- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
-
Impenetrable cybersecurity without sacrificing usability
-
Gain detailed visibility into all your endpoints activities
-
Reduce the attack surface to remediate and patch
-
Fortify mobile devices that exit and enter your network
-
Keep endpoints safe from known threat signatures
-
Setup device network and security policies quickly
TECHNOLOGY & PROCESS-
Patented to ensure absolute isolation from threats
-
Insights from deep web and dark web to eliminate risk
-
Our pioneered approach has shifted the industry
-
100% trust an all files at lightning speeds
-
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
-
Retain experts to investigate an incident to start remediation
-
Our experts closely monitor changes to your environment 24x7x365
-
Cybersecurity experts will continuously hunt suspicious endpoint activity
SUPPORT, DEPLOY, MAINTAIN-
Ensure your installations are properly deployed
-
Trouble with maintaining your products? Get help now
-
Align your success with optimal security performance
-
- Tools
- For HomeFOR HOMEWEB BROWSERBROWSER ADD-ONS & EXTENSIONS
- Partners
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.KNOWLEDGE BASETHREAT LABS
- Company
COMODO LAUNCHES LATEST VERSION OF ITS FREE, AWARD-WINNING FIREWALL PRO (V 3.0) AND TAKES DESKTOP SECURITY TO A NEW LEVEL
New A-VSMART™ Technology Creates a Next Generation, Proactive Threat Defense System to Prevent Viruses, Spyware, Malware, Rootkits and Trojans from Infiltrating Computers
Jersey City, NJ, November 27, 2007 – To help consumers protect their computers from all forms of viruses and malware, Comodo, a leading Internet security company today announced the release of Comodo Firewall Pro Version 3.0. Comodo Firewall Pro protects millions of computers worldwide and this new release advances computer security from being a defensive, reactive system to a preventative and proactive solution based on a new A-VSMART™ technology architecture. A-VSMART is short for “Anti; Virus, Spyware, Malware, Rootkit and Trojan” and represents a breakthrough in PC Security architecture. While still free, Comodo’s next generation firewall helps customers more effectively prevent virtually all types of threats from penetrating a computer and incorporates the latest security prevention technologies available. Despite the sophisticated level of prevention, the software remains easy for the home user to install and use “out of the box”.
Comodo Firewall Pro (V3.0) does a better job of protecting computers from malware than conventional solutions because it operates from a prevention rather than a detection perspective, and incorporates a sophisticated, layered threat management approach. Unlike detection/ signature-based firewalls and anti-virus solutions that allow all applications to gain access to system resources and then try to detect previously identified viruses by their signature, Comodo Firewall Pro takes the opposite approach. Comodo A-VSMART architecture allows only those applications known to be safe to gain access to computer resources, greatly reducing the probability of damage occurring.
Breakthrough Technology: A-VSMART™ Technology Architecture
The key component of this next generation firewall lies in its A-VSMART (Anti: Virus, Spyware, Malware, Rootkit, Trojan) technology architecture that both proactively monitors internal system applications and processes while also actively monitoring all incoming and outgoing Internet traffic. Specifically, this architecture proactively protects against potential security breaches by; 1) enabling tighter control of internet traffic, b) controlling which applications are allowed to gain access to a computer’s CPU (central processing unit) and 3) limiting critical system access to allow only trusted system modifications. To deliver this high level of protection, Comodo Firewall Pro A-VSMART architecture utilizes key proprietary technologies:
- Defense+ for proactive monitoring of internal systems and processes:Defense+ is an advanced Host Intrusion Prevention System (HIPS) that proactively monitors systems and system processes to detect and prevent system changes such as rootkit installations, inter-process memory injections, key-loggers and more.HIPS technology is driven by a white list architecture which identifies trusted applications and prevents untrusted applications being installed onto the computer. Comodo has one of the largest white lists in the industry with a database of nearly 1 million safe executables. The integrity of every executable is checked against this database to determine whether or not it is genuine before it is given installation rights. With this system, potentially damaging applications are prevented from being ever being installed.
- Patent Pending “Clean PC Mode”Comodo Firewall Pro provides the user with the ability to install the solution in Clean PC mode, most useful for new PCs. In these cases, Comodo Firewall Pro creates a profile of the computer with all existing applications registered as safe. The firewall then prevents any unrecognized applications from being installed unless; a) the application is recognized by Comodo’s extensive white list or b) the user grants installation permissions. It also prevents any suspicious system processes from running.
- Advanced firewall engine for preventative management of incoming, outgoing Internet traffic:Comodo Firewall Pro offers the highest levels of preventative monitoring of all inbound and outbound traffic which will prevent hackers and identity thieves from penetrating a computer. New features have been added to enable this level of ID theft protection:
- Stealth mode to make a PC completely invisible to opportunistic port scans
- Wizard based auto-detection of trusted zones
- Password protection of firewall settings
- Diagnostics to analyze system for potential conflicts with other applications
In total, this innovative A-VSMART architecture combines security features, multilayer intelligence, application protection and threat containment within high-performance, yet easy to use solution.
Key Features and Highlights of Firewall
This firewall integrates advanced technologies described above with a full set of features designed to optimize usability, enhance functionality and enable a high level of user configurability. Some selected features include:
- “Clean PC Mode” InstallationThis powerful new feature allows Comodo Firewall Pro to create a profile of all applications on a new computer. This then prevents any unrecognized malware from being installed and maintains the “virus clean” status of a new computer.
- Security rules interfaceVersion 3.0 gives users more control over security settings than ever before. Users can quickly set granular internet access rights and privileges on a global or per application basis using the flexible and easy to understand interface. This version also sees the introduction of pre-set security policies which allows users to deploy a sophisticated hierarchy of firewall rules with a couple of mouse clicks.
- Enhanced graphical UI (User Interface)Completely redesigned look and feel from the previous version of Comodo Firewall Pro makes it even easier for users to manage and configure. The default summary screen displays an immediate heads-up on all vital security settings and provides a central point of navigation to every part of the application.
- Pop-Up alerts provide critical security informationUsers are immediately informed with a pop-up alert if the firewall detects a potential security threat. Each alert includes a Security Considerations section which provides clear advice on whether you should allow or block a process.
- Event loggingVersion 3.0 features a vastly improved log management module – allowing users to export records of firewall activity according to several user-defined filters.
- Vista CompatibilityComodo Firewall Pro is now available for the Microsoft Vista™ community (both 32 and 64 bit versions).
Prevention Technologies Delivers Better Protections and Benefits
The culmination of years of development, Comodo Firewall Pro delivers advanced preventative protection that offers a number of key benefits designed to:
- Provide virtually bulletproof protection against root-kits, inter-process memory injections, key-loggers and more
- Authenticate the integrity of every program before allowing it access to system resources
- Alert users every time an unknown or untrusted application attempts to run or install
- Block Viruses, Trojans and Spyware before they can ever get into a system
- Prevent unauthorized modification of critical operating system files and registry entries
- Give users granular level of control to determine access rights and privileges on a global or per application basis using the flexible and easy to understand interface.
“Comodo Firewall Pro represents a paradigm shift in the way we protect our PCs from security threats such as viruses, trojans and malware of all sorts.” said Melih Abdulhayoglu, CEO and Chief Security Architect of Comodo. “Today most security solutions are detection based and detection can no longer be the first line of defense. Rather, prevention must become the first line of defense in computer security and Comodo Firewall Pro was engineered with that capability. We need to start denying malware access to the CPU and proceed from the position of allowing only trusted applications CPU access. The Comodo companies are able to deliver this breakthrough approach because we leverage our Certification Authority heritage to authenticate trusted applications and executables.”
Comodo Firewall Pro with its A-VSMART architecture provides a highly effective, efficient and lightweight system for worry-free desktop security to manage the variable and fluid threat landscape.
For more information, please visit personalfirewall.comodo.com
About Comodo
The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL, Code Signing, Content Verification and Email Certificate; award winning PC Security software; Vulnerability Scanning services for PCI Compliance; secure e-mail and fax services.
Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet’s ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and 3,000,000 users of our desktop security products.
For additional information on Comodo – Creating Trust Online® visit Comodo.com
About Comodo
The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL, Code Signing, Content Verification and Email Certificate; award winning PC Security software; Vulnerability Scanning services for PCI Compliance; secure e-mail and fax services.
Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet’s ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and 3,000,000 users of our desktop security products.
For additional information on Comodo – Creating Trust Online® visit Comodo.com
For more information, reporters and analysts may contact:
Comodo
Email: media-relations@comodo.com
Office: +1 (888) 266-6361