瀏覽人次:
2098
規格功能比較
| Features Breakdown | COMODO | 賽門鐵克 | |
| EPP Capabilities | |||
| 基於簽名的反惡意軟件保護 | √ | √ | |
| 端點上的機器學習/算法 件分析 | √ | √ | |
| 於過程活動分析的機器學習 | √ | ✖ | |
| 進程隔離 | √ | √ | |
| 內存保護和漏洞利 預防 | √ | √ | |
| 防止未檢測到的惡意軟體 | √ | ✖ | |
| 應用程式白名單 | √ | -√ | |
| 本地終結點沙盒/終結點模擬 | √ | ✖ | |
| 腳本、PE 或無檔惡意軟體防護 | √ | √ | |
| 與本地網路/雲沙箱集成 | √ | √ | |
| 即時 IoC 搜尋功能 | √ | √ | |
| 完全訪問數據的保留期 | 無限制 | 1個月 | |
| 端點防火牆 | √ | -√ |
|
| 固件學習模式 | √ | ✖ | |
| 自動創建網路流量規則 | √ | ✖ | |
| 網址過濾 | √ | √ | |
| 主機的 IPS | √ | √ | |
| 完全設備控制(基於設備類的設備控制 | √ | √ | |
| 產品 ID、供應商 ID 和裝置名稱) | |||
| 代理自我保護/補救或警報,當存在 | √ | √ | |
| 嘗試禁用、繞過或卸載它 | |||
| 勒索軟體防護 | √ | √ | |
|
在「離線」或「斷開連接」時保護/阻止勒索軟體 from the internet? |
√ | ✖ | |
| VDI 支援 | √ | √ | |
|
管理和維護 已知的「受信任」應用程式 |
√ | √ | |
| Multi-tenant cloud based service | √ | √ | |
| EPP 管理主控台可作為本地虛擬或物理伺服器/應用程式 | √ | √ | |
| 整合的 EPP 管理主控台,用於報告、管理和 | √ | √ | |
| 針對 Windows macOS 用戶端和行動裝置的警報 | |||
| 數據丟失防護 | √ | 需要額外的產品 | |
| 行動裝置管理 | √ | 需要額外的產品 | |
| 移動威脅防禦 | √ | 需要額外的產品 | |
| 漏洞和補丁管理 | √ | 需要額外的產品 | |
| 網路/雲沙盒 | √ | ✖ | |
| 安全編排、分析和回應 (SOAR) | √ | √- | |
| 集成 | |||
| 網路發現工具 | √ | ✖ | |
| 遠端訪問 | √ | 需要額外的產品 | |
| 遠端文本編寫功能 | √ | 需要額外的產品 | |
| 默認拒絕安全性,默認允許可用性 | √ | √ | |
| (遏制) | √ | √ | |
| 使用自動遏制 100% 保護運行未知檔 | √ | ✖ | |
| 為任何未知數創建虛擬環境 | √ | ✖ | |
| 在實際端點上虛擬化文件系統、註冊表、COM | √ | ✖ | |
| 遙測(EDR 可觀察量) | √ | √ | |
| √ | √ | ||
| 進程間記憶體訪問 | √ | √ | |
| Windows/WinEvent Hook | √ | √ | |
| 設備驅動程式安裝 | √ | √ | |
| 檔訪問/修改/刪除 | √ | √ | |
| 註冊表訪問/修改/刪除 | √ | √ | |
| 網路連接 | √ | √ | |
| 網址監控 | √ | √ | |
| 功能變數名稱解析監控 | √ | √ | |
| 流程創建 | √ | √ | |
| 線程創建 | √ | √ | |
| 行程間通信(命名管道等) | √ | √ | |
| 遙測數據本身可以實時擴展 | √ | ✖ | |
| 端點上的事件連結和擴充 | √ | ✖ | |
| 檢測/搜尋/報告 | √ | √ | |
| 自適應事件建模 | √ | ✖ | |
|
行為分析(例如活動記憶體分析,操作系統 活動、使用者行為、進程/應用程式行為等) |
√ | ✖ | |
|
使用機器等功能對文件進行靜態分析 學習(不包括基於簽名的惡意軟體檢測) |
√ | -√ | |
| 時間序列分析 | √ | ✖ | |
| 與自動化惡意軟體分析解決方案整合 | √ | ✖ | |
| 用於搜索的威脅搜尋介面或 API(沙箱) | √ | ✖ | |
| YARA/REGEX/ElasticSearch/IOC | - without Yara | IOC and Regex only | |
| Support for matching against private IOC | √ | √ | |
| 威脅情報集成(提示、上傳、Web 服務 | √ | √ | |
| cOnnector等)來豐富和上下文化警報 | |||
| 鏈接遙測數據(可觀察數據)以重新創建有助於調查的事件 | √ | √ | |
| 進程/攻擊可視化 | √ | √ | |
| 事件回應平臺 (IRP) 還是業務流程集成? | √ | √ | |
| Vulnerability reporting (ex. reporting on unpatched CVEs) | √ | √ | |
|
Alert prioritization based on confidence, able to define thresholds for alerting. |
√ | √ | |
| Alert prioritization factors system criticality | √ | √ | |
| Able to monitor risk exposure across environment organized by logical asset groups | √ | √ | |
| Reporting interface identifies frequent alerts that may be appropriate for automating response | √ | √ | |
| 回應 | √ | √ | |
| √ | √ | ||
| 遠端文本編寫功能 | √ | ✖ | |
| 隔離和刪除檔 | √ | √ | |
| Kill processes remotely | √ | √ | |
| File retrieval | √ | √ | |
| Network isolation | √ | √ | |
| Filesystem snapshotting | √ | √ | |
| Memory snapshotting | √ | √ | |
| 託管端點 (MDR) | √ | √ | |
| √ | √ | ||
| Manage customer endpoints and policies | √ | ✖ | |
| Incident Investigation & Response | √ | ✖ | |
| Preemptive containment | √ | ✖ | |
| Application profiling (AI support) | √ | ✖ | |
| Customizable policy creation | √ | ✖ | |
| Central monitoring of all endpoints | √ | ✖ | |
| Live remote inspection | √ | ✖ | |
| Tuning of monitoring rules for reduction of false positives | √ | ✖ | |
| Forensic analysis | √ | ✖ | |
| Managed Network (XDR) | √ | √ | |
| √ | √ | ||
| Cloud-based SIEM and Big DataAnalytics | √ | ✖ | |
| Log data collection/correlation | √ | ✖ | |
| Threat intelligence integration | √ | ✖ | |
| Network profiling (AI support) | √ | ✖ | |
| Available as virtual or physical | √ | ✖ | |
| Integrated file analysis (cloud sandbox) | √ | ✖ | |
| Full packet capture | √ | ✖ | |
| Protocol analyzers for 40+ different protocols such as TCP, UDP, DNS, | √ | √ | |
| DHCP, HTTP, HTTPS, NTLM, etc. with full decoding capability | √ | ✖ | |
| 託管雲 | √ | ✖ | |
| Includes ready-to-use cloud application connectors for: | √ | √ | |
| √ | √ | ||
| Azure | √ | √ | |
| Google Cloud Platform | √ | √ | |
| Office 365 | √ | √ | |
| AWS | √ | √ | |
| Threat detection for cloud applications | √ | ✖ | |
| Log collection from cloud environments | √ | ✖ | |
| Generating actionable incident response from cloud application | √ | ✖ | |
| 威脅情報和判定 | √ | √ | |
| √ | √ | ||
| 整體安全方法 網路、端點、雲的組合 | √ | ✖ | |
| 內部安全感測器紀錄 (IOC) | √ | -√ | |
| 專家人體分析 | √ | ✖ | |
| ML & Behavioral Analysis and Verdict | √ | -√ | |
| 開源威脅情報源 | √ | ✖ | |
| 與行業信息共用 | √ | -√ | |
| 清潔網絡(釣 網站、鍵盤記錄程序、垃圾郵件) | √ | - | |
| 深層網絡(C&C 服務器、TOR 瀏覽器、數據庫平台檔案—— | √ | -√ | |
| pastebins) | |||
| 網絡對 特徵 | √ | ✖ | |
| 安全運營中 (SOC) | √ | ✖ | |
| 全球實時 持 (24 / 7 /365) | √ | √ | |
| 專 的網絡安全專家 | √ | ✖ | |
| 違規(案例)管理 | √ | ✖ | |
| 安全監控 | √ | ✖ | |
| 事件分析 | √ | ✖ | |
| 事件響應(處理) | √ | ✖ | |
| 廣泛的威脅搜尋(基於場景) | √ | ✖ | |