Advanced Endpoint Protection
Groundbreaking Endpoint Protection Platform Built On Zero Trust Architecture
ADVANCED ENDPOINT PROTECTION
Endpoint Security Benefits
While unknown files are in containment, the files are immediately analyzed in the cloud by Comodo’s Valkyrie Verdicting Engine and Threat Intelligence without interrupting the end user.
Secure Your Endpoints From Ransomware, Data Breaches, & Malware
Advanced Endpoint Protection will never trust and will always verify 100% of unknown executables to prevent any damage
SECURITY ARCHITECTURE
ZERO TRUST ARCHITECTURE
Endpoints Finally Protected
PATENT-PENDING TECHNOLOGY
CONTAINMENT WITHOUT COMPROMISE
Outsmart Malware And Attack Vectors
45 SEC VERDICT ENGINE
THREAT INTELLIGENCE FEEDS VERDICTS
All Unknowns Become Classified
WHY CHOOSE OUR ADVANCED ENDPOINT PROTECTION?
When an unknown file, a potential malicious threat, attempts to execute on an endpoint, the file is immediately encapsulated by Comodo Auto Containment Technology, while users can immediately open files and run downloaded scripts and executables.
Auto Containment™
Contain 100% of known and unknown threats instantly
Unknown executables and other files that request runtime privileges are automatically run in Comodo’s patented virtual container that does not have access to the host system’s resources or user data.
Comodo Antivirus
Automatically detect, cleanse and quarantine suspicious files
Scans endpoints against a massive list of known good and bad files compiled from years as the world’s largest certificate authority and from the 85 million endpoints deployed worldwide.
Comodo Host Firewall
Protect against inbound threats and outbound threats
Provides granular management of inbound and outbound network activities, hides system ports from scans, and provides warnings when suspicious activities are detected.
Comodo File Lookup System
Check the file reputation against Comodo’s whitelist and blacklist
Virus Scope Behavior Analyzer
Monitor behaviors of all processes to identify harmful actions
Uses techniques such as API hooking, DLL injection prevention, and more to identify indicators of compromise while keeping the endpoint safe and without affecting usability.
Host Intrusion Prevention System
Monitor important operating system activities to watch for intrusions
Rules-based HIPS that monitors application activities and system processes, blocking those that are malicious by halting actions that could damage critical system components.
Fileless Malware Protection
Protect against malware that have no files to execute
Not all malware is made equal. Some malware do not need you to execute a file, it built-in the endpoint’s memory-based artifact such as RAM. Comodo AEP completely stops write access against this threat.
Valkyrie Analyzers
Statically and dynamically analyze unknown threats in the cloud
While running in auto-containment, unknown files are uploaded to a global threat cloud for real-time analysis, returning a verdict within 45 seconds for 95% of the files submitted.
Cloud-Native Architecture
Signatures updated automatically without interruption
Automatic signature updates that simplifies deployment across your entire environment to lower operational costs delivering reliable, centralized and fully scalable security solutions for today's business.
Expert Human Analysis
24 hr expert analysis of more sophisticated threats
In the 5% of cases where VirusScope and Valkyrie are unable to return a verdict, the file can be sent to researchers for human analysis who make a determination within SLA timelines.
ANALYST RECOGNITION
We’ve won consecutively across many verticals with our premier technology.
Innovation happens only when this type of dedication to cybersecurity reaches the many.
ENDPOINT SECURITY
Cloud Antivirus, Internet Security and Dragon Platform, formerly Comodo One, are all awarded the Best+++ by AVLab
Dragon Platform, formerly Comodo ONE, selected as SC Media 2018 Trust Award Finalist for Best Managed Security Service
NETWORK SECURITY
Comodo Named to Gartner Endpoint Protection Platform (EPP) Magic Quadrant
Comodo AEP Awarded Silver in Endpoint Detection and Response in 2019 Cybersecurity Excellence Awards
Comodo AEP Named Best in Ransomware Protection in 2018 Cybersecurity Excellence Awards
MANAGED DETECTION & RESPONSE
Comodo MDR Named Best in Managed Detection and Response in 2019 Cybersecurity Excellence Awards
THREAT INTELLIGENCE
Comodo Threat Intelligence Named Best in Cloud File Analysis in 2019 Cybersecurity Excellence Awards
Comodo Threat Intelligence Named 2019 Finalist for Trust Award in Best Threat Intelligence Technology by SCAwards
REAL-WORLD PROOF THAT OUR ENDPOINT PRO TECTION OFFERS SECURITY WITHOUT COMPROMISE
When a 2017 WikiLeaks data dump exposed the CIA’s assessments of 20 security products, we got to see the unvarnished results of the intelligence community’s attempts to foil the technologies that businesses rely on daily to protect themselves. While many of the biggest names in the market proved to be easily to moderately hackable, there was one solution that seemed to frustrate their best attempts.
100% TRUST VERDICT OF ALL UNKNOWN FILES
Comodo Advanced Endpoint Protection (AEP) delivers patent-pending auto-containment, where unknown executables and other files that request runtime privileges are automatically run in a virtual container that does not have access to the host system’s resources or user data. They run just as well as they would on the host system, making it seamless from the end-user perspective, but they cannot damage or infect the native system.
Cybercrime has come a long way from script kiddies looking for a little glory. Today’s sophisticated attackers are after money and power. By 2019, ransomware will attack a business every 14 seconds and damage costs will soar to $11.5 billion annually. In 2017, wide-ranging events from elections to North Korea nuclear threats and missile launches corresponded with major malware spikes in enterprise security, indicating the use of cyber “activism” to achieve geopolitical goals.
No business and no user can be considered safe. Having a comprehensive defense-in-depth strategy has never been more critical, and no security posture is complete without technology to protect endpoints. But security controls must not impede employees’ ability to do their jobs—and ease of administration is critical to reduce the burden on your IT staff.
While running in auto-containment, unknown files are uploaded to a global threat cloud for real-time analysis, which returns a verdict within 45 seconds for 95% of the files submitted. The remaining 5% of cases are sent to researchers for human analysis who make a determination within SLA timelines. In short, Comodo AEP provides a 100% verdict 100% of the time. And because the global threat cloud is crowdsourced, the knowledge gained about one unknown file benefits all Comodo AEP users. You benefit from the network effect of 85 million users. The extremely lightweight Comodo client has no CPU dependencies and is completely application-agnostic.
That’s good news for you. By deploying Comodo AEP, you can bulletproof your endpoints and your hardworking employees won’t notice the difference.
Here’s what the CIA—one of the best-funded, most expert hacking organizations in the world—had to say about Comodo AEP:
“Comodo is impossible to breach. A colossal pain in the posterior. It literally catches every payload sent through a network.”
MINIMUM HARDWARE REQUIREMENTS
Comodo provides technical support to customers who encounter issues with using and maintaining any of Comodo’s products, including, but not limited to Advanced Endpoint Protection (AEP), Endpoint Manager (EM), Dome Products (such as Shield, SWG, ASG and DLP) and most other Comodo Cybersecurity offerings.
Memory: 384MB of available RAM
Storage: 210MB HDD for 32-bit version or 64-bit version
Processor: CPU with SSE2 Support (Streaming SIMD Extensions 2)
Browser: Internet Explorer5.1 or above
© Copyright 2000-2023 COGITO SOFTWARE CO.,LTD. All rights reserved