Find the gaps in your email security

Get a free and easy-to-deploy assessment of the effectiveness of your current email security, including steps you can take to better protect your organization.

Office365 logo

Protect your Office 365 users against evasive phishing attacks with Cyren Email Security.

Learn more
 

Find the gaps in your email security

Get a free and easy-to-deploy assessment of the effectiveness of your current email security, including steps you can take to better protect your organization.

Office365 logo

Protect your Office 365 users against evasive phishing attacks with Cyren Email Security.

Learn more

Internet security that protects at cloud speed

More than 1.3 billion users around the world rely on Cyren's 100% cloud security solutions to protect them against cyberattacks and data loss every day. Powered by the world's largest security cloud, Cyren delivers fast time-to-protection with an advanced suite of security services for businesses and detection technologies for service providers and security vendors.

Learn more

Relying on Cyren Threat Intelligence

Google logo
Microsoft logo
SoncWall logo
Checkpoint logo
McAfee logo
T-Mobile logo

Cyren's threat intelligence solutions are utilized by over 200 technology and security vendors, including industry leaders Google, Microsoft, and Check Point, who trust Cyren to help safeguard their users by analyzing over 25 billion transactions across multiple threat vectors every day.

Recognized by industry leaders

Experience award-winning Cyren Email Security protection for your organization.

Cyren wins Second Consecutive CyberSecurity Breakthrough Award!

Silver Stevie Winner - International Business Awards

Cyren wins 2019 Cybersecurity Excellence Award

Cybersecurity Excellence Awards 2019 - Email Security

The best cyber intelligence

The broadest threat visibility

The Cyren cloud processes over 25 billion transactions generated by over 1 billion users daily to assemble an unmatched view of cyber threats as they emerge. As a result, Cyren identifies and classifies thousands of new IP addresses, phishing sites, and malicious URLs every day, providing the best threat data in the industry.

Big data analytics

Cyren’s data collection footprint and patented detection capabilities combine with extensive expertise in Big Data, advanced heuristics, and machine learning to build actionable global security intelligence on a near-real-time basis. Our cloud platform automatically investigates and correlates IP addresses, domains, hosts, and files associated with suspicious behavior, builds risk scores, and is capable of instantaneous reclassification.

Enterprise security at cloud speed

Our cloud-based DNS, email secure gateway, and cloud sandboxing services for enterprises are powered by the Cyren GlobalView Cloud. Intelligence gained from any transaction within the Cyren cybersecurity platform instantly updates protection for all users – protecting from malicious messages, hosts, and websites.

Recent blog posts

Office 365 Security Budgets Increase to Stop Phishing

by John Callon

Email Security Phishing Security Research & Analysis

With 78 percent of businesses that utilize Office 365 reporting one or more successful cyberattacks this year, it’s not surprising that IT managers at over half of Office 365-enabled organizations also say they’ve increased their security spending by a robust average 18 percent compared to 2017. 

Evasive Phishing is Targeting Office 365

by John Callon

Phishing Security Research & Analysis

Phishing emails targeting Office 365 customers are increasing dramatically and are the top source of security breaches, according to an Osterman Research survey commissioned by Cyren. Fifty-four percent of organizations using Office 365 as their corporate email platform reported at least one successful phishing attack during the past 12 months, although usually far more than one—the average number of phishing breaches reported was 11.7. 

Fileless Malware Already Targeting Holiday Suppliers

by Maharlito Aquino and Kervin Alintanahin

Security Research & Analysis Threat Analysis

It gets earlier and earlier every year. The first Yuletide-related malware campaign has already been spotted. There’s always an expected and monumental amount of consumer spam and phishing in the run-up to Black Friday and then Christmas itself, but we’ve found one malware author getting into the Christmas “spirit” in late October by targeting backdoor-delivering emails at the Yuletide supply chain, specifically Christmas goods suppliers whose preparations for the year-end commercial convulsion are well underway.

Not-Really-Password-Protected Evasion Technique Resurfaces

by Maharlito Aquino and Kervin Alintanahin

Security Research & Analysis Threat Analysis

Today we came across an e-mail with an Excel Workbook attachment, which upon first inspection appears to be password-protected. The presence of the EncryptedPackage stream in an OLE2 document indicates that it is protected by a password, which obviously would require the user to enter one in order to open the document properly. Or at least that’s what the bad guys would like email or AV scanners to think. 

Read more posts

25B Security Transactions Daily

1.3B Users Protected

300M Threats Blocked Daily