H
hjlbx
Thread author
Applies to Comodo Internet Security - for the most part - as well...
"Comodo Containment Technology" PDF: https://www.comodo.com/resources/white-papers/comodo-containment-technology.pdf
Comodo’s Solution: Containment Technology
Comodo containment technology defeats zero-day attacks better than any other security
technologies on the market today. Comodo’s solution uses a combination of process
virtualization, whitelisting, file lookups, behavior analysis and traditional AV scans to
intelligently, accurately and quickly identify unknown files and processes. Our technology
authenticates every executable and process that requests runtime privileges and prevents them
from taking actions that compromise user or system data.
Once identified, any unknown processes are launched inside a secure, virtual environment that
does not allow access to system resources or user data. Processes in containment read and
write to a virtual registry, file system, OS core and hardware. Malware in containment cannot
access user data or damage the protected system and are deleted as soon as the user closes the
container. If the processes are determined to be good, they are automatically released out of
the secure container, contingent upon the administrator’s policy.
Comodo containment technology meets the key business deliverable of providing total protection against zero-day threats while having no impact on end-user experience or workflows. Whether the unknown files are malicious or safe, they run in the sandbox just as well as they would on the system. However, they cannot damage or infect the systems
because they cannot access the underlying system. This allows safe applications the freedom to run as needed while denying malicious applications the system access they require to deliver their payloads.
"Comodo Containment Technology" PDF: https://www.comodo.com/resources/white-papers/comodo-containment-technology.pdf
"Comodo Containment Technology" PDF: https://www.comodo.com/resources/white-papers/comodo-containment-technology.pdf
Comodo’s Solution: Containment Technology
Comodo containment technology defeats zero-day attacks better than any other security
technologies on the market today. Comodo’s solution uses a combination of process
virtualization, whitelisting, file lookups, behavior analysis and traditional AV scans to
intelligently, accurately and quickly identify unknown files and processes. Our technology
authenticates every executable and process that requests runtime privileges and prevents them
from taking actions that compromise user or system data.
Once identified, any unknown processes are launched inside a secure, virtual environment that
does not allow access to system resources or user data. Processes in containment read and
write to a virtual registry, file system, OS core and hardware. Malware in containment cannot
access user data or damage the protected system and are deleted as soon as the user closes the
container. If the processes are determined to be good, they are automatically released out of
the secure container, contingent upon the administrator’s policy.
Comodo containment technology meets the key business deliverable of providing total protection against zero-day threats while having no impact on end-user experience or workflows. Whether the unknown files are malicious or safe, they run in the sandbox just as well as they would on the system. However, they cannot damage or infect the systems
because they cannot access the underlying system. This allows safe applications the freedom to run as needed while denying malicious applications the system access they require to deliver their payloads.
"Comodo Containment Technology" PDF: https://www.comodo.com/resources/white-papers/comodo-containment-technology.pdf
Last edited by a moderator: