March 16, 2009 (HOSTSEARCH.COM) Rather than permit executable computer files to install themselves unless they appear on a blacklist, Comodo's Endpoint Security Manager protects enterprise data on a revolutionary new model: default-deny protection (DDP).
The default-deny model refuses by default to execute any files, as opposed to the more widely-used default-allow model.
Comodo Endpoint Security Manager comprises Comodo's award-winning firewall and its proprietary antivirus software. Combined, they offer powerful default-deny protection. The protection software quarantines any software file entering a computer system unless it appears on Comodo's proprietary whitelist of files known to be harmless. System users may then choose to allow the quarantined files to install and execute.
With industry-standard default-allow protection, malicious software such as viruses, keyloggers, Trojans or buffer overflow attacks can wriggle in to the computer and install itself without the user's knowing or being able to stop it. Computers are exposed to malicious software if a computer user opens an infected email, or reads from an infected thumb drive or disk. Default-allow systems only stop malware if it is already on the security vendor's list of known malware, and if the computer user has updated the list.
"Comodo DDP puts control back into the hands of the computer user or administrator," said Melih Abdulhayoglu, CEO and Chief Security Architect of Comodo. "Default deny protection is one of the strongest ways to guard a single laptop or desktop, or an entire network."
The whitelist of allowable files in Comodo Endpoint Security Manager now exceeds two million making it easier than ever to use.
Comodo Endpoint Security Manager allows network managers to control security settings remotely, freeing up time for other important tasks. To learn more about Comodo Endpoint Security's revolutionary DDP protection visit Enterprise.comodo.com