Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Reading Time: 2 minutes First came Symantec and Norton (January 18th Blog). Next up was McAfee (January 20th Blog). Now it’s VeriSign’s turn.
Reading Time: 3 minutes If you happen not to have been a frequent reader of the Blog contributions I’ve published within the Social Media section of Comodo’s Web site (and picked up on Comodo’s Facebook page), here’s your chance to catch up. – Selectively.
Reading Time: 2 minutes Today, across America and all around the world, whenever you walk out your door there are thousands of laws, statutes and regulations to protect you. Yet, when you visit the virtual world of the Internet, the protection legislative and law enforcement bodies around the globe provide is scant. Why?
Reading Time: 2 minutes You sweat bullets. You research, conduct focus groups, design and test market products tailored explicitly to answer the needs of your customers. You name them enticingly, package them alluringly and price them attractively. Then you build a Web site that displays them, wrapped in a design that highlights them, with copy that glorifies them, and…
Reading Time: 3 minutes By late May, 2000 it was common. In the suburbs that circle Manhattan and the villages surrounding Paris. In Tokyo, Toronto and Topeka. And Melbourne, Moscow and Mumbai. In a word, everywhere. All around the globe, hundreds of thousands of bank statements made the same statement: “YOU’VE BEEN ROBBED!” What had happened? I LOVE YOU….
Reading Time: 2 minutes The rest of the Antivirus, Internet Security and PC Support industry may be headed for February, but it’s still the Season of Giving as far as Comodo is concerned. Sure, Comodo has always had a reputation for offering you high quality Internet security software at low or no cost (Free Internet Security). But since the…
Reading Time: 3 minutes No, I don’t mean the 99% of us that Occupy Wall Streeters recently defined as not ready to amass the minimum $344,000 annual income it takes to qualify as a “One Percenter.” Instead, the 99% I’m talking about are all of the computer owners out there who just aren’t as astute at exploring the Internet…
Reading Time: 2 minutes Confession may be good for the soul. But it certainly isn’t good for the millions of poor souls using your “hackable” Internet Security products. You can’t make this stuff up! Within days of Symantec’s and Norton’s embarrassing “hacker-breach” announcement, a spokesman for McAfee has stepped forward to admit that they too have discovered a flaw…
Reading Time: 2 minutes Perhaps you read the press release. If not, here’s a synopsis of what it said. Of the dozen well known Internet Security Software products subjected to the current gauntlet of 110 rigorous tests that comprise the Matousec Proactive Security Challenge, Comodo Internet Security Premium took top honors by a wide margin with a score of…
Reading Time: 2 minutes Symantec’s Norton Internet Security Software. You can see their big-bucks commercials on your TV almost any night of the week. And find their full page ads in popular magazines everywhere. They’re all over the radio, Internet and trade show circuit. Making big claims, and even bigger promises. No question about it. For years, Norton has…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats