Comodo XDR has covered all stages of active breach, has endpoint agents to protect and analyze endpoints, network probe for network traffic analysis, cloud connectors to collect various events from multi-clouds, analytics and investigation platform to aggregate all the data and a security service layer to support 24/7 SOC and Threat Hunting services.
Comodo XDR endpoint agents discover all unknowns: files, scripts, assets etc. using its Containment (a combination of Kernel API virtualization, whitelisting, machine learning, behavior analysis, and advanced static and dynamic threat cloud analysis (Comodo Valkyrie)) to accurately and quickly deliver trusted verdict for unknown files and processes and turns all unknowns into known good or bad
http://techtalk.comodo.com/2020/08/17/comodos-patented-kernel-api-virtualization-under-the-hood/,this reduces the attack surface and necessary investigation cycles drastically. Its endpoint sensors use “Adaptive Event Modeling”: where not only correlations but the sensor data itself can be extended in real time, enabling system to collect more information from the endpoints, do event chaining and enrichment on the endpoints and send all to the cloud if needed. The endpoints also provides semantics to the events detected by using first order logic, such as an adaptive discrete event modeling adding “Time-Series as a Dimension” and build a baseline model to detect anomalies (like insider threats where data must be collected and correlated from multiple inputs/assets over time).
Comodo XDR cloud collectors collects and analyze not on just computing resources of cloud providers but also gather all events from IaaS, PaaS, Serverless and SaaS services like 0365, Azure AD, Google Cloud or AWS Cloudtrail and detect and alert any threat targeting the cloud workloads. This allows analyst to discover, monitor, and secure cloud accounts, compute and storage instances, and the control plane. In today’s network topology where we are more than just one laptop, connected to different assets and cloud assets, being able to provide visibility to every asset type that the company is connected to as well as correlate that intelligence is what modern day SOC Analysts and Threat Hunters are searching for.
Comodo XDR has enterprise-class network traffic analysis that detect suspicious behaviors, prioritize investigations into the highest risk threats, and automate response, it capture all network traffic, generate extensive metadata for all important network protocols (more than 50 protocol parser including L7) , send this data to the cloud to enrich and correlate it with endpoint sensor data. Only sensing through the endpoints (what CrowdStrike does limiting its sensing just the endpoints vs full network) will not reveal hybrid attack surface. XDR brings the perspective security analysts need to understand your hybrid attack surface from the inside out. It enables finding rouge devices and reports back any attack vector based on those undetectable devices as well.
Comodo XDR has its own cloud native SIEM (built ground up with Cybersecurity in mind) and analytics platforms that has artificial intelligence capabilities with semi-supervised artificial intelligence engine that learns from the activities,events and operations. It is cloud native technology that enables big data analytics and data lake over security events and incidents. It also enables collecting, correlating, and analyzing unstructured events, generate new events from base events and uses chain of event correlations to detect, enrich raw events. So analysts can query and correlate different dimensions other than predefined structured queries. This will empower analysts to detect cyber threats at an earlier stage or execution of the attacks and remediate.
Comodo XDR comes with a full blown SOC services where threat hunting teams are used over the alerts the system generated to detect any malicious activity and provide incident response with the customer. It incorporates artificial intelligence capabilities with semi-supervised artificial intelligence engine that learns from the activities and operations of Comodo’s cybersecurity experts, accelerating the detection and response to new threats.