Intelligent network security that protects your organization's most valuable resources

Faster Detection

  • Stops breaches in real time
  • Proprietary threat intelligence
  • Correlates data across DNS and messaging

Superior Performance

  • Protects against a broad range of threats
  • Automated, proprietary attack analysis
  • Industry's highest accuracy-99% catch rate

Easier Deployment

  • Infrastructure agnostic
  • Software or Virtual Machine Image
  • Up and running in hours

What’s lurking in your DNS environment?

Get a free traffic analysis and gain valuable insight into the state of your DNS and find potential threats in your network.

As an enterprise or service provider, you could already be breached and losing data, supporting rogue traffic, or enabling unauthorized access to your network.

Sign up for analysis

Our Threat Report for Q1 2015 highlights the rise and fall of a major US spammer, proving that not all North America-bound spam comes from the usual suspects. Online gambling in the UK is in the spotlight when a virtual casino goes too far with their SMS advertising program. We examine the pros and cons of the DNSSEC and explain why its adoption is lagging. Surprising results are seen as Canada implements a strong anti-spam law where we observe not only a drop in spam but in overall email as well. We explain why targets of ransomware need more than credit cards to get their data back – they need bitcoins in a hurry. Longstanding vulnerabilities in home routers are uncovered and our report clarifies the risks.

Get more Threat Research


  • Domain Name System (DNS) infrastructure is critical to both the Internet and most private networks, however, many recent events have shown that it is vulnerable to attack, affecting millions of users when it goes down. There are tools and processes enterprises and service providers can use to protect DNS infrastructure but real protection is difficult to achieve due to the scope of the problem. This webinar provides a detailed look at the threats to DNS infrastructure and how those threats can be mitigated.

  • This webinar discusses how Application-to-person (A2P) SMS has increasingly become a key method for organizations to communicate with their customers. This has been driven by the ubiquity of mobile phones and the universality of SMS. Unfortunately, this has also lead to a massive growth in messages being sent through illegitimate routes that bypass the operators’ billing systems. This is commonly referred to as grey routes carrying grey traffic, and is a tactic commonly used by third-party aggregators to boost their own profitability. The result is lost revenue for mobile operators who often do not have visibility and control of messages on their network.

See more Cloudmark webinars

Recent Blog Posts

  1. The Carefirst Breach: A Sinister Plot to Sell More Fake Handbags?

    May 21, 2015 by Andrew Conway

    While the details of the Carefirst data breach are still non clear, it’s been suggested that the trail leads back to China, and that it may be Chinese government sponsored hackers gathering data on US citizens. The trail may well lead back to China, but perhaps the motives of the hackers may not be as […]

    Continue reading...

  2. Have you ever seen a plane fly sideways?

    May 18, 2015 by Andrew Conway

    I don’t believe I’ve ever seen a plane fly sideways. It seems aerodynamically improbably. Hence, I tend to treat any account that involves a plane flying sideways with a certain amount of skepticism. Press reports over the weekend said that according to the FBI, security researcher Chris Roberts had made an airliner climb and move […]

    Continue reading...

Read more from the Cloudmark blog

Cloudmark News

  • Diginomica

    Predictive security, meet Big Data analytics

    April 13, 2015 by Martin Banks

    "Cloudmark’s analytics tools are currently targeted at the service provider market, though CTO Neil Cook agrees that the time was now right for some development and growth in types of business that might exploit the technology."

  • Infosecurity Magazine

    Spam Plummets 37% in Canada

    May 1, 2015 by Tara Seals

    "We believe this is because there was a lot of marketing email which was not technically spam but did not meet the strong requirements for affirmative consent required by CASL,” Cloudmark research analyst Andrew Conway wrote in a blog."

  • sc-magazine

    Romania, Panama Cutting Back on Spam

    April 29, 2015 by Jeremy Kirk

    "Cloudmark, which specializes in providing antispam products to ISPs, said it is blocking 13 percent fewer IP addresses worldwide for sending spam, with notable improvements in a few small countries, according to its first quarterly report for this year."

See more Cloudmark news

Cloudmark Customers

The world’s top communications service providers turn to Cloudmark to protect their networks.

  • AT&T
  • Bell
  • Comcast
  • Cox Communications
  • GoDaddy
  • Optus
  • Rackspace
  • T-Mobile
  • Sprint
  • Verizon
Intelligent blocking provides significant savings on downstream messaging infrastructure and improved customer experience.
—Veenod Kurup
VP Data Product Service
Cox Communications
Site Map  •  Privacy Policy  •  ©2002–2015 Cloudmark, Inc.