|By Marketwired .||
|July 23, 2014 07:00 AM EDT||
CLIFTON, NJ -- (Marketwired) -- 07/23/14 -- Comodo, a leading Certificate Authority and Internet security provider, today announced the availability of Comodo SecureBox, a secure desktop application that enables users to safely interact with mission-critical applications on malware-infected devices, such as company computers, Point-of-Sale (POS) systems and ATMs, among others. Built on Comodo's highly robust application containment technology, Comodo SecureBox is part of Comodo's suite of leading enterprise security solutions.
Hackers and cybercriminals are constantly targeting end users through phishing and other attacks that use sophisticated malware to gain deeper access to sensitive data and corporate networks. Closing the gap left by traditional endpoint security solutions and anti-virus technologies, Comodo SecureBox protects users against these threats -- such as keylogging, SSL sniffing, remote screen viewing, memory scraping, man-in-the-browser/middle attacks, zero-day malware, fund transfer fraud, data exfiltration and others -- by providing a layer of protection that ensures certain activities are secured.
"SecureBox is particularly well-suited for businesses who need to ensure the security of third-party endpoints that are beyond the control of their IT organization," said Kevin Gilchrist, Comodo Vice President of Product Management. "Financial services companies, healthcare or health insurance companies, or any company that has a large supply chain where the supplier represents a possible vector for malware would benefit from SecureBox."
Unlike existing endpoint security solutions that seek to protect the device, Comodo SecureBox is designed to protect and run only trusted applications and assumes that the host environment is hostile or malware-infected. This unique approach to containerization differs from traditional containment solutions that seek to sandbox only malicious or untrusted applications.
Comodo SecureBox includes the following features:
- Application Containerization: Secures mission critical data in-transit by creating an exclusive, threat resistant tunnel between clients and webservers, allowing companies to ensure customers connect to their services in a secure manner.
- Keylogger Protection: Using keyboard virtualization technology, Comodo SecureBox intercepts keystrokes from the keyboard filter driver and encrypts the information, sending it directly to the target window in a customized message. This process bypasses the entire Windows® input subsystem, ensuring that nothing can capture SecureBox-protected keystrokes.
- Remote Takeover Protection: With Comodo's application-agnostic screen capture detection technology, Comodo SecureBox defeats remote desktop takeover by intercepting the attempt and switching from the default screen to an isolated desktop screen that displays warning messages, prohibiting the hacker from viewing anything on a users desktop.
- Anti-SSL Sniffing: Comodo SecureBox detects malicious SSL connections and SSL sniffing by intercepting and verifying certificates using Comodo's trusted root certificate list, effectively preventing man-in-the-middle attacks.
- Anti-Memory Scrapping: Comodo SecureBox prevents memory scraping by prohibiting external applications from accessing the memory of containerized applications.
- Active Virus Removal: Before the application opens, Comodo SecureBox performs a rapid cloud-based scan to detect and terminate all active viruses on the host device. The results of the virus scan are sent to Enterprise administrators for robust reporting purposes.
Comodo SecureBox can be custom-built as a company-branded application for unique security needs and specifically tailored for end users.
Comodo SecureBox is part of Comodo's portfolio of products that provide businesses and consumers with the intelligent security, authentication and assurance services necessary to establish and ensure trust in online transactions.
For more information, visit securebox.comodo.com.
Comodo is a leading internet security provider. With U.S. Headquarters in New Jersey and global resources in UK, China, India, Ukraine, and Romania, Comodo provides businesses and consumers worldwide with security services, including SSL Certificate, PCI scanning, desktop security, and remote PC support. Securing online transactions for more than 600,000 businesses, and with more than 75 million desktop security software installations, including an award-winning firewall and antivirus software, Comodo is Creating Trust Online®. To learn more, visit Comodo.com
"We've just seen a huge influx of new partners coming into our ecosystem, and partners building unique offerings on top of our API set," explained Seth Bostock, Chief Executive Officer at IndependenceIT, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Aug. 1, 2015 09:00 PM EDT Reads: 656
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
Aug. 1, 2015 06:30 PM EDT Reads: 152
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
Aug. 1, 2015 04:45 PM EDT Reads: 481
For IoT to grow as quickly as analyst firms’ project, a lot is going to fall on developers to quickly bring applications to market. But the lack of a standard development platform threatens to slow growth and make application development more time consuming and costly, much like we’ve seen in the mobile space. In his session at @ThingsExpo, Mike Weiner, Product Manager of the Omega DevCloud with KORE Telematics Inc., discussed the evolving requirements for developers as IoT matures and conducte...
Aug. 1, 2015 03:15 PM EDT Reads: 325
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
Aug. 1, 2015 03:00 PM EDT Reads: 517
With SaaS use rampant across organizations, how can IT departments track company data and maintain security? More and more departments are commissioning their own solutions and bypassing IT. A cloud environment is amorphous and powerful, allowing you to set up solutions for all of your user needs: document sharing and collaboration, mobile access, e-mail, even industry-specific applications. In his session at 16th Cloud Expo, Shawn Mills, President and a founder of Green House Data, discussed h...
Aug. 1, 2015 02:45 PM EDT Reads: 452
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
Aug. 1, 2015 11:15 AM EDT Reads: 178
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
Aug. 1, 2015 10:30 AM EDT Reads: 214
The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before – transforming information into knowledge and knowledge into wisdom. IoE creates new capabilities, richer experiences, and unprecedented opportunities to improve business and government operations, decision making and mission support capabilities.
Aug. 1, 2015 10:00 AM EDT Reads: 293
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. In his session at 15th Cloud Expo, Michael Meiner, an Engineering Director at Oracle, Corporation, analyzed a range of cloud offerings (IaaS, PaaS, SaaS) and discussed the benefits/challenges of migrating to each offe...
Aug. 1, 2015 09:45 AM EDT Reads: 138
Puppet Labs has announced the next major update to its flagship product: Puppet Enterprise 2015.2. This release includes new features providing DevOps teams with clarity, simplicity and additional management capabilities, including an all-new user interface, an interactive graph for visualizing infrastructure code, a new unified agent and broader infrastructure support.
Aug. 1, 2015 09:45 AM EDT Reads: 189
Chuck Piluso presented a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Prior to Secure Infrastructure and Services, Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of International Te...
Aug. 1, 2015 09:45 AM EDT Reads: 393
SYS-CON Events announced today that MobiDev, a software development company, will exhibit at the 17th International Cloud Expo®, which will take place November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software development company with representative offices in Atlanta (US), Sheffield (UK) and Würzburg (Germany); and development centers in Ukraine. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobi...
Aug. 1, 2015 08:00 AM EDT Reads: 308
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
Aug. 1, 2015 08:00 AM EDT Reads: 1,689
Learn how to solve the problem of keeping files in sync between multiple Docker containers. In his session at 16th Cloud Expo, Aaron Brongersma, Senior Infrastructure Engineer at Modulus, discussed using rsync, GlusterFS, EBS and Bit Torrent Sync. He broke down the tools that are needed to help create a seamless user experience. In the end, can we have an environment where we can easily move Docker containers, servers, and volumes without impacting our applications? He shared his results so yo...
Jul. 31, 2015 11:45 PM EDT Reads: 789