![]() ![]() Hardware and installed software inventory reports Granular, on-demand reports of endpoint’s status, policy-compliance and policy-delta Visibility of the endpoint’s Application, System, Security and AV event logs with ability to export to 3rd-party logging servers Visibility of an endpoint’s monitoring alerts (CPU over-usage, RAM over-usage, NIC over-usage, lack of system drive free-space) logged-on user and session type, all network metrics, networking metrics, CPU/RAM/Swapfile usage, Operating system with service pack and version information, installed applications, running and stopped services and running processesĭrill-down to endpoint's file-system to remove unwanted stand-alone files or folders Global visibility over all processes running on all endpoints with the ability to terminate suspicious or resource-hungry processesĭrill-down visibility of 34 endpoint operational metrics incl. Global visibility over all endpoint’s services/daemons with the ability to stop or start services on demand Global visibility over all applications installed on all endpoints with the ability to invisibly uninstall unwanted items 'First Glance' notification of endpoint alerts through highly visible information toolbars and tile icons 'Set-and-forget' management of endpoint security settings, system processes, power usage and 3rd-party device usageĬentralized management of quarantined items, sandboxed applications & unrecognized applications Push installations using Active Directory, MS Workgroup or IP-based discovery Low system requirements (Windows operating system, Dual-Core 1.8 GHz processor, 2 GB RAM, 15 GB free disk space)įull Active Directory integration for automated endpoint discovery Industry's only $5,000 virus-free warranty against infections 1 Patent-pending sandbox technology prevents zero-day malware attacks.Comodo's endpoint protection also offers options for disabling USB mass-storage devices, optical devices and even floppy drives. Your Green initiatives are further enhanced through system-standby and system-hibernation scheduling. Should the thresholds be exceeded, Comodo ESM will alert the administrator through the dashboard and via email notification.Īdditional policy configurations include power management such as screen-locking or drive-locking. Administrators can define operational thresholds for CPU usage, RAM usage, network usage and available storage. Any deviation from these policies causes Comodo ESM to automatically reapply the assigned policy or alert the administrator if it is unable to do so.Ĭomodo's endpoint protection also provides administrators with the ability to centrally manage endpoint system resources. Administrators can also terminate endpoint processes, stop or start services, uninstall applications and delete unwanted files - all without causing interference to the end-user.Ĭomodo Advanced Endpoint Protection allows you to control and centrally manage endpoint protection through the application of operational templates or policies. Its streamlined interface displays 34 metrics about each machine and allows administrators to instantly perform key tasks like applying new policies or running virus scans. The Comodo ESM dashboard gives administrators panoramic insight and control over all aspects of endpoint protection and management. ![]() This makes Comodo's endpoint protection the only managed anti-malware solution that can offer a $5,000* limited warranty against infection. Its ground-breaking auto-sandbox technology eliminates malware outbreaks and operating system contamination by automatically running untrusted processes in an isolated environment. ![]() The full Comodo Endpoint Security suite brings 5 layers of defence ( Antivirus, Firewall, Host Intrusion Prevention, Auto-Sandbox & File Rating) to the point of impact - the desktop. Whether deployed as a complete security suite or by using the sandbox as a standalone to fortify existing AV solutions, Comodo ESM offers unrivalled endpoint protection for Microsoft Windows servers, desktops, laptops and tablets. Next Generation Endpoint Security with Integrated System Hardware and Software management and Instant User Assistance.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |