Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Reading Time: 2 minutes The US military may be trained to dodge bullets and bombs, but now they are being targeted with bits and bytes in the ever expanding cyberwar. Microsoft has confirmed that flaws in their Internet Security 10 browser have been exploited to spread malware on web sites frequented by US Military personnel and veterans. The attacks…
Reading Time: 3 minutes The notorious ZeuS Banking Trojan seems to be immortal, like its Greek God namesake. In December it was reported that a new 64bit version of this banking focused credential stealer might soon be seen in the wild. This month, there are two reports of ZeuS variants on the loose, each with unique features for deceiving…
Reading Time: 1 minute Looking to save money on SSL and use Microsoft Exchange? Unified Communications SSL Certificates or Exchange SSL were created specifically for the Microsoft Exchange and/or Microsoft Office Communication Server environments.Comodo is one of the Internet’s only providers of UC SSL Certificates. Trusted by over 99.9% of current browsers, UC SSL Certificates can be issued in…
Reading Time: 2 minutes Microsoft Windows is the dominant operating system in business organizations for desktops and intranet servers. It is also the number one target platform for hackers. Some hackers simply hate Bill Gates and Microsoft for being such a force in the market and others just see it as the biggest target. And the greatest threat to…
Reading Time: 2 minutes More and more unwitting email and Internet users are getting hooked by phishing scams, and it can be painful indeed. Phishing is a scam used by identity thieves to trick you into providing your sensitive personal or financial information. Thieves use official-looking emails to impersonate trusted entities like banks, credit card companies, and online resources…
Reading Time: 3 minutes “I’m from the government and I’m here to help”. You may know that this statement is often listed among “The World’s Greatest Lies”, along with “The check is in the mail”. Well, there are times when the government is really here to help. While Americans vigorously debate and disagree about the role and scope of…
Reading Time: 1 minute Could a breach at a HVAC company specializing in supermarket refrigeration have led to the Target Data breach? Apparently so, according to mega retailer Target and Pennsylvania based Fazio Mechanical Services. This raises a “chilling” possibility that hackers are even more sophisticated in their planning than most believed and can identify and exploit relatively obscure…
Reading Time: 2 minutes Trust is the currency of the internet. Without it, communication, commerce or collaboration cannot take place. How do we know? Because 21% of internet visitors won’t shop online at all! And many more shop on only a few, very large sites. Yet establishing trust with customers is critical because it allows you to engage with…
Reading Time: 3 minutes All Americans know that, according to our Declaration of Independence, we all have a right to “Life, Liberty and the pursuit of property”. Oops! That’s not the Declaration. That’s a quote from John Locke. Thomas Jefferson switched “property” to “happiness” when drafting the Declaration. However, it should be kept in mind that property rights were…
Reading Time: 2 minutes Still perfect! Once again, Comodo Internet Security Premium (CIS) software earned another 100% protection score in the most recent evaluation period of AV-Test.org. Comodo earned a perfect score with 100% protection against zero-day malware attacks during November and December and a near-perfect score for the detection of prevalent malware with 99% and 100% protection ratings…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats