Coming October 25: PeerSpot Awards will be announced! Learn more
2019-06-26T05:25:00Z
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
  • 0
  • 7

What advice do you have for others considering Comodo Advanced Endpoint Protection?

If you were talking to someone whose organization is considering Comodo Advanced Endpoint Protection, what would you say?

How would you rate it and why? Any other tips or advice?

5
PeerSpot user
5 Answers
SAMUELMWANGI - PeerSpot reviewer
Director at Calidad Systems Limited
Real User
Top 5Leaderboard
2021-04-02T16:15:12Z
02 April 21

We are a customer and an end-user of the solution. We don't have a business relationship with Comodo. We are using the latest version of the solution within our organization. I would recommend the solution to other companies. We've been very satisfied with it overall. I would give it a rating of seven out of ten. If they cleaned up a few technical issues and provided some better pricing, I would likely rate it higher.

AA
I.T. Specialist at a comms service provider with 51-200 employees
Real User
Top 10
2021-03-30T07:12:04Z
30 March 21

I would advise using the default policy is to start with and then adjusting it according to your environment. I would rate Comodo Advanced Endpoint Protection an eight out of ten.

IY
Senior Technical Product Manager at a tech services company with 201-500 employees
Real User
Top 10
2021-02-18T21:38:00Z
18 February 21

I would recommend this solution to others. They should try this solution. Our license is ending soon, and we are in process of renewal. I am happy with this solution. It is overall a complex platform because it provides a lot of functionality, so this much complexity is expected. However, its deployment and configurations have been simple for me. Any issues that I had were because I misconfigured the product. I contacted their support, and we had some sessions. I got a lot of help from the support team. I would rate Comodo Advanced Endpoint Protection a nine out of ten.

SS
Cyber Security Consultant at a tech services company with 1-10 employees
Consultant
Top 10
2020-10-11T08:58:15Z
11 October 20

In summary, this product is valuable but their support is not very good. I would rate this solution a five out of ten.

DB
Principal Enterprise Architect at a tech consulting company with 11-50 employees
Reseller
Top 10
2019-06-26T05:25:00Z
26 June 19

We have three companies here in our group and all three companies are using it. We have a professional business services firm that provides law, accounting, financial, and payromm services; a company that does specialized engineering and IT consulting; and we have a global company that handles enterprise ICT architecture, management, and security. All three of these companies are using the product in Sweden. They also use them in North America and Europe. We also use a Comodo for pushing out updates/patches and to keep asset inventories of our systems and software. We're also using it for network monitoring. I'd say we use it in a more active role with Symantec because Symantec does not provide the same types of services that Comodo does regarding network asset management. I think it's a good product and it supplements and works well with Symantec - using both products together provides two layers of protection. You do have to manage the antiviral capability because they can have conflicts with each other (we have not had any lock-up issues as we do with other product combinations but you can get false alerts). Comodo doesn't seem to have a problem running within the Symantec environment or vice versa. We haven't really run into any issues running both of them together. In fact, it's one of the reasons why we liked this combination. We have experimented with other combinations but found the Comodo-Symantec combination most stable. I would give it a 9 out of 10. I don't think anything's perfect, so it'd be really hard for me to give a ten - especially given the areas of improvement that I mentioned above. I give weight to the cost - Comodo licenses are a good value for what you get. It gives you a really good balanced portfolio to work with for your machines, not just on the malware protection and the firewall protection, but the virtual container, the ability to manage endpoints, the ability to manage patches. In our case, Comodo replaces several products that we used to use.

Related Questions
EA
Senior Technologist at LAIKIPIA UNIVERSITY
Nov 29, 2021
Hello dear community, My organization (a university with 500+ employees and ~5000 students) is looking for an endpoint security solution. Currently, we have Seqrite Endpoint Security, Comodo Advanced Endpoint Protection and Kaspersky Endpoint Security on the table for our consideration.  Which of these solutions would you recommend to choose and why? Please advise. I appreciate your help!
See 2 answers
Enayat Galsulkar - PeerSpot reviewer
Senior Information Security Consultant at Future Telecom
23 November 21
SentinelOne
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
29 November 21
Hi @BobenGeorge, @Kirtikumar Patel ​and @Basil Dange? Do you have any professional insights to share with your peers?
Nurit Sherman - PeerSpot reviewer
Content Operations Manager at PeerSpot (formerly IT Central Station)
Aug 25, 2021
Hi community,  We all know that it's important to conduct a trial and/or proof-of-concept as part of the buying process.  Do you have any advice for your peers about the best way to conduct a trial/POC?  How do you conduct a trial effectively? Are there any mistakes to avoid?
2 out of 18 answers
JC
consultant
30 July 18
You might want to start out with business cases ... ensuring that your endpoint solution begins to address those. some ideas might include: * antivirus * antivirus updates via automation * antivirus updates via cloud or on premise automation * antivirus reporting to central on premise management server * do you want to rely upon static signatures? * do you want to find the zero days? * what about polymorphic / variants of previously known malware? * will your antivirus mechanism share with other machines / computer their discoveries? * do you want to share your information with the manufacturer (via cloud) or keep your discoveries in house / on premise? * DLP -data loss protection * DLP reporting to central management server * DLP - how easily configurable? * DLP -what type of additional work will this entail for analyses, etc * Host Intrusion Prevention (HIP) * HIP - will it report to a central management server? * How will all the central management servers communicate with each other / other computers? * Do you have to tier the solution due to network segmentation / geographic considerations / size of deployment? * Will the endpoint product talk to or receive from other security devices (email, web filters, etc at the perimeter?) * has Gartner developed some frameworks that are used for testing endpoint solutions? * has Gartner at least testing the solution you are looking at? * potentially check firecompass.com for endpoint solution comparisons? * does endpoint protection support all operating systems you are using? * does endpoint protection interface with other security products on the endpoint? * logging ... is it detailed enough? * do you want to automatically quarantine computer if malware is found? * go through vendors data sheet and ensure you check all capabilities and test them * what things did the vendor promise? test those. * talk to a couple of their customers (same size organization if possible using similar if not same endpoint protection capabilities). discuss roll out, problems faced, vendor assistance, etc. A couple of ideas - certainly not exhaustive. ___________________
JC
consultant
30 July 18
adding: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-46r2.pdf Guide to Enterprise Telework, Remote Access, and Bring ... nvlpubs.nist.gov NIST Special Publication 800-46 . Revision 2. Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security . Murugiah Souppaya Guide to storage encryption technologies for end user devices nvlpubs.nist.gov Guide to Storage Encryption Technologies for End User Devices Recommendations of the National Institute of Standards and Technology Karen Scarfone ________________________________
Download Free Report
Download our free EPP (Endpoint Protection for Business) Report and find out what your peers are saying about Xcitium, Sophos, Broadcom, and more! Updated: September 2022.
DOWNLOAD NOW
633,572 professionals have used our research since 2012.