SlideShare a Scribd company logo
1 of 4
Download to read offline
Comodo EndpointSecurity Manager
With the Industry’s OnlyVirus-Free Warranty
Comodo’s patented auto-sandboxing technology ensures that all viruses
and malware are prevented from infecting your computer
ENDPOINT SECURITY MANAGEMENT
Comodo Endpoint Security protects against viruses and malware by focusing
on prevention and not simply detection. Our patent pending prevention-based
technology creates an impenetrable shield that identifies safe, unsafe and
questionable files.
Traditional antivirus solutions use a “detection” based approach whereby they
examine items against a “blacklist” (a list of known bad files/threats) to determine
which programs or files are safe to run or allow system access. The problem with this
approach is that ALL threats must be known and that your computer’s blacklist file
must be continuously and instantly updated. Given this limitation, it is impossible for
a blacklist to be up to date 100% of the time for 100% of the threats.
Next Generation Prevention-Based Security
Defense+ – A collection of advanced security prevention technologies designed to
preserve the integrity, security and privacy of your operating system and user data.
Host Intrusion Protection System (HIPS) – A rules-based intrusion prevention
system that monitors the activities of all applications and processes on your
computer. HIPS blocks the activities of malicious programs by halting any action
that could cause damage to your operating system, system-memory, registry keys
or personal data.
Behavior Blocker – Authenticates every executable and process running on your
computer and prevents them from taking action that could harm your computer.
Unrecognized processes and applications will be auto-sandboxed and run under
a set of restrictions so they cannot harm your computer. This gives untrusted (but
harmless) applications the freedom to operate whilst untrusted (and potentially
malicious) applications are prevented from damaging your PC or data.
Comodo Firewall – Highly configurable packet filtering firewall that constantly
defends your system from inbound and outbound Internet attacks.
2
Product highlights
The industry’s only virus-free
warranty!*
Award winning antivirus/anti-
malware suite makes endpoints
impenetrable due to 5 layers of
defense
5 layer defense features
integrated Firewall, Auto-
Sandbox, Host Intrusion
Prevention, Blacklist/Whitelist
Detection & File Reputation
Lookup
Unique, patented, fully-
automatic sandbox isolation
technology proactively protects
againts persistent unknown/
zero-day programs and
applications
Auto-Sandbox technology
runs unknown files in a virtual
enviroment protecting critical
Windows®
system files and
registry settings
Automated upload of suspicious
files to Comodo’s Valkyrie
malware labs for near real-time
analysis and verification
White-listing of known-good and
trusted local and network files
Advanced protection from
spyware and adware lowering
risk while increasing ease for
detection and remediation
Seamless integration with
Comodo’s Endpoint Security
Management console providing
advanced enterprise-wide
protection and monitoring from
a single web-based platform
ENDPOINT SECURITY MANAGEMENT
Secure Wireless Internet Connectivity – TrustConnect™ makes surfing the web safe from any public Wi-Fi location
Comodo Endpoint Security offers real-time protection against all malware threats. Other Antivirus products depend
on signature updates alone but Auto Sandbox Technology™ means you’re protected from unknown threats. And
remember, we are so confident we can protect you, we are the only vendor to provide a $5000* virus free warranty
against repair costs, should an endpoint in your enterprise become infected with a virus or malware and we can’t
restore you to working condition.
The Future of Endpoint Administration & Protection
Comodo Endpoint Security Manager
A vital component for any network administrator is the capability to deploy, manage and monitor endpoint security.
Comodo Endpoint Security Manager (ESM) is fully integrated with the Comodo Endpoint Security (CES) suite and provides
a centralized administration of antivirus and system health status.
Utilizing a unique patent-pending panoramic display, the web-based administration console presents each endpoint as a tile
containing 11 critical metrics facilitating rapid alerting and remediation of issues requiring a minimum of administrative effort.
•	 Infection Status
•	 Antivirus Definition Database Status
•	 Security Policy Compliance
•	 Internet Security Suite Status &
•	 Online Status
The ESM server’s lightweight agent acts as a conduit
instructing the endpoint to perform the actions required
by the administrator and reporting the endpoints
operational status to the management console.
Invoking the properties command, the management
agent gathers and returns the operating system,
service pack, OS version, whether a reboot is required,
networking statistics and CPU, RAM and hard-drive
usage metrics. With just one click the administrator is
able to view and stop services and processes as well as
browse and uninstall msi-based applications.
Armed with this information the administrator can
make swift and accurate decisions to protect their
infrastructure and ensure the smooth and efficient
continuation of user’s computing requirements.
Proactive administration is available through the
configuration of policies or templates that dictate the
endpoint’s behavior. Controlling everything from the
definition database update schedule and source,
granular manipulation of critical security configurations
and file and vendor white-listing, removable device control and power management, the user-friendly policy creation
wizard can generate and enforce the administrator’s configurations within minutes.
3
ENDPOINT SECURITY MANAGEMENT
More Efficient, Effective and Easier Management
This ability to roll out and centrally manage security policies to a network that is protected with a proven and fully
integrated security suite can save thousands of man-hours per year. Administrator time that would otherwise be lost to
repetitive configuration and vendor interoperability problems can be re-directed towards more productive and profitable
core business interests. Furthermore, because CESM policies can be deployed immediately across all protected nodes,
administrators can respond more quickly to protect an entire network against the latest, zero hour threats. CESM’s intuitive
interface provides fingertip access to task wizards, important network and task related data and support resources.
A Total Solution for both SMBs & the Enterprise
•• Next-generation, patent-pending, panoramic display presents ‘first-glance’ view of 11 critical endpoint metrics to
provide total visibility and control over endpoint security & management
•• Supports “push” deployment via Active Directory®
, Workgroup and IP addresses, silent “pull” deployment via group
policy or login script & manual deployment
•• Only endpoint security management solution that combines day-to-day system management by exposing networking,
hardware and software metrics to the administrator and offering multisession remote assistance capability from the
console to LAN or WAN connected endpoints
•• Real-time notifications lower emergency response time to emerging threats
•• Manages processes, services & installed applications per endpoint and per site
•• Automatically applied, fully customizable, location-aware policies allow granular definition of endpoint security
configurations and device control like USB device management
•• Centralized administration of Windows®
, Apple®
Mac OS X®
and Linux®
** workstation and laptop computers inside
and outside the business network from a Silverlight®
compatible browser
•• Minimal system requirements allows installation on non-dedicated Windows PCs** or servers
•• Go Green with integrated power management functionality with Wake-on-LAN enabled systems advance.
4
About Comodo
The Comodo companies create the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and
individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL, Code Signing, Content
Verification and Email Certificates; award winning PC security software; vulnerability scanning services for PCI Compliance; secure email and fax services.
Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital
players in the Internet’s ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business
customers and 10,000,000 users of our desktop security products.
For additional information on Comodo – Creating Trust Online™ visit www.comodo.com
* Comodo’s Protection Plan is included with Comodo Endpoint Security and is available for one (1) year from the date of your software registration and installation. Please see Comodo Endpoint
Security Manager End User Subscriber Agreement (http://www.comodo.com/repository/eula/EULA-CESM-v2013.pdf) for complete details. Comodo Endpoint Security trials exclude Comodo Protection Plan.
© 2013 Comodo Security Solutions, Inc. All Rights Reserved. Comodo, the Comodo logo, Default Deny, Auto Sandbox Technology, TrustConnect, Geek Buddy and the Geek Buddy logo are
trademarks of Comodo Security Solutions, Inc. All other trademarks are property of their respective owner. Specifications subject to change without notice.
**System only

More Related Content

What's hot

Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Iftikhar Ali Iqbal
 
Secure Email Communications from Symantec
Secure Email Communications from SymantecSecure Email Communications from Symantec
Secure Email Communications from SymantecArrow ECS UK
 
IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)Kimber Spradlin
 
Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02frank4dd
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentIftikhar Ali Iqbal
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskPrecisely
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2Norman Mayes
 
University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataNasser Hassan
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationDouglas Gourlay
 
Configuring Data Sources in AlienVault
Configuring Data Sources in AlienVaultConfiguring Data Sources in AlienVault
Configuring Data Sources in AlienVaultAlienVault
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...Precisely
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterDsunte Wilson
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...Symantec
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 

What's hot (20)

SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
 
Secure Email Communications from Symantec
Secure Email Communications from SymantecSecure Email Communications from Symantec
Secure Email Communications from Symantec
 
IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)
 
Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02
 
152 ready eng
152 ready eng152 ready eng
152 ready eng
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept Document
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
 
University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical Data
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems Presentation
 
Configuring Data Sources in AlienVault
Configuring Data Sources in AlienVaultConfiguring Data Sources in AlienVault
Configuring Data Sources in AlienVault
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 

Viewers also liked

Erfolgsfaktor Ladezeit - Antrieb für neue Geschäfte
Erfolgsfaktor Ladezeit - Antrieb für neue GeschäfteErfolgsfaktor Ladezeit - Antrieb für neue Geschäfte
Erfolgsfaktor Ladezeit - Antrieb für neue Geschäftesixclicks GmbH
 
Clippings Football Transfer Review 2013 -Mercado de invierno-
Clippings Football Transfer Review 2013  -Mercado de invierno-Clippings Football Transfer Review 2013  -Mercado de invierno-
Clippings Football Transfer Review 2013 -Mercado de invierno-Prime Time Sport
 
ALPHA AND CHURCH ASSIMILATION Action Research
ALPHA AND CHURCH ASSIMILATION Action Research ALPHA AND CHURCH ASSIMILATION Action Research
ALPHA AND CHURCH ASSIMILATION Action Research Cherlyn Jensen
 
Cómo cuidar la salud visual infantil
Cómo cuidar la salud visual infantilCómo cuidar la salud visual infantil
Cómo cuidar la salud visual infantilAlainAfflelou
 
Augeo Planzone Launch Event
Augeo Planzone Launch EventAugeo Planzone Launch Event
Augeo Planzone Launch EventSimon Trudelle
 
The Mandala Way | Mandala Verde
The Mandala Way | Mandala VerdeThe Mandala Way | Mandala Verde
The Mandala Way | Mandala VerdeThe Mandala Way
 
Sukarya presentation
Sukarya presentationSukarya presentation
Sukarya presentationSukarya
 
Pasos para participar en el foro me expreso
Pasos para participar en el foro me expresoPasos para participar en el foro me expreso
Pasos para participar en el foro me expresoAura Duque
 
Frankfurt Zoological Society's Annual Report 2012 / Prospects for 2013
Frankfurt Zoological Society's Annual Report 2012 / Prospects for 2013Frankfurt Zoological Society's Annual Report 2012 / Prospects for 2013
Frankfurt Zoological Society's Annual Report 2012 / Prospects for 2013FrankfurtZoological
 
Frukostseminarium med DIBS: Omnikanal i praktiken med Fredrik Ottosson från V...
Frukostseminarium med DIBS: Omnikanal i praktiken med Fredrik Ottosson från V...Frukostseminarium med DIBS: Omnikanal i praktiken med Fredrik Ottosson från V...
Frukostseminarium med DIBS: Omnikanal i praktiken med Fredrik Ottosson från V...Patrik Müller
 
Semiotica Urbana
Semiotica UrbanaSemiotica Urbana
Semiotica Urbanaguest89d4e9
 
ORDENANZA PARA LA PREVENCIÓN Y CONTROL DE RUIDOS Y VIBRACIONES DE MÁLAGA
ORDENANZA PARA LA PREVENCIÓN Y CONTROL DE RUIDOS Y VIBRACIONES DE MÁLAGAORDENANZA PARA LA PREVENCIÓN Y CONTROL DE RUIDOS Y VIBRACIONES DE MÁLAGA
ORDENANZA PARA LA PREVENCIÓN Y CONTROL DE RUIDOS Y VIBRACIONES DE MÁLAGAINASEL
 
Drupal 8 ve Yenilikleri
Drupal 8 ve YenilikleriDrupal 8 ve Yenilikleri
Drupal 8 ve Yenilikleritugayiltus
 
The new final review for promotions
The new final review for promotionsThe new final review for promotions
The new final review for promotionsPhuong Nguyen
 
Flächenangebot Gewerbepark Berliner Brücke
Flächenangebot Gewerbepark Berliner BrückeFlächenangebot Gewerbepark Berliner Brücke
Flächenangebot Gewerbepark Berliner BrückeSteffen Sauer
 
Woodbridge, CT Regional Economic Development Update
Woodbridge, CT Regional Economic Development UpdateWoodbridge, CT Regional Economic Development Update
Woodbridge, CT Regional Economic Development UpdateBarbara Malmberg, PMP
 

Viewers also liked (20)

Erfolgsfaktor Ladezeit - Antrieb für neue Geschäfte
Erfolgsfaktor Ladezeit - Antrieb für neue GeschäfteErfolgsfaktor Ladezeit - Antrieb für neue Geschäfte
Erfolgsfaktor Ladezeit - Antrieb für neue Geschäfte
 
Clippings Football Transfer Review 2013 -Mercado de invierno-
Clippings Football Transfer Review 2013  -Mercado de invierno-Clippings Football Transfer Review 2013  -Mercado de invierno-
Clippings Football Transfer Review 2013 -Mercado de invierno-
 
ALPHA AND CHURCH ASSIMILATION Action Research
ALPHA AND CHURCH ASSIMILATION Action Research ALPHA AND CHURCH ASSIMILATION Action Research
ALPHA AND CHURCH ASSIMILATION Action Research
 
Cómo cuidar la salud visual infantil
Cómo cuidar la salud visual infantilCómo cuidar la salud visual infantil
Cómo cuidar la salud visual infantil
 
Antibioticos
AntibioticosAntibioticos
Antibioticos
 
Augeo Planzone Launch Event
Augeo Planzone Launch EventAugeo Planzone Launch Event
Augeo Planzone Launch Event
 
Modulo 1
Modulo 1Modulo 1
Modulo 1
 
The Mandala Way | Mandala Verde
The Mandala Way | Mandala VerdeThe Mandala Way | Mandala Verde
The Mandala Way | Mandala Verde
 
Sukarya presentation
Sukarya presentationSukarya presentation
Sukarya presentation
 
Buddha Baby
Buddha BabyBuddha Baby
Buddha Baby
 
Pasos para participar en el foro me expreso
Pasos para participar en el foro me expresoPasos para participar en el foro me expreso
Pasos para participar en el foro me expreso
 
Frankfurt Zoological Society's Annual Report 2012 / Prospects for 2013
Frankfurt Zoological Society's Annual Report 2012 / Prospects for 2013Frankfurt Zoological Society's Annual Report 2012 / Prospects for 2013
Frankfurt Zoological Society's Annual Report 2012 / Prospects for 2013
 
Frukostseminarium med DIBS: Omnikanal i praktiken med Fredrik Ottosson från V...
Frukostseminarium med DIBS: Omnikanal i praktiken med Fredrik Ottosson från V...Frukostseminarium med DIBS: Omnikanal i praktiken med Fredrik Ottosson från V...
Frukostseminarium med DIBS: Omnikanal i praktiken med Fredrik Ottosson från V...
 
Semiotica Urbana
Semiotica UrbanaSemiotica Urbana
Semiotica Urbana
 
ORDENANZA PARA LA PREVENCIÓN Y CONTROL DE RUIDOS Y VIBRACIONES DE MÁLAGA
ORDENANZA PARA LA PREVENCIÓN Y CONTROL DE RUIDOS Y VIBRACIONES DE MÁLAGAORDENANZA PARA LA PREVENCIÓN Y CONTROL DE RUIDOS Y VIBRACIONES DE MÁLAGA
ORDENANZA PARA LA PREVENCIÓN Y CONTROL DE RUIDOS Y VIBRACIONES DE MÁLAGA
 
Drupal 8 ve Yenilikleri
Drupal 8 ve YenilikleriDrupal 8 ve Yenilikleri
Drupal 8 ve Yenilikleri
 
Hypnotizing Chickens v1
Hypnotizing Chickens v1Hypnotizing Chickens v1
Hypnotizing Chickens v1
 
The new final review for promotions
The new final review for promotionsThe new final review for promotions
The new final review for promotions
 
Flächenangebot Gewerbepark Berliner Brücke
Flächenangebot Gewerbepark Berliner BrückeFlächenangebot Gewerbepark Berliner Brücke
Flächenangebot Gewerbepark Berliner Brücke
 
Woodbridge, CT Regional Economic Development Update
Woodbridge, CT Regional Economic Development UpdateWoodbridge, CT Regional Economic Development Update
Woodbridge, CT Regional Economic Development Update
 

Similar to How Endpoint Security works ?

New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 Cyd Isaak Francisco
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptxNBBNOC
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixHCLSoftware
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfMdZabedHossain2
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqriteseo
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesSymantec
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products MatrixCharles McNeil
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protectionDavid Waugh
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesSymantec
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Communication Devices Inc
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide Lauren Bell
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by KasperskyL. Duke Golden
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgL. Duke Golden
 

Similar to How Endpoint Security works ? (20)

New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
Ericom Shield datasheet
Ericom Shield datasheetEricom Shield datasheet
Ericom Shield datasheet
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
How endpoint security system works
How endpoint security system worksHow endpoint security system works
How endpoint security system works
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
Cyber-Security Package.pptx
Cyber-Security Package.pptxCyber-Security Package.pptx
Cyber-Security Package.pptx
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktg
 

More from William hendric

Beginners Guide to SSL | SSL Tutorial
Beginners Guide to SSL | SSL TutorialBeginners Guide to SSL | SSL Tutorial
Beginners Guide to SSL | SSL TutorialWilliam hendric
 
How to install_comodo_free_internet_security
How to install_comodo_free_internet_securityHow to install_comodo_free_internet_security
How to install_comodo_free_internet_securityWilliam hendric
 
Auto sanbox technology a complete overview
Auto sanbox technology a complete overviewAuto sanbox technology a complete overview
Auto sanbox technology a complete overviewWilliam hendric
 
Facebook might lose battle to guard users' privacy
Facebook might lose battle to guard users' privacyFacebook might lose battle to guard users' privacy
Facebook might lose battle to guard users' privacyWilliam hendric
 
From Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack EverythingFrom Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack EverythingWilliam hendric
 
overview about comodo ev ssl certificate
overview about comodo ev ssl certificateoverview about comodo ev ssl certificate
overview about comodo ev ssl certificateWilliam hendric
 
Get installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPTGet installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPTWilliam hendric
 
Installation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodoInstallation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodoWilliam hendric
 

More from William hendric (9)

Beginners Guide to SSL | SSL Tutorial
Beginners Guide to SSL | SSL TutorialBeginners Guide to SSL | SSL Tutorial
Beginners Guide to SSL | SSL Tutorial
 
Network security
Network securityNetwork security
Network security
 
How to install_comodo_free_internet_security
How to install_comodo_free_internet_securityHow to install_comodo_free_internet_security
How to install_comodo_free_internet_security
 
Auto sanbox technology a complete overview
Auto sanbox technology a complete overviewAuto sanbox technology a complete overview
Auto sanbox technology a complete overview
 
Facebook might lose battle to guard users' privacy
Facebook might lose battle to guard users' privacyFacebook might lose battle to guard users' privacy
Facebook might lose battle to guard users' privacy
 
From Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack EverythingFrom Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack Everything
 
overview about comodo ev ssl certificate
overview about comodo ev ssl certificateoverview about comodo ev ssl certificate
overview about comodo ev ssl certificate
 
Get installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPTGet installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPT
 
Installation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodoInstallation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodo
 

Recently uploaded

Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 

Recently uploaded (20)

Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 

How Endpoint Security works ?

  • 1. Comodo EndpointSecurity Manager With the Industry’s OnlyVirus-Free Warranty Comodo’s patented auto-sandboxing technology ensures that all viruses and malware are prevented from infecting your computer
  • 2. ENDPOINT SECURITY MANAGEMENT Comodo Endpoint Security protects against viruses and malware by focusing on prevention and not simply detection. Our patent pending prevention-based technology creates an impenetrable shield that identifies safe, unsafe and questionable files. Traditional antivirus solutions use a “detection” based approach whereby they examine items against a “blacklist” (a list of known bad files/threats) to determine which programs or files are safe to run or allow system access. The problem with this approach is that ALL threats must be known and that your computer’s blacklist file must be continuously and instantly updated. Given this limitation, it is impossible for a blacklist to be up to date 100% of the time for 100% of the threats. Next Generation Prevention-Based Security Defense+ – A collection of advanced security prevention technologies designed to preserve the integrity, security and privacy of your operating system and user data. Host Intrusion Protection System (HIPS) – A rules-based intrusion prevention system that monitors the activities of all applications and processes on your computer. HIPS blocks the activities of malicious programs by halting any action that could cause damage to your operating system, system-memory, registry keys or personal data. Behavior Blocker – Authenticates every executable and process running on your computer and prevents them from taking action that could harm your computer. Unrecognized processes and applications will be auto-sandboxed and run under a set of restrictions so they cannot harm your computer. This gives untrusted (but harmless) applications the freedom to operate whilst untrusted (and potentially malicious) applications are prevented from damaging your PC or data. Comodo Firewall – Highly configurable packet filtering firewall that constantly defends your system from inbound and outbound Internet attacks. 2 Product highlights The industry’s only virus-free warranty!* Award winning antivirus/anti- malware suite makes endpoints impenetrable due to 5 layers of defense 5 layer defense features integrated Firewall, Auto- Sandbox, Host Intrusion Prevention, Blacklist/Whitelist Detection & File Reputation Lookup Unique, patented, fully- automatic sandbox isolation technology proactively protects againts persistent unknown/ zero-day programs and applications Auto-Sandbox technology runs unknown files in a virtual enviroment protecting critical Windows® system files and registry settings Automated upload of suspicious files to Comodo’s Valkyrie malware labs for near real-time analysis and verification White-listing of known-good and trusted local and network files Advanced protection from spyware and adware lowering risk while increasing ease for detection and remediation Seamless integration with Comodo’s Endpoint Security Management console providing advanced enterprise-wide protection and monitoring from a single web-based platform
  • 3. ENDPOINT SECURITY MANAGEMENT Secure Wireless Internet Connectivity – TrustConnect™ makes surfing the web safe from any public Wi-Fi location Comodo Endpoint Security offers real-time protection against all malware threats. Other Antivirus products depend on signature updates alone but Auto Sandbox Technology™ means you’re protected from unknown threats. And remember, we are so confident we can protect you, we are the only vendor to provide a $5000* virus free warranty against repair costs, should an endpoint in your enterprise become infected with a virus or malware and we can’t restore you to working condition. The Future of Endpoint Administration & Protection Comodo Endpoint Security Manager A vital component for any network administrator is the capability to deploy, manage and monitor endpoint security. Comodo Endpoint Security Manager (ESM) is fully integrated with the Comodo Endpoint Security (CES) suite and provides a centralized administration of antivirus and system health status. Utilizing a unique patent-pending panoramic display, the web-based administration console presents each endpoint as a tile containing 11 critical metrics facilitating rapid alerting and remediation of issues requiring a minimum of administrative effort. • Infection Status • Antivirus Definition Database Status • Security Policy Compliance • Internet Security Suite Status & • Online Status The ESM server’s lightweight agent acts as a conduit instructing the endpoint to perform the actions required by the administrator and reporting the endpoints operational status to the management console. Invoking the properties command, the management agent gathers and returns the operating system, service pack, OS version, whether a reboot is required, networking statistics and CPU, RAM and hard-drive usage metrics. With just one click the administrator is able to view and stop services and processes as well as browse and uninstall msi-based applications. Armed with this information the administrator can make swift and accurate decisions to protect their infrastructure and ensure the smooth and efficient continuation of user’s computing requirements. Proactive administration is available through the configuration of policies or templates that dictate the endpoint’s behavior. Controlling everything from the definition database update schedule and source, granular manipulation of critical security configurations and file and vendor white-listing, removable device control and power management, the user-friendly policy creation wizard can generate and enforce the administrator’s configurations within minutes. 3
  • 4. ENDPOINT SECURITY MANAGEMENT More Efficient, Effective and Easier Management This ability to roll out and centrally manage security policies to a network that is protected with a proven and fully integrated security suite can save thousands of man-hours per year. Administrator time that would otherwise be lost to repetitive configuration and vendor interoperability problems can be re-directed towards more productive and profitable core business interests. Furthermore, because CESM policies can be deployed immediately across all protected nodes, administrators can respond more quickly to protect an entire network against the latest, zero hour threats. CESM’s intuitive interface provides fingertip access to task wizards, important network and task related data and support resources. A Total Solution for both SMBs & the Enterprise •• Next-generation, patent-pending, panoramic display presents ‘first-glance’ view of 11 critical endpoint metrics to provide total visibility and control over endpoint security & management •• Supports “push” deployment via Active Directory® , Workgroup and IP addresses, silent “pull” deployment via group policy or login script & manual deployment •• Only endpoint security management solution that combines day-to-day system management by exposing networking, hardware and software metrics to the administrator and offering multisession remote assistance capability from the console to LAN or WAN connected endpoints •• Real-time notifications lower emergency response time to emerging threats •• Manages processes, services & installed applications per endpoint and per site •• Automatically applied, fully customizable, location-aware policies allow granular definition of endpoint security configurations and device control like USB device management •• Centralized administration of Windows® , Apple® Mac OS X® and Linux® ** workstation and laptop computers inside and outside the business network from a Silverlight® compatible browser •• Minimal system requirements allows installation on non-dedicated Windows PCs** or servers •• Go Green with integrated power management functionality with Wake-on-LAN enabled systems advance. 4 About Comodo The Comodo companies create the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL, Code Signing, Content Verification and Email Certificates; award winning PC security software; vulnerability scanning services for PCI Compliance; secure email and fax services. Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet’s ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and 10,000,000 users of our desktop security products. For additional information on Comodo – Creating Trust Online™ visit www.comodo.com * Comodo’s Protection Plan is included with Comodo Endpoint Security and is available for one (1) year from the date of your software registration and installation. Please see Comodo Endpoint Security Manager End User Subscriber Agreement (http://www.comodo.com/repository/eula/EULA-CESM-v2013.pdf) for complete details. Comodo Endpoint Security trials exclude Comodo Protection Plan. © 2013 Comodo Security Solutions, Inc. All Rights Reserved. Comodo, the Comodo logo, Default Deny, Auto Sandbox Technology, TrustConnect, Geek Buddy and the Geek Buddy logo are trademarks of Comodo Security Solutions, Inc. All other trademarks are property of their respective owner. Specifications subject to change without notice. **System only