- Endpoint Security
- About Us
- Sales & Support
Single, unified platform allows you to protect and manage mobile devices and Windows endpoints from a single console. Create default security profiles for devices and endpoints, schedule regular malware scans, create application blacklists and whitelists, define password complexity, restrict device access to corporate mail, force encrypted communications, track user activity and more.
Device Manager also gives you built-in access to Comodo's elite range of mobile and endpoint security applications, including Mobile Antivirus, Device Anti-Theft and App lock software. Windows endpoints are comprehensively protected with the award winning Comodo Endpoint Security software, which includes antivirus, firewall, threat containerization, file reputation, URL filtering, and behavior analysis.
Reliable and scalable platform support with comprehensive visibility to control over iOS®, Android™ and Windows based systems. Highly competitive pricing and user-based licensing means each user can own several devices over time, so you get no surprise costs as your device count grows.
Deploy and manage security for mobile devices and Windows endpoints from a single console
Comodo's constantly updated antivirus protects all employees' phones and tablets against malware, unsafe apps and potentially risky settings
Force strict passcode and data encryption polices, place restrictions on rooted or jail broken devices and ensure only verified apps are installed
Prevent data leaks by remotely clearing all corporate and/or personal data should a mobile device be mislaid or an employee leaves the company
Remotely locate, lock or wipe lost or stolen mobile devices. 'Sneak-Peak' even allows you to take a photograph of the device holder if they enter the wrong password a certain number of times
Isolate data between managed and unmanaged applications
Assign and manage user and device certificates from a trusted certificate authority
Multi-layered defense for Windows endpoints includes antivirus, firewall, threat containerization, file reputation, URL filtering, and behavior analysis
Prevents endpoint malware outbreaks by automatically containing unknown files in an isolated environment, separated from the underlying operating system and user data
Administrators can elect to run frequently-targeted endpoint applications such as browsers and mail clients inside a secure virtual container
Meets key business deliverable of protecting endpoints against zero-day threats with little impact on system resources and without affecting user workflows
Comodo's firewall, antivirus and containment technologies can be deployed individually on endpoints to complement existing security solutions from 3rd party vendors
Over-the-Air enrollment of mobile devices
Quickly import mobile devices and endpoints individually or via LDAP and Active Directory
Authenticate users with a one-time password and/or with a user's Active Directory/LDAP credentials
Enforcement of default profile means devices and endpoints can be securely managed right after enrollment
Ensure the safety of data on endpoints and devices by running an automatic scan straight after enrollment
Easily create and deploy security policies for all mobile devices and Windows endpoints
Implement user-based permissions across devices to control the specific features to be used
All traffic from managed Samsung KNOX devices can now be directed to your company VPN
Create user, device and endpoint groups then deploy profiles to targeted audiences in seconds. For instance, create a group of users based on department, location or operating system/device type.
Whitelist mobile devices which are allowed to access company portals and mail servers. Create location-aware policies to dynamically apply restrictions based whether an endpoint is inside or outside the company VPN
Capture diagnostic details about devices, including hardware and software configuration, installed applications and running processes.
Watch all devices (Smartphones, Tablets, Laptops, PCs and Servers) in real time to proactively manage your inventory and resources
Monitor users and devices that access the company mail server.
View all apps installed on devices with real-time inventory reports
Push critical apps and security polices to devices and endpoints
Blacklist and require the removal of prohibited apps
Block undesirable or suspicious applications on a group or on a individual basis
Leverage Comodo's range of mobile security and productivity apps, including mobile antivirus, battery saver, app lock, antitheft and more.
Add your chosen range of mobile apps to your enterprise application store
Quickly generate and view extensive reports on discovered threats, device events, user activity, push statistics and more.
Audit devices to ensure compliance with corporate policies and to ensure no forbidden apps are installed.
Audit device, user and admin activities, including inactive devices
Detailed logging and connection information improves visibility and troubleshooting with MS Exchange integrations.
|Complete MDM (Mobile Device Management)|
|Complete MAM (Mobile Application Management)|
|Complete MSM (Mobile Security Management)|
|BYOD (Bring Your Own Device) Support|
|Endpoint Security Management for Windows Devices including World Best Containment Technology||
1 MONTH TRIAL
|Professional support for 7 days 24 hours over email and phone|
|Free SSL certificate for management server from Comodo CA
(if you choose to install on your own server instead of Cloud)
|Free Trial||Buy Now|
(*One premium license covers up to 5 mobile device per user or one computer)
How Comodo Device Management Can Help Transform Your Business