Perception Point was recently named Best Email Security Solution by The Tech Ascension Awards.
What are the top browser security threats, and how can you prevent them? Find out how security leaders can protect their organizations, here.
If you want to reduce breaches, free your users to browse the web and access files, and reduce your costs, take a look at our new web security portfolio.
75% of companies that were hit by ransomware last year had up to date endpoint protection solutions in place. Why didn’t that help stop the attacks? Let’s take a look at the most common approaches to ransomware prevention, and why they haven’t been able to provide a solution for enterprises.
Zero Trust is becoming a standard approach to securing access to enterprise applications (both cloud and on-prem). With Zero Trust, access is granted based primarily on user authentication and risk level, and not on the user’s presence in the corporate network. Based on the user’s credentials, the enterprise can grant access to a subset of enterprise resources and employees can work from any network without relying on a VPN connection. The architecture is called “Zero Trust” because the enterprise shouldn’t automatically trust endpoints within the corporate perimeter. Instead, it should verify all users and endpoints.
We’re excited to share that Hysolate has been acquired by Perception Point. This is a great next step in the Hysolate journey to bring advanced web security to enterprises everywhere
VDI involves hosting virtual desktops on centralized server and storage infrastructure. In this blog post we discuss the cost effectiveness of VDI versus Windows 10, and what factors need to be accounted for when choosing between VDI and DaaS (Desktop-as-a-Service).
A cybersecurity strategy offers a clear, detailed plan that standardizes security across an organization. It helps CISOs shift from reactive to proactive security, ensuring that they are ready and prepared to respond to various relevant threats.
Many organizations don’t consider the risk that Salesforce exposes them to and the importance of Salesforce security. In this blog, we will cover the use cases that expose organizations to potential risks, and the different solutions for how to best protect against them.
Ransomware prevention is crucial in keeping your enterprise safe against cyberthreats. In this post, we of how to strengthen your prevention plans.
In this post we detail what you should look for when choosing a ransomware protection service provider.
In this blog we review the importance of calculating ROI for email security and some key elements to consider along the way.
There are several benefits to integrating threat intelligence into your organization. Take the next step in learning more about them.
Different types of phishing use different techniques to ensure a successful attack. Learn how to identify them and keep your business secure.
Spearphishing attacks are growing more rampant, but many mistake it for whaling phishing. Learn the differences between the two.
Learning how to prevent ransomware is critical. Discover some of the best ways to protect your organization from this growing threat.
Ransomware as a Service (RaaS) is a growing phenomenon that has caused millions of losses. Your business may be at risk. Learn more here.
Cloud security companies helps safeguard your data against cyber attacks. Learn more about cloud security and the companies that offer it.
EAC, short for Email Account Compromise, is a type of cybersecurity attack in which cyber attackers attempt to fully compromise a user’s email account and gain access to their inboxes through several techniques, including malware, phishing and password spray. The attacker will then impersonate the user whose account they have breached and send phishing emails […]
Yoram Salinger, Perception CEO, discusses the acquisition of Hysolate, a next-gen web isolation platform that takes an endpoint-centric approach to protect against malicious web-based threats.
Learn how an incident response plan can help create a safe content-sharing environment against cyber threats.
Selecting a managed security service provider can be a hard decision with many options out there. Narrow down your choices with this guide.
Cyber Threat Intelligence (CTI) is, in essence, data that has been analyzed and validated through multiple analysis processes specific to cybersecurity.
Many enterprises are suffering from a growing number of severe cyberattacks, where the majority of them – over 90% – originate from a malicious email and actually could have been prevented by a next-gen advanced email security solution with the right features and necessary level of protection. As a CISO or security leader, you are probably asking yourself, what are the characteristics of the top-notch email security solutions in the market? What should you look for, when evaluating an email security solution?
Find out everything there is to know about Gartner’s two email security solution categories, SEGs (Secured Email Gateways) and ICES (Integrated Cloud Email Security), including their benefits, differences, and how each is deployed.
In Gartner’s 2021 Market Guide for Email Security, they removed the previous CESS (Cloud Email Security Supplements) and IESS (Integrated Email Security Solutions) categories, and introduced a new category ICES (Integrated Cloud Email Security).
In this blog post, we cover the main takeaways from the 2021 Market Guide for Email Security Report by Gartner, and how security leaders can make an impact on their organization’s security posture by taking a deeper look at their email security provider.
The number of cyberattacks is dramatically on the rise, the majority originating via email. Unfortunately many security leaders have just accepted this reality as fact. This blog discusses how you can evaluate whether you have the right email security solution to get the job done.
Have you ever wondered how you were hacked? In this meetup, Perception Point will discuss the latest attack vectors that cybercriminals are employing to breach organizations. We will cover various techniques used through the email channel, cloud collaboration channels including Box, Dropbox, OneDrive, and Google Drive and perimeter breaches – diving into the attack kill chains.
Join experts from AWS & Perception Point on October 13th, as they discuss how modern enterprises and application providers can be vigilant about their cloud storage security and at the same time avoid being held back by slow, complex, and outdated security solutions.
Since its inception, Perception Point has been scanning billions of emails, URLs and files every week. Most of the time, Perception Point clients already have at least one email security solution in place.
The Importance of Blocking Crypto Viruses, Threats, and Attempted Phishing Attacks
Train the machine—not just the employee. Hackers know that many companies rely on security employee training alone, so they’ve been upping their game to trick even the most trained employees into phishing scams. Phishing email attacks are nothing new. These attacks have been around for 15 years, but they are still one of the top […]
The adoption of cloud email is increasing every year, with Google Workspace and Microsoft Office 365 dominating. And now, a new report by Gartner noted that many clients have expressed dissatisfaction with default email security solutions, specifically citing Office 365.
Gone are the days of running down the hall to ask an important question and get the answer immediately. Remote and hybrid workforces depend heavily on email to communicate and share files. How can you secure email communication – especially for internal emails at the speed your business requires. Despite these changes, the need for […]
Listen to this short podcast to learn about content-based threats, the potential cyber threats of collaboration tools, and how the COVID-19 pandemic affects the current threat landscape. At the end of this session, you can also learn how Perception Point solves these issues and how we’re bringing PREVENTION is back.
There’s a tension between security and business enablement. There’s also a tension between security and user experience. So what can you do about it? A full article on the dos and don’t’s on user experience in cybersecurity
Why Perception Point Topped SE Labs’ Independent Email Security Testing.