Advanced Endpoint Protection Datasheet

Transcription

A D VA N C E D E N D P O I N T P R O T E C T I O ND ATA S H E E TPROVEN SUCCESS IN PREVENTING BREACHES

A D VA N C E D E N D P O I N T P R O T E C T I O ND ATA S H E E TTA B L E O F C O N T E N T SThe Solution and The Results3Key Capabilities4Minimum Hardware Requirements5Windows Operating Systems Supported6Android Operating Systems Supported6iOS and macOS Operating Systems Supported6Contacting Support7About Comodo8PROVEN SUCCESS IN PREVENTING BREACHES

A D VA N C E D E N D P O I N T P R O T E C T I O ND ATA S H E E TTHE SOLUTIONT H E R E S U LT S1 0 0 % Tr u s t Ve r d i c t o f e v e r y u n k n o w n fi l eEliminate the damage from unknown threatsComododeliversGood files can be safely run. Bad files can be blocked. But how do youpatent-pending auto-containment, where unknown executablesdeal with unknown files? If you run them and they’re bad, you’ve putand other files that request runtime privileges are automatically runyour company at risk. If you block them and they’re legit, you preventin a virtual container that does not have access to the host system’susers from doing their jobs.AdvancedEndpointProtection(AEP)resources or user data. They run just as well as they would on thehost system, making it seamless from the end-user perspective, butthey cannot damage or infect the native system.While running in auto-containment, unknown files are uploaded to aglobal threat cloud for real-time analysis, which returns a verdictwithin 45 seconds for 95% of the files submitted. The remaining 5%of cases are sent to researchers for human analysis who make adetermination within SLA timelines. In short, Comodo AEP providesa 100% verdict 100% of the time. And because the global threat cloudis crowdsourced, the knowledge gained about one unknown filebenefits all Comodo AEP users. You benefit from the network effectof 85 million users. The extremely lightweight Comodo client has no“Comodo AEP offers the broadest arrayof tools to identify known good andknown bad files. For all the unknown,our auto-containment technology andverdict decision engine deliver averdict—good or bad—every time, withzero impact on the user experience.GARTNER PEER INSIGHTS, CUSTOMER REVIEW ENDPOINT PROTECTION”CPU dependencies and is completely application-agnostic.PROVEN SUCCESS IN PREVENTING BREACHES

A D VA N C E D E N D P O I N T P R O T E C T I O ND ATA S H E E TKEY CAPABILITIESAuto ContainmentComodo AntivirusCloud-based Online PlatformUnknown executables and other files that requestScans endpoints against a massive list of known goodAutomaticruntime privileges are automatically run in Comodo’sand bad files compiled from years as the world’sdeployment across your entire environment to lowerpatented virtual container that does not have accesslargest certificate authority and from the 85 millionoperational costs delivering reliable, centralized andto the host system’s resources or user data.endpoints deployed worldwide.fully scalable security solutions for today's business.24x7 H u m a n A n a l ys i sVirusScope Behavioral AnalysisVa l k y r i e Ve rd i c t D e c i s i o n E n g i n eIn the 5% of cases where VirusScope and Valkyrie areUses techniques such as API hooking, DLL injectionWhile running in auto-containment, unknown files areunable to return a verdict, the file can be sent toprevention, and more to identify indicators ofuploaded to a global threat cloud for real-timeresearchers for human analysis who make acompromise while keeping the endpoint safe andanalysis, returning a verdict within 45 seconds fordetermination within SLA timelines.without affecting usability.95% of the files submitted.Fileless Malware ProtectionHost Intrusion PreventionPersonal Packet Filtering FirewallNot all malware is made equal. Some malware do notRules-based HIPS that monitors application activitiesProvides granular management of inbound andneed you to execute a file, it built-in the endpoint’sand system processes, blocking those that areoutbound network activities, hides system ports frommemory-based artifact such as RAM. Comodo AEPmalicious by halting actions that could damagescans, and provides warnings when suspiciouscompletely stops write access against this threat.critical system components.activities are detected.signatureupdatesthatsimplifiesPROVEN SUCCESS IN PREVENTING BREACHES

A D VA N C E D E N D P O I N T P R O T E C T I O ND ATA S H E E TM I N I M U M H A R D WA R E R E Q U I R E M E N T SComodo provides technical support to customers who encounterissues with using and maintaining any of Comodo’s products,including, but not limited to Advanced Endpoint Protection (AEP),Endpoint Manager (EM), Dome Products (such as Shield, SWG,ASG and DLP) and most other Comodo offerings.MemoryStorageProcessorBrowser384MB of210MB HDD forCPU withInternet Exploreravailable RAM32-bit version orSSE2 Support5.1 or above64-bit version(Streaming SIMDExtensions 2)PROVEN SUCCESS IN PREVENTING BREACHES

A D VA N C E D E N D P O I N T P R O T E C T I O ND ATA S H E E TO P E R AT I N G S Y S T E M S S U P P O R T E DWINDOWS SERVER 2003 SP2WINDOWS SERVER 2003 R2 SP2WINDOWS SERVER 2008 SP2WINDOWS SERVER 2008 R2WINDOWS XP(SP3 OR HIGHER) X86WINDOWS 7 SP1 X86WINDOWS 7 SP1 X64WINDOWS 8 X8610.11.X EL CAPITAN7.X4.X KITKATGUARANTEED COMPATIBILITY:10.12.X SIERRA8.X4.X (KNOX) KITKATLATEST UBUNTU 16.Х LTS X64RELEASE VERSION (WITH GUI)10.13.X HIGH SIERRA9.X5.X LOLLIPOP10.14.X MOJAVE10.X5.X (KNOX) LOLLIPOPLATEST UBUNTU 18.Х LTS X64RELEASE VERSION (WITH GUI)6.X (KNOX) MARSHMALLOWLATEST DEBIAN 8.Х X64RELEASE VERSION (WITH GUI)7.X NOUGATLATEST RED HAT ENTERPRISE7.X (KNOX) NOUGATLINUX SERVER 7.Х X64RELEASE VERSION (WITH GUI)WINDOWS SERVER 2012WINDOWS 8 X6411.XWINDOWS SERVER 2012 R2WINDOWS 8.1 X8612.XWINDOWS SERVER 2016WINDOWS 8.1 X64WINDOWS SERVER 2019WINDOWS 10 X86WINDOWS 10 X648.X OREO8.X (KNOX) OREO9.X PIELATEST CENTOS 7.Х X64RELEASE VERSION (WITH GUI)UNCONFIRMED COMPATIBILITY:UBUNTU, DEBIAN BASED:MINT, ELEMENTARY OS, MX LINUX,ZORIN, KALI, ANTIX, LINUX LITE,ENDLESS OS, KDE NEON, LUBUNTU,PEPPERMINT OS, UBUNTU MATE,DEEPIN, SPARKYLINUX, XUBUNTU,TAILS, DEVUAN GNU LINUX, Q4OS,PARROT SECURITY OS, LXLE,KUBUNTU, BODHI LINUX, FEREN OSPROVEN SUCCESS IN PREVENTING BREACHES

A D VA N C E D E N D P O I N T P R O T E C T I O ND ATA S H E E TSUPPORT BUSINESS HOURSC O N TA C T I N G S U P P O R TOur customer support has you coveredChoose one of these 3 optionsOur Level 1 and Level 2 Support Teams are available 24x7to assist our customers’ needs, no matter where they arelocated. Should your issue require escalation, we haveour Level 3 Support Team, as well as development teams,available to assist.Level 1Level 2Level 324 HRS24 HRS18 HRSALL WEEKALL WEEKW E E K DAYS123SUBMIT A TICKETsupport.comodo.comCALL US DIRECT973-396-1232SEND AN EMAILsupport@comodo.comOpening a ticket on our portal or sending an email toSupport will result in a ticket being generatedimmediately.You will be notified of this ticketcreation through the email address used. A Supportrepresentative will reach out to you within ourdefined SLA (see below). You may also search ourknowledge base or help page for further supportinformation.PROVEN SUCCESS IN PREVENTING BREACHES

A D VA N C E D E N D P O I N T P R O T E C T I O NA B O U T C O M O D OIn a world where preventing all cyberattacks isimpossible, Comodo provides Active Breach Protectionwith its cloud-delivered cybersecurity platform.TheComodo Dragon Platform provides a zero trust securityenvironment that verdicts 100% of unknown files. TheD ATA S H E E TACTIVE BREACH PROTECTION PREVENTS DAMAGEWITH THE INDUSTRY’S LEADING ZERO TRUST ARCHITECTUREENABLECYBERSECURITYSOLUTIONS FROMOUR ONE CENTRALPLATFORMPROTECTTHREAT VECTORSWITH OUR ZEROTRUST SECURITYPOSTUREELIMINATE ALERTFATIGUE WITHCLOUD-NATIVEARCHITECTURE &THREAT DETECTIONplatform renders an almost immediate verdict on thestatus of any unknown file, so it can be handledaccordingly by either software or human analysts. ThisD R A G O N P L AT F O R Mshift from reactive to proactive is what makes Comodounique and gives us the capacity to protect your business– from network to web to cloud – with confidence andENDPOINT SECURITYENDPOINT DETECTION & RESPONSESECURE APPLICATION PROTECTIONADVANCED ENDPOINT PROTECTIONMANAGED DETECTION & RESPONSENETWORK SECURITYGLOBAL THREAT INTELLIGENCENETWORK DETECTION & RESPONSESECURE DNS FILTERINGSECURE WEB GATEWAY24HR SECURITY OPERATIONS CENTERSECURE EMAIL GATEWAYefficacy.Comodo has experts and analysts in 185 countries,ENDPOINT SECURITYMANAGED DETECTION & RESPONSENETWORK SECURITYprotecting 100 million endpoints and serving 200,000customers globally. Based in Bloomfield, New Jersey,Comodo has a 20-year history of protecting the mostsensitive data for both businesses and consumersworldwide.COMODO CORPORATE HEADQUARTERS200 Broadacres Drive, Bloomfield NJ 07003 USAExperienced a breach? Contact us at (888) 551-1531Visit comodo.com for your free 30 day trialPROVEN SUCCESS IN PREVENTING BREACHES

gartner peer insights, customer review endpoint protection. proven success in preventing breaches advanced endpoint protection datasheet . secure email gateway global threat intelligence 24hr security operations center network detection & response active breach protection prevents damage