Find the gaps in your email security

Get a free and easy-to-deploy assessment of the effectiveness of your current email security, including steps you can take to better protect your organization.

Office365 logo

Protect your Office 365 users against evasive phishing attacks with Cyren Email Security.

Learn more
 

Find the gaps in your email security

Get a free and easy-to-deploy assessment of the effectiveness of your current email security, including steps you can take to better protect your organization.

Office365 logo

Protect your Office 365 users against evasive phishing attacks with Cyren Email Security.

Learn more

Join Cyren at Microsoft Ignite – Booth 2001

At Microsoft Ignite, Cyren will preview a promising new approach to address the rise in phishing attacks targeting Microsoft Office 365 - a new layer of security positioned at the inbox to fix the shortcomings of traditional email gateway security at the perimeter.

Book a Cyren demo
Microsoft Ignite 2019 logo

Internet security that protects at cloud speed

More than 1.3 billion users around the world rely on Cyren's 100% cloud security solutions to protect them against cyberattacks and data loss every day. Powered by the world's largest security cloud, Cyren delivers fast time-to-protection with an advanced suite of security services for businesses and detection technologies for service providers and security vendors.

Learn more

Relying on Cyren Threat Intelligence

Google logo
Microsoft logo
SoncWall logo
Checkpoint logo
McAfee logo
T-Mobile logo

Cyren's threat intelligence solutions are utilized by over 200 technology and security vendors, including industry leaders Google, Microsoft, and Check Point, who trust Cyren to help safeguard their users by analyzing over 25 billion transactions across multiple threat vectors every day.

Recognized by industry leaders

Experience award-winning Cyren Email Security protection for your organization.

Cyren wins Second Consecutive CyberSecurity Breakthrough Award!

Silver Stevie Winner - International Business Awards

Cyren wins 2019 Cybersecurity Excellence Award

Cybersecurity Excellence Awards 2019 - Email Security

The best cyber intelligence

The broadest threat visibility

The Cyren cloud processes over 25 billion transactions generated by over 1 billion users daily to assemble an unmatched view of cyber threats as they emerge. As a result, Cyren identifies and classifies thousands of new IP addresses, phishing sites, and malicious URLs every day, providing the best threat data in the industry.

Big data analytics

Cyren’s data collection footprint and patented detection capabilities combine with extensive expertise in Big Data, advanced heuristics, and machine learning to build actionable global security intelligence on a near-real-time basis. Our cloud platform automatically investigates and correlates IP addresses, domains, hosts, and files associated with suspicious behavior, builds risk scores, and is capable of instantaneous reclassification.

Enterprise security at cloud speed

Our cloud-based DNS, email secure gateway, and cloud sandboxing services for enterprises are powered by the Cyren GlobalView Cloud. Intelligence gained from any transaction within the Cyren cybersecurity platform instantly updates protection for all users – protecting from malicious messages, hosts, and websites.

Recent blog posts

Evasive Phishing Driven by Phishing-as-a-Service

by Tinna Thuridur Sigurdardottir and Magni Sigurdsson

Cyren’s research lab has turned up 5,334 new, unique phishing kits deployed to the web so far this year, an indication of the scope and scale of turn-key phishing offerings.

Attack Exploits Vulnerability in Half of Email MTAs Globally

by Tobias Herkula

Attacks predicted for a freshly reported email server vulnerability have come true in less than a week. If you’re an email administrator, you should be aware of the attacks this week targeting a vulnerability in the Exim MTA server code (versions 4.87 to 4.91), the objective of which is to create a backdoor that could then be exploited for almost anything, since with the backdoor in place, the attackers would then have full root access on the server. 

A view from the exhibition floor: three takeaways from Infosecurity Europe

by Duncan Mills

infosec Infosecurity Europe

This year’s Infosecurity Europe yet again made me realise that I am privileged to work in such an exciting industry. As always, there was a lot of hype to cut through, but once you did, there were great insights to be found. Here are my top three takeaways from walking the floor.

It’s Back! Facebook Cryptominer Worm Reemerges

by Maharlito Aquino and Kervin Alintanahin

Back in 2017, we wrote a blog about a malware spreading on Facebook, which, it turns out, continues to be relevant today—referring to both the blog and the malware. At the time we analyzed part of the 2017 Digmine campaign that installed a cryptominer payload, and (lo and behold!) just last month this campaign reemerged on Facebook with a new variant that uses the files section of Facebook groups and employs tactics similar to those used two years ago. We decided to monitor and do a breakdown of one of them in order to discover if there is really any new behavior we might alert you to.

Read more posts

25B Security Transactions Daily

1.3B Users Protected

300M Threats Blocked Daily