- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
-
Impenetrable cybersecurity without sacrificing usability
-
Gain detailed visibility into all your endpoints activities
-
Reduce the attack surface to remediate and patch
-
Fortify mobile devices that exit and enter your network
-
Keep endpoints safe from known threat signatures
-
Setup device network and security policies quickly
TECHNOLOGY & PROCESS-
Patented to ensure absolute isolation from threats
-
Insights from deep web and dark web to eliminate risk
-
Our pioneered approach has shifted the industry
-
100% trust an all files at lightning speeds
-
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
-
Retain experts to investigate an incident to start remediation
-
Our experts closely monitor changes to your environment 24x7x365
-
Cybersecurity experts will continuously hunt suspicious endpoint activity
SUPPORT, DEPLOY, MAINTAIN-
Ensure your installations are properly deployed
-
Trouble with maintaining your products? Get help now
-
Align your success with optimal security performance
-
- Tools
- For HomeFOR HOMEWEB BROWSERBROWSER ADD-ONS & EXTENSIONS
- Partners
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.KNOWLEDGE BASETHREAT LABS
- Company
LETIX, (Law Enforcement Technology Information Exchange) selects Comodo to provide authentication and online identity assurance best practices
Comodo provides LETIX Mutual Authentication technology to enable secure and authenticated access to sensitive data.
Jersey City, NJ (May 22, 2007) – Comodo, a global Certification Authority and leading provider of Identity and Trust Assurance (ITA) Management solutions, announced today that LETIX has selected Comodo to protect, secure and authenticate access to its database that houses sensitive financial information. LETIX, a not for profit organization supporting law enforcement’s need for real time fraud data, will benefit from advanced authentication technologies that will ensure only authorized access to this sensitive information.
Comodo’s Mutual Authentication Solution is based on strong Public Key Infrastructure (PKI) and includes Two Factor (TF) client certificates for LETIX authentication of the User and Content Verification Certificates (CVCs) to enable the User to verify the authenticity of the LETIX login box. Together, this provides the only PKI based solution that is both secure and user-friendly.
“The continued advances in authentication technologies allow us to offer this new level of access for LETIX subscribers so they can access the data securely even though they are using diverse technical platforms.” said Melih Abdulhayoglu, CEO and Chief Security Architect of Comodo. “By working with leading law enforcement companies like LETIX, we are able to deliver an integrated, best of breed solution without risking the security or safety of their subscribers.”
COMODO MUTUAL AUTHENTICATION SOLUTION SUMMARY
1) Two Factor (TF) Client Certificates for a High-Performance, Low Cost Solution with Easy Integration
The Comodo Two Factor solution provides the ability for LETIX to authenticate the identity of a user trying to log in. Comodo TF installs a digital certificate onto a subscriber’s PC, converting the PC into a “smart token”. Comodo TF offers significant advantages over other two-factor options:
- Comodo is one of the only PKI based two factor solutions offered by a Certification Authority. PKI is considered one of the strongest forms of authentication available for online security.
- One of the lowest costing two factor solutions due to an established PKI infrastructure and digital certificate lifecycle management processes
- High level of flexibility and configurability
- Solutions can be deployed in days
2) Content Verification Certificates (CVC) ensure subscribers can be protected from phishing, pharming, and man-in-the-middle attacks
The second part of the mutual authentication model includes Comodo’s unique Content Verification Certificates that authenticates web content (such as a log-in box or graphics) to authenticate site identity. This is the only digital certificate on the market today that protects against man-in-the middle attacks as this solution alone delivers green “good to go” indicator confirming site identity. LETIX subscribers will be able to verify LETIX’s site identity using a reader called VerificationEngine™ which can be used to authenticate the identity of over 200,000 home page logos.
“LETIX is designed as a collaborative community of law enforcement, credit card companies and financial institutions, so maintaining intuitive yet highly-secured access was a key requirement. We are committed to the PCI security standards, and our partnership with Comodo helps us meet and exceed the high standards we set for ourselves alongside the industry standards,” said Mr. Dean Heistad, CTO of LETIX. “It is paramount, therefore, that we offer a best practices authentication process that provides full authentication but does not impede a user’s ability to get into the system. We are excited to work with Comodo to provide this level of authentication that reflects a best practice approach advocated by government guidelines, yet within a process that our stakeholders will be able to use easily.”
For more information, please visit enterprise.comodo.com
About LETIX:
LETIX, (Law Enforcement Technology Information Exchange), is a not-for-profit 501(c)3 charitable organization connecting the financial services industry with law enforcement agencies. Our goal is to deliver technology and services that streamline and increase the effectiveness of identity theft and fraud related investigations for both financial services institutions and law enforcement agencies. The LETIX team includes veterans from the financial services, law enforcement, investment, and information technology industries. For more information about LETIX and access to LUCID, please contact partners@letix.org.
About Comodo
The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL, Code Signing, Content Verification and Email Certificate; award winning PC Security software; Vulnerability Scanning services for PCI Compliance; secure e-mail and fax services.
Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet’s ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and 3,000,000 users of our desktop security products.
For additional information on Comodo – Creating Trust Online® visit Comodo.com
For more information, reporters and analysts may contact:
Comodo
Email: media-relations@comodo.com
Office: +1 (888) 266-6361