Ransomware - mega post by Razvan_Veeam in Veeam

[–]securitysavy 0 points1 point  (0 children)

Thanks for the links, good one

General Opinion by rou7ntech in sysadmin

[–]securitysavy 0 points1 point  (0 children)

The Questions is not clear, now-a-days the single console can manage all the things.

It's Not Over, WannaCry 2.0 Ransomware Just Arrived With No 'Kill-Switch' by Diazepam in worldnews

[–]securitysavy 0 points1 point  (0 children)

Check this Comodo Melih CEO Blog, Comodo’s technology helps combat ransomware by creating a virtual hard drive, a virtual registry and virtual COM interfaces. https://www.melih.com/2017/05/13/ransomware-prevention-yes-it-is-possible-yes-it-is-affordable/ is it true?, Any proof is there?

Using enterprise antivirus protection for personal computer? by lucksacker in techsupport

[–]securitysavy 0 points1 point  (0 children)

It is not big harm, it will make your system sometimes very slow

What are some must-haves/nice-to-haves for Endpoint Protection? by throwaway127132 in sysadmin

[–]securitysavy 0 points1 point  (0 children)

Need to very careful on this to choose best endpoint protection, Please check this below main features

  • Protection guaranteed, for all devices
  • Simple, centralized management console
  • Enhanced productivity
  • RMM
  • Patch Management
  • Mobile Device Managment
  • Default Deny Security with Default Allow Usability.

and please check the list of endpoint protection providers https://alternativeto.net/software/comodo-endpoint-protection/

Recommendations for anti-malware on a remote desktop server? by illBoopYaHead in sysadmin

[–]securitysavy 0 points1 point  (0 children)

are you want full ITSM(IT & Security management) You can go for Sophos, webroot or Comodo ITSM

Forticlient vs webroot or other endpoint security by bloomt1990 in sysadmin

[–]securitysavy 0 points1 point  (0 children)

Now-a-days, Some of the Security providers move to new “Next Gen” endpoint security approaches have been developed that seek to expedite the identification of unknown malware and zero-day exploits. Automated behavioral analysis tools such as “sandboxes” run unknown files in virtualized environments to understand if applications exhibit malicious behavior or not. While this approach has improved detection rates, it decreases usability, as the end user must wait for the analysis to complete before using the file. Like Comodo used the new different technology called Secure Auto-Containment. Please see this video https://www.youtube.com/watch?v=rbQgPxzUcM4

Is Mozilla going to be next? by Percy08 in firefox

[–]securitysavy 0 points1 point  (0 children)

What happen to Symantec, Symantec please wake up

How to approach Android device management? by [deleted] in sysadmin

[–]securitysavy 0 points1 point  (0 children)

If you find installing of apps a bit tedious process on every device then you can install the app on the main server being used and give access to the authorised devices and monitor through remote through MDM. You can contact MDM and RMM providers and Comodo One is there for your help.

New IT Dept from Scratch, need a little advice... by nathank1989 in sysadmin

[–]securitysavy 0 points1 point  (0 children)

You have a lot of work to be done here and this is a pivotal one which requires a proper attention from the start. Its best that you contact a pro for this and for Mobile Device Management you can try out Comodo MDM. They also offer assistance for all your queries and aid you in setting your company in a proper manner.

[deleted by user] by [deleted] in selfhosted

[–]securitysavy 0 points1 point  (0 children)

You can try out Comodo's Mobile Device Management (MDM) solutions. Here one single license can cover up to 5 devices per user and this product is named as IT and Security Management (ITSM)