Call (888) 256-2608

OR

Chat With an Expert

Experience A Breach?

What is Endpoint Security?

FREE TRIAL

Endpoint Security is the methodology of protecting corporate networks by securing all endpoints and endpoint devices that are used to access the networks. Any device that's used to connect to a network, including mobile devices, laptops, wireless devices etc, would create potential entry points for malware and all kinds of security threats. Endpoint Security units consist of centrally managed security software plus client software, which would be installed on endpoints/endpoint devices.

How Advanced Endpoint Security Works?

Advanced Endpoint Security works by using the Default Deny Platform™. It blocks bad files and automatically contains unknown files in a virtual container, using containerization technology. Here's a step by step description of how it works

  • Comodo's VirusScope technology helps analyze unknown files at the endpoint, for malicious behavior and actions.
  • Comodo Valkyrie provides a cloud-based accelerated verdict in about 45 seconds. This is based on static, dynamic and human analyst interaction.
  • Malware files get removed while good files are allowed to run on the endpoint CPU. The unknown files are contained in the lightweight virtual container on the endpoint; they would be subjected to real-time analysis as well.

It just takes about a minute to provision Advanced Endpoint Security and it uses very less of CPU resources; it requires an endpoint footprint of just about 10 MB.

Comodo Advanced Endpoint Security assures total security for all kinds of endpoints- physical and virtual- for all kinds of enterprises.

Comodo Advanced Endpoint Protection provides complete protection against zero-day threats through its Default Deny Platform.

Advanced Endpoint Security

Comodo Advanced Endpoint Protection provides complete security for physical and virtual endpoints. The lightweight, scalable platform offers outstanding default deny security with default allow usability. It combines a unified IT and Security Manager (ITSM) console, an automated unknown and advanced threat container (Comodo Client), and the Valkyrie cloud-based advanced malware analysis platform.

Default Deny Platform – a lightweight, scalable platform that blocks bad files and uses unique containerization technology to automatically contain unknown files in a virtual container.

VirusScope – a technology to analyze unknown files for malicious behavior at the endpoint.

Comodo Client – prevents, detects, responds and remediates both known and unknown advanced threats by leveraging a patent-pending automated container and a multi-layer, modular approach.

ITSM – a unified console that provides the status of all devices and their security. Administrators will have real-time visibility for effective and secure device management.

Valkyrie – a cloud-based advanced malware analysis platform that provides static, dynamic and expert-human analysis of all the submitted files.

Endpoint Security is the methodology of protecting corporate networks by securing all endpoints and endpoint devices that are used to access the networks. Any device that's used to connect to a network, including mobile devices, laptops, wireless devices etc, would create potential entry points for malware and all kinds of security threats. Endpoint Security units consist of centrally managed security software plus client software, which would be installed on endpoints/endpoint devices.


Comodo AEP is integrated with Comodo’s Specialized Threat Analysis and Protection (STAP) engine which provides an Accelerated Verdict of the unknown files, sorting them into known good, or known bad.

The extremely lightweight automated containment technology based on patent-pending CPU-enforced OS virtualization technology contains all untrusted processes and applications in a secure virtual environment, where they are analyzed in real time.

The Default Allow Usability feature ensures that it has no impact on end-user experience or workflows.

The unique containment technology ensures that unknown files are kept in containment for the shortest time compared to any other solution on the market. Further, unlike other containment solutions, Comodo’s automated containment technology is application agnostic.


Learn More Speak With A Solutions Expert FREE Trial