Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Reading Time: 4 minutes On April 26th, Microsoft revealed that hackers are exploiting a critical vulnerability in their Internet Explorer browser to victimize users with so called “drive by download” attacks. Such attacks download and execute malicious software on the victim’s computer, often for the purpose of committing financial fraud. According to Microsoft, the problem is a remote code…
Reading Time: 3 minutes Identity theft is at a record high, and a significant number of identity theft cases are traced back to spyware. Spyware is a type of malicious software (also called malware) that hackers use to invade unsecured computers and networks. It is typically downloaded inadvertently from the Internet without your knowledge by clicking on a link…
Reading Time: 2 minutes At Comodo, we were pleased and proud to learn that our CEO Melih Abdulhayoğlu has been named #6 on a list of “The Most Influential Turkish Americans” in the April 23rd edition of Turk of America Magazine. This was not the first time Melih was recognized by Turk of America. He graced its cover in…
Reading Time: 1 minute Mozilla is making its Firefox browser SSL verification stronger, and asking for help in making sure it works. Mozilla will pay $10,000 for critical vulnerabilities found in its new code. Mozilla will reward identifying bugs that allow the construction of certificate chains that are accepted as valid when they should be rejected or can lead…
Reading Time: 4 minutes It is virtually impossible for the files of known viruses used by conventional scanners to be fully up to date. Independent tester AV-Test Labs recently estimated that there are up to 55,000 new malware variants released into the wild each day. This sounds amazing, but is actually a conservative testing. Some analyst say there are…
Reading Time: 2 minutes Over the past 6 months US retailers and American consumers have been rocked by a string of high profile Point of Sale System card data breaches, starting with the massive breach at Target last December. Now, the retail arts & crafts supplier Michaels Stores and their customers join the list of victims of criminal hackers….
Reading Time: 2 minutes Should Google favor sites with SSL in their search results? Matt Cutts thinks so. He is the very public head of Google’s Webspam team and works on search engine optimization issues. In recent weeks, Cutts has expressed his opinion at various conferences and public settings that Google should update its search algorithm to reward sites…
Reading Time: 2 minutes Phishing is associated with fraudulent activities and stealing personal information on web. The sensitive information including passwords, ID and details of credit cards are acquired by the process of phishing. This kind of ID theft takes place through electronic communication. Thus you should be very careful while using net and accessing emails in your inbox….
Reading Time: 3 minutes Any list of memorable computer viruses would have to include the SQL Slammer virus, unleashed in 2003. I certainly remember it. I was with UPS IT at the time and we had multiple servers go down from it. The virus name is a bit misleading because it did not involve SQL, the Structured Query Language…
Reading Time: 2 minutes Last week, a Federal court affirmed the right of the US Federal Trade Commission (FTC) to sue companies who have suffered a data breach for failure to comply with federal regulations and appropriate practices. This decision, which was not on the merits of the specific case, highlights how much a company that suffers a data…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
agreecheck
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP