03:11 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

Total Defense Acquires Cloud Security Company

Acquires iSheriff

Redwood Shores, Calif., July 9, 2012 – Total Defense, Inc., the leading provider of solutions to combat the growing threat of cybercrime, today announced the company has acquired iSheriff, a pioneering leader in cloud security solutions. Together, the companies will offer the most robust cloud security solutions on the market.

“The days of employees safely accessing the internet from behind a corporate firewall are increasingly history for modern businesses. Today’s workforce is increasingly mobile, connecting through a broad array of devices and adopting cloud services at an accelerating pace. This reality requires a new approach to security,” said Paul Lipman, CEO at Total Defense. “A truly effective security solution requires a multi-layered approach. The cloud enables companies to very easily scale and deploy a powerful additional layer of security that is specifically tailored to today’s ‘de-perimeterized’ environments. As the security industry transitions, our acquisition of iSheriff puts us at the forefront of Internet security firms, by providing customers solid, best of breed, integrated security that’s managed through the cloud. We are thrilled to have the opportunity to truly make an impact and change the dynamic of the security market,” added Lipman.

Recently, Total Defense announced its first cloud product, Total Defense Cloud Security, an integrated cloud based SaaS (Security as a Service) solution for Web and email protection. The new offering provides a powerful and versatile Web and email security platform that protects users anytime and anywhere. This game changing solution provides a comprehensive additional layer of security that enhances the company’s existing endpoint solutions, giving Total Defense the advantage of a global cloud for real time malware protection across multiple platforms.

Oscar Marquez, CEO & Director of the Board of iSheriff, commented, “I have shared a vision for transforming the way businesses consume internet security with Paul Lipman for some time. Becoming part of Total Defense creates an ideal synergy. Total Defense’s large base of customers and extensive network of global partners will quickly accelerate the growth of our cloud offerings giving Total Defense a multi-tenant solution to provision and manage their customers, partners and OEM providers. This coupled with our global cloud infrastructure and cloud security expertise and Total Defense’s complete line of internet security solutions make a formidable company even stronger.”

For more information about Total Defense and its products, please visit:


About Total Defense

Total Defense, the leading provider of solutions to combat the growing threat of cybercrime, protects over 40,000 businesses and over 4 million consumers from the growing epidemic of cybercrime and malware. We provide multiple layers of digital security through desktop, mobile device, web gateway and cloud based solutions. We go “beyond protection” by ensuring our customers receive the level of service and support they require in an ever changing threat landscape. Total Defense is a former business of CA Technologies, one of the largest information technology companies in the world. Our major centers of operation are in New York, Silicon Valley, India, and Europe.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web