CONFIDENTIAL – DO NOT FORWARD TOTAL DEFENSE FOR BUSINESS CLOUD SECURITY - WEB SECURITY
Dec 25, 2015
CONFIDENTIAL – DO NOT FORWARD
TOTAL DEFENSE FOR BUSINESSCLOUD SECURITY - WEB SECURITY
CONFIDENTIAL – DO NOT FORWARD
TOTAL DEFENSE CLOUD MANAGED SECURITY PLATFORM
“THE WORLD’S FIRST 100% CLOUD BASED, INTEGRATED WEB, EMAIL AND ENDPOINT SECURITY PLATFORM”
CONFIDENTIAL – DO NOT FORWARD
OVERVIEW:
A cloud-based Internet filtering and Web 2.0 security service. Total Defense provides your organization with a safe and secure Internet connection, free from threats and malware, while ensuring that Web browsing is appropriate and complies with your acceptable use policies.
KEY FEATURES & BENEFITS:
• URL Filtering
• Anti-Virus & Malware Protection
• Application Control
• Bandwidth Control
• Data Leakage Prevention
• Inbound & Outbound Policy Compliance
• Security & Compliance Reporting
• Seamless policy enforcement of in-house and mobile/remote workers
• Directory Integration
TOTAL DEFENSE WEB SECURITY
CONFIDENTIAL – DO NOT FORWARD
Features & Benefits
• The Total Defense Web Security Service is a cloud-based, Internet filtering and Web 2.0 security service. It enables your organization to enjoy secure, safe Internet use, free from threats and malware, while ensuring that use is appropriate and compliant with your acceptable use policy.The service is simple, easy and effective to use and provides comprehensive reporting with easy to understand graphical summaries and drilldown detail.
• The service provides both inbound and outbound real-time content analysis. It is simple, easy and effective to use and provides comprehensive reporting with easy to understand graphical summaries and drilldown detail.
• URL Filtering – Total Defense provides a comprehensive database of millions of websites in more than 50 reporting categories. More importantly, Total Defense dynamically analyzes the content of websites that your users are accessing in real-time, looking for malicious code, anomalies and inappropriate material, and preventing access to sites which are a security or policy risk to your organization. This ensures that users are protected against threats and offensive material and your network is not compromised by malicious websites.
• Anti-Virus and Malware Security – the service incorporates both traditional anti-virus technology and sophisticated dynamic anomaly detection and traffic modelling systems to protect your organization from viruses, botnets, spyware, browser exploits and other Web 2.0 threats. Downloaded files are scanned in real-time to provide protection against potentially unwanted applications. Our patented dynamic modelling engine examines web links, scripts and code structures looking for the tell-tale behavioural characteristics of malicious sites and vulnerability exploits – denying these threats from executing and preventing drive-by infections.
• Application Control – the Total Defense service enables you to gain control over popular Web 2.0 applications such as Social Networking, Streaming Media and Web-based messaging. These applications, if unmonitored or unmanaged, can become a serious security and policy issue for your organization. Total Defense enables you to manage access to these applications or block them entirely
CONFIDENTIAL – DO NOT FORWARD
Features & Benefits (cont)
• Bandwidth Control – Total Defense allows you to manage your Internet bandwidth consumption and control unnecessary or non-business use. This enables you to maximize your Internet connection and prioritize important websites, ensuring that high speed bandwidth is available for your critical business use and preventing excessive costs. Bandwidth Control can be policy-based so you can place restrictions on specific users or at particular times of day when you need to ensure you are getting the most from your bandwidth.
• Data Leakage Prevention – with Total Defense, you can control the distribution of sensitive data or private information via the Web. The service enables you to control who can upload important files to the Web or post sensitive content on Web 2.0 sites, blogs, wikis or webmail.
• Acceptable Use Policy Compliance – if your organization has an acceptable use policy, defining appropriate use of Web resources and outlining inappropriate conduct and prohibited content, then Total Defense can actively monitor and enforce those policies. Block pornography, bad language, violence and other inappropriate Web content which could potentially create legal liability risk and ensure a safe and productive workplace for your employees.
• Security & Policy Compliance Reporting – the Total Defense Web Security Service provides you with ready access to useful and easy to understand reports on your Internet usage and threats. Graphical summary reports are provided as well as more in-depth reports to help you investigate and answer any questions that may arise. You can run reports by site, category, user, bandwidth and by threat type
CONFIDENTIAL – DO NOT FORWARD
OnBoarding & Off Boarding Processes
OnBoardingAll services are available via our online subscription portal, when customer services will support applicants. Engagement is online and via Form submission or telephone enquiry
Off-BoardingNo specific requirements exist – access to the service expires at the end of the subscription period
CONFIDENTIAL – DO NOT FORWARD
Back-up/restore
Our services are maintained by in country providers and subject to their high availability maintenance through multi-tenanted and mirrored DC facilities.
In the UK we utilise British Telecom
CONFIDENTIAL – DO NOT FORWARD
General Support details
Technical Support• Help with technical questions, product issues and remote deployment.• Contact Technical Support By Phone• North America: 1-855-237-8613 begin_of_the_skype_highlighting 1-855-237-
8613 FREE end_of_the_skype_highlightingOutside North America? Click here for Phone Directory
• Get Help Through Cloud Console• You can submit a support request directly from
your Total Defense For Business cloud console
Customer Service• Help with order inquiries, licensing and changes to contact information.• Contact Customer Service By Phone• North America: 1-888-504-9800 begin_of_the_skype_highlighting 1-888-504-
9800 FREE end_of_the_skype_highlighting | M-F 8am-5pm US PSTOutside North America? +1-650-412-4450 begin_of_the_skype_highlighting +1-650-412-4450 FREE end_of_the_skype_highlighting | M-F 6am-3pm US PSTClick here for Phone Directory
• Email: [email protected]
CONFIDENTIAL – DO NOT FORWARD
Service Constraints
PlannedAll maintenance is undertaken so as to provide a seemless continuous customer experience that maintains availability of the service without disruption. Any planned maintenance is undertaken at times to minimise disruption to customer access to our services such that users do not experience any disruption or performance degradation to the service
UnplannedNotifications are provided to users in the event of emergency/unplanned changes. Our high-availability service assures even unplanned changes are seemless to users.
CONFIDENTIAL – DO NOT FORWARD
Service Levels
Protecting customers’ means more than preventing dangerous threats from reaching their digital devices, their data and their lives. At Total Defense it means ensuring their software is installed and configured correctly for maximum security. It also means 24/7 support and services provided by caring and knowledgeable digital security experts who ensure Total Defense is always there, passionately protecting users from the relentless and growing threat of malware and cyber-crime.
CONFIDENTIAL – DO NOT FORWARD
Training
Online material is available for use including White papers
• Demo Videos• Product Overview
Take a quick tour and learn about the benefits of our unified endpoint, web and email protection.
• Remote User ProtectionLearn about how to keep your users protected when out of the office or on the road.
• Multi-Platform SupportThis short video shows how easy it is to keep Windows, Mac and Linux evices fully protected.
• Security Policy SetupSee how easy it is to create and deploy a security policy.
CONFIDENTIAL – DO NOT FORWARD
Termination Terms
Please refer to our EULA for full details
CONFIDENTIAL – DO NOT FORWARD
Data Processing & Storage Locations
Data Processing & Storage Locations
Data is managed locally and within the boundaries of the Endpoint location.The endpoint within the UK is with British Telecom
CONFIDENTIAL – DO NOT FORWARD
Technical requirements
There are no specific technical requirements. The Service supports:– Mac, Windows and Linux OS
CONFIDENTIAL – DO NOT FORWARD
Browsers
All current browsers are supportede.g. IE 8, 9; Firefox, Chrome
CONFIDENTIAL – DO NOT FORWARD
Details of Any trial Services Available
Total Defense is FREE for 15 days upon application.
Access is via our portal at:http://cloud.totaldefense.com/b2b/support/index.html
CONFIDENTIAL – DO NOT FORWARD
TOTAL DEFENSE CLOUD SECURITY REPORTING
DASHBOARDS FOR AT-A-GLANCE ACTIVITY ACROSS
WEB, EMAIL AND ENDPOINTS WEB SECURITY REPORTS:
• Top Users by Requests• Top Sites by Requests • Top Categories by Requests • File Types by Requests • Bandwidth Consumption • Compliance Actions by User, Site, Category or
File Type EMAIL SECURITY REPORTS
• Top Email Senders • Top Senders by Bandwidth • Top Email Recipients • Top Recipients by Bandwidth • Top Spam Targets • Top File Attachments
ENDPOINT SECURITY REPORTS• Scanned, Cleaned and Quarantined Files• Protected, At Risk, Infected and Offline Endpoints• Top Threats by User , Application and File Type• High, medium and low Vulnerabilities• Forensic Logs
CONFIDENTIAL – DO NOT FORWARD
BETTER PROTECTION LESS HEADACHES LOWER COST• Easily protect
remote/roaming users on and off the network
• Block the majority of threats before they get into your environment
• Layered security approach by blocking threats on the web, in email and at the endpoint
• 24/7 security managed by security experts
• Guaranteed performance backed by SLAs
• Data-in-Motion DLP and ability to limit/eliminate non-productive and high bandwidth web usage (Facebook, Pandora, YouTube, etc.)
• Single set of policies for groups using existing controls (AD, LDAP, etc.)
• Comply with regulatory requirements such as SOX, HIPAA, CIPA, GLB, etc.
• Centralized administration and actionable reporting across all potential breach points
• No need to install and manage appliances, servers and/or heavy software
• Deploy in a few short days and possibly hours vs. days or weeks
• Easily scale up/down, added protection/modules to meet changing business needs
• Reduce bandwidth, storage, energy, and labor costs compared to traditional multi-vendor, non-integrated approaches
• Eliminate hardware and software purchases
• Low annual subscription• Consolidate point
solutions and get economies of scale from a carrier grade, global infrastructure
• Leverage the Total Defense guarantee – More Protection at Less Cost
TOTAL DEFENSE CLOUD SECURITY ADVANTAGES
CONFIDENTIAL – DO NOT FORWARD
TOTAL DEFENSE CLOUD SECURITY INFRASTRUCTURE
TOTAL DEFENSE FOR BUSINESS CLOUD SECURITY HIGHLY AVAILABLE, CARRIER GRADE, SCALABLE GLOBAL NETWORK