Click here to close now.

Welcome!

News Feed Item

Comodo Strengthens Endpoint Security Capabilities With Comodo SecureBox

Newest Innovation Enables Users to Safely Interact With Mission-Critical Applications on Malware-Infected Devices, Including PCs, Point-of-Sale Systems and ATMs

CLIFTON, NJ -- (Marketwired) -- 07/23/14 -- Comodo, a leading Certificate Authority and Internet security provider, today announced the availability of Comodo SecureBox, a secure desktop application that enables users to safely interact with mission-critical applications on malware-infected devices, such as company computers, Point-of-Sale (POS) systems and ATMs, among others. Built on Comodo's highly robust application containment technology, Comodo SecureBox is part of Comodo's suite of leading enterprise security solutions.

Hackers and cybercriminals are constantly targeting end users through phishing and other attacks that use sophisticated malware to gain deeper access to sensitive data and corporate networks. Closing the gap left by traditional endpoint security solutions and anti-virus technologies, Comodo SecureBox protects users against these threats -- such as keylogging, SSL sniffing, remote screen viewing, memory scraping, man-in-the-browser/middle attacks, zero-day malware, fund transfer fraud, data exfiltration and others -- by providing a layer of protection that ensures certain activities are secured.

"SecureBox is particularly well-suited for businesses who need to ensure the security of third-party endpoints that are beyond the control of their IT organization," said Kevin Gilchrist, Comodo Vice President of Product Management. "Financial services companies, healthcare or health insurance companies, or any company that has a large supply chain where the supplier represents a possible vector for malware would benefit from SecureBox."

Unlike existing endpoint security solutions that seek to protect the device, Comodo SecureBox is designed to protect and run only trusted applications and assumes that the host environment is hostile or malware-infected. This unique approach to containerization differs from traditional containment solutions that seek to sandbox only malicious or untrusted applications.

Comodo SecureBox includes the following features:

  • Application Containerization: Secures mission critical data in-transit by creating an exclusive, threat resistant tunnel between clients and webservers, allowing companies to ensure customers connect to their services in a secure manner.

  • Keylogger Protection: Using keyboard virtualization technology, Comodo SecureBox intercepts keystrokes from the keyboard filter driver and encrypts the information, sending it directly to the target window in a customized message. This process bypasses the entire Windows® input subsystem, ensuring that nothing can capture SecureBox-protected keystrokes.

  • Remote Takeover Protection: With Comodo's application-agnostic screen capture detection technology, Comodo SecureBox defeats remote desktop takeover by intercepting the attempt and switching from the default screen to an isolated desktop screen that displays warning messages, prohibiting the hacker from viewing anything on a users desktop.

  • Anti-SSL Sniffing: Comodo SecureBox detects malicious SSL connections and SSL sniffing by intercepting and verifying certificates using Comodo's trusted root certificate list, effectively preventing man-in-the-middle attacks.

  • Anti-Memory Scrapping: Comodo SecureBox prevents memory scraping by prohibiting external applications from accessing the memory of containerized applications.

  • Active Virus Removal: Before the application opens, Comodo SecureBox performs a rapid cloud-based scan to detect and terminate all active viruses on the host device. The results of the virus scan are sent to Enterprise administrators for robust reporting purposes.

Comodo SecureBox can be custom-built as a company-branded application for unique security needs and specifically tailored for end users.

Comodo SecureBox is part of Comodo's portfolio of products that provide businesses and consumers with the intelligent security, authentication and assurance services necessary to establish and ensure trust in online transactions.

For more information, visit securebox.comodo.com.

About Comodo

Comodo is a leading internet security provider. With U.S. Headquarters in New Jersey and global resources in UK, China, India, Ukraine, and Romania, Comodo provides businesses and consumers worldwide with security services, including SSL Certificate, PCI scanning, desktop security, and remote PC support. Securing online transactions for more than 600,000 businesses, and with more than 75 million desktop security software installations, including an award-winning firewall and antivirus software, Comodo is Creating Trust Online®. To learn more, visit Comodo.com

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
17th Cloud Expo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises ar...
Internet of Things is moving from being a hype to a reality. Experts estimate that internet connected cars will grow to 152 million, while over 100 million internet connected wireless light bulbs and lamps will be operational by 2020. These and many other intriguing statistics highlight the importance of Internet powered devices and how market penetration is going to multiply many times over in the next few years.
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and application infrastructure. But that’s changing with microservices architectures. In her session at DevOps Summit, Lori MacVittie, Evangelist for F5 Networks, will focus on how microservices are changing the underlying architectures needed to scale, secure and deliver applications based on highly distributed (micro) services and why that means an expansion into “the network” for DevOps.
In his session at 16th Cloud Expo, Simone Brunozzi, VP and Chief Technologist of Cloud Services at VMware, reviewed the changes that the cloud computing industry has gone through over the last five years and shared insights into what the next five will bring. He also chronicled the challenges enterprise companies are facing as they move to the public cloud. He delved into the "Hybrid Cloud" space and explained why every CIO should consider ‘hybrid cloud' as part of their future strategy to achie...
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet condit...
"We got started as search consultants. On the services side of the business we have help organizations save time and save money when they hit issues that everyone more or less hits when their data grows," noted Otis Gospodnetić, Founder of Sematext, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
The basic integration architecture, as defined by ESBs, hasn’t changed for more than a decade. Most cloud integration providers still rely on an ESB architecture and their proprietary connectors. As a result, enterprise integration projects suffer from constraints of availability and reliability of these connectors that are not re-usable across other integration vendors. However, the rapid adoption of APIs and almost ubiquitous availability of APIs amongst most SaaS and Cloud applications are ra...
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult – let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and liv...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at DevOps Summit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
"We have a tagline - "Power in the API Economy." What that means is everything that is built in applications and connected applications is done through APIs," explained Roberto Medrano, Executive Vice President at Akana, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. Remember the venerable project management Iron Triangle? Among time, scope, and cost, you can only fix two or quality will suffer. Only in today's DevOps world, continuous testing, integration, and deployment upend...
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations migh...
WebRTC converts the entire network into a ubiquitous communications cloud thereby connecting anytime, anywhere through any point. In his session at WebRTC Summit,, Mark Castleman, EIR at Bell Labs and Head of Future X Labs, will discuss how the transformational nature of communications is achieved through the democratizing force of WebRTC. WebRTC is doing for voice what HTML did for web content.
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of...
"A lot of the enterprises that have been using our systems for many years are reaching out to the cloud - the public cloud, the private cloud and hybrid," stated Reuven Harrison, CTO and Co-Founder of Tufin, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.