- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
-
Impenetrable cybersecurity without sacrificing usability
-
Gain detailed visibility into all your endpoints activities
-
Reduce the attack surface to remediate and patch
-
Fortify mobile devices that exit and enter your network
-
Keep endpoints safe from known threat signatures
-
Setup device network and security policies quickly
TECHNOLOGY & PROCESS-
Patented to ensure absolute isolation from threats
-
Insights from deep web and dark web to eliminate risk
-
Our pioneered approach has shifted the industry
-
100% trust an all files at lightning speeds
-
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
-
Retain experts to investigate an incident to start remediation
-
Our experts closely monitor changes to your environment 24x7x365
-
Cybersecurity experts will continuously hunt suspicious endpoint activity
SUPPORT, DEPLOY, MAINTAIN-
Ensure your installations are properly deployed
-
Trouble with maintaining your products? Get help now
-
Align your success with optimal security performance
-
- Tools
- For HomeFOR HOMEWEB BROWSERBROWSER ADD-ONS & EXTENSIONS
- Partners
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.KNOWLEDGE BASETHREAT LABS
- Company
Comodo Releases Historical Statistics for Enterprise Customers Achieves Zero Percent Infection and Breaches for Customers
Clifton, NJ – October 29, 2020 – Comodo, the world’s leader of next-generation cybersecurity announced that it has released historical statistics for its enterprise customers and will publish updates on a regular basis. Comodo’s Transparency Page lists weekly historical data sets that includes scores and statistics from millions of endpoints on thousands of different networks. Built with the goal of providing transparency and building trust, it represents a health check for enterprise customers and drills down to both device view and file view, providing percentage data for the following:
Device View
- Percentage of active devices with malicious activity (in containment)
- Percentage of active devices on known good state (no unknowns)
- Percentage of active devices that have seen malicious activity (API virtualized)
- Percentage of infection/breach
File View
- Percentage of unknowns that turns out to be clean
- Percentage of unknowns that turn out to be a potentially unwanted application (PUA)
- Percentage of the unknowns that turned out to be malware
“Our reporting for the month of October shows zero infections and zero breaches, which represents data collected from our enterprise users on millions of endpoints, from thousands of different networks,” said Alan Knepfer, President and Chief Revenue Office with Comodo. He continued, “This clearly demonstrates the power of Comodo attack surface reduction (ASR) and the efficacy of protection without detection. Every unknown executable, which these files were, were running in kernel API virtualization mode.”
Comodo’s Dragon platform with Advanced Endpoint Protection (AEP) is a complete cloud-native framework that delivers a zero-trust architecture to protect and defend endpoints. Its patent-pending auto containment technology has active breach protection that neutralizes ransomware, malware and cyber-attacks. The auto containment runs any unknown executable in a kernel API virtualized mode, thereby offering attack surface reduction (ASR) which neutralizes ransomware attacks.
The Dragon platform also utilizes a Default Deny security posture with Default Allow usability to provide a most comprehensive protection against zero-day threats, while having no impact on end-user experience or workflows. Comodo’s Valkyrie analyzes and gives a trusted verdict for every file – no other company will analyze and give trusted verdict for 100% of the files on a network. Comodo’s platform shares intelligence and is therefore more secure than disparate products that claim best of breed but don’t share information. Comodo has architected its cybersecurity product to maximize intelligent sharing between every component of the platform, therefore providing superior security.
Alan continued, “Transparency and trust are key in the cybersecurity industry. And while a hundred percent security cannot be promised by anyone, showing these types of stats is a critical component for building the foundation for that transparency and trust. We are calling on all cybersecurity vendors to start publishing similar statistics, as well. We firmly believe this type of visibility is good for the industry and for end users. Only companies with subpar products that rely on marketing and don’t want to be found out will be hesitant to publish these types of statistics.”
About Comodo
Comodo is the world’s leader of next-generation open source cybersecurity, with the industry’s most disruptive innovations.
We help customers stop breaches with groundbreaking auto containment technology that neutralizes ransomware, malware and cyber-attacks. Our complete cloud-native framework delivers a zero-trust architecture with active breach protection for the most comprehensive defense against zero-day threats. Comodo’s cybersecurity products maximize intelligent sharing between every component of the platform, therefore providing superior security. We are the only company that analyzes and gives a trusted verdict for 100% of files on a network.
Comodo leverages innovation to celebrate and support the cybersecurity community by offering the very first open source endpoint detection and response (EDR). We believe that an open source model using community-powered collaboration will ensure that every organization has access to the industry’s most sophisticated EDR.
Headquartered in Clifton NJ, Comodo’s global development team and threat intelligence laboratories deliver innovative, category leading, security solutions for thousands of companies’ endpoints, network boundaries, and internal networks. For more information visit https://www.comodo.com/