Learn more about Tic Tac with our new 3′ corporate video.

Protect yourself from cyberattacks with a Zero-Trust Policy

XCITIUM EDR / Comodo Advanced Endpoint Protection

Xcitium (formerly Comodo) is the best Endpoint Antivirus solution available for protection.

So, if you are looking for a comprehensive cybersecurity system that will shield your business against any threat, you are in the right place!

Xcitium Ex Comodo Edr

Xcitium (formerly Comodo) surprised us positively in all the tests we conducted

At TicTac, we see daily compromised Antivirus by Ransomware from very well-known companies, but Ransomware is always one step ahead.

After many tests, we ended up with Xcitium / Comodo.

Xcitium with Comodo AEP is not just an Antivirus; it is a cybersecurity suite for our infrastructure. It uses patented technology to protect our computers, specializing in “unknown” threats and Zero-Day Threats to which well-known Antivirus programs fall victim.

In the official tests conducted by the well-known company AVLab, Comodo AEP was named Product of the Year for 2020.

In the video below, you can see the innovative patented logic that Xcitium / Comodo applies to protect endpoints.

TicTac is now an official representative of Comodo in Greece and Cyprus. After laboratory tests, we found that Comodo solutions offer the best possible result in our protection.

Why we chose Xcitium (formerly Comodo)

Xcitium (formerly Comodo) is a cybersecurity company founded in 1998 and is particularly known for the highly effective Comodo Free Antivirus and Comodo SSL.

Since 2017, Comodo / Xcitium has developed exciting and effective solutions in the following areas:

  • Antivirus & Internet Security for Home Users
  • Advanced End Point Protection
  • Managed Service Provider Platform
  • Security Operation Center

For several years, TicTac Cyber ​​Security has been supporting companies with their IT solutions, focusing on Cybersecurity. For this reason, it has used various systems to support its clients.

Our goal is to be able to provide end customers with the following services:

  • Protection against viruses and cyberattacks through EDR (Endpoint Detection & Response) and Antivirus
  • Security Operation Center (SOC) services to monitor all security events on endpoints
  • Remote support services through remote computer management tools to remotely resolve customers’ daily problems without physical presence
  • Applying the necessary Updates and Patches to operating systems and applications
  • Checking installed applications
  • Monitoring available system resources (Memory, CPU, Storage)
  • Protecting their data through Cloud Backup and Disaster Recovery solutions
  • Inventorying customer equipment and finding systems that need to be retired
  • A ticketing system so that our engineers can manage incoming customer requests and track them
  • Reporting to end customers

For the above processes, we relied on 8 different applications, and our engineers used many different tools and spent a lot of time coordinating and updating the tools they used. Also, reporting for customers was done manually.

  1. EDR / Antivirus program
  2. Action Logs extraction and retention system
  3. Program for Remote Support of customers so that we can perform system Updates
  4. An application that allowed us to install or deploy applications remotely and automatically on multiple endpoints
  5. An application that controls system resources
  6. Separate Backup Program
  7. Web application for managing customer requests
  8. Manually create Reports for customers to stay informed

Along the way, some available RMM (Remote Management & Monitoring) tools were used to unify some of the above services for the engineers’ daily lives. However, several pieces remain that our engineers spent a lot of time updating in multiple systems.

We searched and tested several tools until we found the Comodo Advanced End Point Protection product which did exactly what we wanted and automated all parts of our processes to provide maximum security with a single software agent which is installed on customer terminals and offers maximum protection against cyberattacks while at the same time automating all processes of remote management and maintenance of the customer’s IT infrastructure.

The TicTac team, recognizing the need for defense against the scourge called ransomware, brought the Xcitium / Comodo solution to Greece and Cyprus, after first conducting extensive tests on Comodo products in its laboratories.

It should be noted that TicTac Cyber ​​Security is the No. 1 company in Greece that manages Ransomware incidents daily, with great success. Therefore, we have seen in practice that the largest Antivirus and Endpoint solutions companies become inactive and ineffective in Ransomware infections.

Find out about all the products we market/support that have been tested for effectiveness under the most demanding conditions.

Xcitium / Comodo EDR Technology

Xcitium / Comodo’s Endpoint Protection tools are recognized worldwide for their advanced technologies against all threats, especially ransomware attacks, which have been the biggest threat to our data since 2016.

Xcitium / Comodo was selected after numerous tests conducted in our lab with Zero-Day malware. In June 2020, it stopped 100% of attacks without destroying user files.

Xcitium / Comodo’s unique  Default Deny logic refuses to execute anything it does not know about by default. This effectively protects against all automated malware, provided the necessary settings are made.

Comodo’s entry-level home protection is Comodo Internet Security (CIS ), while its professional solution is Comodo Advanced End-Point Protection (AEP ).

1. Xcitium / Comodo Internet Security (CIS)

Internet Security Pro

What are the advantages of  Comodo Internet Security (CIS )?

  • Auto  Containment:  The unique technology of auto containment, with which every new file that tries to run on our computer and is not recognized by the database of known applications, is sent for identification. Until a conclusion is drawn on whether it is an acceptable application or Malware, it is executed in a separate ”sandbox” type environment, without having the ability to infect our computer’s files. Even if it is Ransomware, it will be executed, and it will assume that it was executed successfully, but our files will be intact.
  • Valkyrie Verdict Decision Tool:  Every file that runs within auto containment is uploaded to the global threat cloud, where analysis is performed and a conclusion is drawn whether it is malicious within 45 seconds for 95% of files.
  • 24*7 Human  Analysis:  For the remaining 5% of files that do not yield an immediate ”verdict,” the behavior of the unknown application is analyzed by specialist analysts as soon as possible.
  • Virus Scope Behavioral analysis:  Techniques such as API Hooking and DLL Injection Prevention are used to identify signs of malicious applications, keeping the computer safe without affecting its performance at the same time.
  • Host Intrusion Prevention  (HIPS):  With HIPS technology, Comodo monitors the actions of software running on our computer, blocking anything that looks malicious preventing actions that can create significant problems in our system. Comodo’s technology will also stop malicious programs that do not need to run an executable file but run from our computer’s RAM.
  • Personal Packet Filtering Firewall:  With the unique feature of managing internal and external networks, Comodo hides our system’s doors from external identification of available ports (port scanning) and provides updates and Alerts in case of suspicious actions.
  • Comodo Antivirus: Provides comprehensive computer protection from a list of good and bad files. It has the vast experience of the world’s largest SSL authority and has over 88 million installations.

See some independent tests of Xcitium / Comodo on Zero Day Malware and Phishing.

2. Xcitium Zero Threat Advanced / Comodo AEP

Comodo’s professional solution, Advanced Endpoint Protection (AEP)includes all the features provided by  Comodo  Internet  Security (CIS ) but is also ideal in the following cases:

  • For infrastructures that outsource their security management to Managed Security Service Providers (MSSPs) (such as TicTac Cyber Security).
  • In large infrastructures, an administrator or IT Administrator within the organization wants a tool for managing the organization’s security overall.
  • This is for IT service providers who wish to manage their customers remotely efficiently from a single console and have control over the security of all their customers in one console.
Itarian Comodo Endpoint Manager 1024x469 1

Benefits of Zero Threat Advanced / Comodo Advanced Endpoint Protection (AEP)

For several years now, Comodo has recognized the complexity of IT companies’ automation solutions, which use many different tools to support their customers in protecting their systems.

Thus, they created Xcitium Zero Threat Advanced Comodo Advanced Endpoint Protection (Comodo AEP), which provides Comodo’s award-winning EDR, famous for its Patent-Pending Ransomware protection implementation. They also acquired the well-known Itarian platform, a tool in the RMM (Remote Management & Monitoring) category.

Now the systems that are implemented on a single platform and a final Software Agent for the end customer are the following: Comodo AEP:

  • Antivirus / Antimalware / EDR, which can be connected to an external or internal Security Operation Center for monitoring by analysts
  • Deny all security policies with Patent Pending, very light Sandboxing
  • Remote Monitoring and Management (RMM) tool
  • Remote support tool
  • Operating System Updates Management – ​​Patch Management
  • Mass Installation, Uninstallation, and Update of Applications – Application Management
  • Mobile Device Management
  • User technical request management system – Ticketing System
  • Ability to write automation scripts or use Customized PowerShell scripts from an extensive database created by the users themselves
  • Tool for recording endpoints and evaluating the organization’s security policies – IT Assessment Tool / IT Asset Management
  • Full customization possible
  • Ability to automate reporting to clients or Internal Managers

All of the above can be installed quickly through a Software Agent, and their configuration can then be managed from an integrated Cloud console.

With this tool, Comodo multiplies the possibilities, significantly reduces the time the IT department spends, and allows the technical department of organizations or MSP & MSSP companies to do more things simultaneously, as it automates daily processes.

In addition, it significantly reduces the cost of extra tools and licenses that would be required to perform all of the above procedures with different tools.

Remote Management with Xcitium Zero Threat Advanced/ Comodo Advanced Endpoint Protection

Comodo innovates in the central management console, as any Managed Service Provider can create accounts under their account and provide their end customers with comprehensive management.

Comodo’s Itarian / Dragon is a modern and constantly evolving RMM (Remote Monitoring & Management) Service Desktop and Patching platform through which the Security Services Provider (MSSP) can comprehensively monitor all of its customers or the Endpoints of the infrastructure it manages.

It can manage machine updates and intervene immediately when there is a suspicion of danger, intrusion, or any technical problem that can be solved remotely.

Some of the features of Itarian are the following:

  • Creating unified security policies
  • Patch Management (Updates & Software patches)
  • Create Groups
  • Remote Support Software that allows direct connection with a secure connection to Endpoints
  • Reporting

Itarian/Dragon comes free with every purchase of Comodo Advanced Endpoint Protection.

This means that when someone protects, for example, 10 computers or Servers, they can have Itarian for free.

For Endpoints that are not protected with Comodo AEP, there is an extra charge for Itarian itself.

Benefits for Managed Service Providers and IT Companies

Within the Itarian / Dragon platform, provided with Advanced Endpoint Protection, highly integrated services are provided for IT companies and Managed Service Providers through unified open-source software solutions, which provide:

Introducing Xcitium Zero Threat Advanced

Below, you will find information about Comodo AEP:

System Requirements and Technical Specifications

System Requirements

Please ensure your PC complies with the minimum system requirements:

Windows 11 (all versions)
Windows 10 (32-bit and 64-bit versions)
Windows 8 / 8.1 (32-bit and 64-bit versions)
Windows IoT
512 MB available RAM
1 GB hard disk space for both 32-bit and 64-bit versions
CPU with SSE2 support
Internet Explorer version 11 or above
Note about Windows XP / Vista
CIS v.12.0.0.6882 and above does not support Windows XP or Vista, period.

The auto-containment and virtual desktop features simply do not work on XP / Vista, so you cannot take advantage of one of our core protection features.

Comodo strongly recommends anybody still using XP or Vista to upgrade immediately. Microsoft ceased support for XP/Vista years ago and the number of serious vulnerabilities in these operating systems is almost innumerable. By using them you are exposing yourself to substantial risks which signature-based antivirus cannot protect you against.

Windows 7
Microsoft ended general support for Windows 7 in January 2020. Devices running Windows 7 will only receive security updates if the user has purchased a 3 year extended security updates (ESU) package from Microsoft.

Because of this, Windows 7 is no longer an officially supported operating system. Unpatched vulnerabilities introduced by the underlying OS can compromise the protection provided by CIS. For example, a weakness in a Microsoft API that CIS relies on can undermine the protection of CIS.

Key points:
All CIS critical security features will continue to work on Windows 7, including auto-containment, antivirus, and firewall.

We will also continue to fix critical and blocker issues for CIS on Windows 7.

However, future CIS releases may contain features that are not included/do not work on Windows 7.

We understand that many customers still use Windows 7, and hope that this information helps you make an informed decision about transitioning those machines to Windows 10 / 8.1 / 8.
Aegean White
Alpha Bank White
Dei White
Eurobank White
Ote White
Revoil White
Alpha White
Dell White
Media Markt White
Plaisio White
Shell White
Siemens White
Toshiba White
Wind

Make yours in 3 easy steps

We provide support in Greek for all our products.

1

Contact us

Call us to speak with a qualified advisor.

2

Request information about our product.

Our partner will answer all your questions.

3

Get it easily and quickly!

We are by your side before and after your purchase!

Banner Banner_DAM Banner_DAM