Enter an IP address to check its current reputation.
Please report any URL that has been mistakenly classified. CYREN will investigate your report within 72 hours upon delivery.
Anti-Spam is integrated into a service provider environment or a vendor device such as a Mail Gateway. It consists of an engine that resides in the partner product or environment and detection services via the GlobalView Cloud.
Due to its patented Recurrent Pattern Detection™ (RPD™) technology, CYREN Anti-Spam has a typical sustained detection rate of more than 99%, with virtually zero false-positives (approximately 1 in 1.5 million).
CYREN RPD contains an intrinsic mechanism to match recurring patterns across similar messages. In the case of images, CYREN Anti-Spam is able to match images even with minute differences inserted by spammers.
CYREN offers a tool to report false negatives (FN) or false positive (FP) detections. A team of analysts reviews each FP and adjusts algorithms to avoid recurrences. An automated process analyzes FNs and adds these to RPD, to improve future queries.
We analyze billions of emails per day, enabling detection of new spam in seconds. Our “GlobalView Cloud delivers the information to partners the moment a new attack is detected. From the partner’s perspective, all this takes only a few seconds.
Security threats, productivity loss, and compliance drives businesses to adopt Web filtering solutions. The Web today is increasingly interactive and dynamic, mandating a solution that accurately filters Web sites, including blogs and social networks.
Web Filtering is integrated into a service provider environment or a vendor device, such as a Web Security Gateway. It consists of an engine and a cloud-based detection services via the GlobalView Cloud.
URLs are allocated at least one of 64 categories, 8 of which are security related. A URL may have up to 5 categories associated with it.
CYREN offers a local cached database that adjusts content according to the browsing habits of users served. This provides local categorization for over 99% of all queries.
For the remainder a query sized
We offer a migration kit to make the move to CYREN easy. The migration kit maps our categorization to your existing scheme, so you continue with existing configuration and policies but benefit from our advanced solution.
Web filtering accurately categorizes embedded URLs, e.g.http://translate.google.com/translate?hl=en&sl=es&tl=en&u=http://www.cnn.com/espanol/ is categorized as “News” and “Translators”. We also correctly categorize archive and content delivery sites.
We use an integrated engine that provides URL categories on-demand. Whether the connection is HTTP, HTTPS, FTP or IP, the partner extracts the URL from the session and passes it to the engine for categorization.
Filtering can be embedded into devices and applications such as Web gateways, network devices, mobile devices, and desktop applications. The solution is for service providers such as SaaS and SecaaS providers, ISPs, Mobile operators and Web portals.
We have been in this business since the very first days viruses appeared on micro computers, now referred to as PCs. We have been processing virus samples since about 1988.
Award-winning, multi-layered detection – The SDK is based on a Unified platform with multiple detection technologies for maximum protection. Zero-hour detection is ensured by the flexible architecture which enables fast reaction to new threat types. Commtouch AV continually proves its superior detection in product evaluations. For this reason it has been selected by industry leaders, such as Google, Websense and Microsoft.
Industry leading performance & scalability – The SDK excels at rapid object processing (particularly clean files which are the majority on most systems) and consumes very low resources. The Commtouch engine has numerous proven deployments requiring less than half the servers compared to other solutions. This advantage is especially clear on sites where Commtouch runs alongside a second AV engine. A complete evaluation of Commtouch’s AV benefits from integration of the SDK into the OEM environment to illustrate this large resource saving.
Maximum operational flexibility – The SDK is easily integrated as a standalone AV or with multiple engines. In addition the tiny SDK footprint supports deployment on a wide range of platforms and environments. These advantages have convinced vendors such as McAfee to deploy Command alongside their own solutions. The flexibility of implementation has made Command the choice for a wide range of solutions, from the smallest network appliances and desktop clients to carrier-grade network clouds.