About us

The Mission of Comodo

The rapid acceptance and deployment of the internet has transformed how we build and share information today. Financial transactions, healthcare records, personal information, and government data all pass instantly through technology systems at record pace. Internet technologies have revolutionized the way people communicate, governments manage, businesses operate and society functions.

But with innovation always comes risk. Security is always the last layer to be added in any transformational idea, and malware and cyberattacks now threaten the economic and societal progress that these technology tools provide. They have created an environment of vulnerability and exposure, where individuals and corporations can't feel they trust the experience of being online, of collaborating across geographies, of exchanging information safely.

Enter Comodo, a company that has been built upon the very foundation of trust, believing that every single digital transaction must have a built-in layer of trust and security. Thousands of companies and organizations rely on Comodo's technology to authenticate, validate and secure their most precious asset – information - and to combat constant malware threats and cyberattacks that are creating havoc on a global scale.

From the individual to the corporation, everyone has the right to a trustworthy and secure environment and it is the job of Comodo to provide the technology solutions that secure and preserve that experience. For the employees of Comodo, this is our life's work – creating an environment of trust for our current and future customers.

Keywords: traffic analysis, malware, cyber operations, geopolitics

Authors
Kenneth Geers

Authenticating Individuals, Businesses Websites and Content:

Authentication is at the heart of trust – it's the process of confirming that something or someone is genuine. Hackers are counterfeiters and impersonators - they thrive on deception. Trust is created when individuals, businesses, websites or software publishers are authenticated to ensure that they are who they say they are, and that their information has not been tampered with. This trust is the core of successful online businesses and trusted online interactions.

Securing Information:

Encrypting sensitive information at all stages of its lifecycle is a proven method of keeping it safe from hackers. Strong Public Key Infrastructure (PKI) encryption through digital certificates ensures that the encrypted information can only be used by authorized parties.

Securing Websites and E-Commerce:

Uncovering and alerting IT organizations to vulnerabilities in their server/site's technical configuration or security procedures that could be exploited by hackers, and providing advice or solutions to eliminate them.

Securing and Maintaining PCs:

Denying hackers access to the information and resources they need to succeed, such as your personal or business financial information, and at a more fundamental level, your computer's internet connection and processing capacity.
Meeting tomorrow's challenges requires both leadership and innovation in our customer offerings as well as the way we run our businesses.

  • Providing Free Internet Security so Every PC can be Protected
  • Driving Down the Cost of Website Security (SSL) Certificates that Meaningfully Validate a Site's Identity
  • Bringing Key Industry Players Together To Meet Major Security and Trust Challenges for the benefit 1.2 billion Internet users

Today, the Comodo family of companies has

  • more than 85 million desktop security software installations,
  • more than 700,000 business customers and 8,000 global partners and affiliates
  • market share leadership, being the #1 SSL Certificate Authority in the world, with more than 36% of the market, according to w3techs.com (as of July 1, 2015)

Who we are

Fatih Orhan

Fatih Orhan

Vice President of Threat Labs

Fatih directs cyber-intelligence and malware analysis research at Comodo. He also heads Comodo’s renowned Antispam Lab (ASLab) research team.

Fatih brings over 15 years of experience in the management and technology industry to Comodo, responsible for cyber-intelligence and malware analysis research at Comodo, among additional R&D activities.

Fatih received his undergraduate degree in Computer Engineering and masters of Science in Informatics from Middle East Technical University. He is currently working on his PhD as well.

Kenneth Geers

Kenneth Geers

Senior Research Scientist

Kenneth Geers (PhD, CISSP) is a Comodo Senior Research Scientist based in Toronto, Canada. Dr. Geers is also a NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) Ambassador, a Non-Resident Senior Fellow at Atlantic Council, an Affiliate with the Digital Society Institute-Berlin, a member of the Transatlantic Cyber Forum, and a Visiting Professor at Taras Shevchenko National University of Kyiv in Ukraine.

He is the author “Strategic Cyber Security”, Editor of “Cyber War in Perspective”, Editor of “The Virtual Battlefield”, Technical Expert to the “Tallinn Manual”, and author of many articles and chapters on cyber security.

Nihat Oz

Nihat Oz

Program Group Manager

Nihat is the Program Group Manager of Comodo Threat Research Labs. His group has more than ten programs including Valkyrie Verdict, Valkyrie Intelligence, Phishbank and etc.

Nihat coordinates all of those programs' feature development velocities and integration between each other to satisfy the CTRL's main features planned around the groups vision. He has a complete knowledge of Comodo Threat Research Labs' and he uses his experiences to easily orchestrate program management between those components.

Nihat was formerly the Technical Team Lead of Valkyrie Platform Team.

Previously, Nihat has different sector experiences and he had been worked in Production, Telecommunication and Defense Industry as a Software Developer.

Berker Batur

Berker Batur

Team Lead

Berker leads Valkyrie Detection Engine Team as a part of Comodo Anti-Virus Lab and directs R&D activities to improve detection performance.

Berker has hands-on experience with machine learning and data mining techniques to create value for new generation malware detection platforms, automatic speech recognition and defence industry systems in the past and cyber security in the present, having used statistical data analysis and modelling frameworks, big data platforms and nosql database systems.

Hatice Sakarya

Hatice Sakarya

Program Manager

Hatice is Program Manager of Comodo Mobile Security, Whitelisting and ERDTS projects. Previously she managed R&D activities more than 10 years in public and private sectors. She received undergraduate and MS degrees in Mathematics and currently working on PhD degree.

Nurettin Mert Aydın

Nurettin Mert Aydın

R&D Incentives Projects Manager

Mert is the R&D Incentives Projects Manager of Comodo. Formerly, Mert was working as software development manager for ASLab (Anti-Spam Lab), CWF (Comodo Web Filtering) and Valkyrie Detection teams of Comodo Threat Security Labs.

Before joining Comodo, he worked in various IT projects with different titles as software architect, technical product manager and senior software team lead. Projects he worked on were variable, from cloud-based multi-tenant web applications to simulation systems.

Mert received his BSc. and MSc. degrees in Computer Engineering from Middle East Technical University.