DRAGON
ENTERPRISE
Get the latest cybersecurity technologies as a fully managed or standalone to complete your end to end security experience in preventing threats at run-time.

Threat Hunting
Get access to security analystz and forensic analystz to give the best service to your customers. Our SOC team runs threat hunting with real-time threat intelligence monitoring, correlating all events with threat intelligent feeds, and detects any threat before it has been executed.
Vulnerability Assessment
Vulnerability scanner that you can correlate information for your assets. You no longer have to run other vulnerability scans on your customers’ network.
Single pane-of-glass view
Centralize your IT operations, security operations, cybersecurity offerings, professional service automations and cloud connections. Receive alert management, co-managed SIEM, and endpoint protection for all your customers in a single pane of glass view.
Multi-tenancy Support
Built with multi-tenancy as its core. You can manage all your customers and their incidents on the same dashboard.
Network Sensors / Managed IDS
Network Security Monitoring and Managed Intrusion Detection System (IDS) to detect threats on your customer’s network. Sensors can be installed with no down time. Our Customer Success team personally walks you through the process to ensure your success.
Log Ingestion
Firewalls, IDS/IPS, Active Directory, and server logs. SOCaaP integrates and translates many different logs into a common log model. It makes your logs searchable, interpretable, and reportable. Build alerts tailored to you and get notified in real-time.
Incident and Response
with Managed SOC
with Managed SOC
Real incidents will be escalated to you and our SOC will be there to help you through the response process. We have multiple SLAs to fit your needs.
Compliance Reporting
SOC2, HIPAA, PCI, and CMMC – we support compliance reporting for monitoring and response.
Customer and Asset Management
Built from the ground up with multi-tenancy, you can manage your customers and their assets in a single pane of glass view. Being integrated with your favorite PSA tools enables zero-time onboarding.
Microsoft O365 &
G Suite Monitoring
G Suite Monitoring
SOCaaP integrates with MS/Office 365 & GSuite, monitors your privileged accounts, and detect threats over your company cloud assets .
Patch & Vulnerability Management
SOCaaP detects unpatched applications and vulnerabilities in your customers environments and patches them for you. Our SOC will assist you in running the most efficient patch and vulnerability management program for your customers.
PSA Ticketing
SOCaaP integrates with PSA systems. Our SOC analysts investigate each alert, triage the data, and create a ticket to your PSA system attached with the response details, so you can focus on your operation.
Dragon ENTERPRISE

ENDPOINT

CLOUD

NETWORK

INTERNET

MANAGED
Zero Breaches. Zero Downtime. Zero Damage.
Why Zero Dwell Time Matters
When it comes to securing your enterprise endpoints, it’s important to have a understanding of the issue that detection-based solutions will never detect 100% of what is malicious, or 100% known to be good. Unknown files may be perfectly harmless and required for system functionality or they may be dangerous zero-day threats or APTs that cause mega breaches. Your cyber security solution must be able to detect the difference to both prevent breaches and enable productivity. Comodo’s Patented Auto Containment technology defeats zero-day attacks with no impact to the end user experience, unlike any other security technologies on the market today.
100%
Threats Prevented
at Runtime
at Runtime
100%
Cybersecurity
Scalability
Scalability
0
Ransoms
Paid
Paid
0
Endpoints
Infected
Infected

Control your security impact
A single unified endpoint solution offering exploit prevention, advanced threat hunting,
and endpoint management to stop ransomware, avoid breaches, and sustain your business.
and endpoint management to stop ransomware, avoid breaches, and sustain your business.

Refine Granular Security Policies
Equip every endpoint, network, and workload with specific network access rights, rules and antivirus scan schedule settings.

Deploy and Administrate
Start protection instantly. SOC2, HIPAA, PCI, and CMMC – we support compliance reporting monitoring and response.

Full Control
and Visibility
Centralize your IT operations, security operations while receiving notifications for client security updates for full control.

Broad OS
Coverage
Get the support you need for legacy or modern versions of Linux, macOS, Windows.
Prevent your damage impact
Don’t be held ransom by finding tomorrow’s cyber threats. Empower your endpoints,
network, and workloads by protecting your environments with 100% effectiveness.
network, and workloads by protecting your environments with 100% effectiveness.

Cloud-Based Security Updates
Equip every endpoint, network, and workload with the latest threat intelligence against cyber threat signatures and payloads.

Protect Against
Unknown Threats
Defense against new or zero-day cyber threats using powerful static, dynamic, and patented behavioral AI.

Patented Auto
Containment™
Prevent unknown cyber attacks from causing damage to your endpoints with our lightweight Kernel-level API virtualization.

Attack Chain Visualizations
Gain full context of an attack to connect the dots on how hackers are attempting to breach your network.
Excellence in the Industry
Comodo solutions and services are recognized by leading industry associations, authorities,
and analysts. Our innovative technologies are securing organizations worldwide.
and analysts. Our innovative technologies are securing organizations worldwide.

IT and Security
Management Platform
2018 Trust Award
Best Managed Security Service
2019
Finalist Threat Intel Technology

Endpoint Protection
60x | Awards in Firewall
4.2 /5 Rating for Endpoint Protection Platform
4.3 /5 Rating for Advanced Endpoint Protection
4.5 /5 Rating for Endpoint Detection and Response

Advanced Endpoint Security and Internet Security
Last test: March 2022
Recent result: 100%
2x | 2022 Excellence Award
Total awards granted: 16
Product of the year: 2021, 2020

Endpoint Protection
100% in protection against 0-day malware attacks, inclusive of web
and email threats.
100% in the detection of widespread and prevalent malware discovered in the last 4 weeks.
100% in the detection of widespread and prevalent malware discovered in the last 4 weeks.

Malware Protection
Comodo Advanced Endpoint Protection can protect against the unknown file and solves the malware problem


