Select Page

Email Signing Certificates

Email Signing Certificate Plans

Personal Authentication Certificates
Basic

Max. Term 3 Years

Validation Requirements Domain Control

Certificate Fields [email protected]

Email Encryption Yes

Email Signing Yes

Document Signing Yes

Client Authentication Yes

Personal Authentication Certificates
Pro

Max. Term 3 Years

Validation Requirements Domain Control Identity Verification

Certificate Fields [email protected] First Name, Last Name

Email Encryption Yes

Email Signing Yes

Document Signing Yes

Client Authentication Yes

Personal Authentication Certificates Enterprise

Max. Term 3 Years

Validation Requirements Domain Control Identity Verification Organization Validation

Certificate Fields [email protected] First Name, Last Name Company Name Company Address

Email Encryption Yes

Email Signing Yes

Document Signing Yes

Client Authentication Yes

Personal Authentication Certificates by COMODO

Cost effective solution to secure emails & documents and authenticate users

Comodo Personal Authentication Certificates (CPACs) are easy and affordable solutions used to secure business communications. These certificates allow you to encrypt and digitally sign email communications, offer two-factor authentication of users and employees, secure important company documents sent across the network, and will authenticate to ensure they have clearance to access online servers. CPACs are fully trusted by all major email clients and internet browsers and rolling them out to employees or customers is a breeze.

About Personal Authentication Certificates

Basic, Pro or Enterprise?

Comodo Personal Authentication Certificates are available in a range of assurance levels. This range of formats, are each designed to suit a particular business or individual use-case. The level of identity assurance asserted by each CPAC type depends on the level of validation involved in order to get issued (similar to DV, OV, EV SSL certificate level of validation). This ranges varies from the basic verification of email address ownership to personal identity verification, all the way to full business identity verification.

Conceived by the think tank over at Comodo Innovation Labs that includes many of the very brightest computer and internet security minds out there Web Inspector provides a superior service boasting a variety of features in one single package.

With the risks associated with transferring sensitive information online well-documented to customers maintaining a high level of trust and untarnished reputation have become all the more important. Web Inspector’s extensive daily malware scanning, thorough blacklist monitoring, and continuous monitoring of possible oncoming threats do more than enough to maintain those two vital components.

Web Inspector also includes complete PCI compliance scanning driven by Comodo’s HackerGuardian technology for e-commerce websites to maintain compliance with the payment card industry’s mandatory standards.

With all considered Web Inspector is truly an application developed with the security of your website, business and customers in mind.

Secure Email

For businesses looking to follow the best web security practices, email encryption is a must. Encrypting and digitally signing your emails will help your company avoid accidental data exposure, breaches of privacy, and other security missteps that could lead to serious implications. Luckily, CPAC solutions add the highest level of encryption and security to your email communication.

CPAC provides true end-to-end encryption between the sender and the recipient. This ensures that once the email leaves your network, it can never be intercepted and decrypted by https proxies, man-in-the-middle attackers, packet-sniffers, or any other hackers.

Each certificate uses highly secure PKI (Private Key Infrastructure) to prove a user’s identity to a remote server or computer, which is much quicker and far more cost-effective than using physical tokens.

Web Inspector also includes complete PCI compliance scanning driven by Comodo’s HackerGuardian technology for e-commerce websites to maintain compliance with the payment card industry’s mandatory standards.

Setting up CPACs is extremely easy! And after the initial installation is complete, all of your servers will require that each user present their certificate in order to be accessed – in addition to username and password. This will help ensure that you have all of the checks and balances in place to keep unwanted users off your servers!

Document Signing

CPACs let you to easily sign important company documents. This allows you to identify yourself as the document signer and prove that the document has not been tampered with in any way since it was signed. These certificates will also help you migrate from ink to paper based workflows on items like document sign-offs, contracts, offer sheets, archiving and internal request forms. CPACs can also be used in tandem with or as a complete replacement for the visible signature feature in Microsoft® Office products.

Two-Factor Authentication

If your business supports remote access to servers that contain vital customer or corporate data, relying on passwords as the sole gatekeepers is simply not enough with the stakes being so high. You’ll want a stronger guarantee that the person accessing an online account or network resource is a legitimate employee, not a hacker that has managed to steal a username and password – which is much easier than you think!

CPACs mitigate this risk by setting up two-factor authentication or both employees and customers. Two-factor authentication is the industry standard utilized by banks all over the world.

Mobile & Browser Compatibility

Comodo Personal Authentication Certificates are trusted by all major mail clients, browsers and mobile devices, such as:

Server and Client OS Compatibility
Client OS: Mac OS X, Snow Leopard, Windows 7, Vista, Xp, 2000, Linux Client OS.

Server OS: Windows Server 2008, 2003, 2000, Linux, UNIX, Solaris, Novell, etc.

Web Server: Microsoft IIS 7, IIS6, Apache, Tomcat, IBM HTTP, Weblogic, Cobalt.

E-Mail Servers: Netscape Communicator 4.51+,Microsoft Outlook 99+,Microsoft Entourage (OS/X),Mozilla Thunderbird 1.0+,Qualcomm Eudora 6.2+,Lotus Notes (6+), etc.

Features & Benefits

  • Secure your email communications with strong 256-bit encryption & digital signatures
  • Fast and easy to roll out to employees and/or customers
  • Binds user and device identities with strong PKI authentication
  • Simple & fast validation process
  • Digital signatures bind users’ identities to message content to add authenticity and security to emails
  • Compatible with Exchange servers and mail gateway appliances

Product Specification

  • Minimum encryption key length: RSA/DSA 2048 bit
  • Digital signatures identify you as the sender and prove that the message genuinely came from you and not an impersonator
  • Supports major business software including Microsoft ® Office suite, Open Office Suite, VBA Macros, and more
  • Two-factor authentication of users who log-in to company servers and websites
top