Privately-held company founded in 1998 US Headquarters in New Jersey - - PowerPoint PPT Presentation
Privately-held company founded in 1998 US Headquarters in New Jersey - - PowerPoint PPT Presentation
Privately-held company founded in 1998 US Headquarters in New Jersey Global offices in USA, UK, China, India, Romania, Turkey, Japan and Ukraine 1400 employees (900 developers) Worldwide leader in SSL Security Internet Security
Privately-held company founded in 1998
- US Headquarters in New Jersey
- Global offices in USA, UK, China, India, Romania,
Turkey, Japan and Ukraine
- 1400 employees (900 developers)
- Worldwide leader in SSL Security
- Internet Security protects over 70 million endpoints
US Headquarters 1255 Broad Street Clifton, NJ 07013 United States +1 (201) 963-0004 Other Locations
- Salt Lake City, USA
- Manchester, UK
- Bradford, UK
- Iasi, Romania
- Odessa, Ukraine
- Chennai, India
- Beijing, China
1998 2001 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014
Comodo Founded Digital Certificates Introduced CA/Browser Formed and Personal Firewall Announced HackerGuardian and Two Factor Authentication EV and Certificate Manager Introduced Comodo Internet Security Suite Launched Endpoint Security Manager Introduced GeekBuddy And $500 protection plan announced DNS.com, Dragon Browser and Online storage announced Site Inspector, Dragon Browser, Online Storage Launched and Co-founded CA Security Council Comodo Endpoint Security & Launchs Geekstein Next Generation Endpoint Security Manager
2015
comodo into Thailand
Endpoint Security Manager
Endpoint Security Manager
Program (Executable)
Real-Time Scan
?
Yes : File/Program was in Block list
HIPS Block List ?
Heuristics Signature Disinfect Quarantine
Detected Malware
File Rating
Not Block list Yes
Cloud Based Blacklist ? Only Allow Execute
- n Virtual Space
Limit C:\VTroot
Sandbox
Stop
Ye s Unrecognized Cloud Based
Whitelist ?
Cloud
Allow Execute In Normal Space Ex: C:\,D:\,E:\
File / Vendor In Trust list
How to Working
Endpoint Security Manager
Endpoint Security Manager
Endpoint Security Manager
Endpoint Security Manager
Online Backup Software
Quickly create backups of your priceless data to a wide range of storage media Smart Profiles auto-detect and group document types so you can back them up with one click Step-by-step wizards allow you to create your first backup within minutes Junk file scanner eliminates duplicates and temp files so you don't waste time and disk space Free 10 GB online storage space for each user for 90 days
Online Backup Software
Feature
Online Backup Software
System Requirements:
Supported Operating Systems: Windows 7 - 32 bit and 64 bit Windows Vista - 32 bit and 64 bit Windows XP SP2 - 32 bit and 64 bit Window Server 2003 – 32 bit and 64 bit Windows Server 2008 - 32 bit and 64 bit Up to Required Hardware: Intel Pentium II 233 Mhz or better 128 MB RAM 23 MB free hard drive space
Essential protection against spam and email-borne malware
Product Highlights Cloud-based SaaS eliminates hardware and software maintenance and restores bandwidth lost to incoming unwanted mail traffic Spam, phishing emails and infected attachments are halted in the cloud and never allowed through your perimeter defenses Full inbound and outbound mail filtering with account locking capability Spools email for delayed delivery if the destination server is unavailable Restores user’s productivity otherwise lost to Inbox housekeeping Group and permissions’ feature gives admins granular control of end-user mail management rights Integrates with Active Directory/LDAP for simplified user account creation Audit Log presents detailed analysis of all administrator and user actions Mail archiving allows single-click replacement of lost or deleted email(s)
https://www.comodo.com/resources/small-business/Antispam-Gateway-Datasheet- Q42014.pdf?track=6375&key5sk0=6375&key5sk1=50d5ffc3ded7f273b2155d007031e569ff3852d4
MyDLP - All in One Data Loss Prevention
Key Benefits
- Detect and prevent any confidential data from exiting your organization network via
mail and web channels.
- Monitor removable device usage in your organization and block or quarantine
confidential files copied into these devices such as USB memory sticks or smart phones.
- Block or quarantine print jobs which contain confidential information.
- Discover confidential data on network storages, databases, workstations and laptops in
your organization.
MyDLP - All in One Data Loss Prevention
MyDLP - All in One Data Loss Prevention
MyDLP Network Server System Minimum Requirements:
Dual or quad core Intel Xeon processors 4 GB or more RAM 256 GB or more Hard drive NIC 1000/100, Or equivalent virtual resources
MyDLP Endpoint Agent Minimum Requirements:
Operating Systems: Windows XP / 7 / 8 / 8.1 Windows Server 2003 / 2008 (64 bit and 32 bit supported) 1GB RAM 200 MB free hard drive space Inspection Channels Web (HTTP,HTTPS,FTP,SFTP) Email (POP, IMAP, SMTP) Printers (local printers, print servers) Removable devices (USB memory sticks, smart phones,etc.) Discovery on data storages and endpoints
Integration Highlights
Microsoft Active Directory: Enables you to use domain users and groups in policies. Major Database Servers: Enables you to use database content in DLP policies. ICAP proxy or content filtering solution and with custom applications via the REST API Syslog, HP ArcSight and other log collection, correlation systems
MyDLP - All in One Data Loss Prevention
MyDLP Data Protection
Build an inventory of sensitive data stored on company networks and deploy policies to control its movement and use Automatically implement restrictions when sensitive information types are discovered in newly created documents and data sources Control which data can be sent to removable devices and printers connected to laptops and workstations Enforce policy on laptops and other endpoints even when they are outside the network Implement identity based data policies via full integration with Active Directory Set rules to block emails with external BCC addresses, automatically encrypt data on removable devices and prevent screenshots when certain applications are running Real-time monitoring and reports provide a live feed of attempted policy infringements and areas of potential concern Fast, lightweight solution analyzes large files in seconds and can run on any server or virtual machine Fully compatible with Microsoft Exchange, SCCM and other major office suite Standalone, installable ISO which does not require licenses for any other 3rd party product
MyDLP - All in One Data Loss Prevention
Inspection Channels
- Web (HTTP,HTTPS,FTP,SFTP)
- Printers (local printers, print servers)
- Removable devices(USB memory sticks, smart phones, etc.)
- Discovery on data storages and endpoints
Integration Capabilities
- Microsoft Active Directory: Enables you to use domain users and groups in
policies.
- Database Servers: Enables you to use database content in DLP policies.
- Syslog, HP ArcSight and other log collection, correlation systems.
- and more.
Simpler, Faster, Stronger
Korugan 90 Korugan 65 Korugan 200 Korugan 300 Korugan 1000 Korugan 600
Korugan Unified Threat Management
KORUGAN UTM delivers all‐inclusive security services for organizations to easily control their network security while lowering complexity and combination of network firewalling, virtual private networking (VPN), network intrusion detection and prevention (IDS/IPS), antivirus, antispam, web content filtering, load balancing logging and reporting modules.
KORUGAN UTM
Provides means for real defense in depth that is designed to address security vulnerabilities that can come from people, technology, operations and processes.
Simpler, Faster, Stronger
Korugan Web Based UI delivers simplicity and total control over all security features you need. The affordable pricing model provides you with all UTM features with a single license. Korugan UTM Appliances are specifically tailored for your needs thus outperforms traditional UTM and NGFW solutions.
Simple and Affordable Licensing
All the best-of-breed security features that Korugan provide is offered with just a single and affordable license, including all firmware and signature updates !
Best of Breed Antivirus
Comodo's 24x7 AV Labs analyzes world-wide emerging threats and provides millions of users with real-time security. Korugan UTM delivers Comodo AV inspection with real-time updates for all web and e-mail traffic.
“Our vision is simple, to Create Trust Online”
“Our vision is simple, to Create Trust Online”
Firewall
- Stateful Packet Inspection
- Zone-based
- ACC: User, Source, Destination ,Zone, MAC ,IP,Service ,Schedule
- Security Policies : Antivirus , Web Filter, IPS, Anti-Spam
- VPN Firewall
Intrusion Prevention System
- 4000+ signatures
- Hourly, Daily, Weekly Update
- Custom Rule Upload -Manual Rule Editor
- Rule Filtering
- Actions: Enable, Disable,Drop,Alert,Delete
- User, Source, Destination ,Zone, MAC,IP, Service,Schedule based IPS Policies
- DoS,DDoS,SCADA-aware Antivirus
- Virus, Malware , Spyware,T rojan,Worm Protection
- Hourly, Daily ,Weekly Update
- Email and Web Traffic Protection
- 24/7 Operating Comodo AV Lab Database
- User, Source, Destination, Zone,MAC,IP, Service, Schedule based AV Scanning
Feature Product
Anti-Spam
- Inbound, Outbound Scanning ?
- RBL, MIME header check -IP Black/White/Grey List
- Custom Listing -Block Files by Extension and Size
- Separate Spam and Virus Handling Ability
- Quarantine
- User,Source,Destination,Zone,MAC,IP,S ervice,Schedule based
Anti-Spam Policy
- Manual B/W and Grey List Management
- Mail Routing,BCC
- Spam Training
Web Filtering
- 90+ Categories, 500.000+ Websites
- 24/7 Updated Database
- Custom B/W Listing -Proxy Management
- HTTP,HTTPS
- User,Source,Destination,Zone,MAC,IP,Service,Schedule based Web Filtering
- Block Malware,Phising,Pharming
Virtual Private Network
- IPSec, L2TP
- SSL VPN
- Encryption -3DES, DES, AES,
- MD5,SHA-1 - Authentication with Preshared key, Digital certificates
- Dead peer detection and connection redundancy
- External Certificate Authority support
- Export Road Warrior connection configuration
- Domain name support
Traffic Shaping and QoS
- Prioritization -Zone and Interface based bandwidth management
- Source,Destination,Service,Zone based traffic classing
Hotspot
- Captive Portal
- Login Page Management
- SMS Authentication
- Session Time
Korugan Log Collector
- Free of charge log collector
- Real-time and historical monitoring
- Firewall, Web, Email, IPS, AV based reporting
- User, Source, Destination, Zone, MAC, IP, Service based monitoring
- Requires no extra license
- TSA integratable -5651 supported for Turkey
Networking
- SPI Firewall
- Predefined Security Zones
- Policy Based NAT
- Virtual IP -Automatic Failover and ISP Support
- Static and Policy Based Routing
- PPPoE,PPTP,DDNS Client, ARP and DNS Proxy, DHCP Server
- VLAN - Dynamic Routing
- Support of ICAP to integrate myDLP or third-party DLP, Web
Certification and Compliancy
- CE FCC CC EAL 4+ Ready
Feature Product
Administration and System Configuration
- Command Line Interface
- Role-based Access control
- Firmware Upgrades via Web UI
Administration and System Configuration
- Command Line Interface
Mobile Device Management (CMDM)
COMODO Mobile Device Management
COMODO Mobile Device Management COMODO Mobile Device Management Support