Where does Comodo fail against Ransomware to warrant this “Ransomware Shield”?
A lot of people fall for hype of other providers who have to create a different technique to “detect” malware and they package these as if they are a different product or feature.
With Comodo its simple, an Unknown is the enemy and will be contained. You can call it Ransomware, worm, rootkit, virus or whatever you want…the fact doesn’t change…its an “Unknown executable”.
Time to see beyond marketing fluff the Antivirus industry has been feeding you!
Comodo rescue disk allows you to scan your PC outside of Windows and in a Linux environment.
Windows system restore can be added as protected but simply having your windows CD or backup disk can replace these files
Any unknown files are automatically contained so wouldn’t be allowed to access other programs and firewall prevents internet access for Unknown files. Cloud behaviour analysis would detect most of this suspicious so your already covered for all of these because of autocontainment. Most viruses try and appear and behave like safe files.
If you have evidence or video example of vulnerability, please share.
Sure, but sometimes CD’s and DVD’s are not always available and sometimes when someone works at sea, finding that something becomes challenging.
Sure, but a solution without requiring a cd/dvd would be ideal. Look at Bitdefender or Avast. Both have boot time scan.
Protecting sys files wouldn’t interfere with Windows Update? And what if the system is already damaged before installing CIS?
Sure, but unless activating D+ HIPS, I wouldn’t know what happens behind the scenes. And, if I want to run a particular program because I like what it does, I wouldn’t know if it wants to do something extra until it’s too late, until I grant it access outside of Sandbox. So, the history log of some kind [I think Geswall had a scrolling log of actions] is something that would make vetting unknown files faster than cloud analysis or Comodo team.
CCE has boot time scanning and can be installed either as a standalone or running clean endpoint task. You shouldn’t be installing CIS on an already infected or damaged system. And finally had everyone who request these features actually took the time to either read the help or used the product would know that CIS does have a process activity monitor in virusscope. All you have to do is run an application in containment then view the active process list task, then right-click on the contained process and click show activities.
What I meant by boot scanning is not restarting windows, loading windows and continuing scanning, but pre-Windows environment, usually Linux. CCE boot DVD comes as exact thing, it loads before windows. The one installed with CIS, loads Windows and continues scanning. I am not saying CCE is not super effective, just that this could be improved upon.
Which is not always successful. Hence cloud files restoration in pre-boot environment.
I would just like to also point out, Windows Firewall may be further required to be left turned on in cases that require Authentication via the Windows Firewall. The Xbox App for example requires this to work correctly with group chat.
Furthermore I have had no obvious signs of conflict leaving both turned on.