Why Comodo’s Rebrand to Sectigo Signals a New Era in Cybersecurity

Follow SSLREPO latest news

Why Comodo’s Rebrand to Sectigo Signals a New Era in Cybersecurity

Introduction: When a Giant Changes Its Name

In 2019, the cybersecurity world witnessed a seismic shift: Comodo CA, a household name in SSL certificates since 1998, rebranded as Sectigo. With over 100 million certificates issued and 700,000+ businesses relying on its services, this wasn’t just a name change—it was a strategic evolution. But why would a market leader abandon decades of brand equity? And what does this mean for businesses navigating the murky waters of web security?

Let’s dissect the rebrand, decode its implications, and explore why Sectigo’s pivot could redefine trust in the digital age.


Section 1: The Catalyst Behind the Rebrand

From Comodo to Sectigo: A Timeline of Transformation

Comodo’s journey to Sectigo began in 2017 when private equity firm Francisco Partners acquired its certificate authority division. The rebrand aimed to:

  • Eliminate market confusion (Comodo Group still operates other cybersecurity services).
  • Signal a broader mission beyond SSL certificates.
  • Align with evolving threats like IoT security and zero-trust frameworks.

As CEO Bill Holtz stated:

“Sectigo represents our commitment to securing all facets of digital identity—not just websites.”

Root Certificates: The Silent Backbone

A critical technical shift accompanied the rebrand:

  • Old: Certificates chained to Comodo Root CAs.
  • New: Migration to USERTrust Root CAs (already trusted by 99.9% of browsers).
MetricComodo CA (Pre-2019)Sectigo (Post-2019)
Root CertificateComodo Root CAUSERTrust Root CA
Brand RecognitionHigh (20+ years)Emerging
ScopeSSL/TLS FocusHolistic Digital Identity
Customer Base3M+3M+ (retained)

This table underscores a key takeaway: trust remained intact despite the overhaul.


Section 2: What Changed (And What Didn’t)

No Disruption, Only Evolution

For existing customers, the transition was frictionless:

  • Certificates: All Comodo-issued SSL/TLS certs continued working.
  • Pricing: No changes to affordability or tiered plans.
  • TrustLogos: Updated branding but same functionality (reduce cart abandonment by 12-18%).

The Hidden Technical Shift

While end users saw minimal changes, Sectigo began phasing out Comodo Root CAs in favor of USERTrust. Here’s why this matters:

  1. Future-Proofing: USERTrust roots are compatible with quantum-resistant algorithms.
  2. Brand Alignment: Intermediates now reflect “Sectigo” in the certificate chain.
  3. Long-Term Vision: Sectigo plans to deploy proprietary roots by 2025.

Section 3: The Bigger Picture: Why Rebrands Matter in Cybersecurity

Case Study: Symantec’s $950M Mistake

In 2017, Google distrusted Symantec certificates after lax validation practices. Comparatively, Sectigo’s proactive rebrand contrasts sharply:

FactorSymantec’s DemiseSectigo’s Rebrand
TriggerLoss of TrustStrategic Expansion
Customer ImpactMass distrustZero disruption
Market ResponseAcquired by DigiCertRetained 100% client base

The Trust Paradox

Cybersecurity hinges on perceived stability. By rebranding without upending trust, Sectigo achieved the impossible:

  • Retained legacy credibility.
  • Positioned itself as a next-gen player.

Conclusion: What This Means for Your Business

Sectigo’s rebrand is a masterclass in balancing innovation with continuity. Whether you’re a network engineer, a small business owner, or a CISO, here’s your action plan:

  1. Audit Certificates: Ensure Sectigo/Comodo certs use USERTrust roots.
  2. Leverage TrustLogos: Boost conversions with updated trust indicators.
  3. Stay Informed: Follow Sectigo’s roadmap for proprietary roots.

“In cybersecurity, stagnation is vulnerability. Sectigo’s rebrand isn’t just a name change—it’s a survival tactic.”


🔒 Ready to Secure Your Digital Future?
Explore Sectigo’s SSL certificates and cutting-edge solutions at sslrepo.com. Whether you need a basic DV cert or enterprise-grade IoT protection, we’ve got you covered.

Because in a world of evolving threats, your security partner should evolve faster.

Frequently Searched Keywords

1. Are Comodo SSL certificates still valid after rebranding to Sectigo?

2. What changes were made to Sectigo SSL certificates after the Comodo rebrand?

3. How does the USERTrust Root CA impact Sectigo SSL certificate compatibility?

4. Do existing Comodo SSL certificates need to be replaced with Sectigo certificates?

5. Is Sectigo as reliable as Comodo for SSL certificates?

6. Why did Comodo change its name to Sectigo in the cybersecurity industry?

7. How does Sectigo’s approach to SSL trust differ from Symantec’s past issues?

Scroll to Top