Other solutions focus on the contents of the email once it reaches the inbox, but are unable to validate whether the sender is actually who they appear to be. Cloudphish addresses these blind spots with end-to-end transparency for every email exchanged with your trusted network.
Multi-factor authentication is used to verify whether a message was sent from a user’s authorized device
Sending domain is interrogated against 40+ blacklist databases and scanned for high-risk domain profiles
Blockchain authenticates each email at its point of origin and on-arrival to verify the source can be trusted
Think of blockchain like passport control on an international flight. Prior to both departure and arrival, passports are used to verify each traveller’s identity matches their documentation.
Cloudphish’s Trusted Sender Authentication Network (TSAN) works the same way.
When an email is sent, the sender’s details (device, location, etc.) are instantly compared against their verified record using blockchain. If the records don’t match, the email will be flagged by the system.
Detecting phishing is a moving target, and strategies are constantly evolving and increasing in sophistication. Learn about how blockchain prevents phishing attacks other technologies miss. Download the whitepaper:
Cloudphish integrates seamlessly with Gmail and Outlook.com using extensions for all major browsers, so setup is fast and easy. A client-side plugin for Outlook is also available for desktop users.
2-factor authentication ensures that the devices you use to send email are secured and can be verified using TSAN. Cloudphish is compatible with all iOS and Android mobile devices.
Invite friends, coworkers, vendors, and clients with whom you wish to safely correspond at the click of a button. Trusted contacts can be whitelisted at the address- or domain-level for easy management.
Cloudphish provides visual feedback right in the email header to alert users to any potential threats posed by an incoming message - in context and in real-time. The icon-based alert system provides clear and actionable instructions on how to interact with each email based on its specific threat-level and makes interpretation as simple as possible.
This email was sent by a trusted contact and has been successfully authenticated. It should be considered safe to interact with.
This email was sent by a trusted contact but failed authentication. It may be a phishing attempt. Contact the sender before proceeding.
This email is from an unknown source that failed authentication. It may be malicious. Do not interact with this email unless you requested it.