Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Comodo AEP Applies AI to Constant Battle Against Ransomware, Malware

    By
    Frank J. Ohlhorst
    -
    June 9, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Comodo AEP Applies AI to Constant Battle Against Ransomware, Malware

      1 - Comodo AEP Applies AI to Constant Battle Against Ransomware, Malware

      Comodo’s Advanced Endpoint Protection (AEP) brings multiple cloud and endpoint technologies together to battle malware threats. AEP combines a cloud-based IT and Security Manager (ITSM) console with an endpoint client (Comodo Client) and an artificial intelligence-powered file analytics platform called Valkyrie. ITSM is designed to unify the management of Comodo products and endpoints across an enterprise. As a subset, ITSM focuses on the security and management aspects of enterprise as well as on enforcing security rules and policies. The Comodo Client is a locally installed piece of software that combines several forms of malware and privacy protection into a small package that can leverage Valkyrie, which uses AI-based analytics to determine whether malware lurks inside files.

      2Get Started With Comodo One Enterprise Portal

      2 - Get Started With Comodo One Enterprise Portal

      The Comodo One Enterprise Portal is the primary management console for all of Comodo’s enterprise products. Administrators can use the portal to launch numerous other tightly integrated management consoles and control multiple aspects of endpoint security. Administrators can also implement a service desk, control domain security and run ITSM from the portal.

      3Comodo One Enterprise Portal Is Customizable

      3 - Comodo One Enterprise Portal Is Customizable

      The Comodo One Portal is customizable, allowing administrators to hide or expose widgets that make up what is displayed on the dashboard. With AEP, most of the management takes place in ITSM, so administrators not using Comodo’s other products may want to shut off any widgets not related to endpoint security.

      4Critical ITSM Functions Managed on Dashboard

      4 - Critical ITSM Functions Managed on Dashboard

      Customization allows administrators to bring all of the critical functions of ITSM to the main dashboard offered by the Comodo One Portal. That allows administrators to understand what is taking place on the network with a quick glance and then drill down into submenus to resolve issues.

      5Manage System Security Through the ITSM Dashboard

      5 - Manage System Security Through the ITSM Dashboard

      ITSM has a well-defined dashboard in its own right, and administrators leveraging AEP will probably spend most of their time managing systems and security here. The dashboard also supports the deployment of clients, the registration of users and endpoints, and a reporting module that displays numerous pieces of information related to the security on an endpoint.

      6Registering Endpoints Proves Easy With ITSM

      6 - Registering Endpoints Proves Easy With ITSM

      For ITSM to manage endpoints, they must be registered with the system. Device registration is very easy, and there are numerous ways to register a device. Smaller organizations, for example, may seek to have the actual users of the endpoint register their device, a process that is initiated by sending an email to the user, who then clicks on a link to register the device as well as install the Comodo Client.

      7Enrolling Devices With ITSM

      7 - Enrolling Devices With ITSM

      End users can enroll their own devices by simply following the instructions sent via email. ITSM automatically creates a custom URL that users can visit to enroll their devices and install the Comodo Client. Administrators also have the option of creating software bundles to automate the enrollment process and automatically push the Comodo Client out to any endpoint.

      8ITSM Device List Helps With System Audits

      8 - ITSM Device List Helps With System Audits

      All registered devices and their accompanying statuses are listed in the ITSM device list. From that list, administrators can drill down to get more detailed information. The list can be filtered by different criteria and customized, making it easier for administrators to spot outliers when auditing systems or going through a forensics or remediation process.

      9ITSM Keeps Track of Application Status

      9 - ITSM Keeps Track of Application Status

      Applications are registered with AEP as well, and administrators can browse through what applications are known by the system, the status of those applications and how those applications are rated. It can also identify unknown malware detected on the endpoints. Administrators have granular control over applications and can quickly determine where those applications are used and by what device.

      10ITSM Tracks Device Antivirus Status

      10 - ITSM Tracks Device Antivirus Status

      The security subsystems antivirus list provides a view into the antivirus status of devices attached to the network. Administrators can initiate scans and updates and take actions based upon the information presented in the list; they can also tag multiple systems. Critical information, such as malware status and scan states, is readily visible and gives administrators instant insights into the security posture of the endpoints.

      11Compliance Status

      11 - Compliance Status

      One of the unsung features of any anti-malware solution is the ability to determine policy compliance. ITSM provides a visual representation of compliance, making it easy for administrators to determine where action must be taken, as well as determine why a device may not be compliant.

      12Comodo Valkyrie Continually Analyzes Files

      12 - Comodo Valkyrie Continually Analyzes Files

      Valkyrie is the online portion of AEP’s file analysis capabilities and offers the ability to continually analyze files and determine if those files are a threat. Unlike a signature-based solution, Valkyrie goes many steps further by looking into a file’s payload, functions and activities. That gives zero-day protection from rapidly spreading attacks and provides extra peace of mind to administrators battling ransomware.

      13Comodo Valkyrie Reporting

      13 - Comodo Valkyrie Reporting

      Valkyrie can report on multiple security concerns; one of the most valuable reports is the APT Assessment Scan, which displays the likelihood of an Advanced Persistent Threat (APT) impacting an endpoint. APTs usually prove hard to detect and eliminate. Using behavior monitoring as well as deep file scanning, Comodo AEP is able to locate APTs and inform administrators of the potential threat.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×