Welcome!

Related Topics: @CloudExpo, Industrial IoT, SYS-CON MEDIA

@CloudExpo: Press Release

Abdulhayoglu: Avoiding Porn and Gambling Not Enough to Avoid Infection

Antivirus and Firewall Software Protect Against Malware

Security on Ulitzer

Jersey City, NJ, July 28, 2009 - "People who should know better think that by avoiding porn and gambling sites, they can avoid getting malware on their computers," said Melih Abdulhayoglu, CEO and President of Comodo. "Not today."

"People who do know better know that there are some basic requirements everyone needs to have before they even think of using the Internet. One of those requirements is malware protection."

Comodo distributes free award-winning antivirus and firewall protection. More than 18,000,000 copies of Comodo security software have been installed on computers around the world.

"If your computer is compromised, you may not even know it. You could be like a polio carrier, with no symptoms. But your PC harbors the disease and spreads it to other users. Like a vaccine, using security software benefits you, of course. It also benefits every other user of the Internet community."

Comodo Internet Security's Host Intrusion Prevention System (HIPS) offers Internet users a revolutionary defense: Default-Deny Protection (DDPTM).

With DDP, no software is allowed to install itself and execute without permission. The permission can come either directly from the user, or from Comodo's exclusive whitelist. "Most HIPS systems send too many popups, any time software makes a minuscule change inside the computer. The result is that either the users or their computers have to make scores or hundreds of decisions. The questions are very detailed. They look like this: 'Iexplore.exe is trying to make changes to' and then follows some file name they can't understand. 'Allow or block?' If PC users had to make hundreds of those decisions every time, of course they would throw up their hands and conclude that they were better off without protection."

"Comodo has a better alternative. Comodo Internet Security's DDP makes most of the decisions, while offering the important questions to the user. And if the user has trouble deciding, she or he can use ThreatCast, an online query system showing in real time what other Comodo Internet Security users have decided about that particular software."

It is possible to configure Comodo Internet Security for maximum security with zero alerts, said Abdulhayoglu, "but that takes a little computer knowledge and confidence."

The alternative to the alerts is to subscribe to Comodo Internet Security Pro. Comodo Internet Security Pro includes unlimited on-demand support from certified security and PC experts. If subscribers request "managed security mode," all their popup alerts will be handled by the security experts.

To download Comodo Internet Security or to subscribe to Comodo Internet Security Pro, visit www.personalfirewall.comodo.com.

"Pay for your software, if you like," said Abdulhayoglu, "or use world-class Comodo Internet Security for free, but please be sure that before you go online you have some kind of protection in place. If you don't do it for yourself, do it to protect others."

COMODO SECURITY SOLUTIONS
The Comodo companies secure and authenticate online transactions and communications for over 200,000 business customers and has over 15,000,000 installations of desktop security products.

Comodo Security Solutions, Inc., creates trust online by securing the PCs of millions of Internet users worldwide. The company's award-winning firewall and antivirus software are available as the Comodo Internet Security suite at no charge, in order to protect every PC from malware.

Comodo Internet Security suite's revolutionary Default Deny ProtectionTM protects computers from online threats with unprecedented ease and security.

Other free products include backup software, system cleaner, and PC memory cleaning. Comodo Security Solutions, Inc., is committed to enabling an infrastructure for a Trusted Internet, providing online interactions with a new layer of security and trust, mutual and in real time.

Comodo Security Solutions, Inc. -- Creating Trust OnlineTM. For more information, visit Comodo's website.

For more information, reporters and analysts may contact:
Comodo -- Creating Trust Online®
Email: [email protected]
+1 (201) 963 0004 x4073

More Stories By Katharine Hadow

Katharine Hadow is a marketing communications professional in New Jersey, USA

Latest Stories
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
In his session at @ThingsExpo, Dr. Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, presented the findings of a series of six detailed case studies of how large corporations are implementing IoT. The session explored how IoT has improved their economic performance, had major impacts on business models and resulted in impressive ROIs. The companies covered span manufacturing and services firms. He also explored servicification, how manufacturing firms shift from se...
For far too long technology teams have lived in siloes. Not only physical siloes, but cultural siloes pushed by competing objectives. This includes informational siloes where business users require one set of data and tech teams require different data. DevOps intends to bridge these gaps to make tech driven operations more aligned and efficient.
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engaged. Old habits die hard, but like most waterfall software projects, most waterfall-style Agile adoption efforts fail to produce the results desired. The problem is that to get the results they want, they have to ch...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
The best way to leverage your CloudEXPO | DXWorldEXPO presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering CloudEXPO | DXWorldEXPO will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at CloudEXPO. Product announcements during our show provide your company with the most reach through our targeted audienc...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors!
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.
JETRO showcased Japan Digital Transformation Pavilion at SYS-CON's 21st International Cloud Expo® at the Santa Clara Convention Center in Santa Clara, CA. The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get...
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.