Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

2/28/2013
06:59 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Comodo Introduces Endpoint Security Solution

Panoramic display technology lets IT managers see endpoints' 12 critical metrics in one view

Clifton, N.J., Feb. 27, 2013 /PRNewswire/ -- Comodo, a leading internet security provider, announces their latest solution for centralized administration of security, including anti-virus protection of endpoints. Comodo Endpoint Security Manager 3.0 (ESM 3.0) sets the tone for powerful security management with its easy to manage user interface.

Combining a very short learning curve, the management of Comodo's award winning Endpoint Security suite and day-to-day information required to maximize and maintain user productivity, Endpoint Security Manager now offers a more powerful and intuitive platform for the business network. The patent pending innovative panoramic technology display allows IT Managers to view all endpoints, such as a desktop computer, laptop, mobile device or printer, quickly and on one screen. This feature of ESM 3.0 allows the manager to sweep left or right as well as zoom in and out over the virtual landscape of their endpoint estate. With Windows 8® compatibility, Comodo ESM 3.0 puts important information right at the IT Manager's fingertips, literally, with the convenience of a touch screen interface.

Our new 'info tiles' interface means problem endpoints can be identified quickly and efficiently. Each endpoint is represented in its own info-tile consisting of fully customizable policies and metrics, such as power management and USB device control that can be further examined to allow an administrator to make swift and accurate decisions. With just one click, the administrator is able to view or stop services and processes as well as browse and uninstall applications.

"Comodo is well-known for its ability to introduce internet security with a unique approach to protecting users. Defense+ Host Intrusion Protection Software (HIPS) goes beyond traditional HIPS to stop viruses and malware before they enter endpoints," said Melih Abdulhayoglu, CEO of Comodo. "You wouldn't open the door of your home to a complete stranger, so why do that with your endpoints."

ESM 3.0 requires minimal system resources allowing installation on non-dedicated Windows® PCs or servers. Browser based consoles gives administrators the flexibility of monitoring endpoints from anywhere at anytime.

Additionally, protection of endpoints is further extended using Comodo's Default Deny Protection which leverages the most reliable 'whitelist' of verified applications and vendors to automatically decide if an application is allowed to run on your network or not without interruption of the network.

Comodo ESM 3.0 incorporates 'Defense in Depth' to the desktop environment. It features blacklist based detection, the industry recognized Comodo Firewall, the behavioral analysis engine of the Defense+Host Intrusion Prevention System (HIPS) which filters unknown or malicious programs allowing only known-good programs to run along with the unique Auto-Sandbox which defends systems from potentially malicious files. Comodo offers you the most comprehensive solution to locking down and managing your endpoints.

For more information on Comodo's complete line of internet security products, visit www.comodo.com

About Comodo

Comodo is a leading internet security provider. With U.S. Headquarters in New Jersey and global resources in UK, China, India, Ukraine, and Romania, Comodo provides businesses and consumers worldwide with security services, including SSL certificates, PCI scanning, desktop security, and remote PC support. Securing online transactions for more than 200,000 businesses, and with more than 35 million desktop security software installations, including an award-winning firewall and antivirus software, Comodo is Creating Trust Online®. To learn more, visit Comodo's website: Comodo.com.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/17/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8225
PUBLISHED: 2020-09-18
A cleartext storage of sensitive information in Nextcloud Desktop Client 2.6.4 gave away information about used proxies and their authentication credentials.
CVE-2020-8237
PUBLISHED: 2020-09-18
Prototype pollution in json-bigint npm package < 1.0.0 may lead to a denial-of-service (DoS) attack.
CVE-2020-8245
PUBLISHED: 2020-09-18
Improper Input Validation on Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11....
CVE-2020-8246
PUBLISHED: 2020-09-18
Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-W...
CVE-2020-8247
PUBLISHED: 2020-09-18
Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-W...