• For Business
  • For Home
  • For Partners
  • Experienced a Breach?: 1-888-551-1531
  • Contact
  • Blog
  • English
  • Sign In▾
    • [US] Dragon Platform
    • [EU] Dragon Platform
    • [US] Dragon Enterprise
    • [EU] Dragon Enterprise
Comodo Logo
  • Products
    Dragon Enterprise

    Comodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.

    Dragon Platform Overview

    Patented Threat Prevention

    Product Bundled Packages

    Platform Modules
    • Advanced Endpoint Protection

      Impenetrable cybersecurity without sacrificing usability

    • EDR

      Gain detailed visibility into all your endpoints activities

    • Endpoint Manager

      Reduce the attack surface to remediate and patch

    • Mobile Device Security

      Fortify mobile devices that exit and enter your network

    • Comodo NGAV

      Keep endpoints safe from known threat signatures

    • Comodo MDM

      Setup device network and security policies quickly

    • Secure Web Gateway

      Defend from any internet based threats

    • Secure Email Gateway

      Stop email threats before it enters your inbox

    Technology & Process
    • Auto Containment

      Patented to ensure absolute isolation from threats

    • Global Threat Intelligence

      Insights from deep web and dark web to eliminate risk

    • Zero Trust Architecture

      Our pioneered approach has shifted the industry

    • 45 Second Verdict Engine

      100% trust an all files at lightning speeds

  • Services
    Worldwide Services

    No one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.

    Request a demo

    Get Emergency Help

    Threat Services
    • Digital Forensics and Incident Response

      Retain experts to investigate an incident to start remediation

    • Managed Detection and Response

      Our experts closely monitor changes to your environment 24x7x365

    • Managed Threat Hunting

      Cybersecurity experts will continuously hunt suspicious endpoint activity

    Support, Deploy, Maintain
    • Comodo Professional Services
    • Comodo Support Services
    • Comodo Customer Success Management
  • Tools
    • Forensic Scan Tool
    • Security Scorecard
    • Live Threat Map
    • Open-source EDR
    • Zero-Day Malware Hunter
    • Vendor Vulnerability Report
  • For Home
    For Home
    SECURITY
    • Comodo Internet Security
    • Antivirus Software
    • Mobile Security
    WEB BROWSER
    • Dragon Browser
    BROWSER ADD-ONS & EXTENSIONS
    • Security Plugins
  • Partners
    • Partner Program
    • SOC Platform Overview
    • Begin Partner Application
    • Partner Portal Login
    • Deal Registration
  • Resources
    Resource Discovery

    Comodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.

    Knowledge Base
    • Case Studies
    • Webinars
    • Help Guides
    • Videos
    • Forums
    Threat Labs
    • Data Statistics
    • Threat Map
    • Emerging Threats
    • Plugins
    • APIs
    Compare the Competition
    • Compare Crowdstrike
    • Compare Cylance
    • Compare SentinelOne
    • Compare Sophos
    • Compare TrendMicro
    • View All Comparisons
    Cybersecurity 101 Guides
    • Buyer's Guide to EPP
    • Buyer's Guide to Zero Trust
    • Lessons from Re-EVIL's Return
    • K-12 Ransomware Guide
    • Upgrade your MSP to MSSP
  • Company
    • Press
    • News
    • Leadership
    • Customers
    • Careers
    • Contact
  • REQUEST DEMO
REDIRECT NOTICE

You are now leaving our web site being redirected to a third party web site operated by Sectigo Ltd.

Sectigo Logo
Continue to Sectigo Cancel

Products
  • Platform Overview
  • Patent Threat Prevention
  • Advanced Endpoint Protection
  • EDR
  • Endpoint Manager
  • Mobile Device Security
  • Mobile Device Management
  • Secure Internet Gateway
  • Secure Email Gateway
Services
  • Managed Detection & Response
  • Digital Forensic & Incident Response
  • Managed Threat Hunting
  • Customer Success Management
  • Guided Professional Services
  • Customer Support
Tools
  • Forensic Scan Tool
  • Security Scorecard
  • Live Threat Map
  • Open-source EDR
  • Zero-Day Malware Hunter
  • Vendor Vulnerability Report
Company
  • Experienced a Breach?
  • Contact Sales
  • Contact Support
  • Request a demo
  • Blog
  • Press
  • Customer
  • News
  • Careers
  • Partners
comodo cybersecurity logo footer

Headquarters
200 Broadacres Drive,
Bloomfield, NJ 07003
United States

  • Tel: +1 (888) 551-1531
  • Tel: +1 (973) 859-4000
  • Fax: +1 (973) 777-4394

Inquire:
sales@comodo.com

Support:
support@comodo.com

Report Bugs: security@comodo.com


© 2025 Comodo Security Solutions, Inc. All rights reserved.

  • Terms & Conditions
  • Privacy Policy
  • Legal Repository
  • Cookie Policy
  • linkedin
  • fb
  • twitter
  • youtube