Cofense Logo - Email Security Solutions


Cofense Intelligence™で、タイムリー、正確、実行可能なインサイトを配信



End-to-End Email Security Built to Stop Threats.

Defend your organization with our complete suite of email security solutions.

Cofense Highlight Intelligence Dashboard - Email Security Image
A screenshot of Cofense Reporter interface highlighting key features.
Detect - Training for Your Team
Respond -Email Threat Analysis and Response


Cofense Intelligence ThreatHQは直感的かつ対話型の詳細なインテリジェンスを提供し、フィッシング対策や戦略的計画を改善します。これによりお客様は、フィッシングにおける新たな傾向の追跡、能動的脅威の調査、優先順位の高い調査の補足を簡単に行えるようになります。改良されたインテリジェンスインターフェイスにより、セキュリティ侵害インジケーター以上の行動をし、今日のフィッシング攻撃に対して情報に基づいた戦略的な対策を追求することができます。

Shield check icon for email protection

Protect Against Dynamic Phishing Threats

Target Icon - Cofense Email Security Image

Efficiently Identify and Manage Threats

Computer Icon - Cofense Email Security Image

Increase the Effectiveness of Your Security Investments

Read Cofense reviews on TrustRadius

What Our Customers Say

"We process Cofense reports first because we know if they’re reporting it, it’s bad. Cofense Intelligence is the most accurate phishing threat info we receive and it’s easy to consume.”
- Financial Services Customer

Additional Resources

Frequently Asked Questions

Cofense Intelligence is a human-vetted phishing-threat intelligence service that provides accurate and timely alerts and in-depth analysis to strengthen your enterprise’s ability to quickly identify and respond to phishing attacks in progress.

Cofense Intelligence customers benefit from:

  • Timely, accurate and actionable phishing threat intelligence to easily track emerging trends in phishing, research active threats and supplement your active investigations.
  • Attack analysis and context to help make rapid, informed decisions.
  • Ability to move beyond IOCs and pursue an informed organizational strategic direction.
  • Compatibility and simplified integration with existing security solutions to speed phishing threat response.

Cofense receives more than a million messages daily. Attacks are automatically dissected to determine relationships between them. Our clustering algorithms sort malicious emails based on key factors, and monitor new and emerging threats in the form of emails containing dangerous links and/or attachments. Once a new threat cluster is identified, its characteristics are documented and updated in our threat repository. The resulting threat intelligence helps SOC teams prioritize, investigate and effectively respond.


We use our own and third-party cookies to enhance your experience by showing you relevant content, personalizing our communications with you, and remembering your preferences when you visit our website. We also use them to improve the overall performance of our site. You can learn more about the cookies and similar technology we use by viewing our privacy policy. By clicking ‘Accept,’ you acknowledge and consent to our use of all cookies on our website.

This site is registered on as a development site.