SYS-CON MEDIA Authors: Stackify Blog, Zakia Bouachraoui, Yeshim Deniz, Elizabeth White, Pat Romanski

Related Topics: @CloudExpo, Industrial IoT, SYS-CON MEDIA

@CloudExpo: Press Release

Abdulhayoglu: Avoiding Porn and Gambling Not Enough to Avoid Infection

Antivirus and Firewall Software Protect Against Malware

Security on Ulitzer

Jersey City, NJ, July 28, 2009 - "People who should know better think that by avoiding porn and gambling sites, they can avoid getting malware on their computers," said Melih Abdulhayoglu, CEO and President of Comodo. "Not today."

"People who do know better know that there are some basic requirements everyone needs to have before they even think of using the Internet. One of those requirements is malware protection."

Comodo distributes free award-winning antivirus and firewall protection. More than 18,000,000 copies of Comodo security software have been installed on computers around the world.

"If your computer is compromised, you may not even know it. You could be like a polio carrier, with no symptoms. But your PC harbors the disease and spreads it to other users. Like a vaccine, using security software benefits you, of course. It also benefits every other user of the Internet community."

Comodo Internet Security's Host Intrusion Prevention System (HIPS) offers Internet users a revolutionary defense: Default-Deny Protection (DDPTM).

With DDP, no software is allowed to install itself and execute without permission. The permission can come either directly from the user, or from Comodo's exclusive whitelist. "Most HIPS systems send too many popups, any time software makes a minuscule change inside the computer. The result is that either the users or their computers have to make scores or hundreds of decisions. The questions are very detailed. They look like this: 'Iexplore.exe is trying to make changes to' and then follows some file name they can't understand. 'Allow or block?' If PC users had to make hundreds of those decisions every time, of course they would throw up their hands and conclude that they were better off without protection."

"Comodo has a better alternative. Comodo Internet Security's DDP makes most of the decisions, while offering the important questions to the user. And if the user has trouble deciding, she or he can use ThreatCast, an online query system showing in real time what other Comodo Internet Security users have decided about that particular software."

It is possible to configure Comodo Internet Security for maximum security with zero alerts, said Abdulhayoglu, "but that takes a little computer knowledge and confidence."

The alternative to the alerts is to subscribe to Comodo Internet Security Pro. Comodo Internet Security Pro includes unlimited on-demand support from certified security and PC experts. If subscribers request "managed security mode," all their popup alerts will be handled by the security experts.

To download Comodo Internet Security or to subscribe to Comodo Internet Security Pro, visit www.personalfirewall.comodo.com.

"Pay for your software, if you like," said Abdulhayoglu, "or use world-class Comodo Internet Security for free, but please be sure that before you go online you have some kind of protection in place. If you don't do it for yourself, do it to protect others."

COMODO SECURITY SOLUTIONS
The Comodo companies secure and authenticate online transactions and communications for over 200,000 business customers and has over 15,000,000 installations of desktop security products.

Comodo Security Solutions, Inc., creates trust online by securing the PCs of millions of Internet users worldwide. The company's award-winning firewall and antivirus software are available as the Comodo Internet Security suite at no charge, in order to protect every PC from malware.

Comodo Internet Security suite's revolutionary Default Deny ProtectionTM protects computers from online threats with unprecedented ease and security.

Other free products include backup software, system cleaner, and PC memory cleaning. Comodo Security Solutions, Inc., is committed to enabling an infrastructure for a Trusted Internet, providing online interactions with a new layer of security and trust, mutual and in real time.

Comodo Security Solutions, Inc. -- Creating Trust OnlineTM. For more information, visit Comodo's website.

For more information, reporters and analysts may contact:
Comodo -- Creating Trust Online®
Email: media-[email protected]
+1 (201) 963 0004 x4073

More Stories By Katharine Hadow

Katharine Hadow is a marketing communications professional in New Jersey, USA

Latest Stories
Today most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes significant work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reducti...
GCP Marketplace is based on a multi-cloud and hybrid-first philosophy, focused on giving Google Cloud partners and enterprise customers flexibility without lock-in. It also helps customers innovate by easily adopting new technologies from ISV partners, such as commercial Kubernetes applications, and allows companies to oversee the full lifecycle of a solution, from discovery through management.
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, discussed why containers should be paired with new architectural practices such as microservices rathe...
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, John Jelinek IV, a web developer at Linux Academy, will discuss why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers...
Using serverless computing has a number of obvious benefits over traditional application infrastructure - you pay only for what you use, scale up or down immediately to match supply with demand, and avoid operating any server infrastructure at all. However, implementing maintainable and scalable applications using serverless computing services like AWS Lambda poses a number of challenges. The absence of long-lived, user-managed servers means that states cannot be maintained by the service. Lo...
Using serverless computing has a number of obvious benefits over traditional application infrastructure - you pay only for what you use, scale up or down immediately to match supply with demand, and avoid operating any server infrastructure at all. However, implementing maintainable and scalable applications using serverless computing services like AWS Lambda poses a number of challenges. The absence of long-lived, user-managed servers means that states cannot be maintained by the service. Lo...
With the new Kubernetes offering, ClearDATA solves one of the largest challenges in healthcare IT around time-to-deployment. Using ClearDATA's Automated Safeguards for Kubernetes, healthcare organizations have access to the container orchestration to dynamically deploy new containers on demand, monitor the health of each container for threats and seamlessly roll back faulty application updates to a previous version, avoid system-wide downtime and ensure secure continuous access to patient data.
With the rise of Docker, Kubernetes, and other container technologies, the growth of microservices has skyrocketed among dev teams looking to innovate on a faster release cycle. This has enabled teams to finally realize their DevOps goals to ship and iterate quickly in a continuous delivery model. Why containers are growing in popularity is no surprise — they’re extremely easy to spin up or down, but come with an unforeseen issue. However, without the right foresight, DevOps and IT teams may lo...
Docker and Kubernetes are key elements of modern cloud native deployment automations. After building your microservices, common practice is to create docker images and create YAML files to automate the deployment with Docker and Kubernetes. Writing these YAMLs, Dockerfile descriptors are really painful and error prone.Ballerina is a new cloud-native programing language which understands the architecture around it - the compiler is environment aware of microservices directly deployable into infra...
Signs of a shift in the usage of public clouds are everywhere. Previously, as organizations outgrew old IT methods, the natural answer was to try the public cloud approach; however, the public platform alone is not a complete solution. Complaints include unpredictable/escalating costs and mounting security concerns in the public cloud. Ultimately, public cloud adoption can ultimately mean a shift of IT pains instead of a resolution. That's why the move to hybrid, custom, and multi-cloud will ...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
10ZiG Technology is a leading provider of endpoints for a Virtual Desktop Infrastructure environment. Our fast and reliable hardware is VMware, Citrix and Microsoft ready and designed to handle all ranges of usage - from task-based to sophisticated CAD/CAM users. 10ZiG prides itself in being one of the only companies whose sole focus is in Thin Clients and Zero Clients for VDI. This focus allows us to provide a truly unique level of personal service and customization that is a rare find in th...
Signs of a shift in the usage of public clouds are everywhere Previously, as organizations outgrew old IT methods, the natural answer was to try the public cloud approach; however, the public platform alone is not a complete solutionThe move to hybrid, custom, and multi-cloud will become more and more prevalent At the heart of this technology trend exists a custom solution to meet the needs and concerns of these organizations, including compliance, security, and cost issues Blending Ser...
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNative) and process redefinition (SRE). Rob Hirschfeld’s recent work in Kubernetes operations has led to the conclusion that containers and related platforms have changed the way we should be thinking about DevOps and...