SlideShare a Scribd company logo
1 of 7
Download to read offline
DATA SHEET


Total Defense for Endpoint & Gateway r12

Overview:

Total Defense Endpoint & Gateway r12 is an integrated security solution that offers comprehensive protection for networks,
endpoints, and groupware systems, along with additional layers of spam filtering, including sender reputation, embedded URL
filtering, malformed email detection and an evasion techniques dictionary that offer protection from unwanted and unsolicited
emails.

As security challenges continuously evolve around the globe, multiple layers of security are required enterprise-wide to
protect against the growing number of business and security threats. In addition to a robust endpoint protection and features
like firewall, application control, network access protection, automatic endpoint discovery, and wizard based policy set up, Total
Defense Endpoint & Gateway r12 also provides a comprehensive content management solution that defends against business
and network integrity threats including viruses, spam, confidentiality breaches, exposure to email legal liability, mobile code
threats, and other offensive content usage.

Key Features

•	   Robust anti-malware engine: Total Defense’s award winning malware engine provides full-fledged protection against
     viruses, trojans, worms, rootkits, spywares and bots.

•	   Rootkit protection: Total Defense for Endpoint & Gateway r12 provides support for detecting malwares that are using
     stealth technologies to prevent their detection from security software. While it is easy for a good signature-driven product
     to find a known sample that has not yet been activated, it is becoming increasingly challenging to detect the sample once it
     is running and trying to hide itself and other malicious components. Our improved malware engine allows administrators to
     detect and remove rootkits.

•	   Firewall: The Total Defense Firewall acts as a barrier between the corporate endpoints and the external Internet
     preventing unauthorized access. It thwarts potential hackers and protects corporate networks from being exploited by
     malicious attacks. Total Defense provides built-in firewall rule sets, and also the capability to define user specific add-on
     rule sets.

•	   Intrusion Prevention and Detection: An added layer of security beyond the firewall, the Host based Intrusion
     Prevention System (HIPS) is network based, detects and automatically blocks attacks.

•	   Application Control: Total Defense has robust application control capabilities with one of the largest databases of
     applications grouped into categories. Total Defense has integrated the knowledge of application behavior into the firewall
     for enhanced protection. Total Defense research maintains and updates one of the most verbose databases on application
     information. Check against known application database. Set policy actions for missing application signatures, unknown
     generic and system applications.

•	   Vulnerability assessment: Set policies to enforce compliance and report disabled/locked accounts, invalid login
     attempts, users with expired passwords, and passwords non-compliant with organizational policies (e.g. frequency of
     change, password length, etc.).

•	   Unified Network Control (NAP): Validates endpoints for security compliance before admission to the network. Total
     Defense Endpoint Premium allows identity based policy definition enabling administrators to define specific policies based
     on users’ functional roles and associated identities.




                                                        www.totaldefense.com
•	    End-to-End Content Protection: Provides integrated, multilayered policy- driven email (SMTP) and web (HTTP, FTP)
      traffic scanning that addresses virtually every content threat at the gateway.

•	    Enhanced Layers of Spam-filtering: Additional layers of spam filtering, including sender reputation, embedded
      URL filtering, malformed email detection and an evasion techniques dictionary that offer protection from unwanted and
      unsolicited emails and improves business productivity

•	    Protection from Phishing, P2P File Sharing & Spyware: An added layer of security to prevent employees from
      unknowingly accessing malicious sites that contain or distribute spyware. Also, provides the ability to control and block a
      common peer-to-peer file sharing protocol, reducing the risk of legal liability that can result from the sharing of copyrighted
      material.

•	    Extensive Automated Actions and Alerts: Automated, customizable actions, such as “block” and “quarantine,” can
      be defined for each policy so that there is an immediate response when an object matches the policy criteria.

•	    Enables Regulatory Compliance: AEnables enterprises to comply with government laws and regulations, such as
      the Children’s Internet Protection Act (CIPA), Health Insurance Portability and Accountability Act (HIPAA), Gramm- Leach-
      Bliley Act (GLBA), UK Data Privacy Act, and California’s SB 1386, reducing the risk of costly penalties and lawsuits, and
      safeguarding company reputation.

•	    Full Active Directory Support: Integrates with active directory so that filters can be created for active directory users
      and groups.

•	    Enhanced Protocol Support: To improve the security of SMTP communication, Endpoint & Gateway has added
      Transport Layer Security (TLS) functionality. TLS functionality provides encryption and authentication protection, to confirm
      the identity of peer SMTP mail servers and to ensure that SMTP communication is protected against eavesdropping.

•	    NTLM v2 Support: Endpoint & Gateway r12 now supports proxy pass-through for NTLM v2 authentication requests. NTLM
      v2 is the default authentication type for HTTP clients using Microsoft’s NTLM authentication hosted on Windows 2008 R2 or
      Windows 7.

System Requirements:
 Server Requirements for small to medium sites (<1000 endpoints):
 COMPONENT                                                       PROCESSOR                                                                                   RAM                   HARD DRIVE
 Management Server Minimum                                       1.80 GHz Pentium 4*                                                                         1GB**                 40GB
 Management Server Recommended                                   2.80 GHz Intel Core 2 Duo                                                                   2GB                   100GB
 Microsoft SQL Server                                            2.80 GHz Intel Core 2 Duo                                                                   2GB                   100GB
 *CPUs with lower specifications have not been tested, though might be capable if the CPU speed/model is close to the above.
 **A Management Server with 1 GB of RAM supports a maximum of 250 endpoints and one partition. It should be used only for basic tasks, such as viewing the Dashboard, and does not support the creation, management, or
 deployment of Proactive Protection policies. These restrictions disappear if you upgrade the Management Server to 2 GB or more.
 Server requirements for large sites (>1000 endpoints):
 Component                                                       Processor                                                              RAM                  Hard Drive            Recommended Optional Cards
 Master Management Server                                        3 GHz Dual Quad Core Intel Xeon                                        8GB                  500GB                 Dual Network Interface Cards
 Event Server                                                    3 GHz Dual Quad Core Intel Xeon                                        8GB                  500GB                 Dual Network Interface Cards
 Report Server                                                   3 GHz Dual Quad Core Intel Xeon                                        8GB                  500GB                 Dual Network Interface Cards
 Management Server Proxy                                         3 GHz Intel Xeon                                                       4GB                  100GB
 Event Proxy                                                     3 GHz Intel Xeon                                                       4GB                  100GB
 Microsoft SQL Server                                            3 GHz Intel Xeon                                                       4GB                  100GB




                                                                                            www.totaldefense.com
Client Requirements:
CLIENT HOST                          PROCESSOR                                            RAM              HARD DRIVE
Host Machine Minimum                 1.0 GHz Intel Pentium class                          512MB            600MB
Host Machine Recommended             1.0 GHz (or higher) Intel Pentium class              1GB              600MB


r12 Endpoint Operating System Support
Server:
OPERATING SYSTEM                          ARCHITECTURE                            SERVICE PACK   EDITION
Windows 2003 Server                                                               SP2            Standard, Enterprise
Windows 2003 Server R2                    32-bit                                  SP2            Standard, Enterprise
Windows 2003 Server R2                    64-bit                                  SP2            Standard
Windows 2008 Server                       32-bit, 64-bit                          SP2            Standard, Enterprise
                                                                                                 Standard, Enterprise,
Windows 2008 Server R2                    64-bit                                  None, SP1
                                                                                                 Datacenter
Windows Small Business Server 2003        32-bit*                                 SP1, SP2       Standard, Premium
                                                                                  None, SP1,
Windows Small Business Server 2003 R2     32-bit*                                                Premium
                                                                                  SP2
Windows Small Business Server 2008        64-bit*                                 SP2            Standard, Premium
Windows Small Business Server 2011                                                None           Standard
Windows 7                                 32-bit, 64-bit                          SP1            Professional, Enterprise, Ultimate
Client:
OPERATING SYSTEM                          ARCHITECTURE                            SERVICE PACK   EDITION
Windows XP                                32-bit                                  SP3            Professional
Windows XP                                64-bit                                  SP2            Professional
Windows 2000                                                                      SP4            Professional
Windows 2000 Server                                                               SP4            Standard
Windows 2003 Server                       32-bit, 64-bit                          SP2            Standard, Enterprise
Windows 2003 Server R2                    32-bit, 64-bit                          SP2            Standard, Enterprise, Datacenter
Windows Vista                             32-bit, 64-bit                          SP1/SP2        Ultimate
Windows 2008 Server                       32-bit, 64-bit                          SP2            Standard, Enterprise, Datacenter
Windows 2008 Server R2                    64-bit                                  None, SP1      Standard, Enterprise, Datacenter
Windows Small Business Server 2003        32-bit                                  SP2            Premium
Windows Small Business Server 2003 R2     32-bit*                                 SP2            Premium
Windows Small Business Server 2003 R2                                             None, SP1      Premium
Windows Small Business Server 2008        64-bit*                                 SP2            Standard, Premium
Windows Small Business Server 2011                                                None           Standard
Windows 7                                 32-bit, 64-bit                          None, SP1      Ultimate, Professional, Enterprise




                                                           www.totaldefense.com
Gateway Security – Operating System Support
Gateway
OPERATING SYSTEM           ARCHITECTURE                      SERVICE PACK    EDITION
Windows 7                  32-bit
Windows Vista              32-bit
Windows 2008               32-bit
Windows 2003 Server        32-bit                            SP1, SP2        Standard, Enterprise
XP Professional            32-bit                            SP1, SP2, SP3
Windows 2000               32-bit                            SP4



SCREENSHOTS:




Client 1




Client 2



                                      www.totaldefense.com
Client 3




POLICY 1




POLICY 2



           www.totaldefense.com
Proactive Protection Policy




TDGS SMTP Policy




TDGS URL Policy



                              www.totaldefense.com
Free Evaluation

Total Defense’s services can be easily and freely evaluated before committing to any subscription period.

Contact us at: EnterpriseTrials@totaldefense.com

Full reporting services are provided to help you learn what is going on with your email and Web usage and understand
all that Total Defense has to offer. There is no obligation to subscribe and it is quick and easy to disconnect the service
if you don’t wish to continue.

About Total Defense

Total Defense is a global leader in malware detection and anti-crimeware solutions. Over 50,000 businesses across
a wide spectrum of industries have deployed the Company’s solutions, including some of the most sophisticated
buyers of security technology worldwide, and over four million consumers worldwide use Total Defense’s products.

The Company’s solutions include anti-malware, anti-virus, parental controls, intrusion prevention, mobile security,
online back-up and PC optimization. Total Defense is a former business of CA Technologies, one of the largest
software companies in the world, and has operations in New York, California, Europe and Asia.

Visit http://totaldefense.com/business.aspx for more details

Contact Total Defense

Contact details are available online at: www.TotalDefense.com




                                                     www.totaldefense.com

More Related Content

Viewers also liked (7)

Geography ofeurope
Geography ofeuropeGeography ofeurope
Geography ofeurope
 
Challenges ,trends , and future of enterprise
Challenges ,trends , and future of enterpriseChallenges ,trends , and future of enterprise
Challenges ,trends , and future of enterprise
 
Juki lz 2280 n-7
Juki lz 2280 n-7Juki lz 2280 n-7
Juki lz 2280 n-7
 
Feb 3-9 Love & Encouragement
Feb 3-9 Love & EncouragementFeb 3-9 Love & Encouragement
Feb 3-9 Love & Encouragement
 
Cardinal Antonetti
Cardinal AntonettiCardinal Antonetti
Cardinal Antonetti
 
Radio broadcast
Radio broadcast Radio broadcast
Radio broadcast
 
Accounting by anis & azyan
Accounting by anis & azyanAccounting by anis & azyan
Accounting by anis & azyan
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Endpoint & Gateway r12 DataSheet from TotalDefense

  • 1. DATA SHEET Total Defense for Endpoint & Gateway r12 Overview: Total Defense Endpoint & Gateway r12 is an integrated security solution that offers comprehensive protection for networks, endpoints, and groupware systems, along with additional layers of spam filtering, including sender reputation, embedded URL filtering, malformed email detection and an evasion techniques dictionary that offer protection from unwanted and unsolicited emails. As security challenges continuously evolve around the globe, multiple layers of security are required enterprise-wide to protect against the growing number of business and security threats. In addition to a robust endpoint protection and features like firewall, application control, network access protection, automatic endpoint discovery, and wizard based policy set up, Total Defense Endpoint & Gateway r12 also provides a comprehensive content management solution that defends against business and network integrity threats including viruses, spam, confidentiality breaches, exposure to email legal liability, mobile code threats, and other offensive content usage. Key Features • Robust anti-malware engine: Total Defense’s award winning malware engine provides full-fledged protection against viruses, trojans, worms, rootkits, spywares and bots. • Rootkit protection: Total Defense for Endpoint & Gateway r12 provides support for detecting malwares that are using stealth technologies to prevent their detection from security software. While it is easy for a good signature-driven product to find a known sample that has not yet been activated, it is becoming increasingly challenging to detect the sample once it is running and trying to hide itself and other malicious components. Our improved malware engine allows administrators to detect and remove rootkits. • Firewall: The Total Defense Firewall acts as a barrier between the corporate endpoints and the external Internet preventing unauthorized access. It thwarts potential hackers and protects corporate networks from being exploited by malicious attacks. Total Defense provides built-in firewall rule sets, and also the capability to define user specific add-on rule sets. • Intrusion Prevention and Detection: An added layer of security beyond the firewall, the Host based Intrusion Prevention System (HIPS) is network based, detects and automatically blocks attacks. • Application Control: Total Defense has robust application control capabilities with one of the largest databases of applications grouped into categories. Total Defense has integrated the knowledge of application behavior into the firewall for enhanced protection. Total Defense research maintains and updates one of the most verbose databases on application information. Check against known application database. Set policy actions for missing application signatures, unknown generic and system applications. • Vulnerability assessment: Set policies to enforce compliance and report disabled/locked accounts, invalid login attempts, users with expired passwords, and passwords non-compliant with organizational policies (e.g. frequency of change, password length, etc.). • Unified Network Control (NAP): Validates endpoints for security compliance before admission to the network. Total Defense Endpoint Premium allows identity based policy definition enabling administrators to define specific policies based on users’ functional roles and associated identities. www.totaldefense.com
  • 2. End-to-End Content Protection: Provides integrated, multilayered policy- driven email (SMTP) and web (HTTP, FTP) traffic scanning that addresses virtually every content threat at the gateway. • Enhanced Layers of Spam-filtering: Additional layers of spam filtering, including sender reputation, embedded URL filtering, malformed email detection and an evasion techniques dictionary that offer protection from unwanted and unsolicited emails and improves business productivity • Protection from Phishing, P2P File Sharing & Spyware: An added layer of security to prevent employees from unknowingly accessing malicious sites that contain or distribute spyware. Also, provides the ability to control and block a common peer-to-peer file sharing protocol, reducing the risk of legal liability that can result from the sharing of copyrighted material. • Extensive Automated Actions and Alerts: Automated, customizable actions, such as “block” and “quarantine,” can be defined for each policy so that there is an immediate response when an object matches the policy criteria. • Enables Regulatory Compliance: AEnables enterprises to comply with government laws and regulations, such as the Children’s Internet Protection Act (CIPA), Health Insurance Portability and Accountability Act (HIPAA), Gramm- Leach- Bliley Act (GLBA), UK Data Privacy Act, and California’s SB 1386, reducing the risk of costly penalties and lawsuits, and safeguarding company reputation. • Full Active Directory Support: Integrates with active directory so that filters can be created for active directory users and groups. • Enhanced Protocol Support: To improve the security of SMTP communication, Endpoint & Gateway has added Transport Layer Security (TLS) functionality. TLS functionality provides encryption and authentication protection, to confirm the identity of peer SMTP mail servers and to ensure that SMTP communication is protected against eavesdropping. • NTLM v2 Support: Endpoint & Gateway r12 now supports proxy pass-through for NTLM v2 authentication requests. NTLM v2 is the default authentication type for HTTP clients using Microsoft’s NTLM authentication hosted on Windows 2008 R2 or Windows 7. System Requirements: Server Requirements for small to medium sites (<1000 endpoints): COMPONENT PROCESSOR RAM HARD DRIVE Management Server Minimum 1.80 GHz Pentium 4* 1GB** 40GB Management Server Recommended 2.80 GHz Intel Core 2 Duo 2GB 100GB Microsoft SQL Server 2.80 GHz Intel Core 2 Duo 2GB 100GB *CPUs with lower specifications have not been tested, though might be capable if the CPU speed/model is close to the above. **A Management Server with 1 GB of RAM supports a maximum of 250 endpoints and one partition. It should be used only for basic tasks, such as viewing the Dashboard, and does not support the creation, management, or deployment of Proactive Protection policies. These restrictions disappear if you upgrade the Management Server to 2 GB or more. Server requirements for large sites (>1000 endpoints): Component Processor RAM Hard Drive Recommended Optional Cards Master Management Server 3 GHz Dual Quad Core Intel Xeon 8GB 500GB Dual Network Interface Cards Event Server 3 GHz Dual Quad Core Intel Xeon 8GB 500GB Dual Network Interface Cards Report Server 3 GHz Dual Quad Core Intel Xeon 8GB 500GB Dual Network Interface Cards Management Server Proxy 3 GHz Intel Xeon 4GB 100GB Event Proxy 3 GHz Intel Xeon 4GB 100GB Microsoft SQL Server 3 GHz Intel Xeon 4GB 100GB www.totaldefense.com
  • 3. Client Requirements: CLIENT HOST PROCESSOR RAM HARD DRIVE Host Machine Minimum 1.0 GHz Intel Pentium class 512MB 600MB Host Machine Recommended 1.0 GHz (or higher) Intel Pentium class 1GB 600MB r12 Endpoint Operating System Support Server: OPERATING SYSTEM ARCHITECTURE SERVICE PACK EDITION Windows 2003 Server SP2 Standard, Enterprise Windows 2003 Server R2 32-bit SP2 Standard, Enterprise Windows 2003 Server R2 64-bit SP2 Standard Windows 2008 Server 32-bit, 64-bit SP2 Standard, Enterprise Standard, Enterprise, Windows 2008 Server R2 64-bit None, SP1 Datacenter Windows Small Business Server 2003 32-bit* SP1, SP2 Standard, Premium None, SP1, Windows Small Business Server 2003 R2 32-bit* Premium SP2 Windows Small Business Server 2008 64-bit* SP2 Standard, Premium Windows Small Business Server 2011 None Standard Windows 7 32-bit, 64-bit SP1 Professional, Enterprise, Ultimate Client: OPERATING SYSTEM ARCHITECTURE SERVICE PACK EDITION Windows XP 32-bit SP3 Professional Windows XP 64-bit SP2 Professional Windows 2000 SP4 Professional Windows 2000 Server SP4 Standard Windows 2003 Server 32-bit, 64-bit SP2 Standard, Enterprise Windows 2003 Server R2 32-bit, 64-bit SP2 Standard, Enterprise, Datacenter Windows Vista 32-bit, 64-bit SP1/SP2 Ultimate Windows 2008 Server 32-bit, 64-bit SP2 Standard, Enterprise, Datacenter Windows 2008 Server R2 64-bit None, SP1 Standard, Enterprise, Datacenter Windows Small Business Server 2003 32-bit SP2 Premium Windows Small Business Server 2003 R2 32-bit* SP2 Premium Windows Small Business Server 2003 R2 None, SP1 Premium Windows Small Business Server 2008 64-bit* SP2 Standard, Premium Windows Small Business Server 2011 None Standard Windows 7 32-bit, 64-bit None, SP1 Ultimate, Professional, Enterprise www.totaldefense.com
  • 4. Gateway Security – Operating System Support Gateway OPERATING SYSTEM ARCHITECTURE SERVICE PACK EDITION Windows 7 32-bit Windows Vista 32-bit Windows 2008 32-bit Windows 2003 Server 32-bit SP1, SP2 Standard, Enterprise XP Professional 32-bit SP1, SP2, SP3 Windows 2000 32-bit SP4 SCREENSHOTS: Client 1 Client 2 www.totaldefense.com
  • 5. Client 3 POLICY 1 POLICY 2 www.totaldefense.com
  • 6. Proactive Protection Policy TDGS SMTP Policy TDGS URL Policy www.totaldefense.com
  • 7. Free Evaluation Total Defense’s services can be easily and freely evaluated before committing to any subscription period. Contact us at: EnterpriseTrials@totaldefense.com Full reporting services are provided to help you learn what is going on with your email and Web usage and understand all that Total Defense has to offer. There is no obligation to subscribe and it is quick and easy to disconnect the service if you don’t wish to continue. About Total Defense Total Defense is a global leader in malware detection and anti-crimeware solutions. Over 50,000 businesses across a wide spectrum of industries have deployed the Company’s solutions, including some of the most sophisticated buyers of security technology worldwide, and over four million consumers worldwide use Total Defense’s products. The Company’s solutions include anti-malware, anti-virus, parental controls, intrusion prevention, mobile security, online back-up and PC optimization. Total Defense is a former business of CA Technologies, one of the largest software companies in the world, and has operations in New York, California, Europe and Asia. Visit http://totaldefense.com/business.aspx for more details Contact Total Defense Contact details are available online at: www.TotalDefense.com www.totaldefense.com