ABOUT COMODO. Year Established: 1998 Ownership: Private Employees: over 700



Similar documents
Driving Company Security is Challenging. Centralized Management Makes it Simple.

Overview. Comodo Certificate Manager

Why are we changing Security Partners?

AVeS Cloud Security powered by SYMANTEC TM

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats

HomeConvenience.com. Creating Trust Online CASE STUDY. Comodo Identity and Trust Assurance Suite. Content Verification Certificate.

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

The Key to Secure Online Financial Transactions

Internet threats: steps to security for your small business

Comodo 2048 bit SSL Certificates. Security for your online business now and long into the future

Comodo Endpoint Security Manager SME Software Version 2.1

Introduction. PCI DSS Overview

Fighting Advanced Threats

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Endpoint Protection Small Business Edition 2013?

Comodo Certificate Manager. Comodo Enterprise

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

PCI Data Security Standards (DSS)

ENTRUST CLOUD. SSL Digital Certificates, Discovery & Management entrust@entrust.com entrust.com

Putting Web Threat Protection and Content Filtering in the Cloud

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

End-user Security Analytics Strengthens Protection with ArcSight

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

STPIC/Admin/002/ / Date: Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

Comodo MyDLP Software Version 2.0. Endpoint Installation Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Stable and Secure Network Infrastructure Benchmarks

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business

Comodo Certificate Manager. Centrally Managing Enterprise Security, Trust & Compliance

WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA

Injazat s Managed Services Portfolio

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

Get Started Guide - PC Tools Internet Security

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

What Do You Mean My Cloud Data Isn t Secure?

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Comodo Mobile Security for Android Software Version 3.0

isheriff CLOUD SECURITY

Comodo Web Application Firewall for Plesk Software Version 2.11

Cloud and Data Center Security

PCI Security Compliance

Feature List for Kaspersky Security for Mobile

Creating Trust Online TM. Identity & Trust Assurance in a changing standards environment. *(Extended Validation)

AVG AntiVirus. How does this benefit you?

74% 96 Action Items. Compliance

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Protecting Your Organisation from Targeted Cyber Intrusion

Zone Labs Integrity Smarter Enterprise Security

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Kaspersky Security for Mobile

A Case for Managed Security

Unified Threat Management, Managed Security, and the Cloud Services Model

Endpoint Security and the Case For Automated Sandboxing

Comodo Mobile Device Manager Software Version 1.0

Security Services. 30 years of experience in IT business

CONTENTS. PCI DSS Compliance Guide

Top tips for improved network security

Nine Steps to Smart Security for Small Businesses

Next Gen Firewall and UTM Buyers Guide

Quick Heal Exchange Protection 4.0

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

BitDefender Client Security Workstation Security and Management

Did you know your security solution can help with PCI compliance too?

The Hillstone and Trend Micro Joint Solution

MONTHLY WEBSITE MAINTENANCE PACKAGES

Analyzing HTTP/HTTPS Traffic Logs

ADDING STRONGER AUTHENTICATION for VPN Access Control

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Managing Web Security in an Increasingly Challenging Threat Landscape

Enterprise-Grade Security from the Cloud

Top five strategies for combating modern threats Is anti-virus dead?

Trend Micro Cloud Security for Citrix CloudPlatform

Symantec Endpoint Protection

ESET Security Solutions for Your Business

Powerful, customizable protection for web applications and websites running ModSecurity on Apache/Linux based web-servers

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

Proven LANDesk Solutions

Cisco Advanced Malware Protection

Networking for Caribbean Development

How To Protect A Virtual Desktop From Attack

Cyber Security Solutions:

Introduction: 1. Daily 360 Website Scanning for Malware

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

OVERVIEW. Enterprise Security Solutions

Cisco Advanced Malware Protection for Endpoints

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

Transcription:

ABOUT COMODO Comodo is Creating Trust Online because none of us can realize the full potential of the Internet unless it s a trusted place to interact and conduct business. Year Established: 1998 Ownership: Private Employees: over 700 Today, the Comodo family of companies is Creating Trust Online in over 100 countries with: Over 75 million installations of Comodo PC security software Tens of millions of Internet users interacting and conducting business with the websites, email and other Internet applications that Comodo secures and authenticates Over 600,000 business customers and e-merchants US Headquarters 1255 Broad Street Clifton, NJ 07013 United States 1.201.963.0004 EnterpriseSolutions@comodo.com www.comodo.com Other Locations Salt Lake City, USA Manchester, UK Bradford, UK Ankara, Turkey Iasi, Romania Odessa, Ukraine Chennai, India Beijing, China Our dependence on computers and the Internet grows with each passing day, and so, too, does our vulnerability. Daily news reports confirm a clear and present danger confronting all Internet users from ever-growing and evolving malware (a collective term to describe viruses, Trojans, worms, etc.), cybercrime, cyber-terrorism and related threats. These threats, primarily the work of highly-sophisticated organized crime groups, directly harm millions of Internet users each day and are eroding our trust in the Internet. Every individual or business using the Internet has a role in restoring this trust. Comodo's team of over 600 people has a passion for meeting these challenges head-on Creating Trust Online for individuals, e-merchants, small to medium businesses and large enterprises. Comodo's innovative software and services do this by: Authenticating Individuals, Businesses Websites and Content: Authentication is at the heart of trust it s the process of confirming that something or someone is genuine. Hackers are counterfeiters and impersonators they thrive on deception. Trust is created when individuals, businesses, websites or software publishers are authenticated to ensure that they are who they say they are, and that their information has not been tampered with. This trust is the core of successful online businesses and trusted online interactions. Securing Information: Encrypting sensitive information at all stages of its lifecycle is a proven method of keeping it safe from hackers. Strong Public Key Infrastructure (PKI) encryption through digital certificates ensures that the encrypted information can only be used by authorized parties. Securing Websites and E-Commerce: Uncovering and alerting IT organizations to vulnerabilities in their server/site s technical configuration or security procedures that could be exploited by hackers, and providing advice or solutions to eliminate them. Securing and Maintaining PCs: Denying hackers access to the information and resources they need to succeed, such as your personal or business financial information, and at a more fundamental level, your computer s internet connection and processing capacity. 1

EMAIL CERTIFICATES SSL CERTIFICATES Digital signature ensures confidentiality Secure message encryption Protection against identity theft Integrates with Microsoft Office and major applications Comodo is the largest single-brand certificate authority in the world. Comodo SSL Certificate is the quickest and most cost-effective way for an online business to protect customer transactions. Comodo offers the broadest array of PKI digital certificates, covering a range of types and terms, fully-featured certificate management solutions, more browser recognition than any other vendors, and great value-add packages. As a WebTrust certified Certification Authority (CA), Comodo meets the highest standards of confidentiality, system reliability and pertinent business practices as judged through qualified independent audits.» ssl.comodo.com SSL PARTNER PROGRAM No monthly or annual volume commitments Quick and easy management system that provides reporting and real-time order tracking Immediate access to resell Comodo s entire range of security products and services at discounted rates 2

SSL CERTIFICATES CERTIFICATE TYPES Features EV SSL Instant SSL Wildcard SSL UC Certificates Essential SSL Warranty level (max.) $1,750,000 $250,000 $250,000 N/A $10,000 Validation level Extended Organization Organization Organization Domain SHA-2 a a a a a 2048 bit root keys a a a a a 128/256 bit encryption a a a a a 99.9% browser ubiquity a a a a a TrustLogo site seal a a a a a Unlimited server licenses a a a a a Priority phone support a a a a a Unlimited re-issuance a a a a a 30-day money-back guarantee a a a a a SGC version a a a SAN/multi-domain a a a a Extended validation a a a Green address bar Unlimited subdomains Designed for MS Exchange a a a 3

PCI SCANNING WITH HACKERGUARDIAN HackerGuardian is a fully configurable vulnerability assessment and reporting service for networks and web servers. Our remote audits run over 60,000 individual security tests on an organization s servers and provide an executive report on those vulnerabilities. Because Comodo is PCI Security Council Approved Scanning Vendor (ASV), our HackerGuardian PCI Control Center range provides everything a merchant needs to become compliant with the PCI Council Data Security Standards (DSS) vulnerability scanning guidelines.» hackerguardian.com 4

PRODUCT BENEFITS Increase sales and reduce shopping cart abandonment Consistent placement of the HackerProof Trustmark throughout your website HACKERPROOF DAILY VULNERABILITY SCAN & TRUSTMARK Enjoy our exclusive Point to Verify technology and invite more interaction to build trust for your website Protect customers or users from phishing attacks and stay ahead of today s threats Automate a daily scan on your HackerProof domain so you can save time - set it and forget it Behind HackerProof is a powerful daily scanning engine that ensures HackerProof websites meet Comodo s standards. HackerProof also provides a trustmark that is displayed on a website to build trust and confidence with users. Many studies have shown how a visual indicator that reminds visitors of their security helps improve sales conversion. The interactive trustmark provides up-to-date scanning information to visitors for added assurance.» comodo.com/hackerproof 5

PRODUCT BENEFITS No Downloads, No Complicated Setup Web Inspector is a simple and easy to use internet cloud service that allows you to do everything from your browser. This makes setup and maintenance a breeze! MALWARE SCANNING WITH WEB INSPECTOR Web Inspector is a cloud-based service that inspects your website for malware, detects vulnerabilities and protects your website from thousands of security threats, daily. Web Inspector s platform boasts the following key features and benefits to help protect your website, business and customers.» webinspector.com Immediate Notifications Time is money and Web Inspector is designed with this in mind. If it detects malware or vulnerabilities, it sends a notification immediately so you can keep your site safe. Daily Malware Scanning Protect your business by preventing hackers from using your site to infect visitors and wreak havoc. Blacklist Monitoring Online trust and reputation are critical to the success of your business. This feature does an exhaustive check daily, to make sure your website is not blacklisted by major search engines. Site Seal Show your customers that your website is secure and safe. The Web Inspector Site Seal visually communicates that your website is safe, secure, trusted and verified. 6

TEST TYPES PENETRATION TESTING WITH DRAGON LABS Open-source intelligence (OSINT) External network tests Internal network tests Web application tests Phishing tests Comodo Penetration Testing services simulate a highly-skilled and motivated hacker in their attempts to access your organization s financial, customer and other sensitive data. The Comodo team has modeled its Advanced Persistent Threat (APT) simulations after the real world. We have studied many high-profile security breaches, analyzed methods and tools used by attackers and created our very own APT tests. These tests allow you to understand the real business threats you face. Insider threat assessment DoS/DDoS tests APT simulation» dragonlabs.comodo.com 7

DRAGON LABS PRODUCT FEATURES Comprehensive audit Comprehensive audit of your perimeter security carried out by professional security analysts Advanced hacking Goes beyond automated vulnerability scanning to examine your systems using advanced hacking and social engineering techniques Detailed reports Detailed reports provide an exhaustive assessment of current security vulnerabilities Expert advice Detailed reports provide an exhaustive assessment of current security vulnerabilities PRODUCT BENEFITS Internet of Things Anything that has an IP address can be hacked. From a fridge to a smart TV, all your assets connected to the Internet are under attack. Dragon Labs offers a number of tests for anything that has an Internet connection. Mobile Applications Mobile applications are tested against known vulnerabilities from weak server side controls to information disclosure flaws. ERP Security Tests Enterprise Resource Planning software, such as SAP and the infrastructure it runs on, is tested against known vulnerabilities and possible business logic flaws that could result in the loss of data and/or its integrity. SCADA/PLC Security Tests PLC can be directly connected to the Internet or be part of a network that is. As we see an increase in the number of attacks and malware against PLC systems, Dragon Labs offers the possibility to assess the current security level of your most important systems. 8

PRODUCT BENEFITS Prevent unknown files from infecting the endpoint and causing a data breach Comprehensive endpoint security Reduce administrative workload Minimize downtime Increase user productivity Strengthen network security Become virus free, guaranteed COMODO ENDPOINT SECURITY MANAGER Comodo Enterprise Security Manager (CESM) platform provides a state-of-the-art anti-malware suite that proactively protects your servers, workstations, laptops and netbooks, while offering advanced, real-time management and control over critical system resources. We offer the industry s only virus-free warranty based on Comodo s Default Deny Protection architecture and patent-pending Auto Sandbox technology.» comodo.com/endpoint_security_manager PRODUCT FEATURES Only solution to recognize and manage all three file types: good, bad and unknown Patent-pending Auto Sandbox runs and evaluates unknown files in secure container Centralized administration Manages processes, services and apps per endpoint and per site Automatic, customizable and locationaware policies Next-generation panoramic display Supports push deployment Real-time notifications Wake-on-LAN enabled system 9

PRODUCT BENEFITS Better Protection CASG provides gateway filtering of email. Messages are intercepted and filtered by CASG servers before being forwarded onto your mail server - ensuring a clean mail stream. Unlike a local antispam solution, unsolicited and virus-carrying mail never touches the corporate network. COMODO ANTISPAM GATEWAY Comodo Antispam Gateway(CASG) is an advanced, cloud-based email filtering solution designed to free employee inboxes of junk mails. Its centralized webbased management console allows administrators to easily set up, add users and domains, configure blacklists and whitelists, and to manage quarantined emails.» comodo.com/business-security/email-security/antispamgateway.php Always Up To Date As a cloud-based service, CASG filters mail against whitelists and blacklists which are constantly updated in real time. This offers far greater protection than periodically downloading whitelists and blacklists or having to occasionally update device firmware. Easier to Manage CASG is outsourced, eliminating the need to purchase dedicated hardware that requires maintenance and updates. Administrators can simply add their domains to the CASG console, point their MX records to the CASG servers and filtering begins immediately. 10

PRODUCT FEATURES Over-the-Air (OTA) enrollment of devices Default profiles enforced during enrollment Manually enroll mobile devices Authenticate enrollment with a one-time passcode Auto-configure corporate accounts like email, Wi-Fi, VPN Enforce restriction policies across mobile devices MOBILE DEVICE MANAGER Ensure the security of all corporate or employee-owned devices with configured restrictions and security policies, secure user and device certificates, and continuous monitoring to keep all devices compliant and malware free. Manage the lifecycle of the device and its data by setting user, device and application level policies, configuring app whitelists and blacklists, and requiring that all enrolled devices be encrypted, and compliant when enabling access to corporate email.» mdm.comodo.com Watch all devices with real-time status Monitor users and devices that access the company mail server Watch all applications deployed on devices Block undesired or suspicious applications Blacklist prohibited applications and require uninstallation Enforce strict passcode and encryption policies Prevent data leakage when device is lost or stolen Assign identification and device certificates Audit all devices to ensure compliance 11

PRODUCT FEATURES Modsecurity rules updates Categorization of rules Free technical support Advanced filtering Quick implementation Intrusion protection Nginx supported Lightspeed supported WEB APPLICATION FIREWALL Free to use for merchants of partners Low memory usage Fast CPU load CPanel plugin Comodo Anti-Virus Labs support Powerful, real-time protection for web applications and websites running on Apache and Linux web servers (Nginx and Lightspeed also supported). The only free ModSecurity rules that come from a company with an internationally renowned antivirus lab. We see threats at every level, worldwide, and are dedicated to turning that knowledge into security solutions for you.» modsecurity.comodo.com TOP PROTECTION Advanced filtering, security and intrusion protection. HASSLE FREE Hassle free implementation & updates of ModSecurity Rules. REDUCE RISK You cannot afford a security breach. 12

PRODUCT FEATURES Manage unlimited subdomains Geo-DNS - global traffic management URL forwarding (301, 302 and Frame) Full IPv6 compatibility Secondary DNS/zone transfers MANAGED DNS Geo load balancing Web-Based control panel 99.99% Guaranteed uptime SLA Unlimited DNS records DNS by Comodo features GeoDNS or origin-based routing, offering the flexibility to direct requests by country, state/province, or city worldwide! Regions can be assigned multiple responses or IP addresses, allowing you to distribute visitor traffic between multiple servers. Custom geo groups let you target regions that share common language, currency, or other demographics that match your business needs.» dnsbycomodo.com PRODUCT BENEFITS Increase your sales with a faster site Gain critical safety for your domains Take charge with point-and-click webbased control Optimum performance with real-time updates 13

MYDLP DATA LOSS PREVENTION MyDLP is a feature-rich data loss prevention solution that allows businesses to discover, monitor and control the movement of confidential data across networks of any size. With MyDLP, an organization can block any data flow containing credit card numbers, social security numbers or any sensitive information. MyDLP also provides data security for web, mail, printers, removable devices and more.» mydlp.com 14