• No results found

Driving Company Security is Challenging. Centralized Management Makes it Simple.

N/A
N/A
Protected

Academic year: 2021

Share "Driving Company Security is Challenging. Centralized Management Makes it Simple."

Copied!
9
0
0

Loading.... (view fulltext now)

Full text

(1)

Makes it Simple.

(2)

Overview - P3

Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4

A Revolutionary Solution: Centralized Management of PC Endpoint Security Software - P4

Comodo Endpoint Security Manager – A Fresh Approach to Centralized Management - P5

Comodo Endpoint Security Manager and Comodo Security Software – A Great Starting Point to Secure your Business - P5 Comodo Internet Security - P6

Comodo Disk Encryption - P6

The Best Solution to Company Security is One You Can Grow With - P7 Where to Learn More - P7

Executive Summary - P8 About Comodo - P9

(3)

Especially since, in addition to malware and virus threats, businesses with more than 5 desktops face other PC endpoint security challenges, as well! Just a few of these challenges include:

• Limited IT staff resources

• Limited software budgets

• Non-standard PC endpoint software image/con- figuration

• Immature and/or loosely enforced security policies

• High staff turn-over

• Virtual and other “away from the office” work done

These challenges leave businesses vulnerable and pose threats to both company security and profitability.

In today’s world, the explosion of sophisticated malware and virus threats make driving company security a challenge.

These challenges pose major threats to both company security and profitability.

Even a small number of unprotected or under-protected PC endpoints can jeopardize an entire business. Having some form of security software deployed on each PC endpoint within a business is better than not having it, but only marginally better. Leaving the administration of that software up to each individual user is a recipe for a security breach because a single computer with weak security is the weak link in your company’s entire security chain.

Threats to business profitability can arise as well. Just a modest incident can take computers off-line for hours, impacting company productivity, response to custom- ers, even whole business partner relationships! Since

“valuable information” that must be stored and distrib- uted via company computers, data loss or data theft have ramifications well beyond lost productivity. After all, in a very real sense, that information is the company itself! Then too, companies that utilize understaffed and overworked IT employees in an attempt to keep each individual PC endpoint secure, find this exercise costly and one that takes away from other pressing tasks that can improve employee productivity, customer satisfac- tion, and company profitability. Finally, “doing the job right” has historically required costly software licensing from security software companies.

Overview

Security Threats, Downtime and High Costs

(4)

Managing laptops and desktops with security software from different vendors presents a challenge to any admin- istrator, just as making changes to a number of computers individually can become an unmanageable task. Moreover, both threat sophistication and zero day exposure are in- creasing. This leaves businesses with loosely enforced PC security policies exposed to attacks that will affect perfor- mance and productivity. Not only are businesses leaving themselves open to attacks with loosely enforced security policies but, having detection based software, they are

also left wide open to vulnerability! From the time a virus is reported to the time a signature is published, hours or even days could have elapsed. A business cannot afford a window of vulnerability this extreme. Before the signature is published, the business could have encountered a security breach, data loss, data theft or downtime. A single infected computer could be the weak link causing a whole network to go down. Businesses cannot afford to have comput- ers go offline for minutes, let alone hours or days. In any business, time is money!

Centralized management gives qualified systems ad- ministrators within an organization the ability to man- age global or work group security policies from their own desktop consoles. It allows them to apply the necessary rigor and confidently control today’s busi- ness environment demands. From a security perspec- tive, this means that critical procedures ranging from installing updates, configuring security levels, encrypt- ing data and allowing/disallowing various programs to run (or even be installed), can be enacted centrally by a trained professional. This is far better than al-

lowing such processes to be enacted by PC endpoint untrained users. Even in organizations with minimally defined formal security policies, taking this step can go a long way to lowering the security risk to a business.

Business profitability is enhanced through increased productivity of the IT department and the general staff, as ad-hoc manual processes are replaced by stan- dardized, automated ones. PC endpoint or network outages are likely to be reduced as a result of more ef- fective security policy enforcement. In short, the whole organization functions better.

Threats to Company Security and Profitability

A Revolutionary Solution:

Centralized Management of PC Endpoint Security Software

Organizations of all sizes are struggling to make sure their PCs have all the latest security patches and are in compliance with corporate policies.

Centralized management of PC endpoint security software can enhance both company security and profitability.

(5)

Once installed, Endpoint Security Manager can be con- figured to scan for all endpoints connected to the network using either Active Directory or Workgroup environments.

Through the use of a single agent installed remotely, Endpoint Security Manager’s intuitive interface allows for centralized management of security policies and task scheduling. Additionally, Endpoint Security Manager can

be configured to protect registry keys from being changed by malicious programs, port monitoring and more -- all from a single console! Administrators are also able to configure a local update server to download database (AV signature) and software updates to managed computers.

This saves time and bandwidth when rolling out updates to a large number of managed nodes.

Comodo’s endpoint security solutions greatly strengthen overall network security while helping businesses realize substantial operational cost efficiencies. Individually, each

product delivers superior protection against its specific threat vector. When used as a coordinated solution suite, they provide a level of network security that is unrivaled in

Comodo Endpoint Security Manager –

A Fresh Approach to Centralized Management

Comodo Endpoint Security Manager and

Comodo Security Software – A Great Starting Point to Secure your Business

Comodo Endpoint Security Manager (CESM) is unique.

Comodo’s range of endpoint security solutions offers integrated and layered protection for net- work workstations.

(6)

CDE also partitions against theft or loss. A ‘full disk en- cryption’ product, CDE uses on-the-fly encryption and two levels of authentication to ensure that endpoint machines will not even boot if the correct decryption key is not presented. Administrators can configure USB memory sticks to act as authentication keys to decrypt the drives and partitions of employee machines. This key must be plugged into the system to accept the en-

crypted drive(s) whenever the system is started. Compa- nies that enforce USB authentication on employee lap- tops can be assured that critical company data cannot be compromised should that laptop be mislaid or sto- len. Once installed and configured, CDE is transparent to the end-user. In fact, encrypted drives can continue to be used as before with no performance slow down.

Comodo Disk Encryption

COMODO DISK ENCRYPTION (CDE) ALLOWS ENTERPRISES TO PROTECT THE DATA ON EMPLOYEE LAPTOPS, HARD DRIVES AND REMOTE STORAGE DEVICES.

Comodo Internet Security should be the first and pri- mary line of defense for endpoint machines because it blocks viruses and malware before they have the op- portunity to install.

The Defense+ component of Comodo Internet Security is a rules-based host intrusion prevention system that constantly monitors the activities of all executable files on endpoint machines. It provides the ability to control all execution paths, therefore deny malware access to the CPU. This means it will not even permit malware to execute! Preventing malware from executing inherently protects the endpoint from becoming infected and ultimately prevents malware from spreading through- out the network. In addition to monitoring CPU usage through the use of Comodo Internet Security, critical components such as memory, port and registry settings, are monitored and protected from attack.

Comodo Internet Security’s firewall offers the highest level of security against inbound and outbound threats.

It also blocks malicious software from transmitting confidential company data over the Internet. Comodo Firewall makes it easy for you to specify exactly which endpoint applications can connect to the Internet. It

then blocks unacceptable applications and tells an administrator if an installed application has attempted to breach network security.

Comodo Internet Security also incorporates a full- fledged Antivirus engine. The AV software leverages multiple technologies, including Real-Time/On-Access Scanning, On Demand Scanning, heuristics to identify previously unknown viruses, and a full-featured scan scheduler. The application also allows administrators to create custom scan profiles which can be re-used across all scan types. They feature full-event logging, quar- antine and daily signature updates. Comodo Antivirus detects and removes threats that are present on your computer. It even forms an additional layer of security on top of the threat prevention offered by the Firewall and Defense+ components!

CESM provides administrators with immediate and centralized notification of potential threats occurring on any part of the network. This means emergency response times are lowered and network-wide security policy changes can be rolled out swiftly and decisively to all protected nodes.

Comodo Internet Security

COMODO INTERNET SECURITY PROVIDES 360° PROTECTION AGAINST INTERNAL AND EXTERNAL THREATS BY COMBINING POWERFUL ANTIVIRUS PROTECTION, AN ENTERPRISE CLASS PACKET FILTERING FIREWALL AND AN ADVANCED HOST INTRUSION PREVENTION SYSTEM CALLED DEFENSE+.

(7)

PC endpoint security allows a company to stay in con- trol of their security policies. It also allows qualified sys- tem administrators within an organization to manage global or work group security policies from their own desktop consoles. They can apply the necessary rigor and confidently control today’s business environment demands. From a security perspective, this means that critical procedures like installing updates, configuring security levels, encrypting data and allowing/disallow- ing various programs to run (or even be installed) can be enacted by a trained professional, rather than a PC endpoint untrained user. Even in organizations with minimally defined security policies, taking this step can go a long way to lowering the security risk to a business.

PC endpoint security greatly strengthens overall net- work security while helping businesses realize substan- tial operational cost efficiencies. Business profitability is enhanced through increased productivity of the IT de- partment and the general staff, as ad-hoc manual pro- cesses are replaced by standardized, automated ones.

PC endpoint or network outages are likely to be reduced as a result of more effective security policy enforcement.

In short, the whole organization functions better.

All Comodo products deliver superior protection against their specific threat vectors. When used as a coordinated solution suite, they provide a level of net- work security that is unrivaled in the industry. Comodo

is the online security industry’s No.1 Innovator. Comodo can also boast the fastest growing portfolio of PC End- point Security products. For instance, Endpoint Security Manager customers will soon have access to an even broader range of Comodo Endpoint Security solutions.

These new solutions will offer an advantage for future Endpoint Security Manager customers by providing them with a full suite of security software that can be managed through a single console. Also in develop- ment are integrations such as Comodo Time Machine (disaster recovery software), Comodo Secure E-Mail, and more. Policies and controls for all of these solutions will be manageable from a single administrator’s console.

CESM’s modular, plug ‘n’ secure architecture means new and existing Comodo Security products can be quickly added or removed as per company requirements, mak- ing the future even more secure for businesses that choose Comodo.

Comodo has consistently helped businesses around the globe address their unique security requirements. De- ploying CESM as your endpoint security manager means embarking on a relationship with a security partner that has the deepest expertise, experience and understand- ing of how to help businesses achieve their security and productivity goals.

To learn more or discuss how Comodo Endpoint Secu- rity Solutions can help strengthen the security of your network, please visit us on:

www.enterprise.comodo.com, e-mail us at pcsecurity@comodo.com or call us at 1-866-256-2608.

The Best Solution to Company

Security is One You Can Grow With

Where to Learn More

Comodo’s range of PC endpoint security solutions offer integrated and layered protec- tion for network workstations.

(8)

Some of these challenges include limited IT staff, limited software budgets, immature and/or loosely enforced security policies and non-standard PC endpoint soft- ware image/configuration. These threats pose many challenges to company security and profitability. Even a small number of unprotected or under-protected PC endpoints can jeopardize the security of an entire busi- ness. And just a modest incident can take computers off-line for hours, impacting company productivity, response to customers, even whole business partner relationships! Since the products of so many businesses is “valuable information” that must be stored and distrib- uted via company computers, data loss and data theft is a major concern. It has ramifications well beyond lost productivity, because in a very real sense, that informa- tion is the company itself!

Centralized management of PC endpoint security software can enhance both company security and profitability. Centralized management gives qualified systems administrators within an organization the abil- ity to manage global or work group security policies from their own desktop consoles. They can apply the necessary rigor and confidently control today’s busi- ness environment demands. From a security perspec- tive, this means that critical procedures like installing updates, configuring security levels, encrypting data and allowing/disallowing various programs to run (or even be installed) can be enacted centrally by a trained professional, rather than a PC endpoint untrained user.

Business profitability is enhanced through increased

productivity of a company’s IT department and entire staff, as ad-hoc manual processes are replaced by stan- dardized, automated ones. PC endpoint or network outages are likely to be reduced, as a result of more ef- fective security policy enforcement. In short, the whole organization functions better.

Comodo’s Endpoint Security Manager is the choice of a growing number of corporations. Once installed, End- point Security Manager can be configured to scan for all endpoints connected to the network, using either Active Directory or Workgroup environments. And it can all be done through the use of a single agent in- stalled remotely. Endpoint Security Manager’s intuitive interface allows for centralized management of security policies and task scheduling. Additionally, Endpoint Security Manager can be configured to protect registry keys form being changed by malicious programs, port monitoring and more -- all from a single console! Ad- ministrators are also able to configure a local update server to download database, AV signature and software updates to managed computers. This saves time and bandwidth when rolling out updates to a large number of managed nodes.

Comodo Endpoint Security Manager provides top quality Internet Security that protects against internal and external threats by combining powerful Antivirus protection, an enterprise class packet filtering firewall and an advanced host intrusion prevention system called Defense +. Comodo Endpoint Security Manager has also been integrated with Comodo Disk Encryp- tion so enterprises can protect the data on employee laptops, hard drives and remote storage devices. It also partitions against theft or loss. Each Comodo product delivers superior protection against its specif- ic threat vector. When used as a coordinated solution suite, they provide a level of network security that is unrivaled in the industry. Using Comodo endpoint se- curity will greatly strengthen overall network security at your company, while helping your business realize substantial operations cost efficiencies.

Executive Summary

Businesses with multiple desktops face many PC endpoint security challenges.

(9)

dition, with over 10,000,000 installa- tions of its threat prevention products, Comodo Security Solutions maintain an extensive suite of endpoint security software and services for businesses and consumers.

Innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime, distinguish the Comodo companies as vital players in the Internet’s ongoing development.  Co- modo, with offices in the US, UK,

China, India, Romania and the Ukraine, secures and authenticates the online transactions and communications for over 200,000 businesses and millions of consumers, providing the intelligent security, authentication and assurance services necessary for trust in online transactions.

  For additional information on Comodo visit http://www.enterprise.comodo.com

References

Related documents

Administrators can have issuance abilities for SSL Certificate and / or Corporate Secure Email Certificates, and controlled access to global or local reporting facilities..

Comodo also applies its patent-pending certificate deployment and EV enhancement Instant security for your web operations, internal and external networks, users and email

Comodo maintained effective controls over the security and availability of its Digital Certificate Solutions, Comodo Certificate Manager (CCM) and Comodo Two Factor

Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc.. a) Select 'Equal' or 'Not Equal' option from the drop-down box. ‘Not Equal’ will invert your selected

After installation, the Comodo Firewall icon will be displayed on the Windows desktop. To start the Comodo Firewall program, double-click on the icon and the management interface

Comodo is a leading global provider of internet and cyber security solutions, founded on the belief that every single digital transaction deserves and requires a unique layer of

(Note: The PCI Data Security Standard requires quarterly scans. This free service will provide certification to demonstrate first quarter compliance only. Merchants wishing to

Comodo Internet Security Pro allows you to customize the behavior of Defense+ by adjusting a Security Level slider to switch between preset security levels.. The choices available