Intelligent network security that protects your organization's most valuable resources

Faster Detection

  • Stops breaches in real time
  • Proprietary threat intelligence
  • Correlates data across DNS and messaging

Superior Performance

  • Protects against a broad range of threats
  • Automated, proprietary attack analysis
  • Industry's highest accuracy-99% catch rate

Easier Deployment

  • Infrastructure agnostic
  • Software or Virtual Machine Image
  • Up and running in hours

What’s lurking in your DNS environment?

Get a free traffic analysis and gain valuable insight into the state of your DNS and find potential threats in your network.

As an enterprise or service provider, you could already be breached and losing data, supporting rogue traffic, or enabling unauthorized access to your network.

Sign up for analysis

Our Threat Report for Q1 2015 highlights the rise and fall of a major US spammer, proving that not all North America-bound spam comes from the usual suspects. Online gambling in the UK is in the spotlight when a virtual casino goes too far with their SMS advertising program. We examine the pros and cons of the DNSSEC and explain why its adoption is lagging. Surprising results are seen as Canada implements a strong anti-spam law where we observe not only a drop in spam but in overall email as well. We explain why targets of ransomware need more than credit cards to get their data back – they need bitcoins in a hurry. Longstanding vulnerabilities in home routers are uncovered and our report clarifies the risks.

Get more Threat Research

Webinars

  • Domain Name System (DNS) infrastructure is critical to both the Internet and most private networks, however, many recent events have shown that it is vulnerable to attack, affecting millions of users when it goes down. There are tools and processes enterprises and service providers can use to protect DNS infrastructure but real protection is difficult to achieve due to the scope of the problem. This webinar provides a detailed look at the threats to DNS infrastructure and how those threats can be mitigated.

  • This webinar discusses how Application-to-person (A2P) SMS has increasingly become a key method for organizations to communicate with their customers. This has been driven by the ubiquity of mobile phones and the universality of SMS. Unfortunately, this has also lead to a massive growth in messages being sent through illegitimate routes that bypass the operators’ billing systems. This is commonly referred to as grey routes carrying grey traffic, and is a tactic commonly used by third-party aggregators to boost their own profitability. The result is lost revenue for mobile operators who often do not have visibility and control of messages on their network.

See more Cloudmark webinars

Recent Blog Posts

  1. UK Banks and Solicitors Need to do More to Prevent Fraud

    Jul 6, 2015 by Andrew Conway

    The Telegraph is reporting a series of cases where criminals have compromised the email communications between home buyers and their solicitors[1], and attempted to direct the money intended for the house purchase into the criminals’ bank account. I really should not need to say this, but email is not a secure medium for financial transactions. […]

    Continue reading...

  2. Bitcoin Stability Threatened by Developer Rift

    Jun 25, 2015 by Andrew Conway

    “In the worst case scenario, if the miners and the rest of the bitcoin community end up in some kind of like full fledged war, that would basically wreck bitcoin.” Mike Hearn “… the ledger will diverge as soon as a single double-spend happens, and never share a block again, companies will go instantly insolvent, […]

    Continue reading...

Read more from the Cloudmark blog

Cloudmark News

  • Diginomica

    Predictive security, meet Big Data analytics

    April 13, 2015 by Martin Banks

    "Cloudmark’s analytics tools are currently targeted at the service provider market, though CTO Neil Cook agrees that the time was now right for some development and growth in types of business that might exploit the technology."

  • Infosecurity Magazine

    Spam Plummets 37% in Canada

    May 1, 2015 by Tara Seals

    "We believe this is because there was a lot of marketing email which was not technically spam but did not meet the strong requirements for affirmative consent required by CASL,” Cloudmark research analyst Andrew Conway wrote in a blog."

  • sc-magazine

    Romania, Panama Cutting Back on Spam

    April 29, 2015 by Jeremy Kirk

    "Cloudmark, which specializes in providing antispam products to ISPs, said it is blocking 13 percent fewer IP addresses worldwide for sending spam, with notable improvements in a few small countries, according to its first quarterly report for this year."

See more Cloudmark news

Cloudmark Events

  • HostingCon 2015

    Andrew Conway, Head Researcher at Cloudmark is speaking:

    Hacked! The Increasing Threat of Compromised Web Servers
    Compromising of web servers is rapidly approaching large-scale mass production. Cyber criminals use factories of compromised web servers for malware distribution, spamming, DDoS attacks and other illicit activities. A malicious web site damages the reputation of the IP address associated with it, resulting in those IP addresses being blocked and negatively impacting customer experience. This session will outline threats facing hosting providers and provide strategies for mitigation.

    Date: Wednesday, July 29, 2015
    Time: 10:00 a.m. - 10:50 a.m.
    Location: Room 8  

    Monday, July 27, 2015 – Wednesday, July 29, 2015 San Diego, CA United States

See more Cloudmark events

Cloudmark Customers

The world’s top communications service providers turn to Cloudmark to protect their networks.

  • AT&T
  • Bell
  • Comcast
  • Cox Communications
  • GoDaddy
  • Optus
  • Rackspace
  • T-Mobile
  • Sprint
  • Verizon
Intelligent blocking provides significant savings on downstream messaging infrastructure and improved customer experience.
—Veenod Kurup
VP Data Product Service
Cox Communications
Site Map  •  Privacy Policy  •  ©2002–2015 Cloudmark, Inc.