New A-VSMART Technology Creates a Next Generation, Proactive Threat Defense System to Prevent Viruses, Spyware, Malware, Rootkits and Trojans from Infiltrating Computers
Jersey City, NJ, November 27, 2007 - To help consumers protect their computers from all forms of viruses and malware, Comodo, a leading Internet security company today announced the release of Comodo Firewall Pro Version 3.0. Comodo Firewall Pro protects millions of computers worldwide and this new release advances computer security from being a defensive, reactive system to a preventative and proactive solution based on a new A-VSMART technology architecture. A-VSMART is short for "Anti; Virus, Spyware, Malware, Rootkit and Trojan" and represents a breakthrough in PC security architecture. While still free, Comodos next generation firewall helps customers more effectively prevent virtually all types of threats from penetrating a computer and incorporates the latest security prevention technologies available. Despite the sophisticated level of prevention, the software remains easy for the home user to install and use "out of the box".
Comodo Firewall Pro (V3.0) does a better job of protecting computers from malware than conventional solutions because it operates from a prevention rather than a detection perspective, and incorporates a sophisticated, layered threat management approach. Unlike detection/ signature-based firewalls and anti-virus solutions that allow all applications to gain access to system resources and then try to detect previously identified viruses by their signature, Comodo Firewall Pro takes the opposite approach. Comodo A-VSMART architecture allows only those applications known to be safe to gain access to computer resources, greatly reducing the probability of damage occurring. Breakthrough Technology: A-VSMART Technology Architecture
The key component of this next generation firewall lies in its A-VSMART (Anti: Virus, Spyware, Malware, Rootkit, Trojan) technology architecture that both proactively monitors internal system applications and processes while also actively monitoring all incoming and outgoing Internet traffic. Specifically, this architecture proactively protects against potential security breaches by; 1) enabling tighter control of internet traffic, b) controlling which applications are allowed to gain access to a computers CPU (central processing unit) and 3) limiting critical system access to allow only trusted system modifications. To deliver this high level of protection, Comodo Firewall Pro A-VSMART architecture utilizes key proprietary technologies:
* Defense+ for proactive monitoring of internal systems and processes:
Defense+ is an advanced Host Intrusion Prevention System (HIPS) that proactively monitors systems and system processes to detect and prevent system changes such as rootkit installations, inter-process memory injections, key-loggers and more.
HIPS technology is driven by a white list architecture which identifies trusted applications and prevents untrusted applications being installed onto the computer. Comodo has one of the largest white lists in the industry with a database of nearly 1 million safe executables. The integrity of every executable is checked against this database to determine whether or not it is genuine before it is given installation rights. With this system, potentially damaging applications are prevented from being ever being installed. * Patent Pending "Clean PC Mode"
Comodo Firewall Pro provides the user with the ability to install the solution in Clean PC mode, most useful for new PCs. In these cases, Comodo Firewall Pro creates a profile of the computer with all existing applications registered as safe. The firewall then prevents any unrecognized applications from being installed unless; a) the application is recognized by Comodos extensive white list or b) the user grants installation permissions. It also prevents any suspicious system processes from running. * Advanced firewall engine for preventative management of incoming, outgoing Internet traffic:
Comodo Firewall Pro offers the highest levels of preventative monitoring of all inbound and outbound traffic which will prevent hackers and identity thieves from penetrating a computer. New features have been added to enable this level of ID theft protection: o Stealth mode to make a PC completely invisible to opportunistic port scans o Wizard based auto-detection of trusted zones o Password protection of firewall settings o Diagnostics to analyze system for potential conflicts with other applications
In total, this innovative A-VSMART architecture combines security features, multilayer intelligence, application protection and threat containment within high-performance, yet easy to use solution. Key Features Highlights
This firewall integrates advanced technologies described above with a full set of features designed to optimize usability, enhance functionality and enable a high level of user configurability. Some selected features include:
* "Clean PC Mode" Installation
This powerful new feature allows Comodo Firewall Pro to create a profile of all applications on a new computer. This then prevents any unrecognized malware from being installed and maintains the "virus clean" status of a new computer. * Security rules interface
Version 3.0 gives users more control over security settings than ever before. Users can quickly set granular internet access rights and privileges on a global or per application basis using the flexible and easy to understand interface. This version also sees the introduction of pre-set security policies which allows users to deploy a sophisticated hierarchy of firewall rules with a couple of mouse clicks. * Enhanced graphical UI (User Interface)
Completely redesigned look and feel from the previous version of Comodo Firewall Pro makes it even easier for users to manage and configure. The default summary screen displays an immediate heads-up on all vital security settings and provides a central point of navigation to every part of the application. * Pop-Up alerts provide critical security information
Users are immediately informed with a pop-up alert if the firewall detects a potential security threat. Each alert includes a Security Considerations section which provides clear advice on whether you should allow or block a process. * Event logging
Version 3.0 features a vastly improved log management module - allowing users to export records of firewall activity according to several user-defined filters. * Vista Compatibility
Comodo Firewall Pro is now available for the Microsoft Vista community (both 32 and 64 bit versions).
Prevention Technologies Delivers Better Protections and Benefits
The culmination of years of development, Comodo Firewall Pro delivers advanced preventative protection that offers a number of key benefits designed to:
* Provide virtually bulletproof protection against root-kits, inter-process memory injections, key-loggers and more * Authenticate the integrity of every program before allowing it access to system resources * Alert users every time an unknown or untrusted application attempts to run or install * Block Viruses, Trojans and Spyware before they can ever get into a system * Prevent unauthorized modification of critical operating system files and registry entries * Give users granular level of control to determine access rights and privileges on a global or per application basis using the flexible and easy to understand interface.
"Comodo Firewall Pro represents a paradigm shift in the way we protect our PCs from security threats such as viruses, trojans and malware of all sorts." said Melih Abdulhayoglu, CEO and Chief Security Architect of Comodo. "Today most security solutions are detection based and detection can no longer be the first line of defense. Rather, prevention must become the first line of defense in computer security and Comodo Firewall Pro was engineered with that capability. We should no longer accept security solutions, such as anti virus products, that allow all applications access to our computers and then these solutions attempt to detect the harmful applications. Instead, we need to start denying malware access the CPU and proceed from the position of allowing only trusted applications CPU access. The Comodo companies are able to deliver this breakthrough approach because we leverage our Certification Authority heritage to authenticate trusted applications and executables. Now, consumers can expect security to deliver on its promise preventing viruses and malware from ever reaching a computer in the first place."
Comodo Firewall Pro with its A-VSMART architecture provides a highly effective, efficient and lightweight system for worry-free desktop security to manage the variable and fluid threat landscape.
For more information, please visit http://www.personalfirewall.comodo.com About Comodo
The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL, Code Signing, Content Verification and E-Mail Certificates; award winning PC security software; vulnerability scanning services for PCI Compliance; secure e-mail and fax services.
Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internets ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and 3,000,000 users of our desktop security products.
For additional information on Comodo - Creating Trust Online visit http://www.comodo.com
For more information, reporters and analysts may contact: Judy Shapiro Comodo +1 (201) 963-9471 Email: email@example.com