Welcome!

News Feed Item

Comodo Introduces Industry Changing Endpoint Security Solution

Patent Pending Panoramic display technology lets IT Managers see endpoints' 12 critical metrics in one view

Clifton, N.J., Feb. 27, 2013 /PRNewswire/ -- Comodo, a leading internet security provider, announces their latest solution for centralized administration of security, including anti-virus protection of endpoints.  Comodo Endpoint Security Manager 3.0 (ESM 3.0) sets the tone for powerful security management with its easy to manage user interface.

Combining a very short learning curve, the management of Comodo's award winning Endpoint Security suite and day-to-day information required to maximize and maintain user productivity, Endpoint Security Manager now offers a more powerful and intuitive platform for the business network.  The patent pending innovative panoramic technology display allows IT Managers to view all endpoints, such as a desktop computer, laptop, mobile device or printer, quickly and on one screen.  This feature of ESM 3.0  allows the manager to sweep left or right  as well as zoom in and out over  the virtual landscape of their endpoint estate.  With Windows 8® compatibility, Comodo ESM 3.0 puts important information right at the IT Manager's fingertips, literally, with the convenience of a touch screen interface. 

Our new 'info tiles' interface means problem endpoints can be identified quickly and efficiently.  Each endpoint is represented in its own info-tile consisting of fully customizable policies and metrics, such as power management and USB device control that can be further examined to allow an administrator to make swift and accurate decisions.  With just one click, the administrator is able to view or stop services and processes as well as browse and uninstall applications.

"Comodo is well-known for its ability to introduce internet security with a unique approach to protecting users.  Defense+ Host Intrusion Protection Software (HIPS) goes beyond traditional HIPS to stop viruses and malware before they enter endpoints," said Melih Abdulhayoglu, CEO of Comodo. "You wouldn't open the door of your home to a complete stranger, so why do that with your endpoints."

ESM 3.0 requires minimal system resources allowing installation on non-dedicated Windows® PCs or servers.  Browser based consoles gives administrators the flexibility of monitoring endpoints from anywhere at anytime.

Additionally, protection of endpoints is further extended using Comodo's Default Deny Protection which leverages the most reliable 'whitelist' of verified applications and vendors to automatically decide if an application is allowed to run on your network or not without interruption of the network.

Comodo ESM 3.0 incorporates 'Defense in Depth' to the desktop environment.  It features blacklist based detection, the industry recognized Comodo Firewall, the behavioral analysis engine of the Defense+Host Intrusion Prevention System (HIPS) which  filters unknown or malicious programs allowing only known-good programs to run along with  the unique Auto-Sandbox which defends systems from potentially malicious files. Comodo offers you the most comprehensive solution to locking down and managing your endpoints.

For more information on Comodo's complete line of internet security products, visit www.comodo.com

About Comodo

Comodo is a leading internet security provider. With U.S. Headquarters in New Jersey and global resources in UK, China, India, Ukraine, and Romania, Comodo provides businesses and consumers worldwide with security services, including SSL certificates, PCI scanning, desktop security, and remote PC support. Securing online transactions for more than 200,000 businesses, and with more than 35 million desktop security software installations, including an award-winning firewall and antivirus software, Comodo is Creating Trust Online®. To learn more, visit Comodo's website: Comodo.com.

Windows® is a registered trademark of Microsoft Corporation in the United States and other countries.

SOURCE Comodo

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"This week we're really focusing on scalability, asset preservation and how do you back up to the cloud and in the cloud with object storage, which is really a new way of attacking dealing with your file, your blocked data, where you put it and how you access it," stated Jeff Greenwald, Senior Director of Market Development at HGST, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
FinTechs use the cloud to operate at the speed and scale of digital financial activity, but are often hindered by the complexity of managing security and compliance in the cloud. In his session at 20th Cloud Expo, Sesh Murthy, co-founder and CTO of Cloud Raxak, showed how proactive and automated cloud security enables FinTechs to leverage the cloud to achieve their business goals. Through business-driven cloud security, FinTechs can speed time-to-market, diminish risk and costs, maintain continu...
Docker containers have brought great opportunities to shorten the deployment process through continuous integration and the delivery of applications and microservices. This applies equally to enterprise data centers as well as the cloud. In his session at 20th Cloud Expo, Jari Kolehmainen, founder and CTO of Kontena, discussed solutions and benefits of a deeply integrated deployment pipeline using technologies such as container management platforms, Docker containers, and the drone.io Cl tool. H...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
Amazon started as an online bookseller 20 years ago. Since then, it has evolved into a technology juggernaut that has disrupted multiple markets and industries and touches many aspects of our lives. It is a relentless technology and business model innovator driving disruption throughout numerous ecosystems. Amazon’s AWS revenues alone are approaching $16B a year making it one of the largest IT companies in the world. With dominant offerings in Cloud, IoT, eCommerce, Big Data, AI, Digital Assista...
"We work around really protecting the confidentiality of information, and by doing so we've developed implementations of encryption through a patented process that is known as superencipherment," explained Richard Blech, CEO of Secure Channels Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at Cloud Expo, Alan Winters, U.S. Head of Business Development at MobiDev, presented a success story of an entrepreneur who has both suffered through and benefited from offshore development across multiple businesses: The smart choice, or how to select the right offshore development partner Warning signs, or how to minimize chances of making the wrong choice Collaboration, or how to establish the most effective work processes Budget control, or how to maximize project result...
The Founder of NostaLab and a member of the Google Health Advisory Board, John is a unique combination of strategic thinker, marketer and entrepreneur. His career was built on the "science of advertising" combining strategy, creativity and marketing for industry-leading results. Combined with his ability to communicate complicated scientific concepts in a way that consumers and scientists alike can appreciate, John is a sought-after speaker for conferences on the forefront of healthcare science,...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abilit...