Protect your inbox from email impersonation attacks

Send and receive blockchain authenticated emails with trusted contacts from your current mail platform and email with confidence.

Start Free TrialView Pricing

You can’t prevent what you can’t detect

Take the guesswork out of phishing prevention for your inbox by eliminating the blind spots in your email security. Our Trusted Sender Authentication Network (TSAN) uses blockchain technology to instantly identify phishing attacks that are otherwise undetectable.

Private Network

Create your own private list of friends, coworkers, vendors or clients as trusted contacts or whitelisted domains with whom you wish to safely correspond.

Mobile Security

Authorized Devices

Even when your email account is compromised, you don't have to be. Only devices you have authorized will be capable of sending verified messages making it easy to identify a breach.

Built on Blockchain

Cloudphish uses smart contracts on a private Ethereum PoA ledger to cryptographically identify emails and confirm sender and message authenticity.

Real-time alerts for easy email protection

Our Trusted Sender Authentication Network (TSAN) uses blockchain technology to instantly identify phishing attacks in your inbox that are otherwise undetectable to traditional email security solutions.

Real-time inbox feedback tells you if an email is safe or not by verifying the sender's identity. Take the guesswork out of phishing and protect your inbox.

Start Free TrialView Pricing

Email security that works for you

Cloudphish’s plugin-based software works with all major browsers, email clients, and existing anti-phishing solutions to make securing your email identity as easy to implement as it is to use.

Email Clients

Web Browsers

Mobile Devices

Do you know who each email is coming from?

IMPOSTER SYNDROME:

Top 4 Impersonation Phishing Scams of 2020

Learn how sophisticated social engineered attacks that impersonate trusted members of your network make it more challenging than ever for you to identify and avoid a breach.

Individual Pricing

Security should be a right not a privilege, that's why Cloudphish offers a free version intended for individuals that won't expire and doesn't compromise your safety.

Cloudphish gives you the power to instantly verify the source of every email sent between members of your Trusted Network.

  • FREE USER

    $0.00 / Month

  • Unlimited Message Verification
  • Unlimited Network Size
  • Unlimited Devices
  • Cousin Email Detection
  • Domain Maturity Verification
  • Mobile Support
  • Professional Support
  • INDIVIDUAL USER

    $3.99 / Month

  • Unlimited Message Verification
  • Unlimited Network Size
  • Unlimited Devices
  • Cousin Email Detection
  • Domain Maturity Verification
  • Mobile Support
  • Professional Support

Frequently Asked Questions

Phishing email scams have become one of the most prevalent and successful forms of cyber-attack. 45% of all phishing attempts are impersonation emails purporting to be from trusted contacts.

Cloudphish takes the guesswork out of protecting your inbox with our Trusted Sender Authentication Network (TSAN) that uses blockchain technology to identify phishing attacks in real-time.

It’s also FREE to kick-off so sign up here and put Cloudphish to the test.

Cloudphish’s proprietary Trusted Sender Authentication Network (TSAN) offers a first of its kind email verification tool that protects you against certain attacks that others cant.

When you sign up for Cloudphish, you build your own trusted network of verified email addresses to will protect your inbox from sophisticated phishing attacks.

For more details on TSAN, see the How It Works page.

Yes it does – Cloudphish’s plugin-based software works with all major browsers, email clients, and legacy anti-phishing solutions.

We’re supported on Gmail, Outlook, Chrome, Safari, Microsoft Edge, and Firefox. See our Devices page for details and direct extension links to get you started.

Yes absolutely! We view email security as a right, not a privilege, so we offer a free version of Cloudphish for individuals.

There is also an upgraded individual tier that includes extra features and support. See above on this page for pricing specifics and next steps.

By signing up for a Cloudphish individual account, you can get started immediately and access our ‘Get Started’ introductory materials.

You’ll need to build your trusted network and validate your authorized devices.
From there, Cloudphish is automatic and easy to use, giving you clear, visual feedback on every email.

Ready to get started with Cloudphish?

Start Free TrialView Pricing