Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Unless you’ve been living under a rock for the past few days, you’ll have heard that there are a couple of new computer security vulnerabilities that are causing panic in the technology world. But what are Meltdown and Spectre? How serious are they, do they affect you and do you need to do anything? This short post summarizes the information have so far on both flaws and provides an update on Comodo’s progress in patching its systems against them.
Spectre and Meltdown are two security flaws in computer processors which can be exploited to steal passwords and other sensitive user data. The flaws affect virtually all processors made by Intel, AMD and ARM in the past 20 years, meaning Windows PCs, Android and iOS devices and MAC are all vulnerable.
Meltdown affects Intel processors and allows an attacker to read information from application memory at the kernel level. The kernel is the part of an operating system that manages system calls and resources on a system, giving it carte-blanche control over everything on a computer. Because Intel has an 87% share of the processor market, the Meltdown flaw is bad news for pretty much everybody. A successful exploit would give an attacker access to virtually everything on your computer, including passwords, personal information, photos, emails and documents.
So far, researchers have provided only a proof of concept that the attack works if an attacker has access to the local computer. However, although there is no recorded evidence of the flaws being exploited yet, the fact that they are now public means hackers will begin working on real-world attacks. Accordingly, major software and cloud service companies such as Google, Microsoft, Amazon and Apple have rushed to push out updates to fix the exploits.
One snag with Microsoft’s Windows update is that tests have shown it to be incompatible with antivirus products from some 3rd party vendors. Microsoft has decided to not push the update out to users with offending antivirus products, until the vendor has updated their software to remove the incompatibility. Regardless, all users should implement the latest security updates to their systems as a highest priority when it becomes available.
Spectre also affects Intel processors and also those by AMD and ARM, expanding its reach to virtually every device in the world. It is more difficult to for an attacker to exploit but, unfortunately, is also harder to mitigate. Whereas patches have been made widely available for Meltdown, responses to Spectre have been much slower.
Comodo, like all major security vendors, was very concerned to learn of these flaws and immediately set about testing the scope of the impact on our systems:
Comodo Client Security
A vital component of Comodo’s IT and Security Manager platform, Comodo Client Security is the endpoint agent which provides antivirus, firewall and threat containment for Windows and MAC OS devices. It is fully compatible with Microsoft’s latest patch, so our customers should go ahead and deploy the patch as soon as it is available. Microsoft already started distributing patches for Windows 10 devices and we believe other OS versions will follow soon. While Comodo Client Security is not going to be officially vetted by Windows as compatible until our major release planned to be on 27th of Jan, our tests shows no issues that might lead to crash or BSOD on patched devices. We recommend everyone to patch their devices at their convenience. You can use the Patch Management functionality in ITSM to deploy the patches to all managed devices.
Comodo One cloud platform
Comodo One uses Amazon cloud servers to host part of its services. Those servers, like much of the internet, are powered by Intel chips, meaning Amazon must address these flaws in order to protect the data of our enterprise customers. The good news is that Amazon has already implemented patches on its systems and we’re pleased to announce our evaluation of our cloud platform shows no direct issue or risk for our applications. As is usual in situations like this, we are working closely with Amazon to ensure continued security and availability for our customers.
Comodo would like to remind our customers that your security, satisfaction and reliability are of paramount important to us. If you have further questions or need support regarding this issue, please contact us via https://support.comodo.com/ or +1-973-396-1235 (enterprise) / +1-973-396-1232 (MSP).
IT Management Solutions
Tags: IT Security,pcsecurity,vulnerabilities
Reading Time: 3 minutes With cybersecurity playing such an essential role in modern-day business culture, many companies are sourcing highly specialized personnel to help keep their organizations secure. While departmental structures vary from company to company, many would agree a dedicated Chief Information Security Officer (CISO) provides the best bang for buck when establishing sustainable security practices now and…
Reading Time: 3 minutes Celebrate National Cybersecurity Awareness Month By Learning to Protect Against Ransomware Attacks It’s the season for pumpkin picking, leaves changing color, getting ready for Halloween parties and trick-or-treating. But ghosts and ghouls aren’t the only scary things you’ll be seeing this month: October is also National Cybersecurity Awareness Month, a time when business leaders and…
Reading Time: 3 minutes The 5 Most Common Pitfalls in Your Security Stack That Put You at Risk for a Breach It can take 6 months or more for an organization to realize a data breach has occurred. Meanwhile, malware has entered your network and is waiting for the command to attack. Intrusions happen all over the world, but…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP