Identity and Trust Assurance encryption, verification and authentication

Comodo Encryption Journal

Subscribe to Comodo Encryption Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Comodo Encryption Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

On December 16, 2013, our friends over at Compare the Cloud wrote a blog called “The Day Computing Changed Forever – and We All Missed it.” The blog centered on what the future of the Cloud could hold for society. Ironically enough, the post was published on the same day that Google (pictured below) announced it’s new line of products – four legged military machines. SkyNet anyone? Anyway, in the post our friends over at Compare the Cloud set the stage for what the future of the Cloud and IT in general could look like. From operating in the world via customized avatars, to fitting an entire data center within the space of a few specs of DNA to human clusters providing science with answers beyond current imagination, our friends at Compare the Cloud lay out a very interesting vision for the future. That said, we are going to use this space to, point-by-point, decon... (more)

Comodo Unveils Zero Touch Linux (ZTL) For Back Office Automation

Comodo, Identity and Trust Assurance Management Solutions provider, announced the release of Zero Touch Linux (ZTL), a complete suite of back office server applications centrally controlled by a user friendly web-based interface. ZTL was developed by Comodo's Positive Software Division, specialists in web hosting and server automation. ZTL takes a 'best of breed' approach by offering administrators server software pre-configured on Comodo's Linux distribution, Trustix Secure Linux. ZTL is ideal for small businesses looking to achieve an easy way to migrate to Linux, yet ZTL also serves the needs of the larger enterprise with sophisticated administration requirements. A single installation of ZTL brings under one umbrella a File Server, Print Server, Domain Controller, DNS, Mail Server, Web Mail, Database Server, Web Server, Proxy Server, DHCP server, Content Filtering... (more)

Comodo Says Send Email, Not Postcards Scrawled in Pencil

"If it's urgent enough to send in a business email, it's usually something you don't want others to see," said Melih Abdulhayoglu, Chief Security Architect and CEO of Comodo Group, Inc., a leading Internet security company. "Most emails are not secure messages. To a moderately skilled person, inside the organization or out, they are as easy to read or even to change, as a postcard written in pencil." Emails do not reach their recipients directly. The senders have no control over the route their emails take, from server to server, to their destinations. Anyone between the sender and recipient could intercept messages, read them, change them, redirect them, or delete them. "Email leaks are always humiliating when you finally detect them. And if your competition detects them first, you can lose valuable information." To allow email users to control their confidential mes... (more)

Innovating Staging of Two-Factor Authentication Succeeds for Rhode Island Bank

To prevent online fraud, financial institutions that offer online banking are required by the Federal Financial Insitutions Examination Council (FFIEC) to double-check that the person logging in to the system is a valid customer. When BankNewport in Rhode Island adopted a Two-Factor authentication plan, its concern was to make the transition as easy as possible on its customers. In addition to requiring online customers to use a password, the bank chose to install digital certificates from Comodo on each customer's computer. The process looked simple: the first time the customer tried to log in, the bank would send the customer a digital certificate, a small document. The document would install itself on the customer's computer. Every time the customer tried to log in after that, the bank's computer would check for the certificate. As required by the FFIEC, BankNewpo... (more)

Comodo Shows Off Protection Landscape at RSA Conference 2009

Comodo will demonstrate its Protection Landscape for enterprises at the RSA Conference 2009. Comodo is distributing free conference expo passes. This $75 value is a full-access pass good for the length of the conference. Comodo’s Protection Landscape is an enterprise-grade suite of effective IT security solutions that encompasses endpoint security, digital certificate management, content & identify authentication, and compliance. Comodo chose the RSA Conference to display its Protection Landscape because it’s the industry’s premier IT security event. Computer experts interested in cutting-edge security research can learn about the latest developments at the upcoming RSA Conference. The RSA Conference, which began in 1991 as a meeting of 50 cryptographers, is now one of the leading trade shows for computer and Internet security. Last year 17,000 people registered for... (more)

Medical Practices Can Use Two-Factor Authentication

Jersey City, NJ, September 03, 2009 - Healthcare practices need expertise in information technology in order to comply with regulations such as the Red Flag Rule and HIPAA. Comodo now offers a free trial of a hardware-free solution that allows healthcare networks to comply with two-factor authentication requirements. Comodo's cost-effective and flexible two-factor authentication solutions eliminate the need for cumbersome physical tokens and expensive new hardware. Comodo's innovative approach allows practices to use one-time passwords, challenge questions, secure cookie technology, or the industry's easiest two-factor technology, client-side digital certificates with user names and passwords. As the largest issuer of high-assurance digital certificates, Comodo's certificate solutions enable organizations to meet their two-factor authentication requirements with a... (more)

Disk Encryption Protects Data with Comodo Endpoint Security Manager

Jersey City, NJ, September 10, 2009 - At no extra charge, enterprise IT managers can now deploy Comodo Disk Encryption with Comodo's Endpoint Security Manager, a centralized administration console for business networks. 12,000 laptops are lost or stolen in US airports every week, according to a study by the Ponemon Institute. Many of them belong to corporate travelers, whose IT professionals are left to worry that the lost information they contained might be misused. If the organization had deployed disk encryption, they might have spared themselves hours of agony and financial penalties. Root encryption, and whole- or partial-disk encryption settings allow IT managers to protect stored information. With Comodo Endpoint Security Manager, every computer in the company can now be encrypted and protected. Encryption uses a mathematical algorithm to change computer files i... (more)

Mobile Devices: Authenticate or Encrypt?

Two conflicting opinions crossed my desk today. Michael Hickins reported on Iranian Phone Spoofing, Fake Twitter Accounts And Trust in his blog at InformationWeek.  People are spoofing cell phone calls to his Iranian friends' phone accounts, to avoid sanctions for calling Iran.  "Cybersecurity expert Melih Abdulhayoglu, CEO of Comodo, tells me that content authentication is "the next big thing," Hickins wrote. I was already thinking about the insecurity of cell phone communications because Molly Dolesalek reported on them in Processor Magazine. "It's fairly easy to tap into a cell phone conversation, but the business world doesn't really understand that," Dunleavy says. For that reason, he believes that there will be more interest in voice encryption, including VoIP encryption," she wrote, quoting Mike Dunleavy, president of Diginonymous. Authenticate or encrypt?   ... (more)

No Charge for One-Click Backup Encryption with Comodo BackUp

Jersey City, NJ, September 22, 2009 - Windows Server 2008-compatible Comodo Backup protects network files with scheduled backups, at no charge. Comodo Backup 2.0 provides convenient one–click backup of email accounts, Windows registries and system partitions. Comodo Backup allows administrators to schedule backups to fit work timetables, create customized backup routines with a range of filters and macros, and configure the backup protocol with Comodo’s intuitive interface in minutes. Backups can be scheduled daily, weekly or synchronously. In its synchronization mode, Comodo Backup will conduct rolling backups a pre-specified intervals, ensuring that files are always current. Comodo Backup logs all backup information, and sends information to team members about the status of backup jobs. Once backed-up the files can be password-protected and encrypted using multipl... (more)

Comodo Innovations at SC World Congress October 13 and 14

Jersey City, NJ, September 29, 2009 - Comodo Group will exhibit its landscape of products at the SC World Congress, a trade show for information technology professionals in New York City, October 13 and 14, 2009. Comodo products being demonstrated include Comodo Endpoint Security Manager, which now includes Disk Encryption at no extra charge. Comodo Endpoint Security Manager offers centralized administration of the award-winning Comodo antivirus, firewall and disk encryption software. Endpoint Security Manager also offers a new Offline Updater, permitting administrators to schedule security updates for an entire network. Other Comodo products being demonstrated include Discovery Scanning, an automated inventory of all SSL certificates on a corporate network, and the hardware-free Two-factor Authentication used for regulatory compliance. Comodo Two Factor now has a f... (more)

Comodo Backup, Free Utility, Safeguards Computer Information in Two Ways

Comodo Backup Encrypts and Safeguards Data, Optimizes File Space Jersey City, NJ, November 03, 2009 - In October, Sidekick users experienced the acute distress of losing their data files—apparently forever. If corporate networks lose information, their pain is magnified. The number and size of the files lost may be thousands or millions times greater. The loss may even kill the patient, shutting down a business permanently. Comodo Backup 2.1 protects against data loss crises by taking real-time backups of user data, with more flexibility and control than ever, and still for free. New features in Comodo Backup include step-by-step wizards to guide even novice users through the entire backup, restore and scheduling procedures, and real-time backups. The synchronization feature creates real-time backups by copying files over as soon as they are modified. Granular schedul... (more)