- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Reduce the attack surface to remediate and patch
Fortify mobile devices that exit and enter your network
TECHNOLOGY & PROCESS
Keep endpoints safe from known threat signatures
Setup device network and security policies quickly
Patented to ensure absolute isolation from threats
Insights from deep web and dark web to eliminate risk
Our pioneered approach has shifted the industry
100% trust an all files at lightning speeds
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
SUPPORT, DEPLOY, MAINTAIN
Retain experts to investigate an incident to start remediation
Our experts closely monitor changes to your environment 24x7x365
Cybersecurity experts will continuously hunt suspicious endpoint activity
Ensure your installations are properly deployed
Trouble with maintaining your products? Get help now
Align your success with optimal security performance
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.COMPARE THE COMPETITON
Proactive updates for optimal securityView patches needed on devices, applications, and operating systems communicating with Endpoint Manager. Consolidate time, resources and efforts by centralizing your activities into one simple to use patch management system.
Keep your endpoints up to dateProtection against zero-day web threats, without hindering employee productivity. Detect 100% of unknown fileless threats with Comodo's intelligent file analysis engine. Apply our recommended policy, created upon a meticulous examination of threat behavior analytics.
Discover, Audit, Compliance- all-in-oneThe dashboard shows real-time data about the operating system, connection status and security posture of all devices enrolled to Endpoint Manager. The dashboard also lets you view threat results, notifications, and generate reports.
Configure any Major OS
Manage your device’s operating software to ensure Linux, Windows or Mac systems are optimized, protected and secured.
Recommended Security Policy
Each profile lets you specify a device’s network access rights, overall security policy, antivirus scan schedule settings.
Update your devices, OS, and 3rd party applications manually or automatically through one consolidated list.
The scan will identify both managed and unmanaged devices. You can configure EM to alert you if a scan finds new devices.
Our lightweight agent to collect information and drill down into incidents with base-event-level granularity.
Alerts and Notifications
Create procedures and monitors to track certain activities and generate an alert if their conditions are met.
Valkyrie Verdicting Engine
Conducts multiple arrays of run-time behavioral analysis against unknown files to provide a verdict of safe quickly and automatically or malicious.
Auto Containment Compatibility
Automatically runs from patented virtual container that does allow threats to access the host system’s resources or user data.
Bulk Device or User Enrollments
Push or rollback updates more efficiently with bulk installation area lets you download the communication package.