显示标签为“affidavit”的博文。显示所有博文
显示标签为“affidavit”的博文。显示所有博文

2009年12月16日星期三

ID Control BV - Online Identity Assurance closes aperture to exceptionable and affected visitor

MessageIDStore this angel in big sizeThe Hague, 9 January 2009, ID Control, the specialist in beat online character and acceptance administration today appear to action online character annexation and artifice with a altercation chargeless managed account by which users’ identities are adequate with able and beat affidavit tokens based on a account fee per user.

Starting at 2.50 Euros per ages per user the appropriate users are adequate by able and beat affidavit solutions. The character of the user can be absolute with one-time-password affidavit based on adaptable phones or OTP accouterments badge or analysis of the user’s accounting behaviour during login, afore acceding acceptance afterwards blockage the permission rights.

Most organizations that accomplish online, action their clients, partners, suppliers or advisers acceptance to clandestine or acute online casework and advice or let them accomplish transactions. Controlling the character and acceptance of the users to systems, networks and applications are ranked top in antecedence on the account of aegis measures nowadays. Strong affidavit is based on the assumption of “something you apperceive (password/PIN)” and “something you accept (authentication token)”, or “something you are (biometrics)” and is accordingly added defended than alone username and password. With a defended and affordable indentity affirmation account the alignment decides on the able affidavit needs, demands and wishes to be managed while paying alone on a account base for the acceptance of the service. With the online Identity Assurance of ID Control no accomplishing and aliment of an affidavit basement is required, by authoritative use of the already absolute and pluggable basement and ability of ID Control’s ample accomplice network. All hardware, security, basement and software apparatus and casework bare for implementing and advancement the affidavit administration ambiance are taken affliction of. This agency ID Control Server software, web based administration interface, ID Control affidavit tokens like HandyID, MessageID, KeystrokeID and ID Control OTP Key and the aliment and abutment by an alien awful able architect are included or optional.

Hans Kortekaas, CEO ID Control, indicates that ID Control provides this managed able affidavit account with accepted affiliation to absolute web mail, server based computing, SSL VPN, web applications and arrangement environments, while demography abroad the altercation and accountability of its management. The chump does not charge to advance in hardware, affidavit tokens, software, implementation, trainings, helpdesk, aliment and abutment and can acclimate to affidavit needs in the future. With ID Control’s online Identity Assurance you are anchored by the best and a lot of beat character and acceptance administration solutions and casework in the industry while abbreviating the risks and threats accompanying to online character annexation and fraud.

ID Control, www.idcontrol.com amid in The Hague, provides next to One Time Password breeding accouterments tokens with OTP the “ID Control OTP Key”, OTP based on adaptable phones with “MessageID” a generated OTP by SMS , ”HandyID” a adaptable OTP appliance and PKI the “ID Control USB Token”, , but can aswell admit users on the base of their accounting behaviour with “KeystrokeID” while logging in. All tokens are managed by ID Control Server hosted at the partner’s or customer’s side, by which user are acerb authenticated. Above all organizations with altered affidavit methods and tokens for a array of systems, applications, users and casework can administer all of them in one web based axial affidavit ambiance with the “ID Control Server”.

Should you accept any questions, and/or remarks, amuse do not alternate to acquaintance Susan de Wolf at +31 (0) 888-SECURE (732873).

Susan de Wolf
ID Control BV
www.idcontrol.com

Deepnet Security - 2X Eliminates Remote Access Security Concerns with Deepnet Unified Authentication

Store this angel in big sizePrevent Remote Connections Creating a Security Nightmare on Your Corporate Network

Dallas/Irving, USA, 12 Jan 2009, 2X Software Ltd, one of the arch developers in basic accretion software has appear its latest products, 2X ApplicationServer 6.2 and 2X VirtualDesktopServer (Beta), with the affiliation of unified Two-Factor Authentication delivered by aegis experts Deepnet Security. This band-aid is ideal for action users acute defended limited access, while preventing crooked acceptance to the accumulated network.

Modern companies are adequate the amount accumulation and abundance assets inherent in acceptance advisers to plan from home, while users account from the accessibility of telecommuting. In addition, executives, salespeople and others charge to affix to the aggregation arrangement if on the road, and/or charge to acceptance arrangement assets out of appointment hours. This agency growing appeal for limited acceptance access to the organization's arrangement – with abeyant aegis issues if it is not managed correctly. To anticipate these limited access from creating a aegis daydream on your network, 2X and Deepnet accept abutting armament with a seamless and simple to use solution.

“Deepnet Unified Authentication delivers a affluent set of two-factor affidavit methods in a unified aegis platform. In the past, arrangement administrators accept had to antecedent affidavit systems separately, now it all works seamlessly aural 2X Software,” said Nikolaos Makris, CEO of 2X Software Ltd. “It is an ideal able affidavit technology for 2X products, accouterment added accord of apperception for enterprises, decidedly area companies crave top aegis limited access.”

Yurong Lin, CEO of Deepnet Security, comments: “The built-in affiliation of Deepnet Unified Authentication into the 2X solutions strikes the absolute antithesis amid usability, aegis and TCO. 2X appliance users will now be able to account from the cost-effective, able two-factor affidavit that is natively and absolutely chip into the 2X solutions.”

How does Two-factor affidavit work?

To advance aegis over a individual password, two-factor affidavit agency any affidavit apparatus area added than one affair is appropriate to accredit a user. The two apparatus of two-factor affidavit are: ‘Something you know’ (eg a password) and ‘Something you have’ (eg an cyberbanking badge card).Deepnet Unified Authentication is a individual chip aegis belvedere for provisioning, managing and acceptance all types of user and host affidavit methods, form-factors and user credentials, including:

•Hardware Tokens: OATH-compliant, RSA SecurID, Vasco DigiPass
•Software, Mobile Phone & SMS Tokens
•USB Flash Drive Tokens
•Virtual Smart Card

More advice about how to accredit 2X solutions with Deepnet Unified Authentication is accessible at www.2x.com/virtualdesktop/deepnet_manual/Deepnet.html

Obtaining the chargeless version

2X is alms a chargeless 3 affiliation authorization of 2X Application Server 6.2 for Windows Terminal Services accessible at: www.2x.com/applicationserver/application-publishing.htm Organizations can install applications assimilate one axial server and use 2X ApplicationServer to seamlessly adit up to 5 access per server assimilate limited desktops.

About 2X
2X Software Ltd - 2X - is a aggregation developing software for the booming server-based accretion market. Thin applicant accretion controls ambagious PC administration costs, centralizes appliance and desktop management, improves aegis and achievement and allows users to plan remotely. The company’s artefact band includes: 2X ThinClientServer, 2X LoadBalancer for Terminal Services/Citrix, 2X ApplicationServer for Windows Terminal Services, and 2X VirtualDesktopServer. 2X is a abreast captivated aggregation with offices in the USA, Germany, UK, Cyprus and Malta. Its administration aggregation is backed by years of acquaintance in developing and affairs arrangement basement software. 2X is a Microsoft and RedHat partner. For added advice visit: www.2x.com.
All artefact and aggregation names herein may be trademarks of their corresponding owners.

For added information:
Please email Nikoalos Makris on nm@2x.com
URL: www.2x.com.

About Deepnet Security Ltd

Deepnet Security provides enterprises, banking institutions and ecommerce websites with the a lot of flexible, two-factor and two-way affidavit solutions that are user affable and amount effective. Its key product, Deepnet Unified Authentication Platform, provides assorted action solutions in one individual aegis platform. Its different affidavit articles cover hardware, software and adaptable buzz based ancient passwords, keystroke biometrics, basic acute cards and accessory authentication.

For added advice amuse contact:

Deepnet Security
web: www.deepnetsecurity.com
email: info@deepnetsecurity.com
tel: +44 20 8343 9663

Deepnet Security - 2X Eliminates Remote Access Security Concerns with Deepnet Unified Authentication

Store this angel in big sizePrevent Remote Connections Creating a Security Nightmare on Your Corporate Network

Dallas/Irving, USA, 12 Jan 2009, 2X Software Ltd, one of the arch developers in basic accretion software has appear its latest products, 2X ApplicationServer 6.2 and 2X VirtualDesktopServer (Beta), with the affiliation of unified Two-Factor Authentication delivered by aegis experts Deepnet Security. This band-aid is ideal for action users acute defended limited access, while preventing crooked acceptance to the accumulated network.

Modern companies are adequate the amount accumulation and abundance assets inherent in acceptance advisers to plan from home, while users account from the accessibility of telecommuting. In addition, executives, salespeople and others charge to affix to the aggregation arrangement if on the road, and/or charge to acceptance arrangement assets out of appointment hours. This agency growing appeal for limited acceptance access to the organization's arrangement – with abeyant aegis issues if it is not managed correctly. To anticipate these limited access from creating a aegis daydream on your network, 2X and Deepnet accept abutting armament with a seamless and simple to use solution.

“Deepnet Unified Authentication delivers a affluent set of two-factor affidavit methods in a unified aegis platform. In the past, arrangement administrators accept had to antecedent affidavit systems separately, now it all works seamlessly aural 2X Software,” said Nikolaos Makris, CEO of 2X Software Ltd. “It is an ideal able affidavit technology for 2X products, accouterment added accord of apperception for enterprises, decidedly area companies crave top aegis limited access.”

Yurong Lin, CEO of Deepnet Security, comments: “The built-in affiliation of Deepnet Unified Authentication into the 2X solutions strikes the absolute antithesis amid usability, aegis and TCO. 2X appliance users will now be able to account from the cost-effective, able two-factor affidavit that is natively and absolutely chip into the 2X solutions.”

How does Two-factor affidavit work?

To advance aegis over a individual password, two-factor affidavit agency any affidavit apparatus area added than one affair is appropriate to accredit a user. The two apparatus of two-factor affidavit are: ‘Something you know’ (eg a password) and ‘Something you have’ (eg an cyberbanking badge card).Deepnet Unified Authentication is a individual chip aegis belvedere for provisioning, managing and acceptance all types of user and host affidavit methods, form-factors and user credentials, including:

•Hardware Tokens: OATH-compliant, RSA SecurID, Vasco DigiPass
•Software, Mobile Phone & SMS Tokens
•USB Flash Drive Tokens
•Virtual Smart Card

More advice about how to accredit 2X solutions with Deepnet Unified Authentication is accessible at www.2x.com/virtualdesktop/deepnet_manual/Deepnet.html

Obtaining the chargeless version

2X is alms a chargeless 3 affiliation authorization of 2X Application Server 6.2 for Windows Terminal Services accessible at: www.2x.com/applicationserver/application-publishing.htm Organizations can install applications assimilate one axial server and use 2X ApplicationServer to seamlessly adit up to 5 access per server assimilate limited desktops.

About 2X
2X Software Ltd - 2X - is a aggregation developing software for the booming server-based accretion market. Thin applicant accretion controls ambagious PC administration costs, centralizes appliance and desktop management, improves aegis and achievement and allows users to plan remotely. The company’s artefact band includes: 2X ThinClientServer, 2X LoadBalancer for Terminal Services/Citrix, 2X ApplicationServer for Windows Terminal Services, and 2X VirtualDesktopServer. 2X is a abreast captivated aggregation with offices in the USA, Germany, UK, Cyprus and Malta. Its administration aggregation is backed by years of acquaintance in developing and affairs arrangement basement software. 2X is a Microsoft and RedHat partner. For added advice visit: www.2x.com.
All artefact and aggregation names herein may be trademarks of their corresponding owners.

For added information:
Please email Nikoalos Makris on nm@2x.com
URL: www.2x.com.

About Deepnet Security Ltd

Deepnet Security provides enterprises, banking institutions and ecommerce websites with the a lot of flexible, two-factor and two-way affidavit solutions that are user affable and amount effective. Its key product, Deepnet Unified Authentication Platform, provides assorted action solutions in one individual aegis platform. Its different affidavit articles cover hardware, software and adaptable buzz based ancient passwords, keystroke biometrics, basic acute cards and accessory authentication.

For added advice amuse contact:

Deepnet Security
web: www.deepnetsecurity.com
email: info@deepnetsecurity.com
tel: +44 20 8343 9663

2X Software - 2X Eliminates Remote Access Security Concerns with Deepnet Unified Authentication

Store this angel in big size2X Software, one of the arch developers in basic accretion software has appear its latest products, 2X Application Server 6.2 and 2X VirtualDesktopServer (Beta), with the affiliation of unified Two-Factor Authentication delivered by aegis able Deepnet Security. This band-aid is ideal for action users acute defended limited access, while preventing crooked acceptance to the accumulated network.

Modern companies are adequate the amount accumulation and abundance assets inherent in acceptance advisers to plan from home, while users account from the accessibility of telecommuting. In addition, executives, salespeople and others charge to affix to the aggregation arrangement if on the road, and/or charge to acceptance arrangement assets out of appointment hours. This agency growing appeal for limited acceptance access to the organization's arrangement – with added abeyant aegis issues. To anticipate these limited access from creating a aegis daydream on your network, 2X and Deepnet accept abutting armament to bear a seamless and simple to use solution.

“Deepnet Unified Authentication delivers a affluent set of two-factor affidavit methods in a unified aegis platform. In the past, arrangement administrators accept had to antecedent affidavit systems separately, now it all works seamlessly aural 2X Software,” said Nikolaos Makris, CEO of 2X Software Ltd. “It is an ideal able affidavit technology for 2X products, accouterment added accord of apperception for enterprises, decidedly area companies crave top aegis limited acceptance and for environments with top demands on aegis like banks or hospitals.”

Yurong Lin, CEO of Deepnet Security, comments: “The built-in affiliation of Deepnet Unified Authentication into the 2X solutions strikes the absolute antithesis amid usability, aegis and TCO. 2X appliance users will now be able to account from the cost-effective, able two-factor affidavit that is natively and absolutely chip into the 2X solutions.”

How does Two-factor affidavit work?
To advance aegis over a individual password, two-factor affidavit agency any affidavit apparatus area added than one affair is appropriate to accredit a user. The two apparatus of two-factor affidavit are: ‘Something you know’ (eg a password) and ‘Something you have’ (eg an cyberbanking badge card). Deepnet Unified Authentication is a individual chip aegis belvedere for provisioning, managing and acceptance all types of user and host affidavit methods, form-factors and user credentials, including:
•Hardware Tokens: OATH-compliant, RSA SecurID, Vasco DigiPass
•Software, Mobile Phone & SMS Tokens
•USB Flash Drive Tokens
•Virtual Smart Card

More advice about how to accredit 2X solutions with Deepnet Unified Authentication is accessible at www.2x.com/virtualdesktop/deepnet_manual/Deepnet.html

Obtaining the chargeless version
2X is alms a chargeless 3 affiliation authorization of 2X ApplicationServer 6.2 for Windows Terminal Services accessible at: www.2x.com/applicationserver/application-publishing.htm Organizations can install applications assimilate one axial server and use 2X ApplicationServer to seamlessly adit up to 3 access per server assimilate limited desktops.

About Deepnet Security Ltd
Deepnet Security provides enterprises, banking institutions and ecommerce websites with the a lot of flexible, two-factor and two-way affidavit solutions that are user affable and amount effective. Its key product, Deepnet Unified Authentication Platform, provides assorted solutions in one individual aegis platform. Its different affidavit articles cover hardware, software and adaptable buzz based ancient passwords, keystroke biometrics, basic acute cards and accessory authentication.
For added advice amuse appointment www.deepnetsecurity.com.

About 2X
2X Software Ltd - 2X - is a aggregation developing software for the booming server-based accretion market. Thin applicant accretion controls ambagious PC administration costs, centralizes appliance and desktop management, improves aegis and achievement and allows users to plan remotely. The company’s artefact band includes: 2X ThinClientServer, 2X LoadBalancer for Terminal Services/Citrix, 2X ApplicationServer for Windows Terminal Services, and 2X VirtualDesktopServer. 2X is a abreast captivated aggregation with offices in the USA, Germany, UK, Cyprus and Malta. Its administration aggregation is backed by years of acquaintance in developing and affairs arrangement basement software. 2X is a Microsoft and RedHat partner. For added advice visit: www.2x.com.
All artefact and aggregation names herein may be trademarks of their corresponding owners.

2X Software Ltd
Engomi Business Centre
Block A, Office 103
28th October Street No1
2414 Nicosia
Cyprus
Media contact: Jim Buchanan, buchanan.jim@gmail.com, +44 (0)7725 257194

SECUDE AG - SECUDE IT Security announces Web-Based Authentication for its SAP Single Sign-On and Encryption solution

Store this angel in big sizeDarmstadt, May 14, 2009 – admitting growing aegis threats, abounding enterprises accept bargain investments in IT aegis because of the difficult bread-and-butter situation. The botheration is about not the antecedent acquirement of adapted solutions, but the generally top accomplishing and operational costs (Total Cost of Ownership). To bigger abode these issues, SECUDE has added its “Secure Single Sign-On for SAP NetWeaver®” solution. Even admitting SECUDE’s accepted band-aid already provides simple rollout and aliment mechanisms, the new web-based affidavit apparatus around reduces accomplishing costs to aught because it doesn’t crave any applicant software to be deployed, accouterment aberrant adaptability and acutely abbreviate accomplishing times.

SECUDE’s Secure Single Sign-On for SAP NetWeaver enables companies to encrypt all cartage amid SAP applicant and SAP servers and additionally action users a different Unified Single Sign-On acquaintance that abundantly enhances abundance and lowers helpdesk costs. Many of SECUDE’s barter accept deployed our applicant software because of its top acknowledgment on investment (ROI). However the currently difficult bread-and-butter bearings is banishment companies to accomplish even smarter investment decisions whiling befitting an eye on IT aegis threats.
Fast accomplishing after client-rollout
SECUDE’s new web-based affidavit addresses absolutely those requirements. Contrary to accepted affidavit solutions, the new copy doesn’t crave any software apparatus on the applicant to be installed, appropriately it not alone eliminates the rollout costs completely, but aswell abundantly reduces the accomplishing time compared to thick-client based solutions.

Despite the cogent advantages the new web-based affidavit provides, it offers all the appearance of SECUDE’s approved band-aid and additionally provides abutment for afterward Operating Systems: Windows, MAC OS X, Linux and UNIX, accouterment seamless encryption and Single Sign-On through the accumulated network. It aswell provides adjustable user affidavit including Active Directory, RSA SecurID, SAP UME, LDAP, RADIUS and JAAS.
Many advantages for baby and ample corporations with altered environments
All in all SECUDE’s new web-based affidavit offers advantages for companies of all sizes and IT infrastructures and allows for unparalleled low accomplishing and aliment costs. It supports a advanced array of altered applicant operating systems and defended and adjustable user affidavit methods.

About SECUDE AG
SECUDE AG is a captivation aggregation that provides solutions for SAP Business Security through the SECUDE casting and solutions for IT Security through the FinallySecure brand. Our artefact and consulting solutions bear a college akin of SAP and IT aegis to action barter about the world. We bear these solutions by accepting and optimizing your action abstracts in and about SAP systems. SECUDE AG was founded in 1996 out of a affiliation amid SAP AG and the Fraunhofer Institute. Headquartered in Switzerland, we accept a all-embracing accomplice and chump abject with offices in Europe, the Americas, Asia, and the Middle East.

For added information, amuse go to www.secude.com.

Ha Le
PR& Web Marketing, Marketing Service Dept.
SECUDE AG
Tel. +84 (8) 399 56852
Fax. +84 (8) 399 56851
Email: ha.le@secude.com
Website: www.secude.com

ID Control BV - ID Control adds login aegis to Exact Synergy

otp, able authentication, exact, synergyStore this angel in big sizeThe Hague, ID Control, the specialist in beat online character and acceptance management, has chip its’ able and simple affidavit and encryption solutions with Exact Synergy, a absolutely chip and browser-based band-aid of Exact Software that works in affiliation with acceptable ERP applications. Sensitive advice can now be deeply exchanged to the appropriate persons, who are absolutely who they affirm to be, such as with acceptance to anniversary accumulation and accident and assets statements, cyberbanking invoices from enterprises and anniversary statements from accountants and acute chump data.

A lot of organizations that accomplish online, action their clients, partners, suppliers or advisers acceptance to clandestine or acute online casework and advice or let them accomplish transactions. Exact Synergy uses the browser on a workstation to acceptance the axial Exact Synergy server accidentally over the company’s arrangement or internet. Users charge to accredit themselves if accessing Exact Synergy. By absence this is done with alone a user name and password, which is a almost anemic affidavit mechanism. ID Control empowers the affidavit action by accouterment able affidavit tokens with activating passwords on your adaptable buzz or on a accouterments token. Next to One Time Password affidavit the user’s accounting behaviour can be accustomed during log-in and even the acknowledged bounden agenda signature can be acclimated to sign-on to a transaction or access. ID Control’s solutions are affordable and actual convenient and accessible for online Exact applications but aswell for web based email and added casework such as VPN, arrangement and limited desktop access.

Hans Kortekaas, CEO of ID Control, says that crooked acceptance is apparently the a lot of cogent vulnerability to your business-critical Exact Synergy environment. This can put the availability of your Exact solutions, the acquaintance of business abstracts central Exact, and your absolute business action at risk. And it aswell exposes your aggregation and its administration to abeyant acquiescence issues with regulations and abstracts aloofness laws. Controlling the character and acceptance of the users to online ERP applications are ranked top in antecedence on the account of aegis measures nowadays. With ID Control in place, confidentiality, integrity, and affidavit of agent of any advice aural the online Exact ambiance can be ensured.

Should you accept any questions, and/or remarks, amuse do not alternate to acquaintance Susan de Wolf at +31 (0) 888-SECURE (732873).

ID Control, www.idcontrol.com amid in The Hague, provides able and simple affidavit tokens and unified affidavit management. The ambit of able affidavit tokens for defended online acceptance is composed of HandyID, MessageID, KeystrokeID, the ID Control OTP Key and USB Token. HandyID is an OTP breeding appliance active on your adaptable device, the ID Control OTP Key is an OTP breeding accouterments token, the ID Control USB Token food and generates agenda signatures and OTPs and KeystrokeID recognizes users on the base of their accounting behaviour while logging in. At the aforementioned time ID Control offers e-mail encryption, decryption and affidavit with MailID which uses MessageIDs One Time Passwords (OTP) via SMS for aperture up e-mail with attachments. Above all organizations with altered affidavit methods and tokens for a array of systems, applications, users and casework can administer all of them in one web based axial affidavit ambiance with the ID Control Server.

ID Control BV
Van Diemenstraat 202
2518 VH THE HAGUE
THE NETHERLANDS

Susan de Wolf

COMODO - Abdulhayoglu: Yellow Padlock Losing Meaning

Jersey City, NJ, July 02, 2009 - "The chicken padlock is accident its acceptation as a assurance indicator," said Melih Abdulhayoglu, CEO of Comodo.

Online businesses should authorize added assurance than simple area validation can offer. Abdulhayoglu declared that area validation agency the affidavit ascendancy has arrested alone to see if the affidavit holder controls the area and not whether the affidavit holder is a acknowledged entity.

On the Internet, SSL certificates are acclimated as the base for encryption algorithms. Internet browsers affectation a chicken padlock if they ascertain that the manual is encrypted, behindhand of whether the website has a area accurate or college affirmation certificate.

Domain validation (DV) certificates omit the footfall of acceptance the acknowledged actuality of the applicant. Organizational validation (OV) certificates beggarly that the issuer has arrested both the area name and the acknowledged existence.

One acumen why the Certificate Authority/Browser (CA/B) Forum came up with an Extended Validation (EV) SSL affidavit was to add added assurances to the advice displayed in a certificate. These added assurances are appropriate by guidelines accustomed by the CA/B Forum, of which Abdulhayoglu is a co-founder. When a lot of browsers ascertain an EV SSL certificate, they affectation a blooming abode bar for encrypted transmissions.

Sites with DV certificates affectation aureate padlocks, which may advance a chump to accept that a college akin of affidavit was performed.

Because the blazon of validation a affidavit may accept varies abundantly both by affidavit blazon and by affidavit authority, the aureate padlock can beggarly altered things to altered people. Global industry standards should be allowable to crave assertive minimum validation above-mentioned to assuming the aureate padlock. This way the padlock acts as a assurance indicator of the merchant rather than a simple attribute of encryption.

Comodo is the second-largest issuer of top affirmation agenda certificates, including organization-validated and EV SSL. For a video of Melih Abdulhayoglu's assessment on domain-validated SSL certificates, amuse appointment ComodoVision
COMODO CA

Comodo CA, Ltd., is the world's second-largest issuer of high-assurance agenda certificates, accouterment online communications cacographic to anyone but the sender and the recipient.

Comodo CA, Ltd., provides cost-effective solutions that assure online information. Digital certificates accredit defended sockets band (SSL) communications, cacographic to anyone but the sender and the recipient. Code-signing certificates ensure that software is not tampered with.

Patent-pending Comodo CA technology enables Internet users to forward encrypted emails after exchanging accessible keys beforehand,

Continual innovation, a amount adequacy in agenda encryption, and a charge to awkward Internet abomination analyze the Comodo companies. The Comodo companies defended and accredit online affairs and communications for over 200,000 business customers, and it has over 15,000,000 installations of desktop aegis products.

Comodo CA, Ltd., -- Creating Trust Online™. For added information, appointment Comodo's website.

For added information, reporters and analysts may contact:
Comodo -- Creating Trust Online®
Email: media-relations@comodo.com
+1 (201) 963 0004 x4073