Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Reading Time: 2 minutes The White House has had several breaches of its physical security recently that have caused embarrassment and concern for the Secret Service. It now appears there needs to be concern for the White House’s cyber security defenses against cyber attack. Yesterday, the White House revealed that an unclassified portion of its local network for the…
Reading Time: 3 minutes When you work with SSL (Secured Sockets Layer) to secure your web site or other types of communication, you may notice reference to another communications protocol TLS, Transport Layer Security. You know that SSL provides a secured, encrypted communication between a client and a server, but what does TLS do? Truth be told, TLS is…
Reading Time: 3 minutes It is a commonly held myth that ATM machines are not vulnerable to the type of malware infections that plague other endpoint systems because they are more isolated from their network and end user interactions. While this makes them more difficult to infect, there is ample evidence that determined criminals are able to overcome these…
Reading Time: 2 minutes On October 9th, Computing Security Magazine named Comodo Endpoint Security Manager (CESM) the “Anti Malware Solution Of the Year for 2014” at their annual awards dinner at the Hotel Russell in London’s Russell Square. Computing Security Magazine is one of the largest and most prestigious technology related magazines in Europe and their annual awards are…
Reading Time: 3 minutes Selfmite is a Worm, a category of computer virus. A worm contains malicious code that uses system networks to replicate themselves. They are major threat to a computer and network system. Worms do not require human intervention whereas viruses do. There have been many viruses that found by developers for a malicious purpose. Recently, Android…
Reading Time: 2 minutes The opportunities for hackers and cybercriminals never seems to end. Microsoft issued a warning this week on an unpatched zero day vulnerability that threatens users of Windows PowerPoint. The issue comes on the heels of 3 critical zero day vulnerabilities addressed in last week’s so called “Patch Tuesday” advisories. In this week’s advisory, Microsoft warns…
Reading Time: 2 minutes There are not a lot of details at this point, but it appears that yet another major US retailer has suffered a breach of its POS system. The online blog krebsonsecurity.com has reported that banks have tied credit and debit card fraud activity to cards used at Staples stores in the Northeast US region. This…
Reading Time: 2 minutes Last Friday, President Obama signed an executive order requiring credit and debit cards issued to and on behalf of the Federal Government to conform to the EMV standards currently used in Europe. The standards add so called Chip and PIN technologies to the cards that is dramatically more difficult for hackers to compromise than the…
Reading Time: 3 minutes Parents have the responsibility of teaching their kids right from wrong, caring for and protecting them at all costs, right? Unfortunately some parents still don’t consider the internet to be a dangerous place and work to keep their kids safe online. It can be a very dangerous place for a child who unknowingly runs into…
Reading Time: 1 minute Apple has released fixes for OS X Mountain Lion v10.8.5 and OS X Mavericks v10.9.5 to address vulnerabilities in SSL 3.0, referred to as the POODLE bug. An attacker can use the but to decrypt data protected by SSL Earlier this week, Google announced that they had identified known attacks that compromised the confidentiality of…
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP