Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
One of the priorities of the Comodo One (C1) project is to put an end to the fragmented software model for MSPs. We intend to bring all the core services an MSP will need under the single umbrella and login of the C1 console. What’s more, we intend to do it using the very latest innovations and technologies, delivering tools that not only replace but also out-perform the 3rd party software currently in use today. Maybe we’re not quite there yet, but by engaging with and listening to our MSP community, we’ve made huge strides towards that goal in just a couple of years. Today, I’d like explain how one of these new tools, Comodo Remote Control (CRC), is already helping to streamline workflows and save money for our MSP users.
Establishing a direct connection to customer endpoints is a vital part of a managed service provider’s job. It allows them to troubleshoot issues, install updates, run maintenance, gain access to networked resources and more. However, while overall monitoring of a client’s network will be done from a central console, MSPs have traditionally had to interrupt their workflows by resorting to 3rd party tools when they need an RDP connection. Using these 3rd party solutions often means the MSP has to pay another license fee, and often for over-specced software which contains features they don’t especially need. MSP’s may also be burdened with interoperability issues, requiring them to juggle additional codecs, Flash players and more just so they can get their solution to work with their customers.
Comodo RMM allows users to easily take control of any endpoint under their management, direct from the Comodo One device inventory. Remote connections to a device can also be made direct from a service desk ticket or by using the convenient desktop application. Once connected, administrators can view and interact with the remote PC and run any maintenance/update/monitoring tasks that are required.
CRC is seamlessly integrated with the endpoint monitoring interfaces of Comodo One, allowing MSPs to view the results of any updates they make to the machine in real-time. Just open the device inventory, select your target device and click ‘Remote Control’. Within a few clicks you’ve just completed a task that would usually have taken several minutes, potentially saving you hours of lost productivity over the course of a year. MSP’s who use CTC to perform maintenance can also reduce the number of on-site visits they need to make, reducing costs and improving overall productivity.
Built on Best of breed technologies like WebRTC
Comodo Remote Control was built from standards-based technologies such as Chromoting and WebRTC. WebRTC offers capabilities that are far in advance of existing communications and collaboration environments. Here is a summary of its features and advantages:
Building on WebRTC to create a solution for MSPs.
In short, WebRTC is one of the most significant additions to the web platform since its inception, offering a simple and unified solution for establishing peer-to-peer communications in-browser. However, even with all the advantages provided by the platform, the development of our remote control implementations still required a great deal of careful thought and planning. Creating products tailored to our MSP user base which matched and surpassed existing solutions required consultation with our user-base, innovation, several design iterations and much optimization work.
WebRTC is explicitly designed for use over browsers. We’ve had a browser-based implementation in the C1 console for a while, but we discovered MSPs needed a faster way to connect. Taking their requests on-board, we developed a convenient desktop app based on WebRTC which can be opened by simply clicking a Windows tray icon. It provides a quick, always-on means for MSPs to connect to their remote devices without having to navigate through the C1 console. We will also create native apps for Linux, MAC, Android and iOS in the future. On top of this, we plan to expand functionality to browsers in later developments, so users can assume remote control of a device direct from Chrome without installing the agent.
We added VP9 support to Comodo Remote Control, giving us substantial quality and performance improvements over the more widely used VP8. Simply put, VP9 gets more quality out of each byte without requiring more bandwidth. It allows 1080p connections at the same bandwidth requirements that VP8 needs for 720p, and reduces data usage for users with poor connections by requiring only 40% of the bitrate of VP8. We also optimized the screen capture algorithm to further increase traffic speed between the agent and the remote desktop.
Extending the scope of existing technologies
Our development also made use of Chromoting technology. We removed the technology’s dependence on the Chrome browser to make it work within a native Windows application. This breakthrough provides us with the vital groundwork for when we develop sister apps for Linux, MAC, Android and iOS.
We’re not stopping here
Apart from developing apps for other operating systems than Windows, upcoming releases will see seamless file/folder integration, remote desktop access without client installation and a cloud based application.
Comodo Remote Control – Features and benefits
Tags: MSP,Remote Monitoring
Reading Time: 4 minutes Increased dependency on computers and access to data makes an organization more vulnerable to cybersecurity threats. With the increase in cyber-criminals and cyber-attacks, many companies today are looking for greater protection of their decentralized computing work environments from their Managed Service Providers (MSPs). As a result, MSPs need to deliver firewall solutions that are designed…
Reading Time: 3 minutes Rapid technological growth and increasing digitalization in all aspects of life around the world have increased the value of ensuring cyber-security at all levels. This is increasingly true for EU member states and the organizations that are based in or operate from these countries. The number of cyber-attacks targeting EU member states has risen. The…
Reading Time: 4 minutes Today, organizations are constantly at risk from cyber-attacks. This is a major issue not only because of the traditional business risks, but because in today’s increasingly globalized world, effective intrusion by a cybercriminal might, among other things, bring the operations of a company to a standstill. Therefore, while businesses need to match the security system…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats