We just raised a $30M Series A: Read our story

Comodo Advanced Endpoint Protection Questions

Edwin Omondi Ambogo
Senior Technologist at LAIKIPIA UNIVERSITY
Nov 29 2021
Hello dear community, My organization (a university with 500+ employees and ~5000 students) is looking for an endpoint security solution. Currently, we have Seqrite Endpoint Security, Comodo Advanced Endpoint Protection and Kaspersky Endpoint Security on the table for our consideration.  Which… (more)

Hello dear community,

My organization (a university with 500+ employees and ~5000 students) is looking for an endpoint security solution. Currently, we have Seqrite Endpoint Security, Comodo Advanced Endpoint Protection and Kaspersky Endpoint Security on the table for our consideration. 

Which of these solutions would you recommend to choose and why? Please advise.

I appreciate your help!

(less)
Julia Frohwein
Content and Social Media Manager
IT Central Station

Hi Everyone,

What do you like most about Comodo Advanced Endpoint Protection?

Thanks for sharing your thoughts with the community!

Antonio LightbourneComodo's default deny technology, their auto containment feature is awesome it… more »
Julia Frohwein
Content and Social Media Manager
IT Central Station

Hi,

We all know it's really hard to get good pricing and cost information.

Please share what you can so you can help your peers.

Antonio LightbourneComodo's pricing is pretty good and we currently have roughly 200 licenses.
Miriam Tover
Content Specialist
IT Central Station

Please share with the community what you think needs improvement with Comodo Advanced Endpoint Protection.

What are its weaknesses? What would you like to see changed in a future version?

DonaldBaldwinWe do a lot of tests and we also work with some really malicious environments… more »
Julia Frohwein
Content and Social Media Manager
IT Central Station

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

DonaldBaldwinWe use Comodo because it has containerization.
Antonio LightbourneWe use Comodo AEP for default deny architecture, it's auto containment… more »
Miriam Tover
Content Specialist
IT Central Station

If you were talking to someone whose organization is considering Comodo Advanced Endpoint Protection, what would you say?

How would you rate it and why? Any other tips or advice?

Julia Frohwein
Content and Social Media Manager
IT Central Station

Hi Everyone,

What do you like most about Comodo Advanced Endpoint Protection?

Thanks for sharing your thoughts with the community!

Julia Frohwein
Content and Social Media Manager
IT Central Station

Hi,

We all know it's really hard to get good pricing and cost information.

Please share what you can so you can help your peers.

Julia Frohwein
Content and Social Media Manager
IT Central Station

Please share with the community what you think needs improvement with Comodo Advanced Endpoint Protection.

What are its weaknesses? What would you like to see changed in a future version?

Miriam Tover
Content Specialist
IT Central Station

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

Julia Frohwein
Content and Social Media Manager
IT Central Station

If you were talking to someone whose organization is considering Comodo Advanced Endpoint Protection, what would you say?

How would you rate it and why? Any other tips or advice?

Endpoint Protection for Business (EPP) Questions
Satish Singh
Cloud Security Architect at Kyndryl
Nov 06 2021
Hi dear professionals, I'm working as the Cloud Security Architect at a Tech Sevices company with 10,000+ employees and I'm looking for suggestions about on-premise endpoint security solutions.  Please recommend the best product/solution that fits the requirements below (salient features and… (more)

Hi dear professionals,

I'm working as the Cloud Security Architect at a Tech Sevices company with 10,000+ employees and I'm looking for suggestions about on-premise endpoint security solutions. 

Please recommend the best product/solution that fits the requirements below (salient features and expected features):

  • Endpoint Protection Platform (EPP)
  • Application Change Control (ACC)
  • File Integrity Monitoring (FIM)
  • Endpoint Detection and Response (EDR)

Expected Features:


1. Integration with NAC solution
2. Real-time scans (both new files and URLs) and scheduled scans (scanning all files against newly-deployed signatures)
3. Protection from malicious web downloads
4. Protection from exploits
5. Application and device control
6. Reports and alerts
7. Detecting alerts (ASAP)
8. Incident investigation and remediation
9. AI/MI-based behavior anomaly detection and remediation
10. Third-party integrations
11. Flexible deployment options
12. Endpoint Security Solution Threat Intelligence
13. Sandboxing is a must

(less)
Eric RiseSatish, Thank you for your well-thought-out and detailed question on this… more »
User at TUBITAK
Nov 23 2021
Hello peers, I am working as an IT member at a research company with 200 employees (at most). I am looking at the pros and cons of SCCM and BigFix software.  At the moment, we are using BigFix just for updating and I think if we switch to SCCM that would be a more complicated and costly… (more)

Hello peers,

I am working as an IT member at a research company with 200 employees (at most).

I am looking at the pros and cons of SCCM and BigFix software. 

At the moment, we are using BigFix just for updating and I think if we switch to SCCM that would be a more complicated and costly solution because of my company's infrastructure and requirements.

What is your professional recommendation for me? Is SCCM going to bring unnecessary workload for a small company, such as mine? Also, is it worth choosing SCCM over BigFix based on its features, budget, etc?

Thank you!

(less)
Kumar MahadevanSCCM is very robust but you need more time and people to manage it.  For a… more »
Kirk StephenWe have 1500 users and even with a reasonable sized support team we find SCCM… more »
Muhammad WaseemHi Ihsan,  Hope you are doing well, As per my experience to deploy SCCM for… more »
Rony_Sklar
IT Central Station
Jun 28 2021
There are many cybersecurity tools available, but some aren't doing the job that they should be doing.  What are some of the threats that may be associated with using 'fake' cybersecurity tools? What can people do to ensure that they're using a tool that actually does what it says it does? (more)

There are many cybersecurity tools available, but some aren't doing the job that they should be doing. 

What are some of the threats that may be associated with using 'fake' cybersecurity tools?

What can people do to ensure that they're using a tool that actually does what it says it does?

(less)
SimonClark Dan Doggendorf gave sound advice. Whilst some of the free or cheap… more »
Dan DoggendorfThe biggest threat is risks you think you have managed are not managed at all so… more »
Javier MedinaYou should build a lab, try the tools and analyze the traffic and behavior with… more »
Nurit Sherman
Content Specialist
IT Central Station
Aug 25 2021
Hi community,  We all know that it's important to conduct a trial and/or proof-of-concept as part of the buying process.  Do you have any advice for your peers about the best way to conduct a trial/POC?  How do you conduct a trial effectively? Are there any mistakes to avoid? (more)

Hi community, 

We all know that it's important to conduct a trial and/or proof-of-concept as part of the buying process. 

Do you have any advice for your peers about the best way to conduct a trial/POC? 

How do you conduct a trial effectively? Are there any mistakes to avoid?

(less)
James KielyEnsure you have a defined set of outcomes. Communicate these expectations to the… more »
Jairo Willian PereiraMistakes: 1. Choosing only using a Gartner magic quadrant. 2. Don't consider… more »
ITSecuri7cfdOnce you have narrowed down the top 5 picks for a capability/solution, we… more »
Mostafa
System Administrator at Suez Canal Insurance
Aug 30 2021

What is the best for ransomware infection? 

Alex VakulovInstall all security updates, create an incident response plan, use whitelisting… more »
Siddharth NarayananIPS & Blocking unwanted extensions at gateway level.
Nadeem Syedthere are different solutions for ransomware these days. Best i have found is… more »
Ariel Lindenfeld
Sr. Director of Community
IT Central Station
Nov 18 2021

Let the community know what you think. Share your opinions now!

it_user400131evaluation of endpoint protection should look at what the product offers for… more »
it_user762459Key points for me are speed, scale & reporting, and I generally classify my… more »
J RiceBeing more advanced than a signature-based system. Its ability to detect lateral… more »