Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Reading Time: 1 minute Adobe has released security updates to address a vulnerability in Flash Player which could potentially allow a remote attacker to take control of an affected system. The updates are for Windows, Apple’s Mac and Linux. These updates provide additional protection against a critical vulnerability in the handling of a dereferenced memory pointer that could lead…
Reading Time: 2 minutes You can’t do e-Commerce or exchange personal information without an encrypted connection. You could try, but you won’t be able to accept credit cards and would be a sitting duck for hackers and fraudsters. When looking for an SSL certificate to enable an SSL secured connection, people tend to look at factors such as price,…
Reading Time: 1 minute Docker has released a critical security updates to address security flaws in Docker versions prior to version 1.3.2. These include fixes for two critical vulnerabilities, one of which could allow an attacker to escalate privileges and execute remote code. Docker is a popular open source project for Linux that automates application deployment of applications inside…
Reading Time: 2 minutes The first video phone was a sensation at the 1939 World’s Fair, and again a quarter century later at the 1964 World’s Fair. It was the tech of the future! Somehow, it seemed to be always in the future and people began wondering whether the future would ever arrive for it. As sometimes happen, the…
Reading Time: 2 minutes Update: check the latest version of Comodo’s free mobile security app Apple released security updates for iOS devices, OS X Yosemite and Apple TV this week to address multiple vulnerabilities. 1) Updates available include:iOS 8.1.1 for iPhone 4s and later, iPod touch 5th generation and later, and iPad 2 and later. Apple claims that the…
Reading Time: 2 minutes These are troubled times for the US Postal Service, due to the threat that email and electronic communication has posed to its monopoly on first class mail. The last thing the system needed was a massive data breach that raises many uncomfortable questions for the service and for the Administration. This week, the USPS revealed…
Reading Time: 2 minutes Among its monthly bulletins announced this week, Microsoft announced a fix for vulnerability so old that if it was a person it could vote and have a driver’s license. Interestingly, it is a very serious bug that could be exploited to take control of the user’s computer, yet there is no indication that it has…
Reading Time: 2 minutes Web sites have never been more under attack by hackers and E-commerce sites are a prime target. Right now, do you know if your web site is infected with malware? PCI Vulnerability Scanning is designed for Website owners and E-commerce Merchants to secure transactions, in accordance with PCI Standards. PCI standards on their externally facing…
Reading Time: 2 minutes Comodo announced today announced that our Cloud-based AntiSpam Gateway (ASG) service filtered its 100 millionth email last month with over one half million viruses blocked. To-date, ASG has filtered 119,060,160 emails of which 83,691,511 were found to be spam and 563,468 viruses blocked by ASG. That’s a lot of spam our customers do not have…
Reading Time: 2 minutes Many e-Commerce sites display “Trust Seals”, aka Trust Mark Logos, provided by third parties who have conducted an independent audit of the site or its ownership. The concept did not start with the web era. It is essentially the same as the “Good Housekeeping Seal of Approval”, which attests that a product has been tested…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
agreecheck
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP