- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
TECHNOLOGY & PROCESS
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Reduce the attack surface to remediate and patch
Fortify mobile devices that exit and enter your network
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
- For Home
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.
RAW MATERIALS COMPANY PROTECTS ITS SENSITIVE DATA FROM CYBER THEFT, THANKS TO COMODO’S ENDPOINT SECURITY SOLUTION
ENDPOINT VULNERABILITY CAN COME FROM ANYWHERE
Large and small businesses today rely on technology as a means of sharing information, conducting commerce, and collaborating across offices as well as across geographies. The rising adoption of laptops, tablets, smartphones and a mobile workforce have only further put an emphasis–and strain–on the IT community, forcing administrators to prepare for every type of IT challenge.
With advanced adoption of technology comes advanced risk. Every device that connects to a company’s network represents a potential entry point for malware. In an age of cyber terrorism, criminals only need a simple computer to create havoc for businesses, consumers, and individuals. Years of data, transactions, intellectual property and competitive secrets can all be shared with the world easily, if just one unsuspecting employee opens an email from a mobile phone and releases a virus. That is the risk and vulnerability of today’s networks and no company is immune.
Companies of all sizes and industries are taking steps to implement leading technology that can protect them from zero-day threats and unknown files that creep into their IT environment. BOLMET SA, a raw materials and metals corporation in Poland, is one such company that took the preventative measure to protect its endpoints and to keep their data safe and secure.
Headquartered in Boleslaw, Poland, BOLMET SA was founded in 1991, with a focus on trading non-ferrous metals and raw materials. In the last decade, the company has developed additional business focus areas including scrap trading. After acquiring a stake in recycling plant LZR, the company added the development and processing of lead and zinc scrap. In 2007 both companies merged and BOLMET SA was formed.
SECURING THE ENDPOINTS WITH COMODO
For the past year, BOLMET SA has been using Comodo’s Advanced Endpoint Protection solution and keeping its endpoints safe. BOLMET SA implemented Comodo’s patent-pending Run-Time Automatic Threat Containment (RATC) technology to protect is endpoints from known malware, but also from the unknown threats yet to be defined.
“As a mining trading company, we use a large number of Internet-based systems and platforms, like banking and online trading, to conduct business on a daily basis. If any of these systems ever become compromised, our company, our customers and our employees would all be at risk,” said Michal Zientara, IT Manager at BOLMET SA. “Our paramount concern had been how we prepare for the unknown and how we ensure the protection of our endpoints. Comodo came in and solved our concerns with the most advanced threat containment technology I have ever seen.”
Comodo’s ESM software suite brings five layers of defense (antivirus, firewall, host intrusion prevention, automatic containment and file reputation) right to the point of impact—the desktop environment. Patent-pending RATC technology eliminates malware outbreaks and operating system contamination by automatically running untrusted and unknown processes in a secure and isolated environment— never putting the company’s endpoints and network at risk.
“Our challenge was that traditional antivirus technology couldn’t protect us from unknown threats. We had specific needs in a security solution—a solution that offers multiple layers of protection, default-deny technology, central management, rock steady firewall capabilities, and the ability to be customized, said Zientara. “After researching all the major security companies, Comodo’s ESM technology was the only solution that met all of these criteria for us. ”
The Comodo ESM dashboard is used by the IT team at BOLMET SA to control all aspects of endpoint security. The dashboard gives the IT team panoramic insight and control of all endpoints– including the ability to terminate endpoint processes, stop or start services, uninstall applications and delete unwanted files—all without causing any inconvenience to the end user.
For IT administrators, as well as CIOs and CISOs who need total protection from data breaches, Comodo ESM is the only solution that offers real-time containment right on the endpoints. Unlike legacy approaches, such as blacklisting and sandboxing, Comodo uses smart filtering to automatically contain and execute unknown files, without negatively impacting the system performance and the user’s productivity.
Learn more about BOLMET SA at http://www.bolmet.com/
Get more information on Comodo Endpoint Security solutions by contacting EnterpriseSolutions@comodo.com
The Comodo organization is a global innovator and developer of cyber security solutions, founded on the belief that every single digital transaction deserves and requires a unique layer of trust and security. Building on its deep history in SSL certificates, antivirus and endpoint security leadership, and true containment technology, individuals and enterprises rely on Comodo’s proven solutions to authenticate, validate and secure their most critical information. With data protection covering endpoint, network and mobile security, plus identity and access management, Comodo’s proprietary technologies help solve the malware and cyber-attack challenges of today. Securing online transactions for thousands of businesses, and with more than 85 million desktop security software installations, Comodo is Creating Trust Online®. With United States headquarters in Clifton, New Jersey, the Comodo organization has offices in China, India, the Philippines, Romania, Turkey, Ukraine and the United Kingdom
For additional information on Comodo – Creating Trust Online™ – please visit: Comodo.com.