Compare CryptoComply vs Comodo Cloud Antivirus vs Comodo Endpoint

You May Also Like

Featured products that are similar to the ones you selected below.

More Information More Information More Information

Crozscore

56%
what is this?
interest falling

Crozscore

93%
what is this?

Crozscore

93%
what is this?
CryptoComply screenshot Comodo Cloud Antivirus screenshot view 1 more Comodo Endpoint screenshot

About CryptoComply

CryptoComply is a family of standards-based “Drop-in Compliance” cryptographic engines designed for use in servers, workstations, Cloud, appliances, and mobile devices. SafeLogic’s containers deliver core cryptographic functions to these platforms and feature robust algorithm support, including Suite B algorithms. CryptoComply modules offload secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation. As a FIPS 140-2 validated module, CryptoComply can be deployed quickly to meet various needs and requirements.

About Comodo Cloud Antivirus

Comodo Cloud Antivirus is used for threat identification and has a containment engine providing your with total protection while allowing you to run any application.

About Comodo Endpoint

Comodo Advanced Endpoint Security software brings 7 layers of defense - antivirus, firewall, web URL filtering, host intrusion prevention, auto-sandbox (containment), file reputation and viruscope (behavioral analysis) - together under a single offering for customers of all sizes, to protect them from both known and unknown threats.

Features

  • 2-Factor Authentication
  • Anti-Virus
  • API
  • Batch Permissions & Access
  • Dashboard
  • Data Export
  • Data Import
  • External Integrations
  • File Sharing
  • File Transfer
  • Firewall
  • Multi-User
  • Notifications
  • Password & Access Management

Features

  • 2-Factor Authentication
  • Anti-Virus
  • API
  • Batch Permissions & Access
  • Dashboard
  • Data Export
  • Data Import
  • External Integrations
  • File Sharing
  • File Transfer
  • Firewall
  • Multi-User
  • Notifications
  • Password & Access Management

Features

  • 2-Factor Authentication
  • Anti-Virus
  • API
  • Batch Permissions & Access
  • Dashboard
  • Data Export
  • Data Import
  • External Integrations
  • File Sharing
  • File Transfer
  • Firewall
  • Multi-User
  • Notifications
  • Password & Access Management

Summary

  • FIPS 140-2 validated cryptographic libraries

Summary

    No key features associated with this application.

Summary

    No key features associated with this application.

FAQs

    No FAQs associated with this application.

FAQs

    No FAQs associated with this application.

FAQs

    No FAQs associated with this application.

Vendor Information

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:

Vendor Information

Founded:
-
Based in:
Clifton
Employees:
1001-5000
Likes:
Followers:

Vendor Information

Founded:
-
Based in:
Clifton
Employees:
1001-5000
Likes:
Followers:

Other

Who uses CryptoComply
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Windows
  • Macintosh
Mobile Platforms:
  • iOS
  • Android
Languages:
English
Regional Restrictions:
No restrictions.

Other

Who uses Comodo Cloud Antivirus
  • Personal
  • Freelance
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Web App
  • Windows
  • Macintosh
Mobile Platforms:
  • iOS
  • Android
  • WinPhone
  • Blackberry
Languages:
English
Regional Restrictions:
We focus on US audiance

Other

Who uses Comodo Endpoint
  • Personal
  • Startups
  • Agencies
  • Enterprises
Desktop Platforms:
  • Windows
Languages:
English
Regional Restrictions:
No restrictions.
Back to top