Combining endpoint security management with system monitoring tools, Comodo ESM has evolved to manage an endpoint's network connections, processes and services, installed applications, CPU, RAM and hard-disk usage and bandwidth consumption. Alerts of deviations from acceptable or pre-defined standards are sent to the administrator's browser-based console in real-time.
Through the intuitive context menu the administrator can terminate suspicious network connections, force-close processes, stop services and uninstall applications. The administrator is also able to resolve processes causing CPU or RAM saturation and terminate them as required or quickly establish the largest files on the endpoint's hard-drive and selectively delete them releasing precious storage resources, all from one console. Via Comodo ESM policies the administrator is also able to control the endpoint's power consumption by enforcing "sleep" or "hibernate" schedules and can control the use of USB devices.
This means enhanced system security, improved system performance, more efficient energy usage and less administrative overhead resulting in potential savings of thousands of dollars per year in IT costs and a more productive computing experience for users.
Comodo ESM Hardware requirements
Comodo ESM Agents can be installed on
Comodo Endpoint Security Manager can be installed on
Please note that installing Comodo ESM may require manual configuration of the firewall, if deployed, and disabling of Defense+ HIPS and Sandbox. We also recommend that scheduled scans be run outside of production hours and that, if large volumes of data are being scanned, the scheduled scans be broken up into several smaller scans.
Please be aware that Comodo ESM requires registration. Upon registration for the download, a license key will be sent to the email address submitted during the online registration process. This license key will be required to be entered during the installation of Comodo ESM
New Installations - Professional Edition
The starting point for new installations of Comodo ESM Professional Edition is the downloading and registration of the 10 free user licenses which are Free Forever. All we ask is, in order to continue using these free licenses, that they be renewed on an annual basis.
The currently available version of Comodo ESM should not be upgraded from Comodo ESM 1.6, 2.0 or 2.1 due to database incompatibilities. Comodo will advise clients when these updates are available
Licensing & Pricing
USA: +1 888 256 2608
International: +1 703 637 9361
How do I manage my endpoints using Comodo ESM?
The Comodo ESM server is administered via a panoramic-display, browser-based console on any Silverlight compatible system.
What protection does it offer?
Comodo ESM 3 leverages our award-winning anti-malware suite, Comodo Endpoint Security offering:-
How do I use it?
Once installed through the simplified wizards, endpoints are quickly and efficiently discovered via Active Directory query, workgroup discovery or IP address range. They can then be grouped as required and administrative policies applied. Comodo ESM will automatically reapply those policies to endpoints not compliant with their required configurations.
Is there a minimum or maximum number of PCs a business must have to use Comodo Endpoint Security Manager?
Version 3 has been tested managing 2500 endpoints.
Can the management server be run from a virtual server?
How are virus database updates received and how are they pushed out?
Virus database updates can be received from the internet or from the Comodo ESM server acting as a caching proxy. You can choose to use either (or both) as part of the deployment procedure or through post-deployment policy editing. Administrators can also update selected endpoints using the 'Update' button in the endpoint's properties tab.
Can I enable and disable individual components?
Yes. The choice of which components to install can be made during the initial setup wizard or at any time thereafter.
Can I configure Comodo Endpoint Security Manager to use an existing database server?
Yes, Comodo ESM can use its embedded Microsoft® SQL Express 2012 edition or you can configure it to use an existing Microsoft SQL instance (Express, Standard or Enterprise) 2005 or later.
One centralized management console combines management of LAN and WAN endpoint's security and system status
Unique panorama view of endpoint estate with "first-glance" view of 11 critical endpoint metrics
Set-and-forget policies ensure that endpoint configurations are automatically re-applied if they cease being compliant
Manages CPU, RAM and hard disk usage
Manages services, processes and applications
Manages endpoint power consumption
Lowest resource overhead anti-malware suite available on the market
Deploys endpoint policies with pre-configured firewall and application whitelisting rules
Allows updating of definition database from internet and/or caching proxy and that's just for starters…
Automatically uninstalls legacy / existing antivirus products
Manages USB devices
Default-deny anti-malware suite denies system access to unknown files