Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Reading Time: 2 minutes Recently, it was reported by Google Security that there might be a small local vulnerability in Comodo GeekBuddy that allowed a local attacker to gain another locally logged-on user’s privilege. Here is the link from Google’s Project 0. https://code.google.com/p/google-security-research/issues/detail?id=703 The minor potential vulnerability was fixed and addressed back on February 10, prior to it being…
Reading Time: 2 minutes Financial services organization, banks, retail outlets and now hospitals and medical centers. No industry seems to be safe from the rising frequency of ransomware attacks today. The latest in a string of successful hacks of large, highly-visible companies is further proof of the vulnerability of corporate America. In the most recent case, a hospital…
Reading Time: 4 minutes Today, the second Tuesday of February, has been marked as “Safer Internet Day. For the past decade, it has served as a day of awareness on how to keep the online world a safe and protected experience for all. For the engineers and employees of Comodo, this is the mantra of the company – creating…
Reading Time: 2 minutes Technology success is built on R&D. It is built on trial and error. It is built on innovation. Hardware or software, consumer tech or B2B enterprise tech – it all evolves. Software especially is fluid, and patches, fixes, updates are constantly being addressed by every company that develops software – it goes hand in hand…
Reading Time: 4 minutes The security engineers and IT experts from the Comodo Threat Research Labs are constantly analyzing the thousands of malware families that are trying to cause destruction and chaos to IT infrastructures large and small – and ensuring the customers of Comodo stay protected and secure from these malware families. In an ongoing series of posts…
Reading Time: 5 minutes Since 2013, the CryptoLocker malware has been making its way across the Internet in various forms, in various iterations. CryptoLocker is a ransomware trojan which targets computers running Microsoft Windows and is especially popular among cybercriminals for its ability to read a file, encrypts that file, overwrite the original file with the encrypted file and…
Reading Time: 3 minutes Earlier this month, the Comodo Threat Research Lab team identified a new malware attack targeted specifically at businesses and consumers who might use WhatsApp. As part of a random phishing campaign, cybercriminals were sending fake emails representing the information as official WhatsApp content to spread malware when the attached “message” was clicked on. Now, researchers…
Reading Time: 2 minutes Comodo, a global innovator and developer of cybersecurity solutions, announced that it has opened its first office in the heart of Silicon Valley, in Santa Clara, California. The new location will house Comodo’s expanded enterprise product management and product marketing team in the state-of-the-art TechMart building, which neighbors Levi’s Stadium and the Santa Clara Convention…
Reading Time: 3 minutes The Comodo Antispam Labs (CASL) team has identified a new malware attack targeted specifically at businesses and consumers who might use WhatsApp, a multi-platform mobile phone messaging service that uses your phone’s Internet connection to chat with and call other WhatsApp users. As part of a random phishing campaign, cybercriminals are sending fake emails representing…
Reading Time: 2 minutes Since Symantec was dethroned by Comodo in February 2015, Comodo has continued to further expand its market share leadership, according to new data from w3techs.com,. This significant market share move was even predicted by w3techs.com in the February data when it stated “Comodo’s market share is likely to grow further, as it is particularly popular…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
agreecheck
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP