Articles

 

Advantages of the Using Antispam Software

07.13.2018

Spamming refers to the practice of sending unsolicited messages especially advertising messages to a group of recipients. Unsolicited messages mean the recipient did not grant permission for those message to be sent. Anti-spam refers to the use of any software, hardware or...

 

Sensitive Data on a U.S. Air Force Drone Breached Through Home Router Vulnerability

07.12.2018

Drone aircraft are some of the U.S. Air Force’s deadliest weapons. Information on how to operate them can be very dangerous if it falls into the wrong hands. If that sort of data was breached and exfiltrated, you’d expect the attack vector would be an obscure zero-day...

 

Cybercriminals turn Microsoft Excel into their accessory with a new trick to attack users

07.11.2018

Perpetrators go on inventing cunning techniques to attack users. One of the most popular tricks of infecting a computer is poisoned MS Office files with a malicious script inside. A new dangerous threat related to this kind of attack has newly appeared. Hackers use .IQY files to...

 

Top 7 Preventive Measures To Be Exercised When You Receive Spam Emails

07.10.2018

Ever since the advent of the internet, information security has become a serious matter of concern for many, especially, when people communicate and transfer a lot of information data online from one side of the world to the other. Particularly, when customers key in their...

 

What is Anti-spam?

07.07.2018

Spamming refers to use of an electronic messaging system to send unsolicited messages especially advertising messages to a group of recipients. Unsolicited messages mean the recipient did not grant permission for those message to be sent. Anti-spam refers to the use of any...

Archives

Press

08.08.2018

Press Release

Comodo Cybersecurity Launches Zero-day Challenge To Av Industry

Read More
08.07.2018

Press Release

Comodo Cybersecurity Releases Q2 Global Threat Report

Read More
07.30.2018

Press Release

Western New Mexico University Chooses Comodo Cybersecurity As Endpoint Security Provider

Read More

Case Studies

Case Study

Massena Memorial Hospital

A Leading Managed Services Provider Leverages Comodo's Advanced Endpoint Security Solution to Protect and Secure Its Own – and Its Customers' Environments

The One Point
Learn More
Onepoint Logo

Organization Trusts Comodo's Advanced Endpoint Protection Technology to Stay Malware Free.

Christian Motorcyclists Association
Learn More
Christian Moto Association
View All Case Studies

Events

Blackhat
09.19.2018 – 09.20.2018

Featured Event

IntY CloudFest 2018

A not to be missed two-day event, IntY CloudFest brings together all the elements you need to succeed under one roof of a world-class venue - Celtic Manor. Uncover how the power of many SaaS applications can deliver increased profitability, super stickiness and predictable recurring revenue streams.

Secure World
08.21.2018

Event

SecureWorld - Bay Area

ASCII Logo
08.22.2018 – 08.23.2018

Event

ASCII - Toronto

Secure World
09.06.2018

Event

SecureWorld - Twin Cities

Secure World
09.18.2018 – 09.19.2018

Event

SecureWorld -
St. Louis

Comodo Product Information

Need More Info?

Join over 7,000 Comodo partners and begin your journey to secure, lasting revenue growth. Simply browse through our programs and products and contact us if you need any assistance.

Contact an Advisor
Become a Partner

Partner Now

Generate long-term revenues by reselling Comodo's proven range of enterprise security, productivity and endpoint management solutions.

Begin the Process

Set Your Defense at Hour Zero

Get in Touch: