- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
-
Impenetrable cybersecurity without sacrificing usability
-
Gain detailed visibility into all your endpoints activities
-
Reduce the attack surface to remediate and patch
-
Fortify mobile devices that exit and enter your network
-
Keep endpoints safe from known threat signatures
-
Setup device network and security policies quickly
TECHNOLOGY & PROCESS-
Patented to ensure absolute isolation from threats
-
Insights from deep web and dark web to eliminate risk
-
Our pioneered approach has shifted the industry
-
100% trust an all files at lightning speeds
-
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
-
Retain experts to investigate an incident to start remediation
-
Our experts closely monitor changes to your environment 24x7x365
-
Cybersecurity experts will continuously hunt suspicious endpoint activity
SUPPORT, DEPLOY, MAINTAIN-
Ensure your installations are properly deployed
-
Trouble with maintaining your products? Get help now
-
Align your success with optimal security performance
-
- Tools
- For HomeFOR HOMEWEB BROWSERBROWSER ADD-ONS & EXTENSIONS
- Partners
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.KNOWLEDGE BASETHREAT LABS
- Company
CryptoLocker Ransomware Continues to Claim Victims, While Enterprises Remain Safe with Comodo Endpoint Security
The US Government’s Computer Emergency Readiness Team (US-CERT) has warned of an upsurge in the CryptoLocker ransomware virus, but enterprises that use Comodo Endpoint Security are guaranteed to be protected.
Clifton, NJ, November 15, 2013 – Comodo, a leading Certificate Authority and Internet security organization, today announced that their Comodo Advanced Endpoint Protection software proactively protects endpoints from getting infected by the CryptoLocker ransomware. CryptoLocker is a highly malicious Trojan that is spread mainly through fake emails that mimic the look of legitimate businesses or via phony FedEx and UPS tracking notices. Once the user opens the message, CryptoLocker installs itself on the user’s system, scans the hard drive, and encrypts the files. All files are rendered inaccessible to the user until they pays a ransom to receive a decryption key.”
ESM and its Comodo Endpoint Security (CES) software prevents threats, including the CryptoLocker ransomware, by isolating all applications that it cannot verify as safe. If a threat is known to be malicious, the Antivirus (AV) will detect its signature and prevent the infection of your files. If the threat is unknown, the HIPS and Comodo’s unique Auto-Sandbox technology will intercept it and stop it from contaminating the underlying operating system. Therefore, even before CryptoLocker became a known virus, CES automatically sandboxed it to prevent encryption of files.
“CESM 3 is truly next generation in proactive endpoint security” said Michél Bechard, Comodo Product Line Manager, “because it’s the only anti-malware solution that brings 5 layers of defense (Antivirus, Firewall, Host Intrusion Prevention, Auto-Sandbox & File Rating) to the point of impact, the desktop. We have such confidence in the strength of our solution that we are the only AV vendor to offer our customers up to a $5,000 limited warranty against infection.”
Comodo’s new Advanced Endpoint Protection 3 (CESM 3) platform provides a state-of-the-art anti-malware suite to coordinate threat protection on local and remote endpoints from one browser based console. It is designed to assist system and security administrators with centrally managing their laptop, desktop, and server endpoints with a minimum of administrative effort. The latest version of CESM features the addition of several new capabilities, including centralized monitoring of sandboxed (unknown) and malicious files, Endpoint auto-synchronization via Active Directory, Encrypted VNC sessions to local & remote endpoints and support for Windows 7 Embedded Standard.
To learn more about the next generation in proactive endpoint security, visit:Comodo.com/business-enterprise/cesm3/index_v2.php
To Download a 60-Day, 60 user free trial, visit:secure.nurd.com/home/purchase.php?pid=32&license=try
About Comodo
Comodo is a leading internet security provider. With U.S. Headquarters in New Jersey and global resources in UK, China, India, Ukraine, and Romania, Comodo provides businesses and consumers worldwide with security services, including SSL Certificate, PCI scanning, desktop security, and remote PC support. Securing online transactions for more than 200,000 businesses, and with more than 40 million desktop security software installations, including an award-winning firewall and antivirus software, Comodo is Creating Trust Online®. To learn more, visit Comodo’s website: Comodo.com.
For more information, reporters and analysts may contact:
Comodo
Email: media-relations@comodo.com
Office: +1 (888) 266-6361