Comodo SecureBox 2.0 for protecting sensitive applications and systems

Comodo, a global provider of SSL certificates and security products, has released another version of the Comodo SecureBox 2.0 software. The new version of the solution enables administrators to easily secure critical points of network infrastructure, preventively isolating critical applications from potential attacks and information leakage from endpoints. The most important software that is responsible for the smooth business activities of the company together with the computer can be placed in the demilitarized zone and effectively protected against unauthorized access to the memory of application processes in the container.

Comodo SecureBox 2.0 is based on containerization - a patented technology that creates an additional level of security by protecting software used, for example, in bank transfers or intermediating in the exchange of information at PoS ( Point of Sale ) sales points. Thanks to the use of this mechanism, Comodo SecureBox 2.0 limits access to the indicated software, preventing potential data theft while free access to the software by its users.

Business-critical applications work in an ever-changing environment. According to various estimates, 20 - 30 thousand new threats appear every day, and within a few minutes, several of them gain access to critical enterprise data by modifying, deleting or encrypting key information. The solution to the problem, according to the vast majority of Vendors, is to run the application / file / process unknown in an isolated environment from the operating system. Are you sure? It seems that the automatic sandbox is one of the last lines of defense against 0day threats, making an unauthorized application or screen capture. Of course, each action requires reserving the appropriate amount of resources on the host side. What if the process was reversed? COMODO Secure Box (CSB) decided to use the option of isolating the application from the operating system in favor of the former. Accepting the assumption about an untrusted, and at best unknown, host environment allows to isolate a safe space for protected data. - comments Daniel Ciepły, Product Manager Comodo

Comodo SecureBox 2.0 acts as a guard between computers that are not controlled or vulnerable to attack by malicious software. It creates a safe and resistant tunnel between the computer and the server, enables employees to safely use Internet technology and simultaneously protects against malware, keyloggers, eavesdropping of SSL traffic, MITM attacks, MITB and unauthorized transfer of information to the "outside".

Comodo SecureBox 2.0 offers

  • Critical infrastructure management using a console in the cloud or from a local console (On Premise),
  • Generating threat reports from all connected endpoints,
  • Assigning protected applications to defined groups of computers,
  • Remote management of protected applications,
  • Integration with the asymmetric RSA algorithm,
  • Quarantining computers from which the local network is trying to access a protected application,
  • Blocking third parties from accessing the protected application container,
  • Protection against information leakage thanks to Remote Takeover Protection technology,
  • Client identification and verification based on computer parameters,
  • Blocked URLs for a protected application,
  • Automatic launch of applications in a protected environment.

The technology of containerization in the Comodo SecureBox 2.0 solution received the Gold Winner award in a plebiscite conducted by InfoSecurity's 2015 Global Excellence in the "Intrusion, Detection and Prevention" category.

More information about the solution: https://securebox.comodo.com



Learn more about our offer

If you sell security solutions, are a distributor, authorized partner or developer and would like to share your portfolio with a group of potential customers, advertise an event, software, hardware or other services on AVLab - simply write to us. Or maybe you had to deal with ransomware? We can also help you decrypt your files.
Read more

We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.