Whether deployed as a complete security suite or by using the sandbox as a standalone to fortify existing AV solutions, Comodo ESM offers unrivalled endpoint protection for Microsoft Windows servers, desktops, laptops and tablets.
The full Comodo Endpoint Security suite brings 5 layers of defense (Antivirus, Firewall, Host Intrusion Prevention, Auto-Sandbox & File Reputation) to the point of impact - the desktop environment. Its ground-breaking auto-sandbox technology eliminates malware outbreaks and operating system contamination by automatically running untrusted processes in an isolated environment. This makes Comodo's endpoint protection the only managed anti-malware solution that can offer a $5,000* limited warranty against infection.
The Comodo ESM dashboard gives administrators panoramic insight and control over all aspects of endpoint protection and management. Its streamlined interface displays 14 critical metrics about each machine, facilitating rapid alerting and remediation of issues. Administrators can also terminate endpoint processes, stop or start services, uninstall applications and delete unwanted files - all without causing interference to the end-user.
Comodo Advanced Endpoint Protection allows you to control and centrally manage endpoint protection through the application of operational templates or policies. Any deviation from these policies causes Comodo ESM to automatically reapply the assigned policy or alert the administrator if it is unable to do so.
Comodo's endpoint protection also provides administrators with the ability to centrally manage endpoint system resources. Administrators can define operational thresholds for CPU usage, RAM usage, network usage and available storage. Should the thresholds be exceeded, Comodo ESM will alert the administrator through the dashboard and via email notification.
Additional policy configurations include power management such as screen-locking or drive-locking. Your Green initiatives are further enhanced through system-standby and system-hibernation scheduling. Comodo's endpoint protection also offers options for disabling USB mass-storage devices, optical devices and even floppy drives.
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Apple, Mac and OS X are trademarks of Apple Inc., registered in the U.S. and other countries.
Comodo's endpoint protection is not affiliated with Debian. Debian is a registered trademark owned by Software in the Public Interest, Inc.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
1 Terms and conditions apply.
Features
Centrally managed security for Windows®, Apple® Mac OS X® and Linux® * based endpoints
Automatic Threat containment – Prevents malware outbreaks by detecting then automatically containing untrusted files in an isolated environment separate from the underlying operating system and user data
Multi-layered endpoint defense – Each endpoint is protected with a powerful combination of antivirus, firewall, host intrusion prevention, URL filtering, behavior monitoring and threat containment
Panoramic dashboard presents ‘first-glance’ view of 11 critical endpoint metrics for each endpoint, providing total security awareness and control
Powerful system management capabilities allow administrators to view and modify endpoint processes, services and installed applications
Supports “push” deployment via Active Directory®, Workgroup and IP addresses and “pull” deployment via group policy or login script
Hierarchical deployment of ESM servers allows local or remote management of non-LAN endpoints
User Assistance manager allows end-users to initiate live-chat sessions with administrators directly from the desktop
Encrypted VNC screen-sharing sessions directly to the end-user’s desktop
Remote assistance feature allows admins to interact directly with users and remote desktop into endpoints if required
Real-time notifications lower emergency response time to emerging threats
Location-aware policies allow granular definition of security configurations for endpoints inside and outside of the VPN
Go Green with integrated power management functionality with Wake-on-LAN enabled systems advance
Drill-down visibility of endpoint metrics including logged-on user and session type, all networking metrics, CPU/RAM/Swapfile usage, Operating system with service pack and version information, installed applications, services and running processes
Minimal system requirements allows installation on non-dedicated Windows PCs or servers
Fast to deploy and easy to manage, CESM is the only endpoint management solution to come with a $5000 virus-free warranty**
*System only
**Comodo's Protection Plan is included with Comodo Endpoint Security and is available for one (1) year from the date of your software registration and installation. Please see Comodo Advanced Endpoint Protection End User Subscriber Agreement (http://www.comodo.com/repository/eula/EULA-CESM-v2013.pdf) for complete details. Comodo Endpoint Security trials exclude Comodo Protection Plan.
FAQs
Comodo Endpoint Security offers 360° protection against internal and external threats by consolidating multiple, cutting edge security technologies in a single, easily installed solution. These include:
Comodo is so confident that we can protect endpoints against infection that we are the only vendor to offer a $5,000 Limited Virus-Free Warranty 1
On idle, the entire 5-in-1 suite only consumes 7.5MB RAM and doesn’t register any CPU usage in Windows Task Manager.
Endpoint can be administered via a list, tile or panoramic display interfaces.
Yes.
Yes. ESM can manage full virtualized machines or virtual machines cloned from templates (requires sys prep utility to be run on master template first).
The endpoint protection server can be installed on any supported Microsoft Windows operating systems running on a private cloud server, public cloud server or on-premises server.
You can manage all your endpoints from a single endpoint protection server. Alternatively, you can use Comodo ESM 'Dependent Servers' function so that each site has its own endpoint protection server which you can control from an upstream endpoint protection server.
Comodo ESM will auto-discover any endpoints in your Active Directory/LDAP containers. Alternatively, you can use the wizards to 'push' the ESM agents to the systems you want managed. You can 'push' deploy to Active Directory OUs, Microsoft workgroups, single IP addresses or an IP address range. You can also download and save the Windows, Mac or Linux management agents to a shared folder, then use login scripts or Group Policy to 'pull' deploy to your systems.
No. Comodo's endpoint protection alerting takes place in real-time.
There are several ways that ESM alerts an administrator.
Virus database updates aren't pushed; instead they are pulled by the endpoint according to the schedule you have set for them. Updates can be received from the Internet or from the ESM server acting as a caching proxy. You can choose to use either (or both) as part of the post-deployment policy configuration. Administrators can also update selected endpoints using the 'Update' button in the administrative interface or on the endpoint's 'Properties' tab.
Yes. You can choose which components to install (AV/Firewall/Sandbox) during the initial setup or you may re-configure the components at any time thereafter.
Yes. Comodo's endpoint protection can use its embedded Microsoft SQL Express 2012 edition or can be configured to use an existing instance of Microsoft SQL 2005 or later (Express, Standard or Enterprise).
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Apple, Mac and OS X are trademarks of Apple Inc., registered in the U.S. and other countries.
Comodo's endpoint protection is not affiliated with Debian. Debian is a registered trademark owned by Software in the Public Interest, Inc.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
Endpoint Protection Central Service computer - The host running the Advanced Endpoint Protection Server software
Hardware requirements
Software requirements
Operating system
a) Microsoft Windows Server family:
b) Microsoft Windows client family:
Other supporting software (will be installed automatically if not present)
Endpoint Protection Administrative Console computer - The computer that will run the management interface (this computer may also be the Central Service PC)
Hardware requirements
Sufficient to run any of the browsers listed below.
Other supporting software (will be installed automatically if not present)
Display
Comodo ESM Endpoints - Managed endpoints that will run Comodo Endpoint Security/Comodo Antivirus for Servers and host the endpoint protection agent
Hardware requirements
Software requirements
Operating system
a) Microsoft Windows client family:
b) Microsoft Windows server family:
c) Apple Mac OS X® client family:
d) Debian Linux .deb family:
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Apple, Mac and OS X are trademarks of Apple Inc., registered in the U.S. and other countries.
Comodo's endpoint protection is not affiliated with Debian. Debian is a registered trademark owned by Software in the Public Interest, Inc.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
Comodo Advanced Endpoint Protection licenses are offered in 3 ways:
Try Advanced Endpoint Protection free of charge. Start Free Trial
Unparalleled security for network endpointsGet Protection Now
With professional services and support For Enterprises. Get an Easy Quote
For questions, demos, quotations or additional information please click here to contact us
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Apple, Mac and OS X are trademarks of Apple Inc., registered in the U.S. and other countries.
Comodo's endpoint protection is not affiliated with Debian. Debian is a registered trademark owned by Software in the Public Interest, Inc.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.