Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at Cloudphish, reclaim access to make changes.
Product Avatar Image
Cloudphish

By Cloudphish

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Cloudphish, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
0 out of 5 stars

How would you rate your experience with Cloudphish?

This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

Cloudphish Reviews & Product Details

Cloudphish Media

Cloudphish Demo - Easy Integration
Cloudphish is a plugin-based software that works with all major email clients, browsers, and devices to make protecting your organization from cybercriminals quick to install and use.
Cloudphish Demo - In-Email Notifications
In-Email notifications make it easy to identify impersonation emails.
Cloudphish Demo - Real-Time Alerts
Receive real-time alerts in your inbox.
Cloudphish Demo - Phishing Dectection Dashboard
Quickly set up and manage your organization's account from a centralized, easy to use dashboard that can be easily configured to meet your unique needs and preferences.
Cloudphish Demo - Just $1.99 a month a user
Cloudphish gives your organization the ability to protect each employee, customer, and vendor without a large IT investment.
Cloudphish Demo - Mobile Integration Capability
Easily integrate for protection across your mobile devices.
Product Avatar Image

Have you used Cloudphish before?

Answer a few questions to help the Cloudphish community

Cloudphish Reviews (0)

G2 reviews are authentic and verified.

There are not enough reviews of Cloudphish for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Proofpoint Core Email Protection Logo
Proofpoint Core Email Protection
4.6
(582)
Proofpoint Core Email Protection stops malware and non-malware threats such as impostor email.
2
Check Point Harmony Email & Collaboration Logo
Check Point Harmony Email & Collaboration
4.6
(514)
Check Point Harmony Email & Office, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.
3
Paubox Logo
Paubox
4.9
(467)
Paubox is an easy way to send and receive HIPAA compliant email.
4
Valimail Logo
Valimail
4.6
(424)
Valimail is the only solution that automates the path to DMARC enforcement from start to finish, providing rapid, ongoing protection against fraudulent use of your domains.
5
CyberSentriq Logo
CyberSentriq
4.6
(382)
Cybersentriq provides Integrated Cybersecurity & Data Protection for Businesses and Managed Service Providers. Our unified AI-powered platform offers all in one email phishing and spam protection, DNS filtering, security awareness training, email archiving, M365 backup and recovery - enabling users to ensure compliance, easily store and retrieve data, and protect against online threats such as phishing and ransomware
6
Microsoft Defender for Office 365 Logo
Microsoft Defender for Office 365
4.5
(288)
Microsoft Defender for Office 365 is a comprehensive security solution designed to protect organizations from advanced threats targeting email and collaboration tools within the Microsoft 365 environment. It offers robust protection against phishing, malware, and business email compromise, ensuring secure communication and collaboration across platforms like Exchange Online, Microsoft Teams, SharePoint, and OneDrive. Key Features and Functionality: - Safe Attachments: Scans email attachments in a secure environment to detect and block malicious content before it reaches users. - Safe Links: Provides real-time protection by analyzing URLs at the time of click, safeguarding users from malicious links. - Anti-Phishing Policies: Utilizes advanced algorithms and machine learning to identify and mitigate phishing attempts, including those involving domain impersonation. - Protection for Collaboration Tools: Extends security measures to Microsoft Teams, SharePoint, and OneDrive, ensuring safe file sharing and collaboration. - Automated Investigation and Response (AIR): Automates threat investigation processes, enabling swift identification and remediation of security incidents. - Attack Simulation Training: Offers tools to simulate phishing attacks, helping organizations educate employees and strengthen their security posture. Primary Value and Problem Solved: Microsoft Defender for Office 365 addresses the critical need for advanced threat protection in today's digital workplace. By integrating seamlessly with Microsoft 365 applications, it provides a unified defense against sophisticated cyber threats, reducing the risk of data breaches and ensuring business continuity. Its comprehensive approach not only safeguards email communications but also secures collaborative platforms, enabling organizations to operate confidently in a secure environment.
7
SpamTitan Email Security Logo
SpamTitan Email Security
4.5
(198)
Advanced yet easy to use Business Email Security Solution. Protects your business from malicious threats via email such as phishing, malware and spoofing. Double AV protection included. Office 365 Friendly.
8
Everest Logo
Everest
4.2
(189)
Everest (formerly 250ok and Return Path) Email Intelligence Solutions for Marketers utilize the world’s most comprehensive set of email intelligence and data to maximize inbox placement rates for your overall program and individual campaigns.
9
Vade Logo
Vade
4.6
(180)
Vade is the global leader on anti-phishing, spear phishing, malware and ransomware filtering.
10
SaneBox Logo
SaneBox
4.9
(180)
SaneBox prioritizes important email and moves everything else into a separate folder. The contents of this folder are summarized in a daily digest for quick and easy bulk processing.
Show More
Discussions related to Cloudphish

Discussions for this product are not available at this time. Be the first one to Start a discussion

Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Cloudphish
View Alternatives