Comodo, Identity and Trust Assurance Management Solutions
provider, announced the release of Zero Touch Linux (ZTL), a complete suite
of back office server applications centrally controlled by a user friendly
web-based interface. ZTL was developed by Comodo's Positive Software
Division, specialists in web hosting and server automation.
ZTL takes a 'best of breed' approach by offering administrators server
software pre-configured on Comodo's Linux distribution, Trustix Secure Linux.
ZTL is ideal for small businesses looking to achieve an easy way to migrate
to Linux, yet ZTL also serves the needs of the larger enterprise with
sophisticated administration requirements.
A single installation of ZTL brings under one umbrella a File Server, Print
Server, Domain Controller, DNS, Mail Server, Web Mail, Database Server, Web
Server, Proxy Server, DHCP server, Content Filtering... (more)
A manager gives a key to an employee so the employee can drive a locked
truck. The manager controls use of the key and the equipment; if the employee
leaves the company, or if the employee dies, the manager is responsible to
get the key back or change the locks.
But when the employee is instead driving a truckload of information down the
information superhighway, handing out and retrieving the key can be more
Businesses protect their digital information in transit using Public Key
Public Key Infrastructure is based on the idea of two “keys” for each
server or mailbox. The first key is public, available for wide distribution,
and for example this key might be included in every email you send. The
second is “private.” The private key is kept secret. You never show this
private key to anyone, but you use to sign or encrypt information.
Jersey City, NJ, September 03, 2009 - Healthcare practices need expertise in
information technology in order to comply with regulations such as the Red
Flag Rule and HIPAA. Comodo now offers a free trial of a hardware-free
solution that allows healthcare networks to comply with two-factor
Comodo's cost-effective and flexible two-factor authentication solutions
eliminate the need for cumbersome physical tokens and expensive new hardware.
Comodo's innovative approach allows practices to use one-time passwords,
challenge questions, secure cookie technology, or the industry's easiest
two-factor technology, client-side digital certificates with user names and
As the largest issuer of high-assurance digital certificates, Comodo's
certificate solutions enable organizations to meet their two-factor
authentication requirements with a... (more)
With the trend of targeted cyber attacks along with the exploitation of
common vulnerabilities such as SQL Injection, it is clear that the core
software infrastructure of several critical industries remains extremely
vulnerable. Released today, the Veracode “State of Software Security
Report: Volume 3” uncovered that those security vendors tasked with
protecting enterprises are often the most at risk due to the poor quality of
their very own software applications. In fact, 72 percent of security
products and services applications analyzed in this report failed to meet
acceptable levels of security quality.
In its most recent State of Software Security report, Veracode analyzed 4,835
applications that were submitted to its cloud-based application security
testing platform for independent security verification. That number is nearly
double from the previous report (S... (more)
On December 16, 2013, our friends over at Compare the Cloud wrote a blog
called “The Day Computing Changed Forever – and We All Missed it.” The
blog centered on what the future of the Cloud could hold for society.
Ironically enough, the post was published on the same day that Google
(pictured below) announced it’s new line of products – four legged
military machines. SkyNet anyone?
Anyway, in the post our friends over at Compare the Cloud set the stage for
what the future of the Cloud and IT in general could look like. From
operating in the world via customized avatars, to fitting an entire data
center within the space of a few specs of DNA to human clusters providing
science with answers beyond current imagination, our friends at Compare the
Cloud lay out a very interesting vision for the future. That said, we are
going to use this space to, point-by-point, decon... (more)
RSA Conference 2009 takes place April 20, 2009 - April 24, 2009 at The
Moscone Center in San Francisco.
Business Wire is the official news wire for the RSA Conference 2009. Breaking
news releases, advisories, photos, and multimedia are available at
Tradeshownews.com, Business Wire's trade show, conference, and event news
Listed below are RSA Conference 2009 exhibitor profiles.
Company: AEP Networks Booth: 628 Media Contact: Jeanne Achille, The Devon
Group Phone: 732-706-0123 x 11 E-mail: firstname.lastname@example.org Web:
www.aepnetworks.com AEP Networks offers secure communications, networking
and application access for government, enterprise and carriers. We work with
systems integrators, managed service providers and the distribution channel
to deliver integrated solutions incorporating our leading edge products:
•Enhanced-grade secure voice and multi-service d... (more)
Concerns about security are cited as the single largest barrier to rapid Web
services adoption. Yet most Web services today are fairly straightforward
point-to-point integrations that can be securely implemented using only
digital certificates and the Secure Sockets Layer (SSL) protocol.
Regardless of security strategy, enterprises are well advised to monitor
their Web services to ensure security has not been compromised. Taken
together, widely available standard security technologies and active
monitoring provide a sensible approach to the majority of today's Web service
security challenges. This article describes how to use these technologies to
secure the most common deployments of Web services quickly and easily. I'll
close with a brief introduction of WS-Security and how this emerging standard
relates to what you do and do not get with SSL.
Web Services Securit... (more)
"If it's urgent enough to send in a business email, it's usually something
you don't want others to see," said Melih Abdulhayoglu, Chief Security
Architect and CEO of Comodo Group, Inc., a leading Internet security company.
"Most emails are not secure messages. To a moderately skilled person, inside
the organization or out, they are as easy to read or even to change, as a
postcard written in pencil."
Emails do not reach their recipients directly. The senders have no control
over the route their emails take, from server to server, to their
destinations. Anyone between the sender and recipient could intercept
messages, read them, change them, redirect them, or delete them.
"Email leaks are always humiliating when you finally detect them. And if your
competition detects them first, you can lose valuable information."
To allow email users to control their confidential mes... (more)
Comodo, a global Certification Authority, announced that it has released the
next generation of its remote web-based server provisioning software NOC
Monkey 2.0 beta 2 through their Web Hosting and server automation division
PSOFT (Positive Software).
NOC Monkey is a web-based tool for remote server management. It simplifies
dedicated server maintenance in data centers by providing administrators with
a simple web interface to install operating systems remotely; reinstall
servers and recover them from file-system crashes and change root passwords
without having to connect the console.
The range of new features in NOC Monkey 2.0 beta 2 includes support for the
Linux Logical Volume Manager. LVM allows administrators to re-partition
servers 'on-the-fly' without the need to stop the server first to back it up
and comes as default with most modern Linux distributions. Addi... (more)
Jersey City, NJ, September 29, 2009 - Comodo Group will exhibit its landscape
of products at the SC World Congress, a trade show for information technology
professionals in New York City, October 13 and 14, 2009.
Comodo products being demonstrated include Comodo Endpoint Security Manager,
which now includes Disk Encryption at no extra charge. Comodo Endpoint
Security Manager offers centralized administration of the award-winning
Comodo antivirus, firewall and disk encryption software. Endpoint Security
Manager also offers a new Offline Updater, permitting administrators to
schedule security updates for an entire network.
Other Comodo products being demonstrated include Discovery Scanning, an
automated inventory of all SSL certificates on a corporate network, and the
hardware-free Two-factor Authentication used for regulatory compliance.
Comodo Two Factor now has a f... (more)
Jersey City, NJ, December 15, 2009 - In X.509 encryption, discriminating
buyers check to be sure that certificate roots are well-protected.
Certificate owners also check the distribution of the roots: can they be
found in as many of the major browsers as possible? Owners aim for widespread
distribution across all browsers.
Public Key Infrastructure (PKI) certificates allow computer users to encrypt
information, scrambling it so that only someone with access to the
certificate owner's key can unscramble it.
The key itself is scrambled, as is the key used to scramble it, and so on
back to the document that contains the original key, a long string of
alphanumeric characters. The document that contains that string is called the
root certificate. The root certificate must be kept secure, because millions
of digital certificates use it to encrypt or digitally sign billions... (more)