Vous êtes ici : Accueil / Workstation / Servers Protection / Workstation / Servers Protection – Details

THE ADVANTAGES OF MAGIC TOTAL PROTECTION

SIMPLIFIED MANAGEMENT WITH THE F-SECURE CENTER

This user-friendly Web console can be used to manage your security services and generate security reports. The tables can be rapidly customized to optimize visibility. You can also create user groups to simplify management, and pool all installations, configurations, reports and updates.

ALWAYS ON THE WATCH

Our clients appreciate the continuous and up-to-date protection of the F-Secure.
F-Secure clients appreciate the continuous, constantly up-to-date protection it provides, thanks to daily security updates and automated service upgrades, via the F-Secure platform. Simply install the required components, and the solution updates via an Internet connection, with no user interaction required. As far as the user is concerned, there are no interruptions whatsoever and no maintenance operations are required.

SIMPLIFIED SECURITY MANAGEMENT

Thanks to the F-Secure web console, you can centralize installation, configuration, reporting, updating and group management. You can access the interface from any Web browser to consult reports, plan updates for computers or carry out analysis in order to detect viruses or vulnerabilities.

AUTOMATIC UPDATES TO PROTECT CLIENTS WORKSTATIONS

Thanks to an Internet relay or connection, the F-Secure suites protect and update all systems automatically, several times a day, and at regular intervals, without any interruptions for the end-user. In this way, you know that you have the most recent version of the F-Secure suite on all your computers. These updates, very fast, constitute a proactive measure protecting servers, computers and email applications from constantly evolving threats (viruses, spyware, hacking, etc.).

REDUCED TOTAL COST OF OWNERSHIP (TCO)

Thanks to the Magic Total Protection solution, you can reduce the total cost of ownership in regards to security licensing costs as well as on-site software and hardware spending, by making the most of the F-Secure infrastructure and skills. An ideal solution for companies of all sizes, Magic Total Protection automates security procedures, and releases IT staff from complex tasks of deployment, upgrading and management.

COMPLETE PROTECTION WITH ONE SINGLE SOLUTION

Magic Total Protection has been designed to protect enterprises of all sizes, delivering top-quality protection to computers and Web environments from even the most recent threats, known and unknown. In addition, Magic Total Protection offers a complete protection with one single product, instead of having lots of different products installed and running.

RAPID DEPLOYMENT FOR ALL USERS

Regardless of user physical location, they need only send the personalized installation link, and they can instantly deploy the solution, via the Internet, on their computer, and enjoy the benefits of the F-Secure protection. Silent installation options or push options are also available.

OPTIONS

ASSESSING VULNERABILITIES

You can easily analyze your network perimeter to identify and correct potential vulnerabilities. You can consult detailed reports to check the status and compliance of the network by means of an ongoing comparison with respect to the most commonly observed standards.

SYSTEM CONFIGURATION REQUIRED

Magic Total Protection run on PC platforms with Microsoft Windows, Linux and mobile.

WINDOWS WORKSTATIONS

‣ Microsoft® Windows XP (32 bits)
‣ Microsoft® Windows Vista (32 and 64 bits)
‣ Microsoft® Windows 7 (32 and 64 bits)
‣ Microsoft® Windows 8 (32 and 64 bits)
‣ Microsoft® Windows 8.1 (32 and 64 bits)

APPLE WORKSTATIONS

‣ OS X version 10.11 “El Capitan”
‣ OS X version 10.10 “Yosemite”
‣ OS X version 10.9 “Mavericks”
‣ OS X version 10.8 “Mountain Lion”
‣ OS X version 10.7 “Lion”
‣ OS X version 10.6 “Snow Leopard”

MOBILES PROTECTION

‣ Android 4.0 – 6.0

WINDOWS SERVERS PROTECTION

‣ Microsoft® Windows Server 2003/R2, 2008/R2, 2012/R2, 2012/R2, 2012/R2 Essentials
‣ Microsoft® Small Business Server 2003/R2, 2008, 2011, 2011 Essentials
‣ Microsoft® Exchange 2003, 2007, 2010, 2013

LINUX 32 bits SERVERS PROTECTION

‣ CentOS 5.5
‣ CentOS 6.4, 6.5
‣ Debian 6.0
‣ Debian 7.0-7.6
‣ Red Hat Enterprise Linux 5.5, 5.9, 5.10
‣ Red Hat Enterprise Linux 6.4, 6.5
‣ SUSE Linux Enterprise Server 11 SP1
‣ SUSE Linux Enterprise Server 11 SP3
‣ Ubuntu 10.04 (Lucid Lynx)
‣ Ubuntu 12.04 and 12.04.2 (Pangolin)

LINUX 64 bits SERVERS PROTECTION (With 32 bits compatibility)

‣ CentOS 5.5
‣ CentOS 6.4, 6.5
‣ Debian 6.0
‣ Debian 7.0-7.6
‣ Red Hat Enterprise Linux 5.5, 5.9, 5.10
‣ Red Hat Enterprise Linux 6.4, 6.5
‣ SUSE Linux Enterprise Server 11 SP1
‣ SUSE Linux Enterprise Server 11 SP3
‣ Ubuntu 10.04 (Lucid Lynx)
‣ Ubuntu 12.04 and 12.04.2 (Precise Pangolin)