COMODO ANNOUNCES PLANS TO OPEN SOURCE ENDPOINT DETECTION AND RESPONSE (EDR) PRODUCT
Comodo, the world’s leader of next-generation cybersecurity will make its Endpoint Detection and Response (EDR) product available as open source. It will be available on GitHub shortly.
“We are offering our EDR as open source because we feel strongly that as cyber-threats increase, every company should have access to this capability regardless of budget or ability to purchase it,” said Alan Knepfer, President and Chief Revenue Officer at Comodo. He continued, “Our competitors offer endpoint protection that falls short of protecting customers, and then charge additional for EDR capability. This kind of pricing strategy from cybersecurity vendors will weaken the cybersecurity resources available to enterprises. The model of charging for multiple layers because they fail in protecting customers is not a healthy business model for the long term. We are putting an end to that by open sourcing the world’s most sophisticated EDR.”
Comodo’s EDR provides continuous real-time visibility of endpoints with detection & response. With the Open Source EDR product an organization’s IT team can identify attacks with the accurate root-cause analysis for effective remediation intelligence. It is a sophisticated endpoint agent that uses adaptive event modeling and allows logs to be sent to an elastic database and connect to systems like Kibana for visualization and reporting.
In addition, a set of Indicators of compromise (IoCs) will be available and open for the community to create and deploy their own IoCs. An extensive rule engine will also be provided for collection of endpoint events, enrichment and detection.
Comodo delivers next generation cybersecurity solutions to protect businesses, schools, and government organizations in today’s risk filled business environment. Headquartered in Clifton NJ, Comodo’s global development team and threat intelligence laboratories deliver innovative, category leading, solutions for a company’s endpoints, network boundary, and internal network security.
Thousands of companies and organizations rely on Comodo’s technology to authenticate, validate, and secure their most precious asset—information—and to combat constant cyberattacks and threats like ransomware from wreaking havoc on a global scale. For more information visit https://www.comodo.com/