COMODO ENDPOINT SECURITY MANAGER FOR WINDOWS PHONE - SECURE MOBILE DEVICES WINDOWS PHONE
Comodo ESM Console for Microsoft Windows Phone platform very well take advantage of the advanced and latest Mango phone notifies the user to change the current state of security. This application provides display on status updates founded the Republic, compliance and detect malware for all endpoints are protected by antivirus software and firewall, Comodo Internet Security and managed by Comodo Endpoint Security Manager 2.0 Business Edition. Active Reports feature of the app with remedial capabilities will help IT staff can quickly respond to any issues relating to the security of your smartphone.
Note: The requirement to install Comodo Endpoint Security Manger 2.0 Business Edition server on your network and can be accessed via the Internet.
BENEFITS RECEIVED FROM COMODO ENDPOINT SECURITY MANAGER
- Centralized management console to manage local and remote enpoint.
- Notifications in real time.
- Manage enpoint Windows, Mac OSX and Debian.
- Prevent penetration ability of unauthorized software and malware into the network with Default Deny Protection Features and Auto-Sandbox.
- Automatically apply the policy.
- Includes the ability to secure wifi, battery management, managed USB devices.
- Access styled RDP sessions to multiple endpoints from the console.
Combining the ability to manage endpoint security with system monitoring tools, Comodo Endpoint Security Manger was developed to be able to manage the network connection of a terminal, and service processes, applications installation and use of CPU, RAM, hard drive usage and bandwidth consumption. Notice of deviations from acceptable standards or were reserved to be sent to the console on the web browser of a manager immediately in real time.
Through intuitive context menus, management staff can stop the activity of suspicious network connection, turn off the process, stop the service and remove the app. Besides, you also have the ability to solve these processes cause the RAM or CPU saturation and stop them if necessary or to quickly establish large files on the hard drive terminals and choose to delete them to solve Reporters storage resources, all from one console. Through the Endpoint Security Manger policy, management staff will control the amount of energy consumed by scheduling as well as pressing the sleep or hibernate manage USB devices.
This also helps extend security capabilities to the system, improving performance, energy use more efficient, less costly to manage. The end result is saving a lot of money each year for IT management as well as increased user experience for users.
COMODO ENDPOINT SECURITY MANGER PROVIDES SECURITY CAPABILITIES WHAT?
Comodo Endpoint Security Manger 3 gives users:
- Antivirus solutions with the most comprehensive blacklist of Comodo.
- Comodo Firewall legendary.
- Systems against intrusions and Defense + revolutionary high possibility of Comodo with Default Deny Protection , use the list of application whitelist, prevent unsafe executable files from viruses.
- Auto Sandbox Technology will automatically separate the dubious application isolation environment while the ability to analyze activity on integrated cloud will help determine the reliability and integrity of applications - all both not affect end users.
THE MAIN FEATURES OF COMODO ESM CONSOLE
- Console combines centralized management capabilities to manage the security and status quo system for LAN and WAN network terminal.
- Display as a unique panorama of the terminal with an overview of 11 important metric for the terminal.
- Automatically uninstall antivirus applications are used.
- Security Configuration Manager Comodo Endpoint Security Manager.
- Management uses CPU, RAM and hard drive.
- Management services, processes and applications.
- Managing power consumption of the terminal.
- Manage USB devices.
- Set the policy to ensure that the configuration for the terminal will automatically be applied if there are any issues that occur.
- Deploy the policy to endpoints with preconfigured firewall and rules for application whitelist.
- Antimalware applications use less resources available on the market the most.
- Ministry default anti-malware apps will deny access to the file system of unknown origin.
- Allow database updates from the Internet or proxy cache.