Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Reading Time: 3 minutes The Domain Name System is fundamental to the functioning of the internet and works so well that we rarely consider how it works. Most people do not even realize that we have options to choose from that can improve our internet performance and enhance our security. Before I get to the choices, let’s review DNS. What is…
Reading Time: 2 minutes Comodo announced last week that our Comodo Internet Security Premium (CIS) software earned a 100% protection score in the most recent evaluation period of AV-Test.org. Comodo made significant improvements to its false positive rate by decreasing the number of false detections of legitimate software as malware from nine to only two. Although six security products…
Reading Time: 2 minutes As the country begins the full implementation of the Affordable Care Act, which coincides with the government effort to digitize medical records, it is disconcerting to note that the track record of government in data security is pretty awful. There has been a lot of news recently about the potential security vulnerability of the healthcare.gov…
Reading Time: 2 minutes Comodo announced today announced that their Cloud-based AntiSpam Gateway (ASG) service filtered its 50 millionth email on Sunday, December 1, 2013. To-date, ASG has filtered 50,911,110 emails of which 37,954,073 were found to be spam and over 140,000 viruses were blocked by ASG. Live statistics are available of the Antispam website found here http://www.comodo.com/business-security/email-security/antispam-gateway.php
Reading Time: 2 minutes The Facebook monitoring system and data analysis technologies have been become very controversial over privacy concerns. They are even being criticized by Tim Berners-Lee, the founder of the World Wide Web. Sir Tim has been urging companies and countries to make data collection a transparent process so that everyone knows what’s going around them. Now,…
Reading Time: 3 minutes Comodo Deploys AntiSpam Gateway for Edward F. Bukaty, III Law firm to Provide Proactive Spam Filtering, Increased Productivity and Protection from Email Based Virus & Malware Threats Overview: The law offices of Edward F. Bukaty, III, P.L.C., a professional law firm founded in 1978, discovered a virus outbreak had occurred. Microsoft Security Essentials (MSE) was…
Reading Time: 2 minutes With the continued evolution of modern day super-computers and processing power, there exists the chance, albeit remote, that hackers could acquire the raw processing power to brute force 1024 bit RSA keys within the next 20 years. As a preemptive measure against this possibility, the National Institute of Standards (NIST) and Certificate Authority/Browser (CA/B) forum…
Reading Time: 3 minutes The Secure Sockets Layer (SSL) allows you to communicate over the Internet with a secure and encrypted connection. SSL is probably most associated with web sites and email, but it can be used with almost any Internet service.
There are two components to a secure connection:
1) Encryption: This is the process of encoding message between the parties communicating so only they know the content.
2) Assurance: This ensures that the party you think you are communicating with is actually who you think they are.
Reading Time: 2 minutes I was recently reviewing Verizon’s recently annual Data Breach Investigations Report for 2013, published earlier this year. It is must reading for anyone who has an interest in data security. Actually, if there is anyone who isn’t they should be! There are a lot fascinating findings in this year’s edition, enough to inspire numerous blog…
Reading Time: 3 minutes “You are being watched. The government has a secret system: a machine that spies on you every hour of every day.” This is from the opening voice over of one of my favorite TV shows, ”Person of Interest”. Like all good science fiction it takes existing technology and extrapolates a possible future based on where…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
agreecheck
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP