Comodo: Cloud Native Cyber Security Platform

CYBERSECURITY
RE-ARCHITECTED

Cloud-Native Cybersecurity with Patented Auto-Containment™ technology.

Arrow Right
To Stop
Breaches
Stops Threats & Adversaries other vendors do not detect for Detectionless Protection!

CLOUD-DELIVERED CYBERSECURITY

INTRODUCING THE
DRAGON ENTERPRISE PLATFORM

Cloud Native

Endpoint and Cloud
Instant Protection

Valkyrie

Powered by Artificial Intelligence & Analysts

Kernel API Virtualization

Stop Undetectable Threats

Built-In SIEM

Holistic Intelligence
Through Security Analytics

CLOUD-DELIVERED CYBERSECURITY FOR MSSPs & MSPs

INTRODUCING THE
SOCaaP PLATFORM

Dragon Enterprise Platform Included

Deliver cybersecurity modules directly from SOC-as-a-Platform

Multi-Tenant Security Posture Management

Manage alerts and incidents for all your clients

Co-Managed Threat Detection - SOC - SIEM

Launch your cybersecurity program backed by our in house SOC and SIEM

Compliance & Reporting

Automate your compliancy reporting and create custom reports

PSA Integrations

Seamless integration with PSA tools and software

Native Built-In SIEM

Holistic intelligence through security analytics

THE DRAGON
PLATFORM MODULES

Innovative, Extensible, Modular, Comprehensive

Cybersecurity re-architected to bring the below capabilities
of the Dragon Enterprise Platform with cloud-based management.

Cybersecurity

Endpoint Security

App Locker

Dragon AEP

Advanced Endpoint Protection

Scan

Dragon EDR

Endpoint Detection & Response

Dragon AEP

DRAGON Auto Containment

Contain any unknown threats into harmless, Anti-Ransomware

Virus Detected

DRAGON VIRUSCOPE

Autonomous local behaviour detection

Folder Protector

DRAGON DEVICE CONTROL

Comprehensive Device Control

Binary Digits

DRAGON DLP

Data Loss Prevention

File Protector

DRAGON Nx-SIEM

Next-Generation Native SIEM

Folder Protector

DRAGON VIRTUAL DESKTOP

Temporary full desktop

File Corrupted

DRAGON SCRIPT ANALYZER

Analyze scriptbased/fileless malware

Virus Transfer

DRAGON APPLICATION CONTROL

Comprehensive Device Control

Virus Scanning

DRAGON HIPS

Endpoint Intrusion Prevention

Firefox

DRAGON FW Management

Adaptive Endpoint FW

App Security

VALKYRIE

Every File gets a Trusted Verdict!

Mobile Cyber Security

DRAGON Mobile Management

Manage and Extend security to mobile devices

Cloud
Security

Virus Scanner

Dragon XDR

Extend detention response from endpoint to network and cloud

Cloud Data

Dragon CLOUD Integrator

Integrates cloud providers such as AWS, Azure, GC

Cloud File

Dragon CLOUD Discovery

Cloud Workload Discovery for Multi-Clouds

File Lock

Dragon CLOUD Threat Monitor

Next-GenerationThreat Discovery and Monitoring

Malware Locker

Dragon 0356 Threat Monitor

O365 Threat Discovery and Monitoring

File Protector

DRAGON Nx-SIEM

Next-Generation Native SIEM

Network
Security

Scanning

Dragon SEG

Secure Email Gateway

Virus Protector

Dragon SIG

Secure Internet Gateway

Folder

Dragon DNS Layer Security

DNS Layer Malware Protection

Malware

Dragon Web Filtering

Web Content Filtering

File Locker

Dragon C2C Protection

Detect and Disable any C2C Communication

Virus Infected

Dragon Browser Isolation

Airgap between Browser and Internet Threats

Data Phishing

Dragon Phishing/Spam Protection

Eliminate SPAM and Phishing Threats

File Locker

Dragon Email Threat Protection

Detect any threats from malicious URLs, attachments

File Protector

DRAGON Nx-SIEM

Next-Generation Native SIEM

Cloud Security

Dragon Spear Phishing Protection

Eliminates SpearPhishing Attacks

Cloud

Dragon Email Auto-Containment

Airgap between malicious emails and your endpoints

File Lock

Dragon Email Backup & Archieve

Backup and Achieving Solutions for your emails

Cybersecurity

Dragon Email Security On-Prem

On-Prem email Security Solution

Web Security

File Transferring

Dragon Web Malware Detect & Remediate

Website Security Protection

File Transfer

Dragon Secure CDN

Deliver Your Online Content Faster with Our CDN over Serverless Edge locations

Thread Detected

Dragon Secure DNS

Protect from DDOS Attacks

Virus Protector

Dragon Web Application Firewall

Eliminates Web Based Attacks

Data Protector

Dragon Web Vulnerability Scanner

Detect and Remediate Web Vulnerabilities

WWW

Dragon CMS Vulnerability Scanner

Detect and Remediate CMS Vulnerabilities

File Security

Dragon Web Backup

Integrated Web Backup solution

Folder Locker

Dragon Next Gen Containerized Hosting

Fully Managed Hosting Solution

File Lock

Dragon Web Threat Monitor & Response

24x7 Monitor and Protect Any Web Threats

File Protector

DRAGON Nx-SIEM

Next-Generation Native SIEM

Security Services

Thread Detected

INCIDENT RESPONSE (DFIR)

Resolve Immediate Cyberattacks

File Protector

Dragon MDR

24x7 Active Monitoring & Response to Cyber Threats

Thread Detected

COMPROMISE ASSESSMENT

Identify Ongoing or Past Attacker Activity

Customer Portal

RED TEAM SERVICES

Advanced Penetration Testing and Security Awareness

Searching

THREAT INTELLIGENCE SERVICES

Detect Emerging Cyber Threats

Binary Numbers

RETAINER SERVICES

React Quickly to any Cybersecurity Incident

Folder

INSURANCE

Cyber Insurance Services

Virus Checker

MANAGED THREAT HUNTING

Proactively Hunt Cyber Threats

PC Cyber Security

File Analysis & Verdict Service

Advanced File and Forensic Analysis

App Locker

MANAGED WEB SECURITY

24x7 Web Site Protection

SOCaaP Platform

All modules listed above are included

Customer-Asset Mgmt.

4-Comodo Security Operations Centre as a Service

SOCaaP CUSTOMER MANAGER

Multi-Tenant Customer Portal

3-Comodo Security Operations Centre as a Service

SOCaaP ASSET DISCOVERY

Discover and Enroll all assets of your customers

1-Comodo Security Operations Centre as a Service

SOCaaP CLOUD CONNECT

Connect and Discover Cloud Assets

2-Comodo Security Operations Centre as a Service

SOCaaP PSA INTEGRATOR

Integrate with your PSA tools

Incident & Response

9-Comodo Security Operations Centre as a Service

SOCaaP INCIDENT MANAGER

Manage all Security Incidents of your customers

8-Comodo Security Operations Centre as a Service

SOCaaP RESPONSE PLANNER

Plan Incident Reponse Activities

5-Comodo Security Operations Centre as a Service

SOCaaP CASE MANAGEMENT

Case Management for Cybersecurity Incidents

6-Comodo Security Operations Centre as a Service

SOCaaP AUTOMATED ANALYSIS & ACTIVE RESPONSE

Automate your analysis over Incidents

7-Comodo Security Operations Centre as a Service

SOCaaP THREAT SHARING

Share Threat Information

Security Risk Mgmt.

14-Comodo Security Operations Centre as a Service

SOCaaP VULNERABILITY SCANNER

Scan your customer's network and assets

13-Comodo Security Operations Centre as a Service

SOCaaP LOG COLLECTOR

Collect any logs to increase visibility

10-Comodo Security Operations Centre as a Service

SOCaaP NETWORK SECURITY MONITOR

Network Sensor with full packet capture and decoding

11-Comodo Security Operations Centre as a Service

SOCaaP MANAGED IDS

Network IDs with Managed Rules

12-Comodo Security Operations Centre as a Service

SOCaaP ASSET RISK ASSESSMENT

Realtime cyber risk assessment on monitored assets

Reporting

17-Comodo Security Operations Centre as a Service

SOCaaP COMPLIANCE

Compliance Reporting for your customers

16-Comodo Security Operations Centre as a Service

SOCaaP SOC REPORTING

SOC Operational and Metric Reporting

15-Comodo Security Operations Centre as a Service

SOCaaP REPORT MANAGER

Prepare custom reports for your customers

SOC as a Service

23-Comodo Security Operations Centre as a Service

SOCaaP MANAGED ENDPOINT

Managed Endpoint Services

22-Comodo Security Operations Centre as a Service

SOCaaP THREAT MONITOR

24x7 Whitelabeled SOC Services

18-Comodo Security Operations Centre as a Service

SOCaaP CLOUD MONITOR

Monitor 0365, AWS, Azure, GC

19-Comodo Security Operations Centre as a Service

SOCaaP INCIDENT RESPONSE

Resolve Immediate Cyberattacks

20-Comodo Security Operations Centre as a Service

SOCaaP PEN TEST ASSESSMENT

Fortify your defenses by being breached by our industry experts

21-Comodo Security Operations Centre as a Service

SOCaaP COMPROMISE ASSESSMENT

Identify Ongoing or Past Attacker Activity

IT Service Management

Patch Management

Dragon Patch Monitor

Detect any unpatched endpoint

Dragon Patch Manager

Apply patches to all your assets

Dragon Vulnerability

Detect any vulnerabilities on your endpoints

Remote Monitoring

Dragon Device Management

Manage all your customer devices remotely

Dragon Remote Monitoring

Monitor and manage any endpoint events

Dragon Remote Procedure/Script Management

Manage your endpoints by automating scripts or procedures remotely

Dragon Device Monitoring & Realtime Alerting

Set alerts and notifications on any endpoint events

Dragon Performance Monitoring

Monitor and alert performance of the endpoints

Remote
Access

Dragon Remote Device Control

Access to all your customer devices remoted

Dragon Remote File Access

Secure file access to all endpoints

Network Discovery

Dragon Network Auto Discovery

Scan your customer network and detect all endpoints to manage

Dragon Network Deployment Automation

Deploy Dragon Platform endpoint agents automatically

Service Desk

Dragon Ticket Management

Management for your customers

Dragon Service Desk Workflow Management

Customize and automate customer service requests

Dragon Service Desk SLA Tracking

Monitor SLAs of your support requests

Dragon Service Desk Knowledge Base

Manage all support knowledge base in one place

Asset 87

Learn more about Comodo Cloud Security

Comprehensive breach protection for Azure, AWS, and Google Cloud

Asset 88

Re-architected Security - Zero Trust Endpoints

Frictionless Next-Generation Endpoint Protection for All Users, and Systems

PROVEN RESULTS

Join over 10 million endpoints protected globally
From the largest organizations to home users, we neutralize threat everywhere from largest enterprises to home users.

BECOME A PARTNER WITH COMODO CYBERSECURITY

Every Industry Professional Agrees That Our Solution Is The Only One That Truly Stops Breaches

TRUSTED TO PREVENT BREACHES
Organizations Trust Comodo Cybersecurity to Protect Their Environments from Cyber Threats
EXCELLENCE IN
THE INDUSTRY

Comodo Cybersecurity’s solutions and services are recognized by leading industry associations. These leading industry associations are continuously recognizing us for our innovative technologies that are securing organizations of all verticals around the globe daily.

Get Protection Against All Cyber Threats Other Vendors Miss. Quick and Simple

START YOUR EVALUATION NOW

Most Comprehensive Cybersecurity platform
Power of API Kernel Virtualization- see in action!

FREE SECURITY SCORECARD

See how your organization scores based on our in-depth analysis

Scroll to Top