Average Ratings 2 Ratings
Average Ratings 0 Ratings
Description
Comodo Advanced Endpoint Protection (AEP) is designed to shield your endpoints from malware, but the AEP application itself frequently faces threats from malicious software attempting to bypass its defenses. Thankfully, Comodo AEP is equipped with powerful self-protection measures that thwart any attempts by harmful applications to seize control or evade its security services. It achieves this by intercepting critical system calls that could endanger the application, such as Terminate Process and Create Remote Thread, which are clear indicators of potential threats. Additionally, there are subtler yet more perilous calls like CreateFile, which can facilitate actions beyond merely creating a file. By intercepting these system calls, Comodo AEP ensures that they are only executed if they pose no risk to its processes. Furthermore, Comodo AEP incorporates a kernel mode driver that actively prevents direct modifications to the system kernel, reinforcing its defensive capabilities against sophisticated attacks. The combination of these protective strategies establishes a robust barrier that enhances endpoint security against a myriad of potential threats.
Description
Ranging from basic embedded environmental sensors and LED wearables to advanced embedded controllers, smartwatches, and IoT wireless applications, this system incorporates configurable architecture-specific stack-overflow protection, kernel object and device driver permission tracking, and thread isolation enhanced by thread-level memory protection across x86, ARC, and ARM architectures, as well as userspace and memory domains. For systems lacking MMU/MPU and those limited by memory capacity, it enables the integration of application-specific code with a tailored kernel to form a monolithic image that can be loaded and run on the hardware of the system. In this setup, both the application and kernel code operate within a unified address space, facilitating efficient resource utilization and performance optimization. This design ensures that even resource-constrained environments can effectively leverage complex applications and functionalities.
API Access
Has API
API Access
Has API
Integrations
CYREBRO
ClickSSL
EEZ Studio
Endtest
Golioth
HostBill
Katalon Recorder
LVGL
OpsHub
Owlity
Integrations
CYREBRO
ClickSSL
EEZ Studio
Endtest
Golioth
HostBill
Katalon Recorder
LVGL
OpsHub
Owlity
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Comodo
Founded
1998
Country
United States
Website
www.comodo.com
Vendor Details
Company Name
Zephyr
Founded
2016
Website
docs.zephyrproject.org/latest/
Product Features
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting