Resource Center

Live Webinare

Live webinar

Security as a Service – Technical Product Tour

Register Now

More details
Live webinar

Adding Third-party Capabilities to Office 365 (EMEA)

Register Now

More details
Live webinar

Adding Third-party Capabilities to Office 365

Register Now

More details

Webinar-Aufzeichnungen

Security Practices

On-demand webinar
What Are You Doing About Office 365 Phishing Security?
Recorded June 27, 2019
More details
On-demand webinar
How Do You Know Your Email Security Is Working?
Recorded May 23, 2019
More details
On-demand webinar
Why You Need Third-Party Solutions for Office 365
Recorded March 28, 2019
More details
On-demand webinar
Selecting Email & Web Security to Complement Office 365
Recorded January 31, 2019
More details
On-demand webinar
Phishing Security for Office 365
Recorded November 29, 2018
More details
On-demand webinar
Now is the time to revisit your email archiving needs
Recorded October 11, 2018
More details
On-demand webinar
10 Steps To Protect Your Business From Phishing Attacks
Recorded July 18, 2018
More details
On-demand webinar
Protecting Users from Business Email Compromise Attacks
Recorded June 28, 2018
More details
On-demand webinar
Is Your Web Security Working? How to Test and Tune Your Web Security
Recorded January 25, 2018
More details

Understanding Threats

On-demand webinar
How Evasive Phishing Is Fooling Your Security
Recorded July 25, 2019
More details
On-demand webinar
New Attack Vectors: How Threats Have Changed and How to Combat Them
Recorded April 25, 2019
More details
On-demand webinar
Top 5 Office 365 Phishing Kits
Recorded February 28, 2019
More details
On-demand webinar
Evasive Phishing Targeting Office 365: What You Need to Know
Recorded October 25, 2018
More details
On-demand webinar
Phishing: How to Protect from Today's #1 Threat
Recorded October 11, 2018
More details
On-demand webinar
“Fileless” Ransomware: The Next Big Thing?
Recorded September 20, 2018
More details
On-demand webinar
How Evasive Malware-as-a-Service is Changing Internet Security
Recorded May 24, 2018
More details
On-demand webinar
The Top 5 Downsides and Dangers of Cryptocurrency Mining
Recorded April 05, 2018
More details
On-demand webinar
Reducing the Risk of Phishing Attacks
Recorded February 22, 2018
More details

Industry Surveys

On-demand webinar
IT Security: 2018 Benchmarking Survey
Recorded September 20, 2018
More details
On-demand webinar
IT Security in the UK & Ireland: 2018 Business Survey
Recorded July 26, 2018
More details
Mehr Webinar-Aufzeichnungen... Weniger Webinar-Aufzeichnungen...

Jetzt starten mit Cyren Email Security

 

Funktioniert Ihre E-Mail-Sicherheit?

Lesen Sie unsere Email Security Gap Analyse

 
   

Bereit für eine Produkttour?

Melden Sie sich für eine technische Produkt-Demo an

 
   

Probieren Sie unsere Lösung!

Melden Sie sich für unsere kostenlose Testversion an

 

Alles bereit zum Kauf?


Angebot anfordern

 

Broschüren und Datenblätter

Cyren Email Security
Herunterladen
Cyren Email Security Gap Analyse
Herunterladen
Cyren Email Archiving
Herunterladen
Cyren Sandboxing
Herunterladen
Cyren DNS Security for Public Wi-Fi
Herunterladen

Berichte und Whitepaper

Cyberthreat Reports

Threatreport:Phishing
Herunterladen
Threatreport:Schadsoftware
Herunterladen
Threatreport:Botnets
Herunterladen
Threatreport:Ransomware
Herunterladen

Whitepaper

Warum Ihr Unternehmen Drittanbieter-Lösungen für Office 365 benötigt
Herunterladen
Aberdeen Whitepaper:Es ist höchste Zeit Risiken von Phishing-Attacken zu reduzieren
Herunterladen
Email Security Gap-AnalyseAggregierte Ergebnisse
Herunterladen

Sicherheitsumfragen

IT Sicherheit:Office 365 Benchmarking-Umfrage
Herunterladen
Mehr Berichte und Whitepaper... Weniger Berichte und Whitepaper...

Aktuelle Blog-Artikel

Open Source Ransomware Targets Fortnite Users

von Maharlito Aquino and Kervin Alintanahin

The global gaming phenomenon Fortnite has a huge global user base – last reported in March at 250 million gamers – and the just-concluded Fortnite World Cup with its $30 million prize pool and an online viewing audience of over two million has certainly only added to its allure. Over 40 million Fortnite gamers competed in qualifying rounds to get one of the 100 coveted spots in the World Cup and a guaranteed $50,000 payout, plus a shot at the $3 million top prize (won by a 16-year old!). Given the size of the global player pool and the evident motivation to up one’s game, it comes as no surprise that cybercriminals are now targeting Fortnite users by leveraging their competitive zeal.

Test the Effectiveness of Your Email Security

von Duncan Mills

Do you keep seeing phishing emails getting through to users, and wish you could quantify how effective your email security is—or isn't? Email is the main vehicle for introducing malware into an organization, and is practically synonymous with phishing these days, so it is a sensible idea to get a grasp on whether your security is doing its job well or poorly — but lots of people don't. Here at Cyren we know how eye-opening such an evaluation can be, as the email security "gap analyses" that we performed for a series of organizations in 2018 showed that an average 7.2% of email protected by a number of email security products, but still reaching users, was spam or contained a threat. 

Zum Cyren-Blog...

Monatliche Newsletter

Cyren Newsletter: July 2019
Download
Cyren Newsletter: June 2019
Download
Cyren Newsletter: May 2019
Download
Cyren Newsletter: April 2019
Download
Cyren Newsletter: March 2019
Download
Cyren Newsletter: February 2019
Download
Cyren Newsletter: January 2019
Download
Cyren Newsletter: December 2018
Download
Mehr Newsletter... Weniger Newsletter...

Fallstudien

FINEOSE-mail Sicherheit
Download
KTBLE-mail Sicherheit
Download

Infographics

The Anatomy of a Botnet
Download
The Evolution of Botnets
Download
The Anatomy of a Phishing Attack
Download

Videos

Cyber Defence: TV Interview
Infosecurity: TechTalk Presentation - Phishing Kits
Infosecurity: TechTalk Presentation - Evasive Malware
Infosecurity: TechTalk Presentation - Evasive Phishing
Weniger Videos... Mehr Videos...

Weitere Informationen über Cybersicherheits-Produkte von Cyren

25 Mrd. Sicherheitsabfragen pro Tag

1.3 Mrd. Geschützte Nutzer

300 Mio. Abgewehrte Gefahren pro Tag