SlideShare a Scribd company logo
1 of 8
Download to read offline
I n t r o d u c i n g
internet security
Every day, malware gets better at
understanding how you work.
Does your security?
CA focused on IT professionals when
creating Total Defense r12, a multi-layered
Internet security solution engineered to work
the way you do: with strength, clarity and
flexibility. Total Defense isn’t just a security
solution. It’s your security solution.
eInventedr
MultI-layered Internet securIty
Visually Refined
Graphical. Intuitive. Straightforward. Total Defense r12’s dashboard keeps you informed at all times.
More Security. Less Cost.
completely Installed.
More security. less cost. completely
With multiple layers of security,
you’re protected many times over.
Secure your IT and save money
with surprisingly affordable
pricing options.
Don’t sweat the deployment.
Let the industry’s only remote
installation team do it for you.
Installed.
More Security. Less Cost.
mpletely Installed.
Let the industry’s only remote
installation team do it for you.
When your Internet security is effective and easy to
handle, you spend less time catching up to threats
and more time getting ahead of them.
workflow
edefInedr
MultI-layered Internet securIty
Simply Powerful
One glance at
the Total Defense
management console
tells you everything.
The streamlined interface compiles
all critical endpoint information to
give you a real-time picture of all
the threats and vulnerabilities. You
can also customize the dashboard
and organize information the way
you like it.
Behind every barrier,
malware should
find another barrier.
Total Defense syncs
CA’s award-winning malware
protection with new capabilities
in deployment, management,
compliance and reporting. Your
IT environment will be protected
behind multiple layers of security.
Configure both the
installer and the engine
in Total Defense to
optimize your system
performance. Whether you’re
deploying it over two nodes or
200,000—locally or globally—you
decide exactly how to use the power
of Total Defense.
Multiple layers of security
are useless if you can’t see
how they’re performing.
Total Defense can create
system-wide, customizable reports
in real-time. So auditable data on
security standards and compliance is
always within a few clicks.
Set policies with point-
and-click ease. Total
Defense lets you tailor
thousands of endpoint
policies from your desk. No more
logging-in to endpoints to fine-tune
them one at a time.
Thinking about
replacing your anti-virus
with the multilayered
security of Total
Defense? Transitioning is easy. Total
Defense automatically removes
the old security software—that
would take you hours to uninstall
manually—to avoid any application
conflicts.
Easy Management Multi-Layered SecuritySecurity That’s Scalable
Instant Auditable ReportsPolicies: Click and Deploy Seamless Switch
Knowledge is security. Get the latest
threat updates and trends from around
the world.
Put spam in its place. Keep your gateway
and endpoints safe.
global securityNew!
New!
New!
content filtering
Protection
network access
Manage your network policies and stay
compliant with international security
standards.
research center capabilities
Enhanced
More Security. Less Cost.
completely Installed.
More Security. Less Cost.
mpletely Installed.
combinations
evaMPedr
• Virus and spyware
protection
• Centralized management
• Virus and spyware
protection
• Groupware protection
• Centralized Reporting
• Endpoint security validation
• Virus and spyware
protection
• Proactive protection against
Zero-day threats
• Centralized Management
• Virus and spyware
protection
• Proactive protection against
zero-day threats
• Centralized Reporting
• Groupware protection
• Endpoint security validation
• Virus and spyware
protection
• Proactive protection against
zero-day threats
• Centralized Reporting
• Groupware protection
• Endpoint security validation
• Protection for Gateway
Anti-Virus r12 Threat Manager r12 Total Defense for
Endpoint r12
Total Defense for
Endpoint Premium
Edition r12
Total Defense
for Endpoint and
Gateway r12
Choose from a full, flexible array of Total Defense security packages
Total DefenseTotal Defense for
Endpoint Premium
Threat Manager r12 Total Defense for
Endpoint r12
Threat Manager r12 Total Defense forThreat Manager r12 Total Defense forAnti-Virus r12
You can start with any level of security and then upgrade easily without uninstalling or reinstalling software.
With cloud-based licensing, you can simply unlock new features in your Total Defense suite when you want more security.
MultI-layered Internet securIty
Anti-Virus r12 Threat Manager r12Anti-Virus r12 Threat Manager r12
Total Defense for
Endpoint r12
Total Defense for
Endpoint Premium
Edition r12
Total Defense for
Endpoint and
Gateway r12
Anti-Malware
HIPs
Endpoint Firewall
Intrusion Protection
Operating System Security
Application Controls
grouPWare
Microsoft Exchange
Lotus Notes
Microsoft SharePoint
NetApp
Vulnerability Assessment
Unified Network Control (NAP)*
CA Gateway Security*
With our Remote
Deployment Service,
the only one of its
kind in the industry,
you don’t have to worry
about installation. Our team
of experts will install and
configure Total Defense on
your system—via broadband.
So you can rest assured that
your system is secured and
configured correctly.
Viruses don’t
just work 9 to 5.
That’s why our
support lines are
open around the clock.
With Total Defense on your
side, you have our total
support backing you—
through web, phone, and
chat—every hour of every day.
Need to upgrade?
Just contact your
reseller to unlock
new capabilities in
your Total Defense suite. It’s
that simple—no uninstalling
and reinstalling. The cloud-
based licensing feature in
Total Defense lets you easily
allocate, track, and shift
licenses; conduct migrations
and upgrades.
Deployment:
We Got It.
You’re Covered:
24x7x365
Cloud-Based Licensing
and Upgrades
Total Defense Responds
*Centralized management from a separate console
More Security. Less Cost.
completely Installed.
More Security. Less Cost.
mpletely Installed.
Power your
security
with global
intelligence.
Total Defense Security Advisor
acts as an early warning
system, streaming real-time
alerts and tips, from CA’s
Global Security Research
Center, to your dashboard.
The more you know, the more
prepared you are.
Stay Alert.
Plan ahead.
Test drive Total Defense in the cloud. No infrastructure. No investment. No problem. The Total Defense
Virtual Trial Center lets you simulate how it will work on your network. Run tests. Create policies.
Discover endpoints. This isn’t a demo. You’ll experience the real Total Defense and get real results.
More Security. Less Cost.
completely Installed
visit: security.com/partners
Interested in Becoming
an Internet security Partner?
Experience a virtual trial in the cloud.
totaldefense.com • security.com/partner

More Related Content

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Totaldefenseproductinformation 1327447773974 Phpapp01 120124173019 Phpapp01

  • 1. I n t r o d u c i n g
  • 2. internet security Every day, malware gets better at understanding how you work. Does your security? CA focused on IT professionals when creating Total Defense r12, a multi-layered Internet security solution engineered to work the way you do: with strength, clarity and flexibility. Total Defense isn’t just a security solution. It’s your security solution. eInventedr MultI-layered Internet securIty
  • 3. Visually Refined Graphical. Intuitive. Straightforward. Total Defense r12’s dashboard keeps you informed at all times. More Security. Less Cost. completely Installed. More security. less cost. completely With multiple layers of security, you’re protected many times over. Secure your IT and save money with surprisingly affordable pricing options. Don’t sweat the deployment. Let the industry’s only remote installation team do it for you. Installed. More Security. Less Cost. mpletely Installed. Let the industry’s only remote installation team do it for you.
  • 4. When your Internet security is effective and easy to handle, you spend less time catching up to threats and more time getting ahead of them. workflow edefInedr MultI-layered Internet securIty
  • 5. Simply Powerful One glance at the Total Defense management console tells you everything. The streamlined interface compiles all critical endpoint information to give you a real-time picture of all the threats and vulnerabilities. You can also customize the dashboard and organize information the way you like it. Behind every barrier, malware should find another barrier. Total Defense syncs CA’s award-winning malware protection with new capabilities in deployment, management, compliance and reporting. Your IT environment will be protected behind multiple layers of security. Configure both the installer and the engine in Total Defense to optimize your system performance. Whether you’re deploying it over two nodes or 200,000—locally or globally—you decide exactly how to use the power of Total Defense. Multiple layers of security are useless if you can’t see how they’re performing. Total Defense can create system-wide, customizable reports in real-time. So auditable data on security standards and compliance is always within a few clicks. Set policies with point- and-click ease. Total Defense lets you tailor thousands of endpoint policies from your desk. No more logging-in to endpoints to fine-tune them one at a time. Thinking about replacing your anti-virus with the multilayered security of Total Defense? Transitioning is easy. Total Defense automatically removes the old security software—that would take you hours to uninstall manually—to avoid any application conflicts. Easy Management Multi-Layered SecuritySecurity That’s Scalable Instant Auditable ReportsPolicies: Click and Deploy Seamless Switch Knowledge is security. Get the latest threat updates and trends from around the world. Put spam in its place. Keep your gateway and endpoints safe. global securityNew! New! New! content filtering Protection network access Manage your network policies and stay compliant with international security standards. research center capabilities Enhanced More Security. Less Cost. completely Installed. More Security. Less Cost. mpletely Installed.
  • 6. combinations evaMPedr • Virus and spyware protection • Centralized management • Virus and spyware protection • Groupware protection • Centralized Reporting • Endpoint security validation • Virus and spyware protection • Proactive protection against Zero-day threats • Centralized Management • Virus and spyware protection • Proactive protection against zero-day threats • Centralized Reporting • Groupware protection • Endpoint security validation • Virus and spyware protection • Proactive protection against zero-day threats • Centralized Reporting • Groupware protection • Endpoint security validation • Protection for Gateway Anti-Virus r12 Threat Manager r12 Total Defense for Endpoint r12 Total Defense for Endpoint Premium Edition r12 Total Defense for Endpoint and Gateway r12 Choose from a full, flexible array of Total Defense security packages Total DefenseTotal Defense for Endpoint Premium Threat Manager r12 Total Defense for Endpoint r12 Threat Manager r12 Total Defense forThreat Manager r12 Total Defense forAnti-Virus r12 You can start with any level of security and then upgrade easily without uninstalling or reinstalling software. With cloud-based licensing, you can simply unlock new features in your Total Defense suite when you want more security. MultI-layered Internet securIty
  • 7. Anti-Virus r12 Threat Manager r12Anti-Virus r12 Threat Manager r12 Total Defense for Endpoint r12 Total Defense for Endpoint Premium Edition r12 Total Defense for Endpoint and Gateway r12 Anti-Malware HIPs Endpoint Firewall Intrusion Protection Operating System Security Application Controls grouPWare Microsoft Exchange Lotus Notes Microsoft SharePoint NetApp Vulnerability Assessment Unified Network Control (NAP)* CA Gateway Security* With our Remote Deployment Service, the only one of its kind in the industry, you don’t have to worry about installation. Our team of experts will install and configure Total Defense on your system—via broadband. So you can rest assured that your system is secured and configured correctly. Viruses don’t just work 9 to 5. That’s why our support lines are open around the clock. With Total Defense on your side, you have our total support backing you— through web, phone, and chat—every hour of every day. Need to upgrade? Just contact your reseller to unlock new capabilities in your Total Defense suite. It’s that simple—no uninstalling and reinstalling. The cloud- based licensing feature in Total Defense lets you easily allocate, track, and shift licenses; conduct migrations and upgrades. Deployment: We Got It. You’re Covered: 24x7x365 Cloud-Based Licensing and Upgrades Total Defense Responds *Centralized management from a separate console More Security. Less Cost. completely Installed. More Security. Less Cost. mpletely Installed. Power your security with global intelligence. Total Defense Security Advisor acts as an early warning system, streaming real-time alerts and tips, from CA’s Global Security Research Center, to your dashboard. The more you know, the more prepared you are. Stay Alert. Plan ahead.
  • 8. Test drive Total Defense in the cloud. No infrastructure. No investment. No problem. The Total Defense Virtual Trial Center lets you simulate how it will work on your network. Run tests. Create policies. Discover endpoints. This isn’t a demo. You’ll experience the real Total Defense and get real results. More Security. Less Cost. completely Installed visit: security.com/partners Interested in Becoming an Internet security Partner? Experience a virtual trial in the cloud. totaldefense.com • security.com/partner