Jump to content

Comodo Cybersecurity

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 184.60.110.82 (talk) at 15:32, 23 December 2014 (Comodo SecureBox). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Comodo Group, Inc.
Company typePrivate
IndustryComputer security, internet security
FoundedUnited Kingdom (1998 (1998))[1]
Headquarters,
Key people
Melih Abdulhayoğlu (President and CEO)
ProductsSSL Certificates, AntiVirus, Firewall, PCI Compliance, EndPoint Security, Managed DNS
Number of employees
1,100+
Websitewww.comodo.com

Comodo Group, Inc. is a privately held group of companies providing computer software and SSL digital certificates, based in Clifton, New Jersey[not verified in body] in the United States. It has offices in the United Kingdom, Ukraine, Romania, China, India, Turkey and Clifton, NJ.[not verified in body]

History

The company was founded in 1998 in the United Kingdom,[1] by Comodo CEO, Melih Abdulhayoğlu, a technologist and an entrepreneur. Comodo relocated to the United States in 2004. Comodo's product line is focused primarily on computer and internet security.[2] The firm operates a Certificate Authority that issues SSL certificates, offers a computer security suite that includes antivirus and firewall protection and offers other web and network protection services.

Comodo Companies

  • Comodo CA Lmtd: Based in Manchester UK, this is a digital certificate authority that issues SSL and other digital certificates. According to W3Techs.com, Comodo is the second most used provider of SSL digital certificates.[3][4]
  • Comodo Security Solutions, Inc: Based in Clifton, NJ this company develops and markets security software for commercial and consumer use. This includes web site vulnerability and penetration scannng, corporate and consumer pc security systems and other networks security products. Comodo AntiVirus Labs support all versions of their security systems.[5]
  • DNS.com: Based in Louisville Ky, this company provides managed DNS services. services.[6][7]
  • AdTrustMedia: Based in Watchung NJ this company is a third party web advertising network.[8][9]

Controversies

In response to Symantec's comment over the effectiveness of free Antivirus software, on September 18, 2010, the CEO of Comodo Group Melih Abdulhayoğlu challenged Symantec to see which products can defend the consumer better against malware.[10] Symantec responded saying that if Comodo is interested they should have their product included in tests by independent reviewers.[11] On 29 September 2010, Neil J. Rubenking, the lead analyst for security of PC Magazine, published an article on Comodo Antivirus 5.0 that[12][13] concluded that Comodo Antivirus 5.0 blocked a higher percentage of malware than Norton AntiVirus, but was less effective than the Norton solution when it came to malware removal. Rubenking's review also noted that the Comodo malware blocking gave a number of false positives which he felt tarnished Comodo's results.

On March 15, 2011, Comodo reported that a user account with an affiliate registration authority had been compromised which was used to create a new user account that issued nine certificate signing requests.[14] Nine certificates for seven domains were issued.[14] The attack was traced to IP address 212.95.136.18, which originates in Tehran, Iran.[14] Though Comodo initially reported the breach was the result of a "state-driven attack", it subsequently stated that the origin of the attack may be the "result of an attacker attempting to lay a false trail."[14][15]

Such issues have been widely reported, and has led to criticism of how certificates are issued and revoked.[16][17][18][19]

All of the certificates have been revoked.[14] Microsoft has issued a security advisory and update to address the issue.[20][21]

On March 26, 2011, a person under the username "ComodoHacker" made several posts to Pastebin.com claiming to be an Iranian responsible for the attacks.[22][23]

Notable Products

Overview

Comodo was founded as a Certificate Authority selling SSL and digital certificates. Its primary source of revenue comes from related products to business and enterprises.

Since 2004, when it introduced Comodo Internet Security, Comodo has attempted to expand into the consumer software market. Comodo offers many products as freemium: They are available for download free of charge,[24] but additional features or more feature-rich editions are available for a fee.[25] Among Comodo's free products is the Comodo Internet Security, incorporating a personal firewall, Host-based intrusion detection system and antivirus program.[26]

Comodo Endpoint Security Manager (CESM is a server product for managing the security settings on network endpoint computers. The firewall and antivirus components managed by CESM are versions of the same software components in the consumer desktop versions of Comodo Internet Security.[27]

Other Comodo branded freeware security tools include an anti-malware tool, and a memory firewall that protects against over 90% of buffer overflow attacks.[28] For an additional fee, Comodo product users can subscribe to Comodo's computer cleaning and optimizing services for real-time computer assistance. Comodo also offers Comodo System Cleaner, which includes a free registry cleaner program,[29] Comodo Unite (formerly EasyVPN), a virtual private networking (VPN) program, and Comodo SecureEmail, an email encryption program that allows S/MIME email users to send emails to any email user without exchanging keys beforehand. These products come in both a limited free version and a more functional professional release.

Comodo Internet Security

On February 7, 2013, Comodo Internet Security Complete earned the PCMag Editor’s Choice award. They gave the suite 4.5 of 5 stars and a rating of Excellent. Writing for the magazine, Neil J. Reubenking concluded “The biggest win for Comodo Internet Security Complete 2013 isn't in features, but in support."[30] In August 2012, Top Ten Reviews gave Comodo Internet Security 2012's firewall a 9.88 out of 10, higher than any other product evaluated.[31] Neil Rubenking of PC Magazine gave Comodo Internet Security 2012 a rating of 4 of 5, Excellent. He wrote "Very inexpensive. Very good malware blocking. GeekBuddy remote help extremely effective at cleaning up malware, especially rootkits."[32] c|net Magazine gave Comodo Internet Security a score of 5 out of 5.[33]

January 29, 2013, Neil Rubenking of PCMag rated the Comodo Firewall as "Excellent". He noted that with recent versions of Windows including a firewall it is important that alternative products be free and provide additional features, which are true for the Comodo Firewall.[34] May 7, 2012 CNET Magazine rated Comodo Firewall "Spectacular" and gave it 5 of 5 stars. They referred to it as more capable than the firewall that comes free with recent versions of Windows.[citation needed]

In August 2012, Jeffery L. Wilson of PCMag.com gave Comodo System Utilities an Excellent rating, 4 of 5 stars. He states as his "Bottom Line" conclusion "Comodo System Utilities is a free and effective system-enhancing utility that is as potent, if not more so in certain cases, as paid apps".[35]

On June 17, 2010 a cNET Editor's review gave the Comodo Dragon a 5 of 5 star score and a rating of Spectacular. they concluded "Dragon is not only fast, but like Google Chrome, it is not strewn with numerous icons, leaving more room for Web viewing. For those who are extra cautious about their online security, or for those who are worried about Google's data-mining, this fast browser is a great choice.[36]

Comodo EndPoint Management System (CESM)

The Comodo Endpoint Management System is a centralized device management system that includes the ability to distribute PC security software. The software used includes the same firewall and antivirus systems that comprise Comodo Internet Security. [37][38]

Comodo SecureBox

Comodo Securebox was released in July 2014 and was jointly developed with Western Union with the intention of solving the problem of an application needing to conduct sensitive activities such as financial transactions from an already compromised system. Securebox protect the application and its activities even if the computer is infected with malware[39][40]

Comodo Browsers

  • Comodo Dragon: A chromium based browser with enhanced privacy and security features
  • Comodo IceDragon: A Firefox based browser with enhanced privacy and security features

See also

References

  1. ^ a b "How US entrepreneur's global internet security firm started life in Bradford". Telegraph & Argus. 3 Sep 2014. Retrieved 3 Sep 2014.
  2. ^ Richmond, Riva (6 April 2011). "An Attack Sheds Light on Internet Security Holes". The New York Times. Retrieved 17 March 2013.
  3. ^ http://www.w3techs.com
  4. ^ http://www.turkofamerica.com/index.php?option=com_content&task=view&id=1461&Itemid=161
  5. ^ https://www.icsalabs.com/vendor/comodo-security-solutions-inc
  6. ^ http://en.wikipedia.org/wiki/DNS.com
  7. ^ http://www.domainersmagazine.com/Jul-Aug-Issue-22/DNS.com-The-Next-Geo-Targeting-Solution.html
  8. ^ http://downloads.zdnet.com/search/?compid=102791
  9. ^ http://www.herdprotect.com/signer-adtrustmedia-llc-7739f0d7e1d6c302e4aa8b647d9c7f52.aspx
  10. ^ Abdulhayoğlu, Melih (18 September 2010). "Challenge to Symantec from Comodo CEO!". Comodo Group. Retrieved 22 September 2010.
  11. ^ Rubenking, Neil J. (22 September 2010). "Comodo Challenges Symantec to Antivirus Showdown". PC Magazine. Ziff Davis, Inc. Retrieved 22 September 2010.
  12. ^ Rubenking, Neil J. (29 September 2010). "Comodo Antivirus 5.0". PC Magazine. Ziff Davis, Inc. Retrieved 29 September 2010.
  13. ^ "Comodo Antivirus 5.0 malware blocking chart". PC Magazine. Ziff Davis, Inc. 29 September 2010. Retrieved 29 September 2010. {{cite news}}: |first= missing |last= (help)
  14. ^ a b c d e "Report of incident on 15-MAR-2011". Comodo group. Retrieved 2011-03-24.
  15. ^ Hallam-Baker, Phillip (March 23, 2011). "The Recent RA Compromise". Comodo Blog. Retrieved 2011-03-24.
  16. ^ Eckersley, Peter (March 23, 2011). "Iranian hackers obtain fraudulent HTTPS certificates: How close to a Web security meltdown did we get?". EFF. Retrieved 2011-03-24.
  17. ^ "Iran accused in 'dire' net security attack" (BBC). BBC News. March 24, 2011. Retrieved 2011-03-24.
  18. ^ "Detecting Certificate Authority compromises and web browser collusion". TOR. March 22, 2011. Retrieved 2011-03-24.
  19. ^ Elinor Mills and Declan McCullagh (March 23, 2011). "Google, Yahoo, Skype targeted in attack linked to Iran". CNET. Retrieved 2011-03-24.
  20. ^ "Microsoft Security Advisory (2524375)" (Microsoft). March 23, 2011. Retrieved 2011-03-24.
  21. ^ "Microsoft Security Advisory: Fraudulent Digital Certificates could allow spoofing". Microsoft. March 23, 2011. Retrieved 2011-03-24.
  22. ^ Bright, Peter (March 28, 2011). "Independent Iranian Hacker Claims Responsibility for Comodo Hack" (WIRED). Wired. Retrieved 2011-03-29.
  23. ^ "ComodoHacker's Pastebin".
  24. ^ "Best Free Windows 7 / Vista 64-bit Software". Gizmo's Freeware. 2 December 2010. Retrieved 25 December 2010.
  25. ^ Products and Solutions
  26. ^ "Proactive Security Challenge: Results and comments". matousec.com. Difinex Ltd. Retrieved 25 December 2010.
  27. ^ http://en.wikipedia.org/wiki/Comodo_Internet_Security#Comodo_Endpoint_Security_Manager_.28CESM.29
  28. ^ "Prevent Buffer Overflow Attack with Comodo Memory Firewall". TechMixer. 26 September 2008. Retrieved 25 December 2010.
  29. ^ Gralla, Preston (2 December 2008). "Comodo Registry Cleaner (PCWorld)". PC World Australia. IDG Communications. Retrieved 25 December 2010.
  30. ^ http://www.pcmag.com/article2/0,2817,2415202,00.asp
  31. ^ http://personal-firewall-software-review.toptenreviews.com/comodo-internet-security-pro-review.html
  32. ^ http://www.pcmag.com/article2/0,2817,2399585,00.asp
  33. ^ http://download.cnet.com/Comodo-Internet-Security/3000-2239_4-10460704.html
  34. ^ http://www.pcmag.com/article2/0,2817,2414835,00.asp
  35. ^ "Comodo System Utilities Review".
  36. ^ http://download.cnet.com/Comodo-Dragon/3000-2356_4-75119680.html
  37. ^ http://www.cso.com.au/article/529456/endpoint_security_products_part_1/
  38. ^ http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Endpoint-Security-GFI-EndPointSecurity-Apr14.html
  39. ^ http://betanews.com/2014/07/23/comodo-securebox-always-assumes-the-worst-to-strengthen-endpoint-security/
  40. ^ http://www.securityweek.com/new-comodo-securebox-protects-endpoint-applications//www.securityweek.com/new-comodo-securebox-protects-endpoint-applications

[1]