Combining endpoint security management with system monitoring tools, CESM has evolved to manage an endpoint's network connections, processes and services, installed applications, CPU usage, RAM usage, hard-drive usage & bandwidth consumption. Alerts of deviations from acceptable or pre-defined standards are sent to the administrator's browser-based console in real-time.
Through the intuitive context menu the administrator can terminate suspicious network connections, force-close processes, stop services and uninstall applications. The administrator is also able to resolve processes causing CPU or RAM saturation and terminate them as required or quickly establish the largest files on the endpoint's hard-drive and selectively delete them releasing precious storage resources, all from one console. Via ESM policies the administrator is also able to control the endpoint's power consumption by enforcing "sleep" or "hibernate" schedules and can control the use of USB devices.
This means enhanced system security, improved system performance, more efficient energy usage and less administrative overhead resulting in potential savings of thousands of dollars per year in IT costs and a more productive computing experience for users.
How do I manage my endpoints using ESM?
The ESM server is administered via a panoramic-display, browser-based console on any Silverlight compatible system.
What protection does it offer?
ESM 3 leverages Comodo's award-winning anti-malware suite, Comodo Endpoint Security Manager offering:-
- Comodo's best of breed black-list based antivirus solution
- Comodo's legendary firewall
- Comodo's innovative Defense+ host intrusion protection system with Default Deny Protection™ which, using our huge application whitelist, prevents untrusted executable from running and blocks viruses at source
- Auto Sandbox Technology™ automatically separates unknown applications into an isolated environment while integrated cloud behavior analysis helps determine the application's integrity and trustworthiness - all without interrupting the end-user
Comodo is so confident that we can protect endpoint we are the only vendor that offers our Limited Virus-Free Guarantee*
How do I use it?
Once installed through the simplified wizards, endpoints are quickly and efficiently discovered via Active Directory query, workgroup discovery or IP address range. They can then be grouped as required and administrative policies applied. CESM will automatically reapply those policies to endpoints not compliant with their required configurations.
What features does ESM 3 offer?
- One centralized management console combines management of LAN and WAN endpoint's security and system status
- Unique panorama view of endpoint estate with "first-glance" view of 11 critical endpoint metrics
- Automatically uninstalls legacy/existing antivirus products1
- Manages Comodo Endpoint Security Manager security configurations
- Manages CPU, RAM and hard disk usage
- Manages services, processes and applications
- Manages endpoint power consumption
- Manages USB devices
- Set-and-forget policies ensure that endpoint configurations are automatically re-applied if they cease being compliant
- Deploys endpoint policies with pre-configured firewall and application whitelisting rules
- Lowest resource overhead anti-malware suite available on the market
- Default-deny anti-malware suite denies system access to unknown files
- Allows updating of definition database from internet and/or caching proxy and that's just for starters...
1- product dependant
Is there a minimum or maximum number of PCs a business must have to use Endpoint Security Manager?
Version 3 has been tested managing 2500 endpoints.
Can the management server be run from a virtual server?
How are virus database updates received and how are they pushed out?
Virus database updates can be received from the internet or from the ESM server acting as a caching proxy. You can choose to use either (or both) as part of the deployment procedure or through post-deployment policy editing. Administrators can also update selected endpoints using the 'Update' button in the endpoint's properties tab.
Can I enable and disable individual components?
Yes. The choice of which components to install can be made during the initial setup wizard or at any time thereafter.
Can I configure Endpoint Security Manager to use an existing database server?
Yes, ESM can use its embedded Microsoft® SQL Express 2012edition or you can configure ESM to use an existing Microsoft® SQL instance (Express, Standard or Enterprise) 2005 or later.
CESM v3 Hardware Requirements
- 1 GHz Intel Pentium III or higher
- 1 GB RAM (2 – 4 GB recommended)
- 4 GB free disk space
CESM 3 Agents can be installed on
- Windows XP SP3
- Windows Vista
- Windows 7
- Windows Server 2003
- Windows Small Business Server 2003
- Windows Server 2008
- Windows Small Business Server 2008
- Windows Small Business Server 2011
- Mac OSX 10.5 +
- Debian variants of Linux (Debian/Ubuntu/Mint)
Comodo Endpoint Security Manager can be installed on
- Windows XP SP3 (requires a separate SQL 2008 Xpress Install)
- Windows Vista
- Windows 7
- Windows 2003 Server / Small Business Server (requires a separate SQL 2008 Xpress Install)
- Windows 2008 Server / Small Business Server
- Windows 2008 Server R2
- Windows 2011 Small Business Server
Please note that installing CESM 3.0 may require manual configuration of the firewall, if deployed, and disabling of Defense+ HIPS and Sandbox. We also recommend that scheduled scans be run outside of production hours and that, if large volumes of data are being scanned, the scheduled scans be broken up into several smaller scans.
Please be aware that CESM 3.0 requires registration. Upon registration for the download, a license key will be sent to the email address submitted during the online registration process. This license key will be required to be entered during the installation of CESM 3.0.
New Installations – Professional Edition
The starting point for new installations of CESM 3.0 Professional Edition is the downloading and registration of the 10 free user licenses which are Free Forever. All we ask is, in order to continue using these free licenses, that they be renewed on an annual basis.
The currently available version of ESM v3 should not be upgraded from ESM v1.6, v2.0 & v2.1 due to database incompatibilities. Comodo will advise clients when these updates are available
Licensing & Pricing
Licenses are sold in packs of 5 as one User-pack, thus if you purchase 1 User-pack, you will receive 5 User (seat) licenses, or for further example, if you purchase 7 User-packs you will receive 35 User (seat) licenses.
Licenses are sold for an annual period and start at $18.00 per user ($1.50 per user per month) for 5 to 15 users decreasing to $12.60 per user ($1.05 per user per month). Two- or three year licenses are also available.
For additional information or if you have any questions.
Please contact us at: email@example.com
Powerful Virus Cleaning Tools.
Is a set of computer security tools designed to help users identify and remove malware and unsafe processes from infected computers.Learn More
Antivirus for MAC
Proactive Antivirus provides complete protection against viruses, worms and Trojan horses for Mac OS X based computers.Learn More
Antivirus for Android
Protect your Android devices against viruses, unsafe apps potentially risky settings and even from theft while helping to protect your privacy.Learn More