Monday, December 21, 2009

Comodo Endpoint Security Manager Prevents Network Intruders Using Whitelisting, HIPS

Comodo Endpoint Security Manager (ESM) now enables centralized administration of the award-winning Comodo Firewall Pro, trusted by millions of users about the world. Saving cogent time and money on aegis software, accession and day to day administration tasks, ESM aswell enables IT agents to accidentally and rapidly ascendancy endpoint acceptance and aegis action configurations. ESM’s burning start-up and administration of Comodo Firewall Pro enables best aegis adjoin adverse threats, all from a axial accurate console.

Comodo Firewall Pro recognizes added than 1,114,000 accepted safe executables, and its Host Intrusion Prevention System (HIPS) challenges those it doesn’t know. Through this aggregate of Comodo ESM and Firewall Pro, endpoints are adequate in a added activating and absolute address than anytime before. HIPS monitors and controls all beheading paths and prevents malware from executing. ESM accidentally deploys and manages the Firewall and all aegis behavior after the charge to delay for a virus signature amend from any vendor.

While aggressive aegis software companies abide to application their software to anticipate possibly adverse threats, zero-day attackers can be base accepted vulnerabilities afore a application can be issued. Comodo Firewall Pro precents alien cipher beheading as a aboriginal and a lot of important band of defense, while ESM assists by alerting the IT agent of doubtable and prevented threats. ESM again allows actual the agent to crop action remotely.

For a bound time, Comodo Security Solutions will accommodate Endpoint Security Manager at no allegation for up to 5 desktops aural an organization. To get a chargeless balloon of Comodo Endpoint Security Manager, amuse appointment http://personalfirewall.comodo.com/enterprise/index.html

About Comodo
The Comodo companies accommodate the basement that is capital in enabling e-merchants, added Internet-connected companies, software companies, and alone consumers to collaborate and conduct business via the Internet cautiously and securely. The Comodo companies action PKI SSL, Code Signing, Content Verification and E-Mail Certificates; accolade acceptable PC aegis software; vulnerability scanning casework for PCI Compliance; defended e-mail and fax services.

Continual innovation, a amount adequacy in PKI, and a charge to abandoning the advance of Internet-crime analyze the Comodo companies as basic players in the Internet's advancing development. Comodo secures and authenticates online affairs and communications for over 200,000 business barter and 3,000,000 users of our desktop aegis products.

For added advice on Comodo - Creating Trust Online™ appointment www.comodo.com.
For added information, reporters and analysts may contact:
Katharine Hadow
Comodo--Creating Trust Online
+1 (201) 963 0004 x4073
Email: media-relations@comodo.com

No comments:

Post a Comment