Comodo Internet Security
Comodo Internet Security (CIS) is an integration of an enterprise class packet filtering firewall, a powerful antivirus, and an enhanced host intrusion prevention system known as HIPS. Together, all these offer a 360° protection against external and internal threats.
The 'Secure Shopping' feature available with CIS allows online banking and shopping to be performed without fear that sensitive information like credit card passwords and numbers will be stolen or tracked. You may come across applications and websites that you feel is not safe to open. Here, the Virtual Desktop' allows you to open these in a secure environment isolated from the rest of your computer. You are guaranteed to be kept safe online because of the inbuilt URL filtering capable of blocking malware websites.
Each of these components used separately will help to deliver greater protection against particular threat challenges. A complete 'prevention, detection and cure' security system is provided for your computer when all these components are employed together as a complete suite.
The following key features are available with CIS:
Why Use CIS?
Two threat vectors are typically available:
- User becomes a victim of phishing websites online and can lead to the user submitting financial or personal data to rogue entities
- User's PC getting compromised due to zero day malware
CIS is available with an extremely strong web-filtering module capable of protecting against phishing and malicious websites across all leading browsers. CIS can be used as it protects against malware by guaranteeing that only legitimate and safe applications run in a user’s PC and thus no zero-day malware will be able to compromise the user’s PC.
Comodo Provides the Best Security Software and Beats the Competition
Any Standard antivirus will first have to know the threat in order to detect the threat. Malware authors capitalize on this threat detection model, and after developing malware, they then carry out scanning and testing, in a closed environment, against these standard detection based antivirus products. After obtaining the application not detected by other AVs, they get released in the wild. By the time the AVs obtain the file, analyze and then add detection of those files, malware author has already attained objective and commenced working on another zero-day malware. Here is where Comodo plays a crucial role. It is just not possible to compromise a PC running Comodo since it permits only known safe applications to execute changes in the system with everything else running in Comodo container, where malware assumes that it is making changes but because of virtualization of COM interfaces, Registry, Disk, and Memory, it is indeed fooled and thus not possible to make persistent changes.
This is the point where Comodo beats the competition, malware author will be able to by-pass other AVs, but fails to by-pass Comodo as it only permits trusted application. Hence, if a user desires to be protected against all zero-day threats, there is, in fact, no substitute of Comodo.
License to Online Freedom
The client is the end user in CIS. Any typical end user will desire to browse the internet and then install the software without any compromises. However, this is not possible with a conventional antivirus as it will have to know the threat in advance. Comodo provides the best security software that allows anyone in a family to use a PC without having to fear that the PC could become infected as it is available with a default-deny approach. According to this approach, if an application is not a trusted one then it will automatically run in the Comodo container. Users can now browse the Internet and execute applications without a fear factor. CIS is thus an established license to online freedom.
Identify the value proposition question
CIS is the only anti-malware solution that keeps PC in known state by permitting only safe applications to run. Unknown applications are run in container and cannot harm PC.
* Higher values of Appeal and Exclusivity refers to higher rating
|Claim#||Rank||Potential Claim of Value||Appeal (1-5)||Exclusivity (1-5)|
|1||1||Default deny: protection against all new viruses||5||5|
|2||1||Only software that is built upon the foundation of prevention rather detection||5|
|3||2||Only antivirus security software that has effective architecture to protect against file-less malware||5||5|
|4||3||Only antivirus security software that is available with everything a Geek may be looking while simultaneously having simplicity needed by layman||3||5|
|5||4||Only security suite that provides Firewall, Auto Containment, Antivirus, HIPS, Secure Shopping, Protection against Man in the Middle attack, Web Filtering, Cloud based instant malware analysis free for life time||4||5|
Rate the appeal and exclusivity for each claim (in table above)
Identify 2-3 evidential for the top claims of value (from table above)
- Only software, which upon finding an unknown application, runs in container, thus providing protection against zero-day malware.
- Daily ~1.1M new unknown files detected
- Daily ~42.1K unknown samples turn out to be new malware
- Daily ~4% unknown files, running in Sandbox, turn out to be malware upon analysis
- Daily ~20k potential Man in the Middle (MitM) sessions identified
- Only antivirus security software that is capable of classifying an application running in a machine under: Trusted, unknown and malicious categories and guarantees that files are either classified malicious or trusted so that there are no unknown entries. This guarantees that the PC is in a known state.