Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
It seems like every week we hear about the biggest ever cyber-attack or hack. Today the news is full of reports stating that up to 143 million customers of Equifax may have had their personal credentials stolen in a cyber-attack. And while this is wrong, people who are worrying about this are simply worrying about the wrong thing.
When you see a smashed-up car beside the road, there is very little point to worry about it, it’s happened, it’s in the past, and worrying about a crash that has happened will not stop that crash from happening. What you should worry about is can it happen again, and what can you do to stop it happening again.
Hackers are not geniuses, they are criminals with a very basic set of tools, and tenacity. Their basic tool-kit consists of understanding the weakness of people and technology, and while the tools they use may continue to become more sophisticated in terms of their ability to exploit people through social engineering, and to deliver packages of malicious code onto machines using ever more sophisticated delivery mechanisms, that is really it, those are the tools.
The on-going challenge for society is that detection of these tools relies of firstly recognizing these tools as malicious. And the simplest way for a criminal to not get caught is to have never been caught before. It sounds simplistic, but think about it, when a crime happens, what is the first thing the police do? They round up the usual suspects, people who have committed similar crimes before. When you hire someone, what is the first thing you do? You do a background check, and see if they have a criminal record. The hardest criminal to stop is the one who has no criminal record – yet.
And that is the primary issue we have today. So much of the security in place to stop malicious activity from criminals is based on the detection of known malware.
What is needed is a system that goes beyond this, that starts by detection of known malware, but then extends the protection by stopping any file that is not yet known to be malicious from performing any malicious act on your systems.
Imagine the situation – a new piece of malware is created by a criminal and is emailed to you from the email account of a person you have done business with before. You know the person and trust them, but you do not know that their system has been coerced already by a hacker. So you open the file they send you, and unknown to you it installs a key-logger on your system. Now every key stroke you perform is being recorded and sent to a hacker. A month later you log into your work’s customer database to check the payment history of a customer you are about to visit. Now the hacker has the login details for your database. They sell those login credential to other criminals on the dark web and a month later someone logs in using your credentials and downloads the records of all your customers. You have been hacked. It wasn’t complex and it wasn’t fast.
This is exactly how hacks happen every day. So, when you hear about them in the press, it’s often months after the data was stolen.
Now imagine the same scenario, but now you have a malware removal system in place that prevents malware infections by malware. That same email comes from your friend, and you open it. The file is scanned by your detection software, and it’s not recognized as known malware, but now your system see’s it’s an unknown file and so contains it in a virtual environment. The malicious file runs and tries to install key logging code onto your system. Well the containment software knowns not to allow files with an unknown security profile to perform write activities to your hard disk, or write to the com interface or the registry. These are the only methods by which software can execute on your system. Instead when the file tries to install, it is presented with virtual versions of the hard disk, the com interface and the registry. So the malicious code “thinks” it’s installed but it has not.
While this is happening a copy of the unknown file was being analyzed in the cloud using both AI and people, and they would have created a verdict of its intent. The file would have been identified as malicious, and erased from your system. And the detection software would have been updated to stop any other versions of this file from infecting any other systems.
Using this method of detection plus prevention of infection using virtualization stops hackers from gaining the knowledge to attack systems.
So, don’t worry about the Equifax hack, worry about stopping every future hack.
Only one solution does this for you, to find out more visit enterprise.comodo.com
Related Resources:
Best Antivirus
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
agreecheck
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP