+
+

Related Products

  • ManageEngine Endpoint Central
    2,393 Ratings
    Visit Website
  • Iru
    1,414 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,137 Ratings
    Visit Website
  • Action1
    734 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Cynet All-in-One Cybersecurity Platform
    432 Ratings
    Visit Website
  • Guardz
    99 Ratings
    Visit Website
  • NinjaOne
    3,904 Ratings
    Visit Website
  • 1Password
    16,155 Ratings
    Visit Website
  • DriveStrike
    23 Ratings
    Visit Website

About

As Comodo Advanced Endpoint Protection (AEP) protects your endpoints against malware, the AEP application itself routinely comes under attack by malicious applications trying to circumvent its protection. Fortunately, Comodo AEP includes robust self-protection countermeasures that prevent malicious applications from gaining control or circumventing Comodo AEP services. AEP does this by intercepting system calls that might present a threat to the applications such as Terminate Process or Create Remote Thread are obvious examples of calls that might pose a risk to AEP. Other less obvious but actually more dangerous call would be CreateFile as it can do a lot more than just create a file. Comodo AEP intercepts these calls and only allows them to proceed if they won’t harm the Comodo process. Comodo AEP also contains a kernel mode driver that it uses to prevent attempts to modify the system kernel directly.

About

Our completely cloud-native framework delivers you zero day protection against undetectable threats while defending your endpoints from known threat signatures. Comodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions. The Dragon platform delivers the foundation principles for complete next-generation endpoint protection. Easily improve your cybersecurity and performance with the Dragon Platform's lightweight agent delivering artificial intelligence (AI) and Auto Containment to stop all threats. Comodo delivers everything cybersecurity you ever needed to activate breach protection immediate value added from day one. 100% trusted verdict within 45 seconds on 92% of signatures via analysis, and 4 hours SLA on the remaining 8% via human experts. Automatic signature updates that simplifies deployment across your entire environment to lower operational costs.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT security teams searching for an advanced endpoint protection solution

Audience

IT security professionals that want breach protection from our leading portfolio of cybersecurity solutions and services

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 5.0 / 5
ease 4.5 / 5
features 4.5 / 5
design 4.5 / 5
support 4.5 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Comodo
Founded: 1998
United States
www.comodo.com

Company Information

Comodo
Founded: 1999
United States
www.comodo.com

Alternatives

Alternatives

Comodo Dragon

Comodo Dragon

Comodo Security Solutions
Comodo IceDragon

Comodo IceDragon

Comodo Security Solutions

Categories

Categories

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Patch Management Features

Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning

Integrations

CYREBRO
ClickSSL
Desktop.com
Hetman Internet Spy
HostBill
SSL2BUY

Integrations

CYREBRO
ClickSSL
Desktop.com
Hetman Internet Spy
HostBill
SSL2BUY
Claim Comodo Advanced Endpoint Protection and update features and information
Claim Comodo Advanced Endpoint Protection and update features and information
Claim Comodo Dragon Platform and update features and information
Claim Comodo Dragon Platform and update features and information