Welcome!

News Feed Item

CYREN Launches Cloud-Based Web Security Service

CYREN WebSecurity uses powerful cloud infrastructure to arm service providers and software vendors with immediate turnkey revenue opportunities

MCLEAN, Va., Jan. 30, 2014 /PRNewswire/ -- CYREN, previously operating as Commtouch® (NASDAQ: CTCH), today announced commercial availability of CYREN WebSecurity, the company's first service launching through its robust cloud infrastructure. Service providers and software vendors can now partner with CYREN to immediately begin offering their end users secure browsing from any device, anywhere.

(Logo: http://photos.prnewswire.com/prnh/20140120/SF48846LOGO)

The cloud-based Secure Web Gateway as a Service market represents an opportunity to serve businesses currently exposed to potentially crippling Internet security risks. Delivering the low cost and high utility of cloud-based applications, CYREN WebSecurity is ideally suited to address explosive growth in the Security as a Service (SecSaaS) markets that are fueled by BYOD trends, an increasingly mobile workforce, and the management and accessibility of information assets beyond the boundaries of traditionally secured network perimeters.

CYREN WebSecurity is built for this new way of working, enabling CYREN partners to quickly capture the fast-growing market opportunity by offering a total solution for roaming users, smartphones and tablets, including BYOD. It leverages the company's GlobalView™ Cloud infrastructure, its patented Recurrent Pattern Detection™ technology, and the most robust transaction base in the industry to deliver a unique cloud-based Secure Web Gateway service. Easy to set up and manage, it provides an intuitive customer experience that delivers on the SaaS promise of doing more for less.

"We are excited to see the emergence of state-of-the-art cloud based protection for mobile and roaming users," said Tom O'Brien, CEO of MXSweep, a leading European provider of cloud-based security services and CYREN design partner. "CYREN WebSecurity will help MXSweep deliver the easy to consume and best of breed cloud based security that our customers expect."

"Arming partners with the ability to rapidly deploy new security services throughout any ecosystem, CYREN WebSecurity opens up significant new revenue streams," said Brett Wilson, vice president of products at CYREN. "CYREN WebSecurity provides our partners with the speed, accuracy and real-time insight that their end customers demand without the unnecessary burdens of additional capital expense and expert human resources. We see CYREN's robust cloud infrastructure as a true catalyst for growth – and today's launch of CYREN Web Security is the latest step in harnessing its full capabilities."

For more information on CYREN WebSecurity, visit www.CYREN.com/web.

About CYREN

CYREN provides the world's largest service providers and software vendors with the Internet security solutions they need to protect billions of people and transactions. Designed specifically to be easily deployed or private labeled by partners, CYREN's Web, Email and Anti-Malware products provide relentless protection on any device. CYREN's proactive analytics and cloud-based malware detection capabilities equip its partners with security solutions that stand out as clear differentiators in the ever-evolving industry. Visit CYREN's GlobalView Security Center or go to www.CYREN.com.

Blog: blog.cyren.com
Facebook: www.facebook.com/CyrenWeb
LinkedIn: www.linkedin.com/company/cyren
Twitter: twitter.com/CyrenWeb

Commtouch Software Ltd will continue to trade as CTCH on the NASDAQ exchange and the Tel Aviv Stock Exchange (TASE) pending shareholder approval of the new name CYREN Ltd. The name and ticker symbol for both financial markets are scheduled to change in February 2014 and will be announced in a separate press release.

This press release contains forward-looking statements, including projections about our business, within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. For example, statements in the future tense, and statements including words such as "expect," "plan," "estimate," "anticipate," or "believe" are forward-looking statements. These statements are based on information available to us at the time of the press release; we assume no obligation to update any of them. The statements in this press release are not guarantees of future performance and actual results could differ materially from our current expectations as a result of numerous factors, including business conditions and growth or deterioration in the internet security market, technological developments, products offered by competitors, availability of qualified staff, and technological difficulties and resource constraints encountered in developing new products,  as well as those risks described in the company's Annual Reports on Form 20-F and reports on Form 6-K, which are available through www.sec.gov

Company Contact:  

Israel Investor Relations Contact:

Brian Briggs, Chief Financial Officer  

Iris Lubitch

CYREN  

EffectiveIR

703.760.3444  

+972.54.252.8007

[email protected]   

[email protected]



U.S. Investor Contact:  

CYREN Media Contact:

Monica Gould  

Matthew Zintel

The Blueshirt Group 

Zintel Public Relations

212.871.3927

281.444.1590

[email protected]  

[email protected]

 

SOURCE CYREN

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Agile has finally jumped the technology shark, expanding outside the software world. Enterprises are now increasingly adopting Agile practices across their organizations in order to successfully navigate the disruptive waters that threaten to drown them. In our quest for establishing change as a core competency in our organizations, this business-centric notion of Agile is an essential component of Agile Digital Transformation. In the years since the publication of the Agile Manifesto, the conn...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
"We work around really protecting the confidentiality of information, and by doing so we've developed implementations of encryption through a patented process that is known as superencipherment," explained Richard Blech, CEO of Secure Channels Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
"We were founded in 2003 and the way we were founded was about good backup and good disaster recovery for our clients, and for the last 20 years we've been pretty consistent with that," noted Marc Malafronte, Territory Manager at StorageCraft, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Announcing Poland #DigitalTransformation Pavilion
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...