Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Reading Time: 2 minutes Update: check the latest version of Comodo’s free mobile security app Mobile Devices, such as smartphones and tablets, are the hottest portion of the computing market these days. The fastest growing segment of this market is devices that use the Android operating system. This has not gone unnoticed by hackers and fraudsters who seek to…
Reading Time: 2 minutes Millions of Americans are working hard these days to finalize their tax returns before the annual April 15th deadline. With the IRS on our minds, hackers are launching phishing email campaign pretending to be from our favorite agency in the US Treasury department. If you get such an email threatening that you will be turned…
Reading Time: 3 minutes If you are confused about what Antivirus protection is provided by Windows, don’t feel bad. Microsoft has changed its strategy and product name several times over the years. For Windows 7 they bundled an Antivirus system with a package of applications called Windows Essentials that you installed separate from the operating system. With Windows 8…
Reading Time: 2 minutes Microsoft is working furiously to convince users of Windows XP to abandon the venerable operating system before they end support on April 8th, warning of dire consequences when they halt the release of security patches. Most of this attention has been on individual XP users and small businesses. No large business would still be committed…
Reading Time: 1 minute Recently, we reviewed a document of best practices in deploying SSL Certificates published by Qualys, a prominent security company. Their document had some very good advice. In particular, we agree whole heartedly with their recommendation that an SSL user should “obtain certificates from a reliable Certificate Authority”. They went on to list criteria that you…
Reading Time: 2 minutes Retailers who accept credit cards must periodically demonstrate that they are in compliance the Payment Card Industry Data Security Standards (PCI DSS). Large retailers are required to undergo periodic audits by independent auditors, called qualified security assessors (QSAs). In a very unusual move this week, the QSA for Target was named in a Federal lawsuit…
Reading Time: 2 minutes Comodo announced today the initial release of its free Comodo ModSecurity Rules for the LiteSpeed Web Server. ModSecurity rules are used by the popular ModSecurity Apache ™web server plug-in to provide advanced network filtering, security and intrusion protection. Melih Abdulhayoglu, Comodo CEO and Chief Security Architect pointed to this release as an example of the…
Reading Time: 3 minutes Now more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus for pc is a key step in defending against cyberthreats New malware is created everyday, and hackers have grown more sophisticated – logging hours of time following social media sites to engineer new forms of…
Reading Time: 2 minutes One of the most annoying and often dangerous computer compromises is browser hijacking. You probably have experienced it. A program changes your home page, redirects browser typos to a search engine you have never heard of or to other sites. This is annoying, popping up ads and displaying unwanted site. However, it is often malicious….
Reading Time: 1 minute Firefox 28, released on Tuesday, provided numerous important security fixes including 5 for flaws identified in the recent Pwn2Own competition. Pwn2Own is a hacking competition where each successful exploit earned the researcher(s) $50,000. FireFox was hacked successfully this year more than any other browser. This includes a zero-day execution bug that when combined with another…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
agreecheck
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP