LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: October 17th, 2014
Linux Security Week: October 13th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
CryptoLocker Ransomware Continues to Claim Victims While Enterprises Remain Safe with Comodo Endpoin Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Administrator   
Latest News Comodo, a leading Certificate Authority and Internet security organization, today announced that their Comodo Endpoint Security Manger software proactively protects against endpoints from getting hit by the CryptoLocker ransomware. CryptoLocker is a Trojan that is spread mainly through fake emails that mimic the look of legitimate businesses or via phony FedEx and UPS tracking notices. Once the user opens the malicious message, CryptoLocker installs itself on the user's system, scans the hard drive, and encrypts the files. All files are rendered inaccessible to the user until he or she pays a ransom to receive a decryption key.

ESM and its Comodo Endpoint Security (CES) software is able to assist in preventing threats including the CryptoLocker ransomware by isolating all unknown applications (malicious or not). If the threat is known to be malicious, the Antivirus (AV) will detect the signature and prevent the encryption of your files. If the threat is unknown, the HIPS and Auto-Sandbox will intercept it and stop it from contaminating the underlying operating system. Therefore, even before CryptoLocker became a known virus, CES would automatically sandbox it to prevent encryption of your files.

"CESM 3 is truly next generation in proactive endpoint security" said Michél Bechard, Comodo Product Line Manager, "because it's the only anti-malware solution that brings 5 layers of defense (Antivirus, Firewall, Host Intrusion Prevention, Auto-Sandbox & File Rating) to the point of impact, the desktop. We have such confidence in the strength of our solution that we are the only AV vendor to offer our customers up to a $5,000 limited warranty against infection."

Comodo's new Endpoint Security Manager 3 (CESM 3) platform provides a state-of-the-art anti-malware suite used to coordinate threat protection on local and remote endpoints from one browser based console and is designed to assist system and security administrators with centrally managing their laptop, desktop, and server endpoints with a minimum of administrative effort. The latest version of CESM see the addition of sever new capabilities, including centralized monitoring of sandboxed (unknown) and malicious files, Endpoint auto-synchronization via Active Directory, Encrypted VNC sessions to local & remote endpoints and support for Windows 7 Embedded Standard.

To learn more about the next generation in proactive endpoint security, visit:
http://www.comodo.com/business-enterprise/cesm3/index_v2.php

To Download a 60-Day, 60 user free trial, visit:
https://secure.comodo.com/home/purchase.php?pid=32&license=try

About Comodo

Comodo is a leading internet security provider. With U.S. Headquarters in New Jersey and global resources in UK, China, India, Ukraine, and Romania, Comodo provides businesses and consumers worldwide with security services, including SSL Certificate, PCI scanning, desktop security, and remote PC support. Securing online transactions for more than 200,000 businesses, and with more than 35 million desktop security software installations, including an award-winning firewall and antivirus software, Comodo is Creating Trust Online®. To learn more, visit Comodo's website: www.comodo.com.

For more information, reporters and analysts may contact:

Comodo:
E-Mail: media-relations@comodo.com
Office: +1 (201) 963 0004 x 4000

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
The Hacktivist as Angry Young Man
The Hacker Wars Hits NYC
CAINE Linux Distribution Helps Investigators With Forensic Analysis
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.