Reading Time: 1 minute
Recently, we reviewed a document of best practices in deploying SSL Certificates published by Qualys, a prominent security company. Their document had some very good advice. In particular, we agree whole heartedly with their recommendation that an SSL user should “obtain certificates from a reliable Certificate Authority”.
They went on to list criteria that you should use in determining if a CA should be considered reliable. We decided to evaluate ourselves to see how we stack up based on their standards. Not only do we pass the test, you might think that they had Comodo in mind when they defined the criteria!
START FREE TRIAL GET YOUR INSTANT SECURITY SCORECARD FOR FREE
- CA
- coingenius
- cryptocurrency wallets
- cryptoexchange
- cyber security
- cybercriminals
- Cybersecurity
- CyberSecurity Comodo
- department of homeland security
- digital wallets
- e-commerce
- firewall
- Kaspersky
- malware
- Mcafee
- NexBLOC
- plato
- plato ai
- Plato Data Intelligence
- Plato Game
- PlatoData
- platogaming
- SSL
- ssl certifcate
- Trust
- VPN
- website security
- zephyrnet
More from CyberSecurity Comodo
Comodo Cybersecurity’s Consumer Antivirus Named “Top Product” by AV-Test
Source Node: 1896264
Time Stamp: Apr 2, 2018
Why companies are choosing Comodo for Digital Certificates
Source Node: 2121395
Time Stamp: Sep 21, 2015
5 Points to Consider When Evaluating Next-Generation Endpoint Security Products
Source Node: 1988620
Time Stamp: Jul 25, 2017
Target Data Breach: PCI DSS Auditor in Lawyer’s Crosshairs
Source Node: 1742411
Time Stamp: Mar 26, 2014
Dharma 2.0 ransomware continues to wreak havoc with new variant
Source Node: 1404930
Time Stamp: Mar 30, 2020
Linux and Mac Users Shellshocked from BASH Vulnerability
Source Node: 1832310
Time Stamp: Sep 26, 2014
How to Reduce Complexity and User Friction by Improving Your Endpoint Security Posture
Source Node: 2027477
Time Stamp: May 5, 2017
Trust Seals provides website reliability from a security standpoint
Source Node: 2347308
Time Stamp: Nov 5, 2014
POS Under Attack: The Why, How & What to Do – Comodo News and Internet Security Information
Source Node: 2385386
Time Stamp: Nov 1, 2014