CryptoLocker敲诈持续侵害而企业使用科摩多终端安全可以保障安全

2013/11/19

Comodo, a leading certificate authority and Internet security organization, today announced their Comodo Endpoint Security Manager software proactively protects endpoint security from being cryptolocker blackmail. Cryptolocker is a Trojan virus, spread mainly imitate legitimate companies marked by post or by e-mail forgery and counterfeiting of federal UPS tracking information. Once the user opens a malicious message, cryptolocker installs itself into the user’s system, scan the hard drive, and encrypted files. All files are so user can not access unless they pay a ransom to get the decryption key.

ESM and his Comodo Endpoint Security (CES) software can help prevent threats, isolate all unknown applications such as Cryptolocker. If the threat is malicious, anti-virus software to detect and stop its signature encrypt your files. If the threat is unknown, HIPS and automatic sandbox will intercept and prevent infection of the underlying operating system. Thus, even before Cryptolocker become known viruses, CES are able to use technology to prevent automated sandbox encrypt your files.

“CESM 3 is a true next-generation proactive endpoint security” Michél Bechard said, Comodo product manager, “because it is the only anti-malware solution, proposed five layer defense (antivirus, firewall, host intrusion detection, automatic sandbox and file level) as a focal point on the desktop we have so much confidence to provide users with up to 500 dollars in warranty costs infection, which is the only anti-virus software vendors can do. ”

Comodo new terminal security management 3 (CESM3) platform provides an advanced anti-malware suite for coordinating local and remote terminal threat protection from a browser-based console to another station terminal system to facilitate the safe management personnel centralized management of their laptops, desktops and servers terminal, simplifying administration. CESM add servers to see the latest version of new features, including centralized monitoring of the sandbox (unknown) and malicious files, automatically synchronize the terminal through Active Directory, local VNC session encryption and remote terminals, and supports standard Windows7 embedding.

To learn more about the next generation of active endpoint security, please visit:

http://www.comodo.com/business-enterprise/cesm3/index_v2.php

Download Free 60 days, 60 free trial, please visit:

https://secure.comodo.com/home/purchase.php

 

Tags:

Write a comment

Name
Comment