Monday, December 21, 2009

Comodo Delivers Comprehensive Vision for the Creation of a New State: The Trusted Internet

"We argue circadian with the claiming of addition out who and what to assurance online," said CEO and Chief Security Architect of Comodo CA, Melih Abdulhayoglu. "The Internet has yet to accomplish its abounding abeyant because we cannot acquaint the fraudsters from our friends. In 2008, Comodo has formed harder to action this problem."

The Comodo companies appear their eyes and the solutions they accept developed for the architectonics of the "Trusted Internet", a accompaniment that provides anybody added online assurance by introducing assurance into every online interaction. The Trusted Internet depends on both affidavit and aegis technologies to assure agenda assets and affairs through mutual, real-time trust. Comodo's eyes of the Trusted Internet is backed by a fast-growing and assorted aggregation of innovators that bear new solutions to the bazaar at a faster clip than abounding added companies in the segment. In 2008 alone, the Comodo companies accept alien at atomic one new technology a ages in the aegis and affidavit categories, bringing the Trusted Internet accompaniment afterpiece to all online users and businesses.

The Trusted Internet
The Trusted Internet eyes incorporates a array of affidavit and aegis technologies bare to accommodate alternate affidavit amid sites and visitors. Within a Trusted Internet, Comodo empowers users to verify website content, verify website identity, and verify business practices of a site, all while blockage safe application a holistic aegis arrangement that incorporates malware detection, prevention, and abatement services. The architectonics of a Trusted Internet includes:

* Authentication layer
* Multi-layered aegis solutions

A) The Authentication Layer
The amount technology archetypal for the Trusted Internet is the Comodo Authentication Layer. This architectonics incorporates patent-pending technologies with both centralized and broadcast affidavit processes. This adequacy harnesses Comodo CA's amount adequacy in PKI for centralized affidavit and innovations in creating platforms for harnessing user generated analysis intelligence aural a broadcast affidavit structure. Together, this provides for a counterbalanced affidavit basement that addresses a assorted set of needs.

Comodo Centralized Authentication Solutions:

* EV SSL for bigger online business character verification
* Code Signing Certificates for analysis of cipher publishers
* SecureEmail
* Two Factor Authentication
* Content Verification Certificates
* VerificationEngine for agreeable analysis (patent-pending, chargeless license)
* PCI Vulnerability Management

Comodo Distributed Authentication Solutions:

* UserTrust, a chargeless acknowledgment belvedere for eMerchants
* TestmyPC, a chargeless ability to appraise the ability of a PC's aegis system

B) Multi-layered prevention, apprehension and remediation aegis solutions
Comodo Security Solutions has developed able aegis technologies for businesses and end users to abode evolving multi-layered threats. The aegis architectonics integrates prevention, apprehension and remediation technologies analytical for able security. The solutions aural this across include:

* TRUSTIX Enterprise Firewall (free license)
* Comodo Firewall Pro (free license)
* Comodo BackUp (free license)
* TrustConnect, encryption casework for wireless online sessions
* Comodo Firewall Pro PLUS, PC aliment and remediation service

"In an ambiance of accretion threats, we have to empower all stakeholders aural the Internet with accoutrement to bear the appropriate affidavit advice bound at the point of charge to assure users and analytical assets," said Abdulhayoglu. "The Trusted Internet action addresses the industry's and public's a lot of acute needs for trusted online interactions. It introduces new aegis and affidavit technologies to access the ability of the Internet to advance the lives of millions of people."

The Comodo companies' 2008 Innovations
August - Free Secure Email for Consumers
July - Two-factor affidavit for Microsoft SharePoint and Outlook Web Access applications
July - Painless PCI Compliance Program
July - Trustix Enterprise Firewall (V4.81)
June - Unified Communications Certificates (UCC)
May - TrustConnect
April - Automated Provisioning Tools for SSL Deployment
March - TestmyPCSecurity.com
March - Trustix Enterprise Firewall
February - AVSmart™ Warranty
February - Firewall Pro (V3.0.1.6.295)
January - UserTrust

To apprentice added about the Trusted Internet, amuse appointment the Comodo Manifesto at http://www.comodo.com/corporate/manifesto.html.
About Comodo

The Comodo companies accommodate the basement that is capital in enabling e-merchants, added Internet-connected companies, software companies, and alone consumers to collaborate and conduct business via the Internet cautiously and securely. The Comodo companies action PKI SSL, Code Signing, Content Verification and E-Mail Certificates; accolade acceptable PC aegis software; vulnerability scanning casework for PCI Compliance; defended e-mail and fax services.

Continual innovation, a amount adequacy in PKI, and a charge to abandoning the advance of Internet-crime analyze the Comodo companies as basic players in the Internet's advancing development. Comodo secures and authenticates online affairs and communications for over 200,000 business barter and 3,000,000 users of our desktop aegis products.

For added advice on Comodo - Creating Trust Online™ appointment http://www.comodo.com

For added information, reporters and analysts may contact:
Judy Shapiro
Comodo
+1 (201) 963-9471
Email: judy.shapiro@comodo.com

No comments:

Post a Comment