• For Business
  • For Home
  • For Partners
  • Experienced a Breach?: 1-888-551-1531
  • Contact
  • Blog
  • English
  • Sign In▾
    • [US] Dragon Platform
    • [EU] Dragon Platform
    • [US] Dragon Enterprise
    • [EU] Dragon Enterprise
Comodo Logo
  • Products
    Dragon Enterprise

    Comodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.

    Dragon Platform Overview

    Patented Threat Prevention

    Product Bundled Packages

    Platform Modules
    • Advanced Endpoint Protection

      Impenetrable cybersecurity without sacrificing usability

    • EDR

      Gain detailed visibility into all your endpoints activities

    • Endpoint Manager

      Reduce the attack surface to remediate and patch

    • Mobile Device Security

      Fortify mobile devices that exit and enter your network

    • Comodo NGAV

      Keep endpoints safe from known threat signatures

    • Comodo MDM

      Setup device network and security policies quickly

    • Secure Web Gateway

      Defend from any internet based threats

    • Secure Email Gateway

      Stop email threats before it enters your inbox

    Technology & Process
    • Auto Containment

      Patented to ensure absolute isolation from threats

    • Global Threat Intelligence

      Insights from deep web and dark web to eliminate risk

    • Zero Trust Architecture

      Our pioneered approach has shifted the industry

    • 45 Second Verdict Engine

      100% trust an all files at lightning speeds

  • Services
    Worldwide Services

    No one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.

    Request a demo

    Get Emergency Help

    Threat Services
    • Digital Forensics and Incident Response

      Retain experts to investigate an incident to start remediation

    • Managed Detection and Response

      Our experts closely monitor changes to your environment 24x7x365

    • Managed Threat Hunting

      Cybersecurity experts will continuously hunt suspicious endpoint activity

    Support, Deploy, Maintain
    • Comodo Professional Services
    • Comodo Support Services
    • Comodo Customer Success Management
  • Tools
    • Forensic Scan Tool
    • Security Scorecard
    • Live Threat Map
    • Open-source EDR
    • Zero-Day Malware Hunter
    • Vendor Vulnerability Report
  • For Home
    For Home
    SECURITY
    • Comodo Internet Security
    • Antivirus Software
    • Mobile Security
    WEB BROWSER
    • Dragon Browser
    BROWSER ADD-ONS & EXTENSIONS
    • Security Plugins
  • Partners
    • Partner Program
    • SOC Platform Overview
    • Begin Partner Application
    • Partner Portal Login
    • Deal Registration
  • Resources
    Resource Discovery

    Comodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.

    Knowledge Base
    • Case Studies
    • Webinars
    • Help Guides
    • Videos
    • Forums
    Threat Labs
    • Data Statistics
    • Threat Map
    • Emerging Threats
    • Plugins
    • APIs
    Compare the Competition
    • Compare Crowdstrike
    • Compare Cylance
    • Compare SentinelOne
    • Compare Sophos
    • Compare TrendMicro
    • View All Comparisons
    Cybersecurity 101 Guides
    • Buyer's Guide to EPP
    • Buyer's Guide to Zero Trust
    • Lessons from Re-EVIL's Return
    • K-12 Ransomware Guide
    • Upgrade your MSP to MSSP
  • Company
    • Press
    • News
    • Leadership
    • Customers
    • Careers
    • Contact
  • REQUEST DEMO

Melih Abdulhayoğlu

Learn more

Melih Abdulhayoğlu Comodo Chairman and Founder




Melih Abdulhayoğlu

Under Melih's direction, the Comodo companies have grown since 1998 to a worldwide presence acclaimed in the industry for innovation and trust. Today, the Comodo companies have used that success to build complementary product lines assuring financial growth and worldwide name recognition.

Melih actively advocates higher standards throughout the security industry. As the originator of the Certification Authority Browser Forum (CA/B Forum), a consortium of Certificate Authorities and Internet browser providers, Melih brought industry leaders together to establish new authentication standards for Extended Validation (EV) SSL Certificates. Melih has also initiated the Common Computing Security Standards Forum (CCSS), a voluntary organization of security software vendors, operating system providers, and Internet browser software creators who are working together to mitigate the risk of malware and protect consumers worldwide.

In 2008, Melih's efforts to promote Internet security earned him the Ernst & Young's Entrepreneur of the Year® award in Information Technology Software for New Jersey. He is a frequent speaker on Internet security issues and has appeared as an expert on various media outlets, including Fox TV and USA Today.

Melih earned a Bachelor of Science degree in Electronic Engineering from Bradford University, United Kingdom.

Want to learn more about Melih's mission? Visit his personal blog to hear from him directly: https://www.melih.com.

Melih on Twitter
Melih on LinkedIn

REDIRECT NOTICE

You are now leaving our web site being redirected to a third party web site operated by Sectigo Ltd.

Sectigo Logo
Continue to Sectigo Cancel
Discover Endpoint Security Bundles
Discover Now
Dragon AEP

Advanced Endpoint Protection

Move from Detection to Prevention With Auto Containment™ to isolate infections such as ransomware & unknown threats.

Learn More
Dragon EDR

Endpoint Detection & Response

Gain full context of an attack to connect the dots on how hackers are attempting to breach your network.

Learn More
Dragon EM

Endpoint Manager

Reduce the attack surface by identifying applications, understanding the vulnerabilities and remediating patches.

Learn More
Dragon MDR

Managed Detection & Response

We continuously monitor activities or policy violations providing remediation, threat mitigating, and immediate response.

Learn More
Move Away From Detection With Patented Threat Prevention Built For Today's Challenges.

No one can stop zero-day malware from entering your network, but Comodo can prevent if from causing any damage. Zero infection. Zero damage.

Book a Demo

Products
  • Platform Overview
  • Patent Threat Prevention
  • Advanced Endpoint Protection
  • EDR
  • Endpoint Manager
  • Mobile Device Security
  • Mobile Device Management
  • Secure Internet Gateway
  • Secure Email Gateway
Services
  • Managed Detection & Response
  • Digital Forensic & Incident Response
  • Managed Threat Hunting
  • Customer Success Management
  • Guided Professional Services
  • Customer Support
Tools
  • Forensic Scan Tool
  • Security Scorecard
  • Live Threat Map
  • Open-source EDR
  • Zero-Day Malware Hunter
  • Vendor Vulnerability Report
Company
  • Experienced a Breach?
  • Contact Sales
  • Contact Support
  • Request a demo
  • Blog
  • Press
  • Customer
  • News
  • Careers
  • Partners
comodo cybersecurity logo footer

Headquarters
200 Broadacres Drive,
Bloomfield, NJ 07003
United States

  • Tel: +1 (888) 551-1531
  • Tel: +1 (973) 859-4000
  • Fax: +1 (973) 777-4394

Inquire:
sales@comodo.com

Support:
support@comodo.com

Report Bugs: security@comodo.com


© 2024 Comodo Security Solutions, Inc. All rights reserved.

  • Terms & Conditions
  • Privacy Policy
  • Legal Repository
  • Cookie Policy
  • linkedin
  • fb
  • twitter
  • youtube