- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
-
Impenetrable cybersecurity without sacrificing usability
-
Gain detailed visibility into all your endpoints activities
-
Reduce the attack surface to remediate and patch
-
Fortify mobile devices that exit and enter your network
-
Keep endpoints safe from known threat signatures
-
Setup device network and security policies quickly
TECHNOLOGY & PROCESS-
Patented to ensure absolute isolation from threats
-
Insights from deep web and dark web to eliminate risk
-
Our pioneered approach has shifted the industry
-
100% trust an all files at lightning speeds
-
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
-
Retain experts to investigate an incident to start remediation
-
Our experts closely monitor changes to your environment 24x7x365
-
Cybersecurity experts will continuously hunt suspicious endpoint activity
SUPPORT, DEPLOY, MAINTAIN-
Ensure your installations are properly deployed
-
Trouble with maintaining your products? Get help now
-
Align your success with optimal security performance
-
- Tools
- For HomeFOR HOMEWEB BROWSERBROWSER ADD-ONS & EXTENSIONS
- Partners
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.KNOWLEDGE BASETHREAT LABS
- Company
SSL provider Comodo launches Vengine embedded
The Establishing Trust initiative makes CVC technology freely available to security providers worldwide, spawning an army of anti-phishing tools for consumers.
New York, 24th May 2005. The worlds 2nd largest, fastest growing High Assurance Certification Authority Comodo today made patent pending anti-phishing and identity assurance technology freely available to toolbar providers and security solutions providers worldwide.
"By creating an army of tools and solutions to help fight against all forms of web based identity theft, Comodo is leading the way in Establishing Trust on the Internet", said Melih Abdulhayoglu, President, CEO and Chief Security Architect for the Comodo Group.
With DNS Poisoning, Phishing, Pharming still growing at an alarming rate the ability to verify web page content, securely and effectively remains the primary goal for all web site owners. Deploying CVCs on key pages where 'trust and assurance of content' is essential (e.g. Home Pages, Account Login Pages etc) affords consumers protection now and into the future. Developed and tested by Comodo's global Research and Development operations the CVC architecture is not too dissimilar to the highly successful and extensively proven SSL based e-commerce framework used today by many e-commerce providers. However, where the SSL model of trust underpins the framework of the Internet, CVCs provide trust in the actual content flowing across that framework.
"The theory behind Content Verification Certificates became one of the most anticipated technological breakthroughs in security on the Internet in recent years" comments Steve Roylance, Vice President of Global Technical Marketing for Comodo "What we've effectively achieved is to transfer the success of the hologram for identity assurance on to the Internet, allowing providers large and small a method to establish trust with their customers."
Available as an extension to Internet Explorer, the Verification Engine (Vengine) stand alone product meshes perfectly with 3rd party tool bars such as the eBay, Alexa and Google toolbar’s assuring the validity of the toolbar and protecting the user against potential graphical replacements of the toolbar. Adding additional value, in being able to securely display trusted content, also allows for the creation of an incremental recurring revenue stream for the partner embedding the technology.
For more information please e-mail vengineembedded@comodo.com
About Comodo
The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL, Code Signing, Content Verification and Email Certificate; award winning PC Security software; Vulnerability Scanning services for PCI Compliance; secure e-mail and fax services.
Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet's ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and 3,000,000 users of our desktop security products.
For additional information on Comodo – Creating Trust Online® visit Comodo.com
For more information, reporters and analysts may contact:
Comodo
Email: media-relations@comodo.com
Office: +1 (888) 266-6361