Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

12/13/2012
08:23 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Total Defense Launches Cloud Security Solution

Delivers multilayered protection through integration three security technologies

Redwood Shores, Calif., December 12, 2012 – Total Defense, Inc., the leading provider of solutions to combat the growing threat of cybercrime, today announced the release of Total Defense for Business, the industry’s first complete cloud security solution. Total Defense for Business is the only solution on the market that combines the power and flexibility of cloud computing with the delivery of multi-layered protection through the integration of three critical security technologies (1) advanced endpoint anti-malware and application controls; (2) Web filtering and malware protection, and (3) cloud-based anti-spam and email threat prevention. The new cloud-based offering also protects users irrespective of location and operating system, even when they are outside of the corporate network, by applying and enforcing policies consistently at the cloud level – a key differentiator in an age of mobile and remote workers.

“With Total Defense for Business we are changing the security game to address the proliferation of new threats, more mobile endpoints, and explosion of web and cloud based applications and data,” said Paul Lipman, CEO of Total Defense. “There is nothing on the market like it today, and we are proud of the benefits it will bring our customers."

Total Defense for Business is the only solution on the market that leverages the power and flexibility of cloud computing, with the delivery of complete multi-layered protection, through the integration of three critical security technologies:

Advanced endpoint anti-malware and application controls: protects Windows, Mac and Linux devices from malware, secures & controls applications being used by end users and protects against threats from removable media;

Web filtering and malware protection: cloud-based URL filtering including sophisticated anti-malware security, real-time dynamic content analysis, outbound data leakage prevention, application controls, quota management and policy compliance;

Email security: cloud-based anti-spam and email threat prevention, providing a clean email connection and securing against malware, blended threats, unwanted content and outgoing leakage of sensitive data.

“Traditional security approaches are no longer adequate in dealing with the proliferation of threats, increasing application vulnerabilities and the rapid adoption of cloud for business applications,” said Fran Howarth, senior analyst at Bloor Research. “Total Defense is changing the game by offering a suite of mature technologies that answer those critical needs, including a range of complementary capabilities that are above and beyond those typically seen within this market sector.”

Total Defense for Business provides considerable advantages over traditional appliance or software-based security solutions:

Multi-layered security: With today’s multi-layered threats, and industry reports showing that most malware now emanates from the web, multi-layered security is a “must have”;

Remote user protection: Protects all users irrespective of location, even when they are outside of the corporate network, by applying and enforcing policies across users anywhere in the world;

Rapid deployment and simple administration: Deployable in hours, rather than the days or weeks that are typical for on-premise software and appliance solutions. No tedious upgrades and no maintenance requirements: you always have the latest and best protection;

No upfront expenditure and predictable costs: No software installation or administration is required and there are no upfront implementation costs;

Always up to date: Total Defense’s cloud security network has unparalleled insight into emerging threats, with the flexibility and speed to keep pace with the changing nature of threats.

“To put it simply, Total Defense for Business delivers better security, more easily, and at lower cost than any other solution,” concluded Oscar Marquez, chief product officer at Total Defense.

Total Defense provides a free 15-day trial of Total Defense for Business to help organizations understand all of the service's capabilities. To learn more, please visit: http://www.totaldefense.com/cloud.

About Total Defense

Total Defense is a global leader in malware detection and anti-crimeware solutions. Over 40,000 businesses across a wide spectrum of industries have deployed the Company’s solutions, including some of the most sophisticated buyers of security technology worldwide, and over four million consumers worldwide use Total Defense’s products.

Total Defense’s solutions include the industry’s first complete cloud security platform, providing fully integrated endpoint, web and email security through a single Web-based management console with a single set of enforceable security policies. The Company also offers a broad portfolio of leading security products for the consumer market. Total Defense is a former business of CA Technologies, one of the largest software companies in the world, and has operations in New York, California, Europe, Israel and Asia.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14300
PUBLISHED: 2020-07-13
The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
CVE-2020-14298
PUBLISHED: 2020-07-13
The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
CVE-2020-15050
PUBLISHED: 2020-07-13
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
CVE-2020-10987
PUBLISHED: 2020-07-13
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
CVE-2020-10988
PUBLISHED: 2020-07-13
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version 15.03.05.19 allows unauthenticated remote attackers to start a telnetd service on the device.