Audience

IT security professionals that want breach protection from our leading portfolio of cybersecurity solutions and services

About Comodo Dragon Platform

Our completely cloud-native framework delivers you zero day protection against undetectable threats while defending your endpoints from known threat signatures. Comodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions. The Dragon platform delivers the foundation principles for complete next-generation endpoint protection. Easily improve your cybersecurity and performance with the Dragon Platform's lightweight agent delivering artificial intelligence (AI) and Auto Containment to stop all threats. Comodo delivers everything cybersecurity you ever needed to activate breach protection immediate value added from day one. 100% trusted verdict within 45 seconds on 92% of signatures via analysis, and 4 hours SLA on the remaining 8% via human experts. Automatic signature updates that simplifies deployment across your entire environment to lower operational costs.

Pricing

Free Version:
Free Version available.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Comodo
Founded: 1999
United States
www.comodo.com

Videos and Screen Captures

Comodo Dragon Platform Screenshot 1
Other Useful Business Software
Keep company data safe with Chrome Enterprise Icon
Keep company data safe with Chrome Enterprise

Protect your business with AI policies and data loss prevention in the browser

Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
Download Chrome

Product Details

Platforms Supported
Cloud
Training
Documentation
Support
Online

Comodo Dragon Platform Frequently Asked Questions

Q: What kinds of users and organization types does Comodo Dragon Platform work with?
Q: What languages does Comodo Dragon Platform support in their product?
Q: What kind of support options does Comodo Dragon Platform offer?
Q: What other applications or services does Comodo Dragon Platform integrate with?
Q: What type of training does Comodo Dragon Platform provide?

Comodo Dragon Platform Product Features

Cloud Security

Intrusion Detection System
Endpoint Management
Threat Intelligence
Application Security
Encryption
Behavioral Analytics
Antivirus
Vulnerability Management
Incident Management
Two-Factor Authentication

Container Security

Container Stack Scanning
View Container Metadata
Image Vulnerability Detection
Application Performance Tracking
Centralized Policy Management
Access Roles / Permissions
Testing
Reporting

Endpoint Detection and Response (EDR)

Malware/Anomaly Detection
Continuous Monitoring
Remediation Management
Blacklisting/Whitelisting
Behavioral Analytics
Prioritization
Root Cause Analysis

Endpoint Protection

Device Management
Application Security
Signature Matching
Antivirus
Whitelisting / Blacklisting
Behavioral Analytics
Activity Log
Web Threat Management
Encryption

IT Security

Intrusion Detection System
Two-Factor Authentication
Anti Virus
Event Tracking
IP Protection
Web Traffic Reporting
Internet Usage Monitoring
Web Threat Management
Anti Spam
Email Attachment Protection
Vulnerability Scanning
Spyware Removal

Network Security

Access Control
Firewalls
Internet Usage Monitoring
Intrusion Detection System
VPN
Vulnerability Scanning
Threat Response
Analytics / Reporting
Compliance Reporting

Patch Management

Automatic Patch Deployment
Automatic Scans
Network Wide Management
Patch Testing
Vulnerability Scanning
Alerts/Notifications
Automatic Approval
Compliance Management
Custom Patches
Dashboard
Patch Prioritization
Remote Access/Control

Secure Email Gateway

Data Loss Prevention
Real-time Dashboards
Anti-Malware
Threat Protection
Customizable
Sandbox
End-to-End Encryption
Archiving
Reporting / Analytics

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning