Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Reading Time: 2 minutes Microsoft is working furiously to convince users of Windows XP to abandon the venerable operating system before they end support on April 8th, warning of dire consequences when they halt the release of security patches. Most of this attention has been on individual XP users and small businesses. No large business would still be committed…
Reading Time: 1 minute Recently, we reviewed a document of best practices in deploying SSL Certificates published by Qualys, a prominent security company. Their document had some very good advice. In particular, we agree whole heartedly with their recommendation that an SSL user should “obtain certificates from a reliable Certificate Authority”. They went on to list criteria that you…
Reading Time: 2 minutes Retailers who accept credit cards must periodically demonstrate that they are in compliance the Payment Card Industry Data Security Standards (PCI DSS). Large retailers are required to undergo periodic audits by independent auditors, called qualified security assessors (QSAs). In a very unusual move this week, the QSA for Target was named in a Federal lawsuit…
Reading Time: 2 minutes Comodo announced today the initial release of its free Comodo ModSecurity Rules for the LiteSpeed Web Server. ModSecurity rules are used by the popular ModSecurity Apache ™web server plug-in to provide advanced network filtering, security and intrusion protection. Melih Abdulhayoglu, Comodo CEO and Chief Security Architect pointed to this release as an example of the…
Reading Time: 3 minutes Now more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus for pc is a key step in defending against cyberthreats New malware is created everyday, and hackers have grown more sophisticated – logging hours of time following social media sites to engineer new forms of…
Reading Time: 2 minutes One of the most annoying and often dangerous computer compromises is browser hijacking. You probably have experienced it. A program changes your home page, redirects browser typos to a search engine you have never heard of or to other sites. This is annoying, popping up ads and displaying unwanted site. However, it is often malicious….
Reading Time: 1 minute Firefox 28, released on Tuesday, provided numerous important security fixes including 5 for flaws identified in the recent Pwn2Own competition. Pwn2Own is a hacking competition where each successful exploit earned the researcher(s) $50,000. FireFox was hacked successfully this year more than any other browser. This includes a zero-day execution bug that when combined with another…
Reading Time: 1 minute SSL Certificates will only be recognized by a browser if the Root Certificate of the CA is present within the “trusted Root Certificates” store of the browser. CA Root Certificates are added into the trusted Root Certificate store by the browser or operating system vendor, such as Microsoft or Netscape. In general SSL vendors need…
Reading Time: 3 minutes Community banks and credit unions are taking a best practices approach to mutual authentication by opting for two factor solutions that offer the highest levels of security and authentication without sacrificing usability. To meet regulatory guidelines, many financial institutions felt compelled to quickly deploy a two-factor solution even though it was expected to be difficult…
Reading Time: 2 minutes It’s a sign of the times that when retailer Sally Beauty reported this week that “fewer than 25,000” cardholders were impacted by a recent data breach it was met with a sigh of relief. The exposure pales in comparison to the 100 million card holders impacted by the Target data breach or the 1 million…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats