- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
-
Impenetrable cybersecurity without sacrificing usability
-
Gain detailed visibility into all your endpoints activities
-
Reduce the attack surface to remediate and patch
-
Fortify mobile devices that exit and enter your network
-
Keep endpoints safe from known threat signatures
-
Setup device network and security policies quickly
TECHNOLOGY & PROCESS-
Patented to ensure absolute isolation from threats
-
Insights from deep web and dark web to eliminate risk
-
Our pioneered approach has shifted the industry
-
100% trust an all files at lightning speeds
-
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
-
Retain experts to investigate an incident to start remediation
-
Our experts closely monitor changes to your environment 24x7x365
-
Cybersecurity experts will continuously hunt suspicious endpoint activity
SUPPORT, DEPLOY, MAINTAIN-
Ensure your installations are properly deployed
-
Trouble with maintaining your products? Get help now
-
Align your success with optimal security performance
-
- Tools
- For HomeFOR HOMEWEB BROWSERBROWSER ADD-ONS & EXTENSIONS
- Partners
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.KNOWLEDGE BASETHREAT LABS
- Company
ONE OF THE WORLD’S LARGEST CERAMIC MANUFACTURERS RELIES ON STRONG IT PARTNERSHIPS TO PROTECT ITS NETWORK
INDUSTRIES OF ALL TYPES AND ALL SIZES NEED TO SECURE THEIR IT INFRASTRUCUTRE
Globally headquartered in Kleinheubach, Germany, Scheurich GmbH & Co.KG is one of the world’s largest manufacturers of pottery and accessories for plants. Each year, the 350 employees of Scheurich manufacture more than 20 million ceramic products for thousands of customers across the globe.
Across the company’s IT environment, purchase orders, invoices, production schedules, patent information as well as research & development are all shared across hundreds of endpoints via desktop, laptop and mobile devices to ensure timely delivery of products, and give employees the ability to share and exchange information to continuously increase the company’s market share.
“Like any company today that uses IT as a foundational means of sharing and exchanging information, we wanted to make sure our infrastructure was safe and protected from the thousands of pieces of malware that surface each day,” said Joerg Chemii, IT Manager for Scheurich GmbH & Co.KG. “If our system gets hit with any kind of malware, our environment will be crippled. We needed to find a business partner that could come in, take a look at our environment, and help us to implement a secure solution that would fit our demands – as well as our budget.”
STRONG PARTNERSHIP WITH DR. DEUTCH GMBH LED TO THE RIGHT TECHNOLOGY SOLUTION
Dr. Deutch GmbH is one of the leading IT business services and solution providers in Germany – serving customers through high level consulting and support solutions. Since 2005, the company has specialized in IT security consulting, IT forensics, data security consulting and IT project management for customers across the globe.
Scheurich engaged Dr. Deutch GmbH to have them evaluate the IT infrastructure of the company, and specifically focus on endpoint security and ensure Scheurich was protected.
“The cyber threats of today are penetrating IT environments not at the server level, but at the endpoint level,” said Christian Deutsch, Founder and Owner Dr. Deutsch GmbH. “All it takes is one unsuspecting employee to click on an email attachment that turns out to be malware, and then the virus spreads throughout your network. Scheurich engaged with Dr. Deutsch GmbH to make sure the scenario of rogue malware didn’t happen to them.”
AUTOMATIC CONTAINMENT IS THE KEY
Dr. Deutsch GmbH has been working with Comodo for many years, implementing Comodo’s endpoint and containment technologies for a host of companies across Germany. After evaluating the IT environment of Scheurich, Dr. Deutsch GmbH was sure that Comodo was the right choice because of the technology’s ability to protect from both known and unknown threats – and fit within the budget needs of Scheurich.
Dr. Deutsch GmbH engaged with Intellicomp, a leading software provider of third party technology, to purchase the Comodo Advanced Endpoint Protection software suite for Scheurich.
Comodo Advanced Endpoint Protection 3.4 software brings seven layers of defense – antivirus, firewall, web URL filtering, host intrusion prevention, auto-sandbox (containment) and file reputation, and virus scope (behavioral analyzer) – together under a single offering for customers of all sizes, to protect them from both known and unknown threats.
Comodo’s patent-pending automatic containment technology prevents malware outbreaks by automatically running untrusted processes in an isolated environment—never allowing critical, financial and private data to be accessed or compromised by criminal activity.
SPECIFIC NEEDS OF SCHEURICH
With the features of Comodo ESM, Scheurich is able to take advantage of a centralized management console, offsite logging capabilities, and integrated intrusion prevention technology. The Comodo ESM dashboard is used by the IT team at Scheurich to gain panoramic insight and control over all aspects of endpoint protection and management.
Administrators can also terminate endpoint processes, stop or start services, uninstall applications and delete unwanted files—all without causing any interference to the end user.
“We have been thrilled with the partnership with Dr. Deutsch GmbH as well as with Comodo’s endpoint security technology because it protects our IT environment from both known – and unknown threats,” said Joerg Chemii. “Comodo’s containment technology is like a fortress for our IT environment – keeping the bad and unknown files away from our endpoints, while at the same time allowing all of our good files to be fully accessed by our employees and not impacting productivity.”
SUMMARY
Comodo’s real-time automatic threat containment technology, which is a key feature of ESM, eliminates operating system contamination by automatically running untrusted processes in an isolated environment. For IT administrators, as well as CIOs and CISOs who need to prevent data breaches, Comodo endpoint security is the only solution that offers on-device, real-time containment. Unlike legacy approaches such as blacklisting and sandboxing, it uses smart filtering to automatically contain and execute any unknown files, without negatively impacting the system performance and the user’s productivity.
ADDITIONAL INFORMATION
Learn more about Scheurich at: http://www.iwl.de/en/references/consumer-investment-goods/production-finished-goods-logistics-scheurich
Learn more about Dr. Deutsch GmbH at: www.dr-deutsch.de
Get more information on Comodo endpoint security solutions and other leading Comodo enterprise security technologies by contacting EnterpriseSolutions@comodo.com
About Comodo
The Comodo organization is a global innovator and developer of cybersecurity solutions, founded on the belief that every single digital transaction deserves and requires a unique layer of trust and security. Building on its deep history in SSL certificates, antivirus and endpoint security leadership, and true containment technology, individuals and enterprises rely on Comodo’s proven solutions to authenticate, validate and secure their most critical information. With data protection covering endpoint, network and mobile security, plus identity and access management, Comodo’s proprietary technologies help solve the malware and cyber-attack challenges of today. Securing online transactions for thousands of businesses, and with more than 85 million desktop security software installations, Comodo is Creating Trust Online®. With United States headquarters in Clifton, New Jersey, the Comodo organization has offices in China, India, the Philippines, Romania, Turkey, Ukraine and the United Kingdom.
For more information, visit www.comodo.com
Comodo and the Comodo brand are trademarks of the Comodo Group Inc. or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The current list of Comodo trademarks and patents is available at comodo.com/repository
Key Features and Benefits of Comodo Advanced Endpoint Protection:
- Standalone containerization complements and enhances any existing security solution to block unknown files from infecting an endpoint
- A seven layered defense suite (Antivirus, Firewall, Web URL Filtering, Host Intrusion Prevention, Auto Sandbox (Containment) and File Reputation, and Virus Scope (behavioral analyzer) built on Comodo’s Default Deny architecture
- Deep-dive analysis of managed endpoints operation through a single click-and-dashboard view
- Patent-pending containerization technology prevents zero-day malware attacks
- Smart filtering to automatically contain and execute unknown files without negatively impacting system performance or user productivity