Comodo Internet Security Earns ICSA Labs Certification

Comodo announced that its Comodo Internet Security (CIS) software earned the prestigious ICSA labs certification, a leading independent security product testing facility.

Comodo Internet Security guarantees protection against viruses and malware by focusing on prevention not simply detection. Comodo's patent pending prevention-based technology creates an impenetrable shield that identifies safe, unsafe and questionable files. Comodo Internet Security offers real-time protection against Viruses, Trojans, Adware, Spyware and other Malware threats.

ICSA Labs, an independent division of Verizon Business, has been providing credible, independent, 3rd party product assurance for end users and enterprises for the last 20 years. ICSA Labs has provided vendor-neutral testing and certification for hundreds of security products and solutions for many of the world's top security product developers and service providers. Enterprises worldwide rely on ICSA Labs to set and apply objective testing and certification criteria for measuring product compliance and performance. ICSA Labs provides services in three areas: Consortium Operations, Security Product Testing, and Certification Programs, Custom Testing Services and Accredited Government Testing Services.

For a product to be certified, the products are tested against updated test sets as well as against evolving threats and vulnerabilities. ICSA labs certification for Antivirus attests to the fact that Comodo's Internet Security system meets stringent quality standards.

Comodo Internet Security protects against viruses and malware by focusing on prevention not simply detection. If Comodo Internet Security encounters an unknown application, it will run that application in a virtual operating environment (or 'sandbox'). While in the sandbox, the application has limited system access privileges and will write to a virtual file system and registry. This allows safe applications the freedom to run as required while denying malicious applications the ability to cause any damage to the users 'real' system. Simultaneously, the application is submitted to Comodo Antivirus labs who will run further tests to determine whether the application is safe or malicious. If the application is determined as safe it is taken out of the sandbox, added to the CIS whitelist and will execute normally on subsequent runs. If found to be malicious, the application will be added to the global blacklist of known threats (which will be distributed to all CIS users) and deleted or quarantined on the user's machine.

write your comments about the article :: 2010 Computing News :: home page