Intelligent network security that protects your organization's most valuable resources

Faster Detection

  • Stops breaches in real time
  • Proprietary threat intelligence
  • Correlates data across DNS and messaging

Superior Performance

  • Protects against a broad range of threats
  • Automated, proprietary attack analysis
  • Industry's highest accuracy-99% catch rate

Easier Deployment

  • Infrastructure agnostic
  • Software or Virtual Machine Image
  • Up and running in hours

What’s lurking in your DNS environment?

Get a free traffic analysis and gain valuable insight into the state of your DNS and find potential threats in your network.

As an enterprise or service provider, you could already be breached and losing data, supporting rogue traffic, or enabling unauthorized access to your network.

Sign up for analysis

Our Threat Report for Q2 2015 is full of interesting and timely information designed to keep you one step ahead of the cyber criminals. In this issue, we discuss the growing threat of ransomware that targets small businesses. We also take a look at how DNS can be used to detect malware infections. We learn how the FTC gets a big win as they take action against diet pill spammers with great success. It is discovered that new top level domains like .ninja and .science are now being heavily leveraged by abusers. As spam continues to pose a major concern, there are trends in Email-to-SMS spam that caught our attention.

Get more Threat Research

Webinars

  • Preventing malicious mobile traffic presents unique challenges that are often missed due to lack of visibility and control of the network. The true cost of just one of many scams goes beyond operational costs; it ultimately affects subscribers who have fallen victim to phishing attacks stealing sensitive data, like banking credentials, or infecting them with mobile malware. Sending malicious traffic through various methods, including email to SMS or via grey routes, has been driven not only by the low cost, but also due to the highly profitable nature of malware and phishing scams. This webinar will take an in-depth look at the latest trends and attacks affecting mobile network security, the types of malicious traffic that boosts profitability for attackers, and strategies for mitigating message abuse in the network.

  • Hackers can glean extremely valuable sensitive information or shut down your website simply by attacking DNS. Despite the ease with which an attack can succeed, organizations rarely put security efforts towards DNS. With the number of attacks growing, ignoring DNS security is the fastest way to become the next data breach victim. In this webcast, you will learn the security vulnerabilities of DNS and why you can't assume that it's protected.

See more Cloudmark webinars

Recent Blog Posts

  1. Oracle: Scolding the Customers Who Try to Help Them

    Aug 13, 2015 by Mike Acar

    Oracle CSO Mary Ann Davidson’s “No, You Really Can’t” blog post provoked a strong and very negative reaction in the security community. The post has been deleted, but it’s available in various archives and was posted to the Information Security News mailing list. In summary, Davidson is complaining that Oracle customers are violating their license agreements […]

    Continue reading...

  2. Defcon: Mainframe Hacking and Other Threats

    Aug 12, 2015 by Andrew Conway

    Sometimes I feel I am very old. I was born in the same year as Bill Gates and Steve Jobs, and have watched the microprocessor revolution from the beginning. What a long strange trip it’s been. My first experience of writing programs was painfully inscribing FORTRAN with a ball point pen on paper. This was […]

    Continue reading...

Read more from the Cloudmark blog

Cloudmark News

  • Infosecurity Magazine

    Spam Landscape Marked by Big Players, Clever Tactics

    July 24, 2015 by Tara Seals

    "Cloudmark research shows that the cheaper the domain registration, the more likely it is to be abused by spammers, with free TLDs being almost entirely used for spam."

  • SC Magazine

    Cloudmark Identifies Iomart Worst for Spamming in UK

    July 24, 2015 by Tom Reeve

    "Email security firm Cloudmark monitors spam received by its clients and, based on its own data, it found that certain iomart servers are responsible for 14 percent of the spam that originated from UK IP addresses."

  • CIO Today

    Jeep Software Flaw Gives Hackers Total Control

    July 21, 2015 by Jennifer LeClaire

    "We caught up with Andrew Conway, research analyst at intelligent network security firm Cloudmark, to get his reaction to the Jeep hack."

  • BBC Tech

    Spam Email Levels at 12-Year Low

    July 17, 2015 by Mark Ward

    "Andrew Conway, a research analyst at security company Cloudmark, said it was "challenging" to accurately measure global spam levels because many companies did not sample nations where junk mail levels were still very high."

  • TechTarget

    Women in Security: Charting an InfoSec Career Path

    July 17, 2015 by Rob Wright

    "I think the big thing to point out is that only 10% of the people that work in IT security are women [according to a recent (ICS)2, Inc., survey]," said Angela Knox, engineering director at Cloudmark Inc., a San Francisco-based network security vendor."

See more Cloudmark news

Cloudmark Customers

The world’s top communications service providers turn to Cloudmark to protect their networks.

  • AT&T
  • Bell
  • Comcast
  • Cox Communications
  • GoDaddy
  • Optus
  • Rackspace
  • T-Mobile
  • Sprint
  • Verizon
Intelligent blocking provides significant savings on downstream messaging infrastructure and improved customer experience.
—Veenod Kurup
VP Data Product Service
Cox Communications
Site Map  •  Privacy Policy  •  ©2002–2015 Cloudmark, Inc.