Hello, Comodo fans, We are delighted to share the final BETA version of Comodo Internet Security 2024. Please feel free to download and start testing the new version (12.3.2.8124) from here. You may also upgrade the existing version to the new Beta version via the “Update” option. We are aware...
Final Beta end march, productio version 2025. Considering most next years versios are released in november of current year, that implies that Comodo is taking at least 7 months to iron out all bugs and issues for the 'bare bone' security only version of CIS. That is a dubble thumbs up (one for the 'security only/no bloat' version and one for the substantial 'test/bug fixes' period)
I'm running the final Beta which has been out for just over a month. It's still labelled 2024 and it runs fine on my machine. Yet to experiment with TDT but probably will enable it this week.
Melih is around a lot more recently which is great. I'm hoping for some UI scaling or advanced view but I can always swap over to old Lycia theme. Who knows when next stable will arrive but good that progress is being made.
I'm running the final Beta which has been out for just over a month. It's still labelled 2024 and it runs fine on my machine. Yet to experiment with TDT but probably will enable it this week.
Melih is around a lot more recently which is great. I'm hoping for some UI scaling or advanced view but I can always swap over to old Lycia theme. Who knows when next stable will arrive but good that progress is being made.
Not 100% sure if it's included with just firewall but I think I remember seeing it when I just had the firewall installed. I'll have to have a look when I get time.
what about the antivirus engine & signatures, this area Comodo was one of the weakest in the market ever, so what kind of improvements are they making on this very very important area of security protection along with others that should be the biggest thing to check.
what about the antivirus engine & signatures, this area Comodo was one of the weakest in the market ever, so what kind of improvements are they making on this very very important area of security protection along with others that should be the biggest thing to check.
CIS ships with a light version of the database by default as it mainly uses cloud signatures for naming malware but you can download the full database in the settings.
CIS has very current signatures which are submitted to the cloud but like many AVs it's close signature base is more current than the local one.
Having said this, CIS has been less about signature detection since Defense+ later name Containment. I mean in a real world when there isn't a signature for a file for however long should your machine remain unprotected? Of course not. That's where Containment and Viruscope and CIS's identifiers come into play but Containment first and foremost will sandbox anything unknown or untrusted by Comodo.
It simply doesn't work the same way as straight up signature detection and a few other vendores use similar technologies e.g. Avast Premium Security uses a similar feature though I believe it's manual rather than automatic but it's been some years since I tested it.
This threatmap shows and interesting example Xcitium Cloud Verdict but you don't even need to use full CIS. Comodo Firewall comes with the same technology as @cruelsister has demonstrated several times.
The TDT Technology is an interesting one and they've been working with Intel to implement this technology to further improve detection. Looking forward to the next stable release.
CIS ships with a light version of the database by default as it mainly uses cloud signatures for naming malware but you can download the full database in the settings.
CIS has very current signatures which are submitted to the cloud but like many AVs it's close signature base is more current than the local one.
Having said this, CIS has been less about signature detection since Defense+ later name Containment. I mean in a real world when there isn't a signature for a file for however long should your machine remain unprotected? Of course not. That's where Containment and Viruscope and CIS's identifiers come into play but Containment first and foremost will sandbox anything unknown or untrusted by Comodo.
It simply doesn't work the same way as straight up signature detection and a few other vendores use similar technologies e.g. Avast Premium Security uses a similar feature though I believe it's manual rather than automatic but it's been some years since I tested it.
This threatmap shows and interesting example Xcitium Cloud Verdict but you don't even need to use full CIS. Comodo Firewall comes with the same technology as @cruelsister has demonstrated several times.
The TDT Technology is an interesting one and they've been working with Intel to implement this technology to further improve detection. Looking forward to the next stable release.
what about the antivirus engine & signatures, this area Comodo was one of the weakest in the market ever, so what kind of improvements are they making on this very very important area of security protection along with others that should be the biggest thing to check.
Use Kaspersky and live your best life; Comodo isn't for you. Comodo is mainly a whitelisting product and won't be getting any cool new features or supposed signature improvements anytime soon.
Use Kaspersky and live your best life; Comodo isn't for you. Comodo is mainly a whitelisting product and won't be getting any cool new features or supposed signature improvements anytime soon
The TDT Technology is an interesting one and they've been working with Intel to implement this technology to further improve detection. Looking forward to the next stable release.
For the people who have devices with compatible CPUs, Intel TDT provides far greater visibility over fileless malware, ransomware and other threats. It also reduces kernel-mode attacks. It is a great and much needed technology indeed.
On SELabs test, Intel TDT with no EDR (just by itself) blocked 90% ransomware samples.
For the people who have devices with compatible CPUs, Intel TDT provides far greater visibility over fileless malware, ransomware and other threats. It also reduces kernel-mode attacks. It is a great and much needed technology indeed.
On SELabs test, Intel TDT with no EDR (just by itself) blocked 90% ransomware samples.
very well said, Intel TDT itself will be efficient and powerful but to work it in the best possible way the security software vendor in which it is being implemented should have a powerful and well defined antivirus engine which is not the case with Comodo as checked on various av reviews online and from remarks and comments of various users of Comodo on there own Comodo forum that there own antivirus engine is too weak and needs a huge amount of development and improvement yet, but when someone tries to give this feedbacks and suggestions to Comodo forum then Comodo blocks and ban those users which sounds completely ridiculous and totally unfair and gives a clear indication that Comodo is not interested in improving there own antivirus engine and signatures.
CIS ships with a light version of the database by default as it mainly uses cloud signatures for naming malware but you can download the full database in the settings.
CIS has very current signatures which are submitted to the cloud but like many AVs it's close signature base is more current than the local one.
Having said this, CIS has been less about signature detection since Defense+ later name Containment. I mean in a real world when there isn't a signature for a file for however long should your machine remain unprotected? Of course not. That's where Containment and Viruscope and CIS's identifiers come into play but Containment first and foremost will sandbox anything unknown or untrusted by Comodo.
It simply doesn't work the same way as straight up signature detection and a few other vendores use similar technologies e.g. Avast Premium Security uses a similar feature though I believe it's manual rather than automatic but it's been some years since I tested it.
This threatmap shows and interesting example Xcitium Cloud Verdict but you don't even need to use full CIS. Comodo Firewall comes with the same technology as @cruelsister has demonstrated several times.
The TDT Technology is an interesting one and they've been working with Intel to implement this technology to further improve detection. Looking forward to the next stable release.
even with full signatures option selected Comodo is unable to detect & block & prevent & remove lots of malwares and viruses which clearly proves that they need to make huge overall improvements in there own antivirus engine itself and it's signatures itself.
exactly Melih doesn't listens to users feedbacks when told about improving the product and its antivirus engine, browsing protection, updating firewall and adding proper network intrusion detection/prevention module to it, rather Melih replies with his own self defined things and blocks and ban users from comodo forum when anything is suggested there for the product improvements.
The features that you guys want Comodo to implement require substantial investments. Comodo will need to appoint huge teams for prolonged period of time, starting from research phase (how it can be done, what native features should be used, patent search, etc) then development, and finally, testing.
It is impossible to invest such a huge amount on software that is used mainly by freeloders.
Even if they invest, it will not have the necessary return, unless they spend another pile of sweet money on marketing.
If you want Symantec/Norton level IPS that scans the traffic for signs of known intrusions quickly, with very little performance impact, this engine is unique and governed by more than 50 patents. Nobody else has done an alternative to it and Comodo can’t do it either.
I would give up all hopes on such implementations and wouldn’t even try to suggest them.
I had similar banning experience recently with Webroot as well. The two companies are very similar in the way they operate.
even with full signatures option selected Comodo is unable to detect & block & prevent & remove lots of malwares and viruses which clearly proves that they need to make huge overall improvements in there own antivirus engine itself and it's signatures itself.
We'll agree to disagree. If it's an uknown file it'll be contained and analyised so Containment catches everything unknown e.g. malware and isolates it from the system or you can just set it to block unknowns while the analysis happens in the cloud but whatever. Use what works for you. I paid into CyberLock to cover any gaps in whatever security setup I'm using but to each their own when it comes to security. CIS is just isn't like other products so find one you like and stick with it.
My favourite setup if not using CIS is Microsoft Defender, DefenderUI, CyberLock and Windows Firewall Control or I go down the hardening route with @Andy Ful 's amazing hardening tools which I like a lot. We use what suits us best at the time.
We'll agree to disagree. If it's an uknown file it'll be contained and analyised so Containment catches everything unknown e.g. malware and isolates it from the system or you can just set it to block unknowns while the analysis happens in the cloud but whatever. Use what works for you. CIS is just isn't like other products so find one you like and stick with it.
Comodo is not suitable for users who are obsessed with signatures. The old forum had many posts about the antivirus and its essential features. The same discussions are now happening on the new forum. Comodo has repeatedly responded, explaining what, how, why, and more about the product. However, some users continue to flood the forum with nonsense and complain about Comodo deleting their posts and banning them. Comodo provides a straightforward answer every time. If it is your product, use it; otherwise, move on.