www.comodo.com
Open in
urlscan Pro
2606:4700:10::6814:3df2
Public Scan
Submitted URL: http://comodo.net/
Effective URL: https://www.comodo.com/
Submission: On January 19 via manual from US — Scanned from GB
Effective URL: https://www.comodo.com/
Submission: On January 19 via manual from US — Scanned from GB
Form analysis
1 forms found in the DOM<form data-hs-cf-bound="true"><span class="fieldset">
<p><input type="checkbox" value="check" id="chkMain" checked="checked" class="legacy-group-status optanon-status-checkbox"><label for="chkMain">Active</label></p>
</span></form>
Text Content
Cookie Notice We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. Cookie Policy Close I ACCEPT THE TERMS * Your Privacy * Strictly Necessary Cookies * Performance Cookies * Functional Cookies * Targeting Cookies * More Information Privacy Preference Centre Active Always Active Save Settings Allow All This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy. We won't track your information when you visit our site. But in order to comply with your preferences, we'll have to use just one tiny cookie so that you're not asked to make this choice again. Accept Decline Skip to content Comodo: Cloud Native Cyber Security Platform * For Business * For Home * For Partners * Experienced a Breach?: 1-888-551-1531 * Contact * Blog * English * Sign In * [US] Dragon Platform * [EU] Dragon Platform * [US] Dragon Enterprise * [EU] Dragon Enterprise * Products DRAGON ENTERPRISE Comodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions. Dragon Platform Overview Patented Threat Prevention Product Bundled Packages Subscribe to the platform PLATFORM PRODUCTS * Advanced Endpoint Protection Impenetrable cybersecurity without sacrificing usability * Endpoint Detection and Response (EDR) Gain detailed visibility into all your endpoints activities * Endpoint Manager Reduce the attack surface to remediate and patch * Mobile Device Security Fortify mobile devices that exit and enter your network * Comodo NGAV Keep endpoints safe from known threat signatures * Comodo MDM Setup device network and security policies quickly * Secure Web Gateway Defend from any internet based threats * Secure Email Gateway Stop email threats before it enters your inbox TECHNOLOGY & PROCESS * Auto Containment Patented to ensure absolute isolation from threats * Global Threat Intelligence Insights from deep web and dark web to eliminate risk * Zero Trust Architecture Our pioneered approach has shifted the industry * 45 Second Verdict Engine 100% trust an all files at lightning speeds * Services WORLDWIDE SERVICES No one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage. Request a demo Get Emergency Help THREAT SERVICES * Digital Forensics and Incident Response Retain experts to investigate an incident to start remediation * Managed Detection and Response Our experts closely monitor changes to your environment 24x7x365 * Managed Threat Hunting Cybersecurity experts will continuously hunt suspicious endpoint activity SUPPORT, DEPLOY, MAINTAIN * Comodo Professional Services Ensure your installations are properly deployed * Comodo Support Services Trouble with maintaining your products? Get help now * Comodo Customer Success Management Align your success with optimal security performance * Tools * Forensic Scan Tool * Security Scorecard * Live Threat Map * Open-source EDR * Zero Day Malware Hunter * Vendor Vulnerability Report * Partners * Partner Program * SOC Platform Overview * Begin Partner Application * Partner Portal Login * Deal Registration * Resources RESOURCE DISCOVERY Comodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs. KNOWLEDGE BASE * Case Studies * Webinars * Help Guides * Videos * Forums THREAT LABS * Data Statistics * Threat Map * Emerging Threats * Plugins * APIs COMPARE THE COMPETITON * Compare Crowdstrike * Compare Cylance * Compare SentinelOne * Compare Sophos * Compare TrendMicro * View All Comparisons CYBERSECURITY 101 GUIDES * Buyer's Guide to EPP * Buyer's Guide to Zero Trust * Lessons from Re-EVIL's Return * K-12 Ransomware Guide * Upgrade your MSP to MSSP * Company * Press * News * Leadership * Customers * Careers * Contact REQUEST DEMO * Products * Dragon Platform Overview * Patented Threat Prevention * Product Bundled Packages * Platform Modules * Advanced Endpoint Protection * Endpoint Detection and Response (EDR) * Endpoint Manager * Mobile Device Security * Comodo NGAV * Comodo MDM * Secure Web Gateway * Secure Email Gateway * Technology & Process * Auto Containment * Global Threat Intelligence * Zero Trust Architecture * Valkyrie Verdict Engine * Services * Request a demo * Get Emergency Help * Threat Services * Digital Forensics and Incident Response * Managed Detection and Response * Managed Threat Hunting * Support, Deploy, Maintain * Comodo Professional Services * Comodo Support Services * Comodo Customer Success Management * Tools * Forensic Scan Tool * Security Scorecard * Live Threat Map * Open-source EDR * Zero-Day Malware Hunter * Vendor Vulnerability Report * Partners * Partner Program * SOC Platform Overview * Begin Partner Application * Partner Portal Login * Deal Registration * Resources * Knowledge Base * Case Studies * Webinars * Help Guides * Videos * Forums * Threat Labs * Data Statistics * Threat Map * Emerging Threats * Plugins * APIs * Compare the Competition * Compare Crowdstrike * Compare Cylance * Compare SentinelOne * Compare Sophos * Compare TrendMicro * View All Comparisons * Cybersecurity 101 Guides * Buyer’s Guide to EPP * Buyer’s Guide to Zero Trust * Lessons from Re-EVIL’s Return * K-12 Ransomware Guide * Upgrade your MSP to MSSP * Company * Press * News * Leadership * Customers * Careers * Contact HOW WILL YOU PREVENT THE DAMAGE WHEN LEG FAILS? STOPPING CYBER THREATS VS STOPPING DAMAGE FROM CYBER THREATS...TWO VERY DIFFERENT THINGS... Learn how you can protect your network even when detection fails! GET A DEMO Watch Now News Syspeace AB and Cybersecurity Leader Comodo AnnounceNew Bundle to Stave Off Sophisticated Attacks in Windows Server Environments LEARN MORE News Coalition Inc, and Comodo Security Solutions Partner to Provide Comprehensive Cybersecurity Protection LEARN MORE News Samantha Unger Joins Comodo as Vice President Customer Success LEARN MORE News Comodo and Plexus Partner to Protect Enterprises from Cyber Attacks in Sri Lanka Market LEARN MORE News Comodo and AquaOrange Software Partner to Deliver Zero Trust Endpoint Protection to Thailand LEARN MORE News Comodo Partners with IT Service Provider Paradigm Technology Group to Offer Endpoint Protection to More Than 650 Global Enterprises LEARN MORE News Comodo Scores 100% in Endpoint and Internet Security Detection Tests by AVLAB Cybersecurity Foundation LEARN MORE News Comodo and Distilogix Partner to Deliver Zero Trust Endpoint Protection to Enterprises in the Middle East, Africa and the Eastern European Region LEARN MORE News Syspeace AB and Cybersecurity Leader Comodo AnnounceNew Bundle to Stave Off Sophisticated Attacks in Windows Server Environments LEARN MORE News Coalition Inc, and Comodo Security Solutions Partner to Provide Comprehensive Cybersecurity Protection LEARN MORE News Samantha Unger Joins Comodo as Vice President Customer Success LEARN MORE News Comodo and Plexus Partner to Protect Enterprises from Cyber Attacks in Sri Lanka Market LEARN MORE News Comodo and AquaOrange Software Partner to Deliver Zero Trust Endpoint Protection to Thailand LEARN MORE News Comodo Partners with IT Service Provider Paradigm Technology Group to Offer Endpoint Protection to More Than 650 Global Enterprises LEARN MORE News Comodo Scores 100% in Endpoint and Internet Security Detection Tests by AVLAB Cybersecurity Foundation LEARN MORE News Comodo and Distilogix Partner to Deliver Zero Trust Endpoint Protection to Enterprises in the Middle East, Africa and the Eastern European Region LEARN MORE UNIFIED MANAGED SECURITY FOR CYBER THREAT PREVENTION A single unified endpoint solution offering exploit prevention, advanced threat hunting, and endpoint management to stop ransomware, avoid breaches, and sustain your business. Explore platform DRAGON ENTERPRISE ENDPOINT CLOUD NETWORK INTERNET MANAGED CLOUD-BASED SECURITY UPDATES Equip every endpoint, network, and workload with the latest threat intelligence against cyber threat signatures and payloads. PROTECT AGAINST UNKNOWN THREATS Defense against new or zero-day cyber threats using powerful static, dynamic, and patented behavioral AI. PATENTED AUTO CONTAINMENT™ Prevent unknown cyber attacks from causing damage to your endpoints with our lightweight Kernel-level API virtualization. ATTACK CHAIN VISUALIZATIONS Gain full context of an attack to connect the dots on how hackers are attempting to breach your network. STOP BREACHES AT RUNTIME INSTEAD OF DETECTING THREATS Don’t be held ransom by finding tomorrow’s cyber threats. Empower your endpoints, network, and workloads by protecting your environments with 100% effectiveness. Discover containment FREE Vendor Vulnerability Report Get The Evidence FREE Zero-Day Malware Remover Find Zero-Day Threats FREE Real-time Threat Map VIEW LIVE THREATS FREE Open-source EDR LEARN MORE FREE Forensic Scan Tool Start free scan FREE Security Scorecard get free score FREE Real-time Threat Map VIEW LIVE THREATS FREE Open-source EDR LEARN MORE FREE Vendor Vulnerability Report Get The Evidence FREE Zero-Day Malware Remover Find Zero-Day Threats FREE Real-time Threat Map VIEW LIVE THREATS FREE Open-source EDR LEARN MORE FREE Forensic Scan Tool Start free scan FREE Security Scorecard get free score FREE Real-time Threat Map VIEW LIVE THREATS FREE Open-source EDR LEARN MORE PREVENTING BREACHES FOR TRUSTED ORGANIZATIONS Securing our customers are our #1 priority. Global industry leaders have validated our endpoint security solutions through rigorous testing. They rely on Comodo to prevent breaches by using patented auto containment that neutralizes ransomware, malware and cyber attacks. The Dragon Platform protects millions of endpoints daily from cyber threats. Explore Customer stories EXCELLENCE IN THE INDUSTRY Comodo solutions and services are recognized by leading industry associations, authorities, and analysts. Our innovative technologies are securing organizations worldwide. ENDPOINT PROTECTION 100% in protection against 0-day malware attacks, inclusive of web and email threats. 100% in the detection of widespread and prevalent malware discovered in the last 4 weeks. LEARN MORE MALWARE PROTECTION Comodo Advanced Endpoint Protection can protect against the unknown file and solves the malware problem LEARN MORE ENDPOINT PROTECTION 4.3/5 Rating for Endpoint Protection Platform 83% Recommend Comodo LEARN MORE IT AND SECURITY MANAGEMENT PLATFORM 2018 Trust Award Best Managed Security Service 2019 Finalist Threat Intel Technology LEARN MORE ENDPOINT PROTECTION 60X | AWARDS IN FIREWALL 4.2 /5 Rating for Endpoint Protection Platform 4.3 /5 Rating for Advanced Endpoint Protection 4.5 /5 Rating for Endpoint Detection and Response LEARN MORE ADVANCED ENDPOINT SECURITY AND INTERNET SECURITY Last test: March 2022 Recent result: 100% 2x | 2022 Excellence Award Total awards granted: 16 Product of the year: 2021, 2020 LEARN MORE Insights | Inside our Blog View All Blog Posts free malware SCAN A message from Comodo CEO, Ken Levine. March 04, 2022 Ukraine Cyber Response February 26, 2022 All I Want for Christmas Is Ransomware December 21, 2021 Discover Endpoint Security Bundles Discover Now Dragon AEP Advanced Endpoint Protection Move from Detection to Prevention With Auto Containment™ to isolate infections such as ransomware & unknown threats. Learn more Dragon EDR Endpoint Detection & Response Gain full context of an attack to connect the dots on how hackers are attempting to breach your network. Learn more Dragon EM Endpoint Manager Reduce the attack surface by identifying applications, understanding the vulnerabilities and remediating patches. Learn more Dragon MDR Managed Detection & Response We continuously monitor activities or policy violations providing remediation, threat mitigating, and immediate response. Learn more Move Away From Detection With Patented Threat Prevention Built For Today's Challenges. No one can stop zero-day malware from entering your network, but Comodo can prevent if from causing any damage. Zero infection. Zero damage. Book A DEMO PRODUCTS * Platform Overview * Patented Threat Prevention * Advanced Endpoint Protection * Endpoint Detection and Response (EDR) * Endpoint Manager * Mobile Device Security * Mobile Device Management * Secure Internet Gateway * Secure Email Gateway SERVICES * Managed Detection & Response * Digital Forensic & Incident Response * Managed Threat Hunting * Customer Success Management * Guided Professional Services * Customer Support TOOLS * Forensic Scan Tool * Security Scorecard * Live Threat Map * Open-source EDR * Zero-Day Malware Hunter * Vendor Vulnerability Report COMPANY * Experienced a Breach? * Contact Sales * Contact Support * Request Demo * Blog * News * Press * Customers * Careers * Partners Headquarters 200 Broadacres Drive, Bloomfield, NJ 07003 United States * Tel: +1 (888) 551-1531 * Tel: +1 (973) 859-4000 * Fax: +1 (973) 777-4394 Inquire: sales@comodo.com Support: support@comodo.com Report Bugs: security@comodo.com © 2022 Comodo Security Solutions, Inc. All rights reserved. * Terms & Conditions * Privacy Policy * Legal Repository * Cookie Policy Linkedin Facebook-f Twitter Youtube × × Scroll to Top