Firewall Pro Offers Unique Technology

New Products, Agreements and Trends
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Comodo, a leading security company, recently announced that its Firewall Pro application continues to grow in popularity with consumers and Internet security industry experts which accounts for why tens of thousands of users every day are switching from other firewalls to Comodo Firewall Pro.

Comodo Firewall Pro V3.0 is free software that outperforms virtually all other firewall solutions--paid or free--because it operates from a sophisticated, preventative, multi layered threat management approach, the company says. This approach is considered leading-edge by the security industry and is seen as being far superior to most other traditional "detection" approaches used by other security vendors, according to Comodo. As a result, Comodo Firewall Pro has garnered many awards and distinctions such as:

  • PC Magazine Editor's Choice (2008)
  • PC World "101 Fantastic Freebies" (2008)
  • Computerworld "10 Essential (and free) Security Downloads for Windows" (2008)
  • Download.com's Five-Star Review Rating (2008)

Unlike most other firewalls that operate from detection/signature-based platform, Comodo uses a new model focused on system protection by restricting Internet or system application downloads to only those known to be trusted. This approach mitigates the need to "clean" viruses that detection-based firewalls would allow onto a computer.

Comodo Firewall Pro is one of the most technologically advanced and compatible solutions available, the company says. 

The solution is a flexible application that is compatible with any 32 or 64-bit Windows-based operating system, and the only free application that is compatible with Vista. In addition, Comodo Firewall Pro is compatible with Windows XP. Comodo Firewall Pro provides the highest levels of security against inbound and outbound threats through its latest technologies:

  • A-VSMART technology architecture that helps customers more effectively prevent virtually all types of threats from penetrating a computer and incorporates the latest security prevention technologies available.
  • Defense+ is an advanced host intrusion prevention system (HIPS) that proactively monitors systems and system processes to detect and prevent system changes such as rootkit installations, inter-process memory injections, key-loggers and more.
  • Patent pending "Clean PC Mode" allows the firewall to create a profile of the computer with all existing applications registered as safe. The firewall then carefully controls "unsafe" or "unauthorized" applications from gaining system access. This prevents any unrecognized (and potentially dangerous) applications from being installed. It also prevents any suspicious system processes from running.

Comodo Firewall Pro offers the highest levels of preventative monitoring of all inbound and outbound traffic which will prevent hackers and identity thieves from penetrating a computer.

New user interface and configuration features provide further protection and include:

  • Stealth mode to make a PC completely invisible to opportunistic port scans
  • Wizard-based auto-detection of trusted zones
  • Password protection of firewall settings
  • Diagnostics to analyze system for potential conflicts with other applications

"Comodo Firewall Pro continues to secure more and more people everyday worldwide," said Melih Abdulhayoglu, CEO and chief security architect of Comodo. "Comodo Firewall Pro with its A-VSMART architecture provides a highly effective, efficient and lightweight system for worry-free desktop security to better protect users in today's highly fluid threat landscape."

To download the application for free, visit: http://www.personalfirewall.comodo.com.

About Comodo

The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL, Code Signing, Content Verification and E-Mail Certificates; award winning PC security software;  vulnerability scanning services for PCI Compliance; secure e-mail and fax services. Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet's ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and 3,000,000 users of our desktop security products. For additional information on Comodo--Creating Trust Online, visit http://www.comodo.com.om, www.trustix.com, www.enterprisessl.com, and www.contentverification.com.

Comodo is a leading Internet security provider. With U.S. headquarters in New Jersey and global resources in UK, China, India, Ukraine, and Romania, Comodo provides businesses and consumers worldwide with security services, including digital SSL certificates, PCI scanning, desktop security, and remote PC support. Securing online transactions for more than 200,000 businesses, and with more than 35 million desktop security software installations, including an award-winning firewall and antivirus software, Comodo is "creating trust online." To learn more, visit Comodo's Web site, www.comodo.com.

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  •  

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: