Comodo AEP Named Best in Ransomware Protection in 2018 Cybersecurity Excellence Awards

Comodo Security Solutions Inc., a global innovator and developer of cybersecurity products, today announced that Comodo Advanced Endpoint Protection (AEP) has placed Gold in the Ransomware Protection category of the 2018 Cybersecurity Excellence Awards. Comodo AEP was also honoured as a finalist in the Endpoint Security, Anti Malware and Advanced Persistent Threat (APT) Security groups….

Find out how effective patch management protects against infections such as WannaCry

Enterprises – or businesses – cannot afford to bring to a halt (even for a short period) their activities. Because doing so would mean a loss for them; loss in terms of money and customers. Therefore “continuous and seamless operation” is needed for them in order to reap the benefits. And carrying out regular “patch…

Eliminate Human Error Threats for Good with Application Containerisation

So why do you need SecureBox? 1. Employees, customers, and partners often access your critical applications on endpoints outside of your carefully secured network. Many are beyond your control entirely. And users might not even be running traditional antivirus – the bare minimum cyber defense. 2. SecureBox uses a unique approach to protect your application…

At last a Prevention Solution that actually Prevents Infection

Complete Protection, All in One, Endpoint Security Solution Comodo AEP secures all your servers, desktops, laptops, and mobile devices from known and unknown malware–without requiring signatures or updates. And, it supports Android, iOS, Windows or Linux systems, regardless of the type or age of the endpoint hardware. You can see and manage everything though the…

Empower Yourself and Secure Your Clients

Be 100% sure that your devices are not infected with some new type of virus by scanning unknown files with a FREE Forensic Analysis. Find hidden malware in as little as 15 minutes and then run a complimentary scan for your enduser customers. Comodo Forensic Analysis uses the Forensic Analysis Tool to discover known good,…

COMODO CUSTOMER UPDATE: Ransomware PREVENTION – Yes it is POSSIBLE!

As I’m sure you’re aware, there was a global ransomware attack over the past few days that impacted companies and organisations across the globe. Of the 85 million + endpoints covered by Comodo’s advanced endpoint protection solution, zero were infected! Comodo’s Advanced Endpoint Protection (AEP) uses unique technology that treats all unknown files with a…

It’s Official Comodo are “A Pain in the Arse”!

If you have customers that are looking for a complete endpoint protection solution look no further than Comodo Advanced Endpoint Protection. Comodo’s Advanced Endpoint Protection solution utilises a Default Deny Platform to provide complete protection against zero-day threats, while having no impact on workplace productivity. All untrusted processes and applications are automatically contained in a…

Comodo Named on Gartner Endpoint Protection Platform (EPP) Magic Quadrant

Comodo has landed a “niche” ranking on this years Gartner Endpoint Protection Platform magic quadrant in recognition of its completeness of vision and ability to execute. A new addition to the 2017 quadrant Gartner reported that…. “Comodo was a good choice for organisations looking for a default-deny approach without having to manually approve applications”. Gartner…

Is it time you embraced STAP?

Complete information security coverage is vital to every organisation and the Comodo 360 solution ensures protection, prevention and compliance where other legacy signature based solutions have fallen short. Providing 100% STAP coverage Comodo 360 allows the management of all your critical security needs whilst solving the issues of evolved anti-sandbox type ransomware hitting the network…

A Prevention Solution That Actually…..Prevents Infection

Comodo have done what others just promise, they’ve solved the malware problem once and for all. In a world where everything is an endpoint, they have come up with the perfect solution in Advanced Endpoint Protection. Download the whitepaper now to find out : Why conventional endpoint protection fails Why traditional default deny and default…

50% discount on Comodo Advanced Endpoint Protection – Offer extended through January

If you have customers that are looking for a complete endpoint protection solution, why not take advantage of our Comodo AEP offer? VCW Security are offering 50% discount off all registered deals, together with free sales & technical training to eligible reseller partners. Place your order before the 31st January 2017* Why Comodo AEP? Default…

50% discount on Comodo Advanced Endpoint Protection during December

If you have customers that are looking for a complete endpoint protection solution, why not take advantage of our Comodo AEP offer? VCW Security are offering 50% discount off all registered deals, together with free sales & technical training to eligible reseller partners. Place your order before the end of December* Why Comodo AEP? Default…

Comodo Detects New Family of Sophisticated Financial Malware

Comodo has detected a new family of financial malware dubbed as “Gugi/Fanta/Lime”. It is a sophisticated Banking Trojan that can bypass the standard security protocols of an Android operating system (version 6), and take over the operating system. This Trojan places an authentic looking counterfeit interface program layer over a genuine application such as the…

Complete security from Malware Attacks

Comodo ONE IT and Security Manager brings all your endpoint management needs together. Product overlap and multiple management tools leave you with limited visibility and potential security gaps. Comodo ITSM brings all your IT management needs together into a unified platform that streamlines operations and reduces risk. Comodo’s IT and Security Manager allows for the…

FREE internal NFR licenses for all new Comodo reseller partners

Become a Comodo reseller partner and enjoy the benefits of adding highly profitable products such as antivirus, endpoint security, remote access and managed remote access to your portfolio, whilst increasing your value to clients, creating ongoing revenue streams and providing generous margins and effective marketing tools – 30% discount* FREE technical training* FREE evaluation units*…

Learn About Next-Gen Ransomware and How to Defeat It

Ransomware has evolved to target the enterprise as cybercriminals “follow the money.” Encouraged by big profits, threat authors are creating ransomware and APTs that avoid detection and extort money successfully from a wide variety of victims. Join Jon Oltsik, Senior Principal Analyst at ESG, and Kenneth Geers, Cyber Centre Ambassador at NATO and Senior Research…

Complete security from Malware Attacks

Comodo ONE IT and Security Manager brings all your endpoint management needs together. Product overlap and multiple management tools leave you with limited visibility and potential security gaps. Comodo ITSM brings all your IT management needs together into a unified platform that streamlines operations and reduces risk. Comodo’s IT and Security Manager allows for the…

Prevent system and application vulnerabilities

Vulnerabilities within your OS and applications are bound to happen and hackers are always looking to exploit those vulnerabilities. The best method of defence is to be up to date with the latest in OS patches and security updates. This prevents potential attackers from taking advantage of known vulnerabilities. Seems simple enough, but with OS…

Service your customers quickly and efficiently

FREE with Comodo One ITSM, Remote Monitoring and Management (RMM) provides advanced features from quick and easy set up to script and service automation. Using RMM, you can quickly import users, devices and endpoints via full LDAP and Active Directory integration. Essential solutions are all managed through a single interface allowing you to view, manage…

Keeping customers up to date and compliant

Unlike many products that need to be linked together through integration, the Mobile Device Management module, part of the Comodo One IT & Security Manager (ITSM), combines mobile device, application and security management allowing complete management and control over iOS and Android devices. Customers stay productive and protected with over-the-air enrolment, customised app stores, full…

How Big Data increases cyber attack resilience

“Big Data” is a term that is used to describe the algorithms, technologies, and systems utilised to collect data en masse in large volumes and varieties. Big Data applications are able to provide dramatic increases in the effectiveness and efficiency of decision-making within organisations. Over the past few years Big Data analytics have gained the…

Legacy Attitudes versus the Dynamic Threat Landscape

Cybercriminals are increasingly more sophisticated, smart and stealthy in the methods and techniques they use. Over the past few years they have been able to build organised cybercrime syndicates “earning” millions of pounds in a few days with one piece of malware. Like any industry or business, they have learned to adapt their tactics to…

Plugging the holes in your security gaps

Mobile workers, BYOD, cloud services, and an ever evolving enterprise have left the network perimeter looking more like Swiss cheese than a traditional network. The out-dated mentality of an inside and outside has left firewalls and similar technology lagging drastically behind the times in matters of network security. But how can these issues be solved?…

The security risks of Pokémon GO

It’s safe to say Pokémon Go has taken the globe by storm. So much so, that in an effort to capitalise on the countries still waiting for the release of the app, over 215 unofficial apps have been created. While the UK had the official app as of 14th July there are several fake apps…

The New “Perimeter” in a Mobile World

Mobile technologies are the fastest growing area of technological investment. The rapid adoption of these devices has led to the implementation of mobile devices within the business environment. The advent of the mobile worker has resulted in a wider acceptance of BYOD to allow employees to utilise their technology of choice in the workplace. This…

Reactive Security Postures: Tending to the symptoms rather than the cause

The bombardment of news stories covering large company breaches has possibly added to the continuation of a reactive position towards network security. As companies become resigned to the idea that a breach will happen, they become less focused on proactively preventing intrusions. According to the 2015 Data Breach study conducted by the Ponemon Institute, it…

Dissolution of the Network Perimeter

Historically, IT security has been primarily focused around the network. A company’s internal infrastructure and data centre was directly connected to its branches through a private WAN. The focus was on allowing employees inside the network access to company resources while building walls, typically firewalls and ant-malware, to keep those on the outside from getting…

How to Protect Your Endpoints

Using a Default Deny Platform as its model, COMODO is better able to protect the endpoint.
When the user interacts with a file or application, it is categorised as either known good, known bad or unknown.

Comodo Updates Free Managed Service Solution

Looking for a Remote Management & Monitoring solution as a means to improve your business processes?  Wanting to build a recurring revenue stream and bring added value to your clients?  Manage the IT and web needs of multiple clients and need faster response times and quicker remediation? Its here and it’s available FREE as a…

Become a Comodo Reseller Now!

Comodo’s unique, patented, fully automatic sandbox isolation technology proactively protects against persistent unknown/zero-day programmes and applications. The auto sandboxing technology creates a virtual shield that identifies safe, unsafe and questionable files and automatically isolates them.  Only allowing known, trusted files to penetrate the system. Join the VCW Security Comodo reseller programme and benefit from the…

Comodo Webinars – Comodo Antispam Gateways & Endpoint Security Manager

Comodo is so sure that its Anti Virus solution will protect your company network from becoming infected that the product is underwritten by the insurance company Chubb. Please join us for a walkthrough of our Antispam Gateway & Endpoint Security Manager Solutions. Comodo Antispam Gateway will be presented in the first half-hour of the session with Endpoint Security Manager…

Comodo Webinars – Comodo Antispam Gateways & Endpoint Security Manager

Comodo is so sure that its Anti Virus solution will protect your company network from becoming infected that the product is underwritten by the insurance company Chubb. Please join us for a walkthrough of our Antispam Gateway & Endpoint Security Manager Solutions. Comodo Antispam Gateway will be presented in the first half-hour of the session with Endpoint Security Manager…