浏览人次:
2104
规格功能比较
| Features Breakdown | COMODO | 赛门铁克 | |
| EPP Capabilities | |||
| 基于签名的反恶意软件保护 | √ | √ | |
| 端点上的机器学习/算法 件分析 | √ | √ | |
| 于过程活动分析的机器学习 | √ | ✖ | |
| 进程隔离 | √ | √ | |
| 内存保护和漏洞利 预防 | √ | √ | |
| 防止未检测到的恶意软件 | √ | ✖ | |
| 应用程式白名单 | √ | -√ | |
| 本地终结点沙盒/终结点模拟 | √ | ✖ | |
| 脚本、PE 或无档恶意软件防护 | √ | √ | |
| 与本地网络/云沙箱集成 | √ | √ | |
| 即时 IoC 搜寻功能 | √ | √ | |
| 完全访问数据的保留期 | 无限制 | 1个月 | |
| 端点防火墙 | √ | -√ |
|
| 固件学习模式 | √ | ✖ | |
| 自动创建网络流量规则 | √ | ✖ | |
| 网址过滤 | √ | √ | |
| 主机的 IPS | √ | √ | |
| 完全设备控制(基于设备类的设备控制 | √ | √ | |
| 产品 ID、供应商 ID 和装置名称) | |||
| 代理自我保护/补救或警报,当存在 | √ | √ | |
| 尝试禁用、绕过或卸载它 | |||
| 勒索软件防护 | √ | √ | |
|
在「离线」或「断开连接」时保护/阻止勒索软件 from the internet? |
√ | ✖ | |
| VDI 支援 | √ | √ | |
|
管理和维护 已知的「受信任」应用程式 |
√ | √ | |
| Multi-tenant cloud based service | √ | √ | |
| EPP 管理主控台可作为本地虚拟或物理服务器/应用程式 | √ | √ | |
| 整合的 EPP 管理主控台,用于报告、管理和 | √ | √ | |
| 针对 Windows macOS 用户端和行动装置的警报 | |||
| 数据丢失防护 | √ | 需要额外的产品 | |
| 行动装置管理 | √ | 需要额外的产品 | |
| 移动威胁防御 | √ | 需要额外的产品 | |
| 漏洞和补丁管理 | √ | 需要额外的产品 | |
| 网络/云沙盒 | √ | ✖ | |
| 安全编排、分析和回应 (SOAR) | √ | √- | |
| 集成 | |||
| 网络发现工具 | √ | ✖ | |
| 远端访问 | √ | 需要额外的产品 | |
| 远端文本编写功能 | √ | 需要额外的产品 | |
| 默认拒绝安全性,默认允许可用性 | √ | √ | |
| (遏制) | √ | √ | |
| 使用自动遏制 100% 保护运行未知档 | √ | ✖ | |
| 为任何未知数创建虚拟环境 | √ | ✖ | |
| 在实际端点上虚拟化文件系统、注册表、COM | √ | ✖ | |
| 遥测(EDR 可观察量) | √ | √ | |
| √ | √ | ||
| 进程间内存访问 | √ | √ | |
| Windows/WinEvent Hook | √ | √ | |
| 设备驱动程式安装 | √ | √ | |
| 档访问/修改/删除 | √ | √ | |
| 注册表访问/修改/删除 | √ | √ | |
| 网络连接 | √ | √ | |
| 网址监控 | √ | √ | |
| 功能变量名称解析监控 | √ | √ | |
| 流程创建 | √ | √ | |
| 线程创建 | √ | √ | |
| 行程间通信(命名管道等) | √ | √ | |
| 遥测数据本身可以实时扩展 | √ | ✖ | |
| 端点上的事件连结和扩充 | √ | ✖ | |
| 检测/搜寻/报告 | √ | √ | |
| 自适应事件建模 | √ | ✖ | |
|
行为分析(例如活动内存分析,操作系统 活动、使用者行为、进程/应用程式行为等) |
√ | ✖ | |
|
使用机器等功能对文件进行静态分析 学习(不包括基于签名的恶意软件检测) |
√ | -√ | |
| 时间序列分析 | √ | ✖ | |
| 与自动化恶意软件分析解决方案整合 | √ | ✖ | |
| 用于搜索的威胁搜寻接口或 API(沙箱) | √ | ✖ | |
| YARA/REGEX/ElasticSearch/IOC | - without Yara | IOC and Regex only | |
| Support for matching against private IOC | √ | √ | |
| 威胁情报集成(提示、上传、Web 服务 | √ | √ | |
| cOnnector等)来丰富和上下文化警报 | |||
| 链接遥测数据(可观察数据)以重新创建有助于调查的事件 | √ | √ | |
| 进程/攻击可视化 | √ | √ | |
| 事件回应平台 (IRP) 还是业务流程集成? | √ | √ | |
| Vulnerability reporting (ex. reporting on unpatched CVEs) | √ | √ | |
|
Alert prioritization based on confidence, able to define thresholds for alerting. |
√ | √ | |
| Alert prioritization factors system criticality | √ | √ | |
| Able to monitor risk exposure across environment organized by logical asset groups | √ | √ | |
| Reporting interface identifies frequent alerts that may be appropriate for automating response | √ | √ | |
| 回应 | √ | √ | |
| √ | √ | ||
| 远端文本编写功能 | √ | ✖ | |
| 隔离和删除档 | √ | √ | |
| Kill processes remotely | √ | √ | |
| File retrieval | √ | √ | |
| Network isolation | √ | √ | |
| Filesystem snapshotting | √ | √ | |
| Memory snapshotting | √ | √ | |
| 讬管端点 (MDR) | √ | √ | |
| √ | √ | ||
| Manage customer endpoints and policies | √ | ✖ | |
| Incident Investigation & Response | √ | ✖ | |
| Preemptive containment | √ | ✖ | |
| Application profiling (AI support) | √ | ✖ | |
| Customizable policy creation | √ | ✖ | |
| Central monitoring of all endpoints | √ | ✖ | |
| Live remote inspection | √ | ✖ | |
| Tuning of monitoring rules for reduction of false positives | √ | ✖ | |
| Forensic analysis | √ | ✖ | |
| Managed Network (XDR) | √ | √ | |
| √ | √ | ||
| Cloud-based SIEM and Big DataAnalytics | √ | ✖ | |
| Log data collection/correlation | √ | ✖ | |
| Threat intelligence integration | √ | ✖ | |
| Network profiling (AI support) | √ | ✖ | |
| Available as virtual or physical | √ | ✖ | |
| Integrated file analysis (cloud sandbox) | √ | ✖ | |
| Full packet capture | √ | ✖ | |
| Protocol analyzers for 40+ different protocols such as TCP, UDP, DNS, | √ | √ | |
| DHCP, HTTP, HTTPS, NTLM, etc. with full decoding capability | √ | ✖ | |
| 讬管云 | √ | ✖ | |
| Includes ready-to-use cloud application connectors for: | √ | √ | |
| √ | √ | ||
| Azure | √ | √ | |
| Google Cloud Platform | √ | √ | |
| Office 365 | √ | √ | |
| AWS | √ | √ | |
| Threat detection for cloud applications | √ | ✖ | |
| Log collection from cloud environments | √ | ✖ | |
| Generating actionable incident response from cloud application | √ | ✖ | |
| 威胁情报和判定 | √ | √ | |
| √ | √ | ||
| 整体安全方法 网络、端点、云的组合 | √ | ✖ | |
| 内部安全传感器纪录 (IOC) | √ | -√ | |
| 专家人体分析 | √ | ✖ | |
| ML & Behavioral Analysis and Verdict | √ | -√ | |
| 开源威胁情报源 | √ | ✖ | |
| 与行业信息共享 | √ | -√ | |
| 清洁网络(钓 网站、键盘记录程序、垃圾邮件) | √ | - | |
| 深层网络(C&C 服务器、TOR 浏览器、数据库平台档案—— | √ | -√ | |
| pastebins) | |||
| 网络对 特征 | √ | ✖ | |
| 安全运营中 (SOC) | √ | ✖ | |
| 全球实时 持 (24 / 7 /365) | √ | √ | |
| 专 的网络安全专家 | √ | ✖ | |
| 违规(案例)管理 | √ | ✖ | |
| 安全监控 | √ | ✖ | |
| 事件分析 | √ | ✖ | |
| 事件响应(处理) | √ | ✖ | |
| 广泛的威胁搜寻(基于场景) | √ | ✖ | |