010-68421378
sales@cogitosoft.com
Categories
AddFlow  AmCharts JavaScript Stock Chart AmCharts 4: Charts Aspose.Total for Java Altova SchemaAgent Altova DatabaseSpy Altova MobileTogether Altova UModel  Altova MapForce Altova MapForce Server Altova Authentic Aspose.Total for .NET Altova RaptorXML Server ComponentOne Ultimate Chart FX for SharePoint Chart FX CodeCharge Studio ComponentOne Enterprise combit Report Server Combit List & Label 22 Controls for Visual C++ MFC Chart Pro for Visual C ++ MFC DbVisualizer version 12.1 DemoCharge DXperience Subscription .NET DevExpress Universal Subscription Essential Studio for ASP.NET MVC FusionCharts Suite XT FusionCharts for Flex  FusionExport V2.0 GrapeCity TX Text Control .NET for WPF GrapeCity Spread Studio Highcharts Gantt Highcharts 10.0 版 HelpNDoc Infragistics Ultimate  ImageKit9 ActiveX ImageKit.NET JetBrains--Fleet JetBrains-DataSpell JetBrains--DataGrip jQuery EasyUI jChart FX Plus OPC DA .NET Server Toolkit  OSS ASN.1/C Oxygen XML Author  OSS 4G NAS/C, C++ Encoder Decoder Library OSS ASN.1 Tools for C with 4G S1/X2 OSS ASN.1/C# OSS ASN.1/JAVA OSS ASN.1/C++ OPC HDA .NET Server Toolkit OPC DA .Net Client Development Component PowerBuilder redgate NET Developer Bundle Report Control for Visual C++ MFC  Sencha Test SPC Control Chart Tools for .Net Stimulsoft Reports.PHP Stimulsoft Reports.JS Stimulsoft Reports.Java Stimulsoft Reports. Ultimate Stimulsoft Reports.Wpf Stimulsoft Reports.Silverlight SlickEdit Source Insight Software Verify .Net Coverage Validator Toolkit Pro for VisualC++MFC TeeChart .NET Telerik DevCraft Complete Altova XMLSpy Zend Server

Advanced Endpoint Protection

Advanced Endpoint Protection

Groundbreaking Endpoint Protection Platform Built On Zero Trust Architecture

 

ADVANCED ENDPOINT PROTECTION

Endpoint Security Benefits

While unknown files are in containment, the files are immediately analyzed in the cloud by Comodo’s Valkyrie Verdicting Engine and Threat Intelligence without interrupting the end user.

  • Activate Breach Prevention Protects Your Data
  • Report a Reduction Total Number of Incidents
  • Best Malware Protection from Ransomware
  • Lightweight Agent with Cloud Delivered Updates

 

 

Secure Your Endpoints From Ransomware, Data Breaches, & Malware

Advanced Endpoint Protection will never trust and will always verify 100% of unknown executables to prevent any damage

 

SECURITY ARCHITECTURE

ZERO TRUST ARCHITECTURE

Endpoints Finally Protected

  • Protect endpoints against 100% of unknown threats without impacting user productivity.
  • Combination of machine learning and human expert analysis gives your verdict in 45 seconds.
  • Once Advanced Endpoint Protection is deployed it won’t heavily impact endpoint performance.

 

PATENT-PENDING TECHNOLOGY

CONTAINMENT WITHOUT COMPROMISE

Outsmart Malware And Attack Vectors

  • Allow unknown files to safely run on endpoints, without write access to the critical components.
  • Virtualize all unknown files immediately in Containment when executed on an endpoint.
  • End users enjoy seamless productivity, with the ability to run any unknown file, even while the file is in analysis.

 

45 SEC VERDICT ENGINE

THREAT INTELLIGENCE FEEDS VERDICTS

All Unknowns Become Classified

  • 95% of unknown files return a verdict under 45 seconds! 5% of unknown files go to security specialists with 4 hour sla!
  • Security specialists are on call to apply expert analysis of more sophisticated threats and return a verdict in a maximum of 4 hours.
  • File Verdicts are updated globally in real-time for all AEP customers by the Valkyrie verdicting engine.

 

WHY CHOOSE OUR ADVANCED ENDPOINT PROTECTION?

 

When an unknown file, a potential malicious threat, attempts to execute on an endpoint, the file is immediately encapsulated by Comodo Auto Containment Technology, while users can immediately open files and run downloaded scripts and executables.

 

Auto Containment™

Contain 100% of known and unknown threats instantly

Unknown executables and other files that request runtime privileges are automatically run in Comodo’s patented virtual container that does not have access to the host system’s resources or user data.

 

Comodo Antivirus

Automatically detect, cleanse and quarantine suspicious files

Scans endpoints against a massive list of known good and bad files compiled from years as the world’s largest certificate authority and from the 85 million endpoints deployed worldwide.

 

Comodo Host Firewall

Protect against inbound threats and outbound threats

Provides granular management of inbound and outbound network activities, hides system ports    from scans, and provides warnings when suspicious activities are detected.

 

Comodo File Lookup System

Check the file reputation against Comodo’s whitelist and blacklist

 

Virus Scope Behavior Analyzer

Monitor behaviors of all processes to identify harmful actions

Uses techniques such as API hooking, DLL injection prevention, and more to identify indicators   of compromise while keeping the endpoint safe and without affecting usability.

 

Host Intrusion Prevention System

Monitor important operating system activities to watch for intrusions

Rules-based HIPS that monitors application activities and system processes, blocking those that are malicious by halting actions that could damage critical system components.

 

Fileless Malware Protection

Protect against malware that have no files to execute

Not all malware is made equal. Some malware do not need you to execute a file, it built-in the endpoint’s memory-based artifact such as RAM. Comodo AEP completely stops write access against this threat.

 

Valkyrie Analyzers

Statically and dynamically analyze unknown threats in the cloud

While running in auto-containment, unknown files are uploaded to a global threat cloud for   real-time analysis, returning a verdict within 45 seconds for 95% of the files submitted.

 

Cloud-Native Architecture

Signatures updated automatically without interruption

Automatic signature updates that simplifies deployment across your entire environment to lower operational costs delivering reliable, centralized and fully scalable security solutions for today's business.

 

Expert Human Analysis

24 hr expert analysis of more sophisticated threats

In the 5% of cases where VirusScope and Valkyrie are unable to return a verdict, the file can be sent to researchers for human analysis who make a determination within SLA timelines.

 

ANALYST RECOGNITION

We’ve won consecutively across many verticals with our premier technology.
Innovation happens only when this type of dedication to cybersecurity reaches the many.

 

   

ENDPOINT SECURITY

Cloud Antivirus, Internet Security and Dragon Platform, formerly Comodo One, are all awarded the Best+++ by AVLab

Dragon Platform, formerly Comodo ONE, selected as SC Media 2018 Trust Award Finalist for Best Managed Security Service

 

NETWORK SECURITY

Comodo Named to Gartner Endpoint Protection Platform (EPP) Magic Quadrant

Comodo AEP Awarded Silver in Endpoint Detection and Response in 2019 Cybersecurity Excellence Awards

Comodo AEP Named Best in Ransomware Protection in 2018 Cybersecurity Excellence Awards

 

MANAGED DETECTION & RESPONSE

Comodo MDR Named Best in Managed Detection and Response in 2019 Cybersecurity Excellence Awards

 

THREAT INTELLIGENCE

Comodo Threat Intelligence Named Best in Cloud File Analysis in 2019 Cybersecurity Excellence Awards

Comodo Threat Intelligence Named 2019 Finalist for Trust Award in Best Threat Intelligence Technology by SCAwards

 

REAL-WORLD PROOF THAT OUR ENDPOINT PRO TECTION OFFERS SECURITY WITHOUT COMPROMISE

When a 2017 WikiLeaks data dump exposed the CIA’s assessments of 20 security products, we got to see the unvarnished results of the intelligence community’s attempts to foil the technologies that businesses rely on daily to protect themselves. While many of the biggest names in the market proved to be easily to moderately hackable, there was one solution that seemed to frustrate their best attempts.

 

100% TRUST VERDICT OF ALL UNKNOWN FILES

Comodo Advanced Endpoint Protection (AEP) delivers patent-pending auto-containment, where unknown executables and other files that request runtime privileges are automatically run in a virtual container that does not have access to the host system’s resources or user data. They run just as well as they would on the host system, making it seamless from the end-user perspective, but they cannot damage or infect the native system.

 

Cybercrime has come a long way from script kiddies looking for a little glory. Today’s sophisticated attackers are after money and power. By 2019, ransomware will attack a business every 14 seconds and damage costs will soar to $11.5 billion annually. In 2017, wide-ranging events from elections to North Korea nuclear threats and missile launches corresponded with major malware spikes in enterprise security, indicating the use of cyber “activism” to achieve geopolitical goals.

 

No business and no user can be considered safe. Having a comprehensive defense-in-depth strategy has never been more critical, and no security posture is complete without technology to protect endpoints. But security controls must not impede employees’ ability to do their jobs—and ease of administration is critical to reduce the burden on your IT staff.

 

While running in auto-containment, unknown files are uploaded to a global threat cloud for real-time analysis, which returns a verdict within 45 seconds for 95% of the files submitted. The remaining 5% of cases are sent to researchers for human analysis who make a determination within SLA timelines. In short, Comodo AEP provides a 100% verdict 100% of the time. And because the global threat cloud is crowdsourced, the knowledge gained about one unknown file benefits all Comodo AEP users. You benefit from the network effect of 85 million users. The extremely lightweight Comodo client has no CPU dependencies and is completely application-agnostic.

 

That’s good news for you. By deploying Comodo AEP, you can bulletproof your endpoints and your hardworking employees won’t notice the difference.

 

Here’s what the CIA—one of the best-funded, most expert hacking organizations in the world—had to say about Comodo AEP:

“Comodo is impossible to breach. A colossal pain in the posterior. It literally catches every payload sent through a network.”

 

MINIMUM HARDWARE REQUIREMENTS

 

Comodo provides technical support to customers who encounter issues with using and maintaining any of Comodo’s products, including, but not limited to Advanced Endpoint Protection (AEP), Endpoint Manager (EM), Dome Products (such as Shield, SWG, ASG and DLP) and most other Comodo Cybersecurity offerings.

 

Memory: 384MB of available RAM

Storage: 210MB HDD for 32-bit version or 64-bit version

Processor: CPU with SSE2 Support (Streaming SIMD Extensions 2)

Browser: Internet Explorer5.1 or above

Quick Navigation;

© Copyright 2000-2023  COGITO SOFTWARE CO.,LTD. All rights reserved