- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Reduce the attack surface to remediate and patch
Fortify mobile devices that exit and enter your network
TECHNOLOGY & PROCESS
Keep endpoints safe from known threat signatures
Setup device network and security policies quickly
Patented to ensure absolute isolation from threats
Insights from deep web and dark web to eliminate risk
Our pioneered approach has shifted the industry
100% trust an all files at lightning speeds
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
SUPPORT, DEPLOY, MAINTAIN
Retain experts to investigate an incident to start remediation
Our experts closely monitor changes to your environment 24x7x365
Cybersecurity experts will continuously hunt suspicious endpoint activity
Ensure your installations are properly deployed
Trouble with maintaining your products? Get help now
Align your success with optimal security performance
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.COMPARE THE COMPETITON
ARE HACKERS PROFITING FROM YOUR CORPORATE DATA ON THE DARK WEB? COMODO OFFERS FREE COMPANY THREAT ANALYSIS TO HELP ENTERPRISES FIND OUT
Zero-day Pony malware, hacked executive accounts and leaked customer credentials: just some of the shocking discoveries made so far
CLIFTON, N.J.– May 9, 2017– Zero-day Pony malware bypassing an organization’s ineffective endpoint security system and gaining access to credentials for 90 applications. A university shocked that its president’s accounts had been infiltrated. One company floored that its vice president of human resources was breached. Another stunned that hundreds of its customers’ login portal usernames and passwords were stolen. Could this be happening to you?
Comodo, a global innovator and developer of cybersecurity solutions and the worldwide leader in digital certificates, helped the companies above—and can help yours—find out. The firm is offering enterprises with 1,000+ employees a free ‘Company Threat Analysis’ to determine if their sensitive information is for sale on the Dark Web and, if so, how to prevent compromises from happening again.
According to Ponemon Institute, in 2016, a single stolen record cost companies $158. Data breaches overall, however, set companies back approximately $4 million, on average. Black hat hackers don’t care if they hurt your organization, as your stolen data becomes their revenue source on the Dark Web—but you should.
Comodo’s personalized reports identify if an enterprise’s information has been stolen and dive into how this data became available to cybercriminals in the first place—for example, via credentials stolen from direct network access or data breaches from third-party applications. For each instance, the affected company gets the chance to review a sample of the leaked credential records and details on the attack processes, to help them understand what went wrong.
Jerald Nine, director of threat intelligence for Comodo, explained what incriminating mistake he sees most frequently, “Most company employees use the same password for multiple sites and accounts. If their networks are infiltrated by hackers, it becomes extremely easy to gather legitimate credentials that can get cybercriminals into high-value accounts. Pony malware, for example, which we recently discovered during one of these analyses, can affect insurance and benefit, payroll and social media sites—all of which house appealing credentials for buyers on the Dark Web.”
Large companies are typically more vulnerable to these zero-day “Pony” malware attacks, because they have more employees and may be specifically targeted by attackers. Hackers may believe that they have more to gain targeting larger organizations.
In addition to the actual attack vector, the threat analysis assesses business risk specific to the company, such as internal data loss and customer impersonation login risks. This leads to an overview of the current cyber risk state of the company, including potential legal impacts.
Most importantly, the report concludes with actionable advice—technological recommendations on how to fill the security gaps discovered.
“It is clear that the traditional anti-virus industry has not been able to identify malware and create signatures fast enough to keep up,” said Nine. “Traditional attempts to isolate malware at the endpoint use a default-allow approach and resource-intensive virtualization or sandboxing technologies that reduce endpoint performance. These have proven unworkable in most deployments.”
Comodo’s free ‘Company Threat Analysis’ not only offers interested parties the opportunity to discover vulnerabilities in their personal or company systems, it can educate them on how Comodo’s solutions can solve the problems of endpoint solutions past.
Comodo Advanced Endpoint Protection, based on the firm’s unique, true default-deny platform, allows the known good files, blocks the known bad files, and then isolates the unknown files in automatic containment in a virtual environment on the endpoint. Usability is never impacted, and the endpoint and network are always protected and secure—keeping sensitive data out of hackers’ hands and off the Dark Web. More information is available online at https://enterprise.comodo.com/advanced-endpoint-protection.
Curious about your company’s standing? If your organization has 1,000+ employees, sign up for a personalized, Comodo ‘Company Threat Analysis,’ at https://threatanalysis.comodo.com/.
The Comodo organization is a global innovator of cyber security solutions (SSL certificates, virus removal software, endpoint protection programs etc), protecting critical information across the digital landscape. . Building on its unique position as the world’s largest certificate authority, Comodo authenticates, validates and secures networks and infrastructures from individuals to mid-sized companies to the world’s largest enterprises. Comodo provides complete end-to-end security solutions across the boundary, internal network and endpoint with innovative technologies solving the most advanced malware threats, both known and unknown. With global headquarters in Clifton, New Jersey, and branch offices in Silicon Valley, Comodo has international offices in China, India, the Philippines, Romania, Turkey, Ukraine and the United Kingdom. For more information, visit comodo.com.
Comodo and the Comodo brand are trademarks of the Comodo Group Inc. or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The current list of Comodo trademarks and patents is available at comodo.com/repository.
Keep up to date with the latest Comodo News from the Comodo blog at https://blog.comodo.com/ and on Twitter @ComodoNews.
Connect with Comodo on LinkedIn at https://www.linkedin.com/company/comodo.
For more information, media and analysts may contact:
Montner Tech PR