fbpx

Get Your Free Plan.

News.

Keep up with Perception Point’s updates and new offerings. Follow us to see how we evolve to better protect you in our journey to lead the security domain.

How to Prevent Ransomware Attacks

Ransomware, an advanced form of cyberattack, is one of the biggest threats that security teams around the world are facing. All organizations have become a target, from small teams to large enterprises, state systems and government networks. 

Characteristics of Best Email Security Solutions

Many enterprises are suffering from a growing number of severe cyberattacks, where the majority of them - over 90% - originate from a malicious email and actually could have been prevented by a next-gen advanced email security solution with the right features and necessary level of protection. As a CISO or security leader, you are probably asking yourself, what are the characteristics of the top-notch email security solutions in the market? What should you look for, when evaluating an email security solution?
Default Email Security

SEGs vs. ICES Solutions: The Complete Guide

Find out everything there is to know about Gartner’s two email security solution categories, SEGs (Secured Email Gateways) and ICES (Integrated Cloud Email Security), including their benefits, differences, and how each is deployed.

Webinar: Spread Love…Not Ransomware!

Join experts from Redpoint Cyber and Perception this Valentine's Day to talk about how it's becoming easier for attackers to launch ransomware attacks and what you can do to protect your organization.

‘Tis the Season…for Cyberattacks!

Unlike the rest of us, cyber attackers don’t take vacations. The holiday season is upon us, and many are preparing to celebrate with family and friends both near and far. For attackers, the holiday season is a perfect time to launch attacks, when businesses are closed or are operating with a skeletal crew.

Cyberattacks Are Becoming More Sophisticated

According to Perception Point CEO, Yoram Salinger, we will see cyberattacks becoming more sophisticated than they already are in the upcoming year. In this article we review why most enterprises are still susceptible to cyberattacks and what CISOs should take into consideration in 2022.

Techniques Used by Hackers to Bypass Email Security Solutions

There are many email security solutions available in the market today, yet organizations still see phishing and malware reach users. Here is a list of the most-used techniques that hackers choose to bypass traditional email security solutions.
5 takeaways from Gartner 2021 Market Guide for Email Security

5 Key Takeaways from the 2021 Gartner Market Guide for Email Security

In this blog post, we cover the main takeaways from the 2021 Market Guide for Email Security Report by Gartner, and how security leaders can make an impact on their organization's security posture by taking a deeper look at their email security provider.

Phony Job Ads and How to Spot Them

Job ad scams are on the rise. According to the FBI, more than 16,000 Americans reported employment scams in 2020. Some are easy to spot. Others are quite sophisticated.

The (Yet) Unsolved Problem of Email Security

The number of cyberattacks is dramatically on the rise, the majority originating via email. Unfortunately many security leaders have just accepted this reality as fact. This blog discusses how you can evaluate whether you have the right email security solution to get the job done.

Virtual Event: How did the bad guys get in? Attack vectors in the modern enterprise

Have you ever wondered how you were hacked? In this meetup, Perception Point will discuss the latest attack vectors that cybercriminals are employing to breach organizations. We will cover various techniques used through the email channel, cloud collaboration channels including Box, Dropbox, OneDrive, and Google Drive and perimeter breaches - diving into the attack kill chains.

Salesforce Email Service Used for Phishing Campaign

Cybercriminals are using Salesforce’s mass email service to dupe people into handing over credit card numbers, credentials and other personal information in a novel phishing campaign that highlights the threats to corporate networks that can come from whitelisted email addresses.
Dana Roth

Phisher Errors Lower Entry Barriers for Wanna-be Phishers

Each year, it becomes easier for wanna-be phishers to create successful campaigns. This is well-known. But now, it’s at its easiest. Anyone can successfully set up and employ a phishing scheme – without knowing any programming, going to the darknet or paying a thing.

Bringing PREVENTION Back!

Listen to this short podcast to learn about content-based threats, the potential cyber threats of collaboration tools, and how the COVID-19 pandemic affects the current threat landscape. At the end of this session, you can also learn how Perception Point solves these issues and how we're bringing PREVENTION is back.
white strip building apn partners

AWS Selects Perception Point as a Technology Partner.

Perception Point, a leading provider of advanced threat protection for Email and Shared Drive services, has been recognised as a Select Technology Partner in the Amazon Web Services (AWS) Partner Network (APN).

TALK TO SALES

Ready to Try
Perception Point?