- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
-
Impenetrable cybersecurity without sacrificing usability
-
Gain detailed visibility into all your endpoints activities
-
Reduce the attack surface to remediate and patch
-
Fortify mobile devices that exit and enter your network
-
Keep endpoints safe from known threat signatures
-
Setup device network and security policies quickly
TECHNOLOGY & PROCESS-
Patented to ensure absolute isolation from threats
-
Insights from deep web and dark web to eliminate risk
-
Our pioneered approach has shifted the industry
-
100% trust an all files at lightning speeds
-
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
-
Retain experts to investigate an incident to start remediation
-
Our experts closely monitor changes to your environment 24x7x365
-
Cybersecurity experts will continuously hunt suspicious endpoint activity
SUPPORT, DEPLOY, MAINTAIN-
Ensure your installations are properly deployed
-
Trouble with maintaining your products? Get help now
-
Align your success with optimal security performance
-
- Tools
- For HomeFOR HOMEWEB BROWSERBROWSER ADD-ONS & EXTENSIONS
- Partners
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.KNOWLEDGE BASETHREAT LABS
- Company
COMODO’S CONTAINMENT TECHNOLOGY ENSURES TOTAL PROTECTION FOR SCHOOL ENDPOINTS
SECURITY CHALLENGES FOR SMALL ORGANIZATIONS
There are over 390,000 new malicious programs discovered every day across the globe, according to recent data from third party security analysts.
These malware threats are designed to hack into infrastructures to steal personal information, financial and corporate records, or plant infections that cause destruction and chaos. A blacklist of files helps keep malware at bay. But what if a file is unknown and doesn’t appear on the blacklist? Traditional antivirus technologies cannot block the unknown file and by default, allow it to enter and infect an IT system.
All of these new threats start out as unknown files. With the non-stop onslaught of cybercrime, there is a dangerous lag time between malware being made public and appearing on a blacklist. Traditional blacklisting simply cannot keep up – volume outpaces supply. Traditional antivirus solutions also use ‘default-allow’ technology, which only stops recognized, blacklisted files, and focus only on detection; not prevention. Using technology that recognizes and contains unknown files to prevent cyberattacks and malware penetration is now required. Most small business and organizations have limited budgets and a small number of IT staffs, and without affordable IT security layers in place, they are susceptible to cyberattacks.
SOUTHLANDS ENGLISH SCHOOL’S ADVANCING TECHNOLOGY
Southlands English School in Rome, Italy, is a private, independent day school for boys and girls with a small IT infrastructure. Over the past few years, Southlands invested in information technology including the expansion of two computer labs, wiring classrooms, and providing students and teachers with high-speed internet access.
Even with an extremely small IT staff and budget, Southlands sought a technology partner who could protect its infrastructure from malware and secure its multiple software licenses and endpoints.
“We knew that as we advanced the technology capabilities at our school, the risks that come with technology—including malware, spyware and spam— could increase, which could cause major havoc for a smaller IT system like ours,” said Luca Iacono, Technology Officer for Southlands English School.
Southlands needed a security solution that helped protect their endpoints from malware threats and could reduce the time required to manage endpoints, all at a price that would fit within their budget.
“We have an IT staff of one and a modest budget, but our security needs are the same as any large enterprise. We need malware protection and a streamlined way of managing multiple endpoints from one central location,” said Iacono.
PREVENTION-BASED SECURITY SOLUTION
Southlands evaluated all of the known endpoint security providers, including Symantec, McAfee and Comodo, using its own internal benchmark testing, reviews, cost analysis, and looking at overall ease of use. Southlands also tested free offerings from the major security companies—including Comodo’s Internet Suite of antivirus and firewall technologies— to get real-time evaluation data and familiarity with the products.
After evaluating all products, it was clear to Southlands that Comodo had the solution it needed.
The Comodo Endpoint Security (CES) with Run-Time Automatic Threat Containment (RATC) technology automatically traps unknown files and executes them in a secure, virtual container. Unknown files are allowed to run while in containment, which enables students and teachers to continue their work and focus on their priorities. However, files in containment cannot infect the operating system, modify the data on the hard disk and cause any damage.
Comodo Advanced Endpoint Protection not only protects against zero-day threats, it also gives administrators total visibility and control over the software, hardware and services of every machine. CESM’s central management console and user-friendly policy wizards allow Southlands’ IT administrator to generate and enforce security configurations within minutes.
“We’ve been running Comodo Endpoint Security Manager for over a year now and we have never encountered a security or malware issue,” said Iacono. “Comodo’s automatic containment technology—which clearly separates Comodo from all other products – keeps our endpoints secure. The fact that my IT system can automatically contain a piece of malware gives me peace of mind. Every enterprise should use Comodo ESM if they want to protect themselves from unknown malware.”
PREVENTION-BASED SECURITY SOLUTION
Comodo Advanced Endpoint Protection provided Southlands English School in Rome with a stateof-the-art endpoint protection with real-time management and control over critical system resources.
ADDITIONAL INFORMATION
Learn more about Southlands English School www.southlands.it
Learn more about Comodo Advanced Endpoint Protection EnterpriseSolutions@comodo.com
About Comodo
CThe Comodo organization is a global innovator and developer of cyber security solutions, founded on the belief that every single digital transaction deserves and requires a unique layer of trust and security. Building on its deep history in SSL certificates, antivirus and endpoint security leadership, and true containment technology, individuals and enterprises rely on Comodo’s proven solutions to authenticate, validate and secure their most critical information. With data protection covering endpoint, network and mobile security, plus identity and access management, Comodo’s proprietary technologies help solve the malware and cyber-attack challenges of today. Securing online transactions for thousands of businesses, and with more than 85 million desktop security software installations, Comodo is Creating Trust Online®. With United States headquarters in Clifton, New Jersey, the Comodo organization has offices in China, India, the Philippines, Romania, Turkey, Ukraine and the United Kingdom
For additional information on Comodo – Creating Trust Online™ – please visit: Comodo.com.