Privately-held company founded in 1998 US Headquarters in New Jersey - - PowerPoint PPT Presentation

privately held company founded in 1998
SMART_READER_LITE
LIVE PREVIEW

Privately-held company founded in 1998 US Headquarters in New Jersey - - PowerPoint PPT Presentation

Privately-held company founded in 1998 US Headquarters in New Jersey Global offices in USA, UK, China, India, Romania, Turkey, Japan and Ukraine 1400 employees (900 developers) Worldwide leader in SSL Security Internet Security


slide-1
SLIDE 1
slide-2
SLIDE 2

Privately-held company founded in 1998

  • US Headquarters in New Jersey
  • Global offices in USA, UK, China, India, Romania,

Turkey, Japan and Ukraine

  • 1400 employees (900 developers)
  • Worldwide leader in SSL Security
  • Internet Security protects over 70 million endpoints

US Headquarters 1255 Broad Street Clifton, NJ 07013 United States +1 (201) 963-0004 Other Locations

  • Salt Lake City, USA
  • Manchester, UK
  • Bradford, UK
  • Iasi, Romania
  • Odessa, Ukraine
  • Chennai, India
  • Beijing, China
slide-3
SLIDE 3

1998 2001 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014

Comodo Founded Digital Certificates Introduced CA/Browser Formed and Personal Firewall Announced HackerGuardian and Two Factor Authentication EV and Certificate Manager Introduced Comodo Internet Security Suite Launched Endpoint Security Manager Introduced GeekBuddy And $500 protection plan announced DNS.com, Dragon Browser and Online storage announced Site Inspector, Dragon Browser, Online Storage Launched and Co-founded CA Security Council Comodo Endpoint Security & Launchs Geekstein Next Generation Endpoint Security Manager

2015

comodo into Thailand

slide-4
SLIDE 4
slide-5
SLIDE 5
slide-6
SLIDE 6
slide-7
SLIDE 7

Endpoint Security Manager

slide-8
SLIDE 8

Endpoint Security Manager

Program (Executable)

Real-Time Scan

?

Yes : File/Program was in Block list

HIPS Block List ?

Heuristics Signature Disinfect Quarantine

Detected Malware

File Rating

Not Block list Yes

Cloud Based Blacklist ? Only Allow Execute

  • n Virtual Space

Limit C:\VTroot

Sandbox

Stop

Ye s Unrecognized Cloud Based

Whitelist ?

Cloud

Allow Execute In Normal Space Ex: C:\,D:\,E:\

File / Vendor In Trust list

How to Working

slide-9
SLIDE 9

Endpoint Security Manager

slide-10
SLIDE 10

Endpoint Security Manager

slide-11
SLIDE 11

Endpoint Security Manager

slide-12
SLIDE 12

Endpoint Security Manager

slide-13
SLIDE 13

Online Backup Software

slide-14
SLIDE 14

 Quickly create backups of your priceless data to a wide range of storage media  Smart Profiles auto-detect and group document types so you can back them up with one click  Step-by-step wizards allow you to create your first backup within minutes  Junk file scanner eliminates duplicates and temp files so you don't waste time and disk space  Free 10 GB online storage space for each user for 90 days

Online Backup Software

Feature

slide-15
SLIDE 15

Online Backup Software

System Requirements:

Supported Operating Systems:  Windows 7 - 32 bit and 64 bit  Windows Vista - 32 bit and 64 bit  Windows XP SP2 - 32 bit and 64 bit  Window Server 2003 – 32 bit and 64 bit  Windows Server 2008 - 32 bit and 64 bit Up to Required Hardware:  Intel Pentium II 233 Mhz or better  128 MB RAM  23 MB free hard drive space

slide-16
SLIDE 16
slide-17
SLIDE 17

Essential protection against spam and email-borne malware

Product Highlights  Cloud-based SaaS eliminates hardware and software maintenance and restores bandwidth lost to incoming unwanted mail traffic  Spam, phishing emails and infected attachments are halted in the cloud and never allowed through your perimeter defenses  Full inbound and outbound mail filtering with account locking capability  Spools email for delayed delivery if the destination server is unavailable  Restores user’s productivity otherwise lost to Inbox housekeeping  Group and permissions’ feature gives admins granular control of end-user mail management rights  Integrates with Active Directory/LDAP for simplified user account creation  Audit Log presents detailed analysis of all administrator and user actions  Mail archiving allows single-click replacement of lost or deleted email(s)

slide-18
SLIDE 18

https://www.comodo.com/resources/small-business/Antispam-Gateway-Datasheet- Q42014.pdf?track=6375&key5sk0=6375&key5sk1=50d5ffc3ded7f273b2155d007031e569ff3852d4

slide-19
SLIDE 19

MyDLP - All in One Data Loss Prevention

slide-20
SLIDE 20

Key Benefits

  • Detect and prevent any confidential data from exiting your organization network via

mail and web channels.

  • Monitor removable device usage in your organization and block or quarantine

confidential files copied into these devices such as USB memory sticks or smart phones.

  • Block or quarantine print jobs which contain confidential information.
  • Discover confidential data on network storages, databases, workstations and laptops in

your organization.

MyDLP - All in One Data Loss Prevention

slide-21
SLIDE 21

MyDLP - All in One Data Loss Prevention

MyDLP Network Server System Minimum Requirements:

 Dual or quad core Intel Xeon processors  4 GB or more RAM 256 GB or more Hard drive  NIC 1000/100,  Or equivalent virtual resources

MyDLP Endpoint Agent Minimum Requirements:

 Operating Systems: Windows XP / 7 / 8 / 8.1 Windows Server 2003 / 2008 (64 bit and 32 bit supported)  1GB RAM 200 MB free hard drive space Inspection Channels  Web (HTTP,HTTPS,FTP,SFTP)  Email (POP, IMAP, SMTP) Printers (local printers, print servers)  Removable devices (USB memory sticks, smart phones,etc.)  Discovery on data storages and endpoints

Integration Highlights

 Microsoft Active Directory: Enables you to use domain users and groups in policies.  Major Database Servers: Enables you to use database content in DLP policies.  ICAP proxy or content filtering solution and with custom applications via the REST API  Syslog, HP ArcSight and other log collection, correlation systems

slide-22
SLIDE 22

MyDLP - All in One Data Loss Prevention

MyDLP Data Protection

 Build an inventory of sensitive data stored on company networks and deploy policies to control its movement and use  Automatically implement restrictions when sensitive information types are discovered in newly created documents and data sources  Control which data can be sent to removable devices and printers connected to laptops and workstations  Enforce policy on laptops and other endpoints even when they are outside the network  Implement identity based data policies via full integration with Active Directory  Set rules to block emails with external BCC addresses, automatically encrypt data on removable devices and prevent screenshots when certain applications are running  Real-time monitoring and reports provide a live feed of attempted policy infringements and areas of potential concern  Fast, lightweight solution analyzes large files in seconds and can run on any server or virtual machine  Fully compatible with Microsoft Exchange, SCCM and other major office suite  Standalone, installable ISO which does not require licenses for any other 3rd party product

slide-23
SLIDE 23

MyDLP - All in One Data Loss Prevention

Inspection Channels

  • Web (HTTP,HTTPS,FTP,SFTP)
  • E-mail
  • Printers (local printers, print servers)
  • Removable devices(USB memory sticks, smart phones, etc.)
  • Discovery on data storages and endpoints

Integration Capabilities

  • Microsoft Active Directory: Enables you to use domain users and groups in

policies.

  • Database Servers: Enables you to use database content in DLP policies.
  • Syslog, HP ArcSight and other log collection, correlation systems.
  • and more.
slide-24
SLIDE 24

Simpler, Faster, Stronger

slide-25
SLIDE 25

Korugan 90 Korugan 65 Korugan 200 Korugan 300 Korugan 1000 Korugan 600

slide-26
SLIDE 26

Korugan Unified Threat Management

KORUGAN UTM delivers all‐inclusive security services for organizations to easily control their network security while lowering complexity and combination of network firewalling, virtual private networking (VPN), network intrusion detection and prevention (IDS/IPS), antivirus, antispam, web content filtering, load balancing logging and reporting modules.

KORUGAN UTM

Provides means for real defense in depth that is designed to address security vulnerabilities that can come from people, technology, operations and processes.

Simpler, Faster, Stronger

Korugan Web Based UI delivers simplicity and total control over all security features you need. The affordable pricing model provides you with all UTM features with a single license. Korugan UTM Appliances are specifically tailored for your needs thus outperforms traditional UTM and NGFW solutions.

Simple and Affordable Licensing

All the best-of-breed security features that Korugan provide is offered with just a single and affordable license, including all firmware and signature updates !

Best of Breed Antivirus

Comodo's 24x7 AV Labs analyzes world-wide emerging threats and provides millions of users with real-time security. Korugan UTM delivers Comodo AV inspection with real-time updates for all web and e-mail traffic.

“Our vision is simple, to Create Trust Online”

slide-27
SLIDE 27

“Our vision is simple, to Create Trust Online”

slide-28
SLIDE 28
slide-29
SLIDE 29

Firewall

  • Stateful Packet Inspection
  • Zone-based
  • ACC: User, Source, Destination ,Zone, MAC ,IP,Service ,Schedule
  • Security Policies : Antivirus , Web Filter, IPS, Anti-Spam
  • VPN Firewall

Intrusion Prevention System

  • 4000+ signatures
  • Hourly, Daily, Weekly Update
  • Custom Rule Upload -Manual Rule Editor
  • Rule Filtering
  • Actions: Enable, Disable,Drop,Alert,Delete
  • User, Source, Destination ,Zone, MAC,IP, Service,Schedule based IPS Policies
  • DoS,DDoS,SCADA-aware Antivirus
  • Virus, Malware , Spyware,T rojan,Worm Protection
  • Hourly, Daily ,Weekly Update
  • Email and Web Traffic Protection
  • 24/7 Operating Comodo AV Lab Database
  • User, Source, Destination, Zone,MAC,IP, Service, Schedule based AV Scanning

Feature Product

Anti-Spam

  • Inbound, Outbound Scanning ?
  • RBL, MIME header check -IP Black/White/Grey List
  • Custom Listing -Block Files by Extension and Size
  • Separate Spam and Virus Handling Ability
  • Quarantine
  • User,Source,Destination,Zone,MAC,IP,S ervice,Schedule based

Anti-Spam Policy

  • Manual B/W and Grey List Management
  • Mail Routing,BCC
  • Spam Training
slide-30
SLIDE 30

Web Filtering

  • 90+ Categories, 500.000+ Websites
  • 24/7 Updated Database
  • Custom B/W Listing -Proxy Management
  • HTTP,HTTPS
  • User,Source,Destination,Zone,MAC,IP,Service,Schedule based Web Filtering
  • Block Malware,Phising,Pharming

Virtual Private Network

  • IPSec, L2TP
  • SSL VPN
  • Encryption -3DES, DES, AES,
  • MD5,SHA-1 - Authentication with Preshared key, Digital certificates
  • Dead peer detection and connection redundancy
  • External Certificate Authority support
  • Export Road Warrior connection configuration
  • Domain name support

Traffic Shaping and QoS

  • Prioritization -Zone and Interface based bandwidth management
  • Source,Destination,Service,Zone based traffic classing

Hotspot

  • Captive Portal
  • Login Page Management
  • SMS Authentication
  • Session Time

Korugan Log Collector

  • Free of charge log collector
  • Real-time and historical monitoring
  • Firewall, Web, Email, IPS, AV based reporting
  • User, Source, Destination, Zone, MAC, IP, Service based monitoring
  • Requires no extra license
  • TSA integratable -5651 supported for Turkey

Networking

  • SPI Firewall
  • Predefined Security Zones
  • Policy Based NAT
  • Virtual IP -Automatic Failover and ISP Support
  • Static and Policy Based Routing
  • PPPoE,PPTP,DDNS Client, ARP and DNS Proxy, DHCP Server
  • VLAN - Dynamic Routing
  • Support of ICAP to integrate myDLP or third-party DLP, Web

Certification and Compliancy

  • CE FCC CC EAL 4+ Ready

Feature Product

Administration and System Configuration

  • Command Line Interface
  • Role-based Access control
  • Firmware Upgrades via Web UI

Administration and System Configuration

  • Command Line Interface
slide-31
SLIDE 31

Mobile Device Management (CMDM)

slide-32
SLIDE 32

COMODO Mobile Device Management

slide-33
SLIDE 33

COMODO Mobile Device Management COMODO Mobile Device Management Support

slide-34
SLIDE 34
slide-35
SLIDE 35