- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
-
Impenetrable cybersecurity without sacrificing usability
-
Gain detailed visibility into all your endpoints activities
-
Reduce the attack surface to remediate and patch
-
Fortify mobile devices that exit and enter your network
-
Keep endpoints safe from known threat signatures
-
Setup device network and security policies quickly
TECHNOLOGY & PROCESS-
Patented to ensure absolute isolation from threats
-
Insights from deep web and dark web to eliminate risk
-
Our pioneered approach has shifted the industry
-
100% trust an all files at lightning speeds
-
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
-
Retain experts to investigate an incident to start remediation
-
Our experts closely monitor changes to your environment 24x7x365
-
Cybersecurity experts will continuously hunt suspicious endpoint activity
SUPPORT, DEPLOY, MAINTAIN-
Ensure your installations are properly deployed
-
Trouble with maintaining your products? Get help now
-
Align your success with optimal security performance
-
- Tools
- For HomeFOR HOMEWEB BROWSERBROWSER ADD-ONS & EXTENSIONS
- Partners
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.KNOWLEDGE BASETHREAT LABS
- Company
The latest news from Comodo
NEWS
- Trusted by:
New Comodo Software Provides Faster, More Affordable IT Security for SMBs
Advanced Endpoint Protection 2.0 Business Edition eliminates obstacles such as implementation time, cost and complexity while providing strongest protection available at best price
Jersey City, NJ, December 21, 2011 – Comodo, a leading certificate authority and Internet security solutions provider, today released Advanced Endpoint Protection 2.0 Business Edition, which addresses the needs of small- to mid-sized business owners and other computer users with limited time and IT support resources, at a category-redefining price point under $1 per managed endpoint backed by an industry-first $5,000 limited warranty. The new version of Comodo’s Internet security management software for businesses greatly reduces the time to configure, test and deploy a network-wide security system and improvements in console usability allows businesses to accomplish in hours what may currently have taken days. In addition to the savings business owners can realize via increased productivity, the product’s support for a non-dedicated management server can save business owners thousands of dollars in hidden costs of server software and hardware, and the improvements in antimalware technology can save them hundreds of dollars over using competitive solutions. “Artificially inflated price points for Antivirus and Firewall software have left many small businesses exposed to unnecessary risk from software that can’t guarantee results. Business owners end up paying for hidden costs of implementation and support, while only diminishing, and still not solving the main problem – securing their business assets,” said Melih Abdulhayoglu, Comodo’s CEO and chief security architect. “It’s time for a new model, where the security needed to protect the business use of computers and the Internet is not held hostage to outdated signature-centric antimalware products, and the customer is not forced to pay for a security product’s inability to protect them.” Comodo’s Advanced Endpoint Protection 2.0 Business Edition is ideal for organizations with 100 employees or fewer (up to 250 endpoints is supported by the software), simplifying the administration process by:- centrally enforcing configuration policy on all endpoints to insure the protection designed by the administrator is in effect company-wide,
- using location-aware configuration policies that apply appropriate security policies depending on whether the endpoint is local or connected via the Internet,
- consolidating information on active threats that may lead to a malware outbreak,
- upgrading standalone installations so as to provide organization-wide security and compliance monitoring, and
- reducing console complexity and increasing accessibility via a web browser.