Complete Threat Prevention
No one can stop malware and ransomware from entering your network, but XCITIUM's ZeroThreat technology prevents cyberattacks from causing damage with proactive zero-trust virtualization. Applications running in the secure ZeroThreat container prevent permanent changes to other processes, programs, or data on the actual endpoint system. This is how to make your endpoints inaccessible without disrupting endpoint or business operations.
How Does It Work?
ZeroThreat Core features utilize kernel-level virtualization, allowing business endpoints to automatically run virtualized applications based on default denial and/or custom rules and security policies. ZeroThreat's acclaimed ZeroDwell Intrusion prioritizes predictive strategies with breach-proof virtualization. This demonstrates that protection is the first and strongest line of cyber defense.
ZeroDwell zero-trust containment gives untrusted (but harmless) applications (i.e., "unknowns") the freedom to run, but untrusted (and potentially dangerous) applications are prevented from damaging your PC or data. Malware and ransomware threats can reach the endpoint, but with ZeroDwell containment, malware and ransomware cannot work by preventing them from damaging or breaching that endpoint and cannot move laterally to other hosts or critical assets on your network.
BASIC FEATURES
Xcitium Essentials uses its patented ZeroDwell Containment technology to pre-emptively isolate unknown and untrusted applications or files at runtime so that they cannot make permanent changes to system processes, data, or programs; it includes a cloud-based verdict service (Verdict Cloud) that analyzes contained “unknowns” to decide whether they are safe or malicious; endpoint agents enforce containment policies, kernel-level virtualization, and default-deny rules or custom rules per policy so that unknowns are tightly sandboxed; service is supported by the Xcitium Threat Research Labs (XTRL) which continuously update threat intelligence; management via a SaaS console that allows admins to deploy policies, review containment logs, configure custom rules, and monitor endpoints; the solution operates transparently to end users, allowing benign unknown applications to execute (inside containment) while preventing threats such as ransomware, malware or zero-day attacks from causing damage; supports auto-release of benign items from containment, detailed logging of containment events, process lineage tracking for forensic purposes, and scalability for business endpoints without disrupting daily operations.
WHAT’S NEW
In the recent updates (mid-2025) Xcitium Essentials improved policy management and internal usability by adding clearer naming conventions in logs for parent/child processes which makes event tracking more precise, enhanced the platform’s network configuration flexibility especially for larger or distributed environments by supporting broader subnet masks (up to /16), refined the user interface of the management console to improve navigation between Essential and Enterprise Platforms (including renaming buttons and making the platform switcher more intuitive), released updated network sensor images under the Security > SIEM-X Token Management module improving stability in sensor deployments, and corrected several bugs related to access control, license recognition, and GUI inconsistencies (for example fixed issues preventing whitelisted websites from being accessible under restrictive social networking policies).
SYSTEM REQUIREMENTS
Requires Windows endpoints; minimal system requirements for Xcitium Client Security include around 512 MB RAM, ~1 GB hard disk space for both 32-bit & 64-bit versions, CPU with SSE2 support; Internet Explorer version 11 or higher may be required for some management features; note that while Windows 7 is supported, some new features may not be fully functional on older OS versions.
USER INTERFACES LANGUAGES
English
BRAND
Xcitium (formerly Comodo)
TYPE
Endpoint Threat Prevention / Endpoint Security
FOR OPERATING SYSTEM
Windows (supported versions include Windows 10, Windows 8/8.1, possibly Windows 7 with limitations); both 32-bit and 64-bit supported endpoints.
LICENSE CATEGORY
Subscription-based software
FORMAT
Digital Download
MODEL
Xcitium Essentials 2025
COUNTRY OF USE
Globally
MANUFACTURER COUNTRY