Case Studies > Software Innovator for the Wine Industry Uses Comodo Technology to Secure Their Infrastructure

Software Innovator for the Wine Industry Uses Comodo Technology to Secure Their Infrastructure

Company Size
11-200
Region
  • America
Country
  • United States
Product
  • Comodo Endpoint Security Management (ESM)
  • Comodo Automatic Containment Technology
Tech Stack
  • Antivirus
  • Firewall
  • Host Intrusion Prevention
  • Automatic Containment
  • File Reputation
Implementation Scale
  • Enterprise-wide Deployment
Impact Metrics
  • Brand Awareness
  • Customer Satisfaction
  • Digital Expertise
Technology Category
  • Cybersecurity & Privacy - Endpoint Security
  • Cybersecurity & Privacy - Intrusion Detection
  • Cybersecurity & Privacy - Malware Protection
Applicable Industries
  • Food & Beverage
  • Software
Applicable Functions
  • Business Operation
  • Sales & Marketing
Use Cases
  • Intrusion Detection Systems
Services
  • Software Design & Engineering Services
  • System Integration
About The Customer
Headquartered in Napa, California, eWinery Solutions provides a complete wine-industry specific software solution to help wineries around the world manage their direct-to-consumer business from the first point of contact to extended customer interaction. The company is an innovative provider of e-commerce, wine club, wine production and point-of-sale solutions and is known for providing feature rich, flexible technology and excellent service to leading wineries nationwide. In September 2014, eWinery Solutions became a member of the Granbury Solutions family, yet still operating under the successful eWinery Solutions brand today.
The Challenge
There are so many unknown viruses and cyberattacks today; criminals hack into companies systems and steal their private information. As a company that works with credit cards and personal information, we needed to put an IT security system in place that would give us the ultimate protection. Comodo’s endpoint security management solution has been the best choice for us by far, because it protects us—and our customers—from both the known and unknown cyber threats.
The Solution
Comodo’s Endpoint Security Management (ESM) software suite, which brings five layers of defense (Antivirus, Firewall, Host Intrusion Prevention, Automatic Containment and File Reputation) right to the point of impact—the desktop environment, is the optimal solution for eWinery Solutions. Comodo’s patent-pending automatic containment technology prevents malware outbreaks by automatically running untrusted processes in an isolated environment—never allowing critical, financial and private data to be accessed or compromised by criminal activity. With the features of Comodo ESM, eWinery Solutions took advantage of a centralized management console, offsite logging capabilities, and integrated intrusion prevention technology. The Comodo ESM dashboard is used by the IT team at eWinery Solutions to gain panoramic insight and control over all aspects of endpoint protection and management. Administrators can also terminate endpoint processes, stop or start services, uninstall applications and delete unwanted files—all without causing any interference to the end user.
Operational Impact
  • For more than a year, eWinery Solutions has been using Comodo ESM and has never had an issue related to malware or spyware penetrating their IT environment.
  • The Comodo ESM solution contains any outside threats and keeps them away from critical infrastructure, while giving the IT team tremendous insight, freedom, and flexibility to configure the solution optimally.
  • Comodo’s real-time automatic threat containment technology eliminates operating system contamination by automatically running untrusted processes in an isolated environment.
  • For IT administrators, as well as CIOs and CISOs who need to prevent data breaches, Comodo endpoint security offers on-device, real-time containment.
  • Unlike legacy approaches such as blacklisting and sandboxing, Comodo uses smart filtering to automatically contain and execute any unknown files, without negatively impacting system performance and user productivity.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.