United States Opportunities
Experience with the concepts and technologies powering Content Delivery Networks Handling, Monitoring tools (NAGIOS , Xymon , Grafana),...
Work closely with Digital Marketing Team to develop new cost-effective strategies to bringup leads. Think outside the box to identify new...
Conduct research, analyse on-site content and complete technical audits. Perform keyword research, write optimized HTML tags, provide...
Install, configure, and maintain Microsoft Active Directory domains and forests, including bare metal and virtual Windows server management. ...
Provides desktop support to local teams in Iasi Troubleshoots/maintains hardware PCs, servers Maintains, extends,...
Implement from scratch a new framework for mobile applications that allow others to write on their own new security applications. ...
Web application development, Back-end and Front-end development with Yii framework, Phalcon 3 and ReactPHP.
Comodo Enterprise Security (CES) solutions help business realize impressive cost savings and operational efficiencies. Each solution delivers superior protection against the Internet's most malicious...
Reading Time: 5 minutes Comodo Cyber Security team reveals the inner-workings of the latest strain of this persistent threat The Comodo Cyber Security team constantly researches the latest ransomware to help better protect our users and to share our findings with the wider...Learn More
Reading Time: 4 minutes Most people are aware of ransomware by now, certainly those who regularly read the Comodo blog section and similar publications. For those who don’t, ransomware is an attack whereby the attacker encrypts all the files on a victim’s computer or...Learn More
Reading Time: 4 minutes Introduction of PSIXBOT: PsiXBot is data-stealing trojan capable of harvesting confidential data and passwords from a victim’s computer. It can steal cookies, extract logins/passwords from applications like Firefox and Microsoft Outlook, record the...Learn More
Black Hat USA is the world's leading information security event, providing attendees with the very latest in research, development and trends.GET YOUR THREAT RISK REPORT READY >>
Attend The Texas Technology Summit to get the right tools and make vital connections to best prepare your company for the broad spectrum of ever-changing technology trends.Register Now
Join over 7,000 Comodo partners and begin your journey to secure, lasting revenue growth. Simply browse through our programs and products and contact us if you need any assistance.Contact an Advisor
Generate long-term revenues by reselling Comodo's proven range of enterprise security, productivity and endpoint management solutions.Begin the Process