DRAGON ENTERPRISE PLATFORM
IT Service Management
For MSSPs & MSPs
Am I Breached?
Am I Secured?
Am I Ready?
- Why Comodo?
SELECT YOUR INDUSTRY TYPE
Media & Press
Threat Research Labs
Send secured messages with Internet Security via Email, Not Postcards Scrawled in Pencil
Jersey City, NJ, February 17, 2009 – ” If it’s urgent enough to send in a business email, it’s usually something you don’t want others to see ,” said Melih Abdulhayoglu, Chief Security Architect and CEO of Comodo Group, Inc., a leading Internet security company.
” Most emails are not secure messages. To a moderately skilled person, inside the organization or out, they are as easy to read or even to change, as a postcard written in pencil .”
Emails do not reach their recipients directly. The senders have no control over the route their emails take, from server to server, to their destinations. Anyone between the sender and recipient could intercept messages, read them, change them, redirect them, or delete them.
” Email leaks are always humiliating when you finally detect them. And if your competition detects them first, you can lose valuable information .”
To allow email users to control their confidential messages, Comodo introduces Secure Email Pro. With Secure Email Pro, users can digitally sign their email messages, certifying that the message really comes from them and has not been altered in transit. The message can be encrypted as well. Encrypted messages and the sensitive data they contain are illegible if they fall into any hands except those of the intended recipient.
Patent-pending technology from Comodo makes the encryption and signature possible with unprecedented ease. Until now, email correspondents who wanted to communicate securely needed to manually exchange information known as “keys.” The process was cumbersome.
With Comodo Secure Email Pro’s patent-pending technology, the sender generates a single use session certificate for the recipient. Using this session certificate, the sender encrypts the message and uploads the session certificate to Comodo’s secure servers. Then the sender sends the encrypted message to the recipient with simple decryption instructions.
If the recipient does not already have Comodo Secure Email, he or she can choose how to read the email by either downloading CSE using the instructions and links in the received email sent above, or, they can send the message to Comodo’s WebReader service to read it there.
” Secure Email Pro is an exciting, valuable advance for businesses ,” said Abdulhayoglu. ” They can now instantly send important documents to anyone with an email address. The process was so awkward before Secure Email Pro, that unless you planned to send regular communications, you probably would not bother with email .”
The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL , Code Signing , Content Verification and Email Certificate ; award winning PC Security software; vulnerability scanning services for PCI Compliance ; secure e-mail and fax services.
Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet’s ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and has over 10,000,000 installations of desktop security products.
For additional information on Comodo – Creating Trust Online® visit our website .
For more information, reporters and analysts may contact:
Comodo–Creating Trust Online
+1 (201) 963 0004 x4073