- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
TECHNOLOGY & PROCESS
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Reduce the attack surface to remediate and patch
Fortify mobile devices that exit and enter your network
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
- For Home
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.
REAL ESTATE DEVELOPMENT FIRM USES COMODO’S CONTAINMENT TECHNOLOGY TO PROTECT AND SECURE ITS DATA
REAL ESTATE ORGANIZATIONS PROTECT THEIR CRITICAL DATA WITH COMODO
Based in New Orleans, Louisiana, HRI Properties (HRI) is a full-service real estate development company and a national leader in the adaptive reuse of historic structures. The mission of HRI Properties is revitalizing cities by creating diverse, vibrant and sustainable communities. Through its subsidiaries, HRI has completed 70 large-scale projects for a total funding value of $2 billion which include 5,114 apartment units, 4,116 hotel rooms, and over 1,300,000 square feet of office and retail space.
Like many organizations and companies across the world today, HRI keeps all of its critical information on its clients hosted in the online world – where information can be easily shared, collaborated on, and maximized by the HRI employees. Restricted information, such as contracts, permits, zoning rules and regulations, ordinances and budgets for HRI, all need to be protected and secured without the constant threat of malware or service interruptions.
“We had a mixture of multiple antivirus solutions from multiple companies trying to protect our network and endpoints, and it simply was not working out for us,” said Wayne Clement, Jr., IT Security Analyst for HRI Properties. “We were experiencing occasional outbreaks. Since the systems were disparate, there was no ability to centrally manage any of the information, which caused major interruptions and problems for our HRI team.”
The lack of visibility into each endpoint’s antivirus software was extremely troubling for HRI, lacking any ability to proactively address new risks. HRI started the assessment to bring in a new security solution that would deliver on three core needs: manageability of multiple endpoints from a single console, reports on endpoint status and activity, and protection of endpoints from new, unidentified and unknown threats.
HRI properties evaluated Symantec, Kaspersky, McAfee and Comodo based on their own internal research to try and understand what would be the best option for HRI’s needs.
In the end, Comodo endpoint security solution was selected as the clear winner for HRI Properties, due to its streamlined dashboard, implementation process and multiple layers of defense.
THE ANSWER: ENDPOINT SECURITY WITH SIMPLIFIED MANAGEMENT
Comodo Endpoint Security Manager 3.4 software brings seven layers of defense – antivirus, firewall, web URL filtering, host intrusion prevention, auto-sandbox (containment) and file reputation, and virus scope (behavioral analyzer) – together under a single offering for customers of all sizes, to protect them from both known and unknown threats.
Comodo’s patent-pending automatic containment technology eliminates malware outbreaks and operating system contamination by automatically running untrusted processes in a secure, environment on the users PC or endpoint.
“For the technology needs of HRI, the automatic containment feature within Comodo’s technology really stood out to us. It provided a clear way for us to not only create rules to limit and block untrusted applications, but for us to also isolate applications such as web browsers for computers that are used in a kiosk-type setting,” said Clement.
The Comodo ESM dashboard is used by the IT team at HRI Properties for panoramic insight and to control all aspects of endpoint protection and management. Its streamlined interface displays 14 critical metrics at the hundreds of endpoints at HRI Properties, facilitating rapid alerting and remediation of issues. The HRI Properties administrators can also terminate endpoint processes, stop or start services, uninstall applications and delete unwanted files—all without causing any interference to the end user.
“We are very pleased with how Comodo’s endpoint security solution protects us from known and unknown threats. The customization of ESM has allowed us to save a tremendous amount of time identifying, containing, and remediating outbreaks,” said Clement. “The ESM console is a valuable source for information on all of our endpoints, providing a snapshot of resource utilization, event log entries, and overall protection strategy. We can’t imagine using any other security software other than Comodo to protect our endpoints.”
For IT administrators, as well as CIOs and CISOs who need to prevent data breaches, Comodo endpoint security is the only solution that offers on-device, real-time containment. Unlike legacy approaches, such as blacklisting and sandboxing, Comodo endpoint security uses smart filtering to automatically contain and execute unknown files, without negatively impacting the system performance or the user’s productivity.
Learn more about HRI Properties at: http://www.hriproperties.com/
Get more information on Comodo endpoint security solutions and other leading Comodo enterprise security technologies by contacting EnterpriseSolutions@comodo.com
The Comodo organization is a global innovator and developer of cybersecurity solutions, founded on the belief that every single digital transaction deserves and requires a unique layer of trust and security. Building on its deep history in SSL certificates, antivirus and endpoint security leadership, and true containment technology, individuals and enterprises rely on Comodo’s proven solutions to authenticate, validate and secure their most critical information. With data protection covering endpoint, network and mobile security, plus identity and access management, Comodo’s proprietary technologies help solve the malware and cyber-attack challenges of today. Securing online transactions for thousands of businesses, and with more than 85 million desktop security software installations, Comodo is Creating Trust Online®. With United States headquarters in Clifton, New Jersey, the Comodo organization has offices in China, India, the Philippines, Romania, Turkey, Ukraine and the United Kingdom.
For more information, visit www.comodo.com
Comodo and the Comodo brand are trademarks of the Comodo Group Inc. or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The current list of Comodo trademarks and patents is available at comodo.com/repository
Key Features and Benefits of Comodo Advanced Endpoint Protection:
- Standalone containerization complements and enhances any existing security solution to block unknown files from infecting an endpoint
- A seven layered defense suite (Antivirus, Firewall, Web URL Filtering, Host Intrusion Prevention, Auto Sandbox (Containment) and File Reputation, and Virus Scope (behavioral analyzer) built on Comodo’s Default Deny architecture
- Deep-dive analysis of managed endpoints operation through a single click-and-dashboard view
- Patent-pending containerization technology prevents zero-day malware attacks
- Smart filtering to automatically contain and execute unknown files without negatively impacting system performance or user productivity