About Cofense

Enterprise Email Security Starts and Ends with Cofense

Cofense is the Leader in Email Security

Cofense secures enterprise email systems with a combination of industry-leading security awareness training and threat detection and response solutions. 

We’re the only email security provider with access to data from over 35 million Cofense-trained employees who actively report suspected phishing threats in real-time. When our users around the globe report suspected phish, those threat insights are fed back into our Phishing Detection and Response solution, unlocking unparalleled threat intelligence. 

Cofense is the only email security company that can see and stop threats missed by all other standard email controls.

Our Values

At Cofense we live by our values. Our values not only guide how we work together, but also how we work with our customers.

Collaboration

We can only achieve greatness by working together.

Innovation

We strive to be bigger, better, faster for our customers and our internal people and processes.

Accountability

We own what we do. We accept responsibility for our actions, our own mistakes and honor our commitments.

Transparency

We share pertinent information to promote collaboration and learning and eliminate working in silos.

Office Locations

Cofense Headquarters

1602 Village Market Blvd, SE #400
Leesburg, VA 20175
Tel: 703.652.0717

London

Cofense Ltd.
Fora Offices, Room 1.05
13 Dirty Lane
Borough Yards
Southwark
London, SE1 9PA

Dubai

Cofense Inc. (DMCC Branch)
Unit No: 1105
Saba 1 Tower
Plot No: 931
Jumeirah Lake Tower
Dubai, UAE

Philippines

Cofense Philippines Inc.
35/F & 36/F Penthouse units 1,2 and 4 Eco Tower Building
32nd Street Cor. 9th Avenue
Bonifacio Global City, Taguig 1634

Ireland

Cofense Ireland Limited
Cube Building
Monahan Road
Cork
T12H1XY

See Cofense in action.

Request a Demo

You'll learn how to:

  • Transform your employees into cyber-resilient assets and active phishing reporters.
  • Automate classification and remediation of AI-powered attacks that bypass your traditional or AI-based SEG.
  • Leverage globally-sourced threat intelligence to identify and mitigate post-compromise risk.