Comodo: Cloud Native Cyber Security Platform

The latest news from Comodo

NEWS
  • Trusted by:
  • seal of utah
  • shell logo
  • samsung logo
news play icon

GLOBAL TECH SOLUTIONS GETS INDUSTRY-LEADING RANSOMWARE PROTECTION THROUGH COMODO PARTNERSHIP

Clifton, NJ – August 11, 2020 – Comodo and Global Tech Solutions today announced their strategic partnership. Global Tech Solutions provides a one-stop-shop for a wide array of first-class IT solutions specifically tailored to meet the individual needs of businesses.

“For over 25 years, we have provided trusted support and innovative solutions to solve organizations’ most important Information Technology issues. We are committed to ensuring every customer finds success through technological solutions that drive results,” said Jessy Nguyen, Founder and CEO, Global Tech Solutions. He continued, “We partnered with Comodo because we needed first-class solutions with robust features and functionality, in a simple dashboard, without high overhead cost.”

Global Tech Solutions choose Comodo’s Dragon platform with Advanced Endpoint Protection (AEP), a complete cloud-native framework that delivers zero-trust architecture to protect and defend endpoints. Its patent-pending auto containment technology has active breach protection that neutralizes ransomware, malware and cyber-attacks. The auto containment runs an unknown executable in a kernel API virtualized mode, thereby offering attack surface reduction (ASR) which neutralizes ransomware attacks.  The Dragon platform also utilizes a Default Deny security posture with Default Allow usability to provide the most comprehensive protection against zero-day threats, while having no impact on end-user experience or workflows. In addition, Comodo’s Valkyrie analyzes and gives a trusted verdict for every file – no other company will analyze and give trusted verdict for 100% of the files on a network

“Comodo’s Dragon platform gives us and our client’s relief knowing that endpoints will not be compromised by a ransomware attack or malware. We switched some customers from Webroot to Comodo because of the flawless and proactive threat protection and the cutting-edge auto-containment features. The complete solution set, which includes AEP, RMM, Service Desk, Mobile Device Management, and Secure Internet Gateway, has enabled us to offer streamlined and extensive features and functionalities without adding a high cost to us or our customers,” Nguyen continued.

Comodo’s platform shares intelligence and is therefore more secure than disparate products that claim best of breed but don’t share information. Comodo has architected its cybersecurity product to maximize intelligent sharing between every component of the platform, therefore providing superior security. This shift from reactive to proactive is what makes Comodo unique with the capacity to protect all domains of business activity and threat—from network to web to cloud—with confidence and efficacy.

Alan Knepfer, President and Chief Revenue Officer at Comodo says, “We’re constantly expanding our product and service portfolio to help our partners gain the technological advantage and edge over their competition.”

 

ABOUT GLOBAL TECH SOLUTIONS

We’re a team of IT experts dedicated to the success of your business. Global Tech Solutions proudly provides individualized tech services that help businesses thrive. Our keen focus on achieving customer satisfaction is derived from a desire to render a holistic understanding of our client’s technological needs and specifications. Through our dynamic services, we will help you leverage technology as a driving force to maximize your business’s profitability and long-term development. For more information visit https://www.myglobaltechsolutions.com/

 

ABOUT COMODO

Comodo delivers next generation cybersecurity solutions to protect businesses, schools, and government organizations in today’s risk filled business environment. Headquartered in Clifton NJ, Comodo’s global development team and threat intelligence laboratories deliver innovative, category leading, solutions for a company’s endpoints, network boundary, and internal network security.

Thousands of companies and organizations rely on Comodo’s technology to authenticate, validate, and secure their most precious asset—information—and to combat constant cyber attacks and threats like ransomware from wreaking havoc on a global scale. For more information about Comodo’s partner program, visit https://www.comodo.com/partners/

 

Carolyn Muzyka

VP, Marketing, Comodo

Carolyn.muzyka@comodo.com

www.comodo.com

Scroll to Top