Comodo: Cloud Native Cyber Security Platform

Auto Containment to Block Zero-day Malware Instantly

Auto-containment services to prevent unknown threats from damaging endpoints at runtime. This solution is available through our SaaS management console, endpoint client agents, and service delivery from the Comodo Threat Research Labs (CTRL) and Valkyrie, our file safety determination service.
EDR

Eliminate Threats that bypass
detection Using Auto Containment

Isolate unknown executables and other files that request runtime privileges are automatically run
in a virtual container that does not access endpoints and host system’s resources or user data.

AUTO CONTAINMENT INSTANTLY PROTECTS ENDPOINTS FROM THREATS AND DAMAGE

Manage Risks
Completely Stop Malware

Move from Detection to Prevention With Auto Containment™​ to isolate infections such as ransomware & unknown threats. ​ Any endpoints with the Client agent installed will always verify 100% of unknown executables to prevent any damage to your endpoints. Allow unknown files to safely run on endpoints, without write access to the critical components.

Actionable Intel
Cloud-native updates via the client

Auto Containment is quickly deployed through our client security. It won’t heavily impact endpoint performance. End users enjoy seamless productivity, with the ability to run any unknown file virtually, even while the file is in analysis.

Frictionless Communication
Backed by Threat Research Labs

Through the Valkyrie Verdicting engine, results are published globally in real-time for all Comodo customers. Using a combination of multiple AI environments and human security specialists, you will never be exposed to the damage of cyber threats through true zero trust architecture.

threat intelligence integrations
Get Deep Insights into the Dark Web
Receive highly refined internal & external threat intelligence feeds to alert or block on Indicators of Compromise​. Incorporate your companies own internal intelligence into Comodo’s Dragon Enterprise for added coverage​. Complete Valkyrie integration for checks on process execution via MD5 hash submission​.
Patented Auto Containment
Prevents 100% of unknown threats instantly through denying write access privileges of any unknown- unknown threats
NGAV & Award-winning Firewall
Powerful real world antivirus to automatically detect, cleanse and quarantine suspicious files
Fileless Malware Protection
Protection against fileless malware payloads that bypass any traditional antivirus
Virus Scope Behavior Analyzer
Closely monitors behavior anomalies of all processses to identify any potentially harmful actions before they happen
Predefined Security Profiles
Keep incoming threats out as well steer clear of any suspicious threats going outbound
Malicious Script Analysis
Continuous monitoring of operating system activities to detect intrusions before any trespassing can occur
Valkyrie Threat Intel Analyzers
Real time static and dynamic scans across the cloud, deep web, and dark web for unknown threats against your organization
Comodo File Reputation Lookup
Cross reference any file’s threat reputation against one of the world’s largest whitelist and blacklist threat intelligence
Cloud Based Updates
New malware signatures are consistently delivered through the cloud to ensure both security and optimal user performance
Scroll to Top