Intelligent network security that protects your organization's most valuable resources

Faster Detection

  • Stops breaches in real time
  • Proprietary threat intelligence
  • Correlates data across DNS and messaging

Superior Performance

  • Protects against a broad range of threats
  • Automated, proprietary attack analysis
  • Industry's highest accuracy-99% catch rate

Easier Deployment

  • Infrastructure agnostic
  • Software or Virtual Machine Image
  • Up and running in hours

Try a Better Approach to DNS Protection

Obtain visibility into your DNS traffic to detect malicious activity and protect your network.

Your business could already be breached and experiencing data theft, supporting rogue traffic, or enabling unauthorized access to your network.

Sign up for your trial!

Our Threat Report for Q3 2015 is full of interesting and timely information designed to keep you one step ahead of the cyber criminals. In this issue, we take a look at phishing kits and how easy they are to use, even by individuals with little computer savvy. We also take a look at Facebook's new ThreatExchange and discuss its advantages over other information exchanges. Finally, we take a look at the current spam situation in Australia.

Get more Threat Research


  • Preventing malicious mobile traffic presents unique challenges that are often missed due to lack of visibility and control of the network. The true cost of just one of many scams goes beyond operational costs; it ultimately affects subscribers who have fallen victim to phishing attacks stealing sensitive data, like banking credentials, or infecting them with mobile malware. Sending malicious traffic through various methods, including email to SMS or via grey routes, has been driven not only by the low cost, but also due to the highly profitable nature of malware and phishing scams. This webinar will take an in-depth look at the latest trends and attacks affecting mobile network security, the types of malicious traffic that boosts profitability for attackers, and strategies for mitigating message abuse in the network.

  • Hackers can glean extremely valuable sensitive information or shut down your website simply by attacking DNS. Despite the ease with which an attack can succeed, organizations rarely put security efforts towards DNS. With the number of attacks growing, ignoring DNS security is the fastest way to become the next data breach victim. In this webcast, you will learn the security vulnerabilities of DNS and why you can't assume that it's protected.

See more Cloudmark webinars

Recent Blog Posts

  1. Holiday shoppers should not be fooled by gift card spam

    Nov 19, 2015 by Andrew Conway

    With the holiday shopping season just around the corner, the idea of a free gift card from a major retailer may be very appealing. However, don’t be fooled by spam emails such as these. Like the pot of gold at the end of the rainbow, no matter how hard you try, you can never actually […]

    Continue reading...

  2. If you leave it, they will come

    Nov 13, 2015 by James Hoddinott

    We’ve posted a number of times here about URL shorteners (2010-03-31, 2014-08-06, 2014-02-13) and how they are abused by spammers. Today, we came across a URL shortener site using the seemingly popular YOURLs package hosted on a short domain belonging to a large global entity that we can only guess was setup sometime ago by […]

    Continue reading...

Read more from the Cloudmark blog

Cloudmark News

  • Computer Business Review

    5 Women Leading the Way in Cyber Security

    September 25, 2015 by Charlotte Henry

    "Knox is the engineering director at Cloudmark, with extensive experience in the security field. She is in charge of research and development at the firm. She also contributes to its Threat Report research and blog, and has spoken on the issue of women in security."

  • National Public Radio

    Did Clinton Camp Delete Emails Or Wipe Server? The Difference Matters

    September 14, 2015 by Aarti Shahani

    "Computer expert Angela Knox, with Cloudmark, says a computer is like a library with a bunch of files — or books — in it. "You know which shelf the book you're looking for is on by looking at the index of the library," she explains."

  • Infosecurity Magazine

    Spam Landscape Marked by Big Players, Clever Tactics

    July 24, 2015 by Tara Seals

    "Cloudmark research shows that the cheaper the domain registration, the more likely it is to be abused by spammers, with free TLDs being almost entirely used for spam."

  • SC Magazine

    Cloudmark Identifies Iomart Worst for Spamming in UK

    July 24, 2015 by Tom Reeve

    "Email security firm Cloudmark monitors spam received by its clients and, based on its own data, it found that certain iomart servers are responsible for 14 percent of the spam that originated from UK IP addresses."

  • CIO Today

    Jeep Software Flaw Gives Hackers Total Control

    July 21, 2015 by Jennifer LeClaire

    "We caught up with Andrew Conway, research analyst at intelligent network security firm Cloudmark, to get his reaction to the Jeep hack."

  • BBC Tech

    Spam Email Levels at 12-Year Low

    July 17, 2015 by Mark Ward

    "Andrew Conway, a research analyst at security company Cloudmark, said it was "challenging" to accurately measure global spam levels because many companies did not sample nations where junk mail levels were still very high."

See more Cloudmark news

Cloudmark Customers

The world’s top communications service providers turn to Cloudmark to protect their networks.

  • AT&T
  • Bell
  • Comcast
  • Cox Communications
  • GoDaddy
  • Optus
  • Rackspace
  • T-Mobile
  • Sprint
  • Verizon
Intelligent blocking provides significant savings on downstream messaging infrastructure and improved customer experience.
—Veenod Kurup
VP Data Product Service
Cox Communications
Site Map  •  Privacy Policy  •  ©2002–2015 Cloudmark, Inc.