Nieuws
  • Can you withstand a Multi – Vector attack?

    With Cymulate you can...Rather than rely on lengthy and manual penetration exercises that, by their nature, can only occur periodically, an organization can use automated means to frequently assess the efficacy of their myriad security controls against the newest threats..... lees meer

  • Morphisec Endpoint Threat Prevention

    Morphisec Endpoint Threat Prevention prevents advanced attacks when and where they happen – at your endpoints and in real time. Morphisec Endpoint Threat Prevention protects your endpoints from all exploit-based, memory injection attacks..... lees meer

  • Vectra receives award for IOT security

    “Research shows that the Cognito platform from Vectra is highly differentiated in its application of machine learning and AI to deliver the broadest range of use-cases and real-world efficiencies in cybersecurity,” as stated by Frost & Sullivan. “Vectra raises the bar in AI-driven threat detection and Vectra to maintain growth on the strength of its cutting-edge Cognito platform.”..... lees meer

CYREN WebSecurity transforms your security cost model from a capital to an operational expense, while increasing your protection.

Simplify your network infrastructure by allowing remote users to connect directly to the Internet through our global platform, removing the need to bring traffic back to your security appliances.

With CYREN WebSecurity, there is no software or hardware to install, operate, maintain or upgrade. Protect up to 5 devices per user, for just pennies per day, dramatically lowering your total cost of ownership versus traditional solutions.

Enjoy global scale and protection. CYREN WebSecurity runs on the same Cyber Intelligence Platform that protects more than 600 million users, through 500,000 global points of presence.

EmailSecurity as a Service uses a unique spam, phishing and malware filter based on CYREN Bulkcheck technology. It examines email for the key characteristics of spam, phishing and virus outbreaks, i.e. the distribution pattern.  

Check video

Each email is reduced to a tiny fingerprint that is compared to the fingerprints of other emails stored in the central databases. Identical as well as sufficiently similar email is used as basis of comparison. This method provides high-quality detection for determining whether the email is part of a bulk mailing. Additional inspection procedures allow for reliable differentiation between undesired (spam, phishing and outbreaks) and desired (e.g. newsletters) bulk emails. In parallel a signature based virus scanner is used.

The infrastructure used for EmailSecurity as a Service is located in certified computing centers in Germany, guaranteeing compliance with stringent German data security regulations.

Devices operating in the cloud, need cloud-based protection. Check video.

CYREN WebSecurity offers the industry's most robust cloud-based security that
protects devices and data, regardless of type or location. Offered through a proven security-as-a-service (SecaaS) deployment model, companies can address their traditional web security needs-plus accommodate an increasingly mobile workforce and operate a "bring-your-own-device" (BYOD) policy.

* URL Protection-Block connections to phishing and other malicious sites to prevent infections and credential/login compromises.* Antivirus-Reduce the risk of malware infections or the need for time-consuming cleanup.

* Advanced Persistent Threat Detection-Secure corporate assets, such
as PCs, laptops, tablets, and Android phones.