SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Introduction to Comodo




                                                                                            Spring, 2010
The information contained within this document is proprietary to Comodo CA, Ltd. The recipient
agrees not to distribute, share or use any part of this material without express written permission
                                        of Comodo CA, Ltd.
Market Leader in Digital Security, Identity & Trust Assurance (ITA)
                      for Internet Commerce, Communications and Collaboration


                          Founded in 2001, launched SSL digital certificate offers in 2002
                          Introduced Identity & Trust Assurance architecture in 2005
History
                          2006 and 2009 Info Security “Hot Company” Technology Award
                          Well over 2 million digital certificates issued to date

                          2nd largest SSL Certificate Authority - >25% market share
                          Principal innovator in online Identity & Trust Assurance market
                          Founding CA-B Forum member, drove EV SSL (Green Bar)
Leadership                standards
                          12 patents pending in security and identity assurance technology
                          World-renowned Digital Trust Cryptography Lab R&D centers
                          Fully audited and compliant WebTrust Certification Authority

                          More than 200,000 business customers in over 100 countries
                                  Several Major Financial Services, Insurance, Healthcare companies
                                  Hundreds of Universities, State/Local Governments
Customers                         Thousands of e-commerce merchants
                          Secure millions of desktop PC’s
                          7,000 partners/resellers

                          Revenues grew 60%+ 2007-2009
Business Highlights       Profitable, generating positive cash flow
                          Over 600 employees in Comodo group of companies globally

                                        2
Key Facts




3
A Complete Portfolio of Internet Security and
                                                                        Authentication Solutions


                                                                                                                                  Solutions to validate an
                                                         Online Merchants                                                       e-merchant’s online identity,
                                                                                                                                build trust with consumers,
                                                                                                                                 and convert more website
                                                       HackerProof
                                                                                                                                  visitors into customers
                                    Compliance
                                     Scanning           Trustmark       Payment Credential Content Verification Certificates (CVC)




                                                     Extended Validation (EV) SSL Certificates

                                                                                                                               Logo and Login Box
                                                                                                                       Content Verification Certificates (CVC)

            Full Range of General Purpose
                   SSL Certificates
                                                             ESM
                                                       PC Endpoint Security

                                                                                                                                Consumers
     Enterprise Security                                    2Factor
                                                         2 Factor Authentication


                          Code Signing
                                                     Secure Email
      Pro-Series SSL                               Secure Email Certificates
       for Intel-based                                  and Software
   Notebooks & Servers
                                                                                                                             Verification Engine
                                                                                                                        Spoof-proof Identity Assurance
                            UCC SSL              HackerGuardian
                          for Microsoft                                            Internet Security
                         Exchange 2007       Vulnerability Scanning                  PC Security Suite



Solutions to make it easier                                                                              Solutions to authenticate Internet
  for businesses to have                                                                                 content and provide PC security
 a more secure operation
                                                                               4
Enterprise Protection Landscape




                                   Whitelist Based Anti-
                                   Malware Protection




                      PCI Council
                    Approved Network
                      Vulnerability
                        Scanning




                                       PKI and Cookie-
                                      based Two-Factor
                                        Authentication
                                          Solutions

           Full Range of Digital
             Certificates and
                Certificate
               Management
                 Solutions


5
Enterprise Markets Timeline




Resellers

 Online and Telesales

                   Enterprise Sales


     6
High Assurance SSL Market Share Trend




            28%

                           46%


             26%




                                       Comodo
                                       Verisign
                                    All Other CA’s




High Assurance = Organizational Validation + Extended Validation
                                         7                    SOURCE: NETCRAFT
Customers & Partners


Enterprise Security
Enterprise Security   Online Businesses
                      Online Businesses         Partners
                                                Partners




                              8
Case Study: Financial Services


Financial Services Company
 –   A Bank with $1B of assets
 –   Serving its customers with a variety of consumer deposit and credit products
 –   Online banking and brokerage capabilities

Business Challenge
 –   Inability of customers to verify the Bank’s authentic website from fraudulent or phishing sites and for Bank
     to verify that it is their customers who are logging into their online banking accounts and not fraudsters.

Comodo Solution
 –   A digital certificate called the Content Verification Certificate (CVC) using Comodo See, Verify, Trust (SVT)
     technology and Comodo TF (Two Factor).
           Using proven PKI methods, effectively binding digitally protected content to a specific URL or IP address
           Providing the highest level of security for Web page content
           Ability to turn a PC into a Smart card like Authentication token

The Result
 –   Bank can verify their customers
 –   Protection for the Bank’s website logos, log-in boxes and rate pages
 –   Users can verify this content with Comodo’s free Verification Engine
           User can mouse over the protected content to see a green border pop up to confirm the site is
           legitimate




                                                             9
Case Study: Certificate Management


Representative Companies/Organizations
 –   Florida State University, Stanford University
 –   State of Oregon
 –   Morgan Stanley, Lending Tree
 –   Xerox, Reed Elsevier

Business Challenges
 –   High digital certificate costs
 –   Inflexible certificate management solution, negatively impacting adoption and IT staff utilization

Comodo Solution
 –   Certificate Manager
            Highly flexible solution, configured by Comodo for maximum enterprise integration
            Widest range of digital certificate offerings
            Prices 30%+ lower than Verisign or Entrust

The Result
 –   Lower certificate cost and IT staff time required for certificate administration
 –   Wider adoption/more certificates under central administration
      –     Faster certificate issuance
            Fewer expired certificates




                                                      10
Case Study: Online Merchant


The Company
–   A mid-size e-merchant in the flowers and plants category based in Pennsylvania
Business Challenge
–   “Having the freshest flowers and highest quality bulbs no longer fully guarantees
    a sale," said Erik Thomas, Director of Ecommerce. "We have to prove that the
    sale is a safe transaction and our customers' information remains secure, or we
    stand to send our sales elsewhere.”
Comodo Solution
–   Comodo EV SSL Certificate, displaying the reassuring green browser address
    bar to customers initiating transactions
The Result
–   Clear indication to site visitors that the company is adhering to the highest
    standards of security and trust, providing them reassurance and supporting
    conversion to customers




                                       11
Securing/Authenticating the Most Successful
     Political Fundraising Website in History




        12
Comodo and Verisign Brand Awareness


           Using Google search volume as an indicator: www.google.com/trends




VERISIGN
                                                                               COMODO



COMODO                                                                         VERISIGN




                                            13
The Internet’s Best Designed TrustMarks




• Persistent Visibility: Fixed position within a browser window offers
  constant visual reinforcement of a site’s verified trust credentials

• Better Verifiability: Point to Verify technology delivers real-time
  verification to the displaying website rather than invite visitors to click away

• Strong Credibility: TrustMarks are for consumer consumption. Comodo is
  a widely sought after consumer brand associated with Internet trust and
  security



                                       14
Fully Featured Digital Certificates




   15
Full Range of Digital Certificates




  16
Simple, Effective Secure E-Mail and S/MIME
                                Certificates




             17
Simple, Effective Secure E-Mail and S/MIME
                                Certificates




             18
Vulnerability Scanning For Security and
                           Compliance




         19
Vulnerability Scanning For Security and
                                             Compliance


                                                                      If for PCI,
                                                     Site Admin      Provide PCI
    Comodo             Initiate/manage scans                         Compliance
 HackerGuardian                                                        Reports
  Scan Control
                        Receive reports
     Center
   Web Admin


                                                         Address identified
                        Scan for                           vulnerabilities
                    24,000 potential
                     vulnerabilities
   Comodo                                     Internet-
HackerGuardian                              Connected
   Service                                Server, Website,
                                                 etc.
                        Gather and
                      interpret scan
                          results




                                 20
About Comodo

Comodo is a leading brand in Internet security, covering an extensive range of security software and services,
   including digital certificates, PCI scanning, desktop security, online faxing, and computer technical support
   services.
Business and consumers worldwide recognize Comodo as standing for security and trust. Comodo products secure
     and authentic online transactions for over 200,000 business and have more than 18,000,000 installations of
     Comodo desktop security software, including an award-winning firewall and antivirus software offered at no
     charge.
The Comodo family of companies is committed to continual innovation, core competencies in PKI, authentication,
    and malware detection and prevention. As a catalyst in eliminating online crime, the companies’ mission is to
    establish a Trusted Internet.
With US headquarters overlooking Manhattan on New Jersey’s waterfront and global resources in the United
     Kingdom, China, India, Ukraine, and Romania, Comodo products offer intelligent security, authentication, and
     assurance.
Comodo -- Creating Trust Online®.


Comodo Group, Inc.
525 Washington Blvd
Jersey City, NJ 07310
United States
U.S. +1.888.256.2608
Int’l +1.703.637.9361
Email: EnterpriseSolutions@Comodo.com

Mais conteúdo relacionado

Mais procurados

Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introductionAvirot Mitamura
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideNick Owen
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET Journal
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlRamesh Nagappan
 
SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business Jinhwan Shin
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET Journal
 
SmartCard Forum 2008 - Gemalto
SmartCard Forum 2008 - GemaltoSmartCard Forum 2008 - Gemalto
SmartCard Forum 2008 - GemaltoOKsystem
 
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -Naoto Miyachi
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingOKsystem
 
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer
 
Axiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityAxiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityVikram Sareen
 
Higgins Overview 2008 [Compatibility Mode]
Higgins Overview 2008 [Compatibility Mode]Higgins Overview 2008 [Compatibility Mode]
Higgins Overview 2008 [Compatibility Mode]Markus Sabadello
 
Tutorial 3 peter kustor
Tutorial 3 peter kustorTutorial 3 peter kustor
Tutorial 3 peter kustoregovernment
 
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...Techsylvania
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12lfilliat
 
Powerpoint Presentation
Powerpoint PresentationPowerpoint Presentation
Powerpoint Presentationwebhostingguy
 

Mais procurados (19)

Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
 
SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business
 
We Authenticate the World
We Authenticate the WorldWe Authenticate the World
We Authenticate the World
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
 
SmartCard Forum 2008 - Gemalto
SmartCard Forum 2008 - GemaltoSmartCard Forum 2008 - Gemalto
SmartCard Forum 2008 - Gemalto
 
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
 
Sabett: ESRA Identity Management 11-09-10
Sabett:  ESRA Identity Management 11-09-10Sabett:  ESRA Identity Management 11-09-10
Sabett: ESRA Identity Management 11-09-10
 
Axiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityAxiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identity
 
Higgins Overview 2008 [Compatibility Mode]
Higgins Overview 2008 [Compatibility Mode]Higgins Overview 2008 [Compatibility Mode]
Higgins Overview 2008 [Compatibility Mode]
 
Tutorial 3 peter kustor
Tutorial 3 peter kustorTutorial 3 peter kustor
Tutorial 3 peter kustor
 
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
 
Powerpoint Presentation
Powerpoint PresentationPowerpoint Presentation
Powerpoint Presentation
 

Destaque

Ponencia marketing olfativo alimentación
Ponencia marketing olfativo alimentaciónPonencia marketing olfativo alimentación
Ponencia marketing olfativo alimentacióncristinasalacamps
 
Ciências humanas e suas tecnologias gabarito
Ciências humanas e suas tecnologias gabaritoCiências humanas e suas tecnologias gabarito
Ciências humanas e suas tecnologias gabaritofsolidaria
 
Marketing de servicios
Marketing de serviciosMarketing de servicios
Marketing de serviciosHector Maida
 
Karrieredagavis 2009
Karrieredagavis   2009Karrieredagavis   2009
Karrieredagavis 2009stofa86
 
GDSF India
GDSF IndiaGDSF India
GDSF IndiaSyd Mj
 
Memoria ayuda a domicilio 2011
Memoria ayuda a domicilio 2011Memoria ayuda a domicilio 2011
Memoria ayuda a domicilio 2011Muskizko Udala
 
Jarrin arte-barroco
Jarrin arte-barrocoJarrin arte-barroco
Jarrin arte-barrocoviviale19
 
Crear una "lovemark". Uzink. Value Innovation.
Crear una "lovemark". Uzink. Value Innovation.Crear una "lovemark". Uzink. Value Innovation.
Crear una "lovemark". Uzink. Value Innovation.Santiago González
 
1108 Sapag Ev Proy Foll C
1108 Sapag Ev Proy Foll C1108 Sapag Ev Proy Foll C
1108 Sapag Ev Proy Foll Crolivares1983
 
Seguimiento de dependientes del alcohol yo de la cocaína después de su salida...
Seguimiento de dependientes del alcohol yo de la cocaína después de su salida...Seguimiento de dependientes del alcohol yo de la cocaína después de su salida...
Seguimiento de dependientes del alcohol yo de la cocaína después de su salida...David Saavedra Pino
 
Análisis de ingeniería usando cosmos exposicon
Análisis de ingeniería usando cosmos exposiconAnálisis de ingeniería usando cosmos exposicon
Análisis de ingeniería usando cosmos exposiconmecanicadefluidos
 
8 AnµLisis De La Pel÷Cula Toma Mi Mano
8 AnµLisis De La Pel÷Cula Toma Mi Mano8 AnµLisis De La Pel÷Cula Toma Mi Mano
8 AnµLisis De La Pel÷Cula Toma Mi Manotunegocioweb
 
The Evolution of Hitchhiking
The Evolution of HitchhikingThe Evolution of Hitchhiking
The Evolution of Hitchhikingelfenwick
 
Maybelline
MaybellineMaybelline
Maybellinemyshelle
 
Digital Tierra nº 12 Junio de 2016
Digital Tierra nº 12 Junio de 2016Digital Tierra nº 12 Junio de 2016
Digital Tierra nº 12 Junio de 2016Ejército de Tierra
 
FOREVER 21 - MODA
FOREVER 21 - MODA FOREVER 21 - MODA
FOREVER 21 - MODA kadaniesede
 

Destaque (20)

Ponencia marketing olfativo alimentación
Ponencia marketing olfativo alimentaciónPonencia marketing olfativo alimentación
Ponencia marketing olfativo alimentación
 
Ciências humanas e suas tecnologias gabarito
Ciências humanas e suas tecnologias gabaritoCiências humanas e suas tecnologias gabarito
Ciências humanas e suas tecnologias gabarito
 
Marketing de servicios
Marketing de serviciosMarketing de servicios
Marketing de servicios
 
Manuel María: animais
Manuel María: animaisManuel María: animais
Manuel María: animais
 
Karrieredagavis 2009
Karrieredagavis   2009Karrieredagavis   2009
Karrieredagavis 2009
 
GDSF India
GDSF IndiaGDSF India
GDSF India
 
Memoria ayuda a domicilio 2011
Memoria ayuda a domicilio 2011Memoria ayuda a domicilio 2011
Memoria ayuda a domicilio 2011
 
Jarrin arte-barroco
Jarrin arte-barrocoJarrin arte-barroco
Jarrin arte-barroco
 
Spanish blade book600 1
Spanish blade book600 1Spanish blade book600 1
Spanish blade book600 1
 
Crear una "lovemark". Uzink. Value Innovation.
Crear una "lovemark". Uzink. Value Innovation.Crear una "lovemark". Uzink. Value Innovation.
Crear una "lovemark". Uzink. Value Innovation.
 
1108 Sapag Ev Proy Foll C
1108 Sapag Ev Proy Foll C1108 Sapag Ev Proy Foll C
1108 Sapag Ev Proy Foll C
 
Seguimiento de dependientes del alcohol yo de la cocaína después de su salida...
Seguimiento de dependientes del alcohol yo de la cocaína después de su salida...Seguimiento de dependientes del alcohol yo de la cocaína después de su salida...
Seguimiento de dependientes del alcohol yo de la cocaína después de su salida...
 
Programa de Preparación a la Certificación del Examen PMP®
Programa de Preparación a la Certificación del Examen PMP®Programa de Preparación a la Certificación del Examen PMP®
Programa de Preparación a la Certificación del Examen PMP®
 
1. mitocondria sirtuinas-rapamicina y envejecimento
1. mitocondria sirtuinas-rapamicina y envejecimento 1. mitocondria sirtuinas-rapamicina y envejecimento
1. mitocondria sirtuinas-rapamicina y envejecimento
 
Análisis de ingeniería usando cosmos exposicon
Análisis de ingeniería usando cosmos exposiconAnálisis de ingeniería usando cosmos exposicon
Análisis de ingeniería usando cosmos exposicon
 
8 AnµLisis De La Pel÷Cula Toma Mi Mano
8 AnµLisis De La Pel÷Cula Toma Mi Mano8 AnµLisis De La Pel÷Cula Toma Mi Mano
8 AnµLisis De La Pel÷Cula Toma Mi Mano
 
The Evolution of Hitchhiking
The Evolution of HitchhikingThe Evolution of Hitchhiking
The Evolution of Hitchhiking
 
Maybelline
MaybellineMaybelline
Maybelline
 
Digital Tierra nº 12 Junio de 2016
Digital Tierra nº 12 Junio de 2016Digital Tierra nº 12 Junio de 2016
Digital Tierra nº 12 Junio de 2016
 
FOREVER 21 - MODA
FOREVER 21 - MODA FOREVER 21 - MODA
FOREVER 21 - MODA
 

Semelhante a Comodo Overview Presentation Read Only

User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
Offer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteOffer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteKeynectis
 
How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?Keynectis
 
Slide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate AuthoritySlide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate Authoritywebhostingguy
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketOKsystem
 
Certification authority
Certification   authorityCertification   authority
Certification authorityproser tech
 
CCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_FinalCCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_FinalGreg Posten
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012steveramsthel
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012steveramsthel
 
Powerpoint Presentation
Powerpoint PresentationPowerpoint Presentation
Powerpoint Presentationwebhostingguy
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demandkate_holden
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demandpjpallen
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021CIO Look Magazine
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Securitytrickey270
 

Semelhante a Comodo Overview Presentation Read Only (20)

User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Offer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteOffer a trustworthy environment on your web site
Offer a trustworthy environment on your web site
 
How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?
 
Slide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate AuthoritySlide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate Authority
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
 
Certification authority
Certification   authorityCertification   authority
Certification authority
 
CCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_FinalCCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_Final
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
 
Powerpoint Presentation
Powerpoint PresentationPowerpoint Presentation
Powerpoint Presentation
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demand
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demand
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
eMCA Suite
eMCA SuiteeMCA Suite
eMCA Suite
 
Procert Authentication Platform by Mcarbon
Procert Authentication Platform by McarbonProcert Authentication Platform by Mcarbon
Procert Authentication Platform by Mcarbon
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Security
 

Comodo Overview Presentation Read Only

  • 1. Introduction to Comodo Spring, 2010 The information contained within this document is proprietary to Comodo CA, Ltd. The recipient agrees not to distribute, share or use any part of this material without express written permission of Comodo CA, Ltd.
  • 2. Market Leader in Digital Security, Identity & Trust Assurance (ITA) for Internet Commerce, Communications and Collaboration Founded in 2001, launched SSL digital certificate offers in 2002 Introduced Identity & Trust Assurance architecture in 2005 History 2006 and 2009 Info Security “Hot Company” Technology Award Well over 2 million digital certificates issued to date 2nd largest SSL Certificate Authority - >25% market share Principal innovator in online Identity & Trust Assurance market Founding CA-B Forum member, drove EV SSL (Green Bar) Leadership standards 12 patents pending in security and identity assurance technology World-renowned Digital Trust Cryptography Lab R&D centers Fully audited and compliant WebTrust Certification Authority More than 200,000 business customers in over 100 countries Several Major Financial Services, Insurance, Healthcare companies Hundreds of Universities, State/Local Governments Customers Thousands of e-commerce merchants Secure millions of desktop PC’s 7,000 partners/resellers Revenues grew 60%+ 2007-2009 Business Highlights Profitable, generating positive cash flow Over 600 employees in Comodo group of companies globally 2
  • 4. A Complete Portfolio of Internet Security and Authentication Solutions Solutions to validate an Online Merchants e-merchant’s online identity, build trust with consumers, and convert more website HackerProof visitors into customers Compliance Scanning Trustmark Payment Credential Content Verification Certificates (CVC) Extended Validation (EV) SSL Certificates Logo and Login Box Content Verification Certificates (CVC) Full Range of General Purpose SSL Certificates ESM PC Endpoint Security Consumers Enterprise Security 2Factor 2 Factor Authentication Code Signing Secure Email Pro-Series SSL Secure Email Certificates for Intel-based and Software Notebooks & Servers Verification Engine Spoof-proof Identity Assurance UCC SSL HackerGuardian for Microsoft Internet Security Exchange 2007 Vulnerability Scanning PC Security Suite Solutions to make it easier Solutions to authenticate Internet for businesses to have content and provide PC security a more secure operation 4
  • 5. Enterprise Protection Landscape Whitelist Based Anti- Malware Protection PCI Council Approved Network Vulnerability Scanning PKI and Cookie- based Two-Factor Authentication Solutions Full Range of Digital Certificates and Certificate Management Solutions 5
  • 6. Enterprise Markets Timeline Resellers Online and Telesales Enterprise Sales 6
  • 7. High Assurance SSL Market Share Trend 28% 46% 26% Comodo Verisign All Other CA’s High Assurance = Organizational Validation + Extended Validation 7 SOURCE: NETCRAFT
  • 8. Customers & Partners Enterprise Security Enterprise Security Online Businesses Online Businesses Partners Partners 8
  • 9. Case Study: Financial Services Financial Services Company – A Bank with $1B of assets – Serving its customers with a variety of consumer deposit and credit products – Online banking and brokerage capabilities Business Challenge – Inability of customers to verify the Bank’s authentic website from fraudulent or phishing sites and for Bank to verify that it is their customers who are logging into their online banking accounts and not fraudsters. Comodo Solution – A digital certificate called the Content Verification Certificate (CVC) using Comodo See, Verify, Trust (SVT) technology and Comodo TF (Two Factor). Using proven PKI methods, effectively binding digitally protected content to a specific URL or IP address Providing the highest level of security for Web page content Ability to turn a PC into a Smart card like Authentication token The Result – Bank can verify their customers – Protection for the Bank’s website logos, log-in boxes and rate pages – Users can verify this content with Comodo’s free Verification Engine User can mouse over the protected content to see a green border pop up to confirm the site is legitimate 9
  • 10. Case Study: Certificate Management Representative Companies/Organizations – Florida State University, Stanford University – State of Oregon – Morgan Stanley, Lending Tree – Xerox, Reed Elsevier Business Challenges – High digital certificate costs – Inflexible certificate management solution, negatively impacting adoption and IT staff utilization Comodo Solution – Certificate Manager Highly flexible solution, configured by Comodo for maximum enterprise integration Widest range of digital certificate offerings Prices 30%+ lower than Verisign or Entrust The Result – Lower certificate cost and IT staff time required for certificate administration – Wider adoption/more certificates under central administration – Faster certificate issuance Fewer expired certificates 10
  • 11. Case Study: Online Merchant The Company – A mid-size e-merchant in the flowers and plants category based in Pennsylvania Business Challenge – “Having the freshest flowers and highest quality bulbs no longer fully guarantees a sale," said Erik Thomas, Director of Ecommerce. "We have to prove that the sale is a safe transaction and our customers' information remains secure, or we stand to send our sales elsewhere.” Comodo Solution – Comodo EV SSL Certificate, displaying the reassuring green browser address bar to customers initiating transactions The Result – Clear indication to site visitors that the company is adhering to the highest standards of security and trust, providing them reassurance and supporting conversion to customers 11
  • 12. Securing/Authenticating the Most Successful Political Fundraising Website in History 12
  • 13. Comodo and Verisign Brand Awareness Using Google search volume as an indicator: www.google.com/trends VERISIGN COMODO COMODO VERISIGN 13
  • 14. The Internet’s Best Designed TrustMarks • Persistent Visibility: Fixed position within a browser window offers constant visual reinforcement of a site’s verified trust credentials • Better Verifiability: Point to Verify technology delivers real-time verification to the displaying website rather than invite visitors to click away • Strong Credibility: TrustMarks are for consumer consumption. Comodo is a widely sought after consumer brand associated with Internet trust and security 14
  • 15. Fully Featured Digital Certificates 15
  • 16. Full Range of Digital Certificates 16
  • 17. Simple, Effective Secure E-Mail and S/MIME Certificates 17
  • 18. Simple, Effective Secure E-Mail and S/MIME Certificates 18
  • 19. Vulnerability Scanning For Security and Compliance 19
  • 20. Vulnerability Scanning For Security and Compliance If for PCI, Site Admin Provide PCI Comodo Initiate/manage scans Compliance HackerGuardian Reports Scan Control Receive reports Center Web Admin Address identified Scan for vulnerabilities 24,000 potential vulnerabilities Comodo Internet- HackerGuardian Connected Service Server, Website, etc. Gather and interpret scan results 20
  • 21. About Comodo Comodo is a leading brand in Internet security, covering an extensive range of security software and services, including digital certificates, PCI scanning, desktop security, online faxing, and computer technical support services. Business and consumers worldwide recognize Comodo as standing for security and trust. Comodo products secure and authentic online transactions for over 200,000 business and have more than 18,000,000 installations of Comodo desktop security software, including an award-winning firewall and antivirus software offered at no charge. The Comodo family of companies is committed to continual innovation, core competencies in PKI, authentication, and malware detection and prevention. As a catalyst in eliminating online crime, the companies’ mission is to establish a Trusted Internet. With US headquarters overlooking Manhattan on New Jersey’s waterfront and global resources in the United Kingdom, China, India, Ukraine, and Romania, Comodo products offer intelligent security, authentication, and assurance. Comodo -- Creating Trust Online®. Comodo Group, Inc. 525 Washington Blvd Jersey City, NJ 07310 United States U.S. +1.888.256.2608 Int’l +1.703.637.9361 Email: EnterpriseSolutions@Comodo.com