Fake virus warning con artists arrested in India


Imagine that you’re surfing the web, and suddenly a popup appears on your screen with an ominous message. “Your computer has been infected with a virus. Call our toll-free number immediately for help.” People savvy enough to understand how legitimate antivirus...


The United States, Russia, and China Notably Absent from International Cybersecurity Accord


The Geneva Convention was signed in 1949, a reaction of sorts to World War II. The Second Great War was completely devastating to Europe, to combatants and civilians alike, and the Convention called for warring parties to treat prisoners of war humanely, and to protect civilians...


Marriott Data Breach – You Check In and Your Personal Info Checks Out


Data breaches are occurring with increasing frequency at name-brand companies, and it’s certainly cause for concern. Millions of customers worldwide are typically harmed by these incidents, and more often than not sensitive identification and financial data is leaked. Now the...


What is Email Security?


Emails have been the easiest and quick mode of communication be it for personal or for business reasons by far. However, hackers find emails as the easy medium to spread malware through deceptive spam emails convincing target victims to click open the attachments or links that...


An exclusive look into the Toronto C3X cybersecurity competition


As an active member of Toronto’s cybersecurity community, I was honored that RedBlack Cybersecurity founders Lee Kagan and Ben Wells invited me to be a mentor for this year’s C3X competition, which involves students from multiple Toronto colleges. RedBlack describes C3X as...



Press Release

Microsoft, Paypal And Google Top Brands Targeted By Phishing Campaigns, According To Comodo Cybersecurity Global Threat Report

Read More

Press Release

New Comodo Cybersecurity Services Respond To Mounting Smb Cyberattacks

Read More

Press Release

Comodo Cybersecurity And Partner To Deliver Web Security To South African Site Hosting Market

Read More

Case Studies

Case Study

Massena Memorial Hospital

A Leading Managed Services Provider Leverages Comodo's Advanced Endpoint Security Solution to Protect and Secure Its Own – and Its Customers' Environments

The One Point
Learn More
Onepoint Logo

Organization Trusts Comodo's Advanced Endpoint Protection Technology to Stay Malware Free.

Christian Motorcyclists Association
Learn More
Christian Moto Association
View All Case Studies

Upcoming Events


Featured Event

11.11.2018 – 11.14.2018

FS ISAC 2018 Chicago

The only industry forum for collaboration on critical security threats facing the global financial services sector.


Featured Event


Evanta CISO Executive Summit Q4

Our "by CISOs, for CISOs" model ensures the brightest minds in security are in the room, and every CISO gains valuable knowledge and connections from our invitation-only conference.

Comodo Product Information

Need More Info?

Join over 7,000 Comodo partners and begin your journey to secure, lasting revenue growth. Simply browse through our programs and products and contact us if you need any assistance.

Contact an Advisor
Become a Partner

Partner Now

Generate long-term revenues by reselling Comodo's proven range of enterprise security, productivity and endpoint management solutions.

Begin the Process

Set Your Defense at Hour Zero

Get in Touch: