SlideShare a Scribd company logo
I   n   t   r   o   d   u   c   I   n   g
internet security
                 reInvented
                                              Every day, malware gets better at
                                              understanding how you work.
                                              Does your security?
                                              CA focused on IT professionals when
                                  creating Total Defense r12, a multi-layered
                                  Internet security solution engineered to work
                                  the way you do: with strength, clarity and
                                  flexibility. Total Defense isn’t just a security
                                  solution. It’s your security solution.




MultI-layered Internet securIty
Visually Refined




Graphical. Intuitive. Straightforward. Total Defense r12’s dashboard keeps you informed at all times.


 More security.                      less cost.                         completely
 With multiple layers of security,   Secure your IT and save money        Installed.
 you’re protected many times over.   with surprisingly affordable       Don’t sweat the deployment.
                                     pricing options.                   Let the industry’s only remote
                                                                        installation team do it for you.




                                                                        More Security. Less Cost.
                                                                        completely Installed.
                                                                          mpletely
workflow
                 redefIned
                                  When your Internet security is effective and easy to
                                  handle, you spend less time catching up to threats
                                  and more time getting ahead of them.




MultI-layered Internet securIty
Simply Powerful

Easy Management                           Security That’s Scalable                        Multi-Layered Security
               One glance at                        Configure both the                                   Behind every barrier,
               the Total Defense                    installer and the engine                             malware should
               management console                   in Total Defense to                                  find another barrier.
               tells you everything.                optimize your system                                 Total Defense syncs
The streamlined interface compiles        performance. Whether you’re                     CA’s award-winning malware
all critical endpoint information to      deploying it over two nodes or                  protection with new capabilities
give you a real-time picture of all       200,000—locally or globally—you                 in deployment, management,
the threats and vulnerabilities. You      decide exactly how to use the power             compliance and reporting. Your
can also customize the dashboard          of Total Defense.                               IT environment will be protected
and organize information the way                                                          behind multiple layers of security.
you like it.


Policies: Click and Deploy                Instant Auditable Reports                       Seamless Switch
               Set policies with point-              Multiple layers of security                        Thinking about
               and-click ease. Total                 are useless if you can’t see                       replacing your anti-virus
               Defense lets you tailor               how they’re performing.                            with the multilayered
               thousands of endpoint                 Total Defense can create                           security of Total
policies from your desk. No more          system-wide, customizable reports               Defense? Transitioning is easy. Total
logging-in to endpoints to fine-tune      in real-time. So auditable data on              Defense automatically removes
them one at a time.                       security standards and compliance is            the old security software—that
                                          always within a few clicks.                     would take you hours to uninstall
                                                                                          manually—to avoid any application
                                                                                          conflicts.


   w!                                       w!                                             w!    Enhanced
 Ne                                       Ne  global security                            Ne
        network access                                                                          content filtering
          Protection                         research center                                     capabilities
  Manage your network policies and stay    Knowledge is security. Get the latest          Put spam in its place. Keep your gateway
  compliant with international security    threat updates and trends from around          and endpoints safe.
  standards.                               the world.




                                                                                    More Security. Less Cost.
                                                                                    completely Installed.
                                                                                      mpletely
combinations
                                    revaMPed
   Choose from a full, flexible array of Total Defense security packages
   You can start with any level of security and then upgrade easily without uninstalling or reinstalling software.
   With cloud-based licensing, you can simply unlock new features in your Total Defense suite when you want more security.




  Anti-Virus r12                Threat Manager r12              Total Defense for                Total Defense for                Total Defense
                                                                Endpoint r12                     Endpoint Premium                 for Endpoint and
                                                                                                 Edition r12                      Gateway r12
• Virus and spyware          • Virus and spyware              • Virus and spyware              • Virus and spyware              • Virus and spyware
  protection                   protection                       protection                       protection                       protection
• Centralized management     • Groupware protection           • Proactive protection against   • Proactive protection against   • Proactive protection against
                             • Centralized Reporting            Zero-day threats                 zero-day threats                 zero-day threats
                             • Endpoint security validation   • Centralized Management         • Centralized Reporting          • Centralized Reporting
                                                                                               • Groupware protection           • Groupware protection
                                                                                               • Endpoint security validation   • Endpoint security validation
                                                                                                                                • Protection for Gateway



    MultI-layered Internet securIty
Total Defense Responds

Deployment:                             You’re Covered:                     Stay Alert.                              Cloud-Based Licensing
We Got It.                              24x7x365                            Plan ahead.                              and Upgrades
          With our Remote                           Viruses don’t                           Power your                           Need to upgrade?
          Deployment Service,                       just work 9 to 5.                       security                             Just contact your
          the only one of its                       That’s why our                          with global                          reseller to unlock
          kind in the industry,                     support lines are                       intelligence.                        new capabilities in
you don’t have to worry                 open around the clock.              Total Defense Security Advisor           your Total Defense suite. It’s
about installation. Our team            With Total Defense on your          acts as an early warning                 that simple—no uninstalling
of experts will install and             side, you have our total            system, streaming real-time              and reinstalling. The cloud-
configure Total Defense on              support backing you—                alerts and tips, from CA’s               based licensing feature in
your system—via broadband.              through web, phone, and             Global Security Research                 Total Defense lets you easily
So you can rest assured that            chat—every hour of every day.       Center, to your dashboard.               allocate, track, and shift
your system is secured and                                                  The more you know, the more              licenses; conduct migrations
configured correctly.                                                       prepared you are.                        and upgrades.


                                                                                                            Total Defense for    Total Defense for
                                                                                   Total Defense for
                                             Anti-Virus r12   Threat Manager r12                           Endpoint Premium        Endpoint and
                                                                                     Endpoint r12
                                                                                                               Edition r12         Gateway r12
  Anti-Malware
  HIPs
         Endpoint Firewall
         Intrusion Protection
         Operating System Security
         Application Controls
  grouPWare
         Microsoft Exchange
         Lotus Notes
         Microsoft SharePoint
         NetApp
  Vulnerability Assessment
  Unified Network Control (NAP)*
  CA Gateway Security*

 *Centralized management from a separate console




                                                                                                       More Security. Less Cost.
                                                                                                       completely Installed.
                                                                                                         mpletely
Interested in Becoming
                                                                                   an Internet security Partner?
                                                                                   visit: security.com/partners




           Experience a virtual trial in the cloud.
Test drive Total Defense in the cloud. No infrastructure. No investment. No problem. The Total Defense

  Virtual Trial Center lets you simulate how it will work on your network. Run tests. Create policies.

  Discover endpoints. This isn’t a demo. You’ll experience the real Total Defense and get real results.




                                     More Security. Less Cost.
                                     completely Installed




                         totaldefense.com • security.com/partner

More Related Content

What's hot

Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
Anindya Ghosh,
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
Zsolt Nemeth
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
ShapeBlue
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Novell
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
Irsandi Hasan
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Symantec
 
CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeCRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff Crume
KrisValerio
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
santosomar
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
Kaspersky
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
Data Unit
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
Sophos
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General Presentation
Ksenia Kondratieva
 
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
Trend Micro (EMEA) Limited
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco Soldi
SMAU
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Kuniyasu Suzaki
 
brochure-triton-ap-web-en
brochure-triton-ap-web-enbrochure-triton-ap-web-en
brochure-triton-ap-web-en
Lee Dalton
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7
Irsandi Hasan
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
Irsandi Hasan
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real World
Cisco Russia
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
Luigi Perrone
 

What's hot (20)

Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeCRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff Crume
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General Presentation
 
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco Soldi
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
 
brochure-triton-ap-web-en
brochure-triton-ap-web-enbrochure-triton-ap-web-en
brochure-triton-ap-web-en
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real World
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 

Similar to Total Defense Product Information

Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and Softchoice
Softchoice Corporation
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
Dell EMC World
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
MdZabedHossain2
 
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsWeaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Lumension
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
Andris Soroka
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
Microsoft Singapore
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
IDG Romania
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
Işınsu Akçetin
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
MarketingArrowECS_CZ
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
Lauren Bell
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010
Vadimazz
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
Jeremiah Grossman
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and Cisco
ePlus
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
 
Complete Security
Complete SecurityComplete Security
Complete Security
Sophos
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
Ploynatcha Akkaraputtipat
 
Sonic wall crui presentazione per sito crui
Sonic wall crui presentazione per sito cruiSonic wall crui presentazione per sito crui
Sonic wall crui presentazione per sito crui
Fondazione CRUI
 

Similar to Total Defense Product Information (20)

Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and Softchoice
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsWeaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and Cisco
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
Sonic wall crui presentazione per sito crui
Sonic wall crui presentazione per sito cruiSonic wall crui presentazione per sito crui
Sonic wall crui presentazione per sito crui
 

Total Defense Product Information

  • 1. I n t r o d u c I n g
  • 2. internet security reInvented Every day, malware gets better at understanding how you work. Does your security? CA focused on IT professionals when creating Total Defense r12, a multi-layered Internet security solution engineered to work the way you do: with strength, clarity and flexibility. Total Defense isn’t just a security solution. It’s your security solution. MultI-layered Internet securIty
  • 3. Visually Refined Graphical. Intuitive. Straightforward. Total Defense r12’s dashboard keeps you informed at all times. More security. less cost. completely With multiple layers of security, Secure your IT and save money Installed. you’re protected many times over. with surprisingly affordable Don’t sweat the deployment. pricing options. Let the industry’s only remote installation team do it for you. More Security. Less Cost. completely Installed. mpletely
  • 4. workflow redefIned When your Internet security is effective and easy to handle, you spend less time catching up to threats and more time getting ahead of them. MultI-layered Internet securIty
  • 5. Simply Powerful Easy Management Security That’s Scalable Multi-Layered Security One glance at Configure both the Behind every barrier, the Total Defense installer and the engine malware should management console in Total Defense to find another barrier. tells you everything. optimize your system Total Defense syncs The streamlined interface compiles performance. Whether you’re CA’s award-winning malware all critical endpoint information to deploying it over two nodes or protection with new capabilities give you a real-time picture of all 200,000—locally or globally—you in deployment, management, the threats and vulnerabilities. You decide exactly how to use the power compliance and reporting. Your can also customize the dashboard of Total Defense. IT environment will be protected and organize information the way behind multiple layers of security. you like it. Policies: Click and Deploy Instant Auditable Reports Seamless Switch Set policies with point- Multiple layers of security Thinking about and-click ease. Total are useless if you can’t see replacing your anti-virus Defense lets you tailor how they’re performing. with the multilayered thousands of endpoint Total Defense can create security of Total policies from your desk. No more system-wide, customizable reports Defense? Transitioning is easy. Total logging-in to endpoints to fine-tune in real-time. So auditable data on Defense automatically removes them one at a time. security standards and compliance is the old security software—that always within a few clicks. would take you hours to uninstall manually—to avoid any application conflicts. w! w! w! Enhanced Ne Ne global security Ne network access content filtering Protection research center capabilities Manage your network policies and stay Knowledge is security. Get the latest Put spam in its place. Keep your gateway compliant with international security threat updates and trends from around and endpoints safe. standards. the world. More Security. Less Cost. completely Installed. mpletely
  • 6. combinations revaMPed Choose from a full, flexible array of Total Defense security packages You can start with any level of security and then upgrade easily without uninstalling or reinstalling software. With cloud-based licensing, you can simply unlock new features in your Total Defense suite when you want more security. Anti-Virus r12 Threat Manager r12 Total Defense for Total Defense for Total Defense Endpoint r12 Endpoint Premium for Endpoint and Edition r12 Gateway r12 • Virus and spyware • Virus and spyware • Virus and spyware • Virus and spyware • Virus and spyware protection protection protection protection protection • Centralized management • Groupware protection • Proactive protection against • Proactive protection against • Proactive protection against • Centralized Reporting Zero-day threats zero-day threats zero-day threats • Endpoint security validation • Centralized Management • Centralized Reporting • Centralized Reporting • Groupware protection • Groupware protection • Endpoint security validation • Endpoint security validation • Protection for Gateway MultI-layered Internet securIty
  • 7. Total Defense Responds Deployment: You’re Covered: Stay Alert. Cloud-Based Licensing We Got It. 24x7x365 Plan ahead. and Upgrades With our Remote Viruses don’t Power your Need to upgrade? Deployment Service, just work 9 to 5. security Just contact your the only one of its That’s why our with global reseller to unlock kind in the industry, support lines are intelligence. new capabilities in you don’t have to worry open around the clock. Total Defense Security Advisor your Total Defense suite. It’s about installation. Our team With Total Defense on your acts as an early warning that simple—no uninstalling of experts will install and side, you have our total system, streaming real-time and reinstalling. The cloud- configure Total Defense on support backing you— alerts and tips, from CA’s based licensing feature in your system—via broadband. through web, phone, and Global Security Research Total Defense lets you easily So you can rest assured that chat—every hour of every day. Center, to your dashboard. allocate, track, and shift your system is secured and The more you know, the more licenses; conduct migrations configured correctly. prepared you are. and upgrades. Total Defense for Total Defense for Total Defense for Anti-Virus r12 Threat Manager r12 Endpoint Premium Endpoint and Endpoint r12 Edition r12 Gateway r12 Anti-Malware HIPs Endpoint Firewall Intrusion Protection Operating System Security Application Controls grouPWare Microsoft Exchange Lotus Notes Microsoft SharePoint NetApp Vulnerability Assessment Unified Network Control (NAP)* CA Gateway Security* *Centralized management from a separate console More Security. Less Cost. completely Installed. mpletely
  • 8. Interested in Becoming an Internet security Partner? visit: security.com/partners Experience a virtual trial in the cloud. Test drive Total Defense in the cloud. No infrastructure. No investment. No problem. The Total Defense Virtual Trial Center lets you simulate how it will work on your network. Run tests. Create policies. Discover endpoints. This isn’t a demo. You’ll experience the real Total Defense and get real results. More Security. Less Cost. completely Installed totaldefense.com • security.com/partner