Reading Time: 28 minutesComodo One. Understanding monitors in ITSM
What is ‘Monitoring’ in ITSM profiles ?
Monitoring settings allow administrators to define performance and availability...
Reading Time: 6 minutesTakeover remote endpoints using ITSM
ITSM’s ‘Takeover’ feature allows administrators to remotely access and control Windows devices to solve issues, install...
Reading Time: 3 minutesThe Comodo Antispam Labs (CASL) team has identified a new malware attack targeted specifically at businesses and consumers who might...
Reading Time: 3 minutesThe Comodo Antispam Labs team has identified a new phishing threat, targeted at all businesses and consumers who use American...
In Episode 2, Vasco talks with Silvia Oviedo Lopez, Pinterest’s Head of International Product & Operations.Localization is optional, but internationalization is not. The...
Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app
Apple released security updates for iOS devices, OS X Yosemite...
Reading Time: 2 minutesComodo announced this week the release of Comodo Endpoint Security Manager version 3.2 (CESM 3.2), its platform for endpoint protection...