Case Studies > Comodo’s Real Time Automatic Containment Technology Helps CMNetworx Stay Cyber Safe

Comodo’s Real Time Automatic Containment Technology Helps CMNetworx Stay Cyber Safe

Company Size
11-200
Region
  • America
Country
  • United States
Product
  • Comodo Endpoint Security Manager (CESM)
  • Comodo Endpoint Security (CES)
  • Run-Time Threat Containment (RATC)
Tech Stack
  • Automatic Run-Time Threat Containment (RATC)
  • Five Layer Defense Suite
  • Comodo ESM Dashboard
Implementation Scale
  • Enterprise-wide Deployment
Impact Metrics
  • Cost Savings
  • Customer Satisfaction
  • Productivity Improvements
Technology Category
  • Cybersecurity & Privacy - Endpoint Security
  • Cybersecurity & Privacy - Malware Protection
  • Cybersecurity & Privacy - Security Compliance
Applicable Industries
  • Professional Service
  • Software
Applicable Functions
  • Business Operation
  • Maintenance
Use Cases
  • Intrusion Detection Systems
Services
  • Cybersecurity Services
  • System Integration
About The Customer
CMNetworx is an end-to-end computer technology service firm servicing B2B and B2C clients across the state of Montana. With the influx in cyber-crime, malware and spyware, CMNetworx shifted its core services into repair, intrusion prevention, cloud conversion, compliance and troubleshooting. With a small IT staff, CMNetworx needed a solution that would secure and centrally manage its laptops, desktops and server endpoints with minimum administrative effort – keeping those endpoints protected from malware and spyware. CMNetworx turned to Comodo for help. As a small business, they required a reliable endpoint security management solution that could scale with them and fit within their budget, while providing leading security and protection for their endpoints without fail.
The Challenge
Today’s malware threats are designed to hack into infrastructures to steal personal information or cause massive technology and business destruction through a computer virus. Traditional antivirus technology in the past has used blacklisting technology to try and keep malware away from penetrating an IT system. But what if that malware file is unknown and doesn’t appear on the blacklist? Then, that malware would be allowed to pass into a system because it was unknown, it wasn’t on the blacklist. This is the challenge of legacy antivirus technologies – the inability to contain the unknown threat. Blacklisting simply cannot keep up with the 50,000 new pieces of malware developed every day —demand outpaces supply. Traditional antivirus solutions also use a ‘default-allow’ approach, which only stops recognized, blacklisted files, and focus only on detection -- not prevention. This means that an unknown file that isn’t on the blacklist is allowed to pass through to the operating system and infect it. It only takes one bad file to infect a host. Using technology that recognizes and contains unknown files to prevent cyberattacks and malware penetration is now required. Today, many small business and organizations have limited budgets and a small number of IT staffs – yet are still at risk for the same types of attacks that can hit large enterprises.
The Solution
Part of Comodo Endpoint Security Manager (CESM), Comodo Endpoint Security (CES) automatically traps and contains unknown files and allows them to execute in a secure, virtual container through its automatic Run-Time Threat Containment (RATC) technology. In addition to Comodo’s RATC, which prevents zero-day malware attacks, CMNetworx is taking advantage of and realizing significant benefits from a five layer defense suite (Antivirus, Firewall, Host Intrusion Prevention, Auto-Sandbox & File Reputation) that is part of Comodo Endpoint Security – protecting right at the point of impact. The Comodo ESM dashboard gives companies such as CMNetworx panoramic insight and control over all aspects of endpoint protection and management. The interface displays critical metrics about each endpoint, facilitating rapid alerting and remediation of issues. Administrators can also terminate endpoint processes, stop or start services, uninstall applications and delete unwanted files - all without causing interference to the end-user. Comodo’s real time automatic threat containment technology eliminates malware outbreaks and operating system contamination by automatically running untrusted processes in an isolated environment.
Operational Impact
  • Comodo’s technology has the ability to automatically contain any file that might be harmful or cause disruption to CMNetworx, ensuring that these threats never negatively impact their IT environment.
  • The Comodo ESM dashboard provides panoramic insight and control over all aspects of endpoint protection and management, facilitating rapid alerting and remediation of issues.
  • Administrators can terminate endpoint processes, stop or start services, uninstall applications, and delete unwanted files without causing interference to the end-user.
  • Comodo’s real-time automatic threat containment technology eliminates malware outbreaks and operating system contamination by automatically running untrusted processes in an isolated environment.
Quantitative Benefit
  • Comodo Endpoint Security Manager (CESM) helps CMNetworx secure and centrally manage its laptops, desktops, and server endpoints with minimum administrative effort.
  • The five-layer defense suite (Antivirus, Firewall, Host Intrusion Prevention, Auto-Sandbox & File Reputation) provides comprehensive protection right at the point of impact.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.