Monday, December 21, 2009

Comodo Endpoint Security Manager Now Integrates Disk Encryption

At no added charge, action IT managers can now arrange Comodo Disk Encryption with Comodo's Endpoint Security Manager, a centralized administering animate for business networks.

12,000 laptops are absent or baseborn in US airports every week, according to a abstraction by the Ponemon Institute. Many of them accord to accumulated travelers, whose IT professionals are larboard to anguish that the absent advice they absolute ability be misused. If the alignment had deployed deejay encryption, they ability accept absolved themselves hours of affliction and banking penalties.

Root encryption, and whole- or partial-disk encryption settings acquiesce IT managers to assure stored information. With Comodo Endpoint Security Manager, every computer in the aggregation can now be encrypted and protected.

Encryption uses a algebraic algorithm to change computer files into gibberish that alone the computer buyer or agent can change aback into clear characters. Encryption can cover the absolute computer disk, or alone locations of it.

Typical encryption software, as a book stored on the computer, is alone advantageous afterwards the operating arrangement is started.

With Comodo's basis drive encryption, aegis settings anticipate the operating arrangement from starting for an crooked user. The analytical instructions that admittance the operating arrangement to alpha are stored in a basic drive accepted as the basis drive. With the basis drive encrypted, a bandit or a hacker cannot use the computer, preventing crooked acceptance to an abandoned or baseborn computer.

Encrypted sectors will alone apprehend their instructions afterwards the computer users prove their identities. Proof of character can appear in three forms

* The user enters a password, acceding the computer to cossack up
* The user inserts a appointed USB key
* The user employs two-factor affidavit by both accouterment a countersign and a USB key

Besides deejay encryption, Comodo Endpoint Security Manager supports the limited administration of Comodo's award-winning firewall and antivirus. The Comodo firewall boasts a Host Intrusion Prevention System (HIPS) with Default-Deny Protection™. Whenever an executable tries to install itself, the HIPS checks Comodo's proprietary whitelist of files accepted to be safe—a account that is bound abutting 5,000,000 advertence files. If it does not acquisition the book on the whitelist, the Comodo HIPS quarantines the book until the user has a adventitious to adjudge whether or not to admittance it to install.

"Between deejay encryption and Comodo's Default-Deny Protection™, computer managers can assure their absolute networks, whether computers are physically tethered to servers or canoeing 30,000 anxiety in the air," said Melih Abdulhayoglu, CEO and Chief Security Architect of Comodo.

"Comodo Endpoint Security Manager's centralized administering is expedient in accustomed times, eliminating the charge for a lot of desk-side visits. And in demanding times, the adeptness to amend aegis settings for groups or for the absolute aggregation is a able benefit."

"Boot area encryption is admired for laptops, but abounding enterprises would account from the added aegis for desktop computers as well. If the advice on your computer is as admired as your car, you ambition a key to about-face on your computer."

About Comodo
Comodo is a arch casting in Internet security, accoutrement an all-encompassing ambit of aegis software and services, including agenda certificates, PCI scanning, desktop security, online faxing, and computer abstruse abutment services.

Businesses and consumers common admit Comodo as continuing for aegis and trust. Comodo articles defended and accurate online affairs for over 200,000 business and accept added than 18,000,000 installations of Comodo desktop aegis software, including an award-winning firewall and antivirus software offered at no charge.

The Comodo ancestors of companies is committed to around-the-clock innovation, amount competencies in PKI, authentication, and malware apprehension and prevention. As a agitator in eliminating online crime, the companies' mission is to authorize a Trusted Internet.

With US address overlooking Manhattan on New Jersey's waterfront, and all-around assets in United Kingdom, China, India, Ukraine, and Romania, Comodo articles action able security, authentication, and assurance.

Comodo -- Creating Trust Online®. For added information, appointment Comodo's website.

For added information, reporters and analysts may contact:
Comodo -- Creating Trust Online®
Email: media-relations@comodo.com
+1 (201) 963 0004 x4073

No comments:

Post a Comment