- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
-
Impenetrable cybersecurity without sacrificing usability
-
Gain detailed visibility into all your endpoints activities
-
Reduce the attack surface to remediate and patch
-
Fortify mobile devices that exit and enter your network
-
Keep endpoints safe from known threat signatures
-
Setup device network and security policies quickly
TECHNOLOGY & PROCESS-
Patented to ensure absolute isolation from threats
-
Insights from deep web and dark web to eliminate risk
-
Our pioneered approach has shifted the industry
-
100% trust an all files at lightning speeds
-
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
-
Retain experts to investigate an incident to start remediation
-
Our experts closely monitor changes to your environment 24x7x365
-
Cybersecurity experts will continuously hunt suspicious endpoint activity
SUPPORT, DEPLOY, MAINTAIN-
Ensure your installations are properly deployed
-
Trouble with maintaining your products? Get help now
-
Align your success with optimal security performance
-
- Tools
- For HomeFOR HOMEWEB BROWSERBROWSER ADD-ONS & EXTENSIONS
- Partners
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.KNOWLEDGE BASETHREAT LABS
- Company
Comodo Digital Signatures Protect Contents of Email Messages
Jersey City, NJ, May 28, 2009 – When emailed documents will be needed later as legal proof, the person producing them needs to be able to swear that they have not been altered. Comodo Secure Email Pro offers a way to protect the contents of an email from alteration in transit.
Email’s ease and utility, which allows internal users, partners and customers to communicate effectively, also puts confidential information in reach of those who want to profit from it. To a moderately skilled person, inside the organization or out, unsecured email is easy to read, impersonate and alter, and is not much different from a postcard written in pencil.
Digital signatures on email documents represent a one-way hash (encryption) of the message content that uses the sender’s public and private key pair. This process creates a “signature” that only the sender’s public key can decrypt. The recipient, using the sender’s public key, can then validate the sender as well as the integrity of message contents. The sender’s digital signature will be un-trusted by the recipient’s email program if either the message content or sender’s digital certificate are invalid.
The Secure Email Pro signing procedure automates the digital signature process, and attaches the “signature” to the out-going document to be emailed. CSE Pro also checks and validates incoming signed documents using the reverse process.
Because the computer tenaciously pairs the digital signature to one saved version of the document, it is nearly impossible to repudiate a digitally signed document.
Comodo Secure Email Pro is an install-and-forget software application that can automatically digitally sign all outgoing messages without the need to pre-exchange passwords or public certificates. For further protection, email documents can also be encrypted, making them unintelligible to anyone but the intended recipient.
For more information about Comodo Secure Email Pro, visit https://360.comodo.com/security-solutions/endpoint-protection/.
COMODO CA
Comodo CA, Ltd., is the world’s second-largest issuer of high-assurance Digital Certificate, providing online communications unreadable to anyone but the sender and the recipient.
Comodo CA, Ltd., provides cost-effective solutions that protect online information. Digital Certificate enable secure sockets layer (SSL) communications, unreadable to anyone but the sender and the recipient. Code-signing certificates ensure that software is not tampered with.
Patent-pending Comodo CA technology enables Internet users to send encrypted emails without exchanging public keys beforehand.
Continual innovation, a core competence in digital encryption, and a commitment to halting Internet crime distinguish the Comodo companies. The Comodo companies secure and authenticate online transactions and communications for over 200,000 business customers, and it has over 15,000,000 installations of desktop security products.
Comodo CA, Ltd., — Creating Trust Online®. For more information, visit our website.
About Comodo
The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL, Code Signing, Content Verification and Email Certificate; award winning PC Security software; Vulnerability Scanning services for PCI Compliance; secure e-mail and fax services.
Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet’s ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and 3,000,000 users of our desktop security products.
For additional information on Comodo – Creating Trust Online® visit Comodo.com
For more information, reporters and analysts may contact:
Comodo
Email: media-relations@comodo.com
Office: +1 (888) 266-6361