www.comodo.com Open in urlscan Pro
2606:4700:10::6814:3df2  Public Scan

Submitted URL: http://comodo.net/
Effective URL: https://www.comodo.com/
Submission: On January 19 via manual from US — Scanned from GB

Form analysis 1 forms found in the DOM

<form data-hs-cf-bound="true"><span class="fieldset">
    <p><input type="checkbox" value="check" id="chkMain" checked="checked" class="legacy-group-status optanon-status-checkbox"><label for="chkMain">Active</label></p>
  </span></form>

Text Content

Cookie Notice

We use cookies to personalise content and ads, to provide social media features
and to analyse our traffic. We also share information about your use of our site
with our social media, advertising and analytics partners. Cookie Policy


Close
I ACCEPT THE TERMS


 * Your Privacy

 * Strictly Necessary Cookies

 * Performance Cookies

 * Functional Cookies

 * Targeting Cookies

 * More Information

Privacy Preference Centre

Active

Always Active



Save Settings

Allow All

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

We won't track your information when you visit our site. But in order to comply
with your preferences, we'll have to use just one tiny cookie so that you're not
asked to make this choice again.

Accept Decline
Skip to content

Comodo: Cloud Native Cyber Security Platform

 * For Business
 * For Home
 * For Partners

 * Experienced a Breach?: 1-888-551-1531
 * Contact
 * Blog
 * English
 * Sign In
   * [US] Dragon Platform
   * [EU] Dragon Platform
   * [US] Dragon Enterprise
   * [EU] Dragon Enterprise

 * Products
   DRAGON ENTERPRISE
   Comodo introduced a new approach to endpoint protection, engineered to solve
   the issue of legacy security solutions.
   Dragon Platform Overview
   Patented Threat Prevention
   Product Bundled Packages
   Subscribe to the platform
   PLATFORM PRODUCTS
    * Advanced Endpoint Protection
      
      Impenetrable cybersecurity without sacrificing usability
   
    * Endpoint Detection and Response (EDR)
      
      Gain detailed visibility into all your endpoints activities
   
    * Endpoint Manager
      
      Reduce the attack surface to remediate and patch
   
    * Mobile Device Security
      
      Fortify mobile devices that exit and enter your network
   
    * Comodo NGAV
      
      Keep endpoints safe from known threat signatures
   
    * Comodo MDM
      
      Setup device network and security policies quickly
   
    * Secure Web Gateway
      
      Defend from any internet based threats
   
    * Secure Email Gateway
      
      Stop email threats before it enters your inbox
   
   TECHNOLOGY & PROCESS
    * Auto Containment
      
      Patented to ensure absolute isolation from threats
   
    * Global Threat Intelligence
      
      Insights from deep web and dark web to eliminate risk
   
    * Zero Trust Architecture
      
      Our pioneered approach has shifted the industry
   
    * 45 Second Verdict Engine
      
      100% trust an all files at lightning speeds

 * Services
   WORLDWIDE SERVICES
   No one can stop zero-day malware from entering your network, but Comodo can
   prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.
   Request a demo
   Get Emergency Help
   THREAT SERVICES
    * Digital Forensics and Incident Response
      
      Retain experts to investigate an incident to start remediation
   
    * Managed Detection and Response
      
      Our experts closely monitor changes to your environment 24x7x365
   
    * Managed Threat Hunting
      
      Cybersecurity experts will continuously hunt suspicious endpoint activity
   
   SUPPORT, DEPLOY, MAINTAIN
    * Comodo Professional Services
      
      Ensure your installations are properly deployed
   
    * Comodo Support Services
      
      Trouble with maintaining your products? Get help now
   
    * Comodo Customer Success Management
      
      Align your success with optimal security performance

 * Tools
   * Forensic Scan Tool
   * Security Scorecard
   * Live Threat Map
   * Open-source EDR
   * Zero Day Malware Hunter
   * Vendor Vulnerability Report
 * Partners
   * Partner Program
   * SOC Platform Overview
   * Begin Partner Application
   * Partner Portal Login
   * Deal Registration
 * Resources
   RESOURCE DISCOVERY
   Comodo introduced a new approach to add managed cybersecurity and endpoint
   protection to your customers benefit, right into your existing programs.
   KNOWLEDGE BASE
    * Case Studies
      
      
   
    * Webinars
      
      
   
    * Help Guides
      
      
   
    * Videos
      
      
   
    * Forums
      
      
   
   THREAT LABS
    * Data Statistics
      
      
   
    * Threat Map
      
      
   
    * Emerging Threats
      
      
   
    * Plugins
      
      
   
    * APIs
      
      
   
   COMPARE THE COMPETITON
    * Compare Crowdstrike
      
      
   
    * Compare Cylance
      
      
   
    * Compare SentinelOne
      
      
   
    * Compare Sophos
      
      
   
    * Compare TrendMicro
      
      
   
    * View All Comparisons
      
      
   
   CYBERSECURITY 101 GUIDES
    * Buyer's Guide to EPP
      
      
   
    * Buyer's Guide to Zero Trust
      
      
   
    * Lessons from Re-EVIL's Return
      
      
   
    * K-12 Ransomware Guide
      
      
   
    * Upgrade your MSP to MSSP
      
      

 * Company
   * Press
   * News
   * Leadership
   * Customers
   * Careers
   * Contact

REQUEST DEMO
 * Products
   * Dragon Platform Overview
   * Patented Threat Prevention
   * Product Bundled Packages
   * Platform Modules
     * Advanced Endpoint Protection
     * Endpoint Detection and Response (EDR)
     * Endpoint Manager
     * Mobile Device Security
     * Comodo NGAV
     * Comodo MDM
     * Secure Web Gateway
     * Secure Email Gateway
   * Technology & Process
     * Auto Containment
     * Global Threat Intelligence
     * Zero Trust Architecture
     * Valkyrie Verdict Engine
 * Services
   * Request a demo
   * Get Emergency Help
   * Threat Services
     * Digital Forensics and Incident Response
     * Managed Detection and Response
     * Managed Threat Hunting
   * Support, Deploy, Maintain
     * Comodo Professional Services
     * Comodo Support Services
     * Comodo Customer Success Management
 * Tools
   * Forensic Scan Tool
   * Security Scorecard
   * Live Threat Map
   * Open-source EDR
   * Zero-Day Malware Hunter
   * Vendor Vulnerability Report
 * Partners
   * Partner Program
   * SOC Platform Overview
   * Begin Partner Application
   * Partner Portal Login
   * Deal Registration
 * Resources
   * Knowledge Base
     * Case Studies
     * Webinars
     * Help Guides
     * Videos
     * Forums
   * Threat Labs
     * Data Statistics
     * Threat Map
     * Emerging Threats
     * Plugins
     * APIs
   * Compare the Competition
     * Compare Crowdstrike
     * Compare Cylance
     * Compare SentinelOne
     * Compare Sophos
     * Compare TrendMicro
     * View All Comparisons
   * Cybersecurity 101 Guides
     * Buyer’s Guide to EPP
     * Buyer’s Guide to Zero Trust
     * Lessons from Re-EVIL’s Return
     * K-12 Ransomware Guide
     * Upgrade your MSP to MSSP
 * Company
   * Press
   * News
   * Leadership
   * Customers
   * Careers
   * Contact


HOW WILL YOU PREVENT THE DAMAGE WHEN LEG FAILS?


STOPPING CYBER THREATS VS STOPPING DAMAGE FROM CYBER THREATS...TWO VERY
DIFFERENT THINGS...

Learn how you can protect your network even when detection fails!
GET A DEMO
Watch Now

News
Syspeace AB and Cybersecurity Leader Comodo AnnounceNew Bundle to Stave Off
Sophisticated Attacks in Windows Server Environments
LEARN MORE
News
Coalition Inc, and Comodo Security Solutions Partner to Provide Comprehensive
Cybersecurity Protection
LEARN MORE
News
Samantha Unger Joins Comodo as Vice President Customer Success
LEARN MORE
News
Comodo and Plexus Partner to Protect Enterprises from Cyber Attacks in Sri Lanka
Market
LEARN MORE
News
Comodo and AquaOrange Software Partner to Deliver Zero Trust Endpoint Protection
to Thailand
LEARN MORE
News
Comodo Partners with IT Service Provider Paradigm Technology Group to Offer
Endpoint Protection to More Than 650 Global Enterprises
LEARN MORE
News
Comodo Scores 100% in Endpoint and Internet Security Detection Tests by AVLAB
Cybersecurity Foundation
LEARN MORE
News
Comodo and Distilogix Partner to Deliver Zero Trust Endpoint Protection to
Enterprises in the Middle East, Africa and the Eastern European Region
LEARN MORE
News
Syspeace AB and Cybersecurity Leader Comodo AnnounceNew Bundle to Stave Off
Sophisticated Attacks in Windows Server Environments
LEARN MORE
News
Coalition Inc, and Comodo Security Solutions Partner to Provide Comprehensive
Cybersecurity Protection
LEARN MORE
News
Samantha Unger Joins Comodo as Vice President Customer Success
LEARN MORE
News
Comodo and Plexus Partner to Protect Enterprises from Cyber Attacks in Sri Lanka
Market
LEARN MORE
News
Comodo and AquaOrange Software Partner to Deliver Zero Trust Endpoint Protection
to Thailand
LEARN MORE
News
Comodo Partners with IT Service Provider Paradigm Technology Group to Offer
Endpoint Protection to More Than 650 Global Enterprises
LEARN MORE
News
Comodo Scores 100% in Endpoint and Internet Security Detection Tests by AVLAB
Cybersecurity Foundation
LEARN MORE
News
Comodo and Distilogix Partner to Deliver Zero Trust Endpoint Protection to
Enterprises in the Middle East, Africa and the Eastern European Region
LEARN MORE




UNIFIED MANAGED SECURITY
FOR CYBER THREAT PREVENTION

A single unified endpoint solution offering exploit prevention, advanced threat
hunting, and endpoint management to stop ransomware, avoid breaches, and sustain
your business.
Explore platform



DRAGON ENTERPRISE

ENDPOINT
CLOUD
NETWORK
INTERNET
MANAGED


CLOUD-BASED SECURITY UPDATES

Equip every endpoint, network, and workload with the latest threat intelligence
against cyber threat signatures and payloads.


PROTECT AGAINST
UNKNOWN THREATS

Defense against new or zero-day cyber threats using powerful static, dynamic,
and patented behavioral AI.


PATENTED AUTO
CONTAINMENT™

Prevent unknown cyber attacks from causing damage to your endpoints with our
lightweight Kernel-level API virtualization.


ATTACK CHAIN VISUALIZATIONS

Gain full context of an attack to connect the dots on how hackers are attempting
to breach your network.


STOP BREACHES AT RUNTIME INSTEAD OF DETECTING THREATS

Don’t be held ransom by finding tomorrow’s cyber threats. Empower your
endpoints, network, and workloads by protecting your environments with 100%
effectiveness.
Discover containment

FREE
Vendor Vulnerability Report
Get The Evidence
FREE
Zero-Day Malware Remover
Find Zero-Day Threats
FREE
Real-time Threat Map
VIEW LIVE THREATS
FREE
Open-source EDR
LEARN MORE
FREE
Forensic
Scan Tool
Start free scan
FREE
Security Scorecard
get free score
FREE
Real-time Threat Map
VIEW LIVE THREATS
FREE
Open-source EDR
LEARN MORE
FREE
Vendor Vulnerability Report
Get The Evidence
FREE
Zero-Day Malware Remover
Find Zero-Day Threats
FREE
Real-time Threat Map
VIEW LIVE THREATS
FREE
Open-source EDR
LEARN MORE
FREE
Forensic
Scan Tool
Start free scan
FREE
Security Scorecard
get free score
FREE
Real-time Threat Map
VIEW LIVE THREATS
FREE
Open-source EDR
LEARN MORE




PREVENTING BREACHES FOR TRUSTED ORGANIZATIONS

Securing our customers are our #1 priority. Global industry leaders have
validated our endpoint security solutions through rigorous testing. They rely on
Comodo to prevent breaches by using patented auto containment that neutralizes
ransomware, malware and cyber attacks. The Dragon Platform protects millions of
endpoints daily from cyber threats.
Explore Customer stories




EXCELLENCE IN THE INDUSTRY

Comodo solutions and services are recognized by leading industry associations,
authorities, and analysts. Our innovative technologies are securing
organizations worldwide.


ENDPOINT PROTECTION

100% in protection against 0-day malware attacks, inclusive of web and email
threats.

100% in the detection of widespread and prevalent malware discovered in the last
4 weeks.
LEARN MORE


MALWARE PROTECTION

Comodo Advanced Endpoint Protection can protect against the unknown file and
solves the malware problem
LEARN MORE


ENDPOINT PROTECTION

4.3/5 Rating for Endpoint Protection Platform

83% Recommend Comodo
LEARN MORE

IT AND SECURITY
MANAGEMENT PLATFORM

2018 Trust Award
Best Managed Security Service

2019
Finalist Threat Intel Technology

LEARN MORE


ENDPOINT PROTECTION
60X | AWARDS IN FIREWALL

4.2 /5 Rating for Endpoint Protection Platform

4.3 /5 Rating for Advanced Endpoint Protection

4.5 /5 Rating for Endpoint Detection and Response

LEARN MORE


ADVANCED ENDPOINT SECURITY AND INTERNET SECURITY

Last test: March 2022
Recent result: 100%

2x | 2022 Excellence Award

Total awards granted: 16
Product of the year: 2021, 2020

LEARN MORE
Insights | Inside our Blog
View All Blog Posts
free malware SCAN

A message from Comodo CEO, Ken Levine.

March 04, 2022

Ukraine Cyber Response

February 26, 2022

All I Want for Christmas Is Ransomware

December 21, 2021
Discover Endpoint Security Bundles
Discover Now
Dragon AEP
Advanced Endpoint Protection

Move from Detection to Prevention With Auto Containment™ to isolate infections
such as ransomware & unknown threats.

Learn more
Dragon EDR
Endpoint Detection & Response
Gain full context of an attack to connect the dots on how hackers are attempting
to breach your network.
Learn more
Dragon EM
Endpoint Manager
Reduce the attack surface by identifying applications, understanding the
vulnerabilities and remediating patches.
Learn more
Dragon MDR
Managed Detection & Response
We continuously monitor activities or policy violations providing remediation,
threat mitigating, and immediate response.
Learn more
Move Away From Detection
With Patented Threat Prevention
Built For Today's Challenges.

No one can stop zero-day malware from entering your
network, but Comodo can prevent if from causing any
damage. Zero infection. Zero damage.

Book A DEMO
PRODUCTS
 * Platform Overview
 * Patented Threat Prevention
 * Advanced Endpoint Protection
 * Endpoint Detection and Response (EDR)
 * Endpoint Manager
 * Mobile Device Security
 * Mobile Device Management
 * Secure Internet Gateway
 * Secure Email Gateway

SERVICES
 * Managed Detection & Response
 * Digital Forensic & Incident Response
 * Managed Threat Hunting
 * Customer Success Management
 * Guided Professional Services
 * Customer Support

TOOLS
 * Forensic Scan Tool
 * Security Scorecard
 * Live Threat Map
 * Open-source EDR
 * Zero-Day Malware Hunter
 * Vendor Vulnerability Report

COMPANY
 * Experienced a Breach?
 * Contact Sales
 * Contact Support
 * Request Demo
 * Blog
 * News
 * Press
 * Customers
 * Careers
 * Partners

Headquarters
200 Broadacres Drive,
Bloomfield, NJ 07003
United States

 * Tel: +1 (888) 551-1531
 * Tel: +1 (973) 859-4000
 * Fax: +1 (973) 777-4394

Inquire: sales@comodo.com

Support: support@comodo.com

Report Bugs: security@comodo.com

© 2022 Comodo Security Solutions, Inc. All rights reserved.
 * Terms & Conditions
 * Privacy Policy
 * Legal Repository
 * Cookie Policy

Linkedin
Facebook-f
Twitter
Youtube

×

×

Scroll to Top