Endpoint Security Manager Prevents Intruders

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

<p><strong>Jersey City, N.J. &mdash; Nov. 6</strong><br />Comodo Endpoint Security Manager (ESM) now enables centralized management of the award-winning Comodo Firewall Pro. Saving significant time and money on security software, installation and day-to-day management tasks, ESM also enables IT staff to remotely and rapidly control endpoint usage and security-policy configurations. </p><p>ESM&rsquo;s instant setup and management of Comodo Firewall Pro enables maximum protection against harmful threats, all from a central administrative console. <br /><br />Comodo Firewall Pro recognizes more than 1.1 million known safe executables, and its Host Intrusion Prevention System (HIPS) challenges those it doesn&rsquo;t know. Through this combination of Comodo ESM and Firewall Pro, endpoints are protected in a more dynamic and comprehensive manner than ever before. <br /><br />HIPS monitors and controls all execution paths and prevents malware from executing. ESM remotely deploys and manages the Firewall and all security policies without the need to wait for a virus-signature update from any vendor. <br /><br />While competing security software companies continue to patch their software to prevent possibly disastrous threats, zero-day attackers can be exploiting known vulnerabilities before a patch is issued. Comodo Firewall Pro presents unknown code execution as a first and most important line of defense, while ESM assists by alerting the IT administrator of suspected and prevented threats. ESM then allows immediate the administrator to take action remotely. <br /><br />For a limited time, Comodo Security Solutions will provide Endpoint Security Manager at no charge for up to five desktops within an organization. <br /></p>

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment:

Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>