Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
ARX and Comodo have signed an agreement to offer Comodo's Web Trusted certificates for use with CoSign Electronic Signatures
Dark Reading Staff
July 14, 2006
1 Min Read
PLEASANT HILL, Calif. -- Algorithmic Research (ARX), a leading worldwide provider of electronic signatures and data security solutions, and Comodo Inc., a global leader in Identity and Trust Assurance Management solutions, have signed an agreement to offer Comodo's Web Trusted certificates for use with CoSign Electronic Signatures.
CoSign's use of Comodo's Web Trusted certificates will enable third-party users to verify documents signed by CoSign's standard digital signatures within applications such as Microsoft Word and Adobe Acrobat, without having to download or install any additional software components or certificates which is typical for other electronic signature solutions.
"With electronic signatures, backed by Comodo Web Trusted certificates, companies may confidently exchange signed documents and emails to users outside of their organization, secure in the knowledge that they are verifiable by every recipient," said James Langman, Director of Business Development, Comodo.
An advantage of using a Standard PKI-based signature is that when applying a standard signature to a document, for example a PDF document, the signature is embedded in the document. This means the signature travels together with the document when it is sent to another user.
"All the recipient of that document needs is a free-Adobe reader to view the signature and verify it," says Gadi Aharoni, CEO ARX. "This means the signature has value outside the application used to create the signature." These capabilities are true for many other applications, such as Microsoft© Word, Excel©, InfoPath©, and in fact, all the Microsoft Office suite applications, Word Perfect, AutoCAD, etc. Comodo Group
About the Author(s)
You May Also Like
A screen displaying many different types of charts and graphs to show what data is being analyzed.Cybersecurity Analytics