ChannelLife Australia logo
Industry insider news for Australia's technology resellers
Story image

Comodo Security Solutions rebrands, launches new offering

By Zach Thompson
Fri 8 Jul 2022

Comodo Security Solutions has rebranded to Xcitium and launched its patented zero threat endpoint technology to fight increasing ransomware and other malware across industries.

Xcitium Zero Threat is the only market offering that eliminates potential damage by isolating and neutralising threats without disrupting a customer's workflow.

Noting the increase in cyber attacks and the vulnerabilities faced by enterprises and government agencies alike, Xcitium says its offerings are crucial to stopping the damage inflicted by these threats.

"The third guarantee in life, after death and taxes, is that ransomware and other malware will continue to infiltrate enterprise networks, undetected," Xcitium CEO Ken Levine says.

"These threats are now impacting businesses of all sizes across the globe, and security professionals are inundated trying to detect them.

"Xcitium differs from other endpoint solutions in that we isolate these threats completely, thereby eliminating their ability to execute and giving security professionals time to deploy any needed protection measures."

Zero Threat uses patented Kernel API Virtualisation to stop all unknown ransomware and other malware from gaining access to critical systems and resources while maintaining total productivity and efficiency for users.

Additionally, Zero Threat intends to minimise false positive alerts.

"Every day, the AV-TEST Institute registers more than 450,000 new malicious malware strains and potentially unwanted applications, for which enterprises must stay vigilant. This creates alert fatigue within many organisations," Levine says.

"Zero Threat gives customers' peace of mind in knowing that any ransomware and other malware lurking undetected in their environment will remain dormant, resulting in zero breaches."

The announcement comes after Xcitium (while operating under Comodo Security Solutions) had core components of its cybersecurity active breach protection technology included in Privacy Bureaux's Enterprise Protection Suite as part of a strategic extension to protect the mid-market.

The addition of Xcitium's privacy and cyber security solutions delivers game-changing protection for Privacy Bureaux's mid-market and SME clients, who receive simple, secure and affordable cyber security solutions.

Many businesses looking to choose endpoint cybersecurity protection face a daunting process with a myriad of products to choose from, all with the same or very similar functions. While they may use different terminologies, they are fundamentally based on the same basic concept of detecting malware or malicious activity post-breach.

Privacy Bureaux's partnership with Xcitium allows the organisation to stop all unknown files from writing to the disk, COM interface and registry by isolating these writes in a secure virtual (patented) environment.

The combined technology is able to analyse an unknown file in real-time to determine if it is safe or malicious, while the user continues to interact with the application as normal, with no impact on productivity or risk of infection.

All writes are contained in a unique secure virtual environment, so the machine is totally protected while the rest of the entire network is protected. No hackers. No malware. No ransomware.

Related stories
Top stories
Story image
Smartphone
Hands-on review: Samsung Galaxy Z Fold 4 smartphone
With its new range of foldable phones, Samsung has definitely brought a vibrant new energy to the smartphone market.
Story image
Cryptocurrency
Crypto crime: Illicit activity falls with rest of market
Cryptocurrency scams, which typically present themselves as passive crypto investing opportunities, are less enticing to potential victims.
Story image
SaaS
Cloudera launches all-in-one data lakehouse cloud service
CDP One makes it faster, easier and less risky for businesses to move to the cloud and migrate existing workloads to a modern data architecture.
Story image
Environment
Lenovo launches CO2 Offset Service for SMBs across A/NZ
Lenovo has announced the rollout of a new, first-of-its-kind CO2 Offset Service for SMBs across Australia and New Zealand. 
Story image
Consulting
SAS awards Zencos as the 2022 A/NZ Partner of the Year
SAS has recognised US-based financial crimes and data consulting firm Zencos with the 2022 Australia and New Zealand Partner of the Year award.
Story image
Customer
ValueFlow and FLI announce capital alliance for enhanced channel outcomes
ValueFlow and Founder Led Investments (FLI) have announced that they have entered into a capital alliance, which looks to expand ValueFlows business in Australia and Asia Pacific.
Story image
Techday
10 misconceptions about Techday and how it operates
Even with 17 years in the tech news space, Techday still finds that there are a range of things people misunderstand about how we operate.
Story image
Cloud
Microsoft announces Pax8 as indirect CSP distributor in A/NZ
Microsoft has recently announced Pax8 as a Cloud Solution Provider (CSP) indirect distributor in the A/NZ region.
Story image
Hybrid Cloud
The essential guide to digital transformation by SolarWinds
Digital transformation is a buzzword thrown around all the time by companies, but what does it actually mean and why is it important? SolarWinds breaks it down.
Story image
Data Protection
Zero Trust, but verify - finding the OT in ZerO Trust
The move to remote and cloud-based technologies has shifted the goalposts for cybersecurity. It now needs to cover multiple people, devices, platforms, and networks.
Story image
Machine learning
Sysdig releases CDR offering to combat cryptojacking
Sysdig has unveiled a cloud detection and response (CDR) offering powered by machine learning to combat cryptojacking.
Story image
Microsoft
8x more users attacked via old Microsoft Office vulnerability in Q2
"Criminals craft malicious documents and convince their victims to open them through social engineering techniques."
Story image
Network Management
Superloop helping Aussie K12 schools with latest offering
Superloop has launched CyberEdge, a new cybersecurity platform that will give K12 schools in Australia the tools to optimise, secure and manage their network.
Story image
Samsung
New range of Samsung Smart Watches announced with health focus
Samsung has announced new additions to its SmartWatch portfolio, with the Galaxy Watch5 and Galaxy Watch5 Pro to be released in late August.
Story image
Smartphone
Hands-on review: OPPO Find X5 smartphone
With the release of the new OPPO Find X5 in March, we got the opportunity to explore another one of their premium devices.
Story image
Cybersecurity
Study looks at gender dimensions of AU security sector
A new study will explore solutions to overcome pressing skills and diversity challenges in the Australian security sector.
Story image
Retail
AU retailers rate their states for doing business
Retailers are optimistic about economic conditions and potential for business success in their own states, despite the current economic climate. 
Story image
Gartner
Fortinet attributes Gartner-reported growth to ZTNA approach
Zero-trust is slowly becoming a dominant enterprise security strategy for businesses, and the Gartner report highlights that although prominent, it is often underutilised.
Story image
Unified Communications
Gold Coast private hospital improves comms with Alcatel-Lucent Enterprise solutions
With further demands placed on health workers as a result of the pandemic, they need efficient and adaptable solutions that help them effectively serve their communities.
Story image
Cloud
Whispir reports significant revenue growth as CaaS market expands
Australian cloud platform Whispir has announced its financial results, reporting significant growth as it continues to introduce new Communications-as-a Service (CaaS) offerings to the market.
Story image
Cloud Security
Lookout named Strong Performer in 2022 Gartner Peer Insights
Gartner has recognised Lookout as a Strong Performer in the 2022 Gartner Peer Insights Voice of the Customer for Security Service Edge (SSE).
Story image
Home security
Hands-on review: Eufy Wire-Free Dual Cam Video Doorbell 2K
We have had our house secured by Eufy products for over seven months now. We love the brand, and it has never let us down.
Story image
Smartphone
Samsung introduces new generation of foldable smartphones
Samsung has unveiled its new range of Galaxy Z smartphones, bringing new developments to the company’s foldable smartphone portfolio.
Story image
Cybersecurity
Australian IT security concerns higher than before pandemic
Australian organisations are more concerned about cyberattacks than they were prior to the COVID-19 pandemic, according to a new survey.
Story image
Tech job moves
Tech job moves - Fastly, INX, Kinly, SmartBear & Vectra AI
We round up all job appointments from July 29 - August 12, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Schneider Electric
Schneider Electric launches SM AirSeT in Australia
The new medium-voltage switchgear uses pure air and vacuum interruption, completely avoiding SF6 greenhouse gas.
Story image
Collaboration
Hybrid working success relies on the return to office
A reluctance to return to the office is impacting a would-be hybrid working model, instead leaving businesses with a mostly-remote workforce.
Story image
Home Entertainment
Hands-on review: TCL 65″ C835 Mini LED 4K Google TV
We introduce you today to a TV that brings the height of immersion to your viewing experience: The TCL 65″ C835 Mini LED 4K Google TV.
Story image
ExtraHop
Organisations exposing highly sensitive protocols to public internet
More than 60% of organisations expose remote control protocol SSH to the public internet, while 36% of organisations expose the insecure FTP protocol.
Story image
Cybersecurity
CISOs need to consider a risk-based cybersecurity strategy
Rather than talking in terms of attack vectors and vulnerabilities, CISOs and security decision-makers must look at actual business risk.
Story image
Arlo
Hands-on review: Arlo Go 2 security camera
In my humble opinion, Arlo Go 2 offers security for anyone needing to keep a remote eye on prized possessions or premises at different locations.
Story image
Cybersecurity
Education sector seeing highest volumes of cyber attacks
When breaking down the numbers to education attacks by region in July 2022, A/NZ was the most heavily attacked.
Story image
Data breach
Weak breach data disclosure laws for IP theft leaves vital Australian industries vulnerable
Infoblox has seen unprecedented levels of demand for cyber protection from companies outside of the Critical Infrastructure Act who have discovered security events and those who fear falling victim to IP theft.
Story image
Facial recognition
Benefits vs risks of facial recognition technology
Once a distant, futuristic concept, facial recognition technology is now found in many technological applications with a variety of different functions. 
Story image
SmartWatch
Hands-on review: Huawei Watch D smart watch
The Huawei Watch D is the latest flagship smart watch from the Chinese tech giant, and it's further proof that the company is more than capable of competing with the likes of Samsung and Apple in the highly competitive wearable market.
Story image
Cybersecurity
Claroty research unveils new attack that targets PLCs
Claroty has released research detailing a new type of cyber-attack, one that weaponises programmable logic controllers (PLCs).
Story image
Cyber attacks
Dramatic uptick in threat activity with exploits growing nearly 150%
"While it’s not a surprise given increased attack opportunities like remote work, it’s still a worrying development and one we cannot ignore."
Story image
Communication
Motorola acquires radio comms provider Barrett Communications
Motorola Solutions says the two companies are united in delivering vital communications that organisations worldwide depend on.
Story image
IDC
Collaboration app market revenue grows 28.4% year-over-year
IDC has found that global revenues in the collaboration applications market grew 28.4% year-over-year in 2021 to $29.1 billion.
Story image
Review
Hands-on review: JBL Flip 6 portable speaker
Once you switch it on, and listen away for up to 12 hours, you will quickly realise that this is a little speaker looking for a party.
Story image
Digital Transformation
Common challenges in the evolving digital world, and how to overcome them
Five technology challenges that will help highlight potential pain points and suggest how to circumvent or overcome them on the path to a smooth digital transformation.
Story image
Marmalade
Exclusive: Marmalade empowers businesses to take control of their cash flow
Marmalade has been making waves in the invoicing space across Australia with its world-first invoice payments platform.