Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Reading Time: 1 minute Open source software is great, especially the part about being able to use it without paying a license. The underlying source code is also made available for community development. Unfortunately, hackers can take advantage of it to make fake copies of popular software. This is called “trojanizaiton” The Filezilla project confirmed this week that fake…
Reading Time: 3 minutes Jean had a problem, she was managing over 200 endpoints and had no visual way to distinguish what devices were compliant, or even worse, had malware. To complicate matters, her current endpoint manager used antiquated black listing technology that left her vulnerable to zero-day threats and advanced persistent threats. Then it happened that an unsuspecting…
Reading Time: 4 minutes While other security companies and their users are still struggling to deal with the infamous ransomware Cryptolocker, we have no worries at Comodo. In fact, if you use our Comodo Endpoint Security, with our unique Auto-Sandbox technology, you are already safe and secure from Cryptolocker 2.0 (officially entitled Prison Locker or Power Locker) and other soon-to-go-wild…
Reading Time: 2 minutes The recent data breach at the luxury specialty retailer Neiman Marcus has been overshadowed the mega data breach agt the retailing giant Target. However, it is nothing to sneeze at. With 1.1 million debit and credit cards compromised the consequences many be huge. While this pales in numbers to the Target breach, with an estimated…
Reading Time: 2 minutes What do you do when your network is infected and nothing you do can get rid of the problem? Fetco™ Home Decor, a leading designer and wholesaler of photograph frames, photo albums, office decor, and home accent pieces, had just such a problem. They had discovered a virus outbreak within the firm which persistently re-infected…
Reading Time: 3 minutes In the late 80’s and 90’s, most of the projects I was involved with were about converting paper based systems to computer entry, mostly PCs. In those days, it was very easy for a project to show results. Even a poorly designed system could easily show dramatic productivity improvement by replacing paper based data with…
Reading Time: 2 minutes April 8th, 2014 is D-Day for Windows XP users everywhere. That’s when Microsoft is going to end support for its venerable operating system, first launched way back in 2001. Users of XP have been remarkably slow to upgrade to newer versions of Windows, creating an odd situation for Microsoft. It speaks highly of their product,…
Reading Time: 2 minutes Update: check the latest version of Comodo’s free mobile security app Mobile device security, long neglected by device makers, Internet software makers and end users, is increasingly becoming a high priority. Mobile is the direction of computing these days, and hackers are approaching the popular mobile platforms as targets of opportunity. Comodo is stepping up…
Reading Time: 2 minutes There are two things I‘ve learned for sure from studying internet security issues: Anyone can be hacked and hackers always have something new up their devious sleeves. The news that Google+ has been breached is a case in point. Yesterday, the blog site searchengine.com reported that URLs for hotels in Google+ local hospitality listings had…
Reading Time: 2 minutes The Target data breach is a story that is not going to go away anytime soon. When Target first reported the breach of its Point of Sale System and credit card data last month, it was the largest reported data breach of the year and one of the most significant in history. According to a…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
agreecheck
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP