Review: Comodo Internet Security Pro 8 (2015)

Comodo Internet Security is a multilevel open source application that offers protection from viruses, Trojans, worms, buffer overflow, attacks from recently revealed security brinks (zero day) and monitor programs designed by hackers.

This software can balance extremely well, a powerful protection, a strong firewall that filters packages, advanced capabilities to overthrow incoming attacks, control over other software and monitoring programs – and all that in one single but powerful software package.

Despite the 25 million product installations in 100 countries, the brand is just beginning to gain recognition. The Comodo firewall thwarts the most sophisticated hacker techniques. The latest version is really a breakthrough concerning the security capabilities and ease of use with the virus scan through the cloud addition and the behavioural analysis of unknown files.

With the preset options, unknown and unreliable files automatically controlled by scanners on the cloud and depending on the findings, the files are blocked by the Comodo Internet Security on the cloud’s server.

While the behaviour of a file is being analysed, the Comodo operated on a specific place of the computer, so that the sensitive information is not accessible thus remaining perfectly safe.

The Comodo firewall passes leak tests that attempt to connect with internet servers in order send data. For example, Comodo successfully filters ICMP traffic as well as outbound TCP and UDP traffic. Comodo has control over the launching of Windows Explorer and it can prevent a suspected process from changing or launching the default browser. Some hackers attempt to replace the executable code of the default browser, but Comodo prevents such a thing. If a malicious HTML page attempts to execute, Comodo can deny the attempt.

Spying tests such as keyloggers and packet sniffers attempt to discover patterns in order to deduce information to exploit. The Comodo firewall successfully squelches spying tests with relative ease. If a keylogger repeatedly scans for the key-code status to infer which keys the user is pressing, Comodo detects and stops the action.

Another hack tactic is to install system infections that survive reboot. Comodo passes autorun tests. If malware attempts to install itself in the system registry so that it can run whenever the user invokes Windows Explorer, Comodo clobbers it. The Comodo firewall also prevents malware attempts to remain persistent in the system by altering machine-wide registry settings for the Command Processor.

There’s also a new Website Filtering feature that will allow the user to block or allow certain sites and to customise a set of rules for other users of the computer that Comodo ISP 8 is installed on. Included with this is the ability to log any attempt to access the rule-created blocked sites. That way you can monitor who and when is trying to visit a site.

Overall, this is an excellent security program and at a surprisingly reachable price. It is very likely that not in a long time from now, the Comodo Internet Security will be officially announced as the best security program. So don’t waste any time. Try it now and let us know how it works for you!