- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
-
Impenetrable cybersecurity without sacrificing usability
-
Gain detailed visibility into all your endpoints activities
-
Reduce the attack surface to remediate and patch
-
Fortify mobile devices that exit and enter your network
-
Keep endpoints safe from known threat signatures
-
Setup device network and security policies quickly
TECHNOLOGY & PROCESS-
Patented to ensure absolute isolation from threats
-
Insights from deep web and dark web to eliminate risk
-
Our pioneered approach has shifted the industry
-
100% trust an all files at lightning speeds
-
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
-
Retain experts to investigate an incident to start remediation
-
Our experts closely monitor changes to your environment 24x7x365
-
Cybersecurity experts will continuously hunt suspicious endpoint activity
SUPPORT, DEPLOY, MAINTAIN-
Ensure your installations are properly deployed
-
Trouble with maintaining your products? Get help now
-
Align your success with optimal security performance
-
- Tools
- For HomeFOR HOMEWEB BROWSERBROWSER ADD-ONS & EXTENSIONS
- Partners
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.KNOWLEDGE BASETHREAT LABS
- Company
UK Government backs Comodo Secure Computing initiatives
Comodo awarded with an Exceptional Development Grant by the UK Government to help in the capture of a significant share of the Trusted Platform Module market..
London UK,10th June 2004 Comodo, recognized globally as a provider of innovative security products and services, specifically for the areas of cryptography, digital certification and advanced ASIC design, has been awarded an Exceptional Grant Award by the UK Government. Comodo along with IBM, HP, Fujitsu, Microsoft, Intel, AMD and others form the Trusted Computing Group, a consortium which exists to develop and promote open standards for hardware-enabled trusted computing and security technologies. Comodo chairs the Trusted Input work group within TCG focusing on setting the future architecture and standards for trusted Input Devices. Following this award the knowledge and expertise of the Comodo research group will now be channeled into the development of the next generation of Trusted Platform Module (TPM) providing a multifunctional device aimed specifically at the notebook market. This new device will feature a fully patented AntiTheft protection system together with many other security features demanded by the mobile PC market. TPMs are already shipping in volume from IBM, HP and Fujitsu, with adoption rates increasing fast to meet the demand for secure computing.
“The UK Government recognises that Research & Development investment is critical to the future success of the e-economy. With the award of this exceptional grant to Comodo, it clearly emphasises the importance of security.” commented Stephen Timms, the UK Minister of State for E-Commerce.
“Government acknowledgement of the expertise that we have in security innovation and integration is extremely welcome at a time when security is such a frontline topic across all sectors of the market,” commented Steve Roylance, Technical marketing Director for Comodo, “The need for enterprises to provide a trusted computing platform to employees has increased dramatically in recent months as the existing software only solutions are proven to be vulnerable to physical and software attack. In providing an innovative integrated solution for the portable PC sector of the market we will be able to service the most critical enterprise user – the mobile user“.
The growing use of mobile phones, PCs and portable computing devices for private and e-commerce transactions presents an increased risk in the protection and management of personal and commercial data. Allied to this is the increased reuse of stolen equipment through reprogramming techniques. New ways have been developed to break the current range of security systems to the extent that no barriers exist to those dedicated criminals who will then use the data to perpetrate fraud, misuse of the data or reuse of the stolen equipment. Building upon the foundation of the work done by the Trusted Computing Group and version 1.2 of the TPM specification Comodo will focus R&D effort to create a hybrid multifunctional device using best of breed hardware and software components together with their own patented security technology to provide a world class differentiator for the OEM mobile PC market. The TPM concept is expected to be used in the majority of new computers within the next few years, based on TCG specifications; it allows validation of both the computer and its user, and provides secure storage for critical data and passwords. It can verify that a ‘trusted process’ should run, and establish ‘trusted relationships’ with other computers to reduce opportunities for viruses and other attacks.
About Comodo
The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL, Code Signing, Content Verification and Email Certificate; award winning PC Security software; Vulnerability Scanning services for PCI Compliance; secure e-mail and fax services.
Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet’s ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and 3,000,000 users of our desktop security products.
For additional information on Comodo – Creating Trust Online® visit Comodo.com
For more information, reporters and analysts may contact:
Comodo
Email: media-relations@comodo.com
Office: +1 (888) 266-6361