What are you looking for ?
Advertise with us
RAIDON

Comodo Endpoint Security Manager Integrates Disk Encryption

At no extra charge

At no extra charge, enterprise IT managers can now deploy Comodo Disk Encryption with Comodo Group, Inc.‘s Endpoint Security Manager, a centralized administration console for business networks.

comodo_endpoint_security_manager_integrates_disk_encryption

12,000 laptops are lost or stolen in US airports every week, according to a study by the Ponemon Institute. Many of them belong to corporate travelers, whose IT professionals are left to worry that the lost information they contained might be misused. If the organization had deployed disk encryption, they might have spared themselves hours of agony and financial penalties.

Root encryption, and whole- or partial-disk encryption settings allow IT managers to protect stored information. With Comodo Endpoint Security Manager, every computer in the company can now be encrypted and protected.

Encryption uses a mathematical algorithm to change computer files into gibberish that only the computer owner or administrator can change back into readable characters. Encryption can include the entire computer disk, or only parts of it.

Typical encryption software, as a file stored on the computer, is only useful after the operating system is started.

With Comodo’s root drive encryption, security settings prevent the operating system from starting for an unauthorized user. The critical instructions that permit the operating system to start are stored in a virtual drive known as the root drive. With the root drive encrypted, a thief or a hacker cannot use the computer, preventing unauthorized access to an unattended or stolen computer.

Encrypted sectors will only read their instructions after the computer users prove their identities. Proof of identity can come in three forms:

  • The user enters a password, authorizing the computer to boot up
  • The user inserts a designated USB key
  • The user employs two-factor authentication by both providing a password and a USB key

Besides disk encryption, Comodo Endpoint Security Manager supports the remote management of Comodo’s award-winning firewall and antivirus. The Comodo firewall boasts a Host Intrusion Prevention System (HIPS) with Default-Deny Protection. Whenever an executable tries to install itself, the HIPS checks Comodo’s proprietary whitelist of files known to be safe—a list that is quickly approaching 5,000,000 reference files. If it does not find the file on the whitelist, the Comodo HIPS quarantines the file until the user has a chance to decide whether or not to permit it to install.

"Between disk encryption and Comodo’s Default-Deny Protection, computer managers can protect their entire networks, whether computers are physically tethered to servers or cruising 30,000 feet in the air," said Melih Abdulhayoglu, CEO and Chief Security Architect of Comodo. "Comodo Endpoint Security Manager’s centralized administration is expedient in normal times, eliminating the need for most desk-side visits. And in stressful times, the ability to update security settings for groups or for the entire company is a powerful benefit. Boot sector encryption is valuable for laptops, but many enterprises would benefit from the enhanced security for desktop computers as well. If the information on your computer is as valuable as your car, you want a key to turn on your computer."

Articles_bottom
ExaGrid
AIC
ATTOtarget="_blank"
OPEN-E