+
+

Related Products

  • ESET PROTECT Advanced
    2,263 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,699 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Iru
    1,278 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • ThreatLocker
    681 Ratings
    Visit Website
  • PowerDMARC
    252 Ratings
    Visit Website
  • Guardz
    117 Ratings
    Visit Website
  • DriveStrike
    24 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    104 Ratings
    Visit Website

About

With a user-friendly interface, cloud or on-premises management options, and a centralized control panel, you can easily manage all your endpoint devices. C-Prot Endpoint Security is a product that provides multi-layered protection against all kinds of potential threats without interrupting the workflows of businesses and institutions, supported by advanced machine learning technology and comprehensive threat intelligence. It provides effective protection against all types of threats, from fileless threats to hacking attempts and rootkits. C-Prot Endpoint Security protects computers, servers, and mobile devices in your organization against risks from viruses, trojans, worms, and ransomware. It provides comprehensive protection by detecting spyware, viruses, and other malicious applications on mobile devices in your organization. It prevents your employees from clicking on harmful e-mails and ensures protection against phishing attacks.

About

Our completely cloud-native framework delivers you zero day protection against undetectable threats while defending your endpoints from known threat signatures. Comodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions. The Dragon platform delivers the foundation principles for complete next-generation endpoint protection. Easily improve your cybersecurity and performance with the Dragon Platform's lightweight agent delivering artificial intelligence (AI) and Auto Containment to stop all threats. Comodo delivers everything cybersecurity you ever needed to activate breach protection immediate value added from day one. 100% trusted verdict within 45 seconds on 92% of signatures via analysis, and 4 hours SLA on the remaining 8% via human experts. Automatic signature updates that simplifies deployment across your entire environment to lower operational costs.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies seeking a solution to manage and protect all their endpoint devices

Audience

IT security professionals that want breach protection from our leading portfolio of cybersecurity solutions and services

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

Free
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

C-Prot
Turkey
www.c-prot.com/en/corporate-products/c-prot-endpoint-security

Company Information

Comodo
Founded: 1999
United States
www.comodo.com

Alternatives

Alternatives

Sophos Home

Sophos Home

Sophos
N-able EDR

N-able EDR

N-able
TrendAI Vision One

TrendAI Vision One

Trend Micro

Categories

Categories

Patch Management Features

Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning

Integrations

Desktop.com
Hetman Internet Spy

Integrations

Desktop.com
Hetman Internet Spy
Claim C-Prot Endpoint Security and update features and information
Claim C-Prot Endpoint Security and update features and information
Claim Comodo Dragon Platform and update features and information
Claim Comodo Dragon Platform and update features and information