Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Reading Time: 2 minutes We have been very proud of the performance of Comodo Internet Security in the Matousec.com “Proactive Internet Security Challenge 64” over the past year. It’s worth taking some time to explain why this matters. A great resource for Internet security pros are Matousec and their website Matousec.com. They are an independent project run by security…
Reading Time: 2 minutes Online shopping, online banking and general storage of personal information on personal computers have made consumers more vulnerable to identity theft than ever before. You now have to worry about hackers, spyware, and Trojan horse programs. With the right software, hackers can crack your login information including usernames and passwords. With this information, they can…
Reading Time: 3 minutes Update: check the latest version of Comodo’s free mobile security app The age of BYOD, where users want to use their favorite smartphone or tablet for work and connect to their companies network, has been a challenge for IT management. It was hard enough when each employee had a company desktop or laptop, but now…
Reading Time: 2 minutes The US military may be trained to dodge bullets and bombs, but now they are being targeted with bits and bytes in the ever expanding cyberwar. Microsoft has confirmed that flaws in their Internet Security 10 browser have been exploited to spread malware on web sites frequented by US Military personnel and veterans. The attacks…
Reading Time: 3 minutes The notorious ZeuS Banking Trojan seems to be immortal, like its Greek God namesake. In December it was reported that a new 64bit version of this banking focused credential stealer might soon be seen in the wild. This month, there are two reports of ZeuS variants on the loose, each with unique features for deceiving…
Reading Time: 1 minute Looking to save money on SSL and use Microsoft Exchange? Unified Communications SSL Certificates or Exchange SSL were created specifically for the Microsoft Exchange and/or Microsoft Office Communication Server environments.Comodo is one of the Internet’s only providers of UC SSL Certificates. Trusted by over 99.9% of current browsers, UC SSL Certificates can be issued in…
Reading Time: 2 minutes Microsoft Windows is the dominant operating system in business organizations for desktops and intranet servers. It is also the number one target platform for hackers. Some hackers simply hate Bill Gates and Microsoft for being such a force in the market and others just see it as the biggest target. And the greatest threat to…
Reading Time: 2 minutes More and more unwitting email and Internet users are getting hooked by phishing scams, and it can be painful indeed. Phishing is a scam used by identity thieves to trick you into providing your sensitive personal or financial information. Thieves use official-looking emails to impersonate trusted entities like banks, credit card companies, and online resources…
Reading Time: 3 minutes “I’m from the government and I’m here to help”. You may know that this statement is often listed among “The World’s Greatest Lies”, along with “The check is in the mail”. Well, there are times when the government is really here to help. While Americans vigorously debate and disagree about the role and scope of…
Reading Time: 1 minute Could a breach at a HVAC company specializing in supermarket refrigeration have led to the Target Data breach? Apparently so, according to mega retailer Target and Pennsylvania based Fazio Mechanical Services. This raises a “chilling” possibility that hackers are even more sophisticated in their planning than most believed and can identify and exploit relatively obscure…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
agreecheck
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP