no more blindspots

Prevent the transmission of malicious files and URLs through the channels of your choice with one easy solution. No sandbox required.

Email

Advanced Email Security.

Next gen cloud-based solution provides the most effective APT prevention on the market, plus cutting-edge protection against phishing, spam and commodity malware. Blocks any malicious file or URL, pre-malware release.

Easily fortify your existing messaging applications with one click. Can be deployed alone or along with additional collaboration channels secured by Perception Point.

  • Any web-based email service

Key Benefits .

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring

Shared Drives

Advanced Shared Drive Security.

Shared drives can be highly effective malware distribution platforms. Prevent malicious content (files & URLs) from being uploaded, downloaded or used to infect previously clean files with our next gen cloud-based solution.

Easily fortify your existing messaging applications with one click. Can be deployed alone or along with additional collaboration channels secured by Perception Point.

Key Benefits .

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring
  • Archive santization

Messaging

Advanced Messaging Security.

As the exchange of files & URLs moves to new channels, so does the potential for malicious content. Next gen cloud-based solution scans content exchanges in real-time to block every level of threat, from APTs to phishing, without creating delays.

Easily fortify your existing messaging applications with one click. Can be deployed alone or along with additional collaboration channels secured by Perception Point.

Key Benefits .

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring

API & Analyzer

Anywhere you have files or URLs, our technology can scan them.

API.

With the API, connect our cutting-edge threat prevention platform to any other channel or application in your organization. For example, if you are utilizing an FTP service, simply integrate it with our scanners.

The Analyzer.

Alternatively, you can independently upload suspicious content to Perception Point’s Analyzer on a case-by-case basis.

Integrate whit
other apps

Key Benefits .

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring
OUR TECHNOLOGY

Built for the modern enterprise.

Real-time prevention

Block malicious content before it ever reaches the end user, taking human mistakes out of the equation.

100% threat visibility

“X-ray” any code executed by the system for cutting edge advanced threat protection, on top of the market standard protection against Everyday threats.

Zero delay

Sophisticated in-line prevention engines reduce scans to 15-30 seconds from 7-20 minutes, minimizing impact on user productivity.

One-click integration

Native cloud on top of existing servers, adapting policies, rules and quarantine with no need to change anything. No MX record change and zero on-boarding time.

Unlimited scale

Auto scale capabilities ensure 100% of email traffic is scanned, regardless of organization size.

Privacy and compliance

Our servers process data in less than a minute, after which no data is stored. We are undergoing the SOC 2 process, to be completed in 2018.

customer quote

customer quote

“Integrating Perception Point’s platform into our Office 365 was quick and seamless with absolutely no impact to our email service levels. In less than a month they’ve already blocked a potentially damaging attack that could have easily tricked our users and caused a serious disruption.
It’s rare that I see immediate returns that quickly.”

CISO, Healthcare
Hands-off approach

Smart Viewer.

We aren’t inserting any new dashboards into your day, and will call if any serious incidents occur. However, you can always access key data points and tools through our self-service viewer.

1

Get insights.

See most targeted software, file classifications, most targeted users, most common domains, and more.

2

Analyze any file or URL.

Upload any suspicious file or URL, from any software, and get an immediate analysis.

3

Conduct forensics.

Determine the scope and scale of an attempted attack. Identify current threats and prioritize response efforts.

Protection & Prevention

Our layer-based solution ensures that each and every URL is scanned by several 3rd party reputation-based vendors, threat analysis databases, and by our in-house image recognition-based engine.
We offer customers two different options for re-writings URLs:
URL Rewrite & Blocking Mode: This mode provides the highest level of prevention. When a user clicks on a link, we will first “hold” the session as our deep analysis engines conduct the scan, and will then transfer to the site only after there is a clean verdict.
Non-blocking URL Rewrite: This mode detects malicious links while still enabling users to immediately start a session. When a user clicks on a link we will redirect to our platform. However, while we run a deep analysis of the link, we will still allow for the user to browse within destination. It is important to note that if the URL is malicious, the first user to click on it will go directly to the malicious destination.

Too many false positives can be very disruptive so we work hard to minimize the rate. We are proud to say that less than 0.0015% of all clean emails are marked as malicious. Our ultimate goal is to reach zero, so our SOC team deeply investigates each false positive to ensure continuous improvement.

We scan all .exe files, and any other similar file types, with several static engines and our threat intelligence tools. However, we recommend that all of our customers block such files types by enforcing a blocking policy. As of today, our platform blocks .exe and its likes by default. It even blocks these files if they are embedded in other files/URLs or hidden inside archived files for which we don’t have the password.

Yes. Our algorithms are able to extract all relevant documents inside archived files. Following extraction, each file is sent separately through all relevant layers. Note that we do not currently scan encrypted archived files for which we don‎‎‎’t have the password, but we are working on it.

Performance & Functionality

We recommend creating a simple quarantine rule to direct malicious email to a designated folder. However, our platform is extremely flexible, so if you want to send it to any other place or even deliver it to the end-user, we can do that as well.

We leverage your current quarantine folder. This ensures that you will not need to make any special arrangements when deploying our platform.

Absolutely. Your relevant IT personnel (usually, the system admin) can easily access the folder and release it.

Before viewing a malicious email in quarantine, it is recommended to review the verdict within our very easy-to-use Viewer.

Attachment scans only take up to 30 seconds. Every single attachment is scanned by all layers, including our advanced threat engine, the HAPTM, on at least three different versions of software (e.g. Word documents are scanned by all of the latest Office versions).

URL scans only take up to 30 seconds. However, the customer can decide whether to block the loading of the link or not. In cases where the Block Mode feature is not turned on, the user experiences very little delay.

Absolutely not. Our platform is seamlessly integrated into any SIEM you already have and does not require any more attention from your part. However, if you wish to analyze and learn about recent attacks on your organization, you can easily look at our Viewer. It is completely up to you.

Support & Incident Response

Our support team is available 24/7, by phone or email. In addition, a dedicated engineer is assigned to fix complex cases when needed. Our support personnel have many years’ experience and will ensure that you always receive the best service.

We don’t see any real chance of that happening. However, we commit to remediate any unexpected failures and enable normal business email flow in less than one hour.

First, you can always look at the Viewer. It includes detailed information regarding the malicious code, the CVE used, which software was used, which version, and more.
In addition, Perception Point’s SOC team analyzes each and every malicious event triggered on a daily basis. They also communicate with our Research team to provide deep technical analysis on must-know and popular events.
Finally, on top of the executive summary reports, our customers receive internal research studies that are based on industry news, trends, our forecasts and activity found in the wild.

Privacy & Compliance

Our servers process data in less than a minute, after which no data is stored.

We take compliance seriously and we are now undergoing the SOC-2 process, reviewed by a highly-reputed Big-4 accounting firm. We expect to be SOC-2 compliant by end of 2018.