Intelligent network security that protects your organization's most valuable resources

Faster Detection

  • Stops breaches in real time
  • Proprietary threat intelligence
  • Correlates data across DNS and messaging

Superior Performance

  • Protects against a broad range of threats
  • Automated, proprietary attack analysis
  • Industry's highest accuracy-99% catch rate

Easier Deployment

  • Infrastructure agnostic
  • Software or Virtual Machine Image
  • Up and running in hours

What’s lurking in your DNS environment?

Get a free traffic analysis and gain valuable insight into the state of your DNS and find potential threats in your network.

As an enterprise or service provider, you could already be breached and losing data, supporting rogue traffic, or enabling unauthorized access to your network.

Sign up for analysis

Our Threat Report for Q2 2015 is full of interesting and timely information designed to keep you one step ahead of the cyber criminals. In this issue, we discuss the growing threat of ransomware that targets small businesses. We also take a look at how DNS can be used to detect malware infections. We learn how the FTC gets a big win as they take action against diet pill spammers with great success. It is discovered that new top level domains like .ninja and .science are now being heavily leveraged by abusers. As spam continues to pose a major concern, there are trends in Email-to-SMS spam that caught our attention.

Get more Threat Research


  • Preventing malicious mobile traffic presents unique challenges that are often missed due to lack of visibility and control of the network. The true cost of just one of many scams goes beyond operational costs; it ultimately affects subscribers who have fallen victim to phishing attacks stealing sensitive data, like banking credentials, or infecting them with mobile malware. Sending malicious traffic through various methods, including email to SMS or via grey routes, has been driven not only by the low cost, but also due to the highly profitable nature of malware and phishing scams. This webinar will take an in-depth look at the latest trends and attacks affecting mobile network security, the types of malicious traffic that boosts profitability for attackers, and strategies for mitigating message abuse in the network.

  • Hackers can glean extremely valuable sensitive information or shut down your website simply by attacking DNS. Despite the ease with which an attack can succeed, organizations rarely put security efforts towards DNS. With the number of attacks growing, ignoring DNS security is the fastest way to become the next data breach victim. In this webcast, you will learn the security vulnerabilities of DNS and why you can't assume that it's protected.

See more Cloudmark webinars

Recent Blog Posts

  1. Cloudmark’s 2015 Q2 Global Threat Report

    Jul 22, 2015 by Andrew Conway

    Cloudmark’s Threat Report for 2015 Q2 covers the latest in the cyber threat landscape. There are articles on Ransomware targeting small businesses Using DNS to detect malware infections A highly successful FTC action against diet pill spammers The abuse of new top level domains like .ninja and .science The problems caused by URL shorteners like […]

    Continue reading...

  2. Impero Education Plus software exposes thousands of school children to hacking

    Jul 19, 2015 by Andrew Conway

    Many schools feel legally or morally obliged to protect pupils from the full range of information, debate, and let’s face it, pornography, available on the Internet. A substantial number of schools in the US, the UK and elsewhere use product called Education Plus from Impero Solutions Ltd for this purpose. However, a component of this […]

    Continue reading...

Read more from the Cloudmark blog

Cloudmark News

  • Diginomica

    Predictive security, meet Big Data analytics

    April 13, 2015 by Martin Banks

    "Cloudmark’s analytics tools are currently targeted at the service provider market, though CTO Neil Cook agrees that the time was now right for some development and growth in types of business that might exploit the technology."

  • Infosecurity Magazine

    Spam Plummets 37% in Canada

    May 1, 2015 by Tara Seals

    "We believe this is because there was a lot of marketing email which was not technically spam but did not meet the strong requirements for affirmative consent required by CASL,” Cloudmark research analyst Andrew Conway wrote in a blog."

  • sc-magazine

    Romania, Panama Cutting Back on Spam

    April 29, 2015 by Jeremy Kirk

    "Cloudmark, which specializes in providing antispam products to ISPs, said it is blocking 13 percent fewer IP addresses worldwide for sending spam, with notable improvements in a few small countries, according to its first quarterly report for this year."

See more Cloudmark news

Cloudmark Customers

The world’s top communications service providers turn to Cloudmark to protect their networks.

  • AT&T
  • Bell
  • Comcast
  • Cox Communications
  • GoDaddy
  • Optus
  • Rackspace
  • T-Mobile
  • Sprint
  • Verizon
Intelligent blocking provides significant savings on downstream messaging infrastructure and improved customer experience.
—Veenod Kurup
VP Data Product Service
Cox Communications
Site Map  •  Privacy Policy  •  ©2002–2015 Cloudmark, Inc.