Thursday, August 21, 2014

Containment technology of Comodo smothered malware attacks in the bud – PresseBox (press release)

          IT security expert Comodo turns the tables: Instead of setting like other market competitors in terms of virus protection on recognition by means of blacklisting, the manufacturer relies on prevention and insulation. Only major elements gain access to the enterprise network, unknown be moved using our own developed containment technology in a secure virtual environment. Here they are executed isolated and checked. This leads to a malware shield for the entire IT infrastructure. The containment technology is integrated into all Security Solutions Developer, including the Comodo Endpoint Security Manager (CESM).

With his approach Comodo is one step ahead of the market. Because traditional anti-virus solutions are based on the recognition principle (“detection”), in which they examine elements against a “blacklist”. It contains all known infected files and threats. Based on this “Default Allow” standards (by default allowed access) is determined which programs or files safely or can be allowed to access the system. The problem: All threats must be known so that the protection is ensured reliably. Zero-day attacks that occur for the first time, are possibly not yet registered and are thus executed in the worst case. A blacklist is 100% up to date with today’s mass and rapid proliferation of malware not possible.

excluded malware distribution

For this reason, Comodo his next-level security solutions placed on the principle of “Default Deny Protection”. Instead blacklist-checking done a standard defense of all unknown files and applications, assuming that they may pose threats. Only accredited, classified as safe elements are executed. Untrusted files shifts the containment technology in a virtual operating environment and leads them there, shielded from the rest of the system, from. Should it in fact be viruses or other malicious software, they can do no harm in the network or redistribute. Furthermore, suspicious files are automatically uploaded to the Valkyrie Malware Labs from Comodo, a cloud-based behavior analysis to verify the trustworthiness. Find all processes without interruption to the end user instead.

“Only our ‘default deny’ approach ensures secure IT environments and brings Endpoint Security to a new level,” commented Karl Hoffmeyer, Senior Channel Sales Manager DACH at Comodo. “Because we look at the facts, translated into reality: No one would simply ask strangers in his house, like conventional antivirus solutions unknown files allow network access only confirmed as trusted classified whitelist entries or by permission of the user files and programs are running. .. All other elements reviewed our technology first, if necessary, the user can operate within the isolation environment with the files – without compromising their computer or even the whole network, the integrity of the operating system and the user data is permanently secured “

A YouTube video illustrates the workings of the Comodo principle. On the Comodo site, interested parties can register for free trials of enterprise products. The security solutions from Comodo are sold in Germany over the VADs Intellicomp GmbH and sysob.

          Comodo was founded in 1998 and initially made a name for itself as a provider of SSL VPN technologies. With Comodo SSL solutions now has a global market share of about 40 percent. Today, the company also develops innovative antivirus solutions for end users and professional use. The patented auto-sandbox method can be shown to an almost one hundred percent protection against malware guarantee. The US-based company is privately owned and employs over 1,350 people worldwide at locations in the USA, China, UK, Italy, Romania, Ukraine, Turkey and Japan. More than 75 percent of Comodo employees are engaged in research and development. Distributed to the different time zones, Comodo operates eight laboratories viruses. These so-called Comodo ValkyrieTM Labs ensure round-the-clock reliable detection and control of pests from the Internet. For more information:


No comments:

Post a Comment