The Mission of Comodo
The rapid acceptance and deployment of the internet has transformed how we build and share information today. Financial transactions, healthcare records, personal information, and government data all pass instantly through technology systems at record pace. Internet technologies have revolutionized the way people communicate, governments manage, businesses operate and society functions.
But with innovation always comes risk. Security is always the last layer to be added in any transformational idea, and malware and cyberattacks now threaten the economic and societal progress that these technology tools provide. They have created an environment of vulnerability and exposure, where individuals and corporations can't feel they trust the experience of being online, of collaborating across geographies, of exchanging information safely.
Enter Comodo, a company that has been built upon the very foundation of trust, believing that every single digital transaction must have a built-in layer of trust and security. Thousands of companies and organizations rely on Comodo's technology to authenticate, validate and secure their most precious asset – information - and to combat constant malware threats and cyberattacks that are creating havoc on a global scale.
From the individual to the corporation, everyone has the right to a trustworthy and secure environment and it is the job of Comodo to provide the technology solutions that secure and preserve that experience. For the employees of Comodo, this is our life's work – creating an environment of trust for our current and future customers.
Authenticating Individuals, Businesses Websites and Content:
Authentication is at the heart of trust – it's the process of confirming that something or someone is genuine. Hackers are counterfeiters and impersonators - they thrive on deception. Trust is created when individuals, businesses, websites or software publishers are authenticated to ensure that they are who they say they are, and that their information has not been tampered with. This trust is the core of successful online businesses and trusted online interactions.
Encrypting sensitive information at all stages of its lifecycle is a proven method of keeping it safe from hackers. Strong Public Key Infrastructure (PKI) encryption through digital certificates ensures that the encrypted information can only be used by authorized parties.
Securing Websites and E-Commerce:
Uncovering and alerting IT organizations to vulnerabilities in their server/site's technical configuration or security procedures that could be exploited by hackers, and providing advice or solutions to eliminate them.
Securing and Maintaining PCs:
Denying hackers access to the information and resources they need to succeed, such as your personal or business financial information, and at a more fundamental level, your computer's internet connection and processing capacity.
Meeting tomorrow's challenges requires both leadership and innovation in our customer offerings as well as the way we run our businesses.
- Providing Free Internet Security so Every PC can be Protected
- Driving Down the Cost of Website Security (SSL) Certificates that Meaningfully Validate a Site's Identity
- Bringing Key Industry Players Together To Meet Major Security and Trust Challenges for the benefit 1.2 billion Internet users
Today, the Comodo family of companies has
- more than 85 million desktop security software installations,
- more than 700,000 business customers and 8,000 global partners and affiliates
- market share leadership, being the #1 SSL Certificate Authority in the world, with more than 36% of the market, according to w3techs.com (as of July 1, 2015)
Who we are
Vice President of Threat Labs
Fatih directs cyber-intelligence and malware analysis research at Comodo. He also heads Comodo’s renowned Antispam Lab (ASLab) research team.
Fatih brings over 15 years of experience in the management and technology industry to Comodo, responsible for cyber-intelligence and malware analysis research at Comodo, among additional R&D activities.
Fatih received his undergraduate degree in Computer Engineering and masters of Science in Informatics from Middle East Technical University. He is currently working on his PhD as well.
Senior Research Scientist
Kenneth Geers (PhD, CISSP) is a Comodo Senior Research Scientist based in Toronto, Canada. Dr. Geers is also a NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) Ambassador, a Non-Resident Senior Fellow at Atlantic Council, an Affiliate with the Digital Society Institute-Berlin, a member of the Transatlantic Cyber Forum, and a Visiting Professor at Taras Shevchenko National University of Kyiv in Ukraine.
He is the author “Strategic Cyber Security”, Editor of “Cyber War in Perspective”, Editor of “The Virtual Battlefield”, Technical Expert to the “Tallinn Manual”, and author of many articles and chapters on cyber security.
Burak heads Comodo's Threat Research Lab (CTRL) and directs development activities as a part of Comodo Anti-Virus Lab (AVLab).
Prior to Comodo, Burak managed R&D activities more than 10 years aiming to produce sustainable solutions and structures that meet the requirements of the public and private sectors on a global scale in Cyber Security, Defense and Aviation areas.
Berker leads Valkyrie Detection Engine Team as a part of Comodo Anti-Virus Lab and directs R&D activities to improve detection performance.
Berker has hands-on experience with machine learning and data mining techniques to create value for new generation malware detection platforms, automatic speech recognition and defence industry systems in the past and cyber security in the present, having used statistical data analysis and modelling frameworks, big data platforms and nosql database systems.
Nihat is the Program Manager of Valkyrie at Comodo. He is responsible of every program activities of both Valkyrie Platform and Valkyrie Detection teams, individually. Nihat was formerly the Technical Team Lead of Valkyrie Platform Team.
Previously, Nihat has different sector experiences and he had been worked in Production, Telecommunication and Defense Industry as a Software Developer.