Comodo Internet Security

Antivirus and firewall suites are designed to protect all aspects of a PC from viruses, malware, and hackers. Too often, PC users rely on a simple antivirus program, hoping it will be enough to keep them safe.

Manufacturer

Principais features

Antivírus
Firewall
Proteção em Tempo Real
Navegação Segura
Controle de Aplicativos

Descripción completa

Request a quote

Antivirus and firewall suites are designed to protect all aspects of a PC from viruses, malware, and hackers. Too often, PC users rely on a simple antivirus program, hoping it will be enough to keep them safe.

But conventional antivirus programs can only detect them. They can't keep malware and viruses out of your system, prevent hackers from invading, protect wireless connections, or maintain your PC.

Comodo Internet Security (CIS) Pro does all this and much more. Have you considered a security suite that could install and configure a new printer? Or perform performance-boosting scans to make your PC run faster? CIS Pro is more than a security suite: it's protection and support at every level.

CIS Pro includes:

Firewall: Keep the door closed to viruses, malware, and suspicious files.

AntiVirus: Locates and destroys any hidden malware on a PC.

TrustConnect: Prevent hackers from exploiting wireless vulnerabilities, wherever you're surfing the Internet.

Request a quote

By clicking "Submit," you agree to allow Software.com.br to contact you using the information provided to send quotes and communications related to your order. For more details on how we protect and use your data, please see our Privacy Policy. Política de privacidad y Términos de uso

Productos relacionados

StegoHunt is an industry-leading software tool, comprising the StegoAnalyst and StegoBreak tools, which can be used to discover the presence of hidden data activity in files and applications.

  • Quickly identify data obfuscation activity in an investigation by scanning files, captured memory images, and, for active systems, active processes;
  • Find evidence of steganography programs using YARA WetStone rules and hash sets provided in the monthly dataset releases;
  • Identify suspicious carrier files by detecting program data, signatures, and structural and static anomalies;
  • Use multiple operational discovery modes for transport file discovery, including directories, drives, files, and drive images;
  • Relate and capture evidence for presentations to management or the court.


SSH Tunnel 

Serv-U MFT software is a powerful tool that allows you to support file transfer and secure file sharing from your own data center.

Increase security and control of transfers in and out of your organization

Main features

  • Reliable FTP server software for secure file transfer
  • Ad hoc file sharing for easy file sending and requesting
  • Transfer files anytime, anywhere from the web and mobile devices
  • Upload and download large files quickly and easily
  • Centralized file transfer and automation
  • maintain regulatory compliance


Kiwi Syslog software receives, logs, displays, forwards, and alerts syslog, SNMP trap, and Windows event log messages from devices such as routers, switches, Linux and Unix hosts, and Windows servers.

Centralize and simplify log message management across network devices and servers

Main features

  • Centrally manage Syslog messages, SNMP traps, and Windows event logs;
  • Receive real-time alerts based on critical events;
  • Automatically respond to Syslog messages;
  • Store and archive records to aid regulatory compliance;
  • View Syslog data anywhere with secure web access.


Gargoyle Investigator is a suite of solutions designed for advanced malware discovery for forensic investigators. It is designed for forensic laboratories, law enforcement agencies, field investigators, and advanced private investigators.

By clicking "Submit," you agree to allow Software.com.br to contact you using the information provided to send quotes and communications related to your order. For more details on how we protect and use your data, please see our Privacy Policy. Política de privacidad y Términos de uso

en_US