Call (888) 256-2608

or Click Here for more help

Experience A Breach?

Secure Auto -Containment

Comodo has developed next-generation security based on virtualization to secure organizations from cyber attacks. In a way similar to the way virtualization transformed the IT datacenter, Comodo is using OS virtualization to transform the endpoint. Comodo solves an enterprise's toughest security challenges.

Enforced OS Virtualization

Comodo’s Secure Auto–containment technology uses CPU–enforced OS virtualization with a single container (OS virtualization) model‚ that includes an exact copy of the endpoint machine‚ including the kernel. This is one of the main reasons startup performance is so fast‚ in stark contrast to almost all CPU–draining‚ system–slowing “sandboxing” or “containers”. In the Comodo model‚ whenever a process or executable (PE) is run in containment (often referred to as “jailing”)‚ the analysis system sits between the PE and the shadow resources it calls – including CPU‚ memory‚ registry‚ file system and more. If the PE turns out to be malicious code and attempts to exploit the machine‚ that action will occur entirely within the container. It will only affect the shadow resources orovided in the container and not those of the native machine. Neither will it be able to access any of the native resources required to actually compromise the endpoint iself.

Containment: Combining Security and

This secure container protects the system from any attempted changes or theft of information while allowing the user to continue using their application. For example‚ it provides the granularity required to protect against modern attacks like drive–by download attacks. This type of attack can compromise the entire web browser‚ gain access to system resources and steal information from unsuspecting users. The same attack if targeted against a Comodo AEP user would only see the very limited set of resources necessary to perform the task on the specific Web–browser tab. Valuable data‚ networks and devices are filtered. When the user resets the container‚ all data including any malware is simply discarded.

Comodo’s Default Deny Platform is both designed to efficiently detect and prevent attacks in our tightly integrated model of Endpoint Protection Platform (EPP), Endpoint Detection & Response (EDR)‚ Secure Auto Containment and global threat intelligence‚ but has also been carefully architected to continue working if any individual component fails or is defeated.