110 likes | 125 Views
Explore Comodo's pioneering Advanced Endpoint Protection, the milestone in combating endpoint malware. Discover the powerful Default Deny Platform and its Verdict system. Enhance security with Comodo's comprehensive security bundle.
E N D
ONE ENTERPRISE Default Deny in Today’s Default Allow World Michael Cimo Enterprise Account Manager Michael.Cimo@comodo.com
Our Mission Comodo’s New Advanced Endpoint Protection represents the vanguard of next generation solutions that mark a major milestone in the fight against endpoint malware Taking you to the promised land… “ *Gartner commenting on Comodo’s Default Deny Platform
About Us - 19 year old, profitable business Awards and Achievements - 185M+ Windows PC Installations Worldwide - #1 Global Issuer of Business Validated Certificates - 1200+ Employees, More than half Engineering- HQ in US, UK, China, India, Turkey, Romania, Philippines, and Ukraine- 600,000+ Business customers in over 100 countries worldwide- 8,000+ Business Partners and Affiliates - Platform Version v 5.5- Patent Portfolio of 250+ in Security & Identity Assurance Technology
Strong Customer Relationships Across Major Industries Healthcare Hosting Insurance Finance Manufacturing & Services Distribution & Transportation Pharmaceutical Technology Presidential Elections International Government State Government Education Entertainment Retail Travel
NEXT GENERATION DEFAULT DENY MODEL Ver·dict (vûr′dĭkt) • From the latin ‘ver’+‘dit’, literally ‘True Speech’ • An expressed conclusion; a judgement* • By definition, a Verdict is conclusive, decisive • NEXT GENERATION DEFAULT DENY MODEL BASICS: • If the Verdict is ‘Known Good’ then Allow • If the Verdict is ‘Known Bad’then Block • If Verdict is ‘Unknown’ then run in Automatic Containment • Automated Local & Global Analysis to Determine Verdict • Update Verdict locally, in future, no need to run in Container “There are only two types of companies, those that have been hacked and those that will be” -FBI Director Robert Muller (2012)
Next Generation Default Deny Example www.anysiteintheworld.com Updates Shadow Environment Memory Auto Containment CPU Crowd Sourced Threat Intelligence FileSystem F\ Registry Final Verdict Human Expert Analysis 3 hour SLA Valkyrie Cloud Based Verdict 45 Second Analysis
Comodo 360 Complete Security Bundle Endpoint Boundary Network
Comodo One Includes ultra-fast desktop sharing, full device takeover, full stealth monitoring, over-the air enrollment, anti-theft ‘sneak peak’, find-my-device, and more. Unlike many products which must be glued together by integrations, ITSM unifies mobile device, application and security Management. Security policies by device, user, group. Hardware and Software based inventory, global ‘unknown’ files running, global malware scanning, and more. Bulk or Selective Patch Management to push critical security and application patches to reduce risk from known exploits.
THANK YOU QUESTIONS?