Categories:

#18

Comodo Endpoint Security is ranked #18 in the MDR Services product directory based on the latest available data collected by SelectHub. Compare the leaders with our In-Depth Report.

Comodo Endpoint Security Benefits and Insights

Why use Comodo Endpoint Security?

Key differentiators & advantages of Comodo Endpoint Security

  • Intuitive GUI: Provides a snapshot of security settings on the summary screen. Allows quick navigation between modules and easy point and click configurations. Set granular access rights and privileges via a security rules interface. Simplifies the rule-setting process with preset policies and wizards. 
  • Simplified Administration: Supports a push and pull deployment approach for seamless administration. Low system requirements enable installation of the product on non-dedicated PCs and Windows servers. 
  • Manage Resources: Define operational thresholds for CPU, RAM and network usage and available storage. Alerts administrators about exceeding thresholds via email notifications. 
  • Centralized Management: Monitor and control applications, services and processes with centralized system management to save time. Provides remote assistance by supporting communication with remote users and endpoints. 
  • Advanced Dashboard: Facilitates rapid alerting and remediation of issues with a streamlined interface displaying 14 crucial metrics about each machine. Allows administrators to start or stop services, terminate endpoint processes, delete unwanted files and uninstall applications. 
  • Green Initiatives: Includes Wake-on-LAN-enabled systems for integrated power management. Includes features like screen or drive-locking and system-standby or system-hibernation scheduling. Permits disabling of USB-mass storage devices, optical devices and floppy drives. 

Industry Expertise

Comodo is a leading cybersecurity company that serves organizations worldwide to secure and manage their security environments. It has earned multiple awards and recognitions from Gartner, Cybersecurity Excellence Awards, SC Awards and AV-Test.

Comodo Endpoint Security Reviews

Based on our most recent analysis, Comodo Endpoint Security reviews indicate a 'excellent' User Satisfaction Rating of 92% based on 68 user reviews from 4 recognized software review sites.

User satisfaction level icon: excellent

68 reviews

92%

of users would recommend this product

Synopsis of User Ratings and Reviews

Based on an aggregate of Comodo Endpoint Security reviews taken from the sources above, the following pros & cons have been curated by a SelectHub Market Analyst.

Pros

  • Ease of Use: It is easy to install and has a user-friendly console.
  • Zero-Day Threats: It protects against zero-day threats.
  • Customer Support: It provides reliable customer services over the phone and with tickets.
  • Patch Management: It offers smooth patch management.

Cons

  • Time-Consuming: It can take a long time to complete updates and scanning.
  • False Positives: It requires constant updates for effective threat detection.
  • Navigation: It can be difficult to navigate through different tools and services.
  • Auto-Containment: Its auto-containment feature can disrupt some software package functions.

Researcher's Summary:

Comodo Endpoint Security provides its users with active breach protection in a single platform. Its automatic containment and crowd-sourced intelligent knowledge base provide advanced security solutions to small and medium-scale organizations against known and unknown threats.

Key Features

  • Antivirus Protection: Automatically detects, cleanses and quarantines suspicious files to eliminate viruses, worms and other malware with a proactive antivirus engine. Offers on-demand, on-access and scheduled scan capabilities. Run instant virus scans by moving items to the home screen. 
  • Advanced Network Firewall Engine: Defends systems from inbound and outbound internet attacks via configurable packet filtering firewall. Manages network connections, stealths computer ports and prevents confidential data transmission by malicious software. 
  • Web URL Filtering: Create user-specific, sweeping and granular rules to allow or block access to specific websites. Generates log events when users visit websites in conflict with specified rules. 
  • File Lookup Services (FLS): Checks file reputation against master white and blacklists through cloud-based instant analysis of unknown files. Provides trusted status to applications from vendors mentioned in the trusted software vendors list or those included in the safelist. 
  • Auto-Sandboxing: Authenticates every executable and running process to avoid any harmful actions. Sandboxes unknown malware and unrecognized processes automatically in a virtual desktop to run in restricted environments. 
  • Host Intrusion Prevention System (HIPS): Monitors all procedures and applications via a rules-based intrusion prevention system to protect against malware intrusion. Blocks malicious program activities by halting actions that can damage operating systems, personal data, system memory or registry keys. 
  • Behavior Analysis: Viruscope monitors the behavior of all operations and provides alerts about potential harmful actions. Reverses undesirable software actions without blocking it entirely to extend control over otherwise legitimate software. 

Limitations

User feedback indicates the following limitations, as of the time of this review:

  •  Involves a steep learning curve for new users. 
  •  The installation process can be cumbersome. 
  •  System scans take a long time to complete. 

Suite Support

mail_outlineEmail: Not mentioned. However, a live chat option is available on the website.
phonePhone: +1 (877) 712-1309.
schoolTraining: White papers, videos, case studies, datasheets, reports and webinars.
local_offerTickets: Register an account at support.comodo.com to submit a support ticket.
Your review has been submitted
and should be visible within 24 hours.
Your review

Rate the product