ABOUT COMODO Comodo is Creating Trust Online because none of us can realize the full potential of the Internet unless it s a trusted place to interact and conduct business. Year Established: 1998 Ownership: Private Employees: over 700 Today, the Comodo family of companies is Creating Trust Online in over 100 countries with: Over 75 million installations of Comodo PC security software Tens of millions of Internet users interacting and conducting business with the websites, email and other Internet applications that Comodo secures and authenticates Over 600,000 business customers and e-merchants US Headquarters 1255 Broad Street Clifton, NJ 07013 United States 1.201.963.0004 EnterpriseSolutions@comodo.com www.comodo.com Other Locations Salt Lake City, USA Manchester, UK Bradford, UK Ankara, Turkey Iasi, Romania Odessa, Ukraine Chennai, India Beijing, China Our dependence on computers and the Internet grows with each passing day, and so, too, does our vulnerability. Daily news reports confirm a clear and present danger confronting all Internet users from ever-growing and evolving malware (a collective term to describe viruses, Trojans, worms, etc.), cybercrime, cyber-terrorism and related threats. These threats, primarily the work of highly-sophisticated organized crime groups, directly harm millions of Internet users each day and are eroding our trust in the Internet. Every individual or business using the Internet has a role in restoring this trust. Comodo's team of over 600 people has a passion for meeting these challenges head-on Creating Trust Online for individuals, e-merchants, small to medium businesses and large enterprises. Comodo's innovative software and services do this by: Authenticating Individuals, Businesses Websites and Content: Authentication is at the heart of trust it s the process of confirming that something or someone is genuine. Hackers are counterfeiters and impersonators they thrive on deception. Trust is created when individuals, businesses, websites or software publishers are authenticated to ensure that they are who they say they are, and that their information has not been tampered with. This trust is the core of successful online businesses and trusted online interactions. Securing Information: Encrypting sensitive information at all stages of its lifecycle is a proven method of keeping it safe from hackers. Strong Public Key Infrastructure (PKI) encryption through digital certificates ensures that the encrypted information can only be used by authorized parties. Securing Websites and E-Commerce: Uncovering and alerting IT organizations to vulnerabilities in their server/site s technical configuration or security procedures that could be exploited by hackers, and providing advice or solutions to eliminate them. Securing and Maintaining PCs: Denying hackers access to the information and resources they need to succeed, such as your personal or business financial information, and at a more fundamental level, your computer s internet connection and processing capacity. 1
EMAIL CERTIFICATES SSL CERTIFICATES Digital signature ensures confidentiality Secure message encryption Protection against identity theft Integrates with Microsoft Office and major applications Comodo is the largest single-brand certificate authority in the world. Comodo SSL Certificate is the quickest and most cost-effective way for an online business to protect customer transactions. Comodo offers the broadest array of PKI digital certificates, covering a range of types and terms, fully-featured certificate management solutions, more browser recognition than any other vendors, and great value-add packages. As a WebTrust certified Certification Authority (CA), Comodo meets the highest standards of confidentiality, system reliability and pertinent business practices as judged through qualified independent audits.» ssl.comodo.com SSL PARTNER PROGRAM No monthly or annual volume commitments Quick and easy management system that provides reporting and real-time order tracking Immediate access to resell Comodo s entire range of security products and services at discounted rates 2
SSL CERTIFICATES CERTIFICATE TYPES Features EV SSL Instant SSL Wildcard SSL UC Certificates Essential SSL Warranty level (max.) $1,750,000 $250,000 $250,000 N/A $10,000 Validation level Extended Organization Organization Organization Domain SHA-2 a a a a a 2048 bit root keys a a a a a 128/256 bit encryption a a a a a 99.9% browser ubiquity a a a a a TrustLogo site seal a a a a a Unlimited server licenses a a a a a Priority phone support a a a a a Unlimited re-issuance a a a a a 30-day money-back guarantee a a a a a SGC version a a a SAN/multi-domain a a a a Extended validation a a a Green address bar Unlimited subdomains Designed for MS Exchange a a a 3
PCI SCANNING WITH HACKERGUARDIAN HackerGuardian is a fully configurable vulnerability assessment and reporting service for networks and web servers. Our remote audits run over 60,000 individual security tests on an organization s servers and provide an executive report on those vulnerabilities. Because Comodo is PCI Security Council Approved Scanning Vendor (ASV), our HackerGuardian PCI Control Center range provides everything a merchant needs to become compliant with the PCI Council Data Security Standards (DSS) vulnerability scanning guidelines.» hackerguardian.com 4
PRODUCT BENEFITS Increase sales and reduce shopping cart abandonment Consistent placement of the HackerProof Trustmark throughout your website HACKERPROOF DAILY VULNERABILITY SCAN & TRUSTMARK Enjoy our exclusive Point to Verify technology and invite more interaction to build trust for your website Protect customers or users from phishing attacks and stay ahead of today s threats Automate a daily scan on your HackerProof domain so you can save time - set it and forget it Behind HackerProof is a powerful daily scanning engine that ensures HackerProof websites meet Comodo s standards. HackerProof also provides a trustmark that is displayed on a website to build trust and confidence with users. Many studies have shown how a visual indicator that reminds visitors of their security helps improve sales conversion. The interactive trustmark provides up-to-date scanning information to visitors for added assurance.» comodo.com/hackerproof 5
PRODUCT BENEFITS No Downloads, No Complicated Setup Web Inspector is a simple and easy to use internet cloud service that allows you to do everything from your browser. This makes setup and maintenance a breeze! MALWARE SCANNING WITH WEB INSPECTOR Web Inspector is a cloud-based service that inspects your website for malware, detects vulnerabilities and protects your website from thousands of security threats, daily. Web Inspector s platform boasts the following key features and benefits to help protect your website, business and customers.» webinspector.com Immediate Notifications Time is money and Web Inspector is designed with this in mind. If it detects malware or vulnerabilities, it sends a notification immediately so you can keep your site safe. Daily Malware Scanning Protect your business by preventing hackers from using your site to infect visitors and wreak havoc. Blacklist Monitoring Online trust and reputation are critical to the success of your business. This feature does an exhaustive check daily, to make sure your website is not blacklisted by major search engines. Site Seal Show your customers that your website is secure and safe. The Web Inspector Site Seal visually communicates that your website is safe, secure, trusted and verified. 6
TEST TYPES PENETRATION TESTING WITH DRAGON LABS Open-source intelligence (OSINT) External network tests Internal network tests Web application tests Phishing tests Comodo Penetration Testing services simulate a highly-skilled and motivated hacker in their attempts to access your organization s financial, customer and other sensitive data. The Comodo team has modeled its Advanced Persistent Threat (APT) simulations after the real world. We have studied many high-profile security breaches, analyzed methods and tools used by attackers and created our very own APT tests. These tests allow you to understand the real business threats you face. Insider threat assessment DoS/DDoS tests APT simulation» dragonlabs.comodo.com 7
DRAGON LABS PRODUCT FEATURES Comprehensive audit Comprehensive audit of your perimeter security carried out by professional security analysts Advanced hacking Goes beyond automated vulnerability scanning to examine your systems using advanced hacking and social engineering techniques Detailed reports Detailed reports provide an exhaustive assessment of current security vulnerabilities Expert advice Detailed reports provide an exhaustive assessment of current security vulnerabilities PRODUCT BENEFITS Internet of Things Anything that has an IP address can be hacked. From a fridge to a smart TV, all your assets connected to the Internet are under attack. Dragon Labs offers a number of tests for anything that has an Internet connection. Mobile Applications Mobile applications are tested against known vulnerabilities from weak server side controls to information disclosure flaws. ERP Security Tests Enterprise Resource Planning software, such as SAP and the infrastructure it runs on, is tested against known vulnerabilities and possible business logic flaws that could result in the loss of data and/or its integrity. SCADA/PLC Security Tests PLC can be directly connected to the Internet or be part of a network that is. As we see an increase in the number of attacks and malware against PLC systems, Dragon Labs offers the possibility to assess the current security level of your most important systems. 8
PRODUCT BENEFITS Prevent unknown files from infecting the endpoint and causing a data breach Comprehensive endpoint security Reduce administrative workload Minimize downtime Increase user productivity Strengthen network security Become virus free, guaranteed COMODO ENDPOINT SECURITY MANAGER Comodo Enterprise Security Manager (CESM) platform provides a state-of-the-art anti-malware suite that proactively protects your servers, workstations, laptops and netbooks, while offering advanced, real-time management and control over critical system resources. We offer the industry s only virus-free warranty based on Comodo s Default Deny Protection architecture and patent-pending Auto Sandbox technology.» comodo.com/endpoint_security_manager PRODUCT FEATURES Only solution to recognize and manage all three file types: good, bad and unknown Patent-pending Auto Sandbox runs and evaluates unknown files in secure container Centralized administration Manages processes, services and apps per endpoint and per site Automatic, customizable and locationaware policies Next-generation panoramic display Supports push deployment Real-time notifications Wake-on-LAN enabled system 9
PRODUCT BENEFITS Better Protection CASG provides gateway filtering of email. Messages are intercepted and filtered by CASG servers before being forwarded onto your mail server - ensuring a clean mail stream. Unlike a local antispam solution, unsolicited and virus-carrying mail never touches the corporate network. COMODO ANTISPAM GATEWAY Comodo Antispam Gateway(CASG) is an advanced, cloud-based email filtering solution designed to free employee inboxes of junk mails. Its centralized webbased management console allows administrators to easily set up, add users and domains, configure blacklists and whitelists, and to manage quarantined emails.» comodo.com/business-security/email-security/antispamgateway.php Always Up To Date As a cloud-based service, CASG filters mail against whitelists and blacklists which are constantly updated in real time. This offers far greater protection than periodically downloading whitelists and blacklists or having to occasionally update device firmware. Easier to Manage CASG is outsourced, eliminating the need to purchase dedicated hardware that requires maintenance and updates. Administrators can simply add their domains to the CASG console, point their MX records to the CASG servers and filtering begins immediately. 10
PRODUCT FEATURES Over-the-Air (OTA) enrollment of devices Default profiles enforced during enrollment Manually enroll mobile devices Authenticate enrollment with a one-time passcode Auto-configure corporate accounts like email, Wi-Fi, VPN Enforce restriction policies across mobile devices MOBILE DEVICE MANAGER Ensure the security of all corporate or employee-owned devices with configured restrictions and security policies, secure user and device certificates, and continuous monitoring to keep all devices compliant and malware free. Manage the lifecycle of the device and its data by setting user, device and application level policies, configuring app whitelists and blacklists, and requiring that all enrolled devices be encrypted, and compliant when enabling access to corporate email.» mdm.comodo.com Watch all devices with real-time status Monitor users and devices that access the company mail server Watch all applications deployed on devices Block undesired or suspicious applications Blacklist prohibited applications and require uninstallation Enforce strict passcode and encryption policies Prevent data leakage when device is lost or stolen Assign identification and device certificates Audit all devices to ensure compliance 11
PRODUCT FEATURES Modsecurity rules updates Categorization of rules Free technical support Advanced filtering Quick implementation Intrusion protection Nginx supported Lightspeed supported WEB APPLICATION FIREWALL Free to use for merchants of partners Low memory usage Fast CPU load CPanel plugin Comodo Anti-Virus Labs support Powerful, real-time protection for web applications and websites running on Apache and Linux web servers (Nginx and Lightspeed also supported). The only free ModSecurity rules that come from a company with an internationally renowned antivirus lab. We see threats at every level, worldwide, and are dedicated to turning that knowledge into security solutions for you.» modsecurity.comodo.com TOP PROTECTION Advanced filtering, security and intrusion protection. HASSLE FREE Hassle free implementation & updates of ModSecurity Rules. REDUCE RISK You cannot afford a security breach. 12
PRODUCT FEATURES Manage unlimited subdomains Geo-DNS - global traffic management URL forwarding (301, 302 and Frame) Full IPv6 compatibility Secondary DNS/zone transfers MANAGED DNS Geo load balancing Web-Based control panel 99.99% Guaranteed uptime SLA Unlimited DNS records DNS by Comodo features GeoDNS or origin-based routing, offering the flexibility to direct requests by country, state/province, or city worldwide! Regions can be assigned multiple responses or IP addresses, allowing you to distribute visitor traffic between multiple servers. Custom geo groups let you target regions that share common language, currency, or other demographics that match your business needs.» dnsbycomodo.com PRODUCT BENEFITS Increase your sales with a faster site Gain critical safety for your domains Take charge with point-and-click webbased control Optimum performance with real-time updates 13
MYDLP DATA LOSS PREVENTION MyDLP is a feature-rich data loss prevention solution that allows businesses to discover, monitor and control the movement of confidential data across networks of any size. With MyDLP, an organization can block any data flow containing credit card numbers, social security numbers or any sensitive information. MyDLP also provides data security for web, mail, printers, removable devices and more.» mydlp.com 14