Comodo Unveils Free Products, Strategies

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

<p><strong>Jersey City, N.J. &mdash; Aug. 10</strong><br />Comodo, as a group of Internet security companies, has announced significant enhancements to its portfolio of free desktop security and trust assurance solutions. </p><p>The Comodo companies are committed to transforming desktop security from a &quot;detection-based&quot; model to a &quot;prevention-based&quot; model and have developed new technologies to encourage this change.<br /><br />In a recent interview on National Public Radio&#39;s (NPR) BreakfastBytes, hosted by Felicia King and Ray Koukari, Melih Abdulhayoglu, Comodo CEO and chief security architect, explained how recent innovations in Comodo&#39;s desktop security solutions are changing the face of desktop security. </p><p>Unlike other security vendors, Comodo&#39;s approach identifies safe applications rather than simply detecting and blocking harmful applications. </p><p>This approach employs a white list technology and only allows trusted applications access to the PC. It also will evolve desktop security form a &quot;detection-based&quot; approach to a &quot;prevention-based&quot; model. </p><p>&quot;The world of security has to change,&quot; Abdulhayoglu said. &quot;It is no good to say, &#39;Hey, let everyone else around the world get infected, and we will protect ourselves.&#39; We have to give security to everyone even people in countries where salaries are low [and they] cannot afford to buy security packages for $50. We need to secure these machines because each machine is a powerful tool with CPU and connectivity … that can be used against us as bots. That&#39;s why we are doing what we are doing.&quot;<br /><br />During the interview, Comodo outlined its strategy for upcoming releases of its free desktop security software. </p><p>More than 350,000 new users are downloading Comodo Desktop Security solutions every month.</p>

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment:

Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>