Information contained on this page is provided by an independent third-party content provider. WorldNow and this Station make no warranties or representations in connection therewith. If you have any questions or comments about this page please contact email@example.com.
MCLEAN, Va., Jan. 23, 2014 /PRNewswire/ -- CYREN, previously operating as Commtouch® (NASDAQ: CTCH), today announced access to the CYREN Security Center, which gives the industry online insight to the latest global trends in Internet security at www.CYREN.com/security-center.
As a leading global information security company relied upon by the world's largest service providers and software vendors for Web, email, and mobile protection, CYREN presents its Security Center as part of its effort to further expand the visibility into its powerful GlobalView™ Security Cloud, the most robust malware transaction base in the industry.
Based on this extensive GlobalView cloud infrastructure, the online Security Center shows the full scope of global Web, email and mobile threats, featuring a homepage map that illustrates the reach of malware, phishing and spam – such as new malware sites in Chile, new Android malware detected in Cambodia, and new spam domains in Taiwan.
The Security Center itself includes reviews of the previous week's malware and spam levels, common Web categories of sites that have been hacked, distribution of global zombies, and a spam topics cloud showing the main active spam campaigns on a daily basis.
Highlights that could be seen within the first week after CYREN's launch:
- Crossing the threshold of 700,000 malware URLs that CYREN is currently tracking in its database
- An average of nearly 180,000 new malware samples every day
- Spam levels are slowly creeping up again after spammers took a New Year's break – from 34 billion spam emails per day on New Year's Day to nearly 58 billion by the end of the week
"With our GlobalView™ Security Cloud you are always ahead of the threat," said Lior Kohavi, chief technology officer at CYREN. "Our Security Center reflects the power and reach of our patented technology. We are pleased to provide a service that literally tracks CYREN's analysis of billions of daily transactions. It is the first time we have done so in such a unified and public manner, which reflects our ongoing commitment to addressing current threats and the latest trends in Internet security worldwide."
Visit the CYREN Security Center at www.CYREN.com/security-center.
CYREN provides the world's largest service providers and software vendors with the Internet security solutions they need to protect billions of people and transactions. Designed specifically to be easily deployed or private labeled by partners, CYREN's Web, Email and Anti-Malware products provide relentless protection on any device. CYREN's proactive analytics and cloud-based malware detection capabilities equip its partners with security solutions that stand out as clear differentiators in the ever-evolving industry. Visit CYREN's GlobalView Security Center or go to www.CYREN.com.
Commtouch Software Ltd will continue to trade as CTCH on the NASDAQ exchange and the Tel Aviv Stock Exchange (TASE) pending shareholder approval of the new name CYREN Ltd. The name and ticker symbol for both financial markets are scheduled to change in February 2014 and will be announced in a separate press release.
This press release contains forward-looking statements, including projections about our business, within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. For example, statements in the future tense, and statements including words such as "expect," "plan," "estimate," "anticipate," or "believe" are forward-looking statements. These statements are based on information available to us at the time of the press release; we assume no obligation to update any of them. The statements in this press release are not guarantees of future performance and actual results could differ materially from our current expectations as a result of numerous factors, including business conditions and growth or deterioration in the internet security market, technological developments, products offered by competitors, availability of qualified staff, and technological difficulties and resource constraints encountered in developing new products, as well as those risks described in the company's Annual Reports on Form 20-F and reports on Form 6-K, which are available through www.sec.gov.
©2012 PR Newswire. All Rights Reserved.