Identity and Trust Assurance encryption, verification and authentication

Comodo Encryption Journal

Subscribe to Comodo Encryption Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Comodo Encryption Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

"If it's urgent enough to send in a business email, it's usually something you don't want others to see," said Melih Abdulhayoglu, Chief Security Architect and CEO of Comodo Group, Inc., a leading Internet security company. "Most emails are not secure messages. To a moderately skilled person, inside the organization or out, they are as easy to read or even to change, as a postcard written in pencil." Emails do not reach their recipients directly. The senders have no control over the route their emails take, from server to server, to their destinations. Anyone between the sender and recipient could intercept messages, read them, change them, redirect them, or delete them. "Email leaks are always humiliating when you finally detect them. And if your competition detects them first, you can lose valuable information." To allow email users to control their confidential mes... (more)

Five Lessons The League Can Teach Us about Cyber Security

Lessons from the hit show, The League The 2013 NFL season kicks off tonight with the defending Super Bowl champion Baltimore Ravens visiting the Denver Broncos. For many of us, the start of football season means lazy chicken wing and pizza-filled Sundays in front of the TV. But, it also means it’s time to scramble together and pick your fantasy football team. If you participate in fantasy football, you may be a fan of the hit FX television show, The League which premiered last night. Don’t worry – there are no spoilers here. The League follows a group of old friends in a fantasy football league that seems to bleed into every aspect of their lives. Even if you don’t like fantasy football, or football for that matter, this show is likely to have you either laughing or turning away from the television in disgust at their attempts to make each other’s lives miserable. A... (more)

Comodo Drags Marketshare From Verisign

Comodo Inc., based in Jersey City, NJ, with additional offices in the UK, Japan, and Israel, has established itself as the second largest High Assurance Certification Authority, a market that provides SSL certificates to Internet businesses. Trailing clear industry leader Verisign, Comodo has nevertheless gained marketshare over the past nine months, according to the UK-based, Internet tracking company Netcraft. Comodo now has 16% of the SSL market, compared with Verisign’s 71%, and has gained 2 percentage points over the past nine months. The market itself grew by about 8% in this period, according to Comodo. “The SSL protocol, when delivered via an efficient and cost effective High Assurance authentication system continues to prove itself as an effective ubiquitous solution to the issue of privacy on the Internet”, said Melih Abdulhayoglu, CEO a... (more)

Website Shows Comodo's Security Protection for Enterprises

Comodo has announced the release of an enterprise solutions website, www.Enterprise.Comodo.com, designed to promote IT security innovations that enable businesses to achieve a multi-layered Protection Landscape. Comodo delivers its prevention, detection, cure and compliance solutions through an array of Infrastructure Security, Digital Certificates and eCommerce Acceleration services, including its Endpoint Security, User Authentication, Network Vulnerability Scanning and PCI compliance services. Comodo secures the online transactions, communications and endpoints for over 200,000 businesses and 10,000,000 installations. The Comodo Enterprise website includes case studies and whitepapers describing successful implementations of various Public Key Infrastructure, Online and Endpoint security solutions. The website also provides industry and customer-specific applica... (more)

Disk Encryption Protects Data with Comodo Endpoint Security Manager

Jersey City, NJ, September 10, 2009 - At no extra charge, enterprise IT managers can now deploy Comodo Disk Encryption with Comodo's Endpoint Security Manager, a centralized administration console for business networks. 12,000 laptops are lost or stolen in US airports every week, according to a study by the Ponemon Institute. Many of them belong to corporate travelers, whose IT professionals are left to worry that the lost information they contained might be misused. If the organization had deployed disk encryption, they might have spared themselves hours of agony and financial penalties. Root encryption, and whole- or partial-disk encryption settings allow IT managers to protect stored information. With Comodo Endpoint Security Manager, every computer in the company can now be encrypted and protected. Encryption uses a mathematical algorithm to change computer files i... (more)

Comodo Backup, Free Utility, Safeguards Computer Information in Two Ways

Comodo Backup Encrypts and Safeguards Data, Optimizes File Space Jersey City, NJ, November 03, 2009 - In October, Sidekick users experienced the acute distress of losing their data files—apparently forever. If corporate networks lose information, their pain is magnified. The number and size of the files lost may be thousands or millions times greater. The loss may even kill the patient, shutting down a business permanently. Comodo Backup 2.1 protects against data loss crises by taking real-time backups of user data, with more flexibility and control than ever, and still for free. New features in Comodo Backup include step-by-step wizards to guide even novice users through the entire backup, restore and scheduling procedures, and real-time backups. The synchronization feature creates real-time backups by copying files over as soon as they are modified. Granular schedul... (more)

Everything Channel's CRN Unveils the 2010 Channel Chiefs

FRAMINGHAM, Mass., Feb. 22 /PRNewswire/ -- Everything Channel, a UBM company, today announced the 2010 CRN Channel Chiefs. The CRN Channel Chiefs are influential executives who consistently defend, promote and execute effective channel partner programs and strategies. (Logo: http://www.newscom.com/cgi-bin/prnh/20100222/NY58513LOGO ) For the eighth consecutive year the top Channel Chiefs were chosen by Everything Channel editorial based on criteria including policy and program innovations made during the past year, the amount of revenue their company generates through partners, their willingness to speak out publicly on behalf of the channel and the number of years they have dedicated to channel activities. "Being named a Channel Chief is one of the most prestigious honors in the IT industry. This year's Channel Chiefs offer tremendous insight into the who's w... (more)

Pragmatic Web Services Security Today - Simple strategies for securing and monitoring Web services

Concerns about security are cited as the single largest barrier to rapid Web services adoption. Yet most Web services today are fairly straightforward point-to-point integrations that can be securely implemented using only digital certificates and the Secure Sockets Layer (SSL) protocol. Regardless of security strategy, enterprises are well advised to monitor their Web services to ensure security has not been compromised. Taken together, widely available standard security technologies and active monitoring provide a sensible approach to the majority of today's Web service security challenges. This article describes how to use these technologies to secure the most common deployments of Web services quickly and easily. I'll close with a brief introduction of WS-Security and how this emerging standard relates to what you do and do not get with SSL. Web Services Securit... (more)

Comodo Releases NOC Monkey 2.0 Beta 2

Comodo, a global Certification Authority, announced that it has released the next generation of its remote web-based server provisioning software NOC Monkey 2.0 beta 2 through their Web Hosting and server automation division PSOFT (Positive Software). NOC Monkey is a web-based tool for remote server management. It simplifies dedicated server maintenance in data centers by providing administrators with a simple web interface to install operating systems remotely; reinstall servers and recover them from file-system crashes and change root passwords without having to connect the console. The range of new features in NOC Monkey 2.0 beta 2 includes support for the Linux Logical Volume Manager. LVM allows administrators to re-partition servers 'on-the-fly' without the need to stop the server first to back it up and comes as default with most modern Linux distributions. Addi... (more)

Comodo Innovations at SC World Congress October 13 and 14

Jersey City, NJ, September 29, 2009 - Comodo Group will exhibit its landscape of products at the SC World Congress, a trade show for information technology professionals in New York City, October 13 and 14, 2009. Comodo products being demonstrated include Comodo Endpoint Security Manager, which now includes Disk Encryption at no extra charge. Comodo Endpoint Security Manager offers centralized administration of the award-winning Comodo antivirus, firewall and disk encryption software. Endpoint Security Manager also offers a new Offline Updater, permitting administrators to schedule security updates for an entire network. Other Comodo products being demonstrated include Discovery Scanning, an automated inventory of all SSL certificates on a corporate network, and the hardware-free Two-factor Authentication used for regulatory compliance. Comodo Two Factor now has a f... (more)

Online Encryption: Roots Are Showing

Jersey City, NJ, December 15, 2009 - In X.509 encryption, discriminating buyers check to be sure that certificate roots are well-protected. Certificate owners also check the distribution of the roots: can they be found in as many of the major browsers as possible? Owners aim for widespread distribution across all browsers. Public Key Infrastructure (PKI) certificates allow computer users to encrypt information, scrambling it so that only someone with access to the certificate owner's key can unscramble it. The key itself is scrambled, as is the key used to scramble it, and so on back to the document that contains the original key, a long string of alphanumeric characters. The document that contains that string is called the root certificate. The root certificate must be kept secure, because millions of digital certificates use it to encrypt or digitally sign billions... (more)