Comodo can provide containment security technology with unprecedented efficiency and effectiveness to secure the world from hackers through a secure deployment of application that only we can provide.
More Details: http://containment.comodo.com/
2. Secure App Deployment
Unknown Applications that are installed onto the users' system might cause turmoil and
chaos leading to access of personal information, thereby identity theft, data loss, financial
loss and much more. To overcome all such hazardous threats,
Comodo offers exclusive security solutions and services to run application be it good , bad
or unknown in a secure environment.
Comodo Endpoint Security Solution, offers higher level of security with a multiple defense
mechanism by integrating auto sandboxing, a Default Deny Protection technique that creates
an isolated space while deploying any unknown application,
Containment technology must also defend itself against malware “jumping out” of the
containment solution
Comodo can provide containment security technology with unprecedented efficiency and
effectiveness to secure the world from hackers through a secure deployment of application
that only we can provide.
3. Threat Prevention Not Just Threat
Detection
A malware could exist mainly in 2 areas
1. Hard Drive
2. RAM
A malware could enter mainly via
Internet connection
Local Network
Wireless network
USB
By containing and controlling the file’s access both to CPU and Hard Disk, we limit its
capability to do damage. This containment solution is the way to prevent infections from
“ANY” malware, especially zero day malware and unknown files who then turn out to be
malicious.
4. Scanning The Unknown
Unknown threats are the greatest enemy to security. Every virus starts its life as an unknown
application. Allowing an unknown application unrestricted access to your network is akin
to allowing a total stranger into your home.
Question: How many strangers, people you don’t know of, live in your home?
Answer: None, of course. If you saw an unknown person in your house you would ask them to
leave and if they did not you would call the cops.
Question: How many unknown applications live in your network?
Answer: You don’t know, of course. But your legacy antivirus does allow unknown files to be
saved on your network’s computers.
Known good: The file is known to be valid and not a risk,
Known bad: The file is a known threat and must be dealt with accordingly.
Unknown: The file is not on our lists of good or bad. It may be safe or it could be malicious.
We just do not know.
5.
Comodo offers a Containment mechanism through which information, networks,
systems or files that are harmful are made available within limits in a well controlled
manner.
Developers at Comodo have unleashed the innovation in technology of security called
the Run-Time Automatic Threat Containment
First, Comodo built the world’s only Containment technology that has been battle tested
by over 80 Million users!
Second, the question is then when to use it. If you can identify a good file, then you
don’t need to contain it, because it’s a good file. If you can identify a bad file, then you
don’t contain it. Bad files need to be “quarantined” or deleted.
Comodo security includes a patented solution for containing unknown files in run time,
automatically. RTACT is intelligent enough to weed out good and bad and contain only the
unknown, hence creating a very efficient “Containment” technology.
CONTAINMENT
6. The PA-DSS Requirements for
Software Vendors
Should not retain card validation, PIN block data,
full magnetic stripe, and value, or code
Should secure Wi-Fi transmissions
Should never store cardholder data on a server
connected to the Web
7. Online Store Platforms That
Should be PCI Compliant
If a retailer's payment gateway is certified by PA-
DSS, the shopping cart checkout should also be
PCI compliant.
vendors use a non-compliant shopping cart, the
merchants can still become PCI compliant
8. Conclusion
be updated on the latest PCI DSS
requirements
Ensure the payment app provider is PCI
compliant and properly integrated with the
vendor
Click here for more!
9. Conclusion
be updated on the latest PCI DSS
requirements
Ensure the payment app provider is PCI
compliant and properly integrated with the
vendor
Click here for more!