Comodo: Cloud Native Cyber Security Platform

The latest news from Comodo

NEWS
  • Trusted by:

IHS Automation Chooses Comodo Advanced End Point Protection to Secure their RPA SaaS Environments

Clifton, NJ –News Direct– Comodo

IHS Automation chose to implement Comodo Dragon Platform and Advanced Endpoint Protection (AEP) to secure and protect their RPA SaaS environments. Each environment requires to adhere to strict security policies to ensure that all the data will be safe from ransomware and malicious web content.

“The reason we chose to implement Comodo’s solution is the reporting and alerts which create support tickets immediately when risks are identified, as well as the ability to create automated procedures with Python that enable us to not only solve infrastructure related issues, but also address specific issues encountered by the RPA tools.” Said Richard Gordon, Partner. “The best thing is the zero-trust policy of the security suite that helps ensure that we are protected from zero-day threats.”

Add video

Comodo’s zero-trust policy is delivering significant benefits for IHS Automation Customers. This leads to a significant reduction in expenses as the increased stability and performance of the bots result in the need for fewer VM’s and less time spent maintaining the automations by their development teams. “Using Comodo has significantly increased the performance of our services because of increased intelligent monitoring of the environments.” Richard continues. IHS Automation has implemented Comodo AEP by working with Comodo’s partner WorkAwayIT.

Dragon platform with Advanced Endpoint Protection, is a complete cloud-native framework that delivers a zero-trust architecture to protect and defend endpoints. Its patent-pending auto containment technology has active breach protection that neutralizes ransomware, malware and cyber-attacks. The auto containment runs an unknown executable in a kernel API virtualized mode, thereby offering attack surface reduction (ASR) which neutralizes ransomware attacks. The Dragon Platform also utilizes a Default Deny security posture with Default Allow usability to provide a most comprehensive protection against zero-day threats, while having no impact on end-user experience or workflows

About IHS Automation

IHS Automation connects disparate systems in to a single coherent process to leverage legacy technologies and systems. IHS Automation’s ideal customer needs to extract more value out of its legacy technologies. These systems are the lifeblood of your organization and replacing them at this time is just not an option. Yet, you and your employees spend many hours manually setting up appointments, verifying and scanning documents, reading through case histories, and entering data into systems. What’s needed in your organization is more complete and consistent information on customers and the ability to track metrics and analyze data, and optimize strategies and processes for better results. For more information visit https://www.ihsautomation.com/

About Comodo

Comodo is the world’s leader of next-generation open source cybersecurity, with the industry’s most disruptive innovations.

We help customers stop breaches with groundbreaking auto containment technology that neutralizes ransomware, malware and cyber-attacks. Our complete cloud-native framework delivers a zero-trust architecture with active breach protection for the most comprehensive defense against zero-day threats. Comodo’s cybersecurity products maximize intelligent sharing between every component of the platform, therefore providing superior security. We are the only company that analyzes and gives a trusted verdict for 100% of files on a network.

Comodo leverages innovation to celebrate and support the cybersecurity community by offering the very first open source endpoint detection and response (EDR). We believe that an open source model using community-powered collaboration will ensure that every organization has access to the industry’s most sophisticated EDR.

Headquartered in Clifton NJ, Comodo’s global development team and threat intelligence laboratories deliver innovative, category leading, security solutions for thousands of companies’ endpoints, network boundaries, and internal networks. For more information visit https://www.comodo.com/

Contact Details
Kobi Meir

+1 973-859-4000

kobi.benmeir@comodo.com

Company Website

Prevent Cybersecurity Breaches | Comodo Cybersecurity

Scroll to Top