Resource center

Upcoming Live Webinars

Live webinar

Security as a Service – Technical Product Tour

Register Now

More details

On-Demand Webinars

Security Practices

On-demand webinar
How to Be Fast and Good: Selecting and Integrating Real-Time Cloud Threat Intelligence
Recorded November 21, 2019
More details
On-demand webinar
How Do You Know Your Email Security Is Working?
Recorded October 17, 2019
More details
On-demand webinar
Adding Third-party Capabilities to Office 365
Recorded September 19, 2019
More details
On-demand webinar
What Are You Doing About Office 365 Phishing Security?
Recorded June 27, 2019
More details
On-demand webinar
How Do You Know Your Email Security Is Working?
Recorded May 23, 2019
More details
On-demand webinar
Why You Need Third-Party Solutions for Office 365
Recorded March 28, 2019
More details
On-demand webinar
Selecting Email & Web Security to Complement Office 365
Recorded January 31, 2019
More details
On-demand webinar
Phishing Security for Office 365
Recorded November 29, 2018
More details
On-demand webinar
Now is the time to revisit your email archiving needs
Recorded October 11, 2018
More details
On-demand webinar
10 Steps To Protect Your Business From Phishing Attacks
Recorded July 18, 2018
More details
On-demand webinar
Protecting Users from Business Email Compromise Attacks
Recorded June 28, 2018
More details
On-demand webinar
Is Your Web Security Working? How to Test and Tune Your Web Security
Recorded January 25, 2018
More details

Understanding Threats

On-demand webinar
How Evasive Phishing Is Fooling Your Security
Recorded July 25, 2019
More details
On-demand webinar
New Attack Vectors: How Threats Have Changed and How to Combat Them
Recorded April 25, 2019
More details
On-demand webinar
Top 5 Office 365 Phishing Kits
Recorded February 28, 2019
More details
On-demand webinar
Evasive Phishing Targeting Office 365: What You Need to Know
Recorded October 25, 2018
More details
On-demand webinar
Phishing: How to Protect from Today's #1 Threat
Recorded October 11, 2018
More details
On-demand webinar
“Fileless” Ransomware: The Next Big Thing?
Recorded September 20, 2018
More details
On-demand webinar
How Evasive Malware-as-a-Service is Changing Internet Security
Recorded May 24, 2018
More details
On-demand webinar
The Top 5 Downsides and Dangers of Cryptocurrency Mining
Recorded April 05, 2018
More details
On-demand webinar
Reducing the Risk of Phishing Attacks
Recorded February 22, 2018
More details

Industry Surveys

On-demand webinar
IT Security: 2018 Benchmarking Survey
Recorded September 20, 2018
More details
On-demand webinar
IT Security in the UK & Ireland: 2018 Business Survey
Recorded July 26, 2018
More details
See more on-demand webinars... See fewer on-demand webinars...

Get started with Cyren Email Security

Free Gap Analysis

Get an assessment of your current email security, including steps you can take to better protect your organization.

Request a gap analysis  

Product Overview

Cyren’s cloud-based secure email gateway filters inbound and outbound email to protect users from cyber threats and spam.

Watch an overview video  

Live Tour and Q&A

Cyren Solution Engineers host ongoing live demos, providing an inside look at our 100% cloud internet security solutions.

Sign up for a tour and Q&A session  

Time for a test drive?

Try Cyren Email Security for free – no hardware to install, no software to manage.

Request your free trial  

Ready to purchase?

Cyren offers custom plans and pricing for organizations of all sizes.

Get a personalized quote  

Brochures and Datasheets

Overview brochure

Cyren Overview Brochure
Download

Enterprise Security Services

Cyren Email Security
Download
Cyren Email Security Gap Analysis
Download
Cyren Email Archiving
Download
Cyren Sandboxing
Download
Cyren DNS Security
Download
Cyren DNS Security for Public Wi-Fi
Download

Threat Intelligence Services

Cloud Threat Lookup
Download
Cloud Sandbox Array
Download
Malware Attack Detection
Download
Anti-Malware Service
Download
Inbound Anti-Spam
Download
Anti-Malware for Email
Download
IP Reputation Service
Download
Android Mobile Security
Download
Outbound Anti-Spam
Download
URL Filtering
Download
Anti-Malware Intelligence
Download
IP Reputation Intelligence
Download
Phishing & Fraud Intelligence
Download
See more brochures and datasheets... See fewer brochures and datasheets...

Reports and white papers

Cyberthreat Reports

Phishing: From Targeted Attacks to High-Velocity Phishing
Download
Malware: The Malware Wars are Heating Up
Download
Ransomware: An In-depth Look at The Ransomware Phenomenon
Download
Botnets: The Clone Armies of Cyber Crime
Download

White papers

Osterman White Paper: Using Third-Party Solutions With Office 365
Download
Email Security Gap Analysis: Aggregated Results
Download
Aberdeen Group:/ Reducing the Risk of Phishing Attacks: It’s About Time
Download
Total Cost of Ownership (TCO) Analysis Guide for Security Appliances and Cloud-based Security
Download
Email Security Today: Is Your Email Security Working?
Download
Recurrent Pattern Detection Fighting Spam, Phishing & Malware
Download

Annual security surveys

Office 365 Email Security in the Enterprise: 2019 Survey
Download
IT Security: Office 365 Benchmarking Survey
Download
IT Security: 2018 Benchmarking Survey
Download
IT Security in the UK & Ireland: 2018 Business Survey
Download
IT Security at SMBs: 2017 Benchmarking Survey
Download
IT Security in the UK: Business Survey
Download
IT Security at SMBs: 2016 Benchmarking Survey
Download
See more reports and white papers... See fewer reports and white papers...

Recent Blog Posts

Exploiting CAPTCHA: The Latest Evasive Phishing Tactic

by Duncan Mills

The Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) has been used in commercial applications since the early 2000s. As its name suggests, it is a mechanism for ascertaining that a real, live human is performing an action at a web site. CAPTCHA is generated by distorting letters and numbers in such a way that a computer using OCR cannot resolve it. Typical applications were originally centered on authentication. For example, if you enter an incorrect password multiple times, you might be presented with a CAPTCHA to ensure that a bot is not attempting to brute force a login. Today there are other applications, such as preventing bots automatically posting good product reviews to falsify scores on review sites. 

Suspected BEC Campaign Targeting Banks

by Maharlito Aquino and Kervin Alintanahin

In the past week we've been receiving reports of different—but seemingly related—email malware campaigns targeting banks in both the US and Europe, specifically in the form of Excel Workbooks containing a malicious macro being sent as an attachment to emails. What's interesting is that even though the email themes used are varied, the attached bait documents are mostly similar.

See more blog posts...

Monthly Newsletters

Cyren Newsletter: December 2019
View
Cyren Newsletter: October 2019
View
Cyren Newsletter: September 2019
View
Cyren Newsletter: August 2019
View
Cyren Newsletter: July 2019
View
Cyren Newsletter: June 2019
View
Cyren Newsletter: May 2019
View
Cyren Newsletter: April 2019
View
Cyren Newsletter: March 2019
View
Cyren Newsletter: February 2019
View
Cyren Newsletter: January 2019
View
Cyren Newsletter: December 2018
View
See more monthly newsletters... See fewer monthly newsletters...

Case Studies

McGaw YMCA
Cyren
Email Security Plus
Download
Quintessential Brands
Cyren
Email Security Plus
Download
Niagara
Healthcare Ltd.
Cyren
Email Security Plus
Download
High Power
Technical Services
Cyren
Email Security Plus
Download
CV-LibraryCyren Email Archiving
Download
Hollywood BowlSaaS Email Security
Download
The Keyes CompanySaaS Email Security
Download
Menin HospitalSaaS Email Security
Download
LV Shipping SaaS Email Security
Download
FINEOSSaaS Email Security
Download
KTBL SaaS Email Security
Download
See more case studies... See fewer case studies...

Infographics

The Anatomy of a Botnet
Download
The Evolution of Botnets
Download
The Anatomy of a Phishing Attack
Download

Videos

Microsoft Ignite 2019: Expert Interview
Microsoft Ignite 2019: Panel Discussion
Digital Transformation Expo Europe: Panel Discussion
Cyber Defence: TV Interview
Infosecurity: TechTalk Presentation - Phishing Kits
Infosecurity: TechTalk Presentation - Evasive Malware
Infosecurity: TechTalk Presentation - Evasive Phishing
See more videos... See fewer videos...

Learn more about Cyren Email Security services

25B Security Transactions Daily

1.3B Users Protected

300M Threats Blocked Daily