SlideShare ist ein Scribd-Unternehmen logo
1 von 9
SECURE APP DEPLOYMENT
By Comodo Containment
Secure App Deployment
 Unknown Applications that are installed onto the users' system might cause turmoil and
chaos leading to access of personal information, thereby identity theft, data loss, financial
loss and much more. To overcome all such hazardous threats,
 Comodo offers exclusive security solutions and services to run application be it good , bad
or unknown in a secure environment.
 Comodo Endpoint Security Solution, offers higher level of security with a multiple defense
mechanism by integrating auto sandboxing, a Default Deny Protection technique that creates
an isolated space while deploying any unknown application,
 Containment technology must also defend itself against malware “jumping out” of the
containment solution
 Comodo can provide containment security technology with unprecedented efficiency and
effectiveness to secure the world from hackers through a secure deployment of application
that only we can provide.
Threat Prevention Not Just Threat
Detection
A malware could exist mainly in 2 areas
1. Hard Drive
2. RAM
A malware could enter mainly via
Internet connection
Local Network
Wireless network
USB
By containing and controlling the file’s access both to CPU and Hard Disk, we limit its
capability to do damage. This containment solution is the way to prevent infections from
“ANY” malware, especially zero day malware and unknown files who then turn out to be
malicious.
Scanning The Unknown
Unknown threats are the greatest enemy to security. Every virus starts its life as an unknown
application. Allowing an unknown application unrestricted access to your network is akin
to allowing a total stranger into your home.
Question: How many strangers, people you don’t know of, live in your home?
Answer: None, of course. If you saw an unknown person in your house you would ask them to
leave and if they did not you would call the cops.
Question: How many unknown applications live in your network?
Answer: You don’t know, of course. But your legacy antivirus does allow unknown files to be
saved on your network’s computers.
Known good: The file is known to be valid and not a risk,
Known bad: The file is a known threat and must be dealt with accordingly.
Unknown: The file is not on our lists of good or bad. It may be safe or it could be malicious.
We just do not know.

Comodo offers a Containment mechanism through which information, networks,
systems or files that are harmful are made available within limits in a well controlled
manner.

Developers at Comodo have unleashed the innovation in technology of security called
the Run-Time Automatic Threat Containment

First, Comodo built the world’s only Containment technology that has been battle tested
by over 80 Million users!

Second, the question is then when to use it. If you can identify a good file, then you
don’t need to contain it, because it’s a good file. If you can identify a bad file, then you
don’t contain it. Bad files need to be “quarantined” or deleted.

Comodo security includes a patented solution for containing unknown files in run time,
automatically. RTACT is intelligent enough to weed out good and bad and contain only the
unknown, hence creating a very efficient “Containment” technology.
CONTAINMENT
The PA-DSS Requirements for
Software Vendors
Should not retain card validation, PIN block data,
full magnetic stripe, and value, or code
Should secure Wi-Fi transmissions
Should never store cardholder data on a server
connected to the Web
Online Store Platforms That
Should be PCI Compliant
If a retailer's payment gateway is certified by PA-
DSS, the shopping cart checkout should also be
PCI compliant.
vendors use a non-compliant shopping cart, the
merchants can still become PCI compliant
Conclusion
be updated on the latest PCI DSS
requirements
Ensure the payment app provider is PCI
compliant and properly integrated with the
vendor
Click here for more!
Conclusion
be updated on the latest PCI DSS
requirements
Ensure the payment app provider is PCI
compliant and properly integrated with the
vendor
Click here for more!

Weitere ähnliche Inhalte

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Containment technology defend itself against malware

  • 1. SECURE APP DEPLOYMENT By Comodo Containment
  • 2. Secure App Deployment  Unknown Applications that are installed onto the users' system might cause turmoil and chaos leading to access of personal information, thereby identity theft, data loss, financial loss and much more. To overcome all such hazardous threats,  Comodo offers exclusive security solutions and services to run application be it good , bad or unknown in a secure environment.  Comodo Endpoint Security Solution, offers higher level of security with a multiple defense mechanism by integrating auto sandboxing, a Default Deny Protection technique that creates an isolated space while deploying any unknown application,  Containment technology must also defend itself against malware “jumping out” of the containment solution  Comodo can provide containment security technology with unprecedented efficiency and effectiveness to secure the world from hackers through a secure deployment of application that only we can provide.
  • 3. Threat Prevention Not Just Threat Detection A malware could exist mainly in 2 areas 1. Hard Drive 2. RAM A malware could enter mainly via Internet connection Local Network Wireless network USB By containing and controlling the file’s access both to CPU and Hard Disk, we limit its capability to do damage. This containment solution is the way to prevent infections from “ANY” malware, especially zero day malware and unknown files who then turn out to be malicious.
  • 4. Scanning The Unknown Unknown threats are the greatest enemy to security. Every virus starts its life as an unknown application. Allowing an unknown application unrestricted access to your network is akin to allowing a total stranger into your home. Question: How many strangers, people you don’t know of, live in your home? Answer: None, of course. If you saw an unknown person in your house you would ask them to leave and if they did not you would call the cops. Question: How many unknown applications live in your network? Answer: You don’t know, of course. But your legacy antivirus does allow unknown files to be saved on your network’s computers. Known good: The file is known to be valid and not a risk, Known bad: The file is a known threat and must be dealt with accordingly. Unknown: The file is not on our lists of good or bad. It may be safe or it could be malicious. We just do not know.
  • 5.  Comodo offers a Containment mechanism through which information, networks, systems or files that are harmful are made available within limits in a well controlled manner.  Developers at Comodo have unleashed the innovation in technology of security called the Run-Time Automatic Threat Containment  First, Comodo built the world’s only Containment technology that has been battle tested by over 80 Million users!  Second, the question is then when to use it. If you can identify a good file, then you don’t need to contain it, because it’s a good file. If you can identify a bad file, then you don’t contain it. Bad files need to be “quarantined” or deleted.  Comodo security includes a patented solution for containing unknown files in run time, automatically. RTACT is intelligent enough to weed out good and bad and contain only the unknown, hence creating a very efficient “Containment” technology. CONTAINMENT
  • 6. The PA-DSS Requirements for Software Vendors Should not retain card validation, PIN block data, full magnetic stripe, and value, or code Should secure Wi-Fi transmissions Should never store cardholder data on a server connected to the Web
  • 7. Online Store Platforms That Should be PCI Compliant If a retailer's payment gateway is certified by PA- DSS, the shopping cart checkout should also be PCI compliant. vendors use a non-compliant shopping cart, the merchants can still become PCI compliant
  • 8. Conclusion be updated on the latest PCI DSS requirements Ensure the payment app provider is PCI compliant and properly integrated with the vendor Click here for more!
  • 9. Conclusion be updated on the latest PCI DSS requirements Ensure the payment app provider is PCI compliant and properly integrated with the vendor Click here for more!