 FREE end_of_the_skype_highlightingOutside North America?Click here for Phone Directory • Get Help Through Cloud Console • You can submit a support request directly fromyour Total Defense For Business cloud console Customer Service • Help with order inquiries, licensing and changes to contact information. • Contact Customer Service By Phone • North America: 1-888-504-9800 begin_of_the_skype_highlighting 1-888-504-9800 FREE end_of_the_skype_highlighting | M-F 8am-5pm US PSTOutside North America? +1-650-412-4450 begin_of_the_skype_highlighting +1-650-412-4450 FREE end_of_the_skype_highlighting | M-F 6am-3pm US PSTClick here for Phone Directory • Email:customerservice@totaldefense.com
Service Constraints Planned All maintenance is undertaken so as to provide a seemless continuous customer experience that maintains availability of the service without disruption. Any planned maintenance is undertaken at times to minimise disruption to customer access to our services such that users do not experience any disruption or performance degradation to the service Unplanned Notifications are provided to users in the event of emergency/unplanned changes. Our high-availability service assures even unplanned changes are seemless to users.
Service Levels Protecting customers’ means more than preventing dangerous threats from reaching their digital devices, their data and their lives. At Total Defense it means ensuring their software is installed and configured correctly for maximum security. It also means 24/7 support and services provided by caring and knowledgeable digital security experts who ensure Total Defense is always there, passionately protecting users from the relentless and growing threat of malware and cyber-crime.
Training Online material is available for use including White papers • Demo Videos • Product OverviewTake a quick tour and learn about the benefits of our unified endpoint, web and email protection. • Remote User ProtectionLearn about how to keep your users protected when out of the office or on the road. • Multi-Platform SupportThis short video shows how easy it is to keep Windows, Mac and Linux evices fully protected. • Security Policy SetupSee how easy it is to create and deploy a security policy.
Termination Terms Please refer to our EULA for full details
Data Processing & Storage Locations Data Processing & Storage Locations Data is managed locally and within the boundaries of the Endpoint location. The endpoint within the UK is with British Telecom
Technical requirements There are no specific technical requirements. The Service supports: • Mac, Windows and Linux OS
Browsers All current browsers are supported e.g. IE 8, 9; Firefox, Chrome
Details of Any trial Services Available Total Defenseis FREE for 15 days upon application. Access is via our portal at: http://cloud.totaldefense.com/b2b/support/index.html
Total defense cloud security reporting • Dashboards for at-a-glance activity across web, email and endpoints • Web Security Reports: • Top Users by Requests • Top Sites by Requests • Top Categories by Requests • File Types by Requests • Bandwidth Consumption • Compliance Actions by User, Site, Category or File Type • Email Security Reports • Top Email Senders • Top Senders by Bandwidth • Top Email Recipients • Top Recipients by Bandwidth • Top Spam Targets • Top File Attachments • Endpoint Security Reports • Scanned, Cleaned and Quarantined Files • Protected, At Risk, Infected and Offline Endpoints • Top Threats by User , Application and File Type • High, medium and low Vulnerabilities • Forensic Logs
Total Defense CLOUD Security infrastructure • Total Defense for Business Cloud security • Highly available, CARRIER GRADE, scalable global network