Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Reading Time: 2 minutes Trust is the currency of the internet. Without it, communication, commerce or collaboration cannot take place. How do we know? Because 21% of internet visitors won’t shop online at all! And many more shop on only a few, very large sites. Yet establishing trust with customers is critical because it allows you to engage with…
Reading Time: 3 minutes All Americans know that, according to our Declaration of Independence, we all have a right to “Life, Liberty and the pursuit of property”. Oops! That’s not the Declaration. That’s a quote from John Locke. Thomas Jefferson switched “property” to “happiness” when drafting the Declaration. However, it should be kept in mind that property rights were…
Reading Time: 2 minutes Still perfect! Once again, Comodo Internet Security Premium (CIS) software earned another 100% protection score in the most recent evaluation period of AV-Test.org. Comodo earned a perfect score with 100% protection against zero-day malware attacks during November and December and a near-perfect score for the detection of prevalent malware with 99% and 100% protection ratings…
Reading Time: 1 minute Yahoo was the first internet email account I ever used, way back in the late 1990’s. I used that account for my personal email until 2 years ago when my contact book was hacked. Everyone in my book received phishing emails supposedly from me. I only use the account today for various newsletters. Using separate…
Reading Time: 1 minute Open source software is great, especially the part about being able to use it without paying a license. The underlying source code is also made available for community development. Unfortunately, hackers can take advantage of it to make fake copies of popular software. This is called “trojanizaiton” The Filezilla project confirmed this week that fake…
Reading Time: 3 minutes Jean had a problem, she was managing over 200 endpoints and had no visual way to distinguish what devices were compliant, or even worse, had malware. To complicate matters, her current endpoint manager used antiquated black listing technology that left her vulnerable to zero-day threats and advanced persistent threats. Then it happened that an unsuspecting…
Reading Time: 4 minutes While other security companies and their users are still struggling to deal with the infamous ransomware Cryptolocker, we have no worries at Comodo. In fact, if you use our Comodo Endpoint Security, with our unique Auto-Sandbox technology, you are already safe and secure from Cryptolocker 2.0 (officially entitled Prison Locker or Power Locker) and other soon-to-go-wild…
Reading Time: 2 minutes The recent data breach at the luxury specialty retailer Neiman Marcus has been overshadowed the mega data breach agt the retailing giant Target. However, it is nothing to sneeze at. With 1.1 million debit and credit cards compromised the consequences many be huge. While this pales in numbers to the Target breach, with an estimated…
Reading Time: 2 minutes What do you do when your network is infected and nothing you do can get rid of the problem? Fetco™ Home Decor, a leading designer and wholesaler of photograph frames, photo albums, office decor, and home accent pieces, had just such a problem. They had discovered a virus outbreak within the firm which persistently re-infected…
Reading Time: 3 minutes In the late 80’s and 90’s, most of the projects I was involved with were about converting paper based systems to computer entry, mostly PCs. In those days, it was very easy for a project to show results. Even a poorly designed system could easily show dramatic productivity improvement by replacing paper based data with…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
agreecheck
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP