Comodo Touts HackerGuardianComodo Touts HackerGuardian
Comodo offers PCI and vulnerability scanning suite that provides both compliancy and security for $99
June 27, 2007

JERSEY CITY, N.J. -- Research published recently within the security industry confirms that, while PCI is important, it is only one part of a larger vulnerability management framework for protecting consumer data from hackers. According to this study conducted between March and May of 2007 among network compliance management experts, nearly 7 out of 10 IT professionals understand that the PCI compliancy scan may not provide the regular monitoring needed to ensure a website is safe from outside attacks.
PCI compliancy establishes stringent standards on how Emerchants process, store and transmit customer data. One component of these standards includes the requirement that Emerchants scan their websites for possible vulnerabilities at least once per quarter. This scanning requirement provides customer protection, but IT professionals also recognize that, in addition to the PCI-required scan, a daily scanning solution would identify any vulnerability that may otherwise go undetected between the required scans.
Comodo ensures that small and medium-sized businesses (SMBs) are effectively both compliant and secure through a highly cost-effective approach that combines PCI compliancy and security. The HackerGuardian Bundle includes Daily Vulnerability Scanning to detect if a server is vulnerable to hackers and PCI Compliancy Scanning. At $99, Comodo's bundle costs a fraction of the leading competitor's solution, which runs more than $1,000.
"PCI is a great and powerful tool, as well as a requirement," said Melih Abdulhayoglu, CEO and Chief Security Architect of Comodo. "Therefore, deploying PCI and Daily Vulnerability Scanning allows Emerchants to deliver a trusted and safe online experience for their customers."
Read more about:
2007About the Author(s)
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023