Attacks/Breaches
12/13/2012
08:23 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Total Defense Launches Cloud Security Solution

Delivers multilayered protection through integration three security technologies

Redwood Shores, Calif., December 12, 2012 – Total Defense, Inc., the leading provider of solutions to combat the growing threat of cybercrime, today announced the release of Total Defense for Business, the industry’s first complete cloud security solution. Total Defense for Business is the only solution on the market that combines the power and flexibility of cloud computing with the delivery of multi-layered protection through the integration of three critical security technologies (1) advanced endpoint anti-malware and application controls; (2) Web filtering and malware protection, and (3) cloud-based anti-spam and email threat prevention. The new cloud-based offering also protects users irrespective of location and operating system, even when they are outside of the corporate network, by applying and enforcing policies consistently at the cloud level – a key differentiator in an age of mobile and remote workers.

“With Total Defense for Business we are changing the security game to address the proliferation of new threats, more mobile endpoints, and explosion of web and cloud based applications and data,” said Paul Lipman, CEO of Total Defense. “There is nothing on the market like it today, and we are proud of the benefits it will bring our customers."

Total Defense for Business is the only solution on the market that leverages the power and flexibility of cloud computing, with the delivery of complete multi-layered protection, through the integration of three critical security technologies:

Advanced endpoint anti-malware and application controls: protects Windows, Mac and Linux devices from malware, secures & controls applications being used by end users and protects against threats from removable media;

Web filtering and malware protection: cloud-based URL filtering including sophisticated anti-malware security, real-time dynamic content analysis, outbound data leakage prevention, application controls, quota management and policy compliance;

Email security: cloud-based anti-spam and email threat prevention, providing a clean email connection and securing against malware, blended threats, unwanted content and outgoing leakage of sensitive data.

“Traditional security approaches are no longer adequate in dealing with the proliferation of threats, increasing application vulnerabilities and the rapid adoption of cloud for business applications,” said Fran Howarth, senior analyst at Bloor Research. “Total Defense is changing the game by offering a suite of mature technologies that answer those critical needs, including a range of complementary capabilities that are above and beyond those typically seen within this market sector.”

Total Defense for Business provides considerable advantages over traditional appliance or software-based security solutions:

Multi-layered security: With today’s multi-layered threats, and industry reports showing that most malware now emanates from the web, multi-layered security is a “must have”;

Remote user protection: Protects all users irrespective of location, even when they are outside of the corporate network, by applying and enforcing policies across users anywhere in the world;

Rapid deployment and simple administration: Deployable in hours, rather than the days or weeks that are typical for on-premise software and appliance solutions. No tedious upgrades and no maintenance requirements: you always have the latest and best protection;

No upfront expenditure and predictable costs: No software installation or administration is required and there are no upfront implementation costs;

Always up to date: Total Defense’s cloud security network has unparalleled insight into emerging threats, with the flexibility and speed to keep pace with the changing nature of threats.

“To put it simply, Total Defense for Business delivers better security, more easily, and at lower cost than any other solution,” concluded Oscar Marquez, chief product officer at Total Defense.

Total Defense provides a free 15-day trial of Total Defense for Business to help organizations understand all of the service's capabilities. To learn more, please visit: http://www.totaldefense.com/cloud.

About Total Defense

Total Defense is a global leader in malware detection and anti-crimeware solutions. Over 40,000 businesses across a wide spectrum of industries have deployed the Company’s solutions, including some of the most sophisticated buyers of security technology worldwide, and over four million consumers worldwide use Total Defense’s products.

Total Defense’s solutions include the industry’s first complete cloud security platform, providing fully integrated endpoint, web and email security through a single Web-based management console with a single set of enforceable security policies. The Company also offers a broad portfolio of leading security products for the consumer market. Total Defense is a former business of CA Technologies, one of the largest software companies in the world, and has operations in New York, California, Europe, Israel and Asia.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.