Comodo Advanced Endpoint Protection Questions

Julia Frohwein
Content and Social Media Manager
IT Central Station
Aug 03 2020

Hi Everyone,

What do you like most about Comodo Advanced Endpoint Protection?

Thanks for sharing your thoughts with the community!

Antonio LightbourneComodo's default deny technology, their auto containment feature is awesome it… more »
Julia Frohwein
Content and Social Media Manager
IT Central Station
Aug 03 2020

Hi,

We all know it's really hard to get good pricing and cost information.

Please share what you can so you can help your peers.

Antonio LightbourneComodo's pricing is pretty good and we currently have roughly 200 licenses.
Miriam Tover
Content Specialist
IT Central Station
Aug 03 2020

Please share with the community what you think needs improvement with Comodo Advanced Endpoint Protection.

What are its weaknesses? What would you like to see changed in a future version?

DonaldBaldwinWe do a lot of tests and we also work with some really malicious environments… more »
Julia Frohwein
Content and Social Media Manager
IT Central Station
Aug 03 2020

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

DonaldBaldwinWe use Comodo because it has containerization.
Antonio LightbourneWe use Comodo AEP for default deny architecture, it's auto containment… more »
Endpoint Protection (EPP) for Business Questions
Rony_Sklar
IT Central Station
Jan 13 2021

There are many cybersecurity tools available, but some aren't doing the job that they should be doing. 


What are some of the threats that may be associated with using 'fake' cybersecurity tools?


What can people do to ensure that they're using a tool that actually does what it says it does?

SimonClark Dan Doggendorf gave sound advice. Whilst some of the free or cheap… more »
Dan DoggendorfThe biggest threat is risks you think you have managed are not managed at all so… more »
Javier MedinaYou should build a lab, try the tools and analyze the traffic and behavior with… more »
Rony_Sklar
IT Central Station
Nov 02 2020

With remote work having become the norm for many, what security should businesses have in place? Do you have suggestions of specific products that businesses should look at?

Philippe PanardieThere is not a single answer. In our company, we use only company devices for… more »
Letsogile BaloiSecurity is a multi-layered problem and as always the human end is the weak… more »
Omer MohammedWearing a mask while accessing your service is not a joke hardening tunneling… more »
Rony_Sklar
IT Central Station
Oct 05 2020

Why should businesses invest in endpoint security?


What tips do you have for businesses to ensure that they have the right endpoint security measures in place?

reviewer1257849The endpoint is the weakest link on the network Since we put in all the best… more »
Menachem D Pritzker
Director of Growth
IT Central Station
Aug 10 2020

On July 15, 2020, several verified Twitter accounts with millions of followers were compromised in a cyberattack. Many of the hacked accounts we protected using two-factor authentication, which the hackers were somehow able to bypass.


Hacked accounts included Barack Obama, Joe Biden, Bill Gates, Jeff Bezos, Mike Bloomberg, Warren Buffett, Kim Kardashian, and Kanye West, Benjamin Netanyahu, and several high profile tech companies, including Apple and Uber.


The hackers posted variation of a message asking follower to transfer thousands of dollars in Bitcoin, with the promise that double the donated amount would be returned.


How could Twitter have been better prepared for this? How do you rate their response?

Ken ShauretteFor some good information from a leading expert check out the webinar today 7/17… more »
Ken ShauretteI like the potential for catching an unusual activity like that with our… more »
Russell WebsterSpan of control, Solid RBAC, Privileged Access Management (PAM) 
Rony_Sklar
IT Central Station

What is the difference between a compromise assessment and threat hunting? How do each contribute to Endpoint Protection?

Geoffrey PoerA Compromise Assessment (CA) is an active and generally scheduled engagement… more »
Nikki WebbThreat hunting typically comes before a compromise assessment. Threat Hunting… more »
Rony_Sklar
IT Central Station
Aug 26 2020

Which EPP provider does the best job at ransomware protection? Which provider is best at proactively defending against unknown threats?

Paresh MakwanaCylance: One of the fastest growing vendors in the Endpoint Security market,… more »
Steve PenderSentinelOne is my recommended solution. The SentinelOne Endpoint Protection… more »
reviewer1272021There are several good ones and it depends on budget, integrations needed, staff… more »
Frank Yang
Sales Director at a tech services company with 5,001-10,000 employees

I work at a tech services company with 5,000 - 10,000+ employees. 


We are currently researching EPP and EDR solutions. What are the main differences between EPP and EDR? 


Thanks! I appreciate the help. 

Om SalamkayalaI think most of the comments cover all the key points. EDR-End point… more »
Jehyun ShimEPP is focused on detecting malware, but EDR is focused on logging endpoint an… more »
Owais YousufEndpoint Detection and Response (EDR) is a category of security tools that are… more »
Mostafa
System Administrator at Suez Canal Insurance

What is the best for ransomware infection? 

Siddharth NarayananIPS & Blocking unwanted extensions at gateway level.
Nadeem Syedthere are different solutions for ransomware these days. Best i have found is… more »
Ariel Lindenfeld
Sr. Director of Community
IT Central Station
Sep 14 2020

Let the community know what you think. Share your opinions now!

it_user400131evaluation of endpoint protection should look at what the product offers for… more »
it_user762459Key points for me are speed, scale & reporting, and I generally classify my… more »
J RiceBeing more advanced than a signature-based system. Its ability to detect lateral… more »