Comodo's endpoint protection also offers options for disabling USB mass-storage devices, optical devices and even floppy drives. Your Green initiatives are further enhanced through system-standby and system-hibernation scheduling. Should the thresholds be exceeded, Comodo ESM will alert the administrator through the dashboard and via email notification.Īdditional policy configurations include power management such as screen-locking or drive-locking. Administrators can define operational thresholds for CPU usage, RAM usage, network usage and available storage. Any deviation from these policies causes Comodo ESM to automatically reapply the assigned policy or alert the administrator if it is unable to do so.Ĭomodo's endpoint protection also provides administrators with the ability to centrally manage endpoint system resources. Administrators can also terminate endpoint processes, stop or start services, uninstall applications and delete unwanted files - all without causing interference to the end-user.Ĭomodo Advanced Endpoint Protection allows you to control and centrally manage endpoint protection through the application of operational templates or policies. Its streamlined interface displays 14 critical metrics about each machine, facilitating rapid alerting and remediation of issues. The Comodo ESM dashboard gives administrators panoramic insight and control over all aspects of endpoint protection and management. This makes Comodo's endpoint protection the only managed anti-malware solution that can offer a $5,000* limited warranty against infection. Its ground-breaking auto-sandbox technology eliminates malware outbreaks and operating system contamination by automatically running untrusted processes in an isolated environment. The full Comodo Endpoint Security suite brings 5 layers of defense ( Antivirus, Firewall, Host Intrusion Prevention, Auto-Sandbox & File Reputation) to the point of impact - the desktop environment. Whether deployed as a complete security suite or by using the sandbox as a standalone to fortify existing AV solutions, Comodo ESM offers unrivalled endpoint protection for Microsoft Windows servers, desktops, laptops and tablets. The details of the endpoints on which they were detected.Next Generation Endpoint Security with Integrated System Hardware and Software management and Instant User Assistance. These include the number of each type of threat and Graphs below the pie chart section provide further details aboutĭetected threats. Place your mouse cursor over a sector to view more details. Refer to the section ' Policies'įor more details. The threats displayed here depend on the protection settings defined in your SecureBox policies. The 'Detected Threats' chart displays an overview of threats encountered by Secure Box on your managed endpoints. Mouse cursor over a sector displays the respective details. 'Managed' segment provides the number of endpoints on which the SBĪpplication is installed and connected to the console. Managed after the CSB package is deployed and accepted by the Were scanned in the network and discovered via Work Group, Activeĭirectory and Network Address. The 'Discovered' segment includes endpoints that 'Deployment Status' pie chart displays a summary of endpoints onĬustomer networks. YouĬan also return here by clicking ‘Home’ at the top of the ThreatsĪre also displayed as a bar graph for each category and on whichĭisplayed by default after logging-in to the console. Screen contains a snapshot of your SecureBox deployment, showing pieĬharts of managed/discovered endpoints and detected threats.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |