Categories:

Benefits and Insights

Why use Comodo Endpoint Security?

Key differentiators & advantages of Comodo Endpoint Security

• Endpoint Protection Coverage - Up to 200 devices

• Mobile Device Manager and Inventory Manager allow for the remote provisioning, configuration and control of android, iOS and Windows devices

• Create default security profiles for devices and endpoints, schedule regular malware scans, create application blacklists and whitelists, define password complexity, restrict device access to corporate mail, force encrypted communications, track user activity

• Cloud Based Sandbox, static and dynamic analysis

• Allows for the configuration of security policies and visibility into the security posture

• Push critical applications and security updates out to endpoints

• Identify unknown software applications, quickly moving them to a verdict of known good or known bad with Comodo's local, and cloud-based Specialized Threat Analysis and Protection (STAP) engine

Comodo Endpoint Security Reviews

Average customer reviews & user sentiment summary:

65 reviews

92%

of users would recommend this product

Synopsis of User Ratings and Reviews

Based on an aggregate of reviews taken from the sources above, the following pros & cons have been curated by a SelectHub Market Analyst.

Pros

  • Ease of Use: It is easy to install and has a user-friendly console.
  • Zero-Day Threats: It protects against zero-day threats.
  • Customer Support: It provides reliable customer services over the phone and with tickets.
  • Patch Management: It offers smooth patch management.

Cons

  • Time-Consuming: It can take a long time to complete updates and scanning*.
  • False Positives: It requires constant updates for effective threat detection**.
  • Navigation: It can be difficult to navigate through different tools and services***.
  • Auto-Containment: Its auto-containment feature can disrupt some software package functions****.

Researcher's Summary:

Comodo Endpoint Security provides its users with active breach protection in a single platform. Its automatic containment and crowd-sourced intelligent knowledge base provide advanced security solutions to small and medium-scale organizations against known and unknown threats.

* Apr 18, 2019 review derived from source on May 25, 2020

** Mar 18, 2019 review derived from source on May 25, 2020

*** June 11, 2019 review derived from source on May 25, 2020

**** June 07, 2019 review derived from source on May 25, 2020

Your review has been submitted
and should be visible within 24 hours.
Your review

Rate the product

Company Details

mandatory fields