Comodo Releases Historical Statistics for Enterprise Customers Achieves Zero Percent Infection and Breaches for Customers
Clifton, NJ | October 29, 2020 10:36 AM Eastern Daylight Time
Comodo, the world’s leader of next-generation cybersecurity announced that it has released historical statistics for its enterprise customers and will publish updates on a regular basis. Comodo’s Transparency Page lists weekly historical data sets that includes scores and statistics from millions of endpoints on thousands of different networks. Built with the goal of providing transparency and building trust, it represents a health check for enterprise customers and drills down to both device view and file view, providing percentage data for the following:
Device View
File View
“Our reporting for the month of October shows zero infections and zero breaches, which represents data collected from our enterprise users on millions of endpoints, from thousands of different networks,” said Alan Knepfer, President and Chief Revenue Office with Comodo. He continued, “This clearly demonstrates the power of Comodo attack surface reduction (ASR) and the efficacy of protection without detection. Every unknown executable, which these files were, were running in kernel API virtualization mode.”
Comodo’s Dragon platform with Advanced Endpoint Protection (AEP) is a complete cloud-native framework that delivers a zero-trust architecture to protect and defend endpoints. Its patent-pending auto containment technology has active breach protection that neutralizes ransomware, malware and cyber-attacks. The auto containment runs any unknown executable in a kernel API virtualized mode, thereby offering attack surface reduction (ASR) which neutralizes ransomware attacks.
The Dragon platform also utilizes a Default Deny security posture with Default Allow usability to provide a most comprehensive protection against zero-day threats, while having no impact on end-user experience or workflows. Comodo’s Valkyrie analyzes and gives a trusted verdict for every file – no other company will analyze and give trusted verdict for 100% of the files on a network. Comodo’s platform shares intelligence and is therefore more secure than disparate products that claim best of breed but don’t share information. Comodo has architected its cybersecurity product to maximize intelligent sharing between every component of the platform, therefore providing superior security.
Alan continued, “Transparency and trust are key in the cybersecurity industry. And while a hundred percent security cannot be promised by anyone, showing these types of stats is a critical component for building the foundation for that transparency and trust. We are calling on all cybersecurity vendors to start publishing similar statistics, as well. We firmly believe this type of visibility is good for the industry and for end users. Only companies with subpar products that rely on marketing and don't want to be found out will be hesitant to publish these types of statistics.”
We help customers stop breaches with groundbreaking auto containment technology that neutralizes ransomware, malware and cyber-attacks. Our complete cloud-native framework delivers a zero-trust architecture with active breach protection for the most comprehensive defense against zero-day threats. Comodo’s cybersecurity products maximize intelligent sharing between every component of the platform, therefore providing superior security. We are the only company that analyzes and gives a trusted verdict for 100% of files on a network.
Comodo leverages innovation to celebrate and support the cybersecurity community by offering the very first open source endpoint detection and response (EDR). We believe that an open source model using community-powered collaboration will ensure that every organization has access to the industry’s most sophisticated EDR.
Headquartered in Clifton NJ, Comodo’s global development team and threat intelligence laboratories deliver innovative, category leading, security solutions for thousands of companies’ endpoints, network boundaries, and internal networks. For more information visit https://www.comodo.com/