Attacks/Breaches
12/13/2012
08:23 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Total Defense Launches Cloud Security Solution

Delivers multilayered protection through integration three security technologies

Redwood Shores, Calif., December 12, 2012 – Total Defense, Inc., the leading provider of solutions to combat the growing threat of cybercrime, today announced the release of Total Defense for Business, the industry’s first complete cloud security solution. Total Defense for Business is the only solution on the market that combines the power and flexibility of cloud computing with the delivery of multi-layered protection through the integration of three critical security technologies (1) advanced endpoint anti-malware and application controls; (2) Web filtering and malware protection, and (3) cloud-based anti-spam and email threat prevention. The new cloud-based offering also protects users irrespective of location and operating system, even when they are outside of the corporate network, by applying and enforcing policies consistently at the cloud level – a key differentiator in an age of mobile and remote workers.

“With Total Defense for Business we are changing the security game to address the proliferation of new threats, more mobile endpoints, and explosion of web and cloud based applications and data,” said Paul Lipman, CEO of Total Defense. “There is nothing on the market like it today, and we are proud of the benefits it will bring our customers."

Total Defense for Business is the only solution on the market that leverages the power and flexibility of cloud computing, with the delivery of complete multi-layered protection, through the integration of three critical security technologies:

Advanced endpoint anti-malware and application controls: protects Windows, Mac and Linux devices from malware, secures & controls applications being used by end users and protects against threats from removable media;

Web filtering and malware protection: cloud-based URL filtering including sophisticated anti-malware security, real-time dynamic content analysis, outbound data leakage prevention, application controls, quota management and policy compliance;

Email security: cloud-based anti-spam and email threat prevention, providing a clean email connection and securing against malware, blended threats, unwanted content and outgoing leakage of sensitive data.

“Traditional security approaches are no longer adequate in dealing with the proliferation of threats, increasing application vulnerabilities and the rapid adoption of cloud for business applications,” said Fran Howarth, senior analyst at Bloor Research. “Total Defense is changing the game by offering a suite of mature technologies that answer those critical needs, including a range of complementary capabilities that are above and beyond those typically seen within this market sector.”

Total Defense for Business provides considerable advantages over traditional appliance or software-based security solutions:

Multi-layered security: With today’s multi-layered threats, and industry reports showing that most malware now emanates from the web, multi-layered security is a “must have”;

Remote user protection: Protects all users irrespective of location, even when they are outside of the corporate network, by applying and enforcing policies across users anywhere in the world;

Rapid deployment and simple administration: Deployable in hours, rather than the days or weeks that are typical for on-premise software and appliance solutions. No tedious upgrades and no maintenance requirements: you always have the latest and best protection;

No upfront expenditure and predictable costs: No software installation or administration is required and there are no upfront implementation costs;

Always up to date: Total Defense’s cloud security network has unparalleled insight into emerging threats, with the flexibility and speed to keep pace with the changing nature of threats.

“To put it simply, Total Defense for Business delivers better security, more easily, and at lower cost than any other solution,” concluded Oscar Marquez, chief product officer at Total Defense.

Total Defense provides a free 15-day trial of Total Defense for Business to help organizations understand all of the service's capabilities. To learn more, please visit: http://www.totaldefense.com/cloud.

About Total Defense

Total Defense is a global leader in malware detection and anti-crimeware solutions. Over 40,000 businesses across a wide spectrum of industries have deployed the Company’s solutions, including some of the most sophisticated buyers of security technology worldwide, and over four million consumers worldwide use Total Defense’s products.

Total Defense’s solutions include the industry’s first complete cloud security platform, providing fully integrated endpoint, web and email security through a single Web-based management console with a single set of enforceable security policies. The Company also offers a broad portfolio of leading security products for the consumer market. Total Defense is a former business of CA Technologies, one of the largest software companies in the world, and has operations in New York, California, Europe, Israel and Asia.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6278
Published: 2014-09-30
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and m...

CVE-2014-6805
Published: 2014-09-30
The weibo (aka magic.weibo) application 1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6806
Published: 2014-09-30
The Thanodi - Setswana Translator (aka com.thanodi.thanodi) application 1.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6807
Published: 2014-09-30
The OLA School (aka com.conduit.app_00f9890a4f0145f2aae9d714e20b273a.app) application 1.2.7.132 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6808
Published: 2014-09-30
The Active 24 (aka com.zentity.app.active24) application 1.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.