- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
-
Impenetrable cybersecurity without sacrificing usability
-
Gain detailed visibility into all your endpoints activities
-
Reduce the attack surface to remediate and patch
-
Fortify mobile devices that exit and enter your network
-
Keep endpoints safe from known threat signatures
-
Setup device network and security policies quickly
TECHNOLOGY & PROCESS-
Patented to ensure absolute isolation from threats
-
Insights from deep web and dark web to eliminate risk
-
Our pioneered approach has shifted the industry
-
100% trust an all files at lightning speeds
-
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
-
Retain experts to investigate an incident to start remediation
-
Our experts closely monitor changes to your environment 24x7x365
-
Cybersecurity experts will continuously hunt suspicious endpoint activity
SUPPORT, DEPLOY, MAINTAIN-
Ensure your installations are properly deployed
-
Trouble with maintaining your products? Get help now
-
Align your success with optimal security performance
-
- Tools
- For HomeFOR HOMEWEB BROWSERBROWSER ADD-ONS & EXTENSIONS
- Partners
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.KNOWLEDGE BASETHREAT LABS
- Company
COMODO ADDS TWO FACTOR (TF) AUTHENTICATION SUPPORT FOR MICROSOFT’S OUTLOOK WEB ACCESS AND SHAREPOINT APPLICATIONS
Comodo Two Factor is recognized by customers for its innovative design, ease of customer adoption and low total cost of ownership (TCO).
Jersey City, NJ, July 30, 2008 – Comodo, a global leader in Identity and Trust Assurance Management solutions, announced that it has extended its Two Factor Authentication solution so that now it supports Microsoft’s Outlook Web Access and SharePoint server applications, two of the most widely used email and collaboration platforms on the market today. Comodo Two Factor (TF) is an innovative PKI based solution that uses digital certificates, with its easy deployment and cost effective structure, as a strong form of authentication. Most significantly, user adoption is virtually seamless because once the digital certificate is installed; the user does not need to add any authentication steps to their current login processes.
Comodo Two Factor (TF) Authentication is a high performance security solution that delivers innovative and economical benefits to business customers, requiring an enhanced level of user authentication and protection for sensitive online information. Comodo TF is able to offer a true two factor solution because it always maintains a “something you know + something you have” two factor authentication rule, without the need for costly physical “tokens. In additional to strong, digital certificate authentication Comodo TF can also serve single use passwords delivered via SMS messaging, voice message, and/or personal security questions. This flexibility provides maximum policy compliance, security and an ease of use requiring little to no end-user or administrator intervention.
Comodo TF Overview:
- Highly flexible and configurable proxy-based authentication solution that can be deployed in hours
- Leverages Comodo’s Public Key Certificate Authority Infrastructure, widely recognized as supplying one of the strongest forms of authentication and encryption service available
- Low cost – automates the digital certificate issuance and management keeping administrative overhead to a minimum. No modification to existing applications
- Easy to Use – simple client account setup conveniently allows continued use of existing usernames and passwords. Certificates are automatically installed.
“The continuing need to authenticate online users is a critical business function,” said Melih Abdulhayoglu, CEO and Chief Security Architect of Comodo. “Our goal with Two Factor was to create a solution that has the highest level of secure authentication yet is easy for consumers and businesses. Now that Comodo’s Two Factor supports Outlook and SharePoint, millions of users can benefit from this strong form of authentication.”
For more information about Comodo Two Factor, please visit: http://enterprise.comodo.com.
About Comodo
The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL, Code Signing, Content Verification and Email Certificate; award winning PC Security software; Vulnerability Scanning services for PCI Compliance; secure e-mail and fax services.
Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet’s ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and 3,000,000 users of our desktop security products.
For additional information on Comodo – Creating Trust Online® visit Comodo.com
For more information, reporters and analysts may contact:
Comodo
Email: media-relations@comodo.com
Office: +1 (888) 266-6361