Network security

The Importance of Prevention in Network Security

The adage ‘Prevention is better than cure’ holds true for all aspects of life and human activity. Thus, prevention is of great importance as regards network security as well. We do have the know-how today to set things right, as…

RF-10293_thb_6

Cybercrime on a Colossal Scale

Surely there are very few in the US, or among Internet-connected citizens elsewhere, who are not aware of the massive security breach suffered by Yahoo in 2013, but only recently acknowledged by the company. And it is really not as…

Monitors in ITSM

Comodo One. Understanding monitors in ITSM

Comodo One. Understanding monitors in ITSM What is ‘Monitoring’ in ITSM profiles How to configure ‘Monitors’ in profiles How to check monitoring logs How to monitor CPU/RAM/Network performance in devices How to Monitor Processes in devices How to Monitor Events…

Comodo One

Comodo One. Understanding Procedures

Comodo One. Understanding Procedures How to filter procedures How to create and run script procedure in devices How to schedule the procedure using profiles How to use script categories and keep them organized How to filter procedures? Step 1: Go…

Endpoint Protection

How To Choose Best Endpoint Protection Software for Business

Endpoint security is of prime importance today; we see lots of endpoint devices getting connected to enterprise networks, thereby increasing the chances of hacks and data breaches. Thus, it’s important that enterprises choose the best endpoint protection software for the…

Zero day exploits

Mozilla, Tor Release Patches to Block Active Zero Day Exploits

Mozilla and Tor recently released patches for the Firefox browser as well as the Firefox-based Tor browser aiming to block a recent attack. This attack exploited a Firefox animation remote code execution flaw to unmask users of the Tor anonymity…

Alerts in ITSM

Comodo One. Configuring alerts in ITSM

Comodo One. Configuring alerts in ITSM How to configure alerts How to create an automated alert ticket in Service desk using ‘Monitoring’ How to configure auto-remediation (fix) procedure if alert triggered from any monitor How to configure alerts You can…

Android security

Comodo Threat Research Labs Warns Android Users of “Tordow v2.0” outbreak

In late November 2016, Comodo Threat Research Labs discovered samples of the Android malware “Tordow v2.0” affecting clients in Russia. Tordow is the first mobile banking Trojan for the Android operating system that seeks to gain root privileges on infected…

Remote Endpoints

Comodo One. Takeover remote endpoints using ITSM

ITSM’s ‘Takeover’ feature allows administrators to remotely access and control Windows devices to solve issues, install third party software and perform system maintenance. To take over a device: Open ITSM then click ‘Devices’ > ‘Device List’ and select your target…

Patch Management

Comodo One. The Ins and Outs of Patch Management using Comodo ITSM

How to check patch status and deploy selected patches to devices How to deploy patches from the ‘Patch Management’ interface How to add a patching schedule to a profile (including best practices) How to manually run a patch procedure on…

Page 2 of 5712345...102030...Last »