Q. How does the Comodo Threat Intelligence Lab gather the data for analysis?
A. The Lab continuously monitors and analyzes files and data from over 85 million endpoints under management in over 190 countries and also utilizes partners in academia, government and industry to gain additional insights into known and potential threats.
Q. Does the Lab share what it learns about new threats?
A. Yes, after analysis is completed and a specific new type of malware, ransomware, etc. is confirmed, that information is shared with partners in the industry. Most of the intelligence is also provided freely for any party interested and willing to get the intelligence data.
Q. How do you protect the Lab and connected entities from the threats you analyze, including zero day attacks?
A. The Lab utilizes state-of-the-art containment (CPU-enforced OS Virtualization) technology to secure all unknown, and therefore potentially dangerous, files such that they can be analyzed in our safe, non-connected Lab environment.
Q. Is this “Containment” technology available to protect organizations as well?
A. Yes, a form of this technology is used to protect Comodo customers and has proven to be 100% effective in protecting them.
Q. Is the Lab affiliated with CTRL (Comodo Threat Research Labs)?
A. Yes, the Comodo Threat Intelligence Lab is a key part of Comodo Threat Research Labs (CTRL) and the team often works together with their counterparts on projects, to co-author papers and reports, etc.
Q. What is the best way to get the latest new insights, findings, and other important threat intelligence updates from the Lab?
A. The only way to ensure you receive the latest information from the Lab is to register to subscribe for the COMODO THREAT INTELLIGENCE LAB UPDATE; it includes your weekly video update and may include special reports and other timely updates.
Q. Is there a cost for the COMODO THREAT INTELLIGENCE LAB UPDATE subscription or its content?
A. No, there is no cost for the subscription and all UPDATE content is free for subscribers.