Web Security

Cleaning Essentials

Cleaning Essentials (CE) helps users identify and remove malware and unsafe processes from Windows computers. Designed as a portable application, the software requires no installation and can be run directly from removable media such as a USB key.

Kill Switch

An advanced system monitoring tool that allows users to identify, monitor and stop potentially unsafe processes that are running on endpoint systems. Uniquely for a product of its type, KillSwitch leverages our huge whitelist database to isolate untrusted processes with an extremely high degree of accuracy – improving IT operational efficiency by reducing false positives and cutting the amount of time spent troubleshooting an endpoint machine.

Malware Scanner

Fully featured malware scanner capable of unearthing and removing viruses, rootkits, hidden files and malicious registry keys hidden deep within a system. Our scanner is highly configurable, uses the latest heuristic techniques to detect previously unknown viruses, features first-class malware removal capabilities and is capable of detecting hidden drivers and services loaded during system start-up.

cleanliness essentials

Network Assessment

We conduct a detailed assessment about your network including computers, servers, users, applications and more.

What is the benefit?

  • Key reports to open doors for new clients
  • Best way to show what your clients need
  • Proof of what you've done and what you will do
  • Deeper look to serve better
  • Objective monitoring metrics without the need of installing agents
  • Discovery of unsupported operating systems to upgrade new ones
  • Pinpoint key risk items to prioritize the work

Risk Report

We summarize your overall risk with score based details. We identify problematic areas and offer a solution only if required. Our goal is to always find out how we can serve you better.

Network Management Plan

Network Management Plan is a special representation of issues and risks by their criticality. You can view all issues by risk assessment as high/medium/low severity and probability. We wil prepare a detailed asset lists which allows us to pinpoint problematic ones and build our action plan.

network assessment

Unknown File Hunt

We are capable of identifying APT's and other zero-day threats. All executables are classified as "Trusted" which is known good, "Malicious" which is known bad and all other as "unknown" (not known as good or bad). All APTs and zero-days fall under this category and it is not address by AV industry. We have an enormous list of good and bad files to eliminate from equation and capability to identify / act on "Unknown" threats. We scan and assess your networks against all unknown threats. It enables us to determine the trust level of all files on the targeted endpoints.

Auto Discovery and Deployment

We can help IT admins to remotely deploy applications to multiple endpoints via Active Directory, Workgroup or IP address/IP range/host name. Designed to deploy and install any application remotely, e.g. deploying ITSM agent.

Deploying Applications / Packages:

You can deploy applications to remote endpoint in two short steps:

  • Select the packages to be deployed to discovered endpoints.
  • Optional – add command line parameters/switches to modify installer behavior.
  • Optional – specify different installers for 32 bit and 64 bit operating systems.
  • Specify target endpoints using Active Directory, Workgroup or Network Addresses.

Cloud Back-up

Cloud Backup can help you securely migrate, protect and recover critical data wherever it resides in your physical, virtual or cloud environments. Its innovative solutions are designed to ease the management burden and reduce total cost of ownership, while improving your recovery time objectives.

Description

Our Back-up Cloud is a comprehensive, yet simple, complete, and cost-effective local and cloud backup and recovery solution that equips us to solve your data protection problems. We deliver a highly customized, complete, and reliable service that backs up data from any source and recovers to any destination and system.

Benefits for you

  • Start backing up your data in no time with a quick and easy-to-use service.
  • Eliminates the complexity, costs, and resources required to manage an on-premise solution.
  • Protect any data, any system with one, complete service.
  • Select the size of storage you need today and simply buy additional space as your infrastructure grows.
  • Reduce network consumption and storage costs using smart backup features.
  • Provides ultra-fast recovery, ensuring you are back up and running in minutes, not hours.
  • Offers both cloud and local backup for hybrid protection.
  • Eliminates the need to install updates because you are always using the latest release with cloud software.
  • Eliminates the costs associated with backup tapes/drives and cumbersome tape rotation.
  • Add on data protection as your needs change, protecting your original investment.

Cloud Watch

Our managed Breach Prevention and Compliance solution that leverages a modular Security asa Service platform to monitor the data from various sensors spread across your private and public cloud platforms, in hybrid environments and on-premises infrastructures.

Description

We bring proven technology, industry leading personnel and global threat research together in a Security-as-a-Service model that effectively solves the breach problem.

Key Features & Benefits

  • A simpler, better and cost effective way to security wtihout the hassle of complex configurations.
  • Improved security, lower risks and reduced costs.
  • No Capital Expenses.
  • No Upfront Costs.
  • Best of breed fully managed security software.
  • 24*7*365 Monitoring, incident handling and response.
  • Your very own threat research lab.
  • Advanced Network Intelligence.
  • Top Notch experts in various fields of security.
  • Security Operations Center.
  • World Class Threat Intelligence.
  • Global visibility of emerging threats.
  • Compliance.

Secure Web Platform - Standard

Our revolutionary Cloud Delivered Secure Web Platform that is delivered as a Security as a-Service (SaaS) solution that provides fully comprehensive web content security and control, regardless of user, device or location, and scans all inbound and outbound traffic in real time to ensure protection from the latest threats as well as strict compliance wi th corporate policies.

Description
Web Security Problem: Solved

We have radically shifted protection from the standard default-allow to our unique Default Deny Platform still allowing uninterrupted business productivity while protecting your users from advanced targeted attacks. We render verdicts within 30 seconds, affording you automatic protection from any and all new and unknown payloads without the need to rely on signatures or outdated file-type blocking.

Sophisticated and highly customized attacks are becoming the norm, not the exception and are being aimed directly at inadequately protected end points inside – and more importantly – outside the corporate network where protection levels are almost uniformly lower.

Adding our solution between your existing infrastructure and the internet couldn’t be easier. As a cloud-based solution, there’s no hardware appliances or headaches, and in minutes you’ll have added the bulletproof layer of security and compliance that you’ve been missing.

Key Features
Security Features:

  • Valkyrie Cloud-Based Sandbox and File Verdict Platform
  • Automated unknown File Containment
  • Utilizing Comodo's Patent-Pending Portable Containment Technology
  • Real-time Synchronization with Comodo Threat Research Labs Intelligence
  • Static,Dynamic and Human Malicious File Analysis
  • Botnet Protection
  • Phising Protection
  • Unique knowledge of known good and known bad software publishers and applications for auto-whitelisting Traffic Forwarding Methods
  • Explicit Proxy
  • PAC Files
  • ICAP
  • Proxy Chaining
  • Comodo Dome Agent
Advanced Policy Controls:

  • URL Filtering by category
  • 15+ million domains
  • Custom Categories
  • Location Based Configuration
  • User/Group Based Policies
  • Endpoint Sandbox Controls
  • Domain Blacklisting and Whitelisting
System Features:

  • No Hardware No Install
  • Active Directory, NTLM , Kerberos Integration
  • Hosted Database Support
  • HTTP and HTTPS Support
  • In-depth malware analysis reports
  • Detailed user and group reports
  • Scheduled reporting
  • Customizable dashboards

Firewall Virtual Appliance

Firewall Virtual Appliance is a Unified Threat Management solution that can be installed into any hardware or virtualization solution within your company network.

Description

Our Firewall Virtual Appliance can be placed next to the gateway of your company router and protect traffic coming from all ports and protocols.

Features / Benefits Security Features:

  • Static & Behavioral Malware Analysis at the Gateway
  • Zero-Day Malware Protection
  • Automated Unknown File Containment
  • Portable Containment Technology
  • Manual Human based Malware Analysis at the Gateway
  • Phishing Protection: Stop sources of phishing attacks with cloud based lookups
  • Cloud based lookups for the latest threat intelligence
  • Botnet Protection: Block callback attempts of infected endpoints
  • Application Auto-Whitelisting
Certification

Common Criteria EAL 4+

Content Filtering:

  • Category based URL Filtering : Blocking URLs by their categories and custom blacklists
  • Comodo Web Filtering Database with live updates every 2 hours.
  • Domain Categorization Feed Updates
  • HTTPS Interception : Analysis of encrypted HTTPS traffic
  • Source, Destination,Schedule and User Based Rule Management
Firewall:

  • Unified Policy Management
  • Stateful Packet Inspection Firewall
  • Source, Destination, Service , Port , IP and FQDN based traffic blocking
  • User, Group, Schedule and Network based policy management
Networking:

  • Source and Destination Based NAT Support with Masquerading
  • VLAN and DHCP Support
  • WAN Load Balancing and Fail-over
  • Zone based Management Supporting Multiple LAN
  • NAT, PAT, Routing, ICAP Support
  • Virtual IP Management
Intrusion Prevention:

  • Category based IPS Signature Database: Block intrusion attacks with granular policies by their categories
  • Real-time updates: Every week new IPS signatures are automatically added to database
  • Support for Custom IPS Signatures: Create and upload your own IPS
Virtual Private Network:

  • Site-to-Site VPN
  • Client-to-Site VPN
  • Supports IPSEC, L2TP, SSLVPN and GRE Tunnels
  • Active Directory Authentication
Management:

  • Simple web based management interface
  • User, Group and Time Based Rules
  • Active Directory Integration
  • Role Based Access Control Rights to Management Interface
Bandwidth Management:

  • Service based traffic prioritization
  • TOS/DSCP Based Controls
  • Quality of Service based bandwidth allocation

AntiSpam MSP

Antispam is an enterprise antispam and threat prevention appliance that uses a sophisticated array of spam filters, anti-virus scanners and content analysis engines to prevent unsolicited mail from ever entering your network.

Description:

The solution is compatible with all major MTAs (Mail Transfer Agents), integrates easily into existing e-mail structures and is scalable to thousands of users.

Messaging Gateway’s uniquely intelligent filtering algorithms deliver over 99% accuracy rates on content classification and spam detection, helping it to earn ‘Premium’ certification from independent testers West Coast Labs.

Key Features:

  • Antispam protection for incoming mails
  • Antispam protection for outgoing mails
  • Enhances productivity of employees and servers
  • Intuitive web interface facilitates easy use and configuration
  • Easy management of domains and email restrictions
  • Whitelist / blacklist recipients and senders
  • Archiving incoming mails