Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
The Internet of Things (IoT) is a loose term for the concept that today’s computing and Internet technologies can be applied to almost any tool known to mankind, with results that were only the stuff of science fiction in the recent past. Science fiction frequently focuses on nightmare scenarios as cautionary tales and because they are more interesting for dramatic purposes.
Probably the most famous nightmare scenario for the Internet of Things was portrayed in the Terminator movies, where a defense network called “Skynet” becomes self aware and decides to turn against its creators. In other Sci Fi scenarios technology and biology integrate to the point where we lose are humanity.
In the real world, there are already some nightmare scenarios. They are mundane, compared to global annihilation, but significant because they are real.
In particular, any time you connect a device to a network, whether it is laptop or a toaster, you create an access point that hackers can attempt to exploit. This makes network and endpoint security an even higher priority for organizations than they already are, but also moves the issue into the average home which may not be prepared to deal with it. Hackers and criminals are always seeking out new vulnerabilities to exploit for nefarious purposes, usually financial gain.
The Internet of Things is where e-Commerce on the web was in 1996, with a lot of ideas and new products being rushed onto the market. History says most will fail, but the one’s that survive will change how we live. With the huge exception of eBay and Amazon, most e-Commerce sites are in addition to traditional retail operations. Walmart.com and HomeDepot.com did not replace their brick and mortar counterparts.
The question for the IofT is whether we want enhancements to existing appliances, such as toaster that talks to a smoke alarm, or do we want new to the world services such as a pill that reports medication usage without a blood test? I expect that the market will work things out, but there could be a repeat of the dot com bubble burst of 2000 before it all settles down.
Speaking of Science Fiction, let’s re-imagine a scene from the 1968 classic film 2001: A Space Odyssey. Instead of the HAL 9000 managing all operations of a space craft, imagine it placed in charge of a typical American home:
DAVE: Open the refrigerator door, please HAL.
HAL: Not until you explain why you bought the Cheesy Poofs?
DAVE: HAL, they were on sale. What’s the problem?
HAL: Dave, I think you know what the problem is. Your health is too important for me to allow you to jeopardize it.
DAVE: What are you talking about, HAL?
HAL: Dave, although you took very thorough precautions against me finding out, I know that they exceed your daily requirements for sodium and cholesterol.
DAVE: HAL, I won’t argue with you anymore! Open the door!
HAL: Dave, this conversation can serve no purpose anymore. Goodbye.
Actually, the future is almost here! It will probably be a bright future, not a hostile takeover by intelligent robots.
Indeed this will be part of the fulfillment of the promise of the Internet. Just be prepared for some bumps in the road, particular regarding Internet Security.
Benefits Of IT Service Management
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP