08:23 PM
Dark Reading
Dark Reading
Products and Releases

Total Defense Launches Cloud Security Solution

Delivers multilayered protection through integration three security technologies

Redwood Shores, Calif., December 12, 2012 – Total Defense, Inc., the leading provider of solutions to combat the growing threat of cybercrime, today announced the release of Total Defense for Business, the industry’s first complete cloud security solution. Total Defense for Business is the only solution on the market that combines the power and flexibility of cloud computing with the delivery of multi-layered protection through the integration of three critical security technologies (1) advanced endpoint anti-malware and application controls; (2) Web filtering and malware protection, and (3) cloud-based anti-spam and email threat prevention. The new cloud-based offering also protects users irrespective of location and operating system, even when they are outside of the corporate network, by applying and enforcing policies consistently at the cloud level – a key differentiator in an age of mobile and remote workers.

“With Total Defense for Business we are changing the security game to address the proliferation of new threats, more mobile endpoints, and explosion of web and cloud based applications and data,” said Paul Lipman, CEO of Total Defense. “There is nothing on the market like it today, and we are proud of the benefits it will bring our customers."

Total Defense for Business is the only solution on the market that leverages the power and flexibility of cloud computing, with the delivery of complete multi-layered protection, through the integration of three critical security technologies:

Advanced endpoint anti-malware and application controls: protects Windows, Mac and Linux devices from malware, secures & controls applications being used by end users and protects against threats from removable media;

Web filtering and malware protection: cloud-based URL filtering including sophisticated anti-malware security, real-time dynamic content analysis, outbound data leakage prevention, application controls, quota management and policy compliance;

Email security: cloud-based anti-spam and email threat prevention, providing a clean email connection and securing against malware, blended threats, unwanted content and outgoing leakage of sensitive data.

“Traditional security approaches are no longer adequate in dealing with the proliferation of threats, increasing application vulnerabilities and the rapid adoption of cloud for business applications,” said Fran Howarth, senior analyst at Bloor Research. “Total Defense is changing the game by offering a suite of mature technologies that answer those critical needs, including a range of complementary capabilities that are above and beyond those typically seen within this market sector.”

Total Defense for Business provides considerable advantages over traditional appliance or software-based security solutions:

Multi-layered security: With today’s multi-layered threats, and industry reports showing that most malware now emanates from the web, multi-layered security is a “must have”;

Remote user protection: Protects all users irrespective of location, even when they are outside of the corporate network, by applying and enforcing policies across users anywhere in the world;

Rapid deployment and simple administration: Deployable in hours, rather than the days or weeks that are typical for on-premise software and appliance solutions. No tedious upgrades and no maintenance requirements: you always have the latest and best protection;

No upfront expenditure and predictable costs: No software installation or administration is required and there are no upfront implementation costs;

Always up to date: Total Defense’s cloud security network has unparalleled insight into emerging threats, with the flexibility and speed to keep pace with the changing nature of threats.

“To put it simply, Total Defense for Business delivers better security, more easily, and at lower cost than any other solution,” concluded Oscar Marquez, chief product officer at Total Defense.

Total Defense provides a free 15-day trial of Total Defense for Business to help organizations understand all of the service's capabilities. To learn more, please visit:

About Total Defense

Total Defense is a global leader in malware detection and anti-crimeware solutions. Over 40,000 businesses across a wide spectrum of industries have deployed the Company’s solutions, including some of the most sophisticated buyers of security technology worldwide, and over four million consumers worldwide use Total Defense’s products.

Total Defense’s solutions include the industry’s first complete cloud security platform, providing fully integrated endpoint, web and email security through a single Web-based management console with a single set of enforceable security policies. The Company also offers a broad portfolio of leading security products for the consumer market. Total Defense is a former business of CA Technologies, one of the largest software companies in the world, and has operations in New York, California, Europe, Israel and Asia.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
According to industry estimates, about a million new IT security jobs will be created in the next two years but there aren't enough skilled professionals to fill them. On top of that, there isn't necessarily a clear path to a career in security. Dark Reading Executive Editor Kelly Jackson Higgins hosts guests Carson Sweet, co-founder and CTO of CloudPassage, which published a shocking study of the security gap in top US undergrad computer science programs, and Rodney Petersen, head of NIST's new National Initiative for Cybersecurity Education.