Comodo vs Crowdstrike

When it comes to Melih’s ideas on preventing and killing malware. I think Melih’s nickname should be “Merchant Of Death” :-La

The detection is preliminary, the observation of a malicious individual inside a system is quite different, Comodo has an undeniable advantage on this precise point.
On the other hand, the advanced parameters of CIS for insiders allow to establish a defense menu worthy of a 3-star restaurant.

When trying to educate others, Comodo uses such a different philosophy that it starts out as ignorance on peoples part, then cognitive dissonance when trying to explain it to them. If any of the competitors begin to understand it, then fear, then avoidance. They don’t want to empower Comodo by continuing an engagement that they may lose (Comodo is an odd duck to them) and end up upsetting the balance of power in the marketplace.

You can try hiring a brilliant marketing guy/girl and maybe Gorilla Marketing strategies.

Brilliant, prevention from zero day and unknow files excution. my respect to this revolution. :slight_smile: ;D :P0l

Well you might use some famous quotes from Sun Tzu’s (alleged) book The Art Of War…

All war is deception - make malware believe that it’s running as expected on a real machine

The greatest victory is that which requires no battle - don’t try to detect malware (the battle) simply make it impotent

Do not engage an enemy more powerful than you. And if it is unavoidable and you do have to engage, then make sure you engage it on your terms, not on your enemy’s terms - don’t try to beat malware by detecting it or by interfering with it, allow it to run on your terms in your container.

Victorious warriors win first and then go to war, while defeated warriors go to war first and then seek to win - containment assures victory when you got to war with malware, attacking the malware itself and seeking to win leads to defeat.

It is more important to out-think your enemy, than to outfight him - by allowing malware to run but contained you have out-thought the malware author, through detection you must always outfight him.

He will win who, prepared himself, waits to take the enemy unprepared - by running all unknown processes in a container you have prepared a defense for which the malware is unprepared.

Don’t depend on the enemy not coming; depend rather on being ready for him - assume that every unknown process contains malware and run it in a container.

The height of strategy is to attack your opponent’s strategy - malware’s strategy is to infect your system, so give them a fake and contained system to infect.

Sun Tzu lived in the 5th century BC and yet his lessons are applicable to the war against malware even today.

This is amazing!!! Very clever way of explaining it. Thank you.

I will be using it extensively.

Here it is Ubuysa!
(including Credit at the bottom)!
Great work