Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

2/28/2013
06:59 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Comodo Introduces Endpoint Security Solution

Panoramic display technology lets IT managers see endpoints' 12 critical metrics in one view

Clifton, N.J., Feb. 27, 2013 /PRNewswire/ -- Comodo, a leading internet security provider, announces their latest solution for centralized administration of security, including anti-virus protection of endpoints. Comodo Endpoint Security Manager 3.0 (ESM 3.0) sets the tone for powerful security management with its easy to manage user interface.

Combining a very short learning curve, the management of Comodo's award winning Endpoint Security suite and day-to-day information required to maximize and maintain user productivity, Endpoint Security Manager now offers a more powerful and intuitive platform for the business network. The patent pending innovative panoramic technology display allows IT Managers to view all endpoints, such as a desktop computer, laptop, mobile device or printer, quickly and on one screen. This feature of ESM 3.0 allows the manager to sweep left or right as well as zoom in and out over the virtual landscape of their endpoint estate. With Windows 8® compatibility, Comodo ESM 3.0 puts important information right at the IT Manager's fingertips, literally, with the convenience of a touch screen interface.

Our new 'info tiles' interface means problem endpoints can be identified quickly and efficiently. Each endpoint is represented in its own info-tile consisting of fully customizable policies and metrics, such as power management and USB device control that can be further examined to allow an administrator to make swift and accurate decisions. With just one click, the administrator is able to view or stop services and processes as well as browse and uninstall applications.

"Comodo is well-known for its ability to introduce internet security with a unique approach to protecting users. Defense+ Host Intrusion Protection Software (HIPS) goes beyond traditional HIPS to stop viruses and malware before they enter endpoints," said Melih Abdulhayoglu, CEO of Comodo. "You wouldn't open the door of your home to a complete stranger, so why do that with your endpoints."

ESM 3.0 requires minimal system resources allowing installation on non-dedicated Windows® PCs or servers. Browser based consoles gives administrators the flexibility of monitoring endpoints from anywhere at anytime.

Additionally, protection of endpoints is further extended using Comodo's Default Deny Protection which leverages the most reliable 'whitelist' of verified applications and vendors to automatically decide if an application is allowed to run on your network or not without interruption of the network.

Comodo ESM 3.0 incorporates 'Defense in Depth' to the desktop environment. It features blacklist based detection, the industry recognized Comodo Firewall, the behavioral analysis engine of the Defense+Host Intrusion Prevention System (HIPS) which filters unknown or malicious programs allowing only known-good programs to run along with the unique Auto-Sandbox which defends systems from potentially malicious files. Comodo offers you the most comprehensive solution to locking down and managing your endpoints.

For more information on Comodo's complete line of internet security products, visit www.comodo.com

About Comodo

Comodo is a leading internet security provider. With U.S. Headquarters in New Jersey and global resources in UK, China, India, Ukraine, and Romania, Comodo provides businesses and consumers worldwide with security services, including SSL certificates, PCI scanning, desktop security, and remote PC support. Securing online transactions for more than 200,000 businesses, and with more than 35 million desktop security software installations, including an award-winning firewall and antivirus software, Comodo is Creating Trust Online®. To learn more, visit Comodo's website: Comodo.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19010
PUBLISHED: 2019-11-16
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.
CVE-2019-16761
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the [email protected] npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. All versions >1.0...
CVE-2019-16762
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. Affected users can upgrade to any...
CVE-2019-13581
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A heap-based buffer overflow allows remote attackers to cause a denial of service or execute arbitrary ...
CVE-2019-13582
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A stack overflow could lead to denial of service or arbitrary code execution.