End-to-End Cyber Threat Detection

Our multi-layered platform provides unprecedented cyber threat detection and prevention of APTs, phishing, malware, spam, BEC, ATO attacks, and more, delivered with the speed, scale, and flexibility of the cloud. One simple solution that scans all content within 30 seconds.

graphic of buildings made of lines
graphic of building made of lines

Unique Cyber Threat Detection Capabilities

Next Gen
Anti-Evasion

Multiple engines work together to unpack embedded attacks and uncover any attempt to evade.

Next Gen
Dynamic Scans

“Sandbox-killer” technology stops advanced attacks at the exploit stage, before malware is delivered.

100%
Coverage

Scale and speed ensure no file or URL goes un-scanned – in channel, internal or external.

Our Cyber Threat Detection Architecture

1Spam

Spam Filter
(Email Only)

Receives the email and applies reputation and anti-spam filters to quickly flag an email as malicious.

graphic of square
graphic of square

2Anti-evasion

Recursive
Unpacker

Unpacks the content into smaller units (files and URLs) in a recursive manner to identify hidden malicious attacks. All of the extracted hidden components go separately through to the next security layers.
graphic of square
graphic of square

3Files & URLs

Threat Intelligence

Combines multiple threat intelligence sources with a unique internally developed engine that scans URLs and files in the wild to warn about potential or current attacks.
graphic of 4 squares

4Files & URLs

Phishing Engines

Best-in-class URL reputation engines coupled with Perception Point’s in-house built image-recognition analysis engine identify impersonation techniques and phishing attacks.

5Files & URLs

Static Signatures

Combines best-in-class signature based anti-virus engines to identify malicious attacks. In addition, we’ve developed a tool that acts to identify highly complicated signatures.

6Text

BEC

Prevention of payload-less attacks including spoofing, look-alike domain, and display name deception.

3Files & URLs

Threat Intelligence

graphic of square

4Files & URLs

Static Signatures

graphic of square

5Files & URLs

Phishing Engines

graphic of square

6Text

BEC

graphic of square

7Files & URLs

First Hardware-Assisted Platform (HAP™)

Unique CPU-level technology acts earlier in the kill chain than any other solution. Blocking attacks at the exploit phase – pre-malware release – for true APT prevention.

graphic of square
graphic of square

See Our Detection in Action

Check out this demo of our X-Ray and see why major enterprises use Perception Point’s Advanced Security to protect their content-exchanges.

One Detection Platform for Any Cyber Threat

Protect against any content-based attack, including files, URLs, and plain texts. Deploy across channels, regardless to scale or traffic volume.

graphic of 3 fireworks

Zero-days
& N-days

graphic of a file

Phishing

graphic of a ghost on a computer

ATO & Lateral Phishing

skull icon going into a box

Malware

search paper cyber threat

Evasion

Cyber Threat Detection Case Studies

TALK TO SALES

Ready to Try
Perception Point?