Comodo - Creating Trust Online®

Comodo Extended Validation Code Signing Certificates

Extended Features

Features & Benefits of EV Code Signing

  • Highest Levels of Publisher Trust: EV Code Signing certificates are issued after verifying the identity of the publisher to the robust specifications laid out by and Microsoft and major certificate authorities
  • Two Factor Authentication: Private keys are stored on an external hardware token which is required in order to sign code, eliminating the possibility that your certificate could be exported and used by unauthorized personnel
  • Microsoft SmartScreen Advantage
    EV signed software gets an automatic reputation boost in Windows that isn't given to regular code signing
  • Verifies Publisher's Identity
    Reassure customers of the authenticity of your software, wherever they download it from
  • Verifies Integrity of Content
    Customers know that your code has not been tampered with since publication



  • Eliminate Error Messages
    People who download your software will not see security warnings from Windows
  • Fully Trusted
    Comodo certificates are recognized by all major operating systems, mobile devices and browsers
  • Protect your brand and reputation
    Create a trusted sales outlet and online presence for your software
  • Sign All Popular File Types
    Including .exe, .cab, VBA, Java, .ocx (ActiveX) .dll and more
  • Unlimited Signing
    One code signing certificate can sign as many executables and builds as required. Time stamping ensures your digital signature is valid even after your certificate expires




Comparison

Ensure your software is trusted for installation by operating systems and users

When customers buy software in a store, the source of that software is obvious. When downloaded over the internet, that same software is not so easy to trust. Any publisher planning to distribute code or content over the internet risks their software being modified, hacked and re-hosted by malicious third parties.

  • How do you maintain control over the integrity of your software in the face of this?
  • How do customers know they aren’t downloading a counterfeit, virus-laden version of your product?

By signing their software with an EV code signing certificate, developers build a trusted relationship with users who learn they can download their software with confidence. Signing your software you allows end-users to easily verify:

  • Content Source - The software really comes from the publisher who signed it.
  • Content Integrity - The software has not been altered or corrupted since it was signed.

Users benefit from this software accountability because they know who published the software and that the code hasn't been tampered with. Developers and Web masters benefit from these certificates because it builds trust in their names and makes it more difficult to falsify their products.

A Seal of Approval for Your Software

In a highly competitive online marketplace, maximizing the success of your software means extending it's availability beyond the controlled confines of your own website. Today's marketing and advertising models call for you to distribute to multiple and varied locations – including 3rd party download sites, resellers, mirrors, affiliates and more. Because of this, an EV code signing certificate is strongly recommended for any publisher intending to distribute content over the internet or other channels.

Then there's the question of error messages. Windows will show a warning to users if they try to install software that is not signed by a trusted certifcate authority. Similar, most internet browsers will not accept action commands from downloaded code unless the code is. Comodo EV code signing certificates are trusted by all popular browsers and operating systems, meaning people who download your software will never see any warnings.

Consumers are more aware than ever of the dangers with online interactions, so the highly visible reassurance provided by EV code signing will immediately inform them they are safe to proceed.

Your certificate will be delivered to you on a password-protected, FIPS 140-2 Level 3 compliant SafeNet USB token. Only personnel who have the physical token can sign code, handing your company strong, two-factor control over signed output. Storing the certificate inside the trusted module of a token instead of a local machine also reduces the possibility that the private key could be exported, lost or otherwise used by unauthorized personnel.