Next-Gen Sandbox Technology
Frequently referred to as the “Sandbox Killer”, Perception Point’s patented HAP™ (Hardware Assisted Platform) provides near real-time prevention of malicious files and URLs that leverage:
- Zero-day vulnerabilities
- N-day vulnerabilities targeting unpatched
- Malicious code execution in scripts
- Malicious code in executable files
How HAP™ Works
The HAP™ excels in speed and precision and unlike traditional sandboxes that often take few minutes to complete an analysis, it has an average of 15 seconds. The HAP™ is composed of proprietary algorithms that leverage CPU-level data to access the entire execution flow direct from the processor to deterministically intercept exploit techniques of pre-malware release.
Perception Point’s patented engine includes:
- CFG algorithm – detects zero-day & N-day memory corruption exploits
- FFG algorithm – detects advanced exploitation techniques
- Dropper algorithm – detects logical bugs & droppers in apps, as well as malicious codes in scripts
Employs advanced heuristics-based engine
for detecting logical
bugs and handling
macros and scripts.
while it processes files and URLs, and identifies exploits by examining the
entire execution flow.
Revolutionizing Malware Detection
Next-gen Dynamic Scan
In independent trials, Perception Point ranked #1 in detection with the lowest false positive rate, dramatically outperforming other detection solutions.
Zero False Positives
The deterministic approach provides a clear, single verdict, allowing your SOC team to focus on the incidents that really matter.
Light Speed Prevention
Ultra-fast scanning delivers a verdict within 15 seconds on average. Perception Point can scan all content pre-delivery, without compromising on user’s experience.
Perception Point solutions scan 100% of traffic, no shortcuts, no statistics, no guessing.
Holistic coverage (across channels)
The HAP™ technology is deployed across all protected channels, providing equal protection against Zero-day & N-day attacks.
Rapid Deployment & Provisioning
All our solutions are deployed in a few clicks, creating zero fuss to you and your IT team.
Detection Technology Comparison
How Perception Point compares to other cybersecurity solutions
Full Threat Coverage
Level of AnalysisCPUApplication---Signature / Heuristics
Speed15 seconds avg.5–20 minutesA few secondsA few seconds (or more)
AccuracyDeterministicStatistic (behavioral)---Known Threats / Statistic (behavioral)
File Functionality Post-Scan
Detection of Zero-Days & Obfuscated N-Days
TALK TO SALES