- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
-
Impenetrable cybersecurity without sacrificing usability
-
Gain detailed visibility into all your endpoints activities
-
Reduce the attack surface to remediate and patch
-
Fortify mobile devices that exit and enter your network
-
Keep endpoints safe from known threat signatures
-
Setup device network and security policies quickly
TECHNOLOGY & PROCESS-
Patented to ensure absolute isolation from threats
-
Insights from deep web and dark web to eliminate risk
-
Our pioneered approach has shifted the industry
-
100% trust an all files at lightning speeds
-
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
-
Retain experts to investigate an incident to start remediation
-
Our experts closely monitor changes to your environment 24x7x365
-
Cybersecurity experts will continuously hunt suspicious endpoint activity
SUPPORT, DEPLOY, MAINTAIN-
Ensure your installations are properly deployed
-
Trouble with maintaining your products? Get help now
-
Align your success with optimal security performance
-
- Tools
- For HomeFOR HOMEWEB BROWSERBROWSER ADD-ONS & EXTENSIONS
- Partners
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.KNOWLEDGE BASETHREAT LABS
- Company
Internet Security and future of Internet discussed by Blodget and Abdulhayoglu on March 19
Jersey City, NJ, March 17, 2009 – Internet pundits and prognosticators Melih Abdulhayoglu and Henry Blodget will talk about the future development of the Internet, “Web 3.0” and the road to getting there in a live, Internet event on Thursday, March 19. The latest program in PalTalk’s TechNow series is entitled “Transforming the Web into Your Web, and Internet users can log on to Paltalk.com to submit questions and participate.
Among the topics for examination:
- What is “Web 3.0” and how is its development and success tied to users’ ability to know who and what they can trust online?
- How do users leverage the real time potential of social networks to provide us with trusted information if we have no authentication means within these networks?
- Is it possible to vet the information and identities of everyone users encounter on the Internet?
- Technology has been working on creating an intelligent search agent that learns an individual’s search preferences. Can new “intelligent identity agents” be created to actively monitor transactions, connections and even information?
Blodget is the notorious CEP of Silicon Alley Insider, a website dedicated to and created by the New York digital business community. The site offers news, commentary, and talk about New York companies and people. It features, news, entertainment, music, gaming, digital publishing, and social networking.
Abdulhayoglu is CEO and Chief Security Architect of Comodo, an Internet security company. The Comodo companies provide the infrastructure to enable Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely.
This discussion on March 19 at 3:00 p.m. (EST) will be the last program in Paltalk’s TechNow series. It will focus on the powerful challenges that new tools, new social networks and new ways of connecting present to individual Internet users and to society.
For more information visit Comodo.com/webinars/comodolive319.html
About Comodo
The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL , Code Signing , Content Verification and Email Certificate ; award winning PC Security software; Vulnerability Scanning services for PCI Compliance ; secure e-mail and fax services.
Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet’s ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and has over 10,000,000 installations of desktop security products.
For additional information on Comodo – Creating Trust Online® visit our website .
For more information, reporters and analysts may contact:
Comodo–Creating Trust Online
Email: media-relations@comodo.com