Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Reading Time: 2 minutes Live Webinar: Tuesday, May 23, 2017, 10 a.m. Pacific Information security professionals continue to struggle with endpoint security “expense-in-depth” while cyber threats and vulnerabilities persist. Why is this is happening now and how can complexity and user friction be reduced while achieving defense-in-depth? Attend the live webinar to find out. You’ll see how a new…
Reading Time: 9 minutes Here’s an A to Z glossary of terms related to Endpoint Protection- A Advanced Persistent Threat (APT) – An unauthorized person gaining access to a network, staying there undetected for a long period of time, intending to steal data than to cause damage to the network/organization. Analytics– Discovering meaningful data patterns, usually using an analytics…
Reading Time: 2 minutes Comodo has just released a new version of Comodo Dome Shield that significantly raises the bar for Managed Service Providers (MSPs). You can read the press release summarizing the improvements here. The bottom line summary: MSPs can now manage multiple end-customer instances of Comodo Dome Shield from a single Comodo ONE console. This will increase…
Reading Time: 2 minutes Comodo’s own Egemen Tas was named as one of the “40 under 40 most influential Turkish-Americans.” Read more about it on our blog. It’s quite an honor to be recognized for excellence in your field, but perhaps even more so when your native country recognizes your accomplishments and characterizes you as an “influential person,” among…
Reading Time: 3 minutes As you might have seen from recent news headlines, Google Chrome has announced a proposal to deprecate certain Symantec certificates. This proposed update may potentially affect certificates issued by Symantec, Thawte, and Geotrust and would have a considerable impact on customers using such certificates. Google Chrome has recently identified a series of failures by…
Reading Time: 6 minutes Contents: 1. Introduction 2. Preparing the environment 3. Attack analysis and prevention 4. Conclusion 1) Introduction Web applications are arguably the most important element of today’s online infrastructure. They are used to power many features which are critical to online business, including dynamic content, payment systems, web-mail, online stores, software-as-a-service, forums, social media and more….
Reading Time: 8 minutes Comodo One. Viewing Security Systems on ITSM How to view all threats identified on Android, Windows and Mac OS X devices over time on ITSM How to view a list of all programs that have been executed inside containment on ITSM How to check antivirus update status and scan statuses that are run locally How…
Reading Time: 3 minutes The web is the #1 vector for a wide variety of threats—from garden variety malware, to phishing attacks, ransomware, and beyond. Your users may receive an email that appears to be from a company that they actually do business with, asking them to reset their password. The email may actually be from a cyber attacker…
Reading Time: 2 minutes The latest news regarding Wikileaks documents from the CIA has caused quite an industry stir, and also caught Comodo’s attention since we were mentioned in a couple of documents (and Stephen Colbert mentioned Comodo). Gaining notoriety with U.S. Intelligence Community is something in which Comodo takes some pride. While this latest news involved evaluating a…
Reading Time: 3 minutes Read the blog article to find out what were the hot topics discussed during RSA Conference 2017. Information technology and cybersecurity are constantly evolving, and security conferences struggle to keep up. RSA is no exception. This year’s massive conference in San Francisco had one very cool theme that I think is important to highlight: a…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
agreecheck
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP