Intelligent network security that protects your organization's most valuable resources

Faster Detection

  • Stops breaches in real time
  • Proprietary threat intelligence
  • Correlates data across DNS and messaging

Superior Performance

  • Protects against a broad range of threats
  • Automated, proprietary attack analysis
  • Industry's highest accuracy-99% catch rate

Easier Deployment

  • Infrastructure agnostic
  • Software or Virtual Machine Image
  • Up and running in hours

Try a Better Approach to DNS Protection

Obtain visibility into your DNS traffic to detect malicious activity and protect your network.

Your business could already be breached and experiencing data theft, supporting rogue traffic, or enabling unauthorized access to your network.

Sign up for your trial!

Our Threat Report for Q2 2015 is full of interesting and timely information designed to keep you one step ahead of the cyber criminals. In this issue, we discuss the growing threat of ransomware that targets small businesses. We also take a look at how DNS can be used to detect malware infections. We learn how the FTC gets a big win as they take action against diet pill spammers with great success. It is discovered that new top level domains like .ninja and .science are now being heavily leveraged by abusers. As spam continues to pose a major concern, there are trends in Email-to-SMS spam that caught our attention.

Get more Threat Research


  • Preventing malicious mobile traffic presents unique challenges that are often missed due to lack of visibility and control of the network. The true cost of just one of many scams goes beyond operational costs; it ultimately affects subscribers who have fallen victim to phishing attacks stealing sensitive data, like banking credentials, or infecting them with mobile malware. Sending malicious traffic through various methods, including email to SMS or via grey routes, has been driven not only by the low cost, but also due to the highly profitable nature of malware and phishing scams. This webinar will take an in-depth look at the latest trends and attacks affecting mobile network security, the types of malicious traffic that boosts profitability for attackers, and strategies for mitigating message abuse in the network.

  • Hackers can glean extremely valuable sensitive information or shut down your website simply by attacking DNS. Despite the ease with which an attack can succeed, organizations rarely put security efforts towards DNS. With the number of attacks growing, ignoring DNS security is the fastest way to become the next data breach victim. In this webcast, you will learn the security vulnerabilities of DNS and why you can't assume that it's protected.

See more Cloudmark webinars

Recent Blog Posts

  1. Does Blackmailing Pay? Signs on the Bitcoin blockchain of responses to Ashley Madison extortion emails

    Sep 1, 2015 by Toshiro Nishimura

    It was bound to happen: someone decided to blackmail members of online affairs website Ashley Madison, whose entire database was leaked earlier this week by a group calling themselves the “Impact Team”.  Shortly thereafter, an unknown group or individual has been sending extortion emails demanding Bitcoin for silence: Of those who had accounts on the […]

    Continue reading...

  2. Oracle: Scolding the Customers Who Try to Help Them

    Aug 13, 2015 by Mike Acar

    Oracle CSO Mary Ann Davidson’s “No, You Really Can’t” blog post provoked a strong and very negative reaction in the security community. The post has been deleted, but it’s available in various archives and was posted to the Information Security News mailing list. In summary, Davidson is complaining that Oracle customers are violating their license agreements […]

    Continue reading...

Read more from the Cloudmark blog

Cloudmark News

  • Computer Business Review

    5 Women Leading the Way in Cyber Security

    September 25, 2015 by Charlotte Henry

    "Knox is the engineering director at Cloudmark, with extensive experience in the security field. She is in charge of research and development at the firm. She also contributes to its Threat Report research and blog, and has spoken on the issue of women in security."

  • National Public Radio

    Did Clinton Camp Delete Emails Or Wipe Server? The Difference Matters

    September 14, 2015 by Aarti Shahani

    "Computer expert Angela Knox, with Cloudmark, says a computer is like a library with a bunch of files — or books — in it. "You know which shelf the book you're looking for is on by looking at the index of the library," she explains."

  • Infosecurity Magazine

    Spam Landscape Marked by Big Players, Clever Tactics

    July 24, 2015 by Tara Seals

    "Cloudmark research shows that the cheaper the domain registration, the more likely it is to be abused by spammers, with free TLDs being almost entirely used for spam."

  • SC Magazine

    Cloudmark Identifies Iomart Worst for Spamming in UK

    July 24, 2015 by Tom Reeve

    "Email security firm Cloudmark monitors spam received by its clients and, based on its own data, it found that certain iomart servers are responsible for 14 percent of the spam that originated from UK IP addresses."

  • CIO Today

    Jeep Software Flaw Gives Hackers Total Control

    July 21, 2015 by Jennifer LeClaire

    "We caught up with Andrew Conway, research analyst at intelligent network security firm Cloudmark, to get his reaction to the Jeep hack."

  • BBC Tech

    Spam Email Levels at 12-Year Low

    July 17, 2015 by Mark Ward

    "Andrew Conway, a research analyst at security company Cloudmark, said it was "challenging" to accurately measure global spam levels because many companies did not sample nations where junk mail levels were still very high."

See more Cloudmark news

Cloudmark Events


    Cloudmark is in booth 244.


    Tuesday, October 13, 2015 – Thursday, October 15, 2015 Las Vegas, NV United States

See more Cloudmark events

Cloudmark Customers

The world’s top communications service providers turn to Cloudmark to protect their networks.

  • AT&T
  • Bell
  • Comcast
  • Cox Communications
  • GoDaddy
  • Optus
  • Rackspace
  • T-Mobile
  • Sprint
  • Verizon
Intelligent blocking provides significant savings on downstream messaging infrastructure and improved customer experience.
—Veenod Kurup
VP Data Product Service
Cox Communications
Site Map  •  Privacy Policy  •  ©2002–2015 Cloudmark, Inc.