Welcome!

News Feed Item

U-Mail Partners with CYREN

Leading Chinese email provider adds anti-spam and antivirus protection for its end users

MCLEAN, Va., Jan. 20, 2014 /PRNewswire/ -- CYREN, previously operating as Commtouch® (NASDAQ: CTCH), today announced that U-Mail, one of the largest domestic email service providers in China, partnered with CYREN to offer its users strong protection against spam and viruses.

(Logo: http://photos.prnewswire.com/prnh/20140120/SF48846LOGO)

U-Mail is one of the latest providers to join the large group of partners and customers that use CYREN services to protect their own business and that of their customers.

"Protecting our customers from spam and viruses, as well as enabling our customers to enjoy a secure and efficient email service, is our key value for winning the faith of customers," said Jia Dong, the CTO at U-Mail. "Based on CYREN's patented, award-winning RPD ™ Technology and more, which are embedded into the anti-spam module in U-Mail, the cooperation with CYREN significantly increased the performance of our email service. This service has already won the trust of many large and medium size enterprises by providing powerful email security for users. We are very happy to work with CYREN, the leading security service provider."

"Throughout our communications with U-Mail, it was clear that U-Mail continually pursues reliable email security for its customers," said Brett Wilson, vice president of products at CYREN. "This entire integration of CYREN´s global cloud-based service within U-Mail's email system enables them to block all kinds of email threats in any language or format – including spam, viruses, phishing, spyware, malware and hacker attacks. With nearly zero false positives, CYREN helps to provide an advanced, simple-to-use email security product for an ever-growing number of Chinese enterprises."

As the global leader in real-time malware detection and proactive data analytics, CYREN provides its worldwide partners with relentless protection. CYREN leverages its GlobalView™ Cloud and its patented Recurrent Pattern Detection™ technology to deliver powerful cloud-based information security solutions that feature the most robust transaction base in the industry. 

About U-Mail
Headquartered in Shenzhen, U-Mail is one of the biggest IT application/software developers and Information System Integration companies in Canton, China. Over the last 15 years, U-Mail has been dedicated to providing the most professional email service as well as the entire mail server solution for Chinese enterprises. It has achieved great success by setting up plenty of stable and secure email systems for government and big enterprises in different fields of finance, education, oil, transportation, manufacturing and other commercial areas. U-Mail is the first email service provider in China that offers free life-time updates. Its products have won "Superior Email system" and "Technology Advancement" awards from the China National Network Development Association, China National Science and Technology Department, as well as the government. For more information, visit www.comingchina.com.

About CYREN
CYREN provides the world's largest service providers and software vendors with the Internet security solutions they need to protect billions of people and transactions. Designed specifically to be easily deployed or private labeled by partners, CYREN's Web, Email and Anti-Malware products provide relentless protection on any device. CYREN's proactive analytics and cloud-based malware detection capabilities equip its partners with security solutions that stand out as clear differentiators in the ever-evolving industry. Visit CYREN's GlobalView Security Center or go to www.CYREN.com.

Commtouch Software Ltd will continue to trade as CTCH on the NASDAQ exchange and the Tel Aviv Stock Exchange (TASE) pending shareholder approval of the new name CYREN Ltd. The name and ticker symbol for both financial markets are scheduled to change in February 2014 and will be announced in a separate press release.

Company Contact:         

Israel Investor Relations Contact:

Brian Briggs, Chief Financial Officer   

Iris Lubitch

CYREN

EffectiveIR

703.760.3444

+972.54.252.8007

[email protected]

[email protected] 



U.S. Investor Contact:

CYREN Media Contact:

Monica Gould

Matthew Zintel

The Blueshirt Group

Zintel Public Relations

212.871.3927

281.444.1590 

[email protected]

[email protected]

SOURCE CYREN

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Unsecured IoT devices were used to launch crippling DDOS attacks in October 2016, targeting services such as Twitter, Spotify, and GitHub. Subsequent testimony to Congress about potential attacks on office buildings, schools, and hospitals raised the possibility for the IoT to harm and even kill people. What should be done? Does the government need to intervene? This panel at @ThingExpo New York brings together leading IoT and security experts to discuss this very serious topic.