10 - 12 October 2017 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Zoom product LOGO_Phishing Intelligence Feed

Phishing Intelligence Feed

LOGO_Phishing Intelligence Feed

Phishing Intelligence Feed

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.
Your message has been sent.

Would you like to use more facilities and advantages of the platform? Then please log in – or register here.

An error has occurred.


Protection from Zero-hour Phishing Threats

Prevent and Protect from Increased Phishing Attacks

Phishing attacks increased by 264% in 2013 and show no signs of slowing down. Today, phishing is a critical threat to Internet users, particularly as phishing sites become more sophisticated and difficult to identify. CYREN’s daily analysis of billions of Internet transactions provides an unmatched view of phishing threats as they emerge—we are adding thousands of new phishing URLs to the feed daily, the instant we find them.

The CYREN Phishing Intelligence Feed offers:

  • Real-time Protection—CYREN Phishing Intelligence Feed enables real-time protection from emerging web threats on all devices, including smart phones and tablets, as well as a great user experience with low latency, deep coverage, and high accuracy.
  • Immediate Phishing Threat Notification—Every time a new phishing threat emerges our customers receive the information instantly.
  • Powerful Data Sources and Analytics— CYREN’s database is the largest of its kind in the world; every day, CYREN analyzes more than 17 billion internet transactions, from more than 500,000 points of presence in over 200 countries, enabling immediate and accurate identification of emerging phishing threats.
  • Continuous Protection for Users—Users are always protected against compromising their corporate and personal online accounts or downloading malicious content.

Malware Attack Detection

LOGO_Malware Attack Detection

Cyber Intelligence Suite

LOGO_Cyber Intelligence Suite

CYREN Email Security

LOGO_CYREN Email Security

CYREN Web Security

LOGO_CYREN Web Security

There are no entries in your notes.

Show notes


The selected entry has been placed in your notes!

If you register you can save your notes permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your notes permanently. Use the instant access to exhibitors or products saved – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your notes mobile too! Simply log in and access them at anytime.