Content Verification Certificates and Why You Need Them

March 3, 2014 | By Editor
1 Star2 Stars3 Stars4 Stars5 Stars

Content Verification Certificates (CVC) facilitate the verification of “web page content”, the essential requirement for trusted e-commerce services that are now being attacked with increasing frequency by ever more convincing web page spoofs and Phishing attempts. Now a billion dollar method of identity theft, “Phishing” has become the number one security concern of the top e-commerce service providers.

CVCs afford providers a fully tested, fully patented protection system. As an X509 compliant certificate type, CVCs are created, distributed, and revoked using proven PKI (Public Key Infrastructure) methods to provide the highest level of security for web page content.

Facilitating the deployment of verified login boxes, verified navigation panes, verified trade marking / branding and verified accreditation/association, CVCs deliver confidence, trust and assurance to billions of online users who have no other methods available to them. – The future stability of the Internet as a viable and trusted business system is now being brought into question, and CVCs provide the answer.

A web page before and after Verification

Content Verification Certificate

Content Verification Certificates allow verification of web site content. The content requiring protection is digitally bound within an X509 certificate also holding location information.

Content Verification Certificates from Comodo – Highlights

  • Provision of Confidence, Assurance and Trust through Verification
  • Protection of web page content through encryption of digitally bound content and location
  • Anti-Spoofing and Anti-Phishing protection
  • Brand and trademark protection
  • Forming the basis of patent pending ‘Browser Independent’ verification tools

To learn more, visit


Be Sociable, Share!

    Add new comment

    Your name

    You may use these HTML tags and attributes: <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


    What Hidden Threats LurkOn Your Endpoints?

    Get complete security from known and unknown threats from Comodo Endpoint Protection

    free threat scan