In CIS 5.0 cloud antivirus protection and spyware scanning capabilities were added. As it could not clean all the malware it found effectively, Comodo Cleaning Essentials was developed to supplement CIS.
Host-based intrusion prevention system: Comodo's host-based intrusion prevention system (HIPS), named Defense+, is designed to provide protection against unknown malware. It is designed to restrict the actions of unknown applications, and restrict access to important files, folders, settings and the Windows Registry. Defense+ by default refuses any unknown program to install or execute except when specifically allowed by the user or when the file appears on Comodo's whitelist. In CIS 4.0 a sandbox was added to Defense+ to isolate and run unknown applications.
CIS v6, released February 2013, provided a major revision of the user interface and significant new features such as a fully sandboxed desktop environment. On March 6, 2014 Comodo announced completion of beta testing for CIS v6. The release will include a new virus monitoring tool called Virus Scope and Web Filtering features that provide control over user access to web content
Host-based intrusion prevention system: Comodo's host-based intrusion prevention system (HIPS), named Defense+, is designed to provide protection against unknown malware. It is designed to restrict the actions of unknown applications, and restrict access to important files, folders, settings and the Windows Registry. Defense+ by default refuses any unknown program to install or execute except when specifically allowed by the user or when the file appears on Comodo's whitelist. In CIS 4.0 a sandbox was added to Defense+ to isolate and run unknown applications.
CIS v6, released February 2013, provided a major revision of the user interface and significant new features such as a fully sandboxed desktop environment. On March 6, 2014 Comodo announced completion of beta testing for CIS v6. The release will include a new virus monitoring tool called Virus Scope and Web Filtering features that provide control over user access to web content
No comments:
Post a Comment