Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Reading Time: 2 minutes April 8th, 2014 is D-Day for Windows XP users everywhere. That’s when Microsoft is going to end support for its venerable operating system, first launched way back in 2001. Users of XP have been remarkably slow to upgrade to newer versions of Windows, creating an odd situation for Microsoft. It speaks highly of their product,…
Reading Time: 2 minutes Update: check the latest version of Comodo’s free mobile security app Mobile device security, long neglected by device makers, Internet software makers and end users, is increasingly becoming a high priority. Mobile is the direction of computing these days, and hackers are approaching the popular mobile platforms as targets of opportunity. Comodo is stepping up…
Reading Time: 2 minutes There are two things I‘ve learned for sure from studying internet security issues: Anyone can be hacked and hackers always have something new up their devious sleeves. The news that Google+ has been breached is a case in point. Yesterday, the blog site searchengine.com reported that URLs for hotels in Google+ local hospitality listings had…
Reading Time: 2 minutes The Target data breach is a story that is not going to go away anytime soon. When Target first reported the breach of its Point of Sale System and credit card data last month, it was the largest reported data breach of the year and one of the most significant in history. According to a…
Reading Time: 1 minute Comodo is excited to be attending the annual RSA Conference in San Francisco, Feb 24th through 28th, at the Masconi Center in San Francisco CA. The RSA Conference is a cryptography and information security-related conference. The San Francisco meeting is the flagship event and is held each year in San Francisco, California, United States. Other…
Reading Time: 2 minutes If your web sites need SSL for subdomains a Wildcard SSL Certificate could be a great option. You can be purchase one that will cover a domain and all its subdomains. For example, you can apply one that covers peanutbutter.com, crunchy.peanutbutter.com, smooth.peanutbutter.com and fatfree.peanutbutter.com They save costs and are easy for system administrators to manage…
Reading Time: 2 minutes Millions of unsuspecting users were injected with malicious malware content because a number Yahoo’s advertising servers were compromised with malvertising. The malware could allow the hackers to take control of the victim’s computers. The malicious content was distributed through ads.yahoo.com over at least a 3 day period. The infected servers hosted malicious content which in…
Reading Time: 2 minutes It’s time for a change. The current credit card system has proven exceptionally vulnerable to breaches due, in part, to outdated technology. Retailers that suffer breaches, such as Target, are vulnerable to law suits from consumers who have their personal information stolen, but the retailer is merely the customer interface to a system that has…
Reading Time: 1 minute If your organization uses an MS® Exchange 2010 or Office Communications Server environment, you can consolidate all of your certificates into a single UC Certificate. Using the Subject Alternative Name (SAN) field in a UC Certificate allows you to host multiple SSL-enabled websites on a single server – eliminating the need for multiple static IP…
Reading Time: 2 minutes According to a Reuters report, an unidentified hacker seized control of one of the servers within the BBC network. The public broadcaster couldn’t find the culprit immediately when the hack was in progress because it took place on Christmas day when everyone was busy and manpower was short. Getting inside such a highly secured news…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
agreecheck
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP