Endpoint Detection: How we do it?

21 Oct, 2022 48 Views

Comodo employs a wide variety of techniques to detect and identify unknown files, ranging from a simple signature-based system to emulators and from machine-learning techniques to reputation based analysis. This holistic approach provides both detection of and protection from malware.

Our Default deny approach is the main defense mechanism for protection implemented as a unique containment [OS Virtualization] technology on the endpoint that provides both isolation of potential damage from malware and also usability due to the extensive whitelisting capabilities of our systems. For detection, static, dynamic and reputation-based systems are successfully blended to create a powerful engine that can detect zero-day malware that no other engine is able to identify. The cloud-based file analysis system enables the detection of almost all malware instantly. Additionally, expert human analysis may also be performed for detection, a unique feature that guarantees 100 percent detection for all malware files.

The following capabilities explain how we detect known malware and prevent infection from unknown (zero day) threats at the endpoint and in the cloud. They comprise the multiple layers of detection in Comodo® Advanced Endpoint Protection.

Comodo is the only security vendor with a Default Deny platform that allows full usability of unknown files while they run in Secure Auto Containment™ until automatic and expert human analysis delivers a trust verdict of good or bad. Comodo Advanced Endpoint Protection allows the good applications, blocks the bad and contains the unknown files to prevent the damage from unknown malware. Only good files run unfettered on your endpoints.

Zero Infection,
Zero damage.

What we do to detect known malware and prevent infection from unknown (e.g. zero day) threats.

Endpoint Detection