- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
-
Impenetrable cybersecurity without sacrificing usability
-
Gain detailed visibility into all your endpoints activities
-
Reduce the attack surface to remediate and patch
-
Fortify mobile devices that exit and enter your network
-
Keep endpoints safe from known threat signatures
-
Setup device network and security policies quickly
TECHNOLOGY & PROCESS-
Patented to ensure absolute isolation from threats
-
Insights from deep web and dark web to eliminate risk
-
Our pioneered approach has shifted the industry
-
100% trust an all files at lightning speeds
-
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
-
Retain experts to investigate an incident to start remediation
-
Our experts closely monitor changes to your environment 24x7x365
-
Cybersecurity experts will continuously hunt suspicious endpoint activity
SUPPORT, DEPLOY, MAINTAIN-
Ensure your installations are properly deployed
-
Trouble with maintaining your products? Get help now
-
Align your success with optimal security performance
-
- Tools
- For HomeFOR HOMEWEB BROWSERBROWSER ADD-ONS & EXTENSIONS
- Partners
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.KNOWLEDGE BASETHREAT LABS
- Company
MANUFACTURER RELIES ON COMODO’S CONTAINMENT TECHNOLOGY AND PROFESSIONAL SERVICES TO KEEP INFRASTRUCTURE SECURE
INDUSTRIES LARGE AND SMALL NEED SECURE IT ENVIRONMENTS
In today’s environment of inter-connected devices and online access, the rising use of technology has made the ability to share and exchange information quicker and easier – but also riskie
Mid-South Steel Products, Inc., based in Missouri, has been manufacturing, installing and servicing large fuel tanks and petroleum equipment requirements for the purpose of selling refined fuels, for more than 50 years. Located near the Mississippi River, Mid-South Steel has more than 50 employees and services customers with a complete line of above-ground and underground steel storage tanks across the United States
Across Mid-South Steel’s IT environment, the company manages all of its global purchase orders and payment information. The IT network is set up to allow employees in the field to access permits and installation records, product specifications, diagrams and blueprints.
Internally, the employees of Mid-South Steel rely on the technology and databases to access payroll, employment records and well as the housing of the company’s intellectual property and patents from its various endpoint.
“We have a very small IT department, so we need to look at technology that is easy to implement and has a streamlined management function – but the same time does not sacrifice any security layers or features,” said Sonny Underwood, IT Director, Mid-South Steel Products, Inc. “We had Symantec installed to help us try and control our malware – but the system was tough to manage and keep up to date, and we felt somewhat vulnerable. We needed to find a new security partner who could work with us and protect us from all the IT threats out there today.
Traditional antivirus relies on the known “blacklist” (bad files) to be able to respond and identify to threats. That’s part of the challenge that Mid- South Steel was going through. Legacy antivirus systems simply cannot cope with the volume and sophistication of today’s threats
Mid-South Steel had been using Comodo Digital Certificates for the past year and engaged Comodo and the service team about its endpoint protection and containment technology.
CONTAINING MID-SOUTH STEEL FROM OUTSIDE THREATS
Comodo’s threat containment solutions provide total protection against any zero-day threats while having no impact on the end-user experience or workflows. Any untrusted processes and applications are automatically isolated in a secure environment, allowing safe applications the freedom to run while denying malware the system access they require to deliver their payloads. Comodo’s patent-pending automatic containment technolo eliminates malware outbreaks and operating system contamination by automatically running untrusted processes in a secure, environment on the user’s PC
The Comodo Endpoint Security Management software suite brings five layers of defense (antivirus, firewall, host intrusion prevention, automatic containment and file reputation) right to the point of impact—the desktop environment.
Comodo’s real-time automatic containment technology, which is part of Comodo ESM, eliminates malware outbreaks and operating system contamination by automatically running untrusted processes in an isolated environment. The Mid-South Steel IT team can also define operational thresholds for CPU usage, RAM usage, network usage and available storage
The IT team at Mid-South Steel uses the Comodo ESM dashboard for panoramic insight and to control all aspects of endpoint protection and management across all of its endpoints. The interface displays 14 critical metrics about each of Mid-South Steel endpoints, facilitating rapid alerting and remediation of issues – keeping the data housed on the network secure and safe.
“For the past year, Comodo ESM has contained our network from the possibility of any known or unknown threats from penetrating our IT environment. It keeps our critical information intact and protects us from malware and spyware – with no interruption to any of our users,” said Underwood. “In addition, the service and support we have received from Comodo has been the very best we could ask for. If we ever have a question or issue, we simply give them a call and they treat us like we are their very best customer. Comodo is the perfect security partner for us because they deliver a first rate endpoint security and containment product coupled with the support and back-up. Together, these aspects keep our data secure and keep us worry free
SUMMARY
For IT administrators, as well as CIOs and CISOs who need to prevent data breaches, Comodo endpoint security is the only solution that offers on-device, real-time containment. Unlike legacy approaches such as blacklisting and sandboxing, Comodo endpoint security uses smart filtering to automatically contain and execute unknown files, without negatively impacting the system performance and the user’s productivity.
ADDITIONAL INFORMATION
Learn more about Mid-South Steel at www.midsouthsteel.com
Get more information on Comodo endpoint security solutions and other leading Comodo enterprise security tech – nologies by contacting EnterpriseSolutions@comodo.com
About Comodo
The Comodo organization is a global innovator and developer of cyber security solutions, founded on the belief that every single digital transaction deserves and requires a unique layer of trust and security. Building on its deep history in SSL certificates, antivirus and endpoint security leadership, and true containment technology, individuals and enterprises rely on Comodo’s proven solutions to authenticate, validate and secure their most critical information. With data protection covering endpoint, network and mobile security, plus identity and access management, Comodo’s proprietary technologies help solve the malware and cyber-attack challenges of today. Securing online transactions for thousands of businesses, and with more than 85 million desktop security software installations, Comodo is Creating Trust Online®. With United States headquarters in Clifton, New Jersey, the Comodo organization has offices in China, India, the Philippines, Romania, Turkey, Ukraine and the United Kingdom.
For more information, visit www.comodo.com
Comodo and the Comodo brand ar e trademarks of the Comodo Gr oup Inc. or its affiliates in the U.S. and other countries. Other n ames may be trademarks of their respective owners. The current list of Comodo trademarks a nd patents is available at comodo.com/repository Copyright © 2015 Comodo. All rights reserved.