- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
-
Impenetrable cybersecurity without sacrificing usability
-
Gain detailed visibility into all your endpoints activities
-
Reduce the attack surface to remediate and patch
-
Fortify mobile devices that exit and enter your network
-
Keep endpoints safe from known threat signatures
-
Setup device network and security policies quickly
TECHNOLOGY & PROCESS-
Patented to ensure absolute isolation from threats
-
Insights from deep web and dark web to eliminate risk
-
Our pioneered approach has shifted the industry
-
100% trust an all files at lightning speeds
-
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
-
Retain experts to investigate an incident to start remediation
-
Our experts closely monitor changes to your environment 24x7x365
-
Cybersecurity experts will continuously hunt suspicious endpoint activity
SUPPORT, DEPLOY, MAINTAIN-
Ensure your installations are properly deployed
-
Trouble with maintaining your products? Get help now
-
Align your success with optimal security performance
-
- Tools
- For HomeFOR HOMEWEB BROWSERBROWSER ADD-ONS & EXTENSIONS
- Partners
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.KNOWLEDGE BASETHREAT LABS
- Company
Attorneys Protect Email Communications with Comodo SSL Encryption Software
Patent-pending technology from Comodo allows attorneys and clients to communicate at the speed of the Internet and yet to protect their privileged communications easily
Jersey City, NJ, May 05, 2009 – Attorneys sometimes need to transmit vast amounts of sensitive data, rapidly. If they choose to do so by email, they must consider that email, though convenient, is not secure.
“It is conceivable that courts may construe a failure to encrypt email as a failure to take the precautions necessary to protect privileged communication,” wrote Salvatore DeSantis and D. David Keller in the FDCC Quarterly.
Encryption software uses an algorithm to translate email messages and any attachments into unintelligible strings of characters. Only the intended recipient can translate them back into readable form.
Comodo Secure Email Pro contains a new, patent-pending technology allowing email originators to send secure email messages using a one-time-use digital certificate. With the one-time-use certificate, recipients are authenticated and allowed to use the free online Secure Email web service to decrypt and read their message.
To date, many email security approaches have been cumbersome and expensive, often requiring users to pre-exchange their public keys or message passwords. When time pressed, senders frequently chose to forego the added complexity. As a result, the email system and transmission proceeded without necessary safeguards.
Without those safeguards, though, the same ease and utility that allows internal users, partners and customers to effectively communicate also place confidential information in peril. To a moderately skilled person, inside the organization or out, unsecured email is easy to read, impersonate and alter.
Comodo Secure Email provides the encryption necessary to protect email communications. Comodo Secure Email, based upon widely adopted S/MIME standards, uses the same PKI technology that enables padlocked browser bars and SSL connections. Secure email encrypts the content (text and attachments) of originated messages so that they can only be read by the intended recipients.
Secure Email Pro is an install-and-forget software application that can automatically encrypt and digitally sign all outgoing messages. Fully compatible with S/MIME-compatible email clients (e.g. Outlook, Outlook Express, Windows Mail, Notes, Thunderbird, etc.), its built-in wizard allows users to easily download and automatically set up a Comodo email certificate. Users benefit from the security of automatically encrypting and digitally signing their email while the application handles difficult or hard to remember processes such as public key exchange and management. Network administrators looking for client-to-client email security can now consider Comodo end-to-end Secure Email as a complement to gateway encryption applications.
Another important feature of Comodo Secure Email Pro is the ability to digitally “sign” a document. The digital signature provides assurance that the document has not been altered in transit, and that it has been sent by the digital signature owner.
Comodo CA’s Public Key Infrastructure (PKI) management systems enable law firms to administer and control their digital certificates under strict chain of custody requirements.
For more information about Comodo Secure Email Pro, visit enterprise.comodo.com/security-solutions/endpoint-security/
About Comodo
The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL, Code Signing, Content Verification and Email Certificate; award winning PC Security software; Vulnerability Scanning services for PCI Compliance; secure e-mail and fax services.
Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet’s ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and 3,000,000 users of our desktop security products.
For additional information on Comodo – Creating Trust Online® visit Comodo.com
For more information, reporters and analysts may contact:
Comodo
Email: media-relations@comodo.com
Office: +1 (888) 266-6361