- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
-
Impenetrable cybersecurity without sacrificing usability
-
Gain detailed visibility into all your endpoints activities
-
Reduce the attack surface to remediate and patch
-
Fortify mobile devices that exit and enter your network
-
Keep endpoints safe from known threat signatures
-
Setup device network and security policies quickly
TECHNOLOGY & PROCESS-
Patented to ensure absolute isolation from threats
-
Insights from deep web and dark web to eliminate risk
-
Our pioneered approach has shifted the industry
-
100% trust an all files at lightning speeds
-
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
-
Retain experts to investigate an incident to start remediation
-
Our experts closely monitor changes to your environment 24x7x365
-
Cybersecurity experts will continuously hunt suspicious endpoint activity
SUPPORT, DEPLOY, MAINTAIN-
Ensure your installations are properly deployed
-
Trouble with maintaining your products? Get help now
-
Align your success with optimal security performance
-
- Tools
- For HomeFOR HOMEWEB BROWSERBROWSER ADD-ONS & EXTENSIONS
- Partners
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.KNOWLEDGE BASETHREAT LABS
- Company
Comodo Backup Encrypts and Safeguards Data, Optimizes File Space with Antivirus Protection
Jersey City, NJ, November 03, 2009 – In October, Sidekick users experienced the acute distress of losing their data files—apparently forever. If corporate networks lose information, their pain is magnified. The number and size of the files lost may be thousands or millions times greater. The loss may even kill the patient, shutting down a business permanently. Comodo Backup 2.1 protects against data loss crises by taking real-time backups of user data, with more flexibility and control than ever, and still for free.
New features in Comodo Backup include step-by-step wizards to guide even novice users through the entire backup, restore and scheduling procedures, and real-time backups. The synchronization feature creates real-time backups by copying files over as soon as they are modified.
Granular scheduling options enable administrators to take automatic backups to suit demanding schedules.
Comodo Backup 2.1 also includes resource management options that allow the user to run backups when the computer is idle or at a certain interval after startup – meaning the program will not contribute to the usual process jam that occurs immediately after a user logs on.
To be sure that the information once backed up is inaccessible to unauthorized personnel, powerful encryption options protect data.
Live system data is always at risk, mostly from power outages and user error. Should the backed-up data be needed, Comodo Backup’s built in integrity checker verifies the integrity of backup files before committing to a restore, and Comodo Backup allows the user to search within the image file for a particular file name.
Comodo Backup quickly backs up entire network and virtual drives or individual files or folders to local computers, network drives or FTP server, according to the administrator’s preset configuration. Backup preset instructions include mail folders, Windows registries, messenger archives, and master boot records.
The new release also includes support for scripting and command line operation.
To download a free copy of Comodo Backup, visit download.comodo.com. Comodo Backup can be run and configured with Comodo Endpoint Security, a centrally-managed firewall and Antivirus package. For more information visit Endpoint Security.
About Comodo
The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL, Code Signing, Content Verification and Email Certificate; award winning PC Security software; Vulnerability Scanning services for PCI Compliance; secure e-mail and fax services.
Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet’s ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and 3,000,000 users of our desktop security products.
For additional information on Comodo – Creating Trust Online® visit Comodo.com
For more information, reporters and analysts may contact:
Comodo
Email: media-relations@comodo.com
Office: +1 (888) 266-6361