Generative Data Intelligence

Tag: endpoint security

Block CryptoLocker Before It Installs with Comodo Endpoint Security

CryptoLocker, first spotted in September, continues to claim victims of both consumers and businesses alike. The Trojan is a form of ransomware that...

Universities Go to School on Computer Security

Reading Time: 3 minutesCyber security at a university can be a very different challenge than in a corporate environment. With an ongoing wave...

Windows 8 & Comodo: Perfect Together

Reading Time: 1 minute When considering upgrading to a new operating system your most important question is usually whether the applications you use will...

Cyber Crime and the Case for Auto Sandboxing

Reading Time: 2 minutesEvery computer, laptop, tablet and mobile phone connected to your network represents a vulnerable endpoint for viruses, worms, spyware, rootkits,...

Comodo Introduces Industry Changing Endpoint Security Solution

Reading Time: 2 minutesComodo announced today their latest solution for centralized administration of security, including antivirus protection of endpoints. Comodo Endpoint Security Manager...

February’s gone. But not forgotten.

Reading Time: 2 minutesIf you happen not to have been a frequent reader of the Blog contributions I’ve published within the Social Media...

Unshackling Small Business with Comodo’s Revolutionary Pricing.

Reading Time: 2 minutesIf you own or help manage a small business, you confront them every day. You might politely call them “your...

Did Your Network Security System Come With $5K Guarantee?

Reading Time: 2 minutesIf you’re the CEO, CFO, or head of IT at a small to medium size company, and your network antivirus...

Checkmark Awards Comodo Antivirus Certification

Reading Time: 2 minutesComodo recently announced that its Comodo Antivirus earned the  prestigious Checkmark Certification, confirming a high quality of programming by West...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?