- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
TECHNOLOGY & PROCESS
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Reduce the attack surface to remediate and patch
Fortify mobile devices that exit and enter your network
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.
Comodo and CONDYN Announce Strategic Partnership Information Security Solutions Integrator Decided to Drop Bitdefender
Clifton, NJ – August 6, 2020 –
Comodo and CONDYN today announced their strategic partnership. CONDYN, an internationally accredited risk, and compliance solutions provider has partnered with Comodo to expand its security services offering. Comodo displaced the incumbent, Bitdefender.
“CONDYN is focused on providing technologies that protect organizations from outside and inside threats. Our approach is to find solutions that are comprehensive and address our clients’ needs. Silo solutions are expensive and often lead to security gaps due to integration challenges,” said Jorina van Rensburg, Managing Director, CONDYN.
CONDYN chose Comodo’s Dragon platform with Advanced Endpoint Protection (AEP) which is a complete cloud-native framework that delivers a zero-trust architecture to protect and defend endpoints. Its patent-pending auto containment technology has active breach protection that neutralizes ransomware, malware, and cyber-attacks. The auto containment runs an unknown executable in a kernel API virtualized mode, thereby offering attack surface reduction (ASR) which neutralizes ransomware attacks. Comodo’s Dragon Platform also utilizes a Default Deny security posture with Default Allow usability to provide comprehensive protection against zero-day threats while having no impact on end-user experience or workflows. In addition, Comodo’s Valkyrie analyzes and gives a trusted verdict for every file – no other company will analyze and give a trusted verdict for 100% of the files on a network
CONDYN also chose Comodo’s Secure Internet Gateway (SIG), which protects against web threats and regulates web browsing activities for users in any location, on any device, with full visibility.
“CONDYN strongly believes in several criteria that need to be adhered to in the value chain, including an open and transparent relationship. Value chain models must support local partners with ease of use and at the right price. Comodo fit our criteria with its cutting-edge auto containment solution that verifies 100% of unknown executables to prevent damage, strong support, a good understanding of MSPs and turnaround times, and backed by guarantees on the offerings,” continued Jorina.
“In security, intelligence is everything. A platform that shares intelligence is more secure than disparate products that claim best of the breed but don’t share information,” said Alan Knepfer, President and Chief Revenue Officer at Comodo. He continued, “Comodo has architected its cybersecurity product to maximize intelligent sharing between every component of the platform, therefore providing superior security.”
CONDYN is an internationally accredited risk and compliance solutions provider that prides itself on delivering superior risk and compliance solutions to both corporate and government businesses in Sub-Saharan Africa. Our mission is to stop fraud and corruption in its tracks while at the same time protecting organizations and individuals alike against the outside threat.
Comodo delivers next-generation cybersecurity solutions to protect businesses, schools, and government organizations in today’s risk filled business environment. Headquartered in Clifton NJ, Comodo’s global development team and threat intelligence laboratories deliver innovative, category-leading, solutions for a company’s endpoints, network boundary, and internal network security.
Thousands of companies and organizations rely on Comodo’s technology to authenticate, validate, and secure their most precious asset—information—and to combat constant cyberattacks and threats like ransomware from wreaking havoc on a global scale. For more information about Comodo’s partner program visit https://www.comodo.com/partners/mssp/