Identity and Trust Assurance encryption, verification and authentication

Comodo Encryption Journal

Subscribe to Comodo Encryption Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Comodo Encryption Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

Comodo, Identity and Trust Assurance Management Solutions provider, announced the release of Zero Touch Linux (ZTL), a complete suite of back office server applications centrally controlled by a user friendly web-based interface. ZTL was developed by Comodo's Positive Software Division, specialists in web hosting and server automation. ZTL takes a 'best of breed' approach by offering administrators server software pre-configured on Comodo's Linux distribution, Trustix Secure Linux. ZTL is ideal for small businesses looking to achieve an easy way to migrate to Linux, yet ZTL also serves the needs of the larger enterprise with sophisticated administration requirements. A single installation of ZTL brings under one umbrella a File Server, Print Server, Domain Controller, DNS, Mail Server, Web Mail, Database Server, Web Server, Proxy Server, DHCP server, Content Filtering... (more)

Comodo Certificate Status Protocol Is Timely, Accurate

A manager gives a key to an employee so the employee can drive a locked truck. The manager controls use of the key and the equipment; if the employee leaves the company, or if the employee dies, the manager is responsible to get the key back or change the locks. But when the employee is instead driving a truckload of information down the information superhighway, handing out and retrieving the key can be more complicated. Businesses protect their digital information in transit using Public Key Infrastructure. Public Key Infrastructure is based on the idea of two “keys” for each server or mailbox. The first key is public, available for wide distribution, and for example this key might be included in every email you send. The second is “private.” The private key is kept secret. You never show this private key to anyone, but you use to sign or encrypt information. Di... (more)

Medical Practices Can Use Two-Factor Authentication

Jersey City, NJ, September 03, 2009 - Healthcare practices need expertise in information technology in order to comply with regulations such as the Red Flag Rule and HIPAA. Comodo now offers a free trial of a hardware-free solution that allows healthcare networks to comply with two-factor authentication requirements. Comodo's cost-effective and flexible two-factor authentication solutions eliminate the need for cumbersome physical tokens and expensive new hardware. Comodo's innovative approach allows practices to use one-time passwords, challenge questions, secure cookie technology, or the industry's easiest two-factor technology, client-side digital certificates with user names and passwords. As the largest issuer of high-assurance digital certificates, Comodo's certificate solutions enable organizations to meet their two-factor authentication requirements with a... (more)

Veracode State of Software Security Report

With the trend of targeted cyber attacks along with the exploitation of common vulnerabilities such as SQL Injection, it is clear that the core software infrastructure of several critical industries remains extremely vulnerable. Released today, the Veracode “State of Software Security Report: Volume 3” uncovered that those security vendors tasked with protecting enterprises are often the most at risk due to the poor quality of their very own software applications. In fact, 72 percent of security products and services applications analyzed in this report failed to meet acceptable levels of security quality. In its most recent State of Software Security report, Veracode analyzed 4,835 applications that were submitted to its cloud-based application security testing platform for independent security verification. That number is nearly double from the previous report (S... (more)

Forecasting the Future of IT Is Scary

On December 16, 2013, our friends over at Compare the Cloud wrote a blog called “The Day Computing Changed Forever – and We All Missed it.” The blog centered on what the future of the Cloud could hold for society. Ironically enough, the post was published on the same day that Google (pictured below) announced it’s new line of products – four legged military machines. SkyNet anyone? Anyway, in the post our friends over at Compare the Cloud set the stage for what the future of the Cloud and IT in general could look like. From operating in the world via customized avatars, to fitting an entire data center within the space of a few specs of DNA to human clusters providing science with answers beyond current imagination, our friends at Compare the Cloud lay out a very interesting vision for the future. That said, we are going to use this space to, point-by-point, decon... (more)

RSA Conference 2009 Exhibitor Profiles

RSA Conference 2009 takes place April 20, 2009 - April 24, 2009 at The Moscone Center in San Francisco. Business Wire is the official news wire for the RSA Conference 2009. Breaking news releases, advisories, photos, and multimedia are available at Tradeshownews.com, Business Wire's trade show, conference, and event news resource. Listed below are RSA Conference 2009 exhibitor profiles. Company: AEP Networks Booth: 628 Media Contact: Jeanne Achille, The Devon Group Phone: 732-706-0123 x 11 E-mail: jeanne@devonpr.com Web: www.aepnetworks.com   AEP Networks offers secure communications, networking and application access for government, enterprise and carriers. We work with systems integrators, managed service providers and the distribution channel to deliver integrated solutions incorporating our leading edge products: •Enhanced-grade secure voice and multi-service d... (more)

Pragmatic Web Services Security Today - Simple strategies for securing and monitoring Web services

Concerns about security are cited as the single largest barrier to rapid Web services adoption. Yet most Web services today are fairly straightforward point-to-point integrations that can be securely implemented using only digital certificates and the Secure Sockets Layer (SSL) protocol. Regardless of security strategy, enterprises are well advised to monitor their Web services to ensure security has not been compromised. Taken together, widely available standard security technologies and active monitoring provide a sensible approach to the majority of today's Web service security challenges. This article describes how to use these technologies to secure the most common deployments of Web services quickly and easily. I'll close with a brief introduction of WS-Security and how this emerging standard relates to what you do and do not get with SSL. Web Services Securit... (more)

Comodo Says Send Email, Not Postcards Scrawled in Pencil

"If it's urgent enough to send in a business email, it's usually something you don't want others to see," said Melih Abdulhayoglu, Chief Security Architect and CEO of Comodo Group, Inc., a leading Internet security company. "Most emails are not secure messages. To a moderately skilled person, inside the organization or out, they are as easy to read or even to change, as a postcard written in pencil." Emails do not reach their recipients directly. The senders have no control over the route their emails take, from server to server, to their destinations. Anyone between the sender and recipient could intercept messages, read them, change them, redirect them, or delete them. "Email leaks are always humiliating when you finally detect them. And if your competition detects them first, you can lose valuable information." To allow email users to control their confidential mes... (more)

Comodo Releases NOC Monkey 2.0 Beta 2

Comodo, a global Certification Authority, announced that it has released the next generation of its remote web-based server provisioning software NOC Monkey 2.0 beta 2 through their Web Hosting and server automation division PSOFT (Positive Software). NOC Monkey is a web-based tool for remote server management. It simplifies dedicated server maintenance in data centers by providing administrators with a simple web interface to install operating systems remotely; reinstall servers and recover them from file-system crashes and change root passwords without having to connect the console. The range of new features in NOC Monkey 2.0 beta 2 includes support for the Linux Logical Volume Manager. LVM allows administrators to re-partition servers 'on-the-fly' without the need to stop the server first to back it up and comes as default with most modern Linux distributions. Addi... (more)

Comodo Innovations at SC World Congress October 13 and 14

Jersey City, NJ, September 29, 2009 - Comodo Group will exhibit its landscape of products at the SC World Congress, a trade show for information technology professionals in New York City, October 13 and 14, 2009. Comodo products being demonstrated include Comodo Endpoint Security Manager, which now includes Disk Encryption at no extra charge. Comodo Endpoint Security Manager offers centralized administration of the award-winning Comodo antivirus, firewall and disk encryption software. Endpoint Security Manager also offers a new Offline Updater, permitting administrators to schedule security updates for an entire network. Other Comodo products being demonstrated include Discovery Scanning, an automated inventory of all SSL certificates on a corporate network, and the hardware-free Two-factor Authentication used for regulatory compliance. Comodo Two Factor now has a f... (more)

Online Encryption: Roots Are Showing

Jersey City, NJ, December 15, 2009 - In X.509 encryption, discriminating buyers check to be sure that certificate roots are well-protected. Certificate owners also check the distribution of the roots: can they be found in as many of the major browsers as possible? Owners aim for widespread distribution across all browsers. Public Key Infrastructure (PKI) certificates allow computer users to encrypt information, scrambling it so that only someone with access to the certificate owner's key can unscramble it. The key itself is scrambled, as is the key used to scramble it, and so on back to the document that contains the original key, a long string of alphanumeric characters. The document that contains that string is called the root certificate. The root certificate must be kept secure, because millions of digital certificates use it to encrypt or digitally sign billions... (more)