no more blindspots

Prevent the transmission of malicious files and URLs through the channels of your choice with one easy solution. No sandbox required.

Email

Advanced Email Security.

  • Any web-based email service

Next gen cloud-based solution provides the most effective APT prevention on the market, plus cutting-edge protection against phishing, spam and commodity malware. Blocks any malicious file or URL, pre-malware release.

Easily fortify your existing messaging applications with one click. Can be deployed alone or along with additional collaboration channels secured by Perception Point.

Key Benefits .

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring
OUR TECHNOLOGY

Shared Drives

Advanced Shared Drive Security.

Shared drives can be highly effective malware distribution platforms. Prevent malicious content (files & URLs) from being uploaded, downloaded or used to infect previously clean files with our next gen cloud-based solution.

Easily fortify your existing messaging applications with one click. Can be deployed alone or along with additional collaboration channels secured by Perception Point.

Key Benefits .

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring
  • Archive santization
OUR TECHNOLOGY

Messaging

Advanced Messaging Security.

As the exchange of files & URLs moves to new channels, so does the potential for malicious content. Next gen cloud-based solution scans content exchanges in real-time to block every level of threat, from APTs to phishing, without creating delays.

Easily fortify your existing messaging applications with one click. Can be deployed alone or along with additional collaboration channels secured by Perception Point.

Key Benefits .

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring
OUR TECHNOLOGY

API & Analyzer

Anywhere you have files or URLs, our technology can scan them.

Integrate whit
other apps

API.

With the API, connect our cutting-edge threat prevention platform to any other channel or application in your organization. For example, if you are utilizing an FTP service, simply integrate it with our scanners.

The Analyzer.

Alternatively, you can independently upload suspicious content to Perception Point’s Analyzer on a case-by-case basis.

Key Benefits .

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring
OUR TECHNOLOGY

Email

  • Any web-based email service

Advanced Email
Security .

Next gen cloud solution provides the most effective APT prevention on the market plus cutting-edge protection against phishing, spam and commodity malware. Blocks any malicious file or URL, pre-malware release.

Key Benefits .

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring

Easily fortify your email service simply by changing a routing rule. No MX record change required. Can be deployed alone or along with additional collaboration channels secured by Perception Point.

OUR TECHNOLOGY

Shared Drives

Shared Drives.

Shared drives can be highly effective malware distribution platforms. Prevent malicious content (files & URLs) from being uploaded, downloaded or used to infect previously clean files with our next gen cloud-based solution.

Key Benefits .

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring
  • Archive santization

Easily fortify your email service simply by changing a routing rule. No MX record change required. Can be deployed alone or along with additional collaboration channels secured by Perception Point.

OUR TECHNOLOGY

Messaging

Messaging.

As the exchange of files & URLs moves to new channels, so does the potential for malicious content. Next gen cloud-based solution scans content exchanges in real-time to block every level of threat, from APTs to phishing, without creating delays.

Key Benefits .

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring

Easily fortify your email service simply by changing a routing rule. No MX record change required. Can be deployed alone or along with additional collaboration channels secured by Perception Point.

OUR TECHNOLOGY

API

  • Integrate whit other apps

API.

With the API, connect our cutting-edge threat prevention platform to any other channel or application in your organization. For example, if you are utilizing an FTP service, simply integrate it with our scanners.

Key Benefits .

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring

The Analyzer.

Alternatively, you can independently upload suspicious content to Perception Point’s Analyzer on a case-by-case basis.

OUR TECHNOLOGY

Built for the modern enterprise.

Real-time prevention

Block malicious content before it ever reaches the end user, taking human mistakes out of the equation.

100% threat visibility

“X-ray” any code executed by the system for cutting edge advanced threat protection, on top of the market standard protection against Everyday threats.

Zero delay

Sophisticated in-line prevention engines reduce scans to 15-30 seconds from 7-20 minutes, minimizing impact on user productivity.

One-click integration

Native cloud on top of existing servers, adapting policies, rules and quarantine with no need to change anything. No MX record change and zero on-boarding time.

Unlimited scale

Auto scale capabilities ensure 100% of email traffic is scanned, regardless of organization size.

Privacy and compliance

Our servers process data in less than a minute, after which no data is stored. We are undergoing the SOC 2 process, to be completed in 2018.

customer quote

customer quote

“Integrating Perception Point’s platform into our Office 365 was quick and seamless with absolutely no impact to our email service levels. In less than a month they’ve already blocked a potentially damaging attack that could have easily tricked our users and caused a serious disruption.
It’s rare that I see immediate returns that quickly.”

CISO, Healthcare
Hands-off approach

Smart Viewer.

We aren’t inserting any new dashboards into your day, and will call if any serious incidents occur. However, you can always access key data points and tools through our self-service viewer.

1

Get insights.

See most targeted software, file classifications, most targeted users, most common domains, and more.

2

Analyze any file or URL.

Upload any suspicious file or URL, from any software, and get an immediate analysis.

3

Conduct forensics.

Determine the scope and scale of an attempted attack. Identify current threats and prioritize response efforts.

Want to know more?

Contact Us.

REQUEST A DEMO

Stay a step ahead

Research & News.

read more
February 20, 2018

Hardware vs. Software-based detection

A brief history of software exploitation and mitigation techniques, and how defensive technologies must be approached today.

By Shlomi Levin, Founder & CTO

February 20, 2018
read more
18 March, 2018

Case Study: The evolution of a recent attack campaign

How hackers can make variations within one campaign - as seen in a recent customer attack we blocked.

By Perception Point Research

March 28, 2018
read more
April 11, 2018

Breaking CFI: Exploiting CVE-2015-5122 using COOP

In this series of posts we’re going to demonstrate how modern CFI implementations can be circumvented.

By Oshri Sela & Shlomi Levin

April 11, 2018