Comodo
Endpoint Security Manager

Comodo Endpoint Security Manager provides centralized management of Comodo's 7-layered security suite that proactively protects endpoints and their applications against malware and advanced threats.

Endpoint Security
User Rating
5 Star Rating5 Star Rating5 Star Rating5 Star Rating5 Star Rating
5 / 5 of 11 Reviews
Comodo Endpoint Security Manager (ESM)

7-Layer Endpoint Security Platform

  • Containment with auto-sandboxing – A preventative layer that auto-sandboxes files that have yet to be reported to any known blacklist.
  • Web URL Filtering – A powerful rule-configuration interface that can create rules as sweeping or as granular as needed, even on a per-user basis.
  • Comodo Firewall – A highly configurable packet filtering firewall that constantly defends inbound and outbound Internet attacks.
  • Comodo Antivirus – A proactive antivirus engine that automatically detects and eliminates viruses, worms and other malware.
  • File Lookup Services – A cloud-based file lookup service (FLS) that ascertains the reputation of files, checking them against Comodo's master whitelist and blacklists.
  • Host Intrusion Protection System (HIPS) – A rules-based intrusion prevention system that monitors all activities of applications and processes.
  • Viruscope (Behavior Analysis) – Behavioral monitoring of all processes and alerts if they take harmful action.

Comodo Endpoint Security Manager (ESM) software brings 7 layers of defense – antivirus, firewall, web URL filtering, host intrusion prevention, auto-sandbox (containment), file reputation and viruscope (behavioral analysis) – together under a single offering for customers of all sizes, to protect them from both known and unknown threats.

Comodo ESM Checks All the Boxes…

Whether deployed as a complete security suite or by using the sandbox as a standalone to fortify existing AV solutions, Comodo Endpoint Security Manager offers unrivalled endpoint protection for Microsoft Windows servers, desktops, laptops and tablets.

The full Comodo Endpoint Security suite brings 7 layers of protection to the point of impact – the endpoint environment. Its disruptive auto-sandbox technology eliminates malware outbreaks and operating system contamination by automatically running untrusted/unknown process in a virtual environment within the existing system and with low system usage requirements. This makes Comodo's endpoint protection the only managed anti-malware solution that can offer a $5,000 limited warranty against infection.

The Comodo Endpoint Security Manager dashboard gives administrators panoramic insight and control over all aspects of endpoint protection and management. Its streamlined interface displays 14 critical metrics about each machine, facilitating rapid alerting and remediation of issues. Administrators can also terminate endpoint processes, stop or start services, uninstall applications and delete unwanted files - all without causing interference to the end-user.

Comodo Endpoint Security Manager allows you to control and centrally manage endpoint protection through the application of operational templates or policies. Any deviation from these policies causes Comodo Endpoint Security Manager to automatically reapply the assigned policy or alert the administrator if it is unable to do so.

Comodo's endpoint protection also provides administrators with the ability to centrally manage endpoint system resources. Administrators can define operational thresholds for CPU usage, RAM usage, network usage and available storage. Should the thresholds be exceeded, Comodo Endpoint Security Manager will alert the administrator through the dashboard and via email notification.

Additional policy configurations include power management such as screen-locking or drive-locking. Your Green initiatives are further enhanced through system-standby and system-hibernation scheduling. Comodo's endpoint protection also offers options for disabling USB mass-storage devices, optical devices and even floppy drives.

 

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Apple, Mac and OS X are trademarks of Apple Inc., registered in the U.S. and other countries.
Comodo's endpoint protection is not affiliated with Debian. Debian is a registered trademark owned by Software in the Public Interest, Inc.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.

1 Terms and conditions apply.

User Reviews
11 users   Newest Date  
5 Star Rating 5 Star Rating 5 Star Rating 5 Star Rating Star Rating Icon 0 users   Oldest Date  
5 Star Rating 5 Star Rating 5 Star Rating Star Rating Icon Star Rating Icon 0 users        
5 Star Rating 5 Star Rating Star Rating Icon Star Rating Icon Star Rating Icon 0 users   Most Favourable Review  
5 Star Rating Star Rating Icon Star Rating Icon Star Rating Icon Star Rating Icon 0 users   Most Critical Review  
  • Cancel ButtonAdd Review Button
maddy thosm
12/09/2015
Solid firewall protection

We're down to only a few spam emails a month per 100 users. 10/10 would recommend. useful updates.

Brooklyn John
11/23/2015
Happy Customer

Easy to deploy, lay-man friendly interface, and simple to manage. Comodo ESP offers endless ways of customization and works great from XP all the way to Windows 10, as well as Linux.

Scarlett Christopher
11/23/2015
Like none other

This is the easiest, and well functioning ESM software I've ever come across. A previous application in our company was a nightware. I walked in and was able to easily pick up how easy Comodo ESM was to use and able to deploy to our network with ease.

Hannah Luke
11/22/2015
Simply the best

Comodo's support has been phenomenal. We saved a lot of money by choosing Comodo's endpoint security management software.

Layla Dylan
11/22/2015
Great stuff

Works really great! The tech support is responsive, and the program itself is not a resource hog, like other AV solutions of this capability.

Features

More Control, Less Worry

Comodo's unique containment technology auto-sandboxes unknown malware onsite in a virtual environment with little resource usage required.

Manage with Ease

Centrally manage your servers, workstations, laptops, netbooks and their applications.

Engage in Best Practices

Our 7-layered security platform ensures each endpoint is protected with a combination of web URL filtering, firewall, antivirus, file lookup service, HIPs, containment with auto-sandboxing and viruscope (behavior analysis).

Save Time

View and modify endpoint processes, services and installed applications with powerful system management capabilities.

Simplify Administration

Use 'push' deployment via Active Directory®, Workgroup and IP addresses; and "pull" deployment via group policy or login script.

Interact Remotely

Interact directly with users and remote desktop endpoints with our remote assistance feature.

Lower Response Time

Real-time notifications lower emergency response time to emerging threats.

Deepen Understanding

Location-aware policies allow granular definition of security configurations for endpoints inside and outside of the VPN.

Go Green

Wake-on-LAN enabled systems advance enables integrated power management functionality.

Keep System Requirements Low

Minimal system requirements allow installation on non-dedicated Windows PCs and servers.

Gain Insights

A robust dashboard presents a panoramic view of 14 critical endpoint metrics.

What protection does Endpoint Security offer?

Comodo Endpoint Security offers 360° protection against internal and external threats by consolidating multiple, cutting edge security technologies in a single, easily installed solution. These include:

  • Comodo's powerful antivirus and award-winning firewall solutions
  • Comodo's innovative Host Intrusion Prevention System which prohibits untrusted executables from tampering with other processes and files
  • Auto-Sandbox™ technology which automatically runs untrusted applications in a contained, isolated environment so they cannot damage the underlying operating system or access user files
  • Integrated 'File Reputation' system uses behavior analysis to help determine the trustworthiness of unrecognized files - all without interrupting the end-user

Comodo is so confident that we can protect endpoints against infection that we are the only vendor to offer a $5,000 Limited Virus-Free Warranty 1

How much system resource is consumed on the endpoint?

On idle, the entire 5-in-1 suite only consumes 7.5MB RAM and doesn’t register any CPU usage in Windows Task Manager.

How do I manage endpoints using Comodo Endpoint Security?

Endpoint can be administered via a list, tile or panoramic display interfaces.

Can the management server be run from a virtual server?

Yes.

Can I manage virtual machines?

Yes. ESM can manage full virtualized machines or virtual machines cloned from templates (requires sys prep utility to be run on master template first).

Where do I deploy the endpoint protection server?

The endpoint protection server can be installed on any supported Microsoft Windows operating systems running on a private cloud server, public cloud server or on-premises server.

I manage endpoints in multiple locations, how do I use Comodo ESM?

You can manage all your endpoints from a single endpoint protection server. Alternatively, you can use Comodo ESM 'Dependent Servers' function so that each site has its own endpoint protection server which you can control from an upstream endpoint protection server.

How do I deploy to my endpoints?

Comodo ESM will auto-discover any endpoints in your Active Directory/LDAP containers. Alternatively, you can use the wizards to 'push' the ESM agents to the systems you want managed. You can 'push' deploy to Active Directory OUs, Microsoft workgroups, single IP addresses or an IP address range. You can also download and save the Windows, Mac or Linux management agents to a shared folder, then use login scripts or Group Policy to 'pull' deploy to your systems.

Is alerting/reporting done on a schedule?

No. Comodo's endpoint protection alerting takes place in real-time.

How do I know when something is wrong?

There are several ways that ESM alerts an administrator.

  • The endpoints tile icon will change color to indicate an infection has been found, the signature database is out of date, the endpoint is not policy compliant or system resource usage has exceeded pre-defined thresholds.
  • The numbers in the information bar's heads-up display will increase.
  • Comodo Endpoint Security Manager will send you a notification email for any event that you specify.

How are virus database updates received and how are they pushed out?

Virus database updates aren't pushed; instead they are pulled by the endpoint according to the schedule you have set for them. Updates can be received from the Internet or from the ESM server acting as a caching proxy. You can choose to use either (or both) as part of the post-deployment policy configuration. Administrators can also update selected endpoints using the 'Update' button in the administrative interface or on the endpoint's 'Properties' tab.

Can I enable and disable individual components?

Yes. You can choose which components to install (AV/Firewall/Sandbox) during the initial setup or you may re-configure the components at any time thereafter.

Can I configure Endpoint Security Manager to use an existing database server?

Yes. Comodo's endpoint protection can use its embedded Microsoft SQL Express 2012 edition or can be configured to use an existing instance of Microsoft SQL 2005 or later (Express, Standard or Enterprise).

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Apple, Mac and OS X are trademarks of Apple Inc., registered in the U.S. and other countries.
Comodo's endpoint protection is not affiliated with Debian. Debian is a registered trademark owned by Software in the Public Interest, Inc.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.

System Requirements

Endpoint Protection Central Service computer - The host running the Endpoint Security Manager Server software

Hardware requirements

  • Dual-Core 1.8 GHz processor or better
  • 2 GB RAM (4GB recommended)
  • 15 GB free disk space if using SQL Express 2008/2012

Software requirements

  Operating system

   a) Microsoft Windows Server family:

  • Windows 2003 Server (SP2 or higher) x86 and x64 editions
  • Windows 2003 Small Business Server
  • Windows 2003 Small Business Server R2
  • Windows 2008 Server (SP2 or higher) x86 and x64 editions
  • Windows 2008 Small Business Server
  • Windows 2008 Server R2
  • Windows 2011 Small Business Server
  • Windows 2012 Server

  b) Microsoft Windows client family:

  • Windows Vista (SP1 or higher) x86 and x64 editions
  • Windows 7 x86 and x64 editions
  • Windows 8 x86 and x64 editions

Other supporting software (will be installed automatically if not present)

  • Microsoft .NET Framework 4.0
  • Microsoft ReportViewer 2010 SP1
  • Microsoft SQL Server 2012 Express LocalDB

Endpoint Protection Administrative Console computer - The computer that will run the management interface (this computer may also be the Central Service PC)

Hardware requirements

Sufficient to run any of the browsers listed below.

  • Microsoft Internet Explorer 10.0 or higher
  • Mozilla Firefox 21.0 or higher
  • Google Chrome 27.0 or higher
  • Comodo Dragon 27.0 or higher
  • Opera 12.x or higher
  • Safari 5 or higher
  • Maxthon Cloud Browser 4.x or higher

Other supporting software (will be installed automatically if not present)

  • Microsoft Silverlight 5.1

Display

  • Minimum 1024x768 display with windowed browser
  • Optional touch capable display interface and operating system

Comodo ESM Endpoints - Managed endpoints that will run Comodo Endpoint Security/Comodo Antivirus for Servers and host the endpoint protection agent

Hardware requirements

  • 1.2 GHz processor or better
  • 512 MB RAM (1GB recommended)
  • 420 MB free hard drive space

Software requirements

  Operating system

  a) Microsoft Windows client family:

  • Windows XP (SP3 or higher) x86
  • Windows Vista (SP1 or higher) x86 and x64 editions
  • Windows 7 x86 and x64 editions
  • Windows 8 x86 and x64 editions

  b) Microsoft Windows server family:

  • Windows 2003 Server (SP2 or higher) x86 and x64 editions
  • Windows 2003 Small Business Server
  • Windows 2003 Small Business Server R2
  • Windows 2008 Server (SP2 or higher) x86 and x64 editions
  • Windows 2008 Small Business Server
  • Windows 2008 Server R2
  • Windows 2011 Small Business Server
  • Windows 2012 Server

  c) Apple Mac OS X® client family:

  • Mac OS X 10.10
  • Mac OS X 10.6.8

  d) Debian Linux .deb family:

  • Debian x86 and x64 editions
  • Ubuntu x86 and x64 editions

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Apple, Mac and OS X are trademarks of Apple Inc., registered in the U.S. and other countries.
Comodo's endpoint protection is not affiliated with Debian. Debian is a registered trademark owned by Software in the Public Interest, Inc.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.

Licensing & Pricing

Comodo Endpoint Security Manager licenses are offered in 3 ways:

Free Trials

Basic Subscription

Premium subscription

For questions, demos, quotations or additional information please click here to contact us


Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Apple, Mac and OS X are trademarks of Apple Inc., registered in the U.S. and other countries.
Comodo's endpoint protection is not affiliated with Debian. Debian is a registered trademark owned by Software in the Public Interest, Inc.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.