Close

Manage all enterprise mobile devices
and endpoints from a
single console, in minutes

Why Comodo?

  • Panoramic security - Manage all mobile
    devices and Windows endpoints from one console

  • Sensible, low cost licensing -
    Pay only for users, not devices

  • Flexible - In-house or
    cloud-based deployment options

  • Ensure device and data security
    on your fleet of Android and iOS devices

  • Award winning antivirus and threat containment
    for Windows workstations and servers

Enroll today and be up and running in 5 minutes

Get It For Free FEATURES

Device and Endpoint Security
- in one

Single, unified platform allows you to protect and manage mobile devices and Windows endpoints from a single console. Create default security profiles for devices and endpoints, schedule regular malware scans, create application blacklists and whitelists, define password complexity, restrict device access to corporate mail, force encrypted communications, track user activity and more.

Best of
Breed Security

Device Manager also gives you built-in access to Comodo's elite range of mobile and endpoint security applications, including Mobile Antivirus, Device Anti-Theft and App lock software. Windows endpoints are comprehensively protected with the award winning Comodo Endpoint Security software, which includes antivirus, firewall, threat containerization, file reputation, URL filtering, and behavior analysis

Multiple Platform Support for
MDM, BYOD, MAM and MSM
(Mobile Security Management)

Reliable and scalable platform support with comprehensive visibility and control over iOS® and Android™ and Windows based systems. Highly competitive pricing and user-based licensing means each user can own several devices over time, so you get no surprise costs as your device count grows.

TAKE A QUICK LOOK AT SOME
GREAT FEATURES !

  • Device and Endpoint
    Enrollment
  • Profile
    Management
  • Asset
    Management
  • Application
    Management
  • Security
    Management
  • Audit &
    Reports

OTA Enrollment

Over-the-Air enrollment of mobile devices

Fast Enrollment

Quickly import mobile devices and endpoints individually or via LDAP and Active Directory

Secure Enrollment

Authenticate users with a one-time password and/or a user's Active Directory/LDAP credentials

Immediate Control

Enforcement of default profiles means devices and endpoints can be securely managed right after enrollment

Immediate Security

Ensure the safety of data on endpoints and devices by running an automatic scan straight after enrollment

Configure Policies

Easily create and deploy security policies for all mobile devices and Windows endpoints

Restrict

Implement user-based permissions across devices to control which features can be used

Group Management

Create user, device and endpoint groups then deploy profiles to targeted audiences in seconds. For instance, create a group of users based on department, location or operating system/device type.

Corporate access

Whitelist mobile devices which are allowed to access company portals and mail servers. Create location-aware policies to dynamically apply restrictions based whether an endpoint is inside or outside the company VPN

Persistent VPN

All traffic from managed Samsung KNOX devices can now be directed to your company VPN

Diagnostic Data

Capture diagnostic details about devices, including hardware and software configuration, installed applications and running processes.

Device Inventory

Watch all devices in real time to proactively manage your inventory and resources

Monitor Users and Devices

Monitor users and devices that access the company mail server.

Application Inventory

View all apps installed on devices with real-time inventory reports

Application Push

Push critical apps and security polices to devices and endpoints

Blacklist Applications

Blacklist and require the removal of prohibited apps

Block Applications per user

Block undesirable or suspicious applications on a group or individual basis

Instant Access to Comodo Mobile Apps

Leverage Comodo's range of mobile security and productivity apps, including mobile antivirus, battery saver, app lock, antitheft and more.

Application Store

Add your chosen range of mobile apps to your enterprise application store

Unified Security

Deploy and manage security for mobile devices and Windows endpoints from a single console

Mobile Antivirus

Comodo's constantly updated antivirus protects all employee phones and tablets against malware, unsafe apps and potentially risky settings

Enforce Mobile Policies

Force strict passcode and data encryption polices, place restrictions on rooted or jail broken devices and ensure only verified apps are installed

Remote Data Wipe

Prevent data leaks by remotely clearing all corporate and/or personal data should a mobile device be mislaid or an employee leave the company

Mobile Anti-Theft

Remotely locate, lock or wipe lost or stolen mobile devices. 'Sneak-Peak' even allows you to take a photograph of the device holder if they enter the wrong password a certain number of times

Data Isolation

Isolate data between managed and unmanaged applications

Mobile Certificates

Assign and manage user and device certificates from a trusted certificate authority

Total Endpoint Protection

Multi-layered defense for Windows endpoints includes antivirus, firewall, threat containerization, file reputation, URL filtering, and behavior analysis

Automatic Threat Containment

Prevents endpoint malware outbreaks by automatically containing unknown files in an isolated environment, separated from the underlying operating system and user data

Application Containerization

Administrators can elect to run frequently-targeted endpoint applications such as browsers and mail clients inside a secure virtual container

Resource Friendly

Meets key business deliverable of protecting endpoints against zero-day threats with little impact on system resources and without affecting user workflows

Flexible Deployment

Comodo's firewall, antivirus and containment technologies can deployed individually on endpoints to complement existing security solutions from 3rd party vendors

Reporting

Quickly generate and view extensive reports on discovered threats, device events, user activity, push statistics and more.

Inventory Compliance

Audit devices to ensure compliance with corporate policies and to ensure no forbidden apps are installed.

Activity Auditing

Audit device, user and admin activities, including inactive devices

MS Exchange Service Control Panel

Detailed logging and connection information improves visibility and troubleshooting with MS Exchange integrations.

Gallery

Sales

Contact me for:

Contact Information







Company Information