About us

The Mission of Comodo

The rapid acceptance and deployment of the internet has transformed how we build and share information today. Financial transactions, healthcare records, personal information, and government data all pass instantly through technology systems at record pace. Internet technologies have revolutionized the way people communicate, governments manage, businesses operate and society functions.

But with innovation always comes risk. Security is always the last layer to be added in any transformational idea, and malware and cyberattacks now threaten the economic and societal progress that these technology tools provide. They have created an environment of vulnerability and exposure, where individuals and corporations can't feel they trust the experience of being online, of collaborating across geographies, of exchanging information safely.

Enter Comodo, a company that has been built upon the very foundation of trust, believing that every single digital transaction must have a built-in layer of trust and security. Thousands of companies and organizations rely on Comodo's technology to authenticate, validate and secure their most precious asset – information - and to combat constant malware threats and cyberattacks that are creating havoc on a global scale.

From the individual to the corporation, everyone has the right to a trustworthy and secure environment and it is the job of Comodo to provide the technology solutions that secure and preserve that experience. For the employees of Comodo, this is our life's work – creating an environment of trust for our current and future customers.

Keywords: traffic analysis, malware, cyber operations, geopolitics

Authors
Kenneth Geers

Authenticating Individuals, Businesses Websites and Content:

Authentication is at the heart of trust – it's the process of confirming that something or someone is genuine. Hackers are counterfeiters and impersonators - they thrive on deception. Trust is created when individuals, businesses, websites or software publishers are authenticated to ensure that they are who they say they are, and that their information has not been tampered with. This trust is the core of successful online businesses and trusted online interactions.

Securing Information:

Encrypting sensitive information at all stages of its lifecycle is a proven method of keeping it safe from hackers. Strong Public Key Infrastructure (PKI) encryption through digital certificates ensures that the encrypted information can only be used by authorized parties.

Securing Websites and E-Commerce:

Uncovering and alerting IT organizations to vulnerabilities in their server/site's technical configuration or security procedures that could be exploited by hackers, and providing advice or solutions to eliminate them.

Securing and Maintaining PCs:

Denying hackers access to the information and resources they need to succeed, such as your personal or business financial information, and at a more fundamental level, your computer's internet connection and processing capacity.
Meeting tomorrow's challenges requires both leadership and innovation in our customer offerings as well as the way we run our businesses.

  • Providing Free Internet Security so Every PC can be Protected
  • Driving Down the Cost of Website Security (SSL) Certificates that Meaningfully Validate a Site's Identity
  • Bringing Key Industry Players Together To Meet Major Security and Trust Challenges for the benefit 1.2 billion Internet users

Today, the Comodo family of companies has

  • more than 85 million desktop security software installations,
  • more than 700,000 business customers and 8,000 global partners and affiliates
  • market share leadership, being the #1 SSL Certificate Authority in the world, with more than 36% of the market, according to w3techs.com (as of July 1, 2015)

Who we are

Fatih Orhan

Fatih Orhan

Vice President of Threat Labs

Fatih directs cyber-intelligence and malware analysis research at Comodo. He also heads Comodo’s renowned Antispam Lab (ASLab) research team.

Fatih brings over 15 years of experience in the management and technology industry to Comodo, responsible for cyber-intelligence and malware analysis research at Comodo, among additional R&D activities.

Fatih received his undergraduate degree in Computer Engineering and masters of Science in Informatics from Middle East Technical University. He is currently working on his PhD as well.

Nihat Oz

Nihat Oz

Program Group Manager

Nihat is the Program Group Manager of Comodo Threat Research Labs. His group has more than ten programs including Valkyrie Verdict, Valkyrie Intelligence, Phishbank and etc.

Nihat coordinates all of those programs' feature development velocities and integration between each other to satisfy the CTRL's main features planned around the groups vision. He has a complete knowledge of Comodo Threat Research Labs' and he uses his experiences to easily orchestrate program management between those components.

Nihat was formerly the Technical Team Lead of Valkyrie Platform Team.

Previously, Nihat has different sector experiences and he had been worked in Production, Telecommunication and Defense Industry as a Software Developer.