Comodo announces free forensic analysis service for enterprises

Comodo, a global innovator and developer of cybersecurity solutions, today announced a new, free forensic analysis service for enterprises to aid in the fight against cyberattacks. The solution is aimed at helping enterprises discover previously unknown and undetected malware that could ultimately cause serious cybersecurity issues, including a data breach. According to the company, Zero-day malware – a new malware that has never been seen before – continues to plague businesses of all sizes. Millions of these unknown files are being crafted or modified each year. They cannot be detected by existing security systems; they hide on endpoints and networks and remain among the most important and effective tools hackers use. “Underpinned by Comodo’s industry-leading Default Deny Platform, this is the only forensic analysis that can examine 100 percent of all files, including unknown ones, and determine if they are good or bad,” said John Peterson, Vice President and General Manager, Comodo Enterprise.
“We are offering this forensic analysis free to businesses, to help them uncover unknown malware in their environments and see for themselves the power of Comodo’s default deny technology.”
Comodo’s forensic analysis service is based on its Default Deny Platform. The company claims that in contrast to other security solutions that rely on known bad file indicators and allow unknown files to execute on endpoints by default, its technology prevents unknown files from executing with automatic containment and a complete forensic analysis resulting in a good or bad verdict on every file. The company explains that the unknown files are escalated to Valkyrie, Comodo’s cloud-based file analysis tool, which renders a rapid verdict on whether the file is good or bad. Valkyrie also combines automatic static and dynamic file analysis supported by human intelligence when needed for a full forensic analysis of all files, ensuring that unknown files are correctly identified. Hence, Comodo claims that its technology only allows the known good files, blocks the known bad files, and then isolates the unknown files in automatic containment in a virtual environment on the endpoint. During the process, usability, and the endpoint and network security remain intact.

Abhinav Mohapatra

An author who has a keen interest for the ‘off-beat’ <!--more-->An author who has a keen interest for the ‘off-beat’, he has covered and explored multiple facets of the marketing, advertising

Great! You've successfully subscribed.
Great! Next, complete checkout for full access.
Welcome back! You've successfully signed in.
Success! Your account is fully activated, you now have access to all content.