CYBERSECURITY RE-ARCHITECTED
Cloud-Native Cybersecurity with Patented Auto-Containment™ technology.
Breaches
E-BOOK
Buyer's Guide to Endpoint Protection Platforms in 2020
Discover the guide to help you find the features you need for real-world security in today's threat landscape.
PARTNERS
How to Transition to an MSSP and Scale Profitably
Learn how to capitalize on the growing demand for cybersecurity solutions with Comodo’s next-gen SOC-as-a-Platform.
REPORT
Tech Target Report
Endpoint computing is one of the fastest changing segments in the entire IT industry. Endpoint security redefined in recent years due to a variety of factors shared in this report.
CLOUD-DELIVERED CYBERSECURITY
INTRODUCING THE
DRAGON ENTERPRISE PLATFORM
Cloud Native
Endpoint and Cloud
Instant Protection
Valkyrie
Powered by Artificial Intelligence & Analysts
Kernel API Virtualization
Stop Undetectable Threats
Built-In SIEM
Holistic Intelligence
Through Security Analytics
CLOUD-DELIVERED CYBERSECURITY FOR MSSPs & MSPs
INTRODUCING THE
SOCaaP PLATFORM
Dragon Enterprise Platform Included
Deliver cybersecurity modules directly from SOC-as-a-Platform
Multi-Tenant Security Posture Management
Manage alerts and incidents for all your clients
Co-Managed Threat Detection - SOC - SIEM
Launch your cybersecurity program backed by our in house SOC and SIEM
Compliance & Reporting
Automate your compliancy reporting and create custom reports
PSA Integrations
Seamless integration with PSA tools and software
Native Built-In SIEM
Holistic intelligence through security analytics
THE DRAGON
PLATFORM MODULES
Innovative, Extensible, Modular, Comprehensive
of the Dragon Enterprise Platform with cloud-based management.
Cybersecurity
Endpoint Security
Dragon AEP
Advanced Endpoint Protection
Dragon EDR
Endpoint Detection & Response
DRAGON Auto Containment
Contain any unknown threats into harmless, Anti-Ransomware
DRAGON VIRUSCOPE
Autonomous local behaviour detection
DRAGON DEVICE CONTROL
Comprehensive Device Control
DRAGON DLP
Data Loss Prevention
DRAGON Nx-SIEM
Next-Generation Native SIEM
DRAGON VIRTUAL DESKTOP
Temporary full desktop
DRAGON SCRIPT ANALYZER
Analyze scriptbased/fileless malware
DRAGON APPLICATION CONTROL
Comprehensive Device Control
DRAGON HIPS
Endpoint Intrusion Prevention
DRAGON FW Management
Adaptive Endpoint FW
VALKYRIE
Every File gets a Trusted Verdict!
DRAGON Mobile Management
Manage and Extend security to mobile devices
Cloud
Security
Dragon XDR
Extend detention response from endpoint to network and cloud
Dragon CLOUD Integrator
Integrates cloud providers such as AWS, Azure, GC
Dragon CLOUD Discovery
Cloud Workload Discovery for Multi-Clouds
Dragon CLOUD Threat Monitor
Next-GenerationThreat Discovery and Monitoring
Dragon 0356 Threat Monitor
O365 Threat Discovery and Monitoring
DRAGON Nx-SIEM
Next-Generation Native SIEM
Network
Security
Dragon SEG
Secure Email Gateway
Dragon SIG
Secure Internet Gateway
Dragon DNS Layer Security
DNS Layer Malware Protection
Dragon Web Filtering
Web Content Filtering
Dragon C2C Protection
Detect and Disable any C2C Communication
Dragon Browser Isolation
Airgap between Browser and Internet Threats
Dragon Phishing/Spam Protection
Eliminate SPAM and Phishing Threats
Dragon Email Threat Protection
Detect any threats from malicious URLs, attachments
DRAGON Nx-SIEM
Next-Generation Native SIEM
Dragon Spear Phishing Protection
Eliminates SpearPhishing Attacks
Dragon Email Auto-Containment
Airgap between malicious emails and your endpoints
Dragon Email Backup & Archieve
Backup and Achieving Solutions for your emails
Dragon Email Security On-Prem
On-Prem email Security Solution
Web Security
Dragon Web Malware Detect & Remediate
Website Security Protection
Dragon Secure CDN
Deliver Your Online Content Faster with Our CDN over Serverless Edge locations
Dragon Secure DNS
Protect from DDOS Attacks
Dragon Web Application Firewall
Eliminates Web Based Attacks
Dragon Web Vulnerability Scanner
Detect and Remediate Web Vulnerabilities
Dragon CMS Vulnerability Scanner
Detect and Remediate CMS Vulnerabilities
Dragon Web Backup
Integrated Web Backup solution
Dragon Next Gen Containerized Hosting
Fully Managed Hosting Solution
Dragon Web Threat Monitor & Response
24x7 Monitor and Protect Any Web Threats
DRAGON Nx-SIEM
Next-Generation Native SIEM
Security Services
INCIDENT RESPONSE (DFIR)
Resolve Immediate Cyberattacks
Dragon MDR
24x7 Active Monitoring & Response to Cyber Threats
COMPROMISE ASSESSMENT
Identify Ongoing or Past Attacker Activity
RED TEAM SERVICES
Advanced Penetration Testing and Security Awareness
THREAT INTELLIGENCE SERVICES
Detect Emerging Cyber Threats
RETAINER SERVICES
React Quickly to any Cybersecurity Incident
INSURANCE
Cyber Insurance Services
MANAGED THREAT HUNTING
Proactively Hunt Cyber Threats
File Analysis & Verdict Service
Advanced File and Forensic Analysis
MANAGED WEB SECURITY
24x7 Web Site Protection
SOCaaP Platform
All modules listed above are included
Customer-Asset Mgmt.
SOCaaP CUSTOMER MANAGER
Multi-Tenant Customer Portal
SOCaaP ASSET DISCOVERY
Discover and Enroll all assets of your customers
SOCaaP CLOUD CONNECT
Connect and Discover Cloud Assets
SOCaaP PSA INTEGRATOR
Integrate with your PSA tools
Incident & Response
SOCaaP INCIDENT MANAGER
Manage all Security Incidents of your customers
SOCaaP RESPONSE PLANNER
Plan Incident Reponse Activities
SOCaaP CASE MANAGEMENT
Case Management for Cybersecurity Incidents
SOCaaP AUTOMATED ANALYSIS & ACTIVE RESPONSE
Automate your analysis over Incidents
SOCaaP THREAT SHARING
Share Threat Information
Security Risk Mgmt.
SOCaaP VULNERABILITY SCANNER
Scan your customer's network and assets
SOCaaP LOG COLLECTOR
Collect any logs to increase visibility
SOCaaP NETWORK SECURITY MONITOR
Network Sensor with full packet capture and decoding
SOCaaP MANAGED IDS
Network IDs with Managed Rules
SOCaaP ASSET RISK ASSESSMENT
Realtime cyber risk assessment on monitored assets
Reporting
SOCaaP COMPLIANCE
Compliance Reporting for your customers
SOCaaP SOC REPORTING
SOC Operational and Metric Reporting
SOCaaP REPORT MANAGER
Prepare custom reports for your customers
SOC as a Service
SOCaaP MANAGED ENDPOINT
Managed Endpoint Services
SOCaaP THREAT MONITOR
24x7 Whitelabeled SOC Services
SOCaaP CLOUD MONITOR
Monitor 0365, AWS, Azure, GC
SOCaaP INCIDENT RESPONSE
Resolve Immediate Cyberattacks
SOCaaP PEN TEST ASSESSMENT
Fortify your defenses by being breached by our industry experts
SOCaaP COMPROMISE ASSESSMENT
Identify Ongoing or Past Attacker Activity
IT Service Management
Patch Management
Dragon Patch Monitor
Detect any unpatched endpoint
Dragon Patch Manager
Apply patches to all your assets
Dragon Vulnerability
Detect any vulnerabilities on your endpoints
Remote Monitoring
Dragon Device Management
Manage all your customer devices remotely
Dragon Remote Monitoring
Monitor and manage any endpoint events
Dragon Remote Procedure/Script Management
Manage your endpoints by automating scripts or procedures remotely
Dragon Device Monitoring & Realtime Alerting
Set alerts and notifications on any endpoint events
Dragon Performance Monitoring
Monitor and alert performance of the endpoints
Remote
Access
Dragon Remote Device Control
Access to all your customer devices remoted
Dragon Remote File Access
Secure file access to all endpoints
Network Discovery
Dragon Network Auto Discovery
Scan your customer network and detect all endpoints to manage
Dragon Network Deployment Automation
Deploy Dragon Platform endpoint agents automatically
Service Desk
Dragon Ticket Management
Management for your customers
Dragon Service Desk Workflow Management
Customize and automate customer service requests
Dragon Service Desk SLA Tracking
Monitor SLAs of your support requests
Dragon Service Desk Knowledge Base
Manage all support knowledge base in one place
Learn more about Comodo Cloud Security
Comprehensive breach protection for Azure, AWS, and Google Cloud
Re-architected Security - Zero Trust Endpoints
Frictionless Next-Generation Endpoint Protection for All Users, and Systems
Join over 10 million endpoints protected globally
From the largest organizations to home users, we neutralize threat everywhere from largest enterprises to home users.
THE INDUSTRY
Comodo Cybersecurity’s solutions and services are recognized by leading industry associations. These leading industry associations are continuously recognizing us for our innovative technologies that are securing organizations of all verticals around the globe daily.
START YOUR EVALUATION NOW
Most Comprehensive Cybersecurity platform
Power of API Kernel Virtualization- see in action!
See how your organization scores based on our in-depth analysis