A Leading Managed Services Provider Leverages Comodo’s Advanced Endpoint Security Solution to Protect and Secure Its Own – and Its Customers’ Environments
ORGANIZATIONS OF ALL SIZES NEED PROTECTION FROM MALWARE AND CYBERATTACKS
The One Point (www.theonepoint.co.uk) is a leading United Kingdom-based managed service provider with headquarters in Kingston Upon Hull, England. From business and mobile telecommunications to internet and digital services, The One Point provides a unified approach to all of its services, allowing customers to efficiently run their businesses without the hassle, cost and inconvenience of multiple security suppliers, vendors and solutions.
As part of a collaborative distribution and sales model, The One Point purchases technology software through its distribution partner VCW Security (www. vcwsecurity.com), a technology vendor specializing in marketing IT security solutions and services to enduser companies through the reseller channel.
A managed service provider, The One Point relies on IT security technology for both its own needs and those of its customers; so a potential malware or cyberattack vulnerability threatens not only their own internal systems, but quite possibly the entire company’s business operations and its customers’ as well.
The One Point logs and shares human resources records, payroll, company policies and procedures online. Additionally, it also houses most contracts, confidential agreements and licensing agreements on the company network – as well as the foundational network that runs the managed services solutions and projects for its customers all across the UK.
However, in an age of rampant cyber crime, when protecting personal and business information is more important than ever, organizations need new cyber security solutions designed to prevent attack, not just to detect, after the fact, that a virus or malware attack has occurred. The zero-day threat had become a real world challenge for the leadership team at The One Point, who feared that an unknown, rogue piece of malware lay undetected in their network.
So they turned to their partner VCW Security for an alternative endpoint security solution to avoid the day when malware would penetrate their environment and disable their day to day business – or worse.
“Like any company today that uses IT as a foundational means of sharing and exchanging information, we wanted to make sure our infrastructure was safe and protected from the thousands of pieces of malware that surface each day,” said Bryn Abbott, IT Solutions Account Manager at The One Point. “If our system is hit with any kind of malware, our environment could be crippled. We needed to find a business partner that could come in and help us to implement a secure solution that would fit our demands – as well as our budget.”
COLLABORATION WITH VCW FOR A SECURE SOLUTION
VCW Security started working with The One Point to find an alternate security solution that would be able to scale to the company’s infrastructure and keep them malware free. While evaluating other enterprise solutions, IT Solutions Manager Bryn Abbott was also testing Comodo’s Advanced Endpoint Protection technology in his own personal environment, as a consumer.
“I had started to test Comodo on my home computers and it was doing an excellent job of keeping all malware and rogue cyber hits away from my computers. After testing it out for over a month, I hadn’t been hit once and immediately started to work with VCW Security to look at Comodo as the solution that we could implement for my company and my enterprise overall,” said Abbott.
The One Point implemented Comodo Advanced Endpoint Protection in January 2014 and has remained malware free ever since.
One reason is that Comodo AEP utilizes a Default Deny Platform to provide complete protection for The One Point against zero-day threats, while having no impact on any end-user experience, workflows or productivity. Comodo AEP blocks all known malware and only allows known and trusted applications or executables through to run unchecked on the endpoint. All unknown or untrusted applications or executables are automatically wrapped in an isolated container which allows them to run (thus saving user productivity) but at the same time prevents any malware from gaining the access it needs to harm either the endpoint or its network, effectively blocking all new zero-day threats and APTs.
Comodo AEP is also integrated with Comodo’s local and cloud-based Specialized Threat Analysis and Protection (STAP) engine, implementing VirusScope on premises and Comodo Valkyrie in the cloud to verdict all unknown files through static, dynamic and, if needed, human analysis, leading to a verdict, on average, within 45 seconds - five to ten times faster than competing solutions. The unknown then becomes known to all Comodo users and will either be blocked if bad or allowed in if good, but won’t need to be contained again. As a result, Comodo AEP keeps files in containment for the shortest amount of time of any vendor in the industry.
The foundation of Comodo Advanced Endpoint Protection is Comodo Client, which includes antivirus, firewall, Web URL filtering, host intrusion prevention, containment and file reputation, and Comodo IT and Security Manager (ITSM). ITSM allows for the configuration of the security policies and visibility into the security infrastructure of enterprise endpoints through solutions such as mobile device management (MDM) and remote monitoring and management (RMM). Modular, lightweight and supported on virtually all Windows systems and servers, Comodo Client requires no specialized hardware and also includes a full endpoint protection (EPP) suite with host firewall, IPS and more while ITSM provides tightly integrated MDM, MAM and MSM, as well as RMM and Patch Management at no additional cost.
The Comodo ITSM dashboard is used by the IT team at The One Point for panoramic insight and to control all aspects of endpoint protection and management. Its streamlined interface displays critical metrics from all endpoints, facilitating rapid alerts and quick remediation of issues. The One Point’s IT System Administrators can also terminate endpoint processes, stop or start services, uninstall applications and delete unwanted files all without causing any undue interference to the end user.
“We have been thrilled with how Comodo’s Advanced Endpoint Protection solution fits into our IT environment. The central dashboard and monitoring allows us to save a tremendous amount of time identifying and containing any possible unknown risk – without threat or interruption to our users,” said Abbott. “Before Comodo, we were going through what seemed to be daily malware fixes and problems. Since installing Comodo, we’ve had zero malware or spyware issues. We don’t fear that unknown, zero day threat because we know Comodo’s advanced endpoint protection suite can handle anything the cyber criminals try and throw at it.”.
THE RIPPLE EFFECT: THE ONE POINT NOW IMPLEMENTS COMODO FOR ITS OWN CUSTOMERS
Having remained malware and infection-free across its network and endpoint, The One Point has now added cybersecurity to its customer suite of offerings and has implemented Comodo Advanced Endpoint Protection for its customers across a host of industries throughout the UK.
T&D Supplies (www.tdsupplies.co.uk), a metal fixing and fasteners company in the UK, was looking for a robust antivirus and Internet security solution. The company had previously been using a server managed AVG solution and were finding it to be resource hungry on their systems, while failing to block all malware. Taking advice from The One Point, T&D Supplies purchased the Comodo Advanced Endpoint Protection solution and have been completely satisfied. The company’s systems no longer slow to a crawl when scans are being carried out and they no longer have to wait for systems to stop scanning, increasing productivity, while remaining malware free.
Vobis (www.vobiset.com), a wealth management company, had been using free versions of AVG, which had failed to detect several inbound viruses. Management decided that they really needed a transparent, centrally managed solution, and looked for recommendations from The One Point. The recommendation was to install Comodo Advanced Endpoint Protection, which runs easily in the background of Vobis’ company systems with little or no overhead. Since deploying Comodo AEP, no viruses have been detected in their network at all.
Crown Windows (crownwindowshull.co.uk), a UK door and window company, was looking for a new endpoint management solution following a recent refresh of their server and IT systems. Crown, who had previously been using MacAfee, was looking for a solution that would require very little management and keep the network free from malware and cyber attacks. Based on the recommendation from The One Point, Crown also implemented Comodo Advanced Endpoint Protection. They are now confident that there have been no intrusions since and as manual updates are no longer required for day to day business operations, the business (and its network) runs smoothly, and without interference.
Comodo’s Advanced Endpoint Protection solution utilizes a Default Deny Platform to provide complete protection against zero-day threats, without negatively impacting usability for end users. All unknown processes and applications are automatically contained in a secure container, allowing safe applications the freedom to run while denying malware the system access they require to deliver their payloads. All unknown files are quickly judged to be bad or good and if bad, are deleted and added to the blacklist, and if good, are released from containment and added to the whitelist. Comodo Advanced Endpoint Protection provides the fastest verdicts in the industry, utilizes as little as 10MB of endpoint resources, and is hardware agnostic, unlike other competing solutions on the market today. Through the Default Deny platform and its ingenious, patent-pending containment system, along with consolidation of IT and security management, Comodo solves the malware problem, while saving money, hassle, and brand reputations for enterprises large and small.
The Comodo organization is a global innovator and developer of cybersecurity solutions, founded on the belief that every single digital transaction deserves and requires a unique layer of trust and security. Building on its deep history in SSL certificates, antivirus and endpoint security leadership, and true containment technology, individuals and enterprises rely on Comodo's proven solutions to authenticate, validate and secure their most critical information. With data protection covering endpoint, network and mobile security, plus identity and access management, Comodo's proprietary technologies help solve the malware and cyber-attack challenges of today. Securing online transactions for thousands of businesses, and with more than 85 million desktop security software installations, Comodo is Creating Trust Online®. With United States headquarters in Clifton, New Jersey, the Comodo organization has offices in China, India, the Philippines, Romania, Turkey, Ukraine and the United Kingdom.
For more information, visit www.comodo.com
Comodo and the Comodo brand are trademarks of the Comodo Group Inc. or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The current list of Comodo trademarks and patents is available at comodo.com/repository
Key Features and Benefits of Comodo Advanced Endpoint Protection
- Automated containment, Comodo VirusScope behavior and action analysis
- Static, dynamic and human analysis with Comodo Valkyrie
- A multi-layered defense suite that includes host firewall, HIPS, Web URL filtering, file reputation, jailing protection, certificate-based whitelisting, and persistent VPN
- Unified management of Android, iOS, and Windows enabled devices
- Fully integrated device management, application management and device security
- Enterprise-wide visibility of all running unknown contained processes or executables
- Enterprise-wide, on-demand scanning for malware
- Patent-pending containment technology which prevents zero-day malware attacks