Start with the all-important protection against malware, add a firewall and some other useful security features, and, voilà, you've got a security suite! Comodo Internet Security Complete comes with the expected antivirus and firewall, as well as cloud backup, a VPN, and more.
However, the antivirus fared poorly in testing, and the VPN and cloud backup features simply do not work.
There are better security suites for your money.
The pricing doesn't give you any clue that this isn't a top-shelf product.
At $89.99 for three devices, it costs more than many competitors.
Bitdefender and Kaspersky Internet Security give you three entry-level security suite licenses for $10 less.
Five top-tier Bitdefender suite licenses cost the same as Comodo's three, and five licenses for Kaspersky's top-of-the line suite cost $99.99 per year, which is not much more.
Norton 360 Deluxe also gives you five licenses for $99.99, which includes a working cloud backup system and a VPN without the bandwidth cap that Comodo imposes.
From the start, it's not a bargain.
The product looks almost identical to Comodo's free antivirus, and neither has changed appreciably since my last review two years ago.
A big rectangular panel represents your security status—green for good, red or yellow if anything needs fixing.
Four smaller panels give you quick access to run an antivirus scan, release a program from the containment sandbox, check for updates, or open the Secure Shopping Environment.
The only difference is that, in the antivirus, that last panel instead launches Comodo's virtual desktop.
Comodo also offers a free security suite called Comodo Internet Security Premium.
Yes, despite "premium" in the name, it's free.
This suite does include antivirus and firewall protection, along with Secure Shopping, but you don't get the Cloud Backup or VPN features.
You also don't get the VIP support and warranty offered to paying customers.
Features Shared With Antivirus
Naturally, when you pay for this suite you get every feature that comes for free in Comodo Antivirus.
Please read that review for my complete findings; I'll summarize below.
Lab Test Results Chart
Malware Protection Results Chart
Phishing Protection Results Chart
The independent antivirus testing labs put products through rigorous testing and regularly report their results.
I follow four such labs, but only one of them includes Comodo in its latest reports.
Products can earn up to 18 points from AV-Test Institute; Comodo scored 16.5.
That's not bad, but F-Secure, McAfee, and Norton took the full 18 points in the latest test.
In contrast with Comodo's sparse results, eight products I follow show up in reports from all four labs.
Among these were Avira, Bitdefender, ESET Internet Security, and Kaspersky, which all earned an aggregate lab score of 9.6 or better, out of a maximum of 10.
Comodo offers a variety of antivirus scan choices in addition to the typical full scan, quick scan, and custom scan.
You can scan to see what trust level Comodo's database assigns to your files.
If tough malware resists cleanup, you can run the cleanup-only Comodo Cleaning Essentials.
And if even that can't root out a persistent infestation, you can burn a Rescue Disk on a clean system.
The Rescue Disk boots into an alternate operating system, leaving Windows-centric malware powerless.
In my hands-on malware protection test, Comodo scored 9.1 of 10 possible points; that's decent, but many competitors have done better.
On a sour note, Comodo didn't recognize the five ransomware samples I modified by hand.
In theory, its behavior-based detection should have foiled them, recognized or not, but in practice most of them slipped past Comodo's protection.
The Comodo Online Security browser extension should keep your browser away from dangerous and fraudulent websites, but it didn't perform well in testing.
It didn't block access to any malware-hosting URLs, and only eliminated 56 percent of the malware downloaded from those URLs.
Bitdefender and Trend Micro Internet Security, by contrast, defended against 99 percent of the malicious URLs.
Comodo performed even worse in my phishing protection test, detecting just 10 percent of the fresh, real-world fraudulent webpages.
The phishing protection built into Chrome, Firefox, and Internet Explorer vastly outperformed Comodo.
At the other end of the scale, McAfee Internet Security and Kaspersky scored 100 percent in their latest phishing tests.
By default, Comodo's containment system, previously called Sandbox, runs unknown programs in a kind of virtual machine, so they can't do any permanent damage.
In testing, it didn't help at all against hand-modified ransomware samples.
The free antivirus shares several other features with the suite reviewed here.
Comodo Dragon is a Chromium-based browser with several useful extensions built in.
The Virtual Desktop isolates your programs from the possibly compromised regular desktop, and it emphasizes using Comodo Dragon for browsing.
A Host Intrusion Prevention System (HIPS) limits activities by unknown programs, but it doesn't protect against exploit attacks the way HIPS does in some products.
Advanced tools let you analyze running processes and, if necessary, terminate them in various ways.
Impressive Warranty
One thing that distinguishes Comodo's paid products from the free ones is an impressive warranty.
Comodo promises that if malware gets past the product's protection, support agents will spend as much time as it takes to remotely remediate the problem.
In the unlikely event that the malware comes out victorious, the company will reimburse up to $500 in repair costs.
Norton, Check Point ZoneAlarm Extreme Security, and McAfee offer similar guarantees, though they offer a refund, not reimbursement for repairs.
Don't imagine, though, that you can install Comodo on some nasty, grunged-up PC and then immediately demand reimbursement.
Quite reasonably, Comodo insists that you make sure the product is configured correctly, for starters.
During the process of activating this warranty, it checks that you have Antivirus, Firewall, Auto-Containment, HIPS, and VirusScope enabled, and that Comodo is configured to log all activity.
To finalize the activation process, you must run a full scan and deal with any found threats.
After that, once the computer is in a known clean state, the warranty kicks in.
While Comodo doesn't offer anything like the identity-theft features of Symantec Norton 360 with LifeLock Select($9.99 Per Month at NortonLifeLock), its warranty also includes a degree of help in that area.
If your identity is compromised despite Comodo's protective efforts, the company will reimburse you for costs such as refiling loans denied due to identity compromise, notary and postage costs, and credit reports.
It will also reimburse up to $500 per week in lost wages, for a maximum of four weeks.
There's an overall cap of $15,000 for any incident, a far cry from Norton's Million Dollar Protection Package, but still more than you get from most companies.
In addition, where Norton, McAfee, and ZoneAlarm require you to sign up for automatic renewal if you want a guarantee, Comodo only insists that you configure the product correctly.
Comodo Firewall
Comodo offers its firewall as a standalone free product, one that shares many ancillary features with the free antivirus.
With powerful firewall protection built into Windows, we're no longer convinced that you need a personal firewall, but it does make a nice addition for a security suite.
The firewall component handled all our port scans and other web-based attacks, putting the test system's ports in stealth mode.
That means they're not merely closed to unauthorized access—they're not even visible to outside attackers.
Of course, Windows Firewall can do the same, so this is more a baseline than an accomplishment.
The other half of a typical personal firewall involves controlling how programs access the network and the internet.
Some firewalls rely totally on the user to decide which programs can use the network, blasting out confusing pop-up queries.
Others, like Norton, make all their own decisions.
Norton automatically configures network permissions for known good programs, exterminates known bad ones, and puts any unknowns under heightened surveillance.
Kaspersky's firewall does something similar, assigning trust levels to unknown programs and putting stringent limits on what untrusted programs can do.
With Comodo's firewall, the user has many choices—too many, in my opinion.
The typical user who leaves all settings at their defaults gets only the simplest application control.
Out of the box, the firewall runs in Safe Mode, which filters inbound and outbound traffic, but allows all connection requests without displaying any pop-up alerts.
If you enable alerts, you'll get notified when a new program attempts access, and you can set five distinct frequency levels for those alerts.
To cut down the number of pop-ups, you can set it to create access rules for programs that Comodo certifies as safe.
Confused yet? There's also Training mode, which assumes that all programs accessing the network are legitimate and creates rules to continue allowing them access, even in other modes.
After training the firewall, you can switch to Custom Ruleset, which alerts you on any connection that doesn't already have a rule defined.
I could go on.
But the average user will leave the defaults in place, meaning no alerts but also not much program control.
Here's a smart feature: By default, if you connect to any unsecured network, Comodo suggests you secure the connection by turning on TrustConnect, the VPN component.
I'll cover TrustConnect below.
You can tweak this behavior to also suggest the VPN when you connect to any public network, even one that's nominally secure.
If you choose the latter, you'll be protected even when you connect to a network whose owner aims to steal your data.
I'll go into greater detail on the VPN below.
To see program control in action, I enabled alerts and launched a tiny browser that I wrote myself.
I got a pop-up query from the firewall, as expected.
Most firewalls simply have you choose Allow or Block, with a checkbox to determine whether your decision becomes a rule.
With Comodo, you can allow or deny access on a one-off basis, but creating a rule requires that you choose a ruleset for the program from a list of choices that include Web Browser and Outgoing Only, as well as the more useful Allowed Application and Blocked Application.
As noted, Comodo doesn't attempt to block exploit attacks at the network level, so I didn't perform my lengthy exploit test.
It's worth noting that Norton detected more than 80 percent of the exploit attacks, blocking them at the network level and identifying many by name.
No other firewall or suite has topped that, though Kaspersky came close.
A burglar alarm with a big, accessible Off switch wouldn't be much use; the same is true of security software with a Registry setting to turn off protection.
Comodo exposes no such switch, fortunately.
However, I found that I could kill off its processes using a third-party task-kill utility.
I can't see what would stop a malware coder from doing the same.
It also let me set the startup type for all its services to Disabled.
When I rebooted the test system, Comodo silently repaired those settings, but I'd be even more impressed if it prevented the change in the first place.
The best security products, such as Norton, Kaspersky, and Bitdefender Internet Security, are hardened against this kind of tampering.
With the basic Comodo antivirus, you can enter a Virtual Desktop to protect your sensitive activities.
Processes in the regular desktop can't interfere or even see processes running in the Virtual Desktop.
Processes in the Virtual Desktop can't make any permanent changes to the system.
If you run a sketchy program and it misbehaves, you just empty the containment system to negate its actions.
The Secure Shopping experience is similar, but without the features needed for running sketchy programs safely.
It's all aimed at protecting your legitimate programs.
You shop in a virtual desktop, and Comodo prevents spyware programs and keyloggers from tracking your keystrokes and capturing your screen.
It also detects man-in-the-middle attacks and unauthorized remote connections.
To start shopping securely, just click the Secure Shopping icon from the main window.
The separate shopping desktop puts all your browsers on the taskbar, for easy access.
You can leave Secure Shopping at any time, or flip back and forth between it and the regular desktop.
And for super-duper security, you can enter sensitive data using a floating virtual keyboard.
Like the SafePay feature in Bitdefender and Safe Money in Kaspersky, Secure Shopping can kick in automatically when it sees that you're about to visit a shopping site.
But unlike the other two, Comodo doesn't come with a list of known shopping sites.
You must dig into Settings and populate the list yourself.
Now when you visit a site on the list, Comodo gives you three choices.
Two are clear enough—you can open the site in the Secure Shopping Environment, or continue using the unsecured browser.
The third option, visiting the site with Secure Browser, keeps you on the regular desktop, but applies Secure Shopping technology to the current browser—everything except full process isolation.
A blue border identifies the secure browser instance.
I tried visiting Amazon.com in the Secure Browser, but I kept getting an invitation to download a JSON file, followed by another Secure Shopping prompt.
I couldn't use Amazon in the Secure Browser.
For another view, I added Walmart to the protected list and tried to go there in Internet Explorer.
I got the Secure Shopping popup and chose Secure Browser.
When the pop-up reappeared, I again selected Secure Browser, over and over, stacking up blue-edged browser windows.
I don't really care that much that Secure Browser didn't work for me.
The full Secure Shopping Environment is a better choice.
It's easy to use, you can flip back and forth to the regular desktop if necessary, and it includes a virtual keyboard.
It's just better.
Online Backup
Local security software can't protect you if an out-of-control self-driving car plows into your computer.
Having a backup offsite can be the ultimate in security, if it lets you recover your important...