Resource center

Upcoming Live Webinars

Live webinar

Security as a Service – Technical Product Tour

Register Now

More details
Live webinar

Adding Third-party Capabilities to Office 365 (EMEA)

Register Now

More details
Live webinar

Adding Third-party Capabilities to Office 365

Register Now

More details

On-Demand Webinars

Security Practices

On-demand webinar
What Are You Doing About Office 365 Phishing Security?
Recorded June 27, 2019
More details
On-demand webinar
How Do You Know Your Email Security Is Working?
Recorded May 23, 2019
More details
On-demand webinar
Why You Need Third-Party Solutions for Office 365
Recorded March 28, 2019
More details
On-demand webinar
Selecting Email & Web Security to Complement Office 365
Recorded January 31, 2019
More details
On-demand webinar
Phishing Security for Office 365
Recorded November 29, 2018
More details
On-demand webinar
Now is the time to revisit your email archiving needs
Recorded October 11, 2018
More details
On-demand webinar
10 Steps To Protect Your Business From Phishing Attacks
Recorded July 18, 2018
More details
On-demand webinar
Protecting Users from Business Email Compromise Attacks
Recorded June 28, 2018
More details
On-demand webinar
Is Your Web Security Working? How to Test and Tune Your Web Security
Recorded January 25, 2018
More details

Understanding Threats

On-demand webinar
How Evasive Phishing Is Fooling Your Security
Recorded July 25, 2019
More details
On-demand webinar
New Attack Vectors: How Threats Have Changed and How to Combat Them
Recorded April 25, 2019
More details
On-demand webinar
Top 5 Office 365 Phishing Kits
Recorded February 28, 2019
More details
On-demand webinar
Evasive Phishing Targeting Office 365: What You Need to Know
Recorded October 25, 2018
More details
On-demand webinar
Phishing: How to Protect from Today's #1 Threat
Recorded October 11, 2018
More details
On-demand webinar
“Fileless” Ransomware: The Next Big Thing?
Recorded September 20, 2018
More details
On-demand webinar
How Evasive Malware-as-a-Service is Changing Internet Security
Recorded May 24, 2018
More details
On-demand webinar
The Top 5 Downsides and Dangers of Cryptocurrency Mining
Recorded April 05, 2018
More details
On-demand webinar
Reducing the Risk of Phishing Attacks
Recorded February 22, 2018
More details

Industry Surveys

On-demand webinar
IT Security: 2018 Benchmarking Survey
Recorded September 20, 2018
More details
On-demand webinar
IT Security in the UK & Ireland: 2018 Business Survey
Recorded July 26, 2018
More details
See more on-demand webinars... See fewer on-demand webinars...

Get started with Cyren Email Security

 

New to Cyren Email Security?

Watch our product overview

 
   

Is your email security working?

Review findings of our gap analysis report

 
     

Technical questions about our product?

Sign up for a tour and Q&A session

 

Time for a test drive?

Request your free trial today

 

Brochures and Datasheets

Overview brochure

Cyren Overview Brochure
Download

Enterprise Security Services

Cyren Email Security
Download
Cyren Email Security Gap Analysis
Download
Cyren Email Archiving
Download
Cyren Sandboxing
Download
Cyren DNS Security
Download
Cyren DNS Security for Public Wi-Fi
Download

Threat Intelligence Services

Cloud Sandbox Array
Download
Malware Attack Detection
Download
Anti-Malware Service
Download
Inbound Anti-Spam
Download
Anti-Malware for Email
Download
IP Reputation Service
Download
Android Mobile Security
Download
Outbound Anti-Spam
Download
URL Filtering
Download
Anti-Malware Intelligence
Download
IP Reputation Intelligence
Download
Phishing & Fraud Intelligence
Download
See more brochures and datasheets... See fewer brochures and datasheets...

Reports and white papers

Cyberthreat Reports

Phishing: From Targeted Attacks to High-Velocity Phishing
Download
Malware: The Malware Wars are Heating Up
Download
Ransomware: An In-depth Look at The Ransomware Phenomenon
Download
Botnets: The Clone Armies of Cyber Crime
Download

White papers

Office 365 Email Security in the Enterprise: 2019 Survey
Download
Osterman White Paper: Why Your Company Needs Third-Party Solutions for Office 365
Download
Email Security Gap Analysis: Aggregated Results
Download
Aberdeen Group:/ Reducing the Risk of Phishing Attacks: It’s About Time
Download
Total Cost of Ownership (TCO) Analysis Guide for Security Appliances and Cloud-based Security
Download
Email Security Today: Is Your Email Security Working?
Download
Recurrent Pattern Detection Fighting Spam, Phishing & Malware
Download

Annual security surveys

IT Security: Office 365 Benchmarking Survey
Download
IT Security: 2018 Benchmarking Survey
Download
IT Security in the UK & Ireland: 2018 Business Survey
Download
IT Security at SMBs: 2017 Benchmarking Survey
Download
IT Security in the UK: Business Survey
Download
IT Security at SMBs: 2016 Benchmarking Survey
Download
See more reports and white papers... See fewer reports and white papers...

Recent Blog Posts

Open Source Ransomware Targets Fortnite Users

by Maharlito Aquino and Kervin Alintanahin

The global gaming phenomenon Fortnite has a huge global user base – last reported in March at 250 million gamers – and the just-concluded Fortnite World Cup with its $30 million prize pool and an online viewing audience of over two million has certainly only added to its allure. Over 40 million Fortnite gamers competed in qualifying rounds to get one of the 100 coveted spots in the World Cup and a guaranteed $50,000 payout, plus a shot at the $3 million top prize (won by a 16-year old!). Given the size of the global player pool and the evident motivation to up one’s game, it comes as no surprise that cybercriminals are now targeting Fortnite users by leveraging their competitive zeal.

Test the Effectiveness of Your Email Security

by Duncan Mills

Do you keep seeing phishing emails getting through to users, and wish you could quantify how effective your email security is—or isn't? Email is the main vehicle for introducing malware into an organization, and is practically synonymous with phishing these days, so it is a sensible idea to get a grasp on whether your security is doing its job well or poorly — but lots of people don't. Here at Cyren we know how eye-opening such an evaluation can be, as the email security "gap analyses" that we performed for a series of organizations in 2018 showed that an average 7.2% of email protected by a number of email security products, but still reaching users, was spam or contained a threat. 

See more blog posts...

Monthly Newsletters

Cyren Newsletter: July 2019
Download
Cyren Newsletter: June 2019
Download
Cyren Newsletter: May 2019
Download
Cyren Newsletter: April 2019
Download
Cyren Newsletter: March 2019
Download
Cyren Newsletter: February 2019
Download
Cyren Newsletter: January 2019
Download
Cyren Newsletter: December 2018
Download
See more monthly newsletters... See fewer monthly newsletters...

Case Studies

CV-LibraryCyren Email Archiving
Download
Hollywood BowlSaaS Email Security
Download
The Keyes CompanySaaS Email Security
Download
Menin HospitalSaaS Email Security
Download
LV Shipping SaaS Email Security
Download
FINEOSSaaS Email Security
Download
KTBL SaaS Email Security
Download
See more case studies... See fewer case studies...

Infographics

The Anatomy of a Botnet
Download
The Evolution of Botnets
Download
The Anatomy of a Phishing Attack
Download

Videos

Cyber Defence: TV Interview
Infosecurity: TechTalk Presentation - Phishing Kits
Infosecurity: TechTalk Presentation - Evasive Malware
Infosecurity: TechTalk Presentation - Evasive Phishing
See more videos... See fewer videos...

Learn more about Cyren Email Security services

25B Security Transactions Daily

1.3B Users Protected

300M Threats Blocked Daily