Comodo Touts HackerGuardianComodo Touts HackerGuardian
Comodo offers PCI and vulnerability scanning suite that provides both compliancy and security for $99
June 27, 2007
JERSEY CITY, N.J. -- Research published recently within the security industry confirms that, while PCI is important, it is only one part of a larger vulnerability management framework for protecting consumer data from hackers. According to this study conducted between March and May of 2007 among network compliance management experts, nearly 7 out of 10 IT professionals understand that the PCI compliancy scan may not provide the regular monitoring needed to ensure a website is safe from outside attacks.
PCI compliancy establishes stringent standards on how Emerchants process, store and transmit customer data. One component of these standards includes the requirement that Emerchants scan their websites for possible vulnerabilities at least once per quarter. This scanning requirement provides customer protection, but IT professionals also recognize that, in addition to the PCI-required scan, a daily scanning solution would identify any vulnerability that may otherwise go undetected between the required scans.
Comodo ensures that small and medium-sized businesses (SMBs) are effectively both compliant and secure through a highly cost-effective approach that combines PCI compliancy and security. The HackerGuardian Bundle includes Daily Vulnerability Scanning to detect if a server is vulnerable to hackers and PCI Compliancy Scanning. At $99, Comodo's bundle costs a fraction of the leading competitor's solution, which runs more than $1,000.
"PCI is a great and powerful tool, as well as a requirement," said Melih Abdulhayoglu, CEO and Chief Security Architect of Comodo. "Therefore, deploying PCI and Daily Vulnerability Scanning allows Emerchants to deliver a trusted and safe online experience for their customers."
Read more about:2007
About the Author(s)
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
The State of Supply Chain Threats
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment